3,032
Views
6
CrossRef citations to date
0
Altmetric
Articles

Strategies and cues adolescents use to assess the age of an online stranger

, , &
Pages 1168-1185 | Received 18 Jan 2016, Accepted 08 Mar 2017, Published online: 18 Apr 2017

References

  • Beech, A. R., Elliot, I. A., Birgden, A., & Findlater, D. (2008). The Internet and child sexual offending: A criminological review. Aggression & Violent Behavior, 13, 216–228. doi: 10.1016/j.avb.2008.03.007
  • Bergen, E., Antfolk, J., Jern, P., Alanko, K., & Santtila, P. (2013). Adults’ sexual interest in children and adolescents online: A quasi-experimental study. International Journal of Cyber Criminology, 7(2), 94–111.
  • Bergen, E., Davidson, J., Schulz, A., Schuhmann, P., Johansson, A., Santtila, P., & Jern, P. (2014). The effects of using identity deception and suggesting secrecy on the outcomes of adult-adult and adult-child or adolescent online sexual interactions. Victims & Offenders, 9, 276–298. doi: 10.1080/15564886.2013.873750
  • Bergen, E. (2014). Comparing adult-youth and adult-adult online sexual solicitation: Manipulative behaviors, situational factors, and outcomes. Abo: Abo Akademi University.
  • Berger, C., & Calabrese, R. (1975). Some explorations in initial interaction and beyond: Toward a developmental theory of interpersonal communication. Human Communication Research, 1(2), 99–112. doi: 10.1111/j.1468-2958.1975.tb00258.x
  • Berson, I. R. (2003). Grooming cybervictims: The psychosocial effects of online exploitation for youth. Journal of School Violence, 2(1), 5–18. doi: 10.1300/J202v02n01_02
  • Black, P. J., Wollis, M., Woodworth, M., & Hancock, J. T. (2015). A linguistic analysis of grooming strategies of online child sex offenders: Implications for our understanding of predatory sexual behavior in an increasingly computer-mediated world. Child Abuse & Neglect, 44, 140–149. doi: 10.1016/j.chiabu.2014.12.004
  • Briggs, P., Simon, W. T., & Simonsen, S. (2011). An exploratory study of Internet-initiated sexual offences and the chat room sex offender: Has the Internet enabled a new typology of sex offender? Sexual Abuse, 23(1), 72–91. doi: 10.1177/1079063210384275
  • Choo, K. K. R. (2009). Online child grooming: A literature review on the misuse of social networking sites for grooming children for sexual offences. Canberra: Australian Institute of Criminology.
  • Cohen, J. (1968). Weighted kappa: Nominal scale agreement provision for scaled disagreement or partial credit. Psychological Bulletin, 70(4), 213–220. doi: 10.1037/h0026256
  • De Clercq, O., Desmet, B., Lfever, E., & Hoste, V. (2013). Normalization of Dutch user-generated content. Proceedings of RANLP2013, Hissar, Bulgaria.
  • Gibbs, J. L., Ellison, N. B., & Lai, C. (2011). First comes love, then comes google: An investigation of uncertainty reduction strategies and self-disclosure in online dating. Communication Research, 38(1), 70–100. doi: 10.1177/0093650210377091
  • Griffith, G., & Roth, L. (2007). Protecting children from online sexual predators. Sydney: NSW Parliamentary Library Research Service.
  • Livingstone, S., Haddon, L., Görzig, A., & Ólafsson, K. (2011). Risks and safety on the internet: The perspective of European children. Full findings. London: EU Kids Online, London School of Economics and Political Science.
  • Livingstone, S., & Helsper, E. J. (2007). Taking risks when communicating on the Internet: The role of offline social-psychological factors in young people's vulnerability to online risks. Information, Communication & Society, 10(5), 619–644. doi: 10.1080/13691180701657998
  • Livingstone, S., Ólafsson, K., & Staksrud, E. (2011). Social networking, age and privacy. London: EU Kids Online.
