You are on page 1of 42

KEEPING-OFF THE CLAWS OF ONLINE PREDATORS: A PHENOMENOLOGICAL

STUDY FROM THE VICTIMS’ PERSPECTIVE

A Research Presented to the Faculty of the College


of Criminal Justice System Education
Isabela State University
Cauayan Campus

In Partial Fulfillment of the Requirements for the Degree


BACHELOR OF SCIENCE IN CRIMINOLOGY

By

Apostol, Bianca Dwayne B.


Daguro, Althea Marrhey A.
Miranda, Jr. Ronnie N.

June 2023
CHAPTER I
THE PROBLEM AND ITS BACKGROUND
Introduction
Adults connecting with children online with the intention of pressuring them into

engaging in illegal sex is the first step in crimes against minors that are made possible

by the internet. In some cases, face-to-face sexual abuse occurs.

There are problems with online predators in chat rooms, instant messaging,

Internet forums, social networking sites, mobile devices, and even gaming consoles.

Because they provide access for them to communicate with victims covertly, these

online spaces entice predators (Wolak, Janis, David et. al., 2013). Additionally, due to

concerns about children's privacy, there is a lack of sufficient, trustworthy data on the

percentage of minors that share personal information online (Dobler, Elizabeth, Johnson

et al., 2017). Additionally, the anonymity of online chats causes minors to become less

reserved, which increases their comfort level and likelihood to engage in harmful

behaviors (Dombrowski, Stefan, Gischlar et al., 2007). Predators can utilize this to their

advantage by manipulating their victims into giving in to their sexual advances (Dobler,

2017). When manipulating minors for the first time, it's common to expose them to

sexual behavior, show them pornography, and ask for and receive sexually explicit

information and images (Lanning, Kenneth, 2005). Most of the time, this online

predatory activity does not result in offline interaction (Wolak, Janis, David et. al.,

2013).

In addition, Syder (2005) noted that while predators will employ a variety of

techniques to meet their prey, the majority of real-world in-person encounters do not
entail deception. And offenders frequently enlist the help of kids, luring victims to meet

by making romantic and love-related promises. As evidenced by Kate (2014), who

asserts that youngsters who are lonely or have low self-esteem are frequently the

targets of internet predators. Online predators can present as someone very different

from who they really are. Some of those online are elderly people acting like children.

Some predators are also teenagers or young adults. Private chat sessions in chat rooms

are one way predators interact with kids. Because they could be looking for approval

and camaraderie that they aren't finding offline, children with learning and thinking

challenges are particularly vulnerable. Furthermore, they might not know how to end

unpleasant internet connections. The typical image of an online predator is that of a

middle-aged man living alone, without a job, and spending all of his time online "luring"

young children and teenagers (Diana, 2006). However, this "normal" stereotype may be

deceptive and may actually make it more difficult for parents to protect their kids from

predators online. Only three traits have been discovered to be strongly linked to

internet predators: Nearly 100% of them are male, 91% are white and non-Hispanic,

and 91% have a full-time employment (Lara, 2006).

Children who go online have easy access to friends, family, and complete

strangers, which can put them in serious danger. Online predators find it simple to prey

on kids who interact and converse with strangers. Online, where they may hide their

identities and move at will, predators have quick and anonymous access to youngsters.

Often, we have an idea of sexual predators lurking about schoolyards or hiding behind

bushes checking out their potential victims, but in actuality, today's predators hunt for

victims while huddling behind a computer screen, taking advantage of the anonymity
the Internet gives. Online predators are skilled in playing back emotionally what they

see in the child, (Michael, 2016)

Finding and chasing a child is viewed by predators as a game and a hunt. To get

the child to feel comfortable enough to share personal information, it takes a lot of

effort and patience over several months to tear down barriers. We call this procedure

"grooming." In order to prepare a youngster to become a victim, a predator may use

any number of techniques, including fishing, mirroring, luring, and fishing. When a child

looks to need something, predators provide it, either emotionally or by physically

seducing the child with gifts. Some kids will use the Internet to satisfy their emotional

needs when they're depressed, idle, or lonely. Since these kids are especially

susceptible to "grooming," they need to internalize the value of keeping their personal

information safe.

The objective of a predator is to seduce and influence a child into thinking that

they value your child more than his or her parents or other family members. A child's

trusted parent or guardian may be emotionally replaced in the child's mind by a fictional

online identity that a child's Internet predator has created. The tragedy of Internet

victims is that in addition to suffering bodily and psychological trauma, many of them

willingly met their "fictitious companion," which leaves them with emotions of remorse

and shame.

Online abuse is prevalent there because of a combination of poverty and

widespread internet access. In a poll of 20 children, 3 out of every 20 children reported

that they had been solicited for pictures of their private parts. 11 percent of those
polled stated they have been approached with offers of cash or gifts in exchange for

pictures of their privates. A comparable percentage claimed to have received cash or

gifts in exchange for meeting up in person to engage in sexual activity, while 13%

claimed to have faced threats or been subjected to blackmail. In the preceding year,

another 13% of respondents reported that sexual photographs of them had been

disseminated without their consent, and 17% reported that they had been forced to

discuss sex.

The way people communicate with one another has changed as a result of the

internet. It has become socially acceptable to develop relationships with individuals

online, especially with the younger generations (Wolak, Mitchell, & Finkelhor, 2003).

Concerns about people impersonating others with similar backgrounds in order to

obtain access to young people with the intention of sexually abusing them are a major

concern when it comes to the interactions that young people create online

(Dombrowski, LeMasney, Ahia, & Dickson, 2004). More than 77 million kids use the

Internet, and sexual predators may use it to access them, according to the U.S.

Department of Justice.

More specifically, this study sought to determine the different challenges

experienced by the victims, how they coped up, and the recommended preventive

measures on how to avoid being victimized by Online Predators.

THEORETICAL FRAMEWORK

The social interaction theory served as the theoretical framework for this study.

This theory explains the ways how people engage with one another. According to social
interaction theory, people’s social behaviors are determined by the social pressures they

encounter. What this means is that behavior is partly created in response to our

surroundings, specifically our social groups, Muscato, (2021).

Self-Control Theory suggests that people develop personal traits that control

individuals’ inability to refrain from crime. This latent trait, also identified as self-control,

appears in early childhood and remains stable over one’s lifetime.

In this study, the concept of Social Interaction Theory and Self-Control Theory

will be observed. The researchers will have to establish the connection between society,

norms, and values with the actions and perceptions of a victim of Online Predators

toward their experiences.

STATEMENT OF THE PROBLEM

This study seeks to determine the different measures to prevent being preyed by Online

Predators.

