References
- Akdeniz, Y., 2001. Governing pornography and child pornography on the Internet: the UK approach. Available from: http://www.cyber-rights.org/yamancv.htm [Accessed 14 October 2012].
- Alexy, E.M. et al., 2005. Perceptions of cyberstalking among college students. Brief treatment and crisis intervention, 5 (3), 279–289. 10.1093/brief-treatment/mhi020
- Anchayil, A. and Mattamana, A., 2010. Intermediary liability and child pornography: a comparative analysis. Journal of international commercial law and technology, 5 (1), 48–57.
- Association of Sites Advocating Child Protection (ASACP), 2010. The ASACP Hotline Report: online child pornography – data & analysis. Available from: http://www.asacp.org/whitepaper/ASACP-whitepaper-9-10-2010.pdf [Accessed 14 October 2012].
- Association of Sites Advocating Child Protection (ASACP), 2012. About ASACP. Available from: http://www.asacp.org/index.php?content =aboutus [Accessed 14 October 2012].
- BBC News, 2008. Sex offenders face website bans. 4 Apr. Available from: http://news.bbc.co.uk/1/hi/uk/7328170.stm [Accessed 14 October 2012].
- BBC News, 2012. Habbo investor pulls out after ‘explicit’ sex allegations. 12 Jun. Available from: http://www.bbc.co.uk/news/technology-18415763 [Accessed 13 January 2013].
- Beatbullying, 2009. Truth of sexting amongst UK teens. 4 Aug. Available from: http://www.beatbullying.org/dox/media-centre/press-releases/press-release-040809.html [Accessed 13 October 2012].
- Brewster, M., 2003. Power and control dynamics in prestalking and stalking situations. Journal of family violence, 18 (4), 207–217. 10.1023/A:1024064214054
- Bryce, J., 2009. Online sexual exploitation of children and young people. In: Y. Jewkes and M. Yar, eds. Handbook of Internet crime. Cullompton: Willan, 320–342.
- Burchell, G., 1996. Liberal government and techniques of the self. In: A. Barry, T. Osborne, and N. Rose, eds. Foucault and political reason: liberalism, neo-liberalism and rationalities of government. London: UCL Press, 19–36.
- Child Exploitation and Online Protection Centre (CEOP), 2010. Strategic overview 2009-10. Available from: http://www.ceop.police.uk/Documents/Strategic_Overview_2009-10_%28Unclassified%29.pdf [Accessed 13 January 2013].
- Child Exploitation and Online Protection Centre (CEOP), 2011. Hundreds of suspects tracked in international child abuse investigation. 16 Mar. Available from: http://www.ceop.police.uk/Media-Centre/Press-releases/2011/HUNDREDS-OF-SUSPECTS-TRACKED-IN-INTERNATIONAL-CHILD-ABUSE-INVESTIGATION/ [Accessed 14 October 2012].
- Christie, N., 1986. The ideal victim. In: E. Fattah, ed. From crime policy to victim policy: reorienting the justice system. Basingstoke: Macmillan, 17–30.
- Clark-Flory, T., 2012. New laws banning sex offenders from social networks and online gaming may go too far. AlterNet, 6 Apr. Available from: http://www.alternet.org/story/154912/new_laws_banning_sex_offenders_from_social_networks_and_online_gaming_may_go_too_far/ [Accessed 14 October 2012].
- Crown Prosecution Service (CPS), 2012. Disclosure Ref: 02/2012: statistics regarding prosecutions under Section 63 of the Criminal Justice and Immigration Act 2008. Available from: http://www.cps.gov.uk/publications/docs/foi_disclosures/2012/disclosure_2.pdf [Accessed 13 January 2013].
- Crawford, A., 2003. The pattern of policing in the UK: policing beyond the Police. In: T. Newburn, ed. The handbook of policing. Cullompton: Willan, 147–181.
- D'Ovidio, R. and Doyle, J., 2003. A study on cyberstalking. FBI law enforcement bulletin, 72 (3), 10–17.
- Fritz, J., 1995. A proposal for mental health provisions in state anti-stalking law. Journal of Psychiatry and Law, 23, 295–318.
- Garland, D., 1996. The limits of the sovereign state: strategies of crime control in contemporary society. British journal of criminology, 36 (4), 445–471. 10.1093/oxfordjournals.bjc.a014105
- Garland, D., 2001. The culture of control: crime and social order in contemporary society. Oxford: Oxford University Press.
- Greer, C., 2003. Sex crime and the media: sex offending and the press in a divided society. Cullompton: Willan.
- Hall, A.C. and Bishop, M.J., 2008. Pop-porn: pornography in American culture. Westport, CT: Praeger.
