1,034
Views
9
CrossRef citations to date
0
Altmetric
ARTICLES

The Role of Child Sexual Abuse Images in Coercive and Non-Coercive Relationships with Adolescents: A Thematic Review of the Literature

&

REFERENCES

  • Altobelli, T. (2010). Cyber-abuse—A new worldwide threat to children's rights. Family Court Review, 48(3), 459–481.
  • Aslan, D., & Edelmann, R. (2014). Demographic and offense characteristics: A comparison of sex offenders convicted of possessing indecent images of children, committing contact sex offenses or both offenses. The Journal of Forensic Psychiatry & Psychology, 25(2), 121–134.
  • Baumgartner, S., Sumter, S., Peter, J., & Valkenburg, P. (2012). Identifying teens at risk: Developmental pathways of online and offline sexual risk behavior. Pediatrics, 130(6), e1489–e1496.
  • Briggs, P., Simon, W., & Simonsen, S. (2010). An exploratory study of Internet-initiated sexual offenses and the chat room sex offender: Has the Internet enabled a new typology of sex offender? Sexual Abuse: A Journal of Research and Treatment, 23(1), 72–91.
  • Buckingham, D. (2013). Representing audiences: Audience research, public knowledge and policy. The Communication Review, 16(1-2), 51–60.
  • CEOP. (2013). Threat assessment of child sexual exploitation and abuse. Retrieved from http://ceop.police.uk/Documents/ceopdocs/CEOP_TACSEA2013_240613%20FINAL.pdf
  • Chronaki, D. (2013). Young people's accounts of experiences with sexual content during childhood and teenage life. The Communication Review, 16(1-2), 61–69.
  • Dake, J.A., Price, J.H., Maziarz, L., & Ward, B. (2012). Prevalence and correlates of sexting behavior in adolescents. American Journal of Sexuality Education, 7(1), 1–15.
  • Döring, N. (2014). Consensual sexting among adolescents: Risk prevention through abstinence education or safer sexting? Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 8(1), 1–14. doi: 10.5817/CP2014-1-9
  • Drouin, M., Ross, J., & Tobin, E. (2015). Sexting: A new, digital vehicle for intimate partner aggression? Computers in Human Behavior, 50, 197–204.
  • Drouin, M., Vogel, K., Surbey, A., & Stills, J. (2013). Let's talk about sexting, baby: Computer-mediated sexual behaviors among young adults. Computers in Human Behavior, 29(5), A25–A30.
  • Dutton, W.H., & Blank, G. (2014). The emergence of next generation Internet users. International Economics and Economic Policy, 11(1-2), 29–47. doi: http://dx.doi.org/10.1007/s10368-013-0245-8
  • Eke, A., Seto, M.C., & Williams, J. (2011). Examining the criminal history and future offending of child pornography offenders: An extended prospective follow-up study. Law and Human Behavior, 35(6), 466–478.
  • Elliott, I., & Beech, A. (2009). Understanding online child pornography use: Applying sexual offense theory to internet offenders. Aggression & Violent Behavior, 14, 180–193.
  • Elliott, I., Beech, A., & Mandeville-Norden, R. (2013). The psychological profiles of internet, contact, and mixed internet/contact sex offenders. Sexual Abuse: A Journal of Research and Treatment, 25(1), 3–20.
  • Englander, E. (2012). Low risk associated with most teenage sexting: A study of 617 18-year-olds. MARC Research Reports. Retrieved from https://webhost.bridgew.edu/marc/SEXTING%20AND%20COERCION%20report.pdf
  • Finkelhor, D. (2014). Commentary: Cause for alarm? Youth and internet risk research—a commentary on Livingstone and Smith (2014). Journal of Child Psychology & Psychiatry, 55(6), 655–658. doi: 10.1111/jcpp.12260
  • Flood, M. (2008). Boys, sex and porn: New technologies and old dangers: Whatever happened to child sexual abuse? London: BASPSCAN and Nottingham Trent University Unit for Critical Studies in Men and Masculinities.
  • Gámez -Guadix, M., Orue, I., Smith, P.K., & Calvete, E. (2013). Longitudinal and reciprocal relations of cyberbullying with depression, substance use, and problematic Internet use among adolescents. Journal of Adolescence, 53, 446–452.
  • Gilbert, D. (2015). Child abuse images to be digitally fingerprinted to stop paedophiles sharing on Facebook and Google. International Business Times. Retrieved from http://www.ibtimes.co.uk/child-abuse-images-be-digitally-fingerprinted-stop-paedophiles-sharing-facebook-google-1514784
  • Hamilton-Giachritsis, C.E., Peixoto, C.S., & Melo, A. (2011). Risk assessment and intervention. In T. Magalhaes (Ed.), Abuse and neglect series 1: To improve the management of child abuse and neglect (pp. 89–131). Porto, Portugal: SPECAN.
