698
Views
5
CrossRef citations to date
0
Altmetric
Articles

Exploring the educative role of judges’ sentencing remarks: an analysis of remarks on child exploitation material

, , &

References

  • Aiken, M., Moran, M., & Berry, M.J. (2011, September). Child abuse material and the Internet: Cyberpsychology of online child related sex offending. In 29th meeting of the INTERPOL Specialist Group on Crimes against Children (pp. 5–7). Lyons, France.
  • Aslan, D., & Edelmann, R. (2014). Demographic and offence characteristics: A comparison of sex offenders convicted of possessing indecent images of children, committing contact sex offences or both offences. The Journal of Forensic Psychiatry & Psychology, 25(2), 121–134.
  • Attorney-General's Department. (2013). National plan to combat cybercrime. Barton: Commonwealth of Australia.
  • Australian Law Reform Commission. (2006). Same crime, same time report sentencing of federal offenders report 103. Sydney: Commonwealth of Australia.
  • Babchishin, K.M., Hanson, R.K., & VanZuylen, H. (2015). Online child pornography offenders are different: A meta-analysis of the characteristics of online and offline sex offenders against children. Archives of Sexual Behavior, 44(1), 45–66.
  • Bartels, R.M., & Merdian, H.L. (2016). The implicit theories of child sexual exploitation material users: An initial conceptualization. Aggression and Violent Behavior, 26, 16–25.
  • Beech, A.R., Elliott, I.A., Birgden, A., & Findlater, D. (2008). The internet and child sexual offending: A criminological review. Aggression and Violent Behavior, 13(3), 216–228.
  • Brantingham, P., Brantingham, P., & Taylor, W. (2005). Situational crime prevention as a key component in embedded crime prevention. Canadian Journal of Criminology and Criminal Justice, 47(2), 271–292.
  • Brantingham, P.J., & Faust, F.L. (1976). A conceptual model of crime prevention. Crime & Delinquency, 22(3), 284–296.
  • Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101.
  • Brennan, M., & Hammond, S. (2017). A methodology for profiling paraphilic interest in Child Sexual Exploitation Material users on peer-to-peer networks. Journal of Sexual Aggression, 23(1), 90–103.
  • Cassell, P.G., Marsh, J.R., & Christiansen, J.M. (2016). Not just ‘kiddie porn’: The significant harms from child pornography possession. In C.B. Hessick (Ed.), Refining child pornography law: Crime, language, and social consequences. Ann Arbor: University of Michigan Press.
  • Child Exploiation and Online Protection Centre. (2013). Annual review 2012-2013 & Centre Plan 2013-2014. London: National Crime Agency.
  • Conde, A. (2011). Combating ‘child abuse images’ through committed, transversal and internationally co-ordinated action. Council of Europe.
  • Daly, K., & Bouhours, B. (2008). Judicial censure and moral communication to youth sex offenders. Justice Quarterly, 25(3), 496–522.
  • Danay, R.J. (2005). The danger of fighting monsters: Addressing the hidden harms of child pornography law. Review of Constitutional Studies, 11, 151–191.
  • Denis, D., & Whitehead, H. (2012). Stop it Now! UK & Ireland helpline and campaign report 2002-2012: 10 year anniversary edition. Birmingham: Lucy Faithful Foundation.
  • Department of Family and Community Services. (2000). Tomorrow's children: Australia's national plan of action. Canberra: Commonwealth of Australia.
  • Department of Social Services. (2009). Protecting children is everyone's business: National framework for protecting Australia's children 2009-2020. Canberra: Commonwealth of Australia.
  • Dillof, A.M. (2016). Possession, child pornography and proportionality: Criminal liability for aggregate harm offenses. Wayne State University Law School Legal Studies Research Paper Series, 2016(16), 1–44. Retrieved from https://ssrn.com/abstract=2811655
  • DPP v Pearce (2015). VCC 1486 (3 September 2015).
  • Elliott, I.A., Beech, A.R., & Mandeville-Norden, R. (2013). The psychological profiles of internet, contact, and mixed internet/contact sex offenders. Sexual Abuse, 25(1), 3–20.
