Online child grooming: a literature review on the misuse of social networking sites for grooming children for sexual offences

Apart from any fair dealing for the purpose of private study, research, criticism or review, as permitted under the Copyright Act 1968 (Cth), no part of this publication may in any form or by any means (electronic, mechanical, microcopying, photocopying, recording or otherwise) be reproduced, stored in a retrieval system or transmitted without prior written permission. Inquiries should be addressed to the publisher. Please note: minor revisions are occasionally made to publications after release. The online versions available on the AIC website will always include any revisions. iii Foreword Foreword Advances in technology have provided individuals with unparalleled opportunities to communicate effi ciently and in real time. At the same time, the community has been exposed to a wide range of criminal activities, one of which involves the online exploitation of children. The potential for individuals with an inappropriate sexual interest in children to establish online contact with them and groom them for sexual abuse represents a very real threat to the safety of children in the technological age. The grooming of children for sexual abuse is a premeditated behaviour that commences with sexual offenders choosing a location or target area likely to be attractive to children. Social networking sites, in particular, have become an important element in the child grooming process. These technologies, popular with the digital/virtual generation, allow offenders to make contact with children and even masquerade as children in cyberspace to secure their trust and cooperation. As trust is developed, offenders seek to desensitise child victims to sexual conduct by introducing a sexual element into the relationship. In November 2007, the Australian Institute of Criminology (AIC) was commissioned by the Attorney-General's Department to search for, locate and report on the existing academic and policy-relevant literature concerning the use of social networking sites for grooming children for sexual purposes, the extent and nature of the problem, and effective ways in which to address it. This report brings together a number of aspects of the research that the AIC undertook in 2008. It reviews recently published academic and policy-relevant research on the misuse of online social networking sites and other forms of communications technologies by sexual predators to groom children for sexual conduct. Information is also provided on the extent and nature of the problem including some available statistical information. The report begins by defi ning 'online child grooming' and identifying ways in which emerging technological changes may be …

[1]  Általános társadalom tudományok National Center for Missing and Exploited Children , 2011 .

[2]  Jennifer Jie Xu,et al.  Mining communities and their relationships in blogs: A study of online hate groups , 2007, Int. J. Hum. Comput. Stud..

[3]  Gerald L. Brown,et al.  Juvenile Sex Offender Re-Arrest Rates for Sexual, Violent Nonsexual and Property Crimes: A 10-Year Follow-Up , 2005, Sexual abuse : a journal of research and treatment.

[4]  R. S. Rosenberg Controlling access to the Internet: The role of filtering , 2004, Ethics and Information Technology.

[5]  Janis Wolak,et al.  Internet Sex Crimes Against Minors: The Response of Law Enforcement. , 2003 .

[6]  Ronald J. Deibert Dark Guests and Great Firewalls: The Internet and Chinese Security Policy , 2002 .

[7]  Laurence Steinberg,et al.  Office of Juvenile Justice and Delinquency Prevention , 2003 .

[8]  E. Gilchrist,et al.  Sexual grooming of children: Review of literature and theoretical considerations , 2006 .

[9]  C. Palczewski Contesting Pornography: Terministic Catharsis and Definitional Argument , 2001 .

[10]  Hsinchun Chen,et al.  Using importance flooding to identify interesting networks of criminal activity , 2006, J. Assoc. Inf. Sci. Technol..

[11]  C. Porco From the blogosphere , 2007, Nature.

[12]  Joseph S. Fulda Internet stings directed at pedophiles: A study in philosophy and law , 2005 .

[13]  Vincent C. Müller,et al.  Some information is too dangerous to be on the internet , 2006, CSOC.

[14]  Kimberly J. Mitchell,et al.  Youth Sexual Exploitation on the Internet: DSM-IV Diagnoses and Gender Differences in Co-occurring Mental Health Issues , 2007 .

[15]  Child Pornography: Patterns From NIBRS , 2004 .

[16]  A. Cooper,et al.  An Internet Study of Cybersex Participants , 2005, Archives of sexual behavior.

[17]  Gary E. Gorman China-bashing in the internet censorship wars , 2005, Online Inf. Rev..

[18]  Christopher C. Yang,et al.  Analyzing the Terrorist Social Networks with Visualization Tools , 2006, ISI.

[19]  Karen J. Terry,et al.  Can we profile sex offenders? A review of sex offender typologies , 2007 .

