You are on page 1of 12

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/288096120

Internet crimes against children

Article · January 2012


DOI: 10.4018/978-1-4666-0315-8.ch066

CITATIONS READS
3 1,718

2 authors, including:

Keith F Durkin
Ohio Northern University
34 PUBLICATIONS   599 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Alcohol Studies View project

Internet and Sex Offending View project

All content following this page was uploaded by Keith F Durkin on 23 April 2017.

The user has requested enhancement of the downloaded file.


Encyclopedia of
Cyber Behavior

Zheng Yan
University at Albany, USA

Volume I
Managing Director: Lindsay Johnston
Senior Editorial Director: Heather A. Probst
Book Production Manager: Sean Woznicki
Development Manager: Joel Gamon
Acquisitions Editor: Erika Gallagher
Typesetter: Jennifer Romanchak, Nicole Sparano
Cover Design: Nick Newcomer, Lisandro Gonzalez

Published in the United States of America by


Information Science Reference (an imprint of IGI Global)
701 E. Chocolate Avenue
Hershey PA 17033
Tel: 717-533-8845
Fax: 717-533-8661
E-mail: cust@igi-global.com
Web site: http://www.igi-global.com

Copyright © 2012 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in
any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher.
Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or
companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark.

Library of Congress Cataloging-in-Publication Data


Encyclopedia of cyber behavior / Zheng Yan, editor.
p. cm.
Includes bibliographical references and index.
Summary: “This book offers a complete look into the field of cyber behavior, surveying case studies, research, frameworks,
techniques, technologies, and future developments relating to the way people interact and behave online”-- Provided by
publisher.
ISBN 978-1-4666-0315-8 (hardcover) -- ISBN 978-1-4666-0316-5 (ebook) -- ISBN 978-1-4666-0317-2 (print & perpetual
access) 1. Internet--Psychological aspects. 2. Computer networks--Psychological aspects. I. Yan, Zheng.
BF637.C45.E53 2010
302.23’1--dc23
2011044984

British Cataloguing in Publication Data


A Cataloguing in Publication record for this book is available from the British Library.

All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the
authors, but not necessarily of the publisher.
799

Chapter 66
Internet Crimes
against Children
Keith F. Durkin
Ohio Northern University, USA

Ronald L. DeLong
Ohio Northern University, USA &MidWest Ohio Forensic Services, Inc., USA

ABSTRACT
Internet crimes against children are a contemporary social problem which has drawn a great deal of
attention from the parents, educators, legislators, and law enforcement officials. This phenomenon has
captured national attention in the United States with a number of media reports of this phenomenon.
These crimes include child pornography offenses, as well as adults soliciting minors for sexual purposes
on line. Drawing upon data from recent national surveys, the characteristics of offenses, offenders, and
victims are examined. A multitude of issues related to the assessment and classification of the individu-
als who commit Internet crimes against children are also explored. Strategies for the prevention of this
behavior and enforcement of laws protecting children online are discussed.

INTRODUCTION nology. Some examples include Internet fraud,


hacking, cyberstalking, and illegal gambling.
Technological innovations frequently have a However, the most prominent manifestation of
transformative impact on society. Computer this phenomenon is the sexual victimization of
mediated communications have revolutionized children online. Internet crimes against children
many aspects of social life such as commerce, are “defined as any computer facilitated sexual
education and recreation. Not surprisingly, many exploitation of children” (Alexy, Burgess, & Baker
forms of criminal behavior have changed, and 2005, p.804). There are two main forms of this
new ones arisen, in response to Internet tech- behavior. The first involves using the Internet
to traffic and/or collect child pornography. The
DOI: 10.4018/978-1-4666-0315-8.ch066 second involves the widely publicized problem

Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Internet Crimes against Children

