Online child grooming: a literature review on the misuse of social networking sites for grooming children for sexual offences
暂无分享,去创建一个
[1] Általános társadalom tudományok. National Center for Missing and Exploited Children , 2011 .
[2] Jennifer Jie Xu,et al. Mining communities and their relationships in blogs: A study of online hate groups , 2007, Int. J. Hum. Comput. Stud..
[3] Gerald L. Brown,et al. Juvenile Sex Offender Re-Arrest Rates for Sexual, Violent Nonsexual and Property Crimes: A 10-Year Follow-Up , 2005, Sexual abuse : a journal of research and treatment.
[4] R. S. Rosenberg. Controlling access to the Internet: The role of filtering , 2004, Ethics and Information Technology.
[5] Janis Wolak,et al. Internet Sex Crimes Against Minors: The Response of Law Enforcement. , 2003 .
[6] Ronald J. Deibert. Dark Guests and Great Firewalls: The Internet and Chinese Security Policy , 2002 .
[7] Laurence Steinberg,et al. Office of Juvenile Justice and Delinquency Prevention , 2003 .
[8] E. Gilchrist,et al. Sexual grooming of children: Review of literature and theoretical considerations , 2006 .
[9] C. Palczewski. Contesting Pornography: Terministic Catharsis and Definitional Argument , 2001 .
[10] Hsinchun Chen,et al. Using importance flooding to identify interesting networks of criminal activity , 2006, J. Assoc. Inf. Sci. Technol..
[11] C. Porco. From the blogosphere , 2007, Nature.
[12] Joseph S. Fulda. Internet stings directed at pedophiles: A study in philosophy and law , 2005 .
[13] Vincent C. Müller,et al. Some information is too dangerous to be on the internet , 2006, CSOC.
[14] Kimberly J. Mitchell,et al. Youth Sexual Exploitation on the Internet: DSM-IV Diagnoses and Gender Differences in Co-occurring Mental Health Issues , 2007 .
[15] Child Pornography: Patterns From NIBRS , 2004 .
[16] A. Cooper,et al. An Internet Study of Cybersex Participants , 2005, Archives of sexual behavior.
[17] Gary E. Gorman. China-bashing in the internet censorship wars , 2005, Online Inf. Rev..
[18] Christopher C. Yang,et al. Analyzing the Terrorist Social Networks with Visualization Tools , 2006, ISI.
[19] Karen J. Terry,et al. Can we profile sex offenders? A review of sex offender typologies , 2007 .
[20] Michele L. Ybarra,et al. The co-occurrence of Internet harassment and unwanted sexual solicitation victimization and perpetration: associations with psychosocial indicators. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.
[21] Drew A. Kingston,et al. The Utility of the Diagnosis of Pedophilia: A Comparison of Various Classification Procedures , 2007, Archives of sexual behavior.
[22] Peter Williams,et al. Nasties in the Net: children and censorship on the Web , 2002 .
[23] Cynthia Mcdaniel. Children's Literature as Prevention of Child Sexual Abuse , 2001 .
[24] R. Tricker,et al. Onset of sexual intercourse among female adolescents: the influence of perceptions, depression, and ecological factors. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.
[25] Peter Grabosky,et al. Requirements of prosecution services to deal with cyber crime , 2007 .
[26] Peter Cumper. ‘Let's talk about sex’: balancing children's rights and parental responsibilities , 2006, Legal Studies.
[27] Richard Clayton,et al. Failures in a Hybrid Content Blocking System , 2005, Privacy Enhancing Technologies.
[28] Justin W. Patchin,et al. Personal information of adolescents on the Internet: A quantitative content analysis of MySpace. , 2008, Journal of adolescence.
[29] L. Olson,et al. Entrapping the Innocent: Toward a Theory of Child Sexual Predators’ Luring Communication , 2007 .
[30] How to leak a secret and not get caught , 2007 .
[31] Julia Davidson. Current practice and research into Internet sex offending , 2007 .
[32] M. Rogers,et al. Survey of Law Enforcement Perceptions Regarding Digital Evidence , 2007, IFIP Int. Conf. Digital Forensics.
[33] R. Langevin,et al. The Prevalence of Sex Offenders With Deviant Fantasies , 1998 .
[34] B. J. Rye,et al. The pursuit of sexual pleasure , 2007 .
[35] Mathias Klang,et al. Virtual Censorship: Controlling the Public Sphere , 2006, HCC.
[36] William J. Leonhirth. Crime in the Digital Age: Controlling Telecommunications and Cyberspace Illegalities , 1999 .
[37] L. G. Regev,et al. Problems with the DSM-IV Diagnosis of Pedophilia , 2000, Sexual abuse : a journal of research and treatment.
[38] A. Day,et al. Correctional offender rehabilitation programs : the national picture in Australia , 2004 .
[39] Michael E. Lamb,et al. Conversational apprentices: Helping children become competent informants about their own experiences , 2006 .
[40] Arfan Khan. Sexual Offences Act 2003 , 2004 .
[41] Jill S. Levenson,et al. Public Perceptions About Sex Offenders and Community Protection Policies , 2007 .
[42] M. Seto,et al. The Criminal Histories and Later Offending of Child Pornography Offenders , 2005, Sexual abuse : a journal of research and treatment.
[43] A. Beech,et al. An investigation into the applicability of the Ward and Siegert Pathways Model of child sexual abuse with Internet offenders , 2006 .
[44] Russell G. Smith,et al. Crime in the Digital Age: Controlling Telecommunications and Cyberspace Illegalities , 1998 .