  • Elliott, I.A., Beech, A.R., Mandeville-Norden, R., & Hayes, E. (2009). Psychological profiles of internet sexual offenders: Comparisons with contact sexual offenders. Sexual Abuse, 21(1), 76–92.
  • Freiberg, A. (2014). Fox & Freiberg's sentencing: State and federal law in victoria. Pyrmont, NSW: Thomson Reuters.
  • Gillespie, A. (2011). Child pornography law and policy. London: Routledge.
  • Gillespie, A. (2016). Cybercrime: Key Issues and Debates. Abingdon, Oxon: Routledge.
  • Harduf, A. (2016). Criminalization downloads evil: Reexamining the approach to electronic possession when child pornography goes international. Boston University Internation Law Journal, 34, 279–318.
  • Harwood, T.G., & Garry, T. (2003). An overview of content analysis. The Marketing Review, 3(4), 479–498.
  • Henshaw, M., Ogloff, J.R., & Clough, J.A. (2015). Looking beyond the screen: A critical review of the literature on the online child pornography offender. Sexual Abuse, 29(5), 416–445.
  • Howitt, D., & Sheldon, K. (2007). The role of cognitive distortions in paedophilic offending: Internet and contact offenders compared. Psychology, Crime & Law, 13(5), 469–486.
  • Internet Watch Foundation. (2016). Annual report. Cambridge, UK: Internet Watch Foundation.
  • Jung, S., Ennis, L., Stein, S., Choy, A.L., & Hook, T. (2013). Child pornography possessors: Comparisons and contrasts with contact-and non-contact sex offenders. Journal of Sexual Aggression, 19(3), 295–310.
  • Kettleborough, D.G., & Merdian, H.L. (2017). Gateway to offending behaviour: Permission-giving thoughts of online users of child sexual exploitation material. Journal of Sexual Aggression, 23(1), 19–32.
  • Krippendorff, K. (2012). Content analysis: An introduction to its methodology. Thousand Oakes, California: Sage.
  • Laycock, G. (2013). Crime Prevention (Situational and Social). In T. Newburn & P. Neyroud (Eds.), Dictionary of policing. Abingdon, Oxon: Routledge.
  • Liddell, M., & Taylor, C. (2015). Women's experiences of learning about the involvement of a partner possessing child abuse material in Australia. Melbourne: PartnerSPEAK.
  • Maalla M'jid, N. (2013). Report of the special rapporteur on the sale of children, child prostitution and child pornography. United Nations.
  • Mackenzie, G. (2005). How judges sentence. Sydney: Federation Press.
  • Mackenzie, G., Stobbs, N., & O'Leary, J. (2010). Principles of sentencing. Annandale: Federation Press.
  • MacMartin, C., & Wood, L.A. (2005). Sexual motives and sentencing: Judicial discourse in cases of child sexual abuse. Journal of Language and Social Psychology, 24(2), 139–159.
  • Maruna, S., & Mann, R.E. (2006). A fundamental attribution error? Rethinking cognitive distortions. Legal and Criminological Psychology, 11(2), 155–177.
  • Maxfield, M.G., & Babbie, E.R. (2015). Research methods for criminal justice and criminology. Stamford: Cengage Learning.
  • Merdian, H.L., Curtis, C., Thakker, J., Wilson, N., & Boer, D.P. (2014). The endorsement of cognitive distortions: Comparing child pornography offenders and contact sex offenders. Psychology, Crime & Law, 20(10), 971–993.
  • Merdian, H.L., Wilson, N., Thakker, J., Curtis, C., & Boer, D.P. (2013). ‘So why did you do it?’: Explanations provided by child pornography offenders. Sexual Offender Treatment, 8(1), 1–19.
  • Minehan v R (2010). NSWCCA 140.
  • Mirkin, H. (2009). The social, political, and legal construction of the concept of child pornography. Journal of Homosexuality, 56(2), 233–267.
  • O'Donnell, I., & Milner, C. (2007). Child pornography: Crime, computers and society. Cullompton, UK: Willan Publishing.
  • Ost, S. (2002). Children at risk: Legal and societal perceptions of the potential threat that the possession of child pornography poses to society. Journal of Law and Society, 29(3), 436–460.
  • Ost, S. (2009). Child pornography and sexual grooming: Legal and societal responses. Cambridge, UK: Cambridge University Press.
