Online Child Sexual Exploitation: A New MIS Challenge

© 2021, Association for Information Systems. All rights reserved. This paper deals with the difficult yet increasingly important MIS phenomenon of online child sexual exploitation (online CSE). Through the use of secondary and publicly available data from the Federal Bureau of Investigation, as well as primary data from a cybercrime police unit in the United Kingdom, this study takes a grounded theory approach and organizes the role that technologies and social actors play in shaping online CSE. The paper contributes to IS theory by providing a consolidated model for online CSE, which we call the technology and imagery dimensions model. This model combines the staging of the phenomenon and the key dimensions that depict how the use of technology and imagery both fuels and defuses the phenomenon. In informing the construction of the model, the paper extracts, organizes, and generalizes the affordances of technology and discusses the role of information systems in detecting online CSE.

[1]  Tim C. Kietzmann,et al.  Deepfakes: Trick or treat? , 2020, Business Horizons.

[2]  Yannis Charalabidis,et al.  Transforming the communication between citizens and government through AI-guided chatbots , 2019, Gov. Inf. Q..

[3]  Judea Pearl,et al.  The seven tools of causal inference, with reflections on machine learning , 2019, Commun. ACM.

[4]  Christian V. Baccarella,et al.  Social media? It's serious! Understanding the dark side of social media , 2018, European Management Journal.

[5]  Dionysios S. Demetis Fighting money laundering with technology: A case study of Bank X in the UK , 2018, Decis. Support Syst..

[6]  Ganesan Ramachandran,et al.  Cloud Based Big Data Platform for Image Analytics , 2017, 2017 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).

[7]  Jeanna Neefe Matthews,et al.  Toward algorithmic transparency and accountability , 2017, Commun. ACM.

[8]  D. Strong,et al.  Affordance theory and how to use it in IS research , 2017 .

[9]  R. Galliers,et al.  The Routledge Companion to Management Information Systems , 2017 .

[10]  Tia A. Hoffer,et al.  Investigative aspects of crossover offending from a sample of FBI online child sexual exploitation cases , 2016 .

[11]  Ahmad Diab,et al.  Darknet and deepnet mining for proactive cybersecurity threat intelligence , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).

[12]  Ya'akov Gal,et al.  Behavioral Study of Users When Interacting with Active Honeytokens , 2016, TSEC.

[13]  Thomas A. Weber Product Pricing in a Peer-to-Peer Economy , 2016, J. Manag. Inf. Syst..

[14]  Gurpreet Dhillon,et al.  Interpreting information security culture: An organizational transformation case study , 2016, Comput. Secur..

[15]  Ross M. Bartels,et al.  The implicit theories of child sexual exploitation material users: an initial conceptualization , 2016 .

[16]  Stefan Fenz,et al.  A taxonomy for privacy enhancing technologies , 2015, Comput. Secur..

[17]  E. Quayle,et al.  The Role of Sexual Images in Online and Offline Sexual Behaviour With Minors , 2015, Current Psychiatry Reports.

[18]  Steven Furnell,et al.  Managing privacy settings: lots of options, but beyond control? , 2015 .

[19]  Janis Wolak,et al.  A Typology of Offenders Who Use Online Communications to Commit Sex Crimes Against Minors , 2015 .

[20]  Amitai Etzioni NSA: National Security vs. Individual Rights , 2015 .

[21]  Josep Domingo-Ferrer,et al.  Privacy and Data Protection by Design - from policy to engineering , 2014, ArXiv.

[22]  Juriah Abd. Jalil Combating child pornography in digital era: is Malaysian law adequate to meet the digital challenge? , 2015 .

[23]  Jae Kyu Lee,et al.  Research Framework for AIS Grand Vision of the Bright ICT Initiative , 2015 .

[24]  Kim-Kwang Raymond Choo,et al.  Online child exploitation: Challenges and future research directions , 2014, Comput. Law Secur. Rev..

[25]  Ulrik Franke,et al.  Cyber situational awareness - A systematic review of the