1,573
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

The Relevance of Targets’ Sexual Knowledge in the Progression of Online Sexual Grooming Events: Findings from an Online Field Experiment

, , &
Pages 452-473 | Received 26 Oct 2022, Accepted 21 Jul 2023, Published online: 03 Aug 2023

References

  • Abel, G. G., Becker, J. V., & Cunningham-Rathner, J. (1984). Complications, consent, and cognitions in sex between children and adults. International Journal of Law and Psychiatry, 7(1), 89–103. https://doi.org/10.1016/0160-2527(84)90008-6
  • Aitken, S., Gaskell, D., & Hodkinson, A. (2018). Online sexual grooming: Exploratory comparison of themes arising from male offenders’ communications with male victims compared to female victims. Deviant Behavior, 39(9), 1170–1190. https://doi.org/10.1080/01639625.2017.1410372
  • Ali, A., Ali, S., Khan, S. A., Khan, D. M., Abbas, K., Khalil, A., Manzoor, S., & Khalil, U. (2019). Sample size issues in multilevel logistic regression models. PloS One, 14(11), e0225427 https://doi.org/10.1371/journal.pone.0225427 PMC: 31756205
  • Black, J. P., Wollis, M., Woodworth, M., & Hancock, J. T. (2015). A linguistic analysis of grooming strategies of online child sex offenders: Implications for our understanding of predatory sexual behavior in an increasingly computer-mediated world.
  • Bossler, A. M., Holt, T. J., & May, D. C. (2012). Predicting online harassment victimization among a juvenile population. Youth & Society, 44(4), 500–523. https://doi.org/10.1177/0044118X11407525
  • Briggs, P., Simons, W., & Simonsen, S. (2011). An exploratory study of Internet-initiated sexual offences and the chat room sex offender: Has the Internet enabled a new typology of sex offender? Sexual Abuse : A Journal of Research and Treatment, 23(1), 72–91. https://doi.org/10.1177/1079063210384275
  • Cano,, B.A, Fernandez,, M., Alani,, H., Detecting Child Grooming Behavior Patterns on Social Media, In Soclinfo 2014, The 6th International conference on Social Informatics, Barcelona, Spain.
  • Chang, F.-C., Chiu, C.-H., Miao, N.-F., Chen, P.-H., Lee, C.-M., & Chiang, J.-T. (2016). Predictors of Unwanted exposure to online pornography and online sexual solicitation of youth. Journal of Health Psychology, 21(6), 1107–1118. https://doi.org/10.1177/1359105314546775
  • Choi, J., Kruis, N., & Lee, J. (2022). Target congruence as ameans of understanding the risk of bullying victimization among multiculturalfamily youth in South Korea. Crime & Delinquency, 68(13-14), 2395–2421. https://doi.org/10.1177/00111287211022632
  • Cohen, L. E., & Felson, M. (1979). Social Change and Crime Rate Trends: A Routine Activity Approach. American Sociological Review, 44(4), 588–608. https://doi.org/10.2307/2094589
  • Dahiya, M. (2017). A tool of conversation: Chatbot. International Journal of Computer Sciences and Engineering, 5(5), 158–161.
  • De Santisteban, P., & Gámez-Guadix, M. (2018). Prevalence and risk factors among minors for online sexual solicitations and interactions with adults. Journal of Sex Research, 55(7), 939–950.
  • DeHart, D., Dwyer, G. Seto, Moran, R., Letourneau, E., & Schwarz-Watts, D. (2017). Internet sexual solicitation of children: a proposed typology of offendersbased on their chats, e-mails, and social network posts. Journal of sexual aggression, 23(1), 77-89. https://doi.org/10.1080/13552600.2016.1241309
  • Dönmez, Y. E., & Soylu, N. (2019). Online sexual solicitation in adolescents; socio-demographic risk factors and association with psychiatric disorders, especially posttraumatic stress disorder. Journal of Psychiatric Research, 117, 68–73. https://doi.org/10.1016/j.jpsychires.2019.07.002 31306899
  • Finkelhor, D., Mitchell, K. J., & Wolak, J. (2002). Online Victimization: A report on the Nation’s Youth.
  • Finkelhor, D., & Asdigian, N. L. (1996). Risk factors for youth victimization: Beyond a lifestyles/routine activities theory approach. Violence and Victims, 11(1), 3–19. https://doi.org/10.1891/0886-6708.11.1.3
  • Fisher, D., Maimon, D., & Berenblum, T. (2022). Examining the crime prevention claims of crime prevention through environmental design on system-trespassing behaviors: A randomized experiment. Security Journal, 35(2), 400–422.
