994 resultados para Child pornography


Relevância:

60.00% 60.00%

Publicador:

Resumo:

La présente étude propose une analyse historique de la légende urbaine des snuff movies. En premier lieu, elle se penche sur l’émergence de cette rumeur dans le paysage médiatique américain des années 70 tout en focalisant sur certains objets filmiques l’ayant crédibilisée, principalement les stag et les mondo movies. Ce mémoire analyse par la suite l’influence majeure de deux événements sur l’implantation de la légende urbaine dans l’imaginaire collectif, soit l’assassinat de Sharon Tate et la circulation du film de Zapruder. Après avoir étudié la persistance de la rumeur, cet essai focalise sur la promotion et l’exploitation de Snuff (1976) en plus de proposer une analyse de ce long métrage. Ensuite, il se penche sur deux types de représentations du snuff dans le cinéma de fiction ainsi que leurs impacts sur l’authentification de la légende urbaine. Il est d’abord question des mises en scène du snuff dans le cinéma populaire qui s’inspirent de la rumeur pour ensuite l’actualiser. Sont ensuite étudiées les représentations du snuff à titre de faux documents, soit ces œuvres qui tentent par divers procédés de se faire passer pour de véritables films clandestins et, de ce fait, authentifient l’objet auquel ils se réfèrent. Puisque cette étude analyse l’évolution médiatique de la légende urbaine, elle se conclut sur son déplacement du cinéma vers Internet et de sa nouvelle crédibilisation grâce aux vidéos macabres, à la pornographie juvénile et au récent cas Magnotta.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Cette thèse de doctorat analyse les processus et les actions des consommateurs de pornographie juvénile. Nous soutenons que l’univers des collectionneurs de pornographie juvénile se distingue par trois particularités : la préférence sexuelle, l’offre pornographique dans un monde immatériel et la sociabilité virtuelle. Afin de mettre cette thèse à l’épreuve, nous avons eu accès aux disques durs de 40 personnes condamnées pour des infractions de pornographie juvénile. La méthode de l’analyse informatique judiciaire (computer forensics) utilisée dans ce contexte a permis de recréer les événements entourant la collection d’images par ces personnes. De plus, un échantillon des images possédées par ces individus a été catégorisé selon l’âge et les actes posés sur les images (n = 61 244). En plus des nombreux points qu’il a en commun avec les collectionneurs d’objets populaires, les résultats montrent l’importance de la préférence sexuelle dans la perception et les stratégies du collectionneur, l’omniprésence des images de pornographie adulte dans les collections et la sociabilité virtuelle comme mesure d’efficacité dans la découverte des contenus. En outre, en créant quatre groupes différents en fonction de l’évolution de la gravité des images dans le temps, nous avons découvert que le groupe où il y a aggravation à la fois dans l’âge et dans la gravité des actes posés est le groupe le plus nombreux, avec 37,5 % des sujets. Les résultats de l’étude mettent également en évidence la pertinence de l’utilisation de l’informatique judiciaire dans les études en criminologie.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

La Explotación Sexual Comercial de Niñas, Niños y Adolescentes -ESCNNA, comprende diferentes formas de abuso infantil, tales como: Prostitución Infantil, Turismo Sexual Infantil y pornografía Infantil. La cooperación internacional es de vital importancia para lograr un control efectivo a nivel nacional e internacional y poder erradicar la actual problemática, ya que el tema es común en la sociedad internacional por superar las fronteras físicas y políticas de las naciones; como consecuencia de ello, el manejo que cada nación le da a esos temas es de interés de toda la comunicad internacional, además de que en algunos casos la efectividad de cada país en el logro de resultados en algunas de esas áreas solo se da en la medida en que cuenta con el apoyo internacional, no solo de los demás Estados , sino de ONG´s y de organismos internacionales especializados en el manejo de dichos temas como es la ESCNNA.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

