5,691
Views
10
CrossRef citations to date
0
Altmetric
Articles

The role of the internet in the grooming, exploitation, and exit of United States domestic minor sex trafficking victims

&
Pages 187-203 | Received 09 Jan 2019, Accepted 31 Oct 2019, Published online: 05 Nov 2019

References

  • Adelson, W. (2008). Child prostitute or victim of trafficking. University of St. Thomas Law Journal, 6, 96–128.
  • Anderson, M., & Jiang, J. (2018a). Teens, social media & technology 2018. Pew Research center Internet & Technology. Retrieved from http://www.pewinternet.org/2018/05/31/teens-social-media-technology-2018/
  • Anderson, M., & Jiang, J. (2018b). Teen’s social media habits and experiences. Pew Research Center Internet & Technology. Retrieved from http://www.pewinternet.org/2018/11/28/teens-social-media-habits-and-experiences/
  • Bach, J. E, & Litam, S. D. A. (2017). “kind regards”: an examination of one buyer's attempt to purchase a trafficked child for sex. Journal of Sexual Aggression, 23(2), 222–233.
  • Banks, D., & Kyckelhahn, T. (2011). Characteristics of suspected human trafficking incidents, 2008-2010. Bureau of Justice Statistics:Washington, DC: US Department of Justice, Office of Justice Programs.
  • Bonanno, G. A. (2004). Loss, trauma, and human resilience. Have We Underestimated The Human Capacity to Thrive after Extremely Aversive Events? American Psychologist, 59, 20–28. doi: http://dx.doi.org/10.1037/0003-066X.591.20
  • Bouché, V. (2015). A report on the use of technology to recruit, groom and sell domestic minor sex trafficking victims. Retrieved from https://www.we arethorn.org/wp-content/uploads/2015/02/Survivor_Survey_r5.pdf
  • Boyden, J., & Mann, G. (2005). Children’s risk, resilience, and coping in extreme situations. In M. Ungar (Ed (Ed), Handbook for working with children and youth: pathways to resilience across cultures and contexts (pp. 3–26). Thousand Oaks, CA: Sage.
  • Curtis, R., Terry, K., Dank, M., Dombrowski, K., & Khan, B. (2008). Commercial sexual exploitation of children in New York City, volume one: The CSEC population in New York City: Size, characteristics and needs. Center for court innovation. Retrieved from http://policeprostitutionandpolitics.net/pdfs_all/PDFS%20for%20USC%20Cal%20Lutheran%20Class/2008%20Ric%20Curtis%20Meredith%20Dank%20study.pdf.
  • ECPAT. (2012). Global monitoring status of action against commercial sexual exploitation of children: United States. Retrieved from http://www.ecpat.net/sites/default/files/a4a_v2_am_usa_2.pdf
  • Farrell, A., McDevitt, J., Pfeffer, R., Fahy, S., Owens, C., Dank, M., & Adams, W. (2012). Identifying challenges to improve the investigation and prosecution of state and local human trafficking cases. Retrieved from http://www.ncdsv.org/images/NEUniv-UrbanInsti_IDingChallengesImproveInvesProsecStateLocalHumanTraffickingCases_4-2012.pdf
  • Fedina, L., Williamson, C., & Perdue, T. (2019). Risk factors for domestic child sex trafficking in the United States. Journal of Interpersonal Violence, 34(13), 2653–2673.
  • Fergus, S, & Zimmerman, M. A. (2005). Adolescent resilience: a framework for understanding healthy development in the face of risk. Annu. Rev. Public Health, 26, 399–419. doi: http://dx.doi.org/10.1146/annurev.publhealth.26.021304.144357
  • Fraser, M. W, Galinsky, M. J, & Richman, J. M. (1999). Risk, protection, and resilience: toward a conceptual framework for social work practice. Social Work Research, 23(3), 131–143.
  • Fredlund, C., Svensson, F., Svedin, C. G., Priebe, G., & Wadsby, M. (2013). Adolescents’ lifetime experience of selling sex: Development over five years. Journal of Child Sexual Abuse, 22(3), 312–325.
  • Gerassi, L., Edmond, T., & Nichols, A. (2017). Design strategies from sexual exploitation and sex work studies among women and girls: Methodological considerations in a hidden and vulnerable population. Action Research, 15(2), 161–176.
  • Glaser, B., & Strauss, A. (1967). The discovery of grounded theory. London, England: Weidenfield & Nicolson.
  • Guest, G., Bunce, A., & Johnson, L. (2006). How many interviews are enough? An experiment with data saturation and variability. Field Methods, 18(1), 59–82.
  • Heil, E., & Nichols, A. (2014). Hot spot trafficking: A theoretical discussion of the potential problems associated with targeted policing and the eradication of sex trafficking in the United States. Contemporary Justice Review, 17(4), 421–433.
  • Horning, A., & Marcus, A. (2017). Introduction: In search of pimps and other varieties. In A. Horning & A. Marcus (Eds.), Third party sex work and pimps in the age of anti-trafficking (pp. pp. 1–13). Cham: Springer.
  • Klettke, B., Hallford, D. J., & Mellor, D. J. (2014). Sexting prevalence and correlates: A systematic literature review. Clinical Psychology Review, 34(1), 44–53.
  • Livingstone, S., Mascheroni, G., & Staksrud, E. (2018). European research on children’s internet use: Assessing the past and anticipating the future. New Media & Society, 20(3), 1103–1122.