- Harper, S. and Yar, M., 2011. Loving violence? The ambiguities of BDSM imagery in contemporary popular culture. In: A. Karatzogianni, ed. Violence and war in culture and the media. London: Routledge, 92–110.
- Hinds, L. and Grabosky, P., 2010. Responsibilisation revisited: from concept to attribution in crime control. Security journal, 23 (2), 95–113. 10.1057/palgrave.sj.8350089
- Hinduja, S. and Patchin, J.W. 2010. Sexting: a brief guide for educators and parents. Available from: http://www.cyberbullying.us/Sexting_Fact_Sheet.pdf [Accessed 13 October 2012].
- Hollander, J., 2001. Vulnerability and dangerousness: the construction of gender through conversation about violence. Gender & society, 15 (1), 83–109. 10.1177/089124301015001005
- Home Office, 2012. National Crime Agency. Available from: http://www.homeoffice.gov.uk/crime/nca/ [Accessed 13 January 2013].
- Horn, D., 2012. Sycamore settles bullying case over sexting, suicide. Cincinnati.com, 9 Oct. Available from: http://news.cincinnati.com/article/20121008/NEWS0107/310080070/Sycamore-settles-bullying-case-over-sexting-suicide [Accessed 13 January 2013].
- INHOPE, 2011. INHOPE member hotlines. Available from: http://www.inhope.org/gns/our-members.aspx [Accessed 14 October 2012].
- Internet Watch Foundation (IWF), 2004. Significant Trends 2003. Available from: http://www.iwf.org.uk/media/page.70.216.htm [Accessed 14 October 2012].
- Internet Watch Foundation (IWF), 2011. Trends 2010. Available from: http://www.iwf.org.uk/resources/trends [Accessed 14 October 2012].
- Jenkins, P., 2009. Failure to launch: why do some social issues fail to detonate moral panics?. British Journal of Criminology, 49 (1), 35–47. 10.1093/bjc/azn016
- Jewkes, Y., 2010. Public policing and Internet crime. In: Y. Jewkes, and M. Yar, eds. Handbook of Internet crime. Cullompton: Willan, 245–265.
- Jewkes, Y. and Andrews, C., 2007. Internet child pornography: international responses. In: Y. Jewkes, ed. Crime online. Collumpton: Willan, 60–80.
- Jones, S. 2009. MySpace removes 90,000 sex offenders. Guardian, 4 Feb. Available from: http://www.guardian.co.uk/technology/2009/feb/04/myspace-social-networking-sex-offenders [Accessed 13 October 2012].
- Jones, T., 2012. Governing security: pluralization, privatization, and polarization in crime control and policing. In: M. Maguire, R. Morgan, and R. Reiner (Eds.). The Oxford handbook of criminology. 5th ed. Oxford: Oxford University Press, 743–768.
- Kabay, M., 1998. Anonymity and pseudonymity in cyberspace: deindivduation, incivility and lawlessness versus freedom and privacy. In: Paper presented at the Annual conference of the European Institute for computer anti-virus research, 8–16 March 1998, Munich, Germany,.
- Kotecha, S., 2009. Call for US Clampdown on sexting. BBC News, 4 Aug. Available from: http://www.bbc.co.uk/newsbeat/10000700 [Accessed 13 October 2012].
- Lenhart, A., 2009. Teens and sexting. Washington, DC: Pew Research Centre.
- Loader, I. and Walker, N., 2004. State of Denial?: Rethinking the Governance of Security ecurity. Punishment & society, 6 (2), 221–228. 10.1177/1462474504041267
- Madriz, E., 1997. Images of criminals and victims: a study on women's fear and social control. Gender & society, 11 (3), 342–356. 10.1177/089124397011003005
- Magid, L., 2009. Facebook and MySpace delete N.Y. sex offenders. CNet, 1 Aug. Available from: http://news.cnet.com/8301-19518_3-10406914-238.html [Accessed 13 October 2012].
- Martinez, M., 2012. New La. law: sex offenders must list status on Facebook, other social media. 21 Jun. Available from: http://edition.cnn.com/2012/06/20/tech/louisiana-sex-offenders-social-media/index.html [Accessed 14 October 2012].
- McGuire, B. and Wraith, A., 2000. Legal and psychological aspects of stalking: a review. The journal of forensic psychiatry, 11 (2), 316–327. 10.1080/09585180050142543
- Miller, C.D., 2010. Sex offenders using social networking sites to hunt? Not if Calif. Has anything to say about it. CBS News, 2 Mar. Available from: http://www.cbsnews.com/8301-504083_162-6258740-504083.html [Accessed 14 October 2012].