Specifically, it seeks to answer the following questions:

1. How did the respondents got preyed by Online Predators?

2. What are the challenges faced by the respondents after being victimized by

Online Predators in terms of:

2.1 Physical

2.2 Mental

2.3 Emotional
2.4 Social Aspect

3. How did the respondents coped up after being victimized?

SIGNIFICANCE OF THE STUDY

Online predators are one of the most common problems in our society. It should

be given enough time to talk and deal about it. The generalization of this present study

would be a great contribution to identify prevention and control about online predators.

Vital results of this investigation could be highly significant and beneficial

especially to the following:

For the government, upon reading the study, it can help them to provide

knowledge and learning on how to prevent and control online predators.

For the parents, to educate and prevent their children from being victimized by

online predators.

For young people of this generation, the results of this research will

strengthen the needs and learning of the young generation about prevention and

control of online predators.

For future researchers, research for further improvement is a new ending

process. Thus, for further researchers, the output of this study will also provide them

insights on what are lacking such that new findings will evolve.

SCOPE AND DELIMITATION OF THE STUDY


The respondents of this study will be the victims who were once preyed by

Online Predators and are now fully coped up and currently living in the City of Ilagan,

Isabela. Moreover, the respondents have been purposely selected by which the study

have focused to.

DEFINITION OF TERMS

To better understand the study, the following terms were defined operationally:

Claws. As used in this study, this refers to a word that denotes painfully jolting

grasping, scratching, or pulling. In figurative term, to have control over someone.

Deceit. As used in this study, this refers to false statements made with knowledge

that they are false with the intent to deceive a person receiving the statements, and the

liar expects the party receiving the statements to trust and rely on them.

Dis-inhibitions. As used in this study, this refers to a lack of restraint manifested in

disregard of social conventions, impulsivity and poor risk assessment.

Explicit. As used in this study, this refers to a fully revealed or conveyed without

ambiguity, implication, or vagueness, leaving no room for interpretation.

Keeping off. As used in this study, this refers to stop or prevent (someone or

something) from being on (something)

Minors. As used in this study, this refers to an individual who is not yet of legal age to

become an adult

Online Predators. As used in this study, this refers to internet users known as "online

predators" prey on children and teenagers for sexual and violent ends. Inappropriate
exposure of information and images, child grooming, sexual activity, online harassment,

and threatening behavior are some examples of this.

Prey. As used in this study, this refers to a person who is helpless or unable to escape

attack: victim.

Stereotype. As used in this study, this refers to a widespread, frequently unjustified,

and unfounded assumption about all individuals or things that share a certain trait.

Vulnerable. As used in this study, this refers to capable of being physically or

emotionally wounded. Open to attack or damage.


CHAPTER II

REVIEW OF RELATED LITERATURE AND STUDIES

The purpose of this literature review was to assess and analyze the prevention

and control found to address the research problem: the danger of online predators.

This thematic review will incorporate online historical data to support the research

problem. With the use of the historical information, children and society can become

more aware of these dangers.

Foreign Studies

Those who commit traditional crimes are the same people who commit

cybercrimes. This remains to be true when looking at sex offenders, sexual predators,

cyberbullies, and the crimes that they commit (PGI, 2016). The Internet offers ample

opportunities for sex offenders, sexual predators, and cyberbullies to hide. Often

Internet and social media users do not know whom they are talking to, making it easy

for predators and cyberbullies to find their victim (Rodriguez, 2016). Statistics show that

one out of seven teenagers receive requests for sexual content including, photos and
videos during their online activity (Department of Justice (DOJ) Document, 2014).

However, cyberbullying statistics show that 42 percent of teens in the United States

report being cyberbullied (No Bullying, 2016). These statistics show that not only are

everyday crimes such as fraud and burglary facilitated by the Internet, but also so are

sexual and nonsexual acts of abuse committed by online sexual offenders, sexual

predators, and cyberbullies.

Internet predators are finding new ways to prey on the vulnerabilities of youth in

chat rooms and lure them into sexual activities. This study will examine three chat room

transcripts between adult predators and adult volunteers of the group "Perverted

Justice" posing as youth. These conversations will be analyzed to interpret the

underlying meanings behind the words and actions of the predators and how they

affect potential victims. The purpose of this article is to provide insight to the reader of

the increased amount of child sexual abuse on the Internet, the often-blatant tactics

used by online predators to pursue this abuse, and how they are continuing to

successfully manipulate children with them.

In a one-year longitudinal study of 884 adolescents (Mean age = 15, 46% male),

we examined whether visiting chat rooms, using ICQ, using the Internet for general

entertainment, or participating in online gaming predicted changes in the quality of best

friendships and romantic relationships. Multiple regression analyses indicated that

Internet activity choice influenced later relationship quality in both best friendships and

romantic relationships. Using instant messaging (ICQ) was positively associated with

most aspects of romantic relationship and best friendship quality. In contrast, visiting

chat rooms was negatively related to best friendship quality. Using the Internet to play
games and for general entertainment predicted decreases in relationship quality with

best friends and with romantic partners. These findings reflect the important and

complex functions of online socialization for the development and maintenance of

relationships in adolescence (Blais, Craig & Pepler, 2007).

Online predators often pretend to be someone that they are not. Predators

commonly disguise themselves as teenagers when they are online. Many children feel

embarrassed and scared if they fall for predators’ tricks. In these cases, children

typically do what the predator asks of them, so they can avoid telling their parents what

happened (FBI, 2018). In 2014 Gerardo Perez, a 29-year-old man, pretended to be a

13-year-old boy and began talking to a 12-year-old girl (DOJ, 2017a). The girl sent

nude pictures of herself to Perez, who in masquerading as the boy asked the girl to do.

Predators commonly pretend to be around the same age of the child to make the child

feel comfortable talking to them (FBI, 2018).

In the study of Wolak (2016) indicates that the stereotype of the Internet

“predator” who uses trickery and violence to assault children is largely inaccurate. Most

Internet-initiated sex crimes involve adult men who use the Internet to meet and

seduce young adolescents into sexual encounters. Most such offenders are charged

with crimes, such as statutory rape, that involve non forcible sexual activity with victims

who are too young to consent to sexual intercourse with adults. Numbers suggest that

Internet-initiated sex crimes account for a salient but small proportion of all statutory

rape offenses and a relatively low number of the sexual offenses committed against

minors overall. Although online molesters take advantage of developmentally normal

adolescent interests in romance and sex, some youths may be particularly at risk. This
group includes boys who are gay or questioning their sexual orientations; youths with

histories of sexual or physical abuse; and those who frequent chatrooms, talk online to

unknown people about sex, or engage in patterns of risky off- or online behavior.

