981
Views
3
CrossRef citations to date
0
Altmetric
MAIN SECTION

Child pornography, the Internet and juvenile suspects

, &

REFERENCES

  • Babchishin, K. M., Hanson, R. K., & Hermann, C. A. (2011). The characteristics of online sex offenders: A meta-analysis. Sexual Abuse: A Journal of Research and Treatment, 23, 92–123.
  • Bourke, M. L., & Hernandez, A. E. (2009). The ‘butner study’ redux: A report of the incidence of hands-on child victimization by child pornography offenders. Journal of Family Violence, 24, 183–191.
  • Briggs, P., Simon, W. T., & Simonson, S. (2011). An exploratory study of internet-initiated sexual offences and the chat room sex offender: Has the internet enabled a new typology of sex offender?Sexual Abuse: A Journal of Research and Treatment, 23, 72–91.
  • Davidson, J., et al. (2011). Online Abuse: Literature Review and Policy Context. Retrieved June 1, 2012, from http://www.europeanonlinegroomingproject.com/wp-content/file-uploads/EOGP-Literature-Review.pdf.
  • Elliott, I. A., & Beech, A. R. (2009). Understanding online child pornography use: Applying sexual offense theory to internet offenders. Aggression and Violent Behavior, 14, 180–193.
  • Finkelhor, D. (1984). Child Sexual Abuse: New Treatment and Research. New York, NY: Free Press.
  • Graaf, H. de, & Vanwesenbeeck, I. (2006). Seks is Een Game: Gewenst En Ongewenst Seksueel Gedrag Van Jongeren Op Internet [Sex is a game: Desired and Undesired Sexual Behavior of Youngters on the Internet]. Utrecht: Rutgers Nisso Groep.
  • Kerstens, J. W. M., & de Graaf, H. (2012). Jongeren en online seksuele activiteiten. [Juveniles and online sexual activities]. Jeugd En Cybersafety: Online Slachtoffer- En Daderschap Onder Nederlandse Jongeren. Den Haag: Boom Lemma.
  • KNAW (Koninklijke Nederlandse Akademie van Wetenschappen). (2003). Gedragscode voor gebruik van persoonsgegevens in wetenschappelijk onderzoek. Advies Van De Sociaal-Wetenschappelijke Raad [Code of Conduct for Social Scientific Research]. Amsterdam: KNAW.
  • Leary, M. G. (2007). Self-produced child pornography: The appropriate societal response to juvenile self-sexual exploitation. Virginia Journal of Social Policy and the Law, 15(1), 1–50.
  • Leary, M. G. (2010). Sexting or self-produced child pornography? The dialog continues – structured prosecutorial discretion within a multidisciplinary response. Virginia Journal of Social Policy and the Law, 487, 566.
  • Lenhart, A. (2009). Teens and Sexting: How and Why Minor Teens Are Sending Sexually Suggestive Nude or Nearly Nude Images Via Text Messaging. Washington, DC: Pew Internet and American Life Project.
  • Lenhart, A., et al. (2010). Social Media and Mobile Internet Use Among Teens and Young Adults. Washington, DC: Pew Internet and American Life Project.
  • Leukfeldt, E. R., Domenie, M. M. L., & Stol, W. Ph. (2010). Verkenning Cybercrime in Nederland 2009 [An Exploration into Cybercrime in the Netherlands 2009]. Den Haag: BJU.
  • Lünnemann, K., et al. (2006). Kinderen Beschermd Tegen Seksueel Misbruik: Evaluatie Van De Partiële Wijziging in De Zedelijkheidswetgeving [Children Protected Against Sexual Haressment: An Evaluation of the Partial Change in Morality Law]. Den Haag/Utrecht: WODC/Verwey Jonker Instituut.
  • McCusker, R. (2006). Transnational organised cyber crime: Distinguishing threat from reality. Crime Law and Social Change, 46, 257–273.