of adult men soliciting sex from minors on-line. Additionally, most of the offenders arrested on
These contemporary problems have implications child pornography charges had material depicting
for professionals and practitioners in a number prepubescent children (nearly half had images of
of areas including education, psychology, social children 3 to 5 years of age) and serious sexual
service and criminal justice. abuse. The primary motivation for these offend-
ers is sexual in nature. For instance, a recent
study of these offenders found the primary aim
OFFENSES, OFFENDERS, of accessing and downloading child pornography
AND VICTIMS from the Internet is sexual arousal, with offenders
typically masturbating to such images (Quayle &
The Internet has become the primary avenue for Taylor, 2002).
accessing and distributing child pornography. Now There is a clear association between the pos-
this material can be instantaneously shared with, session of child pornography and engaging in
an anonymously accessed, by a global audience. contact sexual offenses against minors. One out of
For instance, an Interpol child abuse image data every six criminal cases initiated solely as a child
base currently contains more than a half a million pornography investigation discovers an offender
images (Elliot & Beech, 2009). One international who is actively committing offenses against mi-
child pornography ring called the Wonderland nors (Wolak et al., 2011). A recent meta analysis
Club required members to share at least 10,000 of published studies of online (primarily child
new child sexual abuse images for membership pornography) offenders found that approximately
(Krone, 2005). On the most fundamental level, 1 in 8 of these men had a prior criminal record
these images represent a permanent record of the for contact sexual offenses (Seto et al., 2011).
actual sexual abuse or exploitation of a child (Lan- However, the same analysis found that about
ning, 2010). With Internet technology, theoreti- one-half admitted to committing contact offenses
cally the image of this abuse can be shared with against minors. Similarly, Bourke and Hernandez
and accessed by an infinite number of people. (2009) conducted a study of 155 offenders who
There is also a subtype of offender who commits were serving terms for online child pornography
crimes against children to produce pornography charges. They discovered that although 26% of
that is then shared and even sold on the Internet these men had official criminal records for sex
(Webb, Craissaiti, & Keen, 2007). The mere crimes against minors, 85% of these men actually
demand for this type of material fuels the further admitted to having committed at least one contact
sexual abuse and exploitation of children (Seto, offense against a minor while in treatment.
Hanson, & Babchishin, 2011). A second category of Internet crimes against
Individuals who collect and/or traffic child children involves adults using the Internet to
pornography via the Internet are commonly re- solicit children for sexual purposes. They engage
ferred to as “traders” by law enforcement (Alexy minors in sexually orientated communications
et al., 2005). The National Juvenile Online Vic- (e.g., “computer chat”) often with the intention
timization (NJOV) Study gathered data from a of arranging offline sexual encounters. These
national sample of law enforcement agencies offenders have been the subject of rather intense
regarding arrests for child pornography (Wolak, media scrutiny in the United States, and police
Finkelhor, & Mitchell, 2011). The results revealed stings aimed at catching these offenders have
that offenders in these cases are overwhelmingly been featured on the popular television show To
white men over the age of 25. Furthermore, ap- Catch a Predator. These offenders have been
proximately 70% of these offenders were single. called “travelers” by law enforcement (Alexy

800
Internet Crimes against Children

et al., 2005). Their online behavior has been re- ics online, and sharing personal information with
ferred to a “grooming”, “luring” or “predation” individuals they met online. Teens that regularly
(Urbas, 2010). This communication is frequently use the Internet are an especially appealing target
on-going, and a relationship between the offender for sex offenders. Adolescents have a natural
and target can develop over the course of several curiosity about sex and sexual activity (Wolak et
weeks or months. These solicitations are often al., 2008). They are frequently adventurous and
aggressive, and can contain very explicit sexual often eager for affection and attention. Many of
content. Offenders may send pornography to the children solicited online are not stereotypical
their target, as well as exposing their genitals and innocents. They may be curious and rebellious
masturbating on web cams (Marcum, 2007). They adolescents who are actively seeking sexual
may also encourage minors to take and send them information or contact (Lanning, 2010). One
suggestive or explicit photos (Wolak et al., 2011). It study of men arrested for actual or attempted
is important to understand that the online behavior contact sexual offenses against minors they met
of these men frequently constitutes a crime. The online found that these offenders actively sought
sexually explicit communication with a minor may out young people who appeared to be “needy”
constitute the offense of enticement of importun- (Malesky, 2007). Furthermore, adolescent boys
ing (DeLong, Durkin, & Hundersmarck, 2010). who are experiencing confusion about their sexual
The results of the NOJV study are very en- orientation are thought to be especially vulnerable
lightening regarding the actual nature of this to offenders (Lanning, 2010).
phenomenon (see Wolak, Finkelhor, Mitchell, The Internet can also play a secondary (rather
& Ybarra, 2008). Over 90% of the victims in than primary) role in the sexual abuse of children.
these cases are between the ages of 13-17. Most In the aforementioned cases involving the online
of the victims are female adolescents. Moreover, solicitation of children, the Internet is used by the
violence or force is used less than 5% of these offender to initiate the relationship. However,
cases. Based on this evidence, this crime often offenders who have a prior relationship with the
fits the model of statutory rape, inasmuch as they victim can use the Internet to facilitate contact
try to develop a relationship with young teens and sexual offenses (Mitchell, Finkelhor, & Wolak,
“seduce” them into an eventual sexual encounter 2005). These offenders may be relatives, teachers,
(Wolak et al., 2008). These offenders are normally and people in the ministry, coaches, and family
not pedophiles, rather they are antisocial adult friends. These acquaintances can use chat or e-
males who are willing to purse sexual activities mail to seduce or “groom” the victim, as well as
with minors who show signs of sexual develop- to arrange meetings where the abuse will occur.
ment but who are below the age of consent (Seto, Data from the NJOV study reveals that nearly
2010). Rather than using force to commit these half of the victims in these cases are between the
offenses, these men use manipulation and seduc- ages of 6 and 12 (Mitchell et al., 2005). This is
tion to meet their goals. significant since the supra majority of victims in
Recent research has focused on the online Internet initiated cases involving “travelers” are
sexual solicitation of minors. Results of the second between the ages of 13 and 17. Additionally, Inter-
Youth Internet Safety Survey (YISS2), a national net pornography, including child pornography, can
study of 11 to 17 year old adolescents, identified be used by sex offenders to lower the inhibitions
risk factors that are associated with received of their targets, thus facilitating the victimization
aggressive online sexual solicitations (Mitchell, of children (Lanning, 2010).
Ybarra, & Finkelhor, 2007). These included being Moreover, the Internet can serve a networking
female, visiting chat rooms, discussing sexual top- or social consolidation function for people who