Although there is little research about online child molesters, they appear to occupy a

restricted range on the spectrum of the sex offender population and include few true

pedophiles or violent or sadistic offenders. We need frank, accurate prevention

programs for youths, thoughtful treatment for victims, and continued research. As

access to interactive Internet technologies broadens with the introduction and spread of

wireless and handheld technologies, such as cell phones and personal organizers, youth

Internet use could become harder to monitor, and accurate descriptions of and

education about risks to youths will become even more important.

Foreign Literature

The Internet provides sexual offenders and sexual predators easy access to a

large pool of potential teenage victims. There have been cases where teenage boys

have been the target and some cases where teenage girls have been the target.

According to the FBI, and the National Center for Missing and Exploited Children, 76

percent of sextortion cases online involved females, and 11 percent of the victims were

male, with the average age of victims being 15 years old (Rodriguez, 2015). Predators

tend to target females more than males. Predators also look for a specific group of

people to target as well; predators look for specific traits in their targets, and potential

victims. Predators look for those who seem to be lonely, have low self-esteem, or are

having trouble in their life, whether the trouble is at school, home, or in their social life.
Finally, predators look for someone who is looking for someone to talk to (Rodriguez,

2015). Predators often look for teens who are more likely to comply with sexual

requests by looking for those who are already posting provocative photos and sexual

content on social media (Wolak, Finkelhor, Mitchell, & Ybarra, 2008).

Many online child molesters use online communications to establish trust and

confidence in their victims, who typically are adolescents. Often, they introduce talk of

sex and then arrange to meet the adolescents in person for sexual encounters. In 89%

of cases with face-to-face meetings, offenders had sexual intercourse, oral sex, or

another form of penetrative sex with victims. Only 5% of meetings involved violent

offenses, mostly rape or attempted rape, while 16% involved coercion (i.e., victims

were pressured into having sex or doing sexual things that they did not want to do),

not all of which happened during the first meeting.6 Some victims (40%) who attended

face-to-face meetings were given illegal drugs or alcohol, exposed to adult or child

pornography (23% and 15%, respectively), or photographed in sexual poses (21%). A

few cases (3%) involved brief abductions that happened in the course of sexual

assaults, and 29% of victims who attended face-to-face meetings with offenders were

reported missing to police. Investigators described 24% of victims involved in face-to-

face meetings as runaways. Another 5% who were reported missing had lied about

their whereabouts to their parents, often claiming to be spending a night or a weekend

with a friend. Most offenders took time to develop relationships with victims.

Investigators described victims in half of the cases as being in love with or having

feelings of close friendship toward offenders. Sixty-four percent of offenders

communicated online with victims for more than 1 month before in-person meetings;
79% had telephone conversations; 48% sent pictures online to victims; and 47% sent

or offered gifts or money. Romantic and sexual involvements with adults during early

and mid-adolescence are associated with a range of negative outcomes and may result

in neglect of other important developmental tasks, such as academic performance.

Research has linked high teen-pregnancy rates to youths who have sex with older

partners. Young adolescents with older partners also have high rates of coerced

intercourse. Finally, early sexual activity itself is related to a range of risk behaviors,

from unprotected sex with multiple partners to substance abuse and delinquency.

Engaging in these activities bodes ill for youths in terms of mental health and academic

achievement. Furthermore, the trauma of some may be compounded by an awareness

that sexual pictures of themselves may be circulating online, if they complied with

perpetrators’ requests to send or have provocative pictures taken of them.

A general definition of a sex offender is someone who the state can criminally

charge with a sex crime, or a person who has pled guilty to a sex crime. A sex offender

is a person who is a onetime offender. New York State requires that a person found

guilty or charged with luring a child, rape, forceful touching, kidnapping, and sex

trafficking to register as a sex offender (Division of Criminal Justice Services, 2012).

After a sex offender is released from prison, the offender is required to register as a sex

offender. The purpose of this registry is to provide information about that offender to

the local communities and law enforcement agencies. The registry is a list of offenders,

where the offenders live, and why they are considered a sex offender (The United

States Department of Justice, 2015). If a sex offender does not update their

information on the registry, for example if he or she moves and they do not report it,
he or she can be found guilty of a federal crime (The United States Department of

Justice, 2015). Other consequences of becoming a registered sex offender are that the

person may have trouble finding a place to live, the offender is not allowed to

participate in any activity that involves children, and the person is limited to what they

can and cannot do on the Internet (The Umansky Law Firm, 2017). Some states such

as Pennsylvania, require someone to become a registered sex offender if found guilty,

or charged with the taking of nude photos of oneself, if that person is a minor. Thirteen

states in the US require someone to become a registered sex offender if they go to the

bathroom in public (Fuchs, 2013). Taking a nude photo of oneself as a minor and

going to the bathroom in public are actions that people may not realize, if charged with

and found guilty, would require them to become registered sex offenders (Fuchs,

2013).

While there are current cases of sexual abuse through the Internet and social

media, some cases date back to the early 2000’s (Jaffe, 2007). As technology

continues to develop, it is becoming harder to track online predators. The difficulty of

tracking online predators makes it easier for predators to get away with abuse

facilitated through the Internet and social media (Hernandez, 2012). With the creation

of the Internet and social media came a new type of sexual predator known as a

traveler. A traveler is a person who utilizes the Internet and social media to groom

their victim and then travels to meet them (Hernandez, 2012). Grooming is when the

sex offender or sexual predator gains the trust of their victim in order to gain access

and one on one time with the victim in the future. Before the Internet and social

media, when an offender or predator wanted access to a child, the offender often had
to gain the trust of the adults around the child as well (Candian Centre for Child

Protection, 2014). With the creation of the Internet, predators no longer have to gain

the trust of the adults around the children, because children are often allowed Internet

use without parental supervision or parental monitoring (Hernandez, 2012).

According to Jacqueline Vickery, there are other urgent concerns about young

people's online experiences besides porn, predators, and peers. We need to turn our

attention to inequitable opportunities for participation in a digital culture. Technical and

material obstacles prevent low-income and other marginalized young people from the

positive, community-building, and creative experiences that are possible online. Vickery

explains that cautionary tales about online risk have shaped the way we think about

technology and youth. She analyzes the discourses of risk in popular culture,

journalism, and policy, and finds that "harm-driven" expectations, based on a privileged

perception of risk, enact control over technology. "Opportunity-driven" expectations, on

the other hand, based on evidence and lived experience, produce discourses that

acknowledge the practices and agency of young people rather than seeing them as

passive victims who need to be protected. Vickery first addresses how the discourses of

risk regulate and control technology, then turns to the online practices of youth at a

low-income, minority-majority Texas high school. She considers the participation gap

and the need for schools to teach digital literacies, privacy, and different online learning

ecologies. Finally, she shows that opportunity-driven expectations can guide young

people's online experiences in ways that balance protection and agency. (S. Craig

Watkins, 2017)
Nearly 24 million youth, ages 10 through 17, were online regularly in 1999. Large

numbers of young people, when on the Internet, are encountering sexual solicitations

they do not want, sexual material they did not seek, and people who threaten and

harass them. A national survey described in this paper and administered to 1,501 young

people, ages 10 through 17, confirms many of these stories. It represents the first

scientifically based window into the risk’s youth face on the Internet, particularly

unwanted sexual solicitations and pornography. It includes information on how families

and young people are addressing matters of danger and protection on the Internet, and

suggests that although these unpleasant experiences affect a large number of youths,

few families do much about it. The report questions how to temper some of the

drawbacks of the Internet to protect young people, and highlights the need for public

and private initiatives to raise awareness and provide solutions. It suggests that

strategies to respond to the problem would aim to reduce offensive behavior, better

shield young people from its likely occurrence, increase the level of reporting, and

provide more help to youth and families to protect them from any consequences.