[20]  Michele L. Ybarra,et al.  The co-occurrence of Internet harassment and unwanted sexual solicitation victimization and perpetration: associations with psychosocial indicators. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[21]  Drew A. Kingston,et al.  The Utility of the Diagnosis of Pedophilia: A Comparison of Various Classification Procedures , 2007, Archives of sexual behavior.

[22]  Peter Williams,et al.  Nasties in the Net: children and censorship on the Web , 2002 .

[23]  Cynthia Mcdaniel Children's Literature as Prevention of Child Sexual Abuse , 2001 .

[24]  R. Tricker,et al.  Onset of sexual intercourse among female adolescents: the influence of perceptions, depression, and ecological factors. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[25]  Peter Grabosky,et al.  Requirements of prosecution services to deal with cyber crime , 2007 .

[26]  Peter Cumper ‘Let's talk about sex’: balancing children's rights and parental responsibilities , 2006, Legal Studies.

[27]  Richard Clayton,et al.  Failures in a Hybrid Content Blocking System , 2005, Privacy Enhancing Technologies.

[28]  Justin W. Patchin,et al.  Personal information of adolescents on the Internet: A quantitative content analysis of MySpace. , 2008, Journal of adolescence.

[29]  L. Olson,et al.  Entrapping the Innocent: Toward a Theory of Child Sexual Predators’ Luring Communication , 2007 .

[30]  How to leak a secret and not get caught , 2007 .

[31]  Julia Davidson Current practice and research into Internet sex offending , 2007 .

[32]  M. Rogers,et al.  Survey of Law Enforcement Perceptions Regarding Digital Evidence , 2007, IFIP Int. Conf. Digital Forensics.

[33]  R. Langevin,et al.  The Prevalence of Sex Offenders With Deviant Fantasies , 1998 .

[34]  B. J. Rye,et al.  The pursuit of sexual pleasure , 2007 .

[35]  Mathias Klang,et al.  Virtual Censorship: Controlling the Public Sphere , 2006, HCC.

[36]  William J. Leonhirth Crime in the Digital Age: Controlling Telecommunications and Cyberspace Illegalities , 1999 .

[37]  L. G. Regev,et al.  Problems with the DSM-IV Diagnosis of Pedophilia , 2000, Sexual abuse : a journal of research and treatment.

[38]  A. Day,et al.  Correctional offender rehabilitation programs : the national picture in Australia , 2004 .

[39]  Michael E. Lamb,et al.  Conversational apprentices: Helping children become competent informants about their own experiences , 2006 .

[40]  Arfan Khan Sexual Offences Act 2003 , 2004 .

[41]  Jill S. Levenson,et al.  Public Perceptions About Sex Offenders and Community Protection Policies , 2007 .

[42]  M. Seto,et al.  The Criminal Histories and Later Offending of Child Pornography Offenders , 2005, Sexual abuse : a journal of research and treatment.

[43]  A. Beech,et al.  An investigation into the applicability of the Ward and Siegert Pathways Model of child sexual abuse with Internet offenders , 2006 .

[44]  Russell G. Smith,et al.  Crime in the Digital Age: Controlling Telecommunications and Cyberspace Illegalities , 1998 .

[45]  J. Craissati,et al.  Characteristics of Perpetrators of Child Sexual Abuse Who Have Been Sexually Victimized as Children , 2002, Sexual abuse : a journal of research and treatment.

[46]  P. Fehrenbach,et al.  Adolescent sexual offenders: offender and offense characteristics. , 1986, The American journal of orthopsychiatry.

[47]  G. Charles,et al.  Adolescent Sexual Offenders , 1996 .

[48]  F. Lösel,et al.  The effectiveness of treatment for sexual offenders: A comprehensive meta-analysis , 2005 .

[49]  A. Adam Cyberstalking and Internet pornography: Gender and the gaze , 2002, Ethics and Information Technology.

[50]  Steven J. Kaminshine,et al.  2005-2006 Annual Report , 2006 .

[51]  C. Harrison Cyberspace and Child Abuse Images , 2006 .

[52]  Ethel Quayle,et al.  Model of Problematic Internet Use in People with a Sexual Interest in Children , 2003, Cyberpsychology Behav. Soc. Netw..

[53]  G. Sandy The online services bill: theories and evidence of pornographic harm , 2000 .

[54]  P. Greenfield,et al.  Connecting developmental constructions to the internet: identity presentation and sexual exploration in online teen chat rooms. , 2006, Developmental psychology.