  • Hasinoff, A.A. (2013). Sexting as media production: Rethinking social media and sexuality. New Media and Society, 1(17). doi: 10.1177/1461444812459171
  • Henderson, L., & Morgan, E. (2011). Sexting and sexual relationships among teens and young adults. McNair Scholars Research Journal, 7(1). Retrieved from http://scholarworks.boisestate.edu/cgi/viewcontent.cgi?article = 1091&context = mcnair_journal
  • Hinduja, S., & Patchin, J.W. (2010). Sexting: A brief guide for educators and parents. Cyberbullying Research Center. Retrieved from http://www.cyberbullying.us/Sexting-Fact-Sheet.pdf
  • Houck, C.D., Barker, D., Rizzo, C., Hancock, E., Norton, A., & Brown, L.K. (2014). Sexting and sexual behavior in at-risk adolescents. Pediatrics, 133(2), e27682. doi: 10.1542/peds.2013-1157
  • IWF. (2014). IWF Operational Trends 2014: Overview. Retrieved from https://www.iwf.org.uk/resources/trends
  • Jewkes, Y., & Wykes, M. (2012). Reconstructing the sexual abuse of children: “Cyber-paeds,” panic and power. Sexualities, 15(8), 934–952.
  • Johnson, S.B., Sudhinaraset, M., & Blum, R.W. (2010). Neuromaturation and adolescent risk taking: Why development is not determinism. Journal of Adolescent Research, 25(1), 4–23.
  • Jung, S., Ennis, L., Stein, S., Choy, A., & Hook, T. (2013). Child pornography possessors: Comparisons and contrasts with contact- and non-contact sex offenders. Journal of Sexual Aggression, 19(3), 295–310.
  • Karaian, L. (2012). Lolita speaks: “Sexting,” teenage girls and the Law. Crime Media Culture, 8(1), 57–73.
  • Klettke, B., Hallford, D.J., & Mellor, D.J. (2014). Sexting prevalence and correlates: A systematic literature review. Clinical Psychology Review, 34, 44–53.
  • Kloess, J.A., Beech, A.R., & Harkins, L. (2014). Online child sexual exploitation: prevalence, process, and offender characteristics. Trauma, Violence & Abuse, 15(2), 126–139. doi: 10.1177/1524838013511543
  • Lanning, K.V. (2001). Child molesters: A behavioral analysis. Alexandria, VA: National Center for Missing and Exploited Children.
  • Leary, M.G. (2010). Sexting or self-produced child pornography? The dialog continues—structured prosecutorial discretion within a multidisciplinary response. Virginia Journal of Social Policy and the Law, 17(3), 486–566.
  • Lenhart, A. (2009), Teens and sexting: How and why minor teens are sending sexually suggestive nude or nearly nude images via text messaging. Pew Internet and American Life Project Research (Online). Washington, DC: Pew Research Center. . Retrieved from http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  • Lester, L., Cross, D., & Shaw, T. (2012). Problem behaviors, traditional bullying and cyberbullying among adolescents: Longitudinal analyses. Emotional and Behavioral Difficulties, 17, 435–447.
  • Ley, B., Ogonowski, C., Hess, J., Reichling, T., Wan, L., & Wulf, V. (2014). Impacts of new technologies on media usage and social behavior in domestic environments. Behavior & Information Technology, 33(8), 815–828. doi: 10.1080/0144929X.2013.832383
  • Lim, S.S. (2013). On mobile communication and youth “deviance”: Beyond moral, media and mobile panics. Mobile Media & Communication, 1(1), 96–101.
  • Lim, M. (2013). The internet and everyday life in Indonesia: A new moral panic?. Bijdragen tot de Taal-, Land- en Volkenkunde/Journal of the Humanities and Social Sciences of Southeast Asia, 169(1), 133–147.
  • Livingstone, S., & Smith, P.K. (2014). Annual research review: Harms experienced by child users of online and mobile technologies: The nature, prevalence and management of sexual and aggressive risks in the digital age. Journal of Child Psychology and Psychiatry, 55(6), 635–654.
  • Lunceford, B. (2011). The new pornographers: Legal and ethical considerations of sexting. In B.E. Drushel & K. German (Eds.), The ethics of emerging media: information, social norms, and new media technology (pp. 91–118). New York, NY: Continuum.
  • Machmutow, K., Perren, S., Sticca, F., & Alsaker, F.D. (2012). Peer victimization and depressive symptoms: Can specific coping strategies buffer the negative impact of cybervictimization? Emotional and Behavioral Difficulties, 17, 403–420.
  • Magaletta, P.R., Faust, E., Bickart, W., & McLearen, A.M. (2014). Exploring clinical and personality characteristics of adult male Internet-only child pornography offenders. International Journal of Offender Therapy & Comparative Criminology, 58(2), 137–153. doi: 10.1177/0306624×12465271
  • Martin, J., & Alaggia, R. (2013). Sexual abuse images in cyberspace: Expanding the ecology of the child. Journal of Child Sexual Abuse, 22(4), 398–415. doi: 10.1080/10538712.2013.781091
  • Merdian, H.L., Curtis, C., Thakker, J., Wilson, N., & Boer, D.P. (2013). The three dimensions of online child pornography offending. Journal of Sexual Aggression: An International, Interdisciplinary Forum for Research, Theory and Practice, 19(1), 121–132.