- Mullen, P.E., Pathé, M. and Purcell, R., 2001. Stalking: new constructions of human behaviour. Australian and New Zealand journal of psychiatry, 35 (1), 9–16. 10.1046/j.1440-1614.2001.00849.x
- National Conference of State Legislatures (NCSL), 2011. 2010 legislation related to "Sexting". 4 Jan. Available form: http://www.ncsl.org/default.aspx?tabid=19696 [Accessed 14 October 2012].
- Net Nanny, 2012. Alerts and reporting. Available from: http://www.netnanny.com/features/alerts-and-reporting [Accessed 14 October 2012].
- Newman, G. and Clarke, R., 2003. Superhighway robbery: preventing e-commerce crime. Cullompton: Willan.
- O'Connell, R., 2003. A typology of cybbersexploitation and on-line grooming practices. Preston: Cyberspace Research Unit.
- Ogilvie, E., 2000. Cyberstalking, trends and issues in criminal justice, No. 166. Canberra: Australia Institute of Criminology.
- Passonen, S., Nikunen, K. and Saarenmaa, L., 2007. Pornification: sex and sexuality in media culture. Oxford: Berg.
- Shearing, C.D., 1992. The relation between public and private policing. Crime and justice, 15, 399–434. 10.1086/449198
- Smart, C., 1999. A history of ambivalence and conflict in the discursive construction of the ‘Child Victim’ of sexual abuse. Social & legal studies, 8 (3), 391–409. 10.1177/096466399900800306
- Taylor, P., 1999. Hackers: crime in the digital sublime. London: Routledge.
- Taylor, M., Holland, G. and Quayle, E., 2001. Typology of paedophile picture collections. Police Journal, 74 (2), 97–107.
- The Guardian, 2006. The legacy of Jane Longhurst. The Guardian, 1 Sep. Available from: http://www.guardian.co.uk/uk/2006/sep/01/ukcrime.gender [Accessed 13 January 2013].
- The Telegraph, 2009. Man cleared of porn charge after ‘tiger sex’ image found to be joke'. 31 Dec. Available from: http://www.telegraph.co.uk/news/uknews/6918001/Man-cleared-of-porn-charge-after-tiger-sex-image-found-to-be-joke.html [Accessed 13 January 2013].
- Waddington, P.A.J., 1986. Mugging as a moral panic: a question of proportion. The British journal of sociology, 37 (2), 245–259. 10.2307/590356
- Wall, D.S., 2007. Cybercrime: the transformation of crime in the information age. Cambridge: Polity.
- Wall, D.S. and Yar, M., 2010. Intellectual property crime and the Internet: cyber-piracy and ‘stealing’ informational intangibles. In: Y. Jewkes, and M. Yar, eds. Handbook of Internet crime. Cullompton: Willan, 255–272.
- Warman, M., 2010. Facebook adds child protection application. The Telegraph, 12 Jul. Available from: http://www.telegraph.co.uk/technology/facebook/7882277/Facebook-adds-child-protection-application.html [Accessed 13 October 2012].
- Williams, N., 1999. The contribution of hotlines to combating child pornography on the Internet. London: Childnet International.
- Williams, M. and Hudson, K. 2012. Public perceptions of internet, familial and localised sexual grooming: predicting perceived prevalence and safety. Journal of sexual aggression: an international, interdisciplinary forum for research, theory and practice. online first. 10.1080/13552600.2012.705341
- Wykes, M., 2007. Constructing crime: stalking, celebrity, ‘Cyber’ and media. In: Y. Jewkes, ed. Crime online. Collumpton: Willan, 128–143.
- Yar, M., 2006. Cybercrime and society. London: Sage.
- Yar, M., 2008a. The computer crime control industry: the emerging market in information security. In: K. Franko-Aas, H.O. Gundhus, and H.M. Lomell, eds. Technologies of insecurity: surveillance and securitization of everyday life. London: Routledge, 189–204.
- Yar, M., 2008b. The rhetorics and myths of anti-piracy campaigns: criminalization, moral pedagogy and capitalist property relations in the classroom. New media & society, 10 (4), 605–623. 10.1177/1461444807087911
- Yar, M., 2009. Cyber-sex offences: patterns, prevention and protection. In: K. Harrison, ed. Managing high-risk sex offenders in the community: risk management, treatment and social responsibilities. Cullompton: Willan, 229–248.
- Yar, M., 2011. "And Every Cruelty Will Cloud It": on love, damaged selfhood and criminal harm. In: S. Thompson, and M. Yar, eds. The politics of misrecognition. London: Ashgate, 125–144.
- Zedner, L., 2007. Pre-crime and post-criminology?. Theoretical criminology, 11 (2), 261–281. 10.1177/1362480607075851