La trata de niños es un fenómeno cada vez más relevante en el sistema internacional y ha generado importantes esfuerzos de cooperación de agencias internacionales como UNICEF y ECPAT. En ese sentido, ambos organismos han enfocado su actividad en las regiones donde se han registrado los mayores índices de violación de los Derechos Humanos. Este Estudio de Caso se ha centrado en el Sudeste Asiático continental conformado por Tailandia, Laos, Camboya, Vietnam, Singapur, Myanmar y Malasia; con el fin de determinar de qué manera han trabajado ambos organismos en la región y de qué forma han contribuido a la solución de esta problemática por medio de la firma de acuerdos internacionales, implementación de legislación nacional y programas de cooperación. A pesar del trabajo realizado no solo por entidades internacionales sino también por autoridades gubernamentales, no se ha observado una disminución real de las cifras.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Three-dimensional virtual environments (3dves) are the new generation of digital multi-user social networking platforms. Their immersive character allows users to create a digital humanised representation or avatar, enabling a degree of virtual interaction not possible through conventional text-based internet technologies. As recent international experience demonstrates, in addition to the conventional range of cybercrimes (including economic fraud, the dissemination of child pornography and copyright violations), the 'virtual-reality' promoted by 3dves is the source of great speculation and concern over a range of specific and emerging forms of crime and harm to users. This paper provides some examples of the types of harm currently emerging in 3dves and suggests internal regulation by user groups, terms of service, or end-user licensing agreements, possibly linked to real-world criminological principles. This paper also provides some directions for future research aimed at understanding the role of Australian criminal law and the justice system more broadly in this emerging field.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Una delle realtà criminali che ha maggiormente fruito delle innovazioni introdotte dalla “società dell’Informazione” è, senza dubbio, quella dell’abuso sessuale sui minori. Tra le differenti forme di abuso sessuale sui minori, si è scelto di affrontare il fenomeno della pedopornografia online in ragione del preoccupante diffondersi di questa forma di criminalità che, grazie all’implementazione delle tecnologie dell’informazione, ha assunto caratteri nuovi, per alcuni versi difformi dai “tradizionali” profili della pedofilia, che sollevano interrogativi e nuove sfide sia sul versante della repressione di queste condotte illecite, sia sul piano della prevenzione. Nell'ambito di questo contributo, saranno esaminate in particolare le politiche penali elaborate in due diverse realtà nazionali, l'Italia e la Francia, a partire da differenti punti di vista e ponendo particolare attenzione agli strumenti, normativi ed operativi, introdotti per reprimere lo sfruttamento sessuale dei minori legato alla dimensione virtuale.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