  • Lukianchuk, R., Grebeniuk, M., & Cherniak, A. (2017). Current trends, concerns and peculiarities of the turnover of cryptocurrency. Economic Annals-XXI, 168, 69–72.
  • Lutnik, A. (2016). Domestic minor sex trafficking: Beyond victims and villains. New York, NY: Columbia University Press.
  • Marcus, A., Horning, A., Curtis, R., Sanson, J., & Thompson, E. (2014). Conflict and agency among sex workers and pimps: A closer look at domestic minor sex trafficking. The Annals of the American Academy of Political and Social Science, 653(1), 225–246.
  • Martinez, O., & Kelle, G. (2013). Sex trafficking of LGBT individuals: A call for service provision, research, and action. The International Law News., 42(4), 1–6.
  • Mendel, J., & Sharapov, K. (2016). Human trafficking and online networks: Policy, analysis, and ignorance. Antipode, 48(3), 665–684.
  • Mitchell, K. J., & Jones, L. M. (2013). Internet-facilitated commercial sexual victimization of children. Retrieved from http://www.unh.edu/ccrc/pdf/Final_IFCSEC_Bulletin_Nov_2013_CV262.pdf
  • Musto, J., & Boyd, D. (2014). The trafficking-technology nexus. Social Politics, 21(3), 461–483.
  • Padgett, D. K. (2008). Qualitative methods in social work research (2nd ed.). Thousand Oaks, CA: Sage.
  • Patton, M. Q. (2002). Qualitative research and evaluation methods (3rd ed.). Thousand Oaks, CA: Sage.
  • Rand, A. (2009). It can’t happen in my backyard: The commercial sexual exploitation of girls in the United States. Child and Youth Services, 31, 138–156.
  • Rastogi, S. (2011). The black population: 2010. US Department of Commerce, Economics and Statistics Administration US Census Bureau, Washington, D.C.
  • Rizo, C. F., Klein, L. B., Chesworth, B. R., O’Brien, J. E., Macy, R. J., Martin, S. L., … Love, B. L. (2018). Educating youth about commercial sexual exploitation of children: A systematic review. Global Social Welfare, 6(1), 29–39..
  • Stanley, N., Barter, C., Wood, M., Aghtaie, N., Larkins, C., Lanau, A., & Överlien, C. (2018). Pornography, sexual coercion and abuse and sexting in young people’s intimate relationships: A European study. Journal of Interpersonal Violence, 33(19), 2919–2944.
  • Stransky, M., & Finkelhor, D. (2017). How many juveniles are involved in prostitution in the U.S.? Retrieved from http://www.unh.edu/ccrc/prostitution/Juvenile_Prostitution_factsheet.pdf
  • Tidball, S., Zheng, M., & Creswell, J. W. (2016). Buying sex on-line from girls: NGO representatives, law enforcement officials, and public officials speak out about human trafficking—A qualitative analysis. Gender Issues, 33(1), 53–68.
  • Trafficking Victims Protection Act (2000). Public Law 106-386 (TVPA), 114 Stat. 1464, codified as amended at 21 U.S.C. 22 U.S.C. §7101C.F.R.
  • Tsitsika, A., Janikian, M., Wójcik, S., Makaruk, K., Tzavela, E., Tzavara, C., … Richardson, C. (2015). Cyberbullying victimization prevalence and associations with internalizing and externalizing problems among adolescents in six European countries. Computers in Human Behavior, 51, 1–7.
  • Tusaie, K, & Dyer, J. (2004). Resilience: a historical review of the construct. Holistic Nursing Practice, 18(1), 3–10.
  • Tyldum, G., & Brunovskis, A. (2005). Describing the unobserved: Methodological challenges in empirical studies on human trafficking. International Migration, 43(1–2), 17–34.
  • U.S. Department of State. (2008). Victims of trafficking and violence protection Act of 2000. Retrieved from http://www.state.gov/j/tip/laws/61124.htm
  • Varma, S., Gillespie, S., McCracken, C., & Greenbaum, V. J. (2015). Characteristics of child commercial sexual exploitation and sex trafficking victims presenting for medical care in the United States. Child Abuse & Neglect, 44, 98–105.
  • Victims of Trafficking and Violence Protection Act of 2000, Pub. L. No. 106-386, 114 Stat. 1464 (2000).
  • Wells, M, Mitchell, K. J, & Ji, K. (2012). Exploring the role of the internet in juvenile prostitution cases coming to the attention of law enforcement. Journal of Child Sexual Abuse, 21(3), 327–342.
  • Wolak, J., Finkelhor, D., Walsh, W., & Treitman, L. (2018). Sextortion of minors: Characteristics and dynamics. Journal of Adolescent Health, 62(1), 72–79.
  • Ybarra, M. L., & Mitchell, K. J. (2004). Online aggressor/targets, aggressors, and targets: A comparison of associated youth characteristics. Journal of Child Psychology and Psychiatry, 45(7), 1308–1316.
  • Ybarra, M. L, & Mitchell, K. J. (2008). How risky are social networking sites? a comparison of places online where youth sexual solicitation and harassment occurs. Pediatrics, 121(2), e350–e357.
  • Ybarra, M. L., & Mitchell, K. J. (2014). “Sexting” and its relation to sexual activity and sexual risk behavior in a national survey of adolescents. Journal of Adolescent Health, 55(6), 757–764.
  • Ybarra, M. L., Mitchell, K. J., Wolak, J., & Finkelhor, D. (2006). Examining characteristics and associated distress related to Internet harassment: Findings from the second youth Internet safety survey. Pediatrics, 118(4), e1169–e1177.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.