  • Mitchell, K.J., Finkelhor, D., Jones, L.M., & Wolak, J. (2012). Prevalence and characteristics of youth sexting: A national study. Pediatrics, 129, 13–20.
  • Ofcom. (2014). Children and parents: Media use and attitudes report. Retrieved from http://stakeholders.ofcom.org.uk/binaries/research/media-literacy/media-use-attitudes-14/Childrens_2014_Report.pdf
  • Owens E.W., Behun R.J., Manning J.C., & Reid, R.C. (2012). The impact of Internet pornography on adolescents: A review of the research. Sexual Addiction & Compulsivity, 19, 99–122.
  • Peterson-Iyer, K. (2013). Mobile porn? Teenage sexting and justice for women. Journal of the Society of Christian Ethics, 33(2), 93–110. doi: 10.1353/sce.2013.0036
  • Powell, A. (2010). Configuring consent: Emerging technologies, unauthorized sexual images and sexual assault. Australian and New Zealand Journal of Criminology, 43, 76–90.
  • Quayle, E., Allegro, S., Hutton, L., Sheath, M., & Lööf, L. (2014). Rapid skill acquisition and online sexual grooming of children. Computers in Human Behavior, 39, 368–375. doi: 10.1016/j.chb.2014.07.005
  • Quayle, E., & Jones, T. (2011). Sexualized images of children on the Internet. Sexual Abuse: A Journal of Research and Treatment, 23(1), 7–21.
  • Quayle, E., & Taylor, M. (2002). Child pornography and the Internet: Perpetuating a cycle of abuse. Deviant Behavior, 23(4), 331–362.
  • Ringrose, J., Gill, R., Livingstone, S., & Harvey, L. (2012). A qualitative study of children, young people and “sexting”: A report prepared for the NSPCC. London, England: National Society for the Prevention of Cruelty to Children.
  • Rollins, J. (2015). Sexting cyberchildren: Gender, sexuality, and childhood in social media and law. Sexuality & Culture, 19(1), 57–71. doi: 10.1007/s12119-014-9243-4
  • Schuijer, J., & Rossen, B. (1992). The trade in child pornography. IPT Forensics, 4. Retrieved from http://www.ipt-forensics.com/journal/volume4/j4_2_1.htm
  • Schultze-Krumbholz, A., Jäkel, A., Schultze, M., & Scheitauer, H. (2012). Emotional and behavioral problems in the context of cyberbullying: A longitudinal study among German adolescents. Emotional and Behavioral Difficulties, 17, 329–345.
  • Sheehan, V., & Sullivan, J. (2010). A qualitative analysis of child sex offenders involved in the manufacture of indecent images of children. Journal of Sexual Aggression, 16(2), 143–167. doi: 10.1080/13552601003698644
  • Slavtcheva-Petkova, V., Nash, V., & Bulger, M. (2015). Evidence on the extent of harms experienced by children as a result of online risks: Implications for policy and research. Information, Communication & Society, 18(1), 48–62.
  • Stroud, S.R. (2014). The dark side of the online self: A pragmatist critique of the growing plague of revenge porn. Journal of Mass Media Ethics, 29(3), 168–183. doi: 10.1080/08900523.2014.917976
  • Taylor, M., & Quayle, E. (2003). Child pornography: An Internet crime. Brighton, England: Routledge.
  • Temple, J.R., Le, V.D., van den Berg, P., Ling, Y., Paul, J.A., & Temple, B.W. (2014). Brief report: Teen sexting and psychosocial health. Journal of Adolescence, 37, 33–36.
  • Walker, S., Sanci, L., & Temple-Smith, M. (2013). Sexting: Young women's and men's views on its nature and origins. Journal of Adolescent Health, 52, 697–701.
  • Whittle, H., Hamilton-Giachritsis, C., Beech, A., & Collings, G. (2013). A review of young people's vulnerabilities to online grooming. Aggression & Violent Behavior, 18(1), 135–146.
  • Williams, R. (2014, May 13). David Cameron and MPs support Internet child safety campaign. The Telegraph. . Retrieved from http://www.telegraph.co.uk/technology/internet-security/10826745/David-Cameron-and-MPs-support-internet-child-safety-campaign.html
  • Wolak, J., & Finkelhor, D. (2011). Sexting: A typology. Durham, NH: Crimes Against Children Research Center.
  • Wolak, J., Finkelhor, D., & Mitchell, K.J. (2012). Trends in arrests for child pornography production: The Third National Juvenile Online Victimization Study (NJOV‐3). Durham, NH: Crimes Against Children Research Center.
  • Wolak, J., Finkelhor, D., Mitchell, K., & Ybarra, M. (2008). Online “predators” and their victims: Myths, realities, and implications for prevention and treatment. The American Psychologist, 63(2), 111–128.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.