801
Internet Crimes against Children

are interested in sexually abusing children. The Assessment and Classification


Internet has made possible a subcultural network of of Internet Sex Offenders
pedophiles and other adults with a sexual interest
in minors (Holt, Blevins, & Burkert, 2010). This Since this is a relatively new type of offend-
consists of a myriad of websites, computer forums, ing, little research has examined the assessment
and chat rooms for these individuals. Adult-child protocols for this population. Currently, many
sex advocacy groups such as NAMBLA (the North different types of general sex offender assess-
American Man/Boy Love Association) are remark- ments are utilized (e.g., pre-sentence, treatment
ably active online. Moreover, on the Internet, planning and placement, classification, and risk
there is a variety of literature, such as BoyWiki assessment). Due to the unknown elements of
and The Boylove Manifesto, which supports the associated with this type of offender, specifically
pedophile viewpoint (Durkin & Hundersmarck, what potential danger to the community the of-
2008). Most of this networking, in an off itself, fender possibly demonstrates; risk-level appears
is not criminal (Lanning, 2010). However, there to be most requested type of assessment. Other
are serious concerns that these networks may goals of a general sex offender assessment focus
encourage criminal conduct. In a recent study, level of deviance, identification of pro-offending
D’Ovidio et al. (2009) examine 64 website ad- attitudes, accountability, level of denial and gen-
vocating sexual relationships between adults and eral psychosocial areas (see DeLong et al., 2010).
children. These researchers concluded these sites Important in this process is the clinician’s ability
were criminogenic since they foster relationships to address areas that may be uncomfortable for
among users and expose these users to rationaliza- general practitioners such as sexual practices,
tions and justifications (e.g., this behavior does fantasy, use and description of sexually explicit
not harm children, children can freely consent to materials (including child pornography)(Quayle
sex with an adult) conducive to sexual offending. & Taylor, 2002). When conducting such an as-
Another way in which the Internet has facili- sessment, one should be aware of the offender’s
tated the sexual exploitation of children is through level of guardedness and defensiveness, as well
sex tourism and child prostitution. Sexual tourism, as their possible high degree of shame and guilt.
which involves traveling with the intent to engage Asking questions in a gentle, nonjudgmental and
in sexual behavior, often, involves child victims. non-confrontational manner is imperative. Of-
For a number of years, sex tours in Southeast Asia fenders need to have an environment where they
have been promoted via the Internet (Hughes, will be able to discuss their offense dynamics, as
2000). There have been reports of pedophiles well as other personal and private areas of their
trading information about potential child victims life without the fear of judgment and retribution.
for pedophiles traveling abroad (Holt et al., 2010). Questions should be formulated in a manner to
In recent years in the United States, there have ascertain the degree, nature, and extent of the
been a number of cases involving child prostitu- sexual and legal problems of the offender.
tion being promoted on Internet classified sites Quayle and Taylor (2002) developed a four
such as Craig’s List. Purveyors of child prostitu- factor framework that could be utilized in a semi-
tion can easily place advertisements complete structured setting in order to address Internet
with a physical description of available children specific issues during an assessment. This process
to potential consumers online (McCabe, 2008). can assist the clinician in obtaining information
sought from the offender, specifically addressing