Children and young people encounter a range of risks on the internet relating to

communication. Making friends online has attracted particular attention as a risky

behaviour, especially when this leads to offline meetings, as has giving out personal

information online. This article, based on the ‘UK Children Go Online’ survey, seeks to

explain the online communication of 9–19-year-olds in terms of their offline socio-

psychological characteristics (shyness, life satisfaction, risk-taking), family

communication patterns and online behaviour/skills. Findings show that older teens

engage in more online communication activities than do younger children and so


encounter more communication risks. Although girls communicate more on the internet,

this seems not to put them more at risk. It was found that children's offline social

psychological characteristics, particularly their levels of life satisfaction and risk-taking,

influence their online communication, with different online communication activities

being predicted by different patterns of off- and online characteristics. There are weak

indications that, in families which have a more conversational style of communication,

teens may take fewer risks online, including a lower likelihood of meeting online friends

offline. Multiple regression analyses show that those children and teens who are less

satisfied with their lives and who have become more frequent and skilled internet users

are more likely to value the internet as a communicative environment in which they feel

more confident than they do offline, particularly in relation to the potential for

anonymous communication. Since this in turn leads some into risky activities, the

implications for research and policy are discussed.

The publicity about online “predators” who prey on naive children using trickery

and violence is largely inaccurate. Internet sex crimes involving adults and juveniles

more often fit a model of statutory rape—adult offenders who meet, develop

relationships with, and openly seduce underage teenagers—than a model of forcible

sexual assault or pedophilic child molesting. This is a serious problem, but one that

requires approaches different from those in current prevention messages emphasizing

parental control and the dangers of divulging personal information. Developmentally

appropriate prevention strategies that target youths directly and acknowledge normal

adolescent interests in romance and sex are needed. These should provide younger

adolescents with awareness and avoidance skills while educating older youths about the
pitfalls of sexual relationships with adults and their criminal nature. Particular attention

should be paid to higher risk youths, including those with histories of sexual abuse,

sexual orientation concerns, and patterns of off- and online risk taking. Mental health

practitioners need information about the dynamics of this problem and the

characteristics of victims and offenders because they are likely to encounter related

issues in a variety of contexts.

Professional psychologists should more fully understand the dangers of online

sexual solicitation and ways in which to protect youth from sexual predators who use

the Internet. Although the Internet has many positive aspects, one of the most

pernicious aspects is its potential use for online sexual predation. The Internet

represents a medium that allows sexual predators access to countless children in a

relatively anonymous environment. This article reviews the general strategies of sexual

perpetrators and their characteristics, as well as the online strategies and characteristics

of the cyber sexual predator. Information on how to protect children from this crime

through a review of technological, psychoeducational, and legal considerations is

provided. A description of the relevant laws as they relate to online solicitation and

practicing psychologists is also provided.

Chat rooms and social networking websites are places where internet predators

often go to solicit teens for sex. According to Bower (2008), most online sex offenders

are adults who contact vulnerable 13- to 17-year-olds and seduce them into sexual

relationships. Teenagers are often seeking gratification via the internet, and adults may

take advantage. User-generated media (UGM) like Facebook, MySpace and Twitter have

become tremendously popular over the last few years (Shao, 2009), and serve as teen
social gathering places to share photos and exchange gossip. According to Peter,

Valkenburg, Schouten and Alexander (2005), the internet is seen as a new social

environment in which universal adolescent issues such as identity, sexuality, and a

sense of self-worth are played out in a virtual world. An influential tradition in media

research, UGM presents media use in terms of the gratification or psychological needs

of the individual (Shao, 2009). This new social environment is growing both in the

United States and worldwide and has become woven into the everyday activity of most

teens. For example, OfCom (2013) report that 68% of children between the ages of 12

and 15 are social networkers, and 93% of 5 to 15 yearolds use the internet. The

probability that they are likely to meet a predator becomes increasingly common as

children enter their teenage years (Shannon, 2008), and the internet is increasingly

becoming the method which predators use to meet teen victims (Nissley, 2008). For

example, about five percent of offenders pretended to be teens while developing

relationships with adolescents online and often enter chat rooms to meet them. Further,

11% children aged between 9 and 16 had observed sexual images on the internet

during the previous year (National Society for Prevention of Cruelty to Children, 2013).

Educational strategies that target 13- to 17-year-olds directly and acknowledge normal

adolescent interests in romance and sex are needed (Wolak et al., 2010). The rising

popularity of the internet and the ever-increasing amount of time adolescents spend

online pose challenges to parents who want to protect their teenage children from

excessive internet use (van den Eijnden et al., 2010). Social networking sites offer

anonymity for both the teenager and the predator, which may decrease inhibition for

both the teenager and a potential predator.


Internet predators are finding new ways to prey on the vulnerabilities of youth in

chat rooms and lure them into sexual activities. This study will examine three chat room

transcripts between adult predators and adult volunteers of the group “Perverted

Justice” posing as youth. These conversations will be analyzed to interpret the

underlying meanings behind the words and actions of the predators and how they

affect potential victims. The purpose of this article is to provide insight to the reader of

the increased amount of child sexual abuse on the Internet, the often-blatant tactics

used by online predators to pursue this abuse, and how they are continuing to

successfully manipulate children with them.

