Publication Cover
Victims & Offenders
An International Journal of Evidence-based Research, Policy, and Practice
Volume 9, 2014 - Issue 3
781
Views
24
CrossRef citations to date
0
Altmetric
Original Articles

The Effects of Using Identity Deception and Suggesting Secrecy on the Outcomes of Adult-Adult and Adult-Child or -Adolescent Online Sexual Interactions

, , , , , & show all

REFERENCES

  • Attwood, F. (2009). “Deepthroatfucker” and “discerning adonis”: Men and cybersex. International Journal of Cultural Studies, 12(3), 279–294.
  • Baumgartner, S. E., Valkenburg, P. M., & Peter, J. (2010). Unwanted online sexual solicitation and risky sexual online behavior across the lifespan. Journal of Applied Developmental Psychology, 31, 439–447. doi: 10.1016/j.appdev.2010.07.005
  • Briggs, P., Simon, W. T., & Simonsen, S. (2011). An exploratory study of Internet-initiated sexual offences and the chat room sex offender: Has the Internet enabled a new typology of sex offender? Sexual Abuse, 23(1), 72–91. doi: 10.1177/1079063210384275
  • Choo, K-K., R. (2009). Online child grooming: A literature review on the misuse of social networking sites for grooming children for sexual offences. Canberra: Australian Institute of Criminology. Retrieved April 29, 2014, from http://www.aic.gov.au/documents/3/c/1/%7B3c162cf7-94b1-4203-8c57-79f827168dd8%7Drpp103.pdf
  • Daneback, K., Cooper, A., & Månsson, S-A. (2005). An Internet study of cybersex participants. Archives of Sexual Behavior, 34(3), 321–328. doi: 10.1007/s10508-005-3120-z
  • Daneback, K., Månsson, S-A., & Ross, M. W. (2007). Using the Internet to find offline sex partners. Cyberpsychology & Behavior, 10(1), 100–107. doi: 10.1089/cpb.2006.9986
  • IBM Corp. (2012). SPSS Statistics for Windows, Version 21.0 [Computer software]. Armonk, NY: IBM Corp.
  • Jones, L. M., Mitchell, K. J., & Finkelhor, D. (2012). Trends in youth Internet victimization: Findings from three youth Internet safety surveys 2000–2010. Journal of Adolescent Health, 50, 179–186. doi: 10.1016/j.jadohealth.2011.09.015
  • Leander, L., Christianson, S. Å., & Granhag, P. Ä. (2008). Internet-initiated sexual abuse: Adolescent victims’ report about on- and off-line sexual activities. Applied Cognitive Psychology, 22(9), 1260–1274. doi: 10.1002/acp.1433
  • Livingstone, S., Haddon, L., Görzig, A., & Ólafsson K. (2011). EU kids online II: Final report. Retrieved April 29, 2014, from http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20II%20%282009-11%29/EUKidsOnlineIIReports/Final%20report.pdf
  • Malesky, A. L., Jr. (2007). Predatory online behavior: Modus operandi of convicted sex offenders in identifying potential victims and contacting minors over the Internet. Journal of Child Sex Abuse, 16(2), 23–31. doi: 10.1300/J070v16n02_02
  • Mitchell, K. J., Finkelhor, D., Jones, L. M., & Wolak, J. (2010). Growth and change in undercover online child exploitation investigations, 2000–2006. Policing & Society, 20(4), 416–431. doi: 10.1080/10439463.2010.523113
  • Mitchell, K. J., Finkelhor, D., & Wolak, J. (2007). Online requests for sexual pictures from youth: Risk factors and incident characteristics. Journal of Adolescent Health, 41, 196–203. doi: 10.1016/j.jadohealth.2007.03.013
  • Olson, L. N., Daggs, J. L., Ellevold, B. L., & Rogers, T. K. K. (2007). Entrapping the innocent: Towards a theory of child sexual predators’ luring communication. Communication and Theory, 17(3), 231–251. doi: 10.1111/j.1468-2885.2007.00294.x
  • Quayle, E., Allegro, S., Hutton, L., Sheath, M., & Lööf, L. (2012). Online behavior related to child sexual abuse: Creating a private space in which to offend; Interviews with online child sex offenders. Council of the Baltic Sea States, Stockholm: ROBERT Project.
  • Rikoslaki. (2011). Luku 20, Seksuaalirikokset (koodi: 2011/540) [Penal code. (2011). Chapter 20, sexual offenses (code: 2011:540)]. Retrieved May 5, 2013, from http://www.finlex.fi/fi/esitykset/he/2010/20100282