  • Gámez-Guadix, M., & Mateos-Pérez, E. (2019). Longitudinal and reciprocal relationships between sexting, online sexual solicitations, and cyberbullying among minors. Computers in Human Behavior, 94, 70–76. https://doi.org/10.1016/j.chb.2019.01.004
  • Ghazi-Tehrani, A. K., & Pontell, H. N. (2021). Phishing evolves: Analyzing the enduring cybercrime. Victims & Offenders, 16(3), 316–342. https://doi.org/10.1080/15564886.2020.1829224
  • Helton, J. J., Gochez-Kerr, T., & Gruber, E. (2018). Sexual Abuse of Children With Learning Disabilities. Child Maltreatment, 23(2), 157–165. https://doi.org/10.1177/1077559517733814 29020793
  • Hernández, M. P., Schoeps, K., Maganto, C., & Montoya-Castilla, I. (2021). The risk of sexual-erotic online behavior in adolescents-Which personality factors predict sexting and grooming victimization? Computers in Human Behavior, 114(2021), 106569. https://doi.org/10.1016/j.chb.2020.106569
  • Holt, T. J., Bossler, A. M., Malinski, R., & May, D. C. (2016). Identifying predictors of unwanted online sexual conversations among youth using a low self-control and routine activity framework. Journal of Contemporary Criminal Justice, 32(2), 108–128. https://doi.org/10.1177/1043986215621376
  • Howell, C. J., Cochran, J. K., Powers, R. A., Maimon, D., & Jones, H. M. (2017). System trespasser behavior after exposure to warning messages at a chinese computer network: an examination. International Journal of Cyber Criminology, 11(1), 63–77.
  • Howell, C. J., Maimon, D., Perkins, R. C., Burruss, G. W., Ouellet, M., & Wu, Y. (2022). Risk avoidance behavior on darknet marketplaces. Crime & Delinquency. https://doi.org/10.1177/00111287221092713
  • Howell, C. J., & Burruss, G. W. (2020). Datasets for Analysis of Cybercrime 10. The Palgrave Handbook of International Cybercrime and Cyberdeviance, 207
  • IWF (2022). Three-fold increase of abuse imagery of 7-10 years olds as IWF detects more child sexual abuse material online than ever before. IWF, Jan 13. https://www.iwf.org.uk/news-media/news/three-fold-increase-of-abuse-imagery-of-7-10-year-olds-as-iwf-detects-more-child-sexual-abuse-material-online-than-everbefore/
  • Joleby, M., Lunde, C., Landström, S., & Jonsson, L. S. (2021). Offender strategies for engaging children in online sexual activity. Child Abuse & Neglect, 120, 105214. https://doi.org/10.1016/j.chiabu.2021.105214
  • Jonsson, L. S., Fredlund, C., Priebe, G., Wadsby, M., & Svedin, C. G. (2019). Online sexual abuse of adolescents by a perpetrator met online: A cross-sectional study. Child and Adolescent Psychiatry and Mental Health, 13(1), 32. https://doi.org/10.1186/s13034-019-0292-1
  • Kahle, L., & Peguero, A. A. (2017). Bodies and bullying: The interaction of gender, race, ethnicity, weight, and inequality with school victimization. Victims & Offenders, 12(2), 323–345. https://doi.org/10.1080/15564886.2015.1117551
  • Kamar, E., Howell, C. J., Maimon, D., & Berenblum, T. (2022). The moderating role of thoughtfully reflective decision-making on the relationship between information security messages and smishing victimization: An experiment. Justice Quarterly, 1-22 https://doi.org/10.1080/07418825.2022.2127845
  • Kamar, E., Maimon, D., Weisburd, D., & Shabar, D. (2023). Parental guardianship and Online Sexual Grooming of Teenagers: A Honeypot Experiment. Computers in Human Behavior, 137, 107386.
  • Khanna, A., Pandey, B., Vashishta, K., Kalia, K., Pradeepkumar, B., & Das, T. (2015). A study of today’s AI through chatbots and rediscovery of machine intelligence. International Journal of u- and e-Service, Science and Technology, 8(7), 277–284.
  • Kigerl, A. C. (2014). Evaluation of the CAN SPAM act: Testing deterrence and other influences of email spammer behavior over time. Washington State University.
  • Kloess, J. A., Hamilton-Giachritsis, C. E., & Beech, A. R. (2019). Offence process of online sexual grooming and abuse of children via Internet communication Platforms. Sexual Abuse : A Journal of Research and Treatment, 31(1), 73–96. https://doi.org/10.1177/1079063217720927
  • Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263–280. https://doi.org/10.1080/01639625.2015.1012409
  • Livingston, J. A., Hequembourg, A., Testa, M., & Vanzile-Tamsen, C. (2007). Unique aspects of adolescent sexual victimization experiences. Psychology of Women Quarterly, 31(4), 331–343. https://doi.org/10.1111/j.1471-6402.2007.00383.x
  • Llinares, F. M. (2013). La victimización por cibercriminalidad social. Un estudio a partir de la teoría de las actividades cotidianas en el ciberespacio. Revista Española de Investigación Criminológica, 11, 1–35.