  • McLaughlin, J. F. (2000). Cyber Child Sex Offender Typology. Retrieved April 19, 2008, from www.ci.keene.nh.us/police/Typology.html.
  • Pijpers, R. (2006). Mijn Kind Online Special: Verliefd Op Internet [My Child Online Special: In Love on the Internet]. Retrieved November 17, 2010, from http://mijnkindonline.nl/uploads/MKO_Special_VerliefdopInternet_def.pdf.
  • Prins, L. (2008). Landelijke Criminaliteitskaart: Populatieprofielen 2007 [National Crime Map: Population Profiles 2007]. Zoetermeer/Driebergen: KLPD.
  • Quayle, E., & Taylor, M. (2003). Model of problematic internet use in people with a sexual interest in children. Cyber Psychology and Behavior, 6, 93–106.
  • Sabedra, M. (2010). Teens, Technology, and Sex: Finding the Appropriate Balance and Symmetry when Seeking to Punish the Modern Child Predator. Retrieved November 17, 2010, from http://www.law.msu.edu/king/2009-2010/Sabedra.pdf.
  • Sacco, D., et al. (2010). Sexting: Youth Practices and Legal Implications. Cambridge, MA: Cyberlaw Clinic, Harvard Law School.
  • Seto, M. C., Hansen, R. K., & Babchishin, K. M. (2011). Contaxt sexual offending by men with online sexual offences. Sexual Abuse: A Journal of Research and Treatment, 23, 124–145.
  • Seto, M. C., Reeves, L., & Jung, S. (2010). Explanations given by child pornography offenders for their crimes. Journal of Sexual Aggression, 16, 169–180. 10.1080/13552600903572396.
  • Stol, W. Ph., et al. (2008). Internetcriminaliteit: kinderpornografie in meervoudig perspectief [Cybercrime: Child pornography in multiple perspective]. Ars Aequi, 57, 531–540.
  • Stol, W. Ph., et al. (2009). Governmental filtering of websites: The Dutch case. Computer Law and Security Review, 251, 262.
  • Van der Hoorn, R. S. (2011). Verspreiding Van Kinderporno: Kinderspel? [Distribution of Child Pornography: Child's Play?]. Leeuwarden: NHL University of Applied Sciences. (Thesis).
  • Van der Hulst, R. C., & Neve, R. J. M. (2008). High-tech Crime: Inventarisatie Van Literatuur Over Soorten Criminaliteit En Hun Daders [High-tech Crime: A Literature Review on Types of Crime and Their Offenders]. Den Haag: WODC.
  • Van Rooij, A. J., et al. (2009). Monitor Internet En Jongeren 2006–2009: Wat Doen Jongeren Op Internet En Hoe Verslavend is Dit? [Monitor Internet and Youth. Activities of Adolescents on the Internet: How Addictive Are They?] (Factsheet) (pp. 1–7). Rotterdam: IVO. Retrieved from http://bit.ly/aKCpiH.
  • Webster, S., et al. (2012). European Online Grooming Project: Final Report. Retrieved July 2, 2012, from http://www.europeanonlinegroomingproject.com/wp-content/file-uploads/European-Online-Grooming-Project-Final-Report.pdf.
  • Wijk, A. van, Nieuwenhuis, A., & Smeltink, A. (2009). Achter De Schermen: Een Verkennend Onderzoek Naar Downloaders Van Kinderporno [Behind the Scenes: An Exploratory Investigation into the Downloaders of Child Pornography]. Arnhem: Bureau Beke.
  • Wolak, J., et al. (2008). Online “predators” and their victims: Myths, realities, and implications for prevention and treatment. American Psychologist, 63, 111–128.
  • Wolak, J., Finkelhor, D., & Mitchell, K. (2011). Child pornography possessors: Trends in offender and case characteristics. Child Abuse: A Journal of Research and Treatment, 23, 22–42.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.