802
Internet Crimes against Children

issues which would identify possible offense cycle variety of typologies (or classification systems)
dynamics. These four areas are: action, reflection, which attempt to identify a specific set of criteria
excitement, and arousal. In action, information based on the behavior demonstrated by the online
obtained is from questions addressing length of behaviors and processes of the offender. These
time on the Internet, contact with others, emotional typologies can permit a clinician or other evalu-
withdraw from significant others, degree of plea- ator to simplify and organize the complexities of
sure received from the activities, level of social the behaviors in order to understand similarities
isolation, images obtained or developed and sent. and differences in these offenses and offenders.
Reflection focuses on the offender’s level of preoc- However, it is imperative to note that the typology
cupation with re-living past experiences; details of should be a tool for understanding and assimilat-
other online persons contacted; breaking promises ing the behaviors, not a diagnosis.
about quitting; and difficulties in concentrating or Although Internet sex offenders have tradi-
keeping off-line. Excitement addresses degree and tional been presented on a dichotomous scale of
type of risks in accessing materials and persons; if “travelers” and “traders,” their behaviors are not
the materials were obtained while others were pres- always mutually exclusive and can be a part of a
ent (especially child pornography with children continuum which the offender can begin with the
present); if the offender corresponds with others viewing, obtaining, manufacturing, and sharing
with a sexual interest in children; and attempts to of child pornography and later manifest to the ac-
make contact with children. Arousal involves the tion of chatting online, grooming, and eventually
offender’s level of masturbation associated with meeting a minor for sexual purposes. A number of
online activities; changes in sexual behaviors more accurate typologies have been suggested in
since beginning online activities; changes in the recent year. For instance, Taylor & Quayle (2006)
receipt of images and text messages particularly identified four types: periodically prurient, fantasy
with children; material accessed (such as types of only offenders, direct victimization offenders, and
images, ages, and characteristics of the child); and commercial exploitation offenders; and Internet
if arousal happens with other non-child images. sexual offenders. Periodically prurient offend-
Understanding the dynamics of the Internet ers tend to access impulsively or out of general
offending process may help to formulate an expla- curiosity potentially as part of a broader interest
nation of online behaviors, particularly focusing in pornography (includes extreme pornography),
on which precipitous factors are utilized in the may not be related to a specific interest in children.
offender’s behavioral pattern. Such explanations Fantasy-only offenders are those who access/trade
should be developed in order to understand the images to fuel a sexual interest in children, and
motive, intent, and goal(s) of the offender. Un- may have no known history of contact sexual
derstanding the cycles or patterns of offending offending. Direct victimization offenders utilize
assist the clinician in identifying factors pertinent online technologies as part of a larger pattern of
to establishing treatment goals for the offender. contact and non-contact sexual offending, which
Unfortunately, the Diagnostic and Statistical includes child porn, and grooming of children
Manual of Mental Health Disorders, Fourth Edi- online in order to facilitate the later offline com-
tion, Text Revision, 2000 (DSM-IV-TR, 2000), mission of sexual offending. Commercial offend-
does not identify a specific diagnosis or diagnostic ers are criminally-minded offenders who produce
criteria for Internet sex offenders. Therefore, the or trade images to make money.
utilization of offense-specific typologies would Additionally, DeLong, (2009) identified
appear a logical instrument for the understanding three types of these offenders: circumstantial-
and classification of this population. There are a undersocialized, rebound-persistent, and sexually-