  • Lykousas, N., & Patsakis, C. (2021). Large-scale analysis of grooming in modern social networks. Expert Systemswith Applications, 176, 114808 https://doi.org/10.1016/j.eswa.2021.114808
  • Maimon, D., Howell, C. J., Moloney, M., & Park, Y. S. (2020). An examination of email fraudsters’ modus operandi. Crime & Delinquency. https://doi.org/10.1177/0011128720968504
  • Maimon, D., Santos, M., & Park, Y. (2019). Online deception and situations conducive to the progression of non-payment fraud. Journal of Crime and Justice, 42(5), 516–535. https://doi.org/10.1080/0735648X.2019.1691857
  • Maimon, D., Alper, M., Sobesto, B., & Cukier, M. (2014). Restrictive deterrent effects of a warning banner in an attacked computer system. Criminology, 52(1), 33–59. https://doi.org/10.1111/1745-9125.12028
  • Marcum, C. D., Ricketts, M. L., & Higgins, G. E. (2010). Assessing Sex Experiences of Online Victimization: An Examination of Adolescent Online Behavior Using Routine Activity Theory. Criminal Justice Review, 35(4), 412–437. https://doi.org/10.1177/0734016809360331
  • Marcum, C. D. (2008). Identifying potential factors of adolescent online victimization for high school seniors. International Journal of Cyber Criminology, 2, 346–367.
  • Marret, M. J., & Choo, W. Y. (2017). Factors associated with online victimisation among Malaysian adolescents who use social networking sites: a cross-sectional study. BMJ Open, 7(6), e014959 10.1136/bmjopen-2016-014959 PMC: 28667209
  • McNeish, D. M., & Stapleton, L. M. (2016). The Effect of Small Sample Size on Two-Level Model Estimates: A Review and Illustration. Educational Psychology Review, 28(2), 295–314. https://doi.org/10.1007/s10648-014-9287-x
  • Mitchell, K. J., Jones, L., Finkelhor, D., & Wolak, J. (2014). Trends in unwanted sexual solicitations: Findings from the youth internet safety studies. Youth Internet Safety Survey Bulletin.
  • Mitchell, K. J., Jones, L. M., Finkelhor, D., & Wolak, J. (2013). Understanding the decline in unwanted online sexual solicitations for U.S. youth 2000-2010: findings from three Youth Internet Safety Surveys. Child Abuse & Neglect, 37(12), 1225–1236. https://doi.org/10.1016/j.chiabu.2013.07.002 23938019
  • Mitchell, K. J., Finkelhor, D., & Wolak, J. (2001). Risk factors for and impact of online sexual solicitation of youth. JAMA, 285(23), 3011–3014. https://doi.org/10.1001/jama.285.23.3011 11410100
  • Mitchell, K. J., Jones, L. M., Finkelhor, D., & Wolak, J. (2011). Internet-facilitated commercial sexual exploitation of children: Findings from a nationally representative sample of law enforcement agencies in the United States. Sexual Abuse : a Journal of Research and Treatment, 23(1), 43–71. https://doi.org/10.1177/1079063210374347
  • Mitchell, K. J., Finkelhor, D., & Wolak, J. (2007b). Youth Internet Users at Risk for the Most Serious Online Sexual Solicitations. American Journal of Preventive Medicine, 32(6), 532–537. https://doi.org/10.1016/j.amepre.2007.02.001
  • Mitchell, K. J., Wolak, J., & Finkelhor, D. (2008). Are blogs putting youth at risk for online sexual solicitation or harassment? Child Abuse & Neglect, 32(2), 277–294. https://doi.org/10.1016/j.chiabu.2007.04.015
  • Montiel, I., Carbonell, E., & Pereda, N. (2016). Multiple online victimization of Spanish adolescents: Results from a community sample. Child Abuse & Neglect, 52, 123–134. https://doi.org/10.1016/j.chiabu.2015.12.005 26724825
  • Namboodiri, K., & Suchindran, C. M. (1987). Life Table Techniques and Their Applications. Academic Press.
  • O’Connell, R. (2003). A Typology of Cyber Sexploitation and Online Grooming Practices. University of Central Lancashire.
  • Paquette, S., & Cortoni, F. (2021). Offence-Supportive Cognitions, Atypical Sexuality, Problematic Self-Regulation, and Perceived Anonymity Among Online and Contact Sexual Offenders Against Children. Archives of Sexual Behavior, 50(5), 2173–2187. https://doi.org/10.1007/s10508-020-01863-z 33821376
  • Paquette, S., & Cortoni, F. (2022). Offense-supportive cognitions expressed by men who use Internet to sexually exploit children: A thematic analysis. International Journal of Offender Therapy and Comparative Criminology, 66(6-7), 647–669. https://doi.org/10.1177/0306624X20905757
  • Peske, S. K. (2014). Adolescents’ Experiences of Online Sexual Solicitation. University of Alberta (Canada).
