380
Views
2
CrossRef citations to date
0
Altmetric
Articles

The effect of child sexual exploitation images collection size on offender sentencing

ORCID Icon, ORCID Icon &
Pages 330-348 | Received 10 Sep 2018, Accepted 15 Dec 2018, Published online: 06 Jan 2019

References

  • Amirault, J., and E. Beauregard. 2014. “The Impact of Aggravating and Mitigating Factors on the Sentence Severity of Sex Offenders: An Exploration and Comparison of Differences between Offending Groups.” Criminal Justice Policy Review 25: 78–104. doi:10.1177/0887403412462234.
  • Babchishin, K. M., R. K. Hanson, and H. VanZuylen. 2015. “Online CSEM Offenders are Different: A Meta-analysis of the Characteristics of Online and Offline Sex Offenders Against Children.” Archives of Sexual Behavior 44: 45–66. doi:10.1007/s10508-014-0270-x.
  • Canadian Centre for Child Protection. 2016. Child Sexual Abuse Images on the Internet: A Cybertip.ca analysis. https://www.cybertip.ca/pdfs/CTIP_CSAResearchReport_2016_en.pdf.
  • CEOP (Child Exploitation and Online Protection Centre). 2012. A Picture of Abuse: A Thematic Assessment of the Risk of Contact Child Sexual Posed by those who Possess Indecent Images of Children. https://static.lgfl.net/LgflNet/downloads/online-safety/LGfL-OS-Research-Archive-2012-CEOP-Picture-of-Abuse.pdf.
  • Changyong, F. E. N. G., W. A. N. G. Hongyue, L. U. Naiji, C. H. E. N. Tian, H. E. Hua, and L. U. Ying. 2014. “Log-transformation and its Implications for Data Analysis.” Shanghai Archives of Psychiatry 26 (2): 105.
  • Cited Decisions
  • Collins, M. R. 2007. “CSEM: A Closer Look.” The Police Chief 74: 40–47.
  • Crawford, C. 2000. “Gender, Race, and Habitual Offender Sentencing in Florida.” Criminolgy 38: 263–280. doi:10.1111/j.1745-9125.2000.tb00890.x.
  • Criminal Code, R.S.C. 1985. c.46, s.231(6).
  • Curry, T. R., G. Lee, and S. F. Rodriguez. 2004. “Does Victim Gender Increase Sentence Severity? Further Explorations of Gender Dynamics and Sentencing Outcomes.” Crime & Delinquency 50: 319–343. doi:10.1177/0011128703256265.
  • Eke, A. W., L. M. Helmus, and M. C. Seto. 2018. “A Validation Study of the CSEM Offender Risk Tool (CPORT).” Sexual Abuse 1–21. doi:10.1177/1079063218762434.
  • Fortin, F., and S. Paquette. 2018. “Online Sexual Exploitation of Children.” In Sexual Offending: A Criminological Perspective, edited by P. Lussier and E. Beauregard, 237–256. London: Routledge/Taylor & Francis.
  • Garfinkel, S., P. Farrell, V. Roussev, and G. Dinolt. 2009. “Bringing Science to Digital Forensics with Standardized Forensic Corpora.” Digital Investigation 6: S2–S11. doi:10.1016/j.diin.2009.06.016.
  • Gillespie, A. A. 2003. “Sentences for Offenses Involving CSEM.” Criminal Law Review: 81–92. http://www.research.lancs.ac.uk/portal/en/publications/sentencing-for-offencesinvolving-child-pornography(0e5b5e25-7562-4f62-8bfc-774d3a7dd19d)/export.html.
  • Hamilton, M. 2011. “The Efficacy of Severe Child Pornography Sentencing: Empirical Validity or Political Rhetoric?” Stanford Law & Policy Review 22: 545–586.
  • Hamilton, M. 2014. “Sentencing Adjudication: Lessons from Child Pornography Policy Nullification.” Georgia State University Law Review 30: 375–460.
  • Hessick, C. B. 2011. “Disentangling Child Pornography from Child Sex Abuse.” Washington University Law Review 88: 853–902.
  • Kaiser, K. A., and C. Spohn. 2014. ““Fundamentally Flawed?”: Exploring the Use of Policy Disagreements in Judicial Downward Departures for Child Pornography Sentences.” Criminology & Public Policy 13 (2): 241–270. doi:10.1111/1745-9133.12082.
  • Kong, R., J. Holly, S. Beattie, and A. Cardillo. 2003. “Sexual Offenses in Canada.” Juristat: Canadian Centre for Justice Statistics 23: 1–22.
  • Levesque, R. J. R. 2000. “Sentencing sex Crimes Against Children: An Empirical and Policy Analysis.” Behavioural Sciences and the Law 18: 331–341. doi:10.1002/1099-0798(200003/06)18:2/3<331::AID-BSL400>3.0.CO;2-7.