803
Internet Crimes against Children

compulsive Internet sexual offender. The circum- The application of typologies in the assessment
stantial-undersocialized offender’s characteristics process can help collate the information from col-
include: poor social/interpersonal relationships; lateral sources and that of the offender, thereby
poor emotional control/needy; opportunistic in assisting in the understanding and identification
their offense; they will typically contact and meet of cycle dynamics and behavioral patterns in order
their victim less than 24 hours to 1 day upon ini- to facilitate the development of treatment goals.
tial contact; they will have a fair knowledge of Important in the development of the typologies
Internet chat rooms; their motivation is to meet is Cusson’s (1993, in Taylor & Quayle, 2006)
emotional needs and fulfill sexual fantasies; their identified multi-stage explanation of the criminal
lack of confidence will also allow them to focus process with Internet sex offenders focusing on
on younger children; and, they will be willing to the tasks of search, pre-criminal situations, pre-
travel short distances, typically within 30 minutes criminal opportunity, and criminal tactics. This
from their residence in order to meet their victims; process identifies the following stages: 1) the of-
and, they might believe they have a positive and fender searchers for a need to find a pre-criminal
caring relationship with their victims and continue situation, 2) once found the pre-criminal stage is
their contact. The rebound-persistent offender introduced with the potential to commit an of-
includes: having a fairly stable relationships, but fense, 3) once the perceived payoff exceed the risk
act out due to perceiving problems within their re- for the offender, the pre-criminal opportunity is
lationships; they tend to engage in sexual fantasies established thereby allowing the offender to seek
regarding underage minors; they utilize Internet online communications, and 4) criminal tactics are
chat rooms in order to interact and establish a utilized in order for the offender to demonstrate a
sexual relationship with a minor; they’re need sequence of events for the act to occur. Although
driven, their planning is relatively limited; they seemingly well thought out, the offender does not
engage in chat for more than 24 hours in order take into account that the actions are restrictive
to develop a trusting relationship with the victim due to the physical limitation of the communica-
and have a better understanding of the victim’s tive processes and technologies (Taylor & Quayle,
circumstances; they have a good understanding 2006). Therefore, an important consideration
of Internet chat rooms; they also will travel 1 to involved in whether or not an offender will travel
2 hours in order to meet their intended victim; to engage a physical meeting with an intended
and, they might have limited contact with their victim, is the method of communication and ease
victim after their initial encounter. The sexually- of transmission regarding messages, images and
compulsive offender demonstrate relationships other items of interests for the offender (Elliot &
with others that tend to be superficial; likely have Beech, 2009; DeLong, et al., 2010).
good organization and planning; they are highly
sexual and need driven; have good verbal skills;
higher level of intelligence; have good knowledge ENFORCEMENT AND PREVENTION
and understanding of Internet chat rooms; they tend
to engage and groom their victim over a period of One way in which society is attempting to combat
time to gain their trust; they also will travel long this problem is through law enforcement efforts.
distances (over 2 hours); and, they will continually In 2006, there were 7,010 arrests in the United
engage in meeting other underage minors, as well States for Internet Crimes against Children, with
as possibly returning to a particular victim if they 95% of these cases resulting in guilty pleas or
deem the risk as low and they are comfortable convictions (Wolak et al., 2009). These inves-
with control over their victim. tigations may be initiated in response to a com-