  • Pratt, T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47(3), 267–296. https://doi.org/10.1177/0022427810365903
  • Quayle, E., Allegro, S., Hutton, L., Sheath, M., & Lööf, L. (2014). Rapid skill acquisition and online sexual grooming of children. Computers in Human Behavior, 39(2014), 368–375. https://doi.org/10.1016/j.chb.2014.07.005
  • Quayle, E., Jonsson, L., & Lööf, L. (2012). Online behaviour related to child sexual abuse. Interviews with affected young people. ROBERT, Risktaking online behaviour, empowerment through research and training. European Union & Council of the Baltic Sea States.
  • Räsänen, P., Hawdon, J., Holkeri, E., Keipi, T., Näsi, M., & Oksanen, A. (2016). Targets of Online Hate: Examining Determinants of Victimization Among Young Finnish Facebook Users. Violence and Victims, 31(4), 708–726. https://doi.org/10.1891/0886-6708.VV-D-14-00079 27302929
  • Sklenarova, H., Schulz, A., Schuhmann, P., Osterheider, M., & Neutze, J. (2018). Online sexual solicitation by adults and peers- Results from a population based German sample. Child Abuse & Neglect, 76, 225–236. https://doi.org/10.1016/j.chiabu.2017.11.005 29149683
  • Spitzner, L. (2002). Hosus (honeypot surveillance system). Login: Magazine of Usenix and Sage, 27, 2002–2012.
  • Sutton, T. E., Simons, L. G., & Tyler, K. A. (2021). Hooking-Up and Sexual Victimization on Campus: Examining Moderators of Risk. Journal of Interpersonal Violence, 36(15-16), NP8146–NP8175. https://doi.org/10.1177/0886260519842178 30973050
  • Taylor, H. (2017). Online Sexual Grooming: The Role of Offender Motivation and Grooming Strategies. [Unpublished PhD Thesis] The University of Birmingham.
  • Testa, A., Maimon, D., Sobesto, B., & Cukier, M. (2017). Illegal roaming and file manipulation on target computers: Assessing the effect of sanction threats on system trespassers’ online behaviors. Criminology & Public Policy, 16(3), 689–726. https://doi.org/10.1111/1745-9133.12312
  • Villacampa, C., & Gómez, M. J. (2017). Online child sexual grooming. International Review of Victimology, 23(2), 105–121. 10.1177/0269758016682585
  • Wachs, S., Michelsen, A., Wright, M. F., Gamez-Guadix, M., Almendros, C., Kwon, Y., Sittichai, R., Singh, R., Biswal, R., Gorzig, A., & Yanagida, T. (2020). A routine activity approach to understandig cybergrooming victimization among adolescents from six countries. Cyber Psychology, Behavior, and Social Networking, 23(4), 218–224.
  • Wager, N., Armitage, R., Christmann, K., Gallagher, B., Ioannou, M., Parkinson, S., Reeves, C., Rogerson, M., & Synnott, J. (2018). Rapid Evidence Assessment: Quantifying the extent of online-facilitated child sexual abuse: Report for the Independent Inquiry into Child Sexual Abuse. University of Huddersfield.
  • Webster, S., Davidson, J., & Bifulco, A. (2014). Online offending behaviour and child victimisation: New findings and policy. Palgrave Macmillan.
  • Webster, S., Davidson, J., Bifulco, A., Gottschalk, P., Caretti, V., Pham, T., Grove-Hills, J., Turley, C., Tompkins, C., Ciulla, S., Milazzo, V., Schimmenti, A., & Craparo, G. (2012). European online grooming project – final report.
  • Williams, R., Elliott, I. A., & Beech, A. R. (2013). Identifying sexual grooming Themes used by Sex Offenders. Deviant Behavior, 34(2), 135–152. https://doi.org/10.1080/01639625.2012.707550
  • Wilson, T., Maimon, D., Sobesto, B., & Cukier, M. (2015). The effect of a surveillance banner in an attacked computer system: Additional evidence for the relevance of restrictive deterrence in cyberspace. Journal of Research in Crime and Delinquency, 52(6), 829–855. https://doi.org/10.1177/0022427815587761
  • Winters, G. M., Kaylor, L. E., & Jeglic, E. L. (2017). Sexual offenders contacting children online: an examination of transcripts of sexual grooming. Journal of Sexual Aggression, 23(1), 62–76. https://doi.org/10.1080/13552600.2016.1271146
  • Wooldredge, J., & Steiner, B. (2014). A bi-level framework for understanding prisoner victimization. Journal of Quantitative Criminology, 30(1), 141–162. https://doi.org/10.1007/s10940-013-9197-y