According to Wollis (2016), current theory about online sexual predation

suggests that predators engage in a grooming process with their victims. Grooming

consists of three main stages: friendship and relationship forming, risk assessment and

exclusivity, and sexual. This thesis examines whether predators utilized different

patterns of language use across each of the stages that can be identified through

computerized text analysis. The transcripts of 43 convicted predators were spliced into

three equal sections according to word count and a computerized text analysis was

performed to look at the different types of language that are expected in each stage

based on grooming. The results reveal that predator language differs significantly

throughout the three stages of grooming, and that the grooming stages can predict

language patterns that are used most frequently in each stage. The theoretical and

practical implications of these findings are discussed in terms of grooming theory and

the use of computerized text analysis to identify predators and educate youth.
According to Kang (2016), Sexual exploitation of adolescents has been a long-

standing moral and legal challenge. Recent technological developments such as Social

Networking Sites have expanded the potential risk for exploitation, as the increased

autonomy and privacy presented by the digital revolution aids adolescents’ attempt to

fulfill their sexual curiosities, build relationships, and seek sensation. Online offenders

also take advantage of the functions provided by the Social Networking Sites as they

allow offenders to exploit adolescents by sampling potential victims and contacting

them directly. As a result, online sexual exploitation through Social Networking Sites

involves a dynamic interaction between victims and offenders. It is necessary to

investigate both the factors associated with adolescents’ vulnerability as well as

typologies of offenders. As one victim’s experience of sexual solicitation will differ from

other victims, it is impossible and even detrimental to adopt a universal legal response

to such cases. The chapter proposes legal reform that considers the offender–victim

dynamics in addition to preventive measures.

According to Toledo (2016) The vertebrate predators of post‐metamorphic

anurans were quantified and the predator–prey relationship was investigated by

analysing the relative size of invertebrate predators and anurans. More than 100

vertebrate predators were identified (in more than 200 reports) and classified as

opportunistic, convenience, temporary specialized and specialized predators.

Invertebrate predators were classified as solitary non‐venomous, venomous and social

foragers according to 333 reviewed reports. Each of these categories of invertebrate

predators was compared with the relative size of the anurans, showing an increase in

the relative size of the prey when predators used special predatory tactics. The number
of species and the number of families of anurans that were preyed upon did not vary

with the size of the predator, suggesting that prey selection was not arbitrary and that

energetic constraints must be involved in this choice. The relatively low predation

pressure upon brachycephalies was related to the presence of some defensive

strategies of its species. This compounding review can be used as the foundation for

future advances in vertebrate predator–prey interactions.

Some adolescents report finding solace in forming online relationships stating

that it is more comfortable to share personal information via the Internet than in a face-

to-face conversation (Gross, 2004). Unfortunately, a proportion of online relationships

result in victimization where youth are solicited and groomed by sex offenders to

participate in sexual and other harmful acts either on- or offline. Prior research indicates

that certain factors place some youth more at risk for being victimized online in

comparison to their peers (Mitchell, Finkelhor, & Wolak, 2001). Professionals in school

or health settings are likely to encounter adolescents who have been victimized online;

however, not all of these professionals routinely assess for risky online behaviors or

previous victimizations when working with teens (Wells, Mitchell, Finkelhor, & Becker-

Blease, 2006). In addition, these professionals may feel unprepared to address issues

related to online victimization and Internet safety (Finn & Kerman, 2004) as there is

limited information available in general on how to assist youth and their families with

Internet safety issues (see Rosen, 2007; Wolak et al., 2008). The purpose of this

chapter is to review the risk factors associated with online victimization as well as

describe the protective factors that promote Internet safety and prevent online

victimization from occurring.


According to (Armagh, 2018) Sex offenders have used the Internet to identify

and contact minors for sexual exploitation. Yet little is known about how these

individuals select their online victims. In order to gain a better understanding of this

behavior, the online activity of 31 men who perpetrated or attempted to perpetrate

contact sex offenses against minors they communicated with via the Internet, was

examined. Three-fourths of the participants monitored chat room dialogue and almost

one-half reviewed online profiles of minors in an attempt to identify potential victims.

Recommendations to increase the online safety of children and adolescents are

discussed.

Sanchez (2017) suggest that this may be a consequence of younger adults, who

came of age online, being more likely to seek out victims on the Internet than in other

venues. Alternatively, it seems possible that the Internet, and in particular the advent of

social networking, has simply increased the prevalence of social contacts between teens

and college-age adults, who may in turn be more likely to think of each other as peers,

even when the law does not. Cutting against that hypothesis is the finding that

predators were significantly more likely in 2006 than in 2000 to misrepresent

themselves as being teens as well. Still, the overarching finding is that neither the

Internet nor social networking sites pose unusual dangers for minors. As has always

been the case, the underaged are most likely to be the victims of sex crimes

perpetrated by acquaintances and family members, even if such cases are seldom

featured on To Catch a Predator.


Patricia Greenfield (2019) a psychology professor at UCLA, has studied chat

rooms for teens and reported that she found explicit sexual exchanges, joking about

physical violence and assaults, aggression, and disturbing exchange involving racial

prejudice. Even as a passive bystander that did not participate in the “chats,” she

received several instant messages making sexual advances. Chat rooms that were not

monitored were especially worrisome, but even those that were monitored were not

always successful at censuring that kind of material. For example, she learned that

teens used codes such as “A/S/L” (age, sex, location) to provide information that would

not have been allowed. And, although the chat rooms were supposed to be for teens,

there was no way to know how young or old any of the participants were. The common

stereotype of the online predator is that of a middle-aged man with no job who lives

alone and whose day is consumed with “luring” young children and teenagers through

the internet. But how accurate is this stereotype? Studies such as the National Juvenile

Online Victimization Study have attempted to answer this question as well as identify

other characteristics associated with online predators. Studies have found that this

“typical” stereotype can be misleading and can actually hinder parents from protecting

their children from online predators.

Local Literature

According to UNICEF (2019) The Philippines is one of the top global sources of

child sex abuse materials. In 2018 alone, 600,000 sexualized photos of Filipino children

were bartered and traded. The Philippine Kids Online Survey found that 90 percent of

Filipino children can access the Internet whenever they want or need to, and 59

percent connect to the Internet without supervision. It also revealed that 2 in 10


children are vulnerable to be victims of child online sexual exploitation and abuse.”

Online predators are making money by exploiting Filipino children. In a public bulletin

titled “Child Pornography in the Philippines,” the Anti-Money Laundering Council

reported suspicious transactions worth P113 million related to child pornography in the

first half of 2020, almost double the P65.8 million reported in 2019.

According to the CRC (2020) with the advent of rapid expansion and

advancement of Information Communication Technologies (ICTs), children have

become more exposed to various ICT platforms, making them even more vulnerable to

online sexual exploitation.  ICT devices such as smartphones, laptops, and tablets make

online-negotiated and facilitated operations very much accessible and affordable for

pimps or sex predators. In most cases, sex predators use social media sites, dating

sites, and classified advertisement sites to transact OSEC. OSEC offenders normally use

internet communications such as instant messages, e-mail, and chatrooms to meet and

develop intimate relationships with their victims. In most cases, those who are likely to

be child victims of OSEC are children who are not protected from inappropriate

materials circulating on the internet, which makes them more at risk and vulnerable to

online sexual solicitation and priming. Moreover, child victims of OSEC in most cases

come from poor dysfunctional families, broken homes, have absentee parents, are

children of overseas foreign workers (OFWs), have parents with poor parenting

practice, and parents who are engaged in criminal activities and vice like substance

abuse and addiction. Child victims who come from these types of parents or families

usually lack guidance, support, and nurturing from their parents, families, and

communities. Although poverty is still the compelling push factor in the decision to


engage in online commercial sex, other emerging factors lure children or their families

into the trade. These include consumerism, materialism, media influences, and peer

pressure.