804
Internet Crimes against Children

plaint from a victim’s family, a family member parents (Wolak et al., 2008). The true naivety in this
or acquaintance of the offender, or a concerned situation may be the fact that some young people
third party (e.g., computer technician or Internet consider high-risk behavior online as harmless
Service Provider). Law enforcement have also hijinks (Malesky, 2007). Accordingly, there is a
adopted several proactive strategies to confront need for developmentally appropriate prevention
this problem. The best known type of proactive strategies that target high-risk behaviors (e.g.,
investigation involves law enforcement officers visiting chat rooms, corresponding with strangers,
posing as minors online to identify men solicit- and discussing sexual matters online). Some ex-
ing sex from minors. Other proactive strategies amples include teaching children avoidance skills
involve officers posing as child pornography and educating adolescents about the problematic
traders or consumers, as well as portraying sex (and criminal) nature of sexual relationships with
offenders with access to children that can be sexu- adults (Wolak et al., 2008).
ally abused (Krone, 2005; Lanning, 2010). The
activities of law enforcement are clearly helpful
in responding to this problem. For example, the FUTURE RESEARCH DIRECTIONS
NJOVS collected data on cases involving proac-
tive investigations targeted at men soliciting sex As technology advanced, so did the opportunities
from minors online. Approximately 40% of those for the exploitation of children. Internet crimes
arrested also possessed child pornography, and against children constitute a serious albeit mis-
13% were actively molesting children as well understood problem. Child pornography is now
(Mitchell et al., 2005). Furthermore, not only do a worldwide problem with horrific consequences
child pornography investigations identify men for victims. The adults who are involved with this
who are actively sexually abusing children, they material often represent a very serious threat to
help disrupt pedophile networks and decrease the society. The online solicitation of minors is another
demand for this material (Krone, 2005). contemporary problem. However, the majority
An equally important way to confront this of these cases are consistent with statutory rape.
problem is to focus on taking steps to prevent Proactive police investigations, particularly into
minors from being victimized. Yet, it is imperative child pornography, are an especially value as-
that this approached in a realistic way. Widespread set in reducing Internet crimes against children.
publicity about predators using violence and deceit Moreover, realistic prevention strategies offer
to prey on innocent and naive children who are promise in further reducing online victimization.
using the Internet is mostly inaccurate (Wolak et As technology continues to expand with handheld
al., 2008). Many prevention messages are unfor- personal communication devices such as cellular
tunately misleading. For instance, making dire phones, opportunities for sex offenses against mi-
warnings to minors about online predators may nors will also expand. It is essential that society be
portray a false sense of the nature of the dangers aware of these possibilities, and be ready to act an
(Lanning, 2010). Similarly, suggesting that parents in adaptable fashion to prevent the victimization
install monitoring software and keep the home of children and adolescents. Since Internet crimes
computer in a public location is clearly well inten- against children are a new phenomenon, research
tioned. However, it overlooks the fact that young on this topic is in its infancy. A major direction
people can go online from a number of venues, in this area of research is further exploration of
often unsupervised and possibly in the presence the relationship between the online activities
of precocious peers. Prevention efforts need to be involving children and actual physical contact
primarily targeting children and adolescents, not sexual offenses.

805
Internet Crimes against Children

REFERENCES Krone, T. (2005). International police operations


against child pornography. Australian Institute
Alexy, E. M., Burgess, A. W., & Baker, T. of Criminology.
(2005). Internet offenders: Traders, travel-
ers, and combination trader-travelers. Jour- Lanning, K. V. (2010). Child molesters: A behav-
nal of Interpersonal Violence, 20, 804–812. ioral analysis. Washington, DC: National Center
doi:10.1177/0886260505276091 for Missing & Exploited Children.

Bourke, M. L., & Hernandez, A. E. (2009). The Malesky, L. A. (2007). Predatory online behav-
Butner Study redux: A report of the incidence of ior: Modus operandi of convicted sex offenders
hands-on child victimization by child pornogra- in identifying potential victims and contacting
phy offenders. Journal of Family Violence, 24, minors over the Internet. Journal of Child Sexual
183–191. doi:10.1007/s10896-008-9219-y Abuse, 16, 23–32. doi:10.1300/J070v16n02_02

D’Ovidio, R., Mitnam, T., El-Burki, J., & Shumar, Marcum, C. (2007). Interpreting the intentions
W. (2009). Adult-child sex advocacy websites of Internet predators: An examination of online
as social learning environments. International predatory behavior. Journal of Child Sexual
Journal of Cyber Criminology, 3, 421–440. Abuse, 16, 99–114. doi:10.1300/J070v16n04_06

DeLong, R., Durkin, K. F., & Hundersmarck, S. McCabe, K. A. (2008). The role of Internet service
(2010). An exploratory analysis of the cognitive providers in cases of child pornography and child
distortions of a sample of men arrested in Internet prostitution. Social Science Computer Review,
sex stings. Journal of Sexual Aggression, 16, 26, 247–251. doi:10.1177/0894439307301438
59–70. doi:10.1080/13552600903428235 Mitchell, K. J., Finkelhor, D., & Wolak, J.
DeLong, R. L. (2009). Developing a typology for (2005). The Internet and family and acquaintance
understanding internet sexual offenders. UMI sexual abuse. Child Maltreatment, 10, 49–60.
Publication. doi:10.1177/1077559504271917

Durkin, K. F., & Hundersmarck, S. F. (2008). Mitchell, K. J., Wolak, J., & Finkelhor, D. (2005).
Pedophiles and child molesters. In Goode, E., Police posing as juveniles to catch sex offend-
& Angus Vail, D. (Eds.), Extreme deviance (pp. ers: Is it working? Sexual Abuse, 17, 241–267.
144–150). Thousand Oaks, CA: Pine Forge Press. doi:10.1177/107906320501700302

