994 resultados para child pornography


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study found that Internet child pornographers (ICP) reported significantly less optimal attachment than non-offenders, matched child and matched adult sexual offenders. ICP also reported a more negative view of self than non-offenders and the matched sexual offender groups. Finally, the ICP group reported more social avoidance and distress than non-offenders. The portfolio explores the influence of treatment readiness on the best practice principles when working with violent offenders in relation to their assessment, and subsequent treatment recommendations. The importance of treatment readiness and its utility in relation to these principles is highlighted in four case studies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The legal definition of child pornography is, at best, unclear. In part because of this ambiguity and in part because of the nature of the crime itself, the prosecution and sentencing of perpetrators, the protection of and restitution for victims, and the means for preventing repeat offenses are deeply controversial. In an effort to clarify the questions and begin to formulate answers, in this volume, experts in law, sociology, and social examine child pornography law and its consequences. Focusing on the roles of language and crime definition, the contributors present a range of views about the increasingly visible role that child pornography plays in the national conversation on child safety, as well as the wisdom of the punishment of those who produce, distribute, and possess materials which may be considered child pornography.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

General note: Title and date provided by Bettye Lane.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

In 2008, the Australian federal Senate held an Inquiry into the Sexualisation of Children in the Contemporary Media Environment. I made a submission to this Inquiry, noting that in public debate about this topic a number of quite distinct issues, with distinct aetiologies, were collapsed together. These included: child pornography; children being targeted by any form of marketing; young people becoming sexually active; sexual abuse of children; raunch culture; protecting children from any sexualised material in the media; and body image disorders. I suggested that commentators had collapsed these issues together because the image of the helpless child is a powerful one for critics to challenge undesirable aspects of contemporary culture. The result of many different ideological viewpoints all using the same argument - that the forms of culture they didn't like were damaging children - gives the impression that there is no element of culture today that isn't (somebody claims) causing harm to children: everything is child abuse. The danger of such discourses is that they draw attention away from the real harm that is being caused to children by sexual and other forms of maltreatment - which overwhelmingly occur within families, and for reasons ignored in these debates.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Who watches pornography in Australia? If you listen to public debates about the genre the answer is clear – it’s children. Children are accessing pornography on smartphones (Murray and Tin 2011). Children are taking ‘lewd’ photographs of themselves, creating their own pornography (Nelligan and Etheridge 2011). Indigenous Australian children must be protected by banning pornography (the Age 2011). Pornographic magazines are placed where children can see them (O'Rourke 2011). Exposure to pornography is damaging children (Sundstrom 2011). The Australian Government insists that the Internet must be filtered to protect children from pornography (Collerton 2010). And if indeed any adults are watching pornography in Australia, then it’s child pornography (MacDonald 2011; Ralston and Howden 2011).In story after story, public debate about pornography focuses on children as its audience. There is no suggestion that children are numerically the largest audience of pornography in Australia. But emphatically the suggestion is that children are the most important audience to be taken into account when thinking about the genre. This chapter explores why this is the case, and notes the political advantages and disadvantages of focusing on children as the most important audience for pornography in Australia.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This paper outlines the current literature on what is known about the processes by which individuals utilize the Internet for child sexual abuse. First, three ways in which the Internet is utilized are outlined: (1) by dissemination of sexually abusive images of children for personal and/or commercial reasons; (2) by communication with other individuals with a sexual interest in children: and (3) by maintaining and developing online pedophilic networks. Second, content and availability of abusive images are described, and the difficulties faced by criminal justice agencies in both the definition of abusive images and their prohibition is discussed. Third, the potential for offenders to ‘cross-over’ from online offenses to contact sexual victimization of children is examined and placed within a context of various Internet offender typologies that have been developed. Finally, implications of this body of research for law and public policy are considered.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Purpose
The purpose of this paper is to explore police officers’ perceptions of the challenges and work stressors of working in Internet Child Exploitation (ICE) investigation.