The Philippine National Police Anti-Cybercrime Group (PNP-ACG) has obtained

two warrants to disclose computer data (WCDC) ordering social media giant Facebook

and video platform YouTube to disclose information and other content posted on a

page allegedly promoting sexual exploitation. Based on the warrants issued on July 20

and 28, a cybercrime court in Manila ordered the two platforms to preserve data of the

accounts linked to the page 'Usapang Diskarte' which would be used as evidence by the

ACG's Women and Children Cybercrime Protection Unit (WCCPU) in the filing of a case

against the page's operator. The warrants have already been endorsed by the court to

the Department of Justice - Office on Cybercrime (DOJ-OOC) for implementation

pursuant to the rule on cybercrime warrants issued by the Supreme Court. The page

‘Usapang Diskarte’ is allegedly filled with content promoting sexual abuse and

exploitation of children. The account has over 250,000 subscribers/followers connected

to a group of sexual predators.The page's profane contents, which include tips on how

to lure a minor to have sex with an older person, drew flak from netizens who

demanded the takedown of its illicit videos circulating online. Meanwhile, ACG director

Brig. Gen. Joel Doria encouraged netizens who may have information about ‘Usapang

Diskarte’ and people who felt they were abused by its viral posts to come forward and

report to the ACG office.

The Internet can be a risky place, especially for children or minors. Before the

Covid-19 pandemic, concerned parents had a tough time keeping their kids off the
Internet. When home quarantines were mandated and classes moved online, the

challenge of monitoring children’s Internet activities multiplied. From The Associated

Press: “Study: Philippines a global hot spot for online child abuse.” The United Nations

International Children’s Emergency Fund has confirmed that the Philippines has become

the global epicenter of the live-stream sexual abuse trade, and many of the victims are

children.

The Philippine Long Distance Telephone Co. Inc. (PLDT) and its wireless unit

Smart Communications Inc. (Smart) on Wednesday urged parents to monitor their

children's internet use as a precaution against online sexual predators. PLDT and Smart

Stakeholder Management Executive Jose Rosete said in a statement that the internet,

computers and gadgets can be dangerous as the youth are vulnerable to sexual

predators online. Rosete said that alarmingly, the Philippines is now the biggest supplier

of child sexual abuse materials online based on data from international sources. Citing

mobile gaming as an example, he said it has become easy for sexual predators to lure

young gamers into doing seemingly harmless acts, like showing themselves half-naked

in exchange for game tokens, badges and upgrades. He added that more than half of

the victims of this scheme are boys.

The DOJ has vowed to crack down on online sexual predators that victimize

minors in the country. “We are aware of the rising number of online sex trafficking in

the country. We will not tolerate this as a nation. We need to go after these online

sexual predators because they continue to pose a threat to the future of this nation,”

Marcos told reporters on Aug. 23. A Philippine foundation reported 202,605 cases of

online child abuse during lockdowns in 2020 compared to 76,251 cases reported in
2019. “Online sexual abuse and exploitation of children is a silent pandemic". “More

children are at risk from online sexual abuse and exploitation amid the Covid-19

pandemic as family’s resort to easy money due to deepening poverty, while children are

still not allowed to leave homes,” according to a report by the Save the Children Fund.

It said the Covid-19 pandemic was no longer “just a health crisis” but “a child rights

crisis” that must be addressed by state authorities. “Online sexual abuse and

exploitation of children is a silent pandemic that has permanent, and devastating effects

on children’s mental health and psychosocial well-being,” it said adding that parents

and other adults should provide the necessary support and guidance to help protect

children.

The Philippines has become the global epicenter of live stream sexual abuse,

based on a study by the United Nations International Children’s Education Fund

(UNICEF) in 2016. UNICEF’s findings showed that 80% (8 out of 10) of children in the

Philippines are vulnerable to being victims of online sexual abuse or bullying. It was

also found that 2.5% of children in the country have had their nude bodies or sexual

activities shown on the Internet or on a cellphone.

Malacañang on Thursday vowed to hold predators accountable for their crimes

following a spike in online child sex abuse across the country amid the coronavirus

pandemic. Presidential Spokesperson Harry Roque made this remark after the United

Nations International Children's Emergency Fund (UNICEF) reported a 260-percent

increase in reports of online child abuse materials from March to May when the country

was in a strict lockdown. He said he would relay the report to the Philippine National

Police (PNP) and the National Bureau of Investigation (NBI).


The Philippines is the world’s largest known source of cases of online sexual

exploitation of children (Osec), according to a study released in May. The IJM defines

Osec as the production, for the purpose of online publication or transmission, of visual

depictions (e.g., photos, videos, live streaming) of the sexual abuse or exploitation of a

minor for a third party who is not in the physical presence of the victim, in exchange for

compensation. According to the study entitled “Online Sexual Exploitation of Children in

the Philippines: Analysis and Recommendations for Governments, Industry and Civil

Society,” 64 percent of Philippine Osec cases from 2010-2017 started with referrals

from international law enforcement agencies, and over this period, the Philippines

received a whopping 76 percent of all referrals of Osec cases made by international law

enforcement agencies investigating customers in their countries. The Philippines

received 237 referrals. Mexico was a far second with 27 referrals; followed by Brazil,

19; India, 18; Thailand, five; Romania, four; and Cambodia, three, according to the

study led by the IJM in partnership with the US Department of State Office to Monitor

and Combat Trafficking in Persons, and the Philippine Inter-agency Council Against

Trafficking. Most of the international referrals involved customers from the United

States (31 cases), Sweden (11 cases), Australia (seven cases), and the United Kingdom

(four cases). There were also customers from Canada, Ireland, the Netherlands,

Norway and Israel. The Philippines’ large English-speaking population, availability of

cheap broadcast-capable mobile devices and internet access, and strong money

remittance infrastructure were seen as factors that enabled traffickers to get into the

business of directing or committing the contact abuse of children for the remote viewing

of foreign clients.
Philippines – Authorities have filed charges against a suspected online predator

for allegedly abusing more than two dozen children in Iligan, a city where the rate of

such crime has been described as alarming. Police on Tuesday, October 25, identified

the suspect as Rafman Sultan Gara, a 27-year-old man from Marawi City who used the

name Agila Gara on Facebook and other social media platforms. Iligan prosecutors

approved the filing of a case against Gara for violation of Republic Act 11930 or the

Anti-Online Sexual Abuse or Exploitation of Children and Anti-Child Sexual Abuse or

Exploitation Materials Act before a regional court. Iligan police chief Colonel Dominador

Estrada said evidence seized from Gara showed that he exploited and abused at least

29 children.