  • Malesky, A. L., Jr . (2007). Predatory online behavior: Modus operandi of convicted sex offenders in identifying potential victims and contacting minors over the Internet. Journal of Child Sex Abuse, 16(2), 23–32. doi: 10.1300/J070v16n02_02
  • Merchant, G. (2001). Teenagers in cyberspace: An investigation of language use and language change in Internet chatrooms. Journal of Research in Reading, 24(3), 293–306. doi: 10.1111/1467-9817.00150
  • Mitchell, J. M., Finkelhor, D., & Wolak, J. (2001). Risk factors for and impact of online sexual sollicitation of youth. JAMA, 285(23), 3011–3014. doi: 10.1001/jama.285.23.3011
  • Mitchell, K. J., Jones, L., Finkelhorn, D., & Wolak, J. (2014). Trends in unwanted online experiences and sexting (Final Report). Durham: Crime Against Children Research Center.
  • O’Connell, R. (2003). A typology of cyber sexploitation and online grooming practices. Preston: University of Central Lancashire. Retrieved February 12, 2014, from http://netsafe.org.nz/Doc_Library/racheloconnell1.pdf.
  • Quayle, E., Allegro, S., Hutton, L., Sheath, M., & Lööf, L. (2012). Online behavior related to child sexual abuse: Creating a private space in which to offend; Interviews with online child sex offenders. Stockholm: Council of the Baltic Sea States, ROBERT Project.
  • Rybnicek, M., Poisel, R., & Tjoa, S. (2013). Facebook Watchdog: A research agenda for detecting online grooming and bullying activities. Systems, man, and cybernetics (SMC) IEEE international conference, Manchester, UK, pp. 2854–2859.
  • Shannon, D. (2008). Online sexual grooming in Sweden: Online and offline sex offences against children as described in Swedish police data. Journal of Scandinavian Studies in Criminology and Crime Prevention, 9, 160–180. doi: 10.1080/14043850802450120
  • Smith, P. K., Thompson, F., & Davidson, J. (2014). Cyber safety for adolescent girls: Bullying, harassment, sexting, pornography, and solicitation. Current Opinions in Obstetrics and Gynecology, 26(5), 360–365. doi: 10.1097/GCO.0000000000000106
  • Valkenburg, P. M., & Peter, J. (2011). Online communication among adolescents: An integrated model of its attraction, opportunities, and risks. Journal of Adolescent Health, 48, 121–127. doi: 10.1016/j.jadohealth.2010.08.020
  • Walsh, W. A., Wolak, J., & Mitchell, K. J. (2013). lose relationships with people met online in a national U.S. sample of adolescents. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 7(3), Article 4.
  • Webster, S., Davidson, J., Bifulco, A., Gottschalk, P., Caretti, V., Pham, T., … Craparo, G. (2012). European Online Grooming Project, final report. Brussels: European Commission Safer Internet Plus Programme.
  • Whittle, H. C., Hamilton-Giachritsis, C. E., Beech, A. R., & Collings, G. (2013). A review of young people's vulnerabilities to online grooming. Aggression and Violent Behavior, 18(1), 135–146. Retrieved February 11, 2014, from the http://www.sciencedirect.com/ database. doi: 10.1016/j.avb.2012.11.008
  • Whittle, H. C., Hamilton-Giachritsis, C. E., & Beech, A. R. (2014). In their own words: Young peoples’ vulnerabilities to being groomed and sexually abused online. Psychology, 5(10), 1185–1196. doi: 10.4236/psych.2014.510131
  • Whittle, H. C., Hamilton-Giachritsis, C. E., & Beech, A. R. (2015). A comparison of victim and offender perspectives of grooming and sexual abuse. Deviant Behavior, 36(7), 539–564. doi: 10.1080/01639625.2014.944074
  • Wolak, J., Finkelhor, D., & Mitchell, K. J. (2004). Internet-initiated sex crimes against minors: Implications for prevention based on findings from a national study. Journal of Adolescent Health, 35(5), 424.e11–424.e20. doi: 10.1016/j.jadohealth.2004.05.006
  • Wolak, J., Finkelhor, D., Mitchell, K. J., & Ybarra, M. L. (2008). Online ‘predators’ And their victims: Myths, realities, And implications For prevention And treatment. American Psychologist, 63(2), 111–128. doi: 10.1037/0003-066X.63.2.111