Professional Documents
Culture Documents
Learning Outcomes
Define interpersonal cybercrime
Define and differentiate between types of interpersonal cybercrime
Describe and analyse the ways in which information and communication technology
is used to facilitate these types of interpersonal cybercrime
Identify and critically engage with the role of law in addressing these cybercrimes
Recognize and assess the obstacles to responding to and preventing various
interpersonal cybercrimes
Key issues
Online child sexual abuse and online child sexual exploitation involve the
use of information and communication technology as a means to sexually abuse
and/or sexually exploit children.
The United Nations Economic and Social Commission for Asia and the Pacific (UN
ESCAP) (1999) defines child sexual abuse "as contacts or interactions between a
child and an older or more knowledgeable child or adult (stranger, sibling or
person in a position of authority such as a parent or caretaker) when the child is
being used as an object for the older child's or adult's sexual needs. These
contacts or interactions are carried out against the child using force, trickery,
bribes, threats or pressure."
Child sexual exploitation involves child sexual abuse and/or other sexualized
acts using children that involves an exchange of some kind (e.g., affection, food,
drugs, and shelter)
Perpetrators of this crime commit abuse or attempt to abuse "a position of
vulnerability, differential power, or trust for sexual purposes" for monetary or
other benefit (e.g., sexual gratification).
Cyberstalking and cyberharassment
The use of ICT by children around the world has been steadily increasing, with
children of younger ages having access to and using various forms of digital
technology and the Internet. While ICT provides children with the ability to
communicate with others, access and share information, and form
relationships, it also puts children's safety at risk and exposes them to
cybercrimes, such as cyberbullying.
Cyberbullying involves children's use of ICT "to annoy, humiliate, alarm,
insult or otherwise attack" other children (Maras, 2016, p. 254). Therefore, in
contrast to cyberstalking and cyberharassment, children are both the
perpetrators and victims of this cybercrime.
Children who engage in cyberbullying utilize text messages, emails, websites,
blogs, polls, social media posts, instant messages, and gaming and virtual
reality sites, to humiliate, denigrate, harass, insult, spread false information,
gossip or rumours, threaten, and/or isolate, exclude and marginalize other
children.
Gender-based interpersonal cybercrime