  • Schulz, A., Bergen, E., Schuhmann, P., Hoyer, J., Santtila, P., & Osterheider, M. (2014). Online sexual solicitation and online grooming of minors among adult Internet users. Manuscript submitted for publication.
  • Seto, M. (2013). Internet sex offenders. Washington, DC: American Psychological Association.
  • Seto, M., Wood, J. M., Babchishin, K. M., & Flynn, S. (2012). Online solicitation offenders are different from child pornography offenders and lower risk contact sexual offenders. Law & Human Behavior, 36(4), 320–330. doi: 10.1037/h0093925
  • Svensk författningssamling. (2009). Kapitel 6, Om sexualbrott (kod: 2009:343). [Swedish code of statues. (2009). Chapter 6, Sexual Offences (code: 2009:343)]. Retrieved April 29, 2014, from http://www.ne.se/lang/kontakt-med-barn-i-sexuellt-syfte?i_h_word=sexualbrott
  • Shannon, D. (2008). Online sexual grooming in Sweden: Online and offline sex offences against children as described in Swedish police data. Journal of Scandinavian Studies in Criminology and Crime Prevention, 9, 160–180. doi: 10.1080/14043850802450120
  • Strassberg, D. S., McKinnon, R. K., Sustaíta, M. A., & Rullo, J. (2013). Sexting by high school students: An exploratory and descriptive study. Archives of Sexual Behavior, 42(1), 15–21. doi: 10.1007/s10508-012-9969-8
  • Subrahmanyam, K., Smahel, D., & Greenfield, P. M. (2006). Constructing sexuality and identity in an online teen chat room. Developmental Psychology, 42(3), 395–406. doi: 10.1037/0012-1649.42.3.395
  • Warner, S. (2000). Understanding child sexual abuse: Making the tactics possible. Gloucester, UK: Handsell.
  • Webster, S., Davidson, J., Bifulco, A., Gottschalk, P., Caretti, V., Pham, T., et al. (2012). European Online Grooming Project: Final report. Retrieved April 3, 2013, from http://www.europeanonlinegroomingproject.com/wp-content/file-uploads/European-Online-Grooming-Project-Final-Report.pdf
  • Wells, M., & Mitchell, K. J. (2007). Youth sexual exploitation on the Internet: DSM-IV diagnoses and gender differences in co-occurring mental health issues. Child and Adolescent Social Work Journal, 24(3), 235–260. doi: 10.1007/s10560-007-0083-z
  • Whittle, H., Hamilton-Giachritsis, C., Beech, A., & Collings, G. (2013). A review of online grooming: Characteristics and concerns. Aggression and Violent Behavior, 18, 62–70. doi: 10.1016/j.avb.2012.09.003
  • Whitty, M. (2002). Liar, liar! An examination of how open, supportive and honest people are in chat rooms. Computers in Human Behavior, 18(4), 343–352. doi: 10.1016/S0747-5632(01)00059-0
  • Wolak, J. (2012, May). Online child sexual abuse. Paper presented at the Risktaking Online Behaviour Empowerment through Research and Training Conference, Berlin, Germany.
  • Wolak, J., Finkelhor, D., & Mitchell, K. J. (2004). Internet-initiated sex crimes against minors: Implications for prevention based on findings from a national study. Journal of Adolescent Health, 35(5), 11–20. doi: 10.1016/j.jadohealth.2004.05.006
  • Wolak, J., Finkelhor, D., Mitchell, K. J., & Ybarra, M. L. (2008). Online “predators” and their victims: Myths, realities, and their implications for prevention and treatment. American Psychologist, 63(2), 111–128. doi: 10.1037/0003-066X.63.2.111
  • Ybarra, M. L., Espelage, D. L., & Mitchell, K. J. (2007). The co-occurrence of Internet harassment and unwanted sexual solicitation victimization and perpetration: Associations with psychosocial indicators. Journal of Adolescent Health, 41, 31–41. doi: 10.1016/j.jadohealth.2007.09.010
  • Ybarra, M. L., Leaf, P. J., & Diener-West, M. (2004). Sex differences in youth-reported depressive symptomatology and unwanted Internet sexual solicitation. Journal of Medical Internet Research, 6(1), 1–23. Retrieved from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1550591/

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.