Local Studies

This study looks into the phenomenon of OSAEC in the Philippines, from the

child’s exposure and rescue, to the reporting and prosecution of cases, and the

intervention provided to the child. The study objectives were classified into four main

areas: a) child victims, b) offenders, c) private sector, and d) case resolution and

management. This was done to produce a data-driven guide for policy makers and

various stakeholders who are invested in preventing and combatting the said

phenomenon. The different institutions and agencies that respond and cater to the child

victim survivors and their families may also apply the research team’s recommendations

when developing better programs and interventions.

CHAPTER III

RESEARCH DESIGN AND METHODOLOGY


This chapter explains the method adopted by this research. This chapter will

mention every component involved in conducting this research from population,

population frame and sampling techniques used for the interview. Finally, this chapter

will provide a detailed explanation of the selected mode of analysis used and data

collection method.

RESEARCH DESIGN

In this study, the researchers utilized a qualitative design in which data is not

countable. Qualitative research method was developed in the social sciences to enable

researchers to study social and cultural phenomena: observe feelings, thoughts,

behaviors and the belief of the respondents. Since the purpose of this study is to

understand the experiences and how the victims coped up after being victimized, we

used a phenomenological approach in order to narrate as to what happened based on

their own perspective, (Neuber, 2019).

LOCALE AND POPULATION OF THE STUDY

The respondents in this research will be the victims of online predators which

suffers different types of harassment via online. Snowball sampling was used in this

study, a non-probability technique where the current research participants are asked to

assist the researchers in identifying other potential subjects who has the same

knowledge and experience as to the said phenomenon.

This research took place in City of Ilagan, Isabela where some victims of online

predators are living.

DATA GATHERING TOOL


The researchers will use guide questions in gathering the data composed of

standardized, open-ended interview - where open-ended questions are asked to all

interviewees; this approach facilitates faster interviews that can be more easily

analyzed and compared. Interview consist of a series of questions accompanied by

respondent answers. The aim of this qualitative research interview is to explain and

interpret the meanings of central themes in the subjects' experiences. The primary goal

of this project is to understand the sense of what the interviewees says.

DATA GATHERING PROCEDURES

Initially, the researchers consulted the research adviser and composed a letter

consisting of permission requesting the conduct of the study was passed to the

research instructor upon the permission of the Research Director and the Dean of the

department of CCJE in order to start the study. Then, communicated and made a letter

for the respondents and to the individuals who was involved in conducting the study to

ask for their agreement in participating to the study. After obtaining the respondent’s

consent, the researchers formulated open-ended questions and seeks approval from the

research adviser. All information gathered was kept confidential as promised to the

respondents. Lastly, after the gathering and collection of data from the respondents,

the researchers preceded to the interpretation and canalization of data where all data

collected were carefully studied.

TREATMENT OF DATA

We have interpreted our data with the use of prescriptive analysis for it is the

most advanced form of analysis, as it combines all of your data and analytics, then

outputs a model prescription: What action to take and works to analyze what action to
take in multiple scenarios, predict the outcome of each, and decide which is the best

course of action based on the findings. It can be very helpful and essential especially

because our research is about Online Predators and on how to prevent and control it.

ETHICAL CONSIDERATIONS

For ethical considerations, the researchers carried out the study with the

approval of the research adviser and the Dean of the Department. Since the study will

tackle about the respondent’s private life, all participants reported their written

acceptance regarding their voluntary participation and that they were free to withdraw

from it at any point and for any reason. Next to this, participants were fully informed

regarding the objectives of the study, while they were reassured that their answers

were treated as confidential and used only for academic purposes and only for the

purposes of the particular research. For further assurance of the respondent’s

confidentiality, they will be identified and referred using pseudonyms, so that their real

names wouldn’t be disclosed. Except from the above, participants were not harmed or

abused, both physically and psychologically, during the conduction of the research. In

contrast, the researcher attempted to create and maintain a climate of comfort.


REFERENCES

A. BOOKS

Blais, J.J., Craig, W.M., Pepler, D. et al. Adolescents Online: The Importance of Internet

Activity Choices to Salient Relationships. J Youth Adolescence 37, 522–536

(2008). https://doi.org/10.1007/s10964-007-9262-7

Call, M. E., & Burrow-Sanchez, J. J. (2010). Identifying risk factors and enhancing

protective factors to prevent adolescent victimization on the Internet.

In Adolescent online social communication and behavior: Relationship formation

on the Internet (pp. 152-166). IGI Global.

https://www.igi-global.com/chapter/identifying-risk-factors-

enhancingprotective/39296

Charles, A. T., (2017). The Abuse of Teenagers by Online Predators Facilitated Through

the Internet and social media.  Utica College ProQuest Dissertations Publishing.

Dobler, Elizabeth; Johnson, Denise; Wolsey, Thomas DeVere (2017, January

23). Teaching the Language Arts: Forward Thinking in Today's Classrooms

Dombrowski, S. C., LeMasney, J. W., Ahia, C. E., & Dickson, S. A. (2004). Protecting

Children from Online Sexual Predators: Technological, Psychoeducational, and

Legal Considerations. Professional Psychology: Research and Practice, 35 (1), 65–

73. https://doi.org/10.1037/0735-7028.35.1.65

Dombrowski, Stefan C.; Gischlar, Karen L.; Durst, Theo (May 1, 2007). "Safeguarding

young people from cyber pornography and cyber sexual predation: a major
dilemma of the internet". Child Abuse Review. Oxford, England: Wiley. 16 (3):

153–170. doi:10.1002/car.939

Lanning, Kenneth (2005). "Compliant Child Victims: Confronting an Uncomfortable

Reality". ASPAC Advisor: 14.

Troup-Leasure, Karyl; Snyder, Howard N. (August, 2005). "Statutory rape known to law

enforcement". Juvenile Justice Bulletin .