[45] J. Craissati,et al. Characteristics of Perpetrators of Child Sexual Abuse Who Have Been Sexually Victimized as Children , 2002, Sexual abuse : a journal of research and treatment.
[46] P. Fehrenbach,et al. Adolescent sexual offenders: offender and offense characteristics. , 1986, The American journal of orthopsychiatry.
[47] G. Charles,et al. Adolescent Sexual Offenders , 1996 .
[48] F. Lösel,et al. The effectiveness of treatment for sexual offenders: A comprehensive meta-analysis , 2005 .
[49] A. Adam. Cyberstalking and Internet pornography: Gender and the gaze , 2002, Ethics and Information Technology.
[50] Steven J. Kaminshine,et al. 2005-2006 Annual Report , 2006 .
[51] C. Harrison. Cyberspace and Child Abuse Images , 2006 .
[52] Ethel Quayle,et al. Model of Problematic Internet Use in People with a Sexual Interest in Children , 2003, Cyberpsychology Behav. Soc. Netw..
[53] G. Sandy. The online services bill: theories and evidence of pornographic harm , 2000 .
[54] P. Greenfield,et al. Connecting developmental constructions to the internet: identity presentation and sexual exploration in online teen chat rooms. , 2006, Developmental psychology.
[55] Kim-Kwang Raymond Choo,et al. Criminal Exploitation of Online Systems by Organised Crime Groups , 2008 .
[56] Vincent Egan,et al. Sexual Offenders Against Children: The Influence of Personality and Obsessionality on Cognitive Distortions , 2005, Sexual abuse : a journal of research and treatment.
[57] Rachel O’Connell Cyberspace. A TYPOLOGY OF CHILD CYBERSEXPLOITATION AND ONLINE GROOMING PRACTICES , 2003 .
[58] Bülent Yener,et al. A Tool for Internet Chatroom Surveillance , 2004, ISI.
[60] Kim-Kwang Raymond Choo,et al. Future directions in technology-enabled crime: 2007-09 , 2008 .
[61] Dante Cicchetti,et al. Child maltreatment. , 2005, Annual review of clinical psychology.
[62] Janis Wolak,et al. Online requests for sexual pictures from youth: risk factors and incident characteristics. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.
[63] Sara M. Grimes,et al. Online multiplayer games: a virtual space for intellectual property debates? , 2006, New Media Soc..
[64] Elisa Bertino,et al. Content-based filtering of Web documents: the MaX system and the EUFORBIA project , 2003, International Journal of Information Security.
[65] Miguel Vargas Martin,et al. Cyber child pornography: A review paper of the social and legal issues and remedies—and a proposed technological solution , 2007 .
[66] Nonforcible Internet-Related Sex Crimes With Adolescent Victims: Prosecution Issues and Outcomes , 2005, Child maltreatment.
[67] Paul Burke,et al. Forensic Analysis of Xbox Consoles , 2007, IFIP Int. Conf. Digital Forensics.
[68] D. Finkelhor. The international epidemiology of child sexual abuse. , 1994, Child abuse & neglect.
[69] R. Frenzel,et al. How Sex Offenders Lure Children , 1988 .
[70] C. Schofield. Sexually transmitted disease surveillance. , 1982, British medical journal.
[71] N. Garnefski,et al. Depressive Symptomatology and Child Abuse in Adolescents with Behavioral Problems , 2003 .
[72] Sujeet Shenoi,et al. File System Journal Forensics , 2007, IFIP Int. Conf. Digital Forensics.
[73] Kimberly J. Mitchell,et al. Inventory of problematic Internet experiences encountered in clinical practice. , 2005 .
[74] Kathryn England Aytes,et al. Cognitive/Behavioral Treatment for Sexual Offenders: An Examination of Recidivism , 2001, Sexual abuse : a journal of research and treatment.
[75] R. O'Connell,et al. A typology of cybersexploitation and online grooming practices , 2003 .
[76] Rebecca MacKinnon. Flatter world and thicker walls? Blogs, censorship and civic discourse in China , 2007 .
[77] T. Ward,et al. The Content of Sexual Fantasies for Sexual Offenders , 2004, Sexual abuse : a journal of research and treatment.
[78] Andrew Russell,et al. Current issues confronting well-established computer-assisted child exploitation and computer crime task forces , 2004, Digit. Investig..
[79] Chris G. Sibley,et al. A Quantitative Analysis of the Content and Structure of Public Requests for Private Interaction Posted in Online Public Chatrooms , 2004, Cyberpsychology Behav. Soc. Netw..
[80] Russell G. Smith,et al. Cyber Criminals on Trial: List of figures and tables , 2004 .
[81] Elsevier Sdol. International Journal of Human-Computer Studies , 2009 .
[82] K. Williams,et al. Prevalence and predictors of internet bullying. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.
[83] P. Klerks. The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands , 2001 .
[84] N. Passas,et al. Measures and mechanisms to strengthen international cooperation among prosecution services , 2007 .
[85] G. Griffith,et al. Protecting children from online sexual predators , 2007 .
[86] J. Wolak,et al. Child-Pornography Possessors Arrested in Internet-Related Crimes: Findings From the National Juvenile Online Victimization Study. , 2005 .
[87] Jedidiah R. Crandall,et al. ConceptDoppler: a weather tracker for internet censorship , 2007, CCS '07.
[88] S. Koschade. A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence , 2006 .
[89] Dc Washington. Diagnostic and Statistical Manual of Mental Disorders, 4th Ed. , 1994 .
[90] A. Lenhart,et al. Social networking websites and teens: an overview , 2007 .