[55]  Kim-Kwang Raymond Choo,et al.  Criminal Exploitation of Online Systems by Organised Crime Groups , 2008 .

[56]  Vincent Egan,et al.  Sexual Offenders Against Children: The Influence of Personality and Obsessionality on Cognitive Distortions , 2005, Sexual abuse : a journal of research and treatment.

[57]  Rachel O’Connell Cyberspace A TYPOLOGY OF CHILD CYBERSEXPLOITATION AND ONLINE GROOMING PRACTICES , 2003 .

[58]  Bülent Yener,et al.  A Tool for Internet Chatroom Surveillance , 2004, ISI.

[60]  Kim-Kwang Raymond Choo,et al.  Future directions in technology-enabled crime: 2007-09 , 2008 .

[61]  Dante Cicchetti,et al.  Child maltreatment. , 2005, Annual review of clinical psychology.

[62]  Janis Wolak,et al.  Online requests for sexual pictures from youth: risk factors and incident characteristics. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[63]  Sara M. Grimes,et al.  Online multiplayer games: a virtual space for intellectual property debates? , 2006, New Media Soc..

[64]  Elisa Bertino,et al.  Content-based filtering of Web documents: the MaX system and the EUFORBIA project , 2003, International Journal of Information Security.

[65]  Miguel Vargas Martin,et al.  Cyber child pornography: A review paper of the social and legal issues and remedies—and a proposed technological solution , 2007 .

[66]  Nonforcible Internet-Related Sex Crimes With Adolescent Victims: Prosecution Issues and Outcomes , 2005, Child maltreatment.

[67]  Paul Burke,et al.  Forensic Analysis of Xbox Consoles , 2007, IFIP Int. Conf. Digital Forensics.

[68]  D. Finkelhor The international epidemiology of child sexual abuse. , 1994, Child abuse & neglect.

[69]  R. Frenzel,et al.  How Sex Offenders Lure Children , 1988 .

[70]  C. Schofield Sexually transmitted disease surveillance. , 1982, British medical journal.

[71]  N. Garnefski,et al.  Depressive Symptomatology and Child Abuse in Adolescents with Behavioral Problems , 2003 .

[72]  Sujeet Shenoi,et al.  File System Journal Forensics , 2007, IFIP Int. Conf. Digital Forensics.

[73]  Kimberly J. Mitchell,et al.  Inventory of problematic Internet experiences encountered in clinical practice. , 2005 .

[74]  Kathryn England Aytes,et al.  Cognitive/Behavioral Treatment for Sexual Offenders: An Examination of Recidivism , 2001, Sexual abuse : a journal of research and treatment.

[75]  R. O'Connell,et al.  A typology of cybersexploitation and online grooming practices , 2003 .

[76]  Rebecca MacKinnon Flatter world and thicker walls? Blogs, censorship and civic discourse in China , 2007 .

[77]  T. Ward,et al.  The Content of Sexual Fantasies for Sexual Offenders , 2004, Sexual abuse : a journal of research and treatment.

[78]  Andrew Russell,et al.  Current issues confronting well-established computer-assisted child exploitation and computer crime task forces , 2004, Digit. Investig..

[79]  Chris G. Sibley,et al.  A Quantitative Analysis of the Content and Structure of Public Requests for Private Interaction Posted in Online Public Chatrooms , 2004, Cyberpsychology Behav. Soc. Netw..

[80]  Russell G. Smith,et al.  Cyber Criminals on Trial: List of figures and tables , 2004 .

[81]  Elsevier Sdol International Journal of Human-Computer Studies , 2009 .

[82]  K. Williams,et al.  Prevalence and predictors of internet bullying. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[83]  P. Klerks The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands , 2001 .

[84]  N. Passas,et al.  Measures and mechanisms to strengthen international cooperation among prosecution services , 2007 .

[85]  G. Griffith,et al.  Protecting children from online sexual predators , 2007 .

[86]  J. Wolak,et al.  Child-Pornography Possessors Arrested in Internet-Related Crimes: Findings From the National Juvenile Online Victimization Study. , 2005 .

[87]  Jedidiah R. Crandall,et al.  ConceptDoppler: a weather tracker for internet censorship , 2007, CCS '07.

[88]  S. Koschade A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence , 2006 .

[89]  Dc Washington Diagnostic and Statistical Manual of Mental Disorders, 4th Ed. , 1994 .

[90]  A. Lenhart,et al.  Social networking websites and teens: an overview , 2007 .