  • Long, M. L., L. A. Alison, and M. A. McManus. 2012. “CSEM and Likelihood of Contact Abuse: A Comparison between Contact Child Sexual Offenders and Noncontact Offenders.” Sexual Abuse 25: 370–395. doi:10.1177/1079063212464398.
  • Long, M., L. Alison, R. Tejeiro, and E. Hendricks. 2016. “KIRAT: Law Enforcement’s Prioritization Tool for Investigating Indecent Image Offenders.” Psychology, Public Policy, and Law 22: 12–21. doi:10.1037/law0000069.supp
  • McCarthy, J. A. 2010. “Internet Sexual Activity: A Comparison between Contact and Non-contact CSEM Offenders.” Journal of Sexual Aggression: An International, Interdisciplinary Forum for Research, Theory and Practice 16: 181–195. doi:10.1080/13552601003760006.
  • National Institute of Justice. 2004. Forensic Examination of Digital Evidence: A Guide for Law Enforcement. https://www.ncjrs.gov/pdffiles1/nij/199408.pdf.
  • Office of the Inspector General. 2009, January. Audit Report 09-08: The Federal Bureau of Investigation’s Effort to Combat Crime Against Children. https://oig.justice.gov/reports/FBI/a0908/final.pdf.
  • O’Hara, R. B., and D. J. Kotze. 2010. “Do not Log-transform Count Data.” Methods in Ecology and Evolution 1: 118–122. doi:10.1111/j.2041-210X.2010.00021.x.
  • Paquette, S. 2015, April. Agression sexuelle en ligne et hors ligne: Les agresseurs sont-ils les mêmes? Workshop presented at the seminar “Délinquance sexuelle & Internet: Quels enjeux pour demain?” of the “École Romande de la Magistrature Pénale”, Neuchâtel, Switzerland.
  • R. v. Auger-St-Laurent. 2012. QCCQ 9440 (CanLII).
  • R. v. Beaulieu. 2007. QCCQ 10487 (CanLII).
  • R. v. Bouchard. 2010. QCCQ 10370 (CanLII).
  • R. v. Chassé. 2002. QCCQ 23659 (CanLII).
  • R. v. Corporal D. Petten. 2007. CM 2023 (CanLII).
  • R. v. Lapierre. 2013. QCCQ 6496 (CanLII).
  • R. v. Maitre de 1re classe J.R.G. Pelletier. 2008. CM 3002 (CanLII).
  • R. v. M. L. 2006. QCCQ 11242 (CanLII).
  • R. v. Rainville. 2013. QCCQ, 3524 (CanLII).
  • R. v. Roy. 2007. QCCQ 857 (CanLII).
  • R. v. R. R. 2004. QCCQ, 28563 (CanLII).
  • R. v. Von Gunten. 2006. QCCA, 286 (CanLII).
  • Saint-Jacques M.A. (Capitaine), R. v. 2005. CM 31 (CanLII).
  • Seto, M. C., and A. W. Eke. 2015. “Predicting Recidivism Among Adult Male CSEM Offendesr: Development of the CSEM Offender Risk Tool (CPORT).” Law and Human Behavior 39: 416–429. doi:10.1037/lhb0000128.
  • Seto, M. C., R. K. Hanson, and K. M. Babchishin. 2011. “Contact Sexual Offending by Men with Online Sexual Offenses.” Sexual Abuse: A Journal of Research and Treatment 23 (1): 124–145. doi:10.1177/1079063210369013.
  • Seto, M. C., J. M. Wood, K. M. Babchishin, and S. Flynn. 2012. “Online Solicitation Offenders are Different from CSEM Offenders and Lower Risk Contact Sexual Offenders.” Law and Human Behavior 36 (320). doi:10.1037/h0093925.
  • Sinclair, R., K. Duval, and E. Fox. 2015. “Strengthening Canadian Law Enforcement and Academic Partnerships in the Area of Online Child Sexual Exploitation: The Identification of Shared Research Directions.” Child & Youth Services 36 (4): 345–364. doi:10.1080/0145935X.2015.1096588.
  • Sûreté du Québec. 2017. Unpublished data.
  • Ulmer, J. T., and B. Johnson. 2004. “Sentencing in Context: A Multilevel Analysis.” Criminology 42: 137–178. doi:10.1111/j.1745-9125.2004.tb00516.x.
  • U.S. Sentencing Commission. 2012. Report to Congress: Federal Child Pornography Offenses. Washington, DC: U.S. Sentencing Commission.
  • Wolak, J., D. Finkelhor, and K. J. Mitchell. 2005. Child Pornography Possessors and the Internet: A National Study. National Center for Missing & Exploited Children. Alexandria, VA: National Center for Missing & Exploited Children.
  • Woodlee, J. G. 2011. “Congressional Manipulation of the Sentencing Guideline for CSEM Possession: An Argument for or Against Difference?” Duke Law Journal 60: 1015–1057.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.