  • Ost, S. (2010). Criminalising fabricated images of child pornography: A matter of harm or morality? Legal Studies, 30(2), 230–256.
  • Peršak, N. (2016). Legitimacy and trust in criminal law, policy and justice: Norms, procedures, outcomes. Abingdon, Oxon: Routledge.
  • Pierrete, M., Gotsis, T., & Poletti, P. (2010). Sentencing offenders convicted of child pornography and child abuse material offences. Judicial Commission of New South Wales.
  • Prichard, J., & Spiranovic, C. (2014). Child exploitation material in the context of institutional child sexual abuse. Sydney: Royal Commission into Institutional Responses to Child Sexual Abuse.
  • Prichard, J., Spiranovic, C., Gelb, K., Watters, P.A., & Krone, T. (2016). Tertiary education students' attitudes to the harmfulness of viewing and distributing child pornography. Psychiatry, Psychology and Law, 23(2), 224–239.
  • Prichard, J., Watters, P.A., & Spiranovic, C. (2011). Internet subcultures and pathways to the use of child pornography. Computer Law & Security Review, 27(6), 585–600.
  • Public Safety Canada. (2015). Public safety Canada 2013-2014 evaluation of the national strategy for the protection of children from sexual exploitation on the internet. Canada: Government of Canada.
  • Quayle, E., & Taylor, M. (2002). Paedophiles, pornography and the internet: Assessment issues. British Journal of Social Work, 32(7), 863–875.
  • Ray, J.V., Kimonis, E.R., & Seto, M.C. (2014). Correlates and moderators of child pornography consumption in a community sample. Sexual Abuse, 26(6), 523–545.
  • Rogers, A. (2016). The dignitary harm of child pornography – from producers to possessors. In C.B. Hessick (Ed.), Refining child pornography law: Crime, language, and social consequences. Ann Arbor: University of Michigan Press.
  • R v Ryan (2012). SASCFC 136 (20 December 2012).
  • Seigfried, K.C., Lovely, R.W., & Rogers, M.K. (2008). Self-reported online child pornography behavior: A psychological analysis. International Journal of Cyber Criminology, 2(1), 286–297.
  • Seigfried-Spellar, K. (2013). Individual differences of internet child pornography users: Peculiar findings in a community-based study. International Journal of Cyber Criminology, 7(2), 141–154.
  • Sentencing Act 1997 (Tas).
  • Steel, C.M. (2015). Web-based child pornography: The global impact of deterrence efforts and its consumption on mobile platforms. Child Abuse & Neglect, 44, 150–158.
  • Sullivan, B. (1997). The politics of sex: Prostitution and pornography in Australia since 1945. Cambridge, UK: Cambridge University Press.
  • Sunstein, C.R. (1996). Social norms and social roles. Columbia Law Review, 96(4), 903–968.
  • Thomas, D.R. (2006). A general inductive approach for analyzing qualitative evaluation data. American Journal of Evaluation, 27(2), 237–246.
  • United States Department of Justice. (2016). The national strategy for child exploitation prevention and interdiction: A report to congress. Washington: United States Government.
  • Walter, M. (2013). Social research methods. South Melbourne, Victoria: Oxford University Press.
  • Warner, K. (2005). Sexual offending: Victim, gender and sentencing dilemmas. In D. Chappell & P. Wilson (Eds.), Issues in Australian crime and criminal justice. Chatswood, NSW: LexisNexis Butterworths.
  • Warner, K. (2010). Sentencing for child pornography. Australian Law Journal, 84(6), 384–395.
  • Winder, B., Gough, B., & Seymour-Smith, S. (2015). Stumbling into sexual crime: The passive perpetrator in accounts by male internet sex offenders. Archives of Sexual Behavior, 44(1), 167–180.
  • Wolak, J., Finkelhor, D., Mitchell, K.J., & Ybarra, M.L. (2008). Online ‘predators’ and their victims: Myths, realities, and implications for prevention and treatment. American Psychologist, 63(2), 111–128.
  • Wortley, R., & Smallbone, S. (2012). Internet child pornography: Causes, investigation, and prevention. Santa Barbara, California: Praeger.
  • Young v Western Australia (2011). WASCA 13.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.