Elliott, I. A., & Beech, R. (2009). Understanding Mitchell, K. J., Ybarra, M., & Finkelhor, D. (2007).
online pornography use: Applying sexual offense The relative importance of online victimization in
theory to Internet offenders. Aggression and understanding depression, delinquency, and sub-
Violent Behavior, 14, 180–193. doi:10.1016/j. stance abuse. Child Maltreatment, 12, 314–324.
avb.2009.03.002 doi:10.1177/1077559507305996

Holt, T. J., Blevins, K. R., & Burkert, N. (2010). Quayle, E., & Taylor, M. (2002). Pedophiles,
Considering the pedophile subculture online. Sexual pornography, and the Internet: Assessment issues.
Abuse, 22, 3–24. doi:10.1177/1079063209344979 British Journal of Social Work, 32, 863–875.
doi:10.1093/bjsw/32.7.863
Hughes, D. (2000). Welcome to the rape camp:
Sexual exploitation and the Internet in Cam-
bodia. Journal of Sexual Aggression, 6, 1–23.
doi:10.1080/13552600008413308

806
Internet Crimes against Children

Seto, M. (2010). Child pornography use and Wolak, J., Finkelhor, D., Mitchell, K., & Ybarra,
Internet solicitation in the diagnosis of pedo- M. L. (2008). Online “predators” and their victims:
philia. Archives of Sexual Behavior, 39, 591–593. Myths, realities, and implications for prevention
doi:10.1007/s10508-010-9603-6 and treatment. The American Psychologist, 63,
111–128. doi:10.1037/0003-066X.63.2.111
Seto, M., Hanson, K. R., & Babchishin, K. M.
(2011). Contact sexual offending by men with on-
line sexual offenses. Sexual Abuse, 23, 124–145.
doi:10.1177/1079063210369013 ADDITIONAL READING
Taylor, M., & Quayle, E. (2006). The Internet and DeLong, R., Durkin, K. F., & Hundersmarck, S.
abuse images of children: Search, pre-criminal (2010). An exploratory analysis of the cognitive
situations and opportunity. In Wortley, R., & distortions of a sample of men arrested in Internet
Smallbone, S. (Eds.), Situational prevention of sex stings. Journal of Sexual Aggression, 16,
child sexual abuse (pp. 169–195). New York, NY: 59–70. doi:10.1080/13552600903428235
Criminal Justice Press.
Elliott, I. A., & Beech, R. (2009). Understanding
Urbas, G. (2010). Protecting children from on- online pornography use: Applying sexual offense
line predators: The use of covert Investigation theory to Internet offenders. Aggression and
techniques by law enforcement. Journal of Violent Behavior, 14, 180–193. doi:10.1016/j.
Contemporary Criminal Justice, 26, 410–425. avb.2009.03.002
doi:10.1177/1043986210377103
Mitchell, K. J., Finkelhor, D., & Wolak, J.
Webb, L., Craissati, J., & Keen, S. (2007). Char- (2005). The Internet and family and acquaintance
acteristics of Internet child pornography offend- sexual abuse. Child Maltreatment, 10, 49–60.
ers: A comparison with child molesters. Sexual doi:10.1177/1077559504271917
Abuse, 19, 449–465.
Mitchell, K. J., Wolak, J., & Finkelhor, D. (2005).
Wolak, J., Finkelhor, D., & Mitchell, K. (2009). Police posing as juveniles to catch sex offend-
Trends in arrests of “online predators”. Durham, ers: Is it working? Sexual Abuse, 17, 241–267.
NH: Crimes Against Children Research Center. doi:10.1177/107906320501700302
Wolak, J., Finkelhor, D., & Mitchell, K. (2011). Quayle, E., & Taylor, M. (2002). Pedophiles,
Child pornography possessors: Trends in offender pornography, and the Internet: Assessment issues.
and case characteristics. Sexual Abuse, 23, 22–42. British Journal of Social Work, 32, 863–875.
doi:10.1177/1079063210372143 doi:10.1093/bjsw/32.7.863
Wolak, J., Finkelhor, D., & Mitchell, K. (2011).
Child pornography possessors: Trends in offender
and case characteristics. Sexual Abuse, 23, 22–42.
doi:10.1177/1079063210372143

807

View publication stats

You might also like