La prova informatica richiede l’adozione di precauzioni come in un qualsiasi altro accertamento scientifico. Si fornisce una panoramica sugli aspetti metodologici e applicativi dell’informatica forense alla luce del recente standard ISO/IEC 27037:2012 in tema di trattamento del reperto informatico nelle fasi di identificazione, raccolta, acquisizione e conservazione del dato digitale. Tali metodologie si attengono scrupolosamente alle esigenze di integrità e autenticità richieste dalle norme in materia di informatica forense, in particolare della Legge 48/2008 di ratifica della Convenzione di Budapest sul Cybercrime. In merito al reato di pedopornografia si offre una rassegna della normativa comunitaria e nazionale, ponendo l’enfasi sugli aspetti rilevanti ai fini dell’analisi forense. Rilevato che il file sharing su reti peer-to-peer è il canale sul quale maggiormente si concentra lo scambio di materiale illecito, si fornisce una panoramica dei protocolli e dei sistemi maggiormente diffusi, ponendo enfasi sulla rete eDonkey e il software eMule che trovano ampia diffusione tra gli utenti italiani. Si accenna alle problematiche che si incontrano nelle attività di indagine e di repressione del fenomeno, di competenza delle forze di polizia, per poi concentrarsi e fornire il contributo rilevante in tema di analisi forensi di sistemi informatici sequestrati a soggetti indagati (o imputati) di reato di pedopornografia: la progettazione e l’implementazione di eMuleForensic consente di svolgere in maniera estremamente precisa e rapida le operazioni di analisi degli eventi che si verificano utilizzando il software di file sharing eMule; il software è disponibile sia in rete all’url http://www.emuleforensic.com, sia come tool all’interno della distribuzione forense DEFT. Infine si fornisce una proposta di protocollo operativo per l’analisi forense di sistemi informatici coinvolti in indagini forensi di pedopornografia.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Internet service providers (ISPs) play a pivotal role in contemporary society because they provide access to the Internet. The primary task of ISPs – to blindly transfer information across the network – has recently come under pressure, as has their status as neutral third parties. Both the public and the private sector have started to require ISPs to interfere with the content placed and transferred on the Internet as well as access to it for a variety of purposes, including the fight against cybercrime, digital piracy, child pornography, etc. This expanding list necessitates a critical assessment of the role of ISPs. This paper analyses the role of the access provider. Particular attention is paid to Dutch case law, in which access providers were forced to block The Pirate Bay. After analysing the position of ISPs, we will define principles that can guide the decisions of ISPs whether to take action after a request to block access based on directness, effectiveness, costs, relevance and time.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The Internet poses a number of threats to the safety of young people. Using numerous examples, this article discusses a wide range of such threats, including: cyberstalking; the 'grooming' of potential victims of sexual abuse; a new 'wish list' scene (where teenagers encourage contact with potential abusers); the creation and distribution of child pornography; and the emergence of services that create child pornography to order. It is suggested that the latter has provided individuals with the ability to inflict sexual abuse on young people from a distance, an act the authors have termed virtual sex tourism. The final section of the article suggests that paedophiles and pornographers have been quick to adopt new technology as a means of concealing their activities. The article concludes by warning of the danger of overestimating or underestimating the threats described.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Advances in digital photography and distribution technologies enable many people to produce and distribute images of their sex acts. When teenagers do this, the photos and videos they create can be legally classified as child pornography since the law makes no exception for youth who create sexually explicit images of themselves. The dominant discussions about teenage girls producing sexually explicit media (including sexting) are profoundly unproductive: (1) they blame teenage girls for creating private images that another person later maliciously distributed and (2) they fail to respect—or even discuss—teenagers’ rights to freedom of expression. Cell phones and the internet make producing and distributing images extremely easy, which provide widely accessible venues for both consensual sexual expression between partners and for sexual harassment. Dominant understandings view sexting as a troubling teenage trend created through the combination of camera phones and adolescent hormones and impulsivity, but this view often conflates consensual sexting between partners with the malicious distribution of a person’s private image as essentially equivalent behaviors. In this project, I ask: What is the role of assumptions about teen girls’ sexual agency in these problematic understandings of sexting that blame victims and deny teenagers’ rights? In contrast to the popular media panic about online predators and the familiar accusation that youth are wasting their leisure time by using digital media, some people champion the internet as a democratic space that offers young people the opportunity to explore identities and develop social and communication skills. Yet, when teen girls’ sexuality enters this conversation, all this debate and discussion narrows to a problematic consensus. The optimists about adolescents and technology fall silent, and the argument that media production is inherently empowering for girls does not seem to apply to a girl who produces a sexually explicit image of herself. Instead, feminist, popular, and legal commentaries assert that she is necessarily a victim: of a “sexualized” mass media, pressure from her male peers, digital technology, her brain structures or hormones, or her own low self-esteem and misplaced desire for attention. Why and how are teenage girls’ sexual choices produced as evidence of their failure or success in achieving Western liberal ideals of self-esteem, resistance, and agency? Since mass media and policy reactions to sexting have so far been overwhelmingly sexist and counter-productive, it is crucial to interrogate the concepts and assumptions that characterize mainstream understandings of sexting. I argue that the common sense that is co-produced by law and mass media underlies the problematic legal and policy responses to sexting. Analyzing a range of nonfiction texts including newspaper articles, talk shows, press releases, public service announcements, websites, legislative debates, and legal documents, I investigate gendered, racialized, age-based, and technologically determinist common sense assumptions about teenage girls’ sexual agency. I examine the consensus and continuities that exist between news, nonfiction mass media, policy, institutions, and law, and describe the limits of their debates. I find that this early 21st century post-feminist girl-power moment not only demands that girls live up to gendered sexual ideals but also insists that actively choosing to follow these norms is the only way to exercise sexual agency. This is the first study to date examining the relationship of conventional wisdom about digital media and teenage girls’ sexuality to both policy and mass media.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Con el fin de la unipolaridad no sólo se fortalecieron mecanismos de gobernanza global como los Regímenes Internacionales, sino también se fortalecieron actores no estatales. A pesar de la importancia que tomaron estos dos elementos aún no existe una teoría que explique exhaustivamente la relación que existe entre ellos. Es por lo anterior que, la investigación busca responder de qué manera el rol de las Redes de Apoyo Transnacional ha incidido en la evolución del régimen de tráfico de personas en la Región del Mekong. Asimismo tiene como objetivo comprender las relación entre el Régimen y las Redes de Apoyo Transnacional a través de la formulación de un caso de estudio basado en metodologías cualitativas, específicamente, en el análisis teórico-constructivista y el análisis de contenido de documentos producidos por actores estatales y no estatales.

Relevância:

40.00% 40.00%

Publicador:

Relevância:

40.00% 40.00%

Publicador:

Resumo:

General note: Title and date provided by Bettye Lane.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Human trafficking and various other forms of child sexual exploitation on the United States-Mexico border are described from social science and law enforcement perspectives, including current laws and definitions, case examples, and descriptions of victims and traffickers. The Southern Border Initiative of the AMBER Alert Project is outlined as one effort to combat trafficking through collaboration between law enforcement agencies and programs in the United States and Mexico. Policy recommendations include increasing knowledge and collaboration between law enforcement, social service agencies, and judicial systems across the border region and between the United States and Mexico.