Design/methodology/approach
Participants were a heterogeneous sample of 32 ICE investigators across nine Australian jurisdictions. Officers’ perceptions of ICE work were elicited via individual, open-ended, anonymous, telephone interviews, which focused on both the nature and impact of work-related stressors and challenges.

Findings
Thematic analysis revealed that viewing ICE material was not perceived to be a major stressor or particularly traumatic facet of ICE investigation. Rather, the challenges related to three areas; work relationships, workload and resources and the physical environment. Participants also suggested some improvements to their work environment which could reduce the impact of these challenges.

Practical implications
The stressors identified by ICE investigators in this study place physical, psychological and social restrictions on investigative capacity. Modifications to the workplace environment that facilitate more effective professional collaboration, reduce workload and enhance investigator efficiency and functionality of the physical work environment would likely reduce the potential for harm associated with ICE investigation and improve ICE investigators’ capacity to perform their role.

Originality/value

This is the first study to use a broad research framework to examine the full range of stressors that ICE investigators face (both organisational and operational). The findings are important for developing comprehensive theories regarding workplace traumatisation as well as holistic intervention models to assist the prevention and management of stress related to ICE investigation.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Research shows that Internet Child Exploitation (ICE) investigators cope well with the range of stressors their work exposes them to, but little is known about how they manage to cope. The current study attempts to expand knowledge and address the limitations of prior research by using a broad, open-ended anonymous interviewing strategy that differentiates between individual and organizational coping resources in the first study conducted with Australian investigators. Participants were 32 ICE investigators from all nine Australian jurisdictions. Results were organized thematically in the following headings: selection of ideal applicants, indicators of poor coping and coping strategies. The overriding conclusions and their implications for police managers are discussed. © 2014 American Psychological Association.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The Internet presents a constantly evolving frontier for criminology and policing, especially in relation to online predators – paedophiles operating within the Internet for safer access to children, child pornography and networking opportunities with other online predators. The goals of this qualitative study are to undertake behavioural research – identify personality types and archetypes of online predators and compare and contrast them with behavioural profiles and other psychological research on offline paedophiles and sex offenders. It is also an endeavour to gather intelligence on the technological utilisation of online predators and conduct observational research on the social structures of online predator communities. These goals were achieved through the covert monitoring and logging of public activity within four Internet Relay Chat(rooms) (IRC) themed around child sexual abuse and which were located on the Undernet network. Five days of monitoring was conducted on these four chatrooms between Wednesday 1 to Sunday 5 April 2009; this raw data was collated and analysed. The analysis identified four personality types – the gentleman predator, the sadist, the businessman and the pretender – and eight archetypes consisting of the groomers, dealers, negotiators, roleplayers, networkers, chat requestors, posters and travellers. The characteristics and traits of these personality types and archetypes, which were extracted from the literature dealing with offline paedophiles and sex offenders, are detailed and contrasted against the online sexual predators identified within the chatrooms, revealing many similarities and interesting differences particularly with the businessman and pretender personality types. These personality types and archetypes were illustrated by selecting users who displayed the appropriate characteristics and tracking them through the four chatrooms, revealing intelligence data on the use of proxies servers – especially via the Tor software – and other security strategies such as Undernet’s host masking service. Name and age changes, which is used as a potential sexual grooming tactic was also revealed through the use of Analyst’s Notebook software and information on ISP information revealed the likelihood that many online predators were not using any safety mechanism and relying on the anonymity of the Internet. The activities of these online predators were analysed, especially in regards to child sexual grooming and the ‘posting’ of child pornography, which revealed a few of the methods in which online predators utilised new Internet technologies to sexually groom and abuse children – using technologies such as instant messengers, webcams and microphones – as well as store and disseminate illegal materials on image sharing websites and peer-to-peer software such as Gigatribe. Analysis of the social structures of the chatrooms was also carried out and the community functions and characteristics of each chatroom explored. The findings of this research have indicated several opportunities for further research. As a result of this research, recommendations are given on policy, prevention and response strategies with regards to online predators.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Réalisé en cotutelle avec l'Université de Paris-sud XI, France.