Wolak, J., Finkelhor, D., Mitchell, K. J., & Ybarra, M. L. (2010). Online “predators” and

their victims: Myths, realities, and implications for prevention and

treatment. Psychology of Violence, 1(S), 13–35. https://doi.org/10.1037/2152-

0828.1.S.13

Wolak, J., finkelhor, d., Mitchell, K., & Ybarra, M. (2008). Online Predators and Their

Victims. Myths, Realities, and Implications for Prevention and Treatment.

https://cyber.harvard.edu/sites/cyber.law.harvard.edu/files/amp%20final.pdf

B. JOURNALS

Baghurst, T., Alexande, R., & Tapp, T. (2014). Ways To Protect Students from Online

Predators. Academic Exchange Quarterly Spring 2014 ISSN 1096-1453 Volume

18, Issue 1. http://www.rapidintellect.com/AE/8-5414v4.pdf

Livingstone, S., & Helsper, E. J. (2007). Taking risks when communicating on the

Internet: the role of offline social-psychological factors in young people’s

vulnerability to online risks, pp. 614-644.

https://www.tandfonline.com/doi/abs/10.1080/13691180701657998
Malesky Jr, L. A. (2007). Predatory online behavior: Modus operandi of convicted sex

offenders in identifying potential victims and contacting minors over the

Internet. Journal of child sexual abuse, 16(2), 23-32.

https://www.tandfonline.com/doi/abs/10.1300/J070v16n02_02

Marcum, C. (2017) Interpreting the intentions of Internet Predators: An Examination of

Online Predatory Behavior. Journal of Child Sexual Abuse, v16 n4 p-99-114.

https://eric.ed.gov/?id=EJ841197

Toledo, L. F., Ribeiro, R. S., & Haddad, C. F. (2007). Anurans as prey: an exploratory

analysis and size relationships between predators and their prey. Journal of

Zoology, 271(2), 170-177.

https://zslpublications.onlinelibrary.wiley.com/doi/abs/10.1111/j.1469-

7998.2006.00195.x

Vickery j., (2018, September 11). Worried about The Wrong Things. Youth, Risk, and

Opportunity in the Digital World, 360pp., 6x9 in, 9 b&w illus.

https://mitpress.mit.edu/9780262536219/

Wolak, Janis; Finkelhor, David (2013, December 1). "Are Crimes by Online Predators

Different from Crimes by Sex Offenders Who Know Youth In-Person?". Journal of

Adolescent Health. San Diego, California: Society for Adolescent Health and

Medicine.  doi:10.1016/j.jadohealth.2013.06.010

Wollis, M. A. (2011). Online Predators: A Linguistic Analysis of Online Predator

Grooming. https://ecommons.cornell.edu/handle/1813/23125
Yang, L. K. (2016). Protecting youth from dangerous media: online predators.

In Adolescents, rapid social change, and the law  (pp. 75-92). Springer, Cham.

https://link.springer.com/chapter/10.1007/978-3-319-41535-2_4

C. Internet Sources

Businessmirror (2021). Saving our children from online predators. Retrieved on

December 01, 2022 from https://businessmirror.com.ph/2021/02/09/saving-our-

children-from-online-predators/

Caliwan, C. L. (2022). ACG secures ‘cyber warrants’ vs. FB page promoting sexual

abuse. Retrieved on December 04, 2022 from

https://www.pna.gov.ph/articles/1182450

Calleja, J. P. (2022). Philippines to go after online sex predator. Retrieved on December

02, 2022 from https://www.ucanews.com/news/philippines-to-go-after-online-

sex-predators/98531

Cuerto, F. S. (2022). PH youth prey for online sexual predators. Retrieved on December

09, 2022 from https://www.manilatimes.net/2022/12/08/news/ph-youth-easy-

prey-for-online-sexual-predators/1869476
Gotinga (2022) Study finds 2 million kids in this country may have been targets of

Online sex Predators. Retrieved on November 28, 2022 from

https://www.vice.com/en/article/pkp5pn/sexual-abuse-online-the-philippines

Joseph (2022) Online Safety. Retrieved on November 28, 2022 from

https://kidshealth.org/en/parents/net-safety.html

Kelly (2014) 9 Ways to Protect Your Child from Online Predators. Retrieved on

November 28, 2022, from https://www.understood.org/en/articles/9-ways-to-

protect-your-child-from-online-predators

Kruat (2022) Children and Grooming/ Online Predators. Retrieved on November 28,

2022 from https://childsafety.losangelescriminallawyer.pro/children-and-

grooming-online-predators.html

Lim, C. A. (2020). Filipino children most appealing to global online sex predators.

Retrieved on December 03, 2020 from https://ph.news.yahoo.com/filipino-

children-most-appealing-global-152600302.html?

guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_refe

rrer_sig=AQAAADzwvCWo2u95tNP9NluJOeCpg5dzQRihM_56ySbY-

IKsrEKIA5UNRx5WxcFwta5rkvRY1k_-nZH-1djcUD6msKH4OHKVL-

stPeES746Zd0bXrecmArYeVCRztbjb6nN2IvX0ZwM7sHMZaLXTkG8B-

uIRcYP4OKM3eXgZk9oviEW1

Manos, M. (2020). Iligan cops file charges vs. man for alleged online sexual abuse of 29

kids. Retrieved on December 03, 2022 from


https://www.rappler.com/nation/mindanao/iligan-police-charge-suspect-abused-

kids/

Melissa, M., (FBI) Predators/Traffickers: Introduction Profile of a Predator. Retrieved on

November 28, 2022 from https://internetsafety101.org/predator101-intro

Muscato (2021) Social Interaction Theory, Social Roles and Presentation of Self.

Retrieved on November 29, 2022 from https://study.com/academy/lesson/social-

interaction-theory-social-roles-the-presentation-of-self.html#:~:text=According

%20to%20social%20interaction%20theory,surroundings%2C%20specifically

%20our%20social%20groups.

Parrocha, A. (2020). Online abuser to be held accountable. Retrieved on December 02,

2022 from https://www.pna.gov.ph/articles/1123760

Sanchez, J. (2009). Study: online sexual predators not like popular perception.

Retrieved on November 30, 2022 from

https://arstechnica.com/tech-policy/2009/04/study-tracks-changing-profile-of-

online-sexual-predators/

Tarroja, M. C., et al (2019). National Study on Online Sexual Abuse and Exploitation of

Children in the Philippines. Retrieved on December 04, 2022 from

https://www.unicef.org/philippines/media/2601/file/National%20Study%20on

%20Online%20Sexual%20Abuse%20and%20Exploitation%20of%20Children

%20in%20the%20Philippines%20-%20Executive%20Summary.pdf
Uy, A. M. (2020). Philippinis: Online Child Sexploitation Hotspot. Retrieved on

December 01, 2022 from https://theaseanpost.com/article/philippines-online-

child-sexploitation-hotspot

World Hope International (2020). OSAEC: A Modern Face of Human Trafficking.

Retrieved on December 02, 2022 from https://www.worldhope.org/osec-a-

modern-face-of-human-trafficking/

Zuckerman (2006) Online Predators: What do we know and What can we do? Retrieved

on November 28, 2022 from https://www.center4research.org/online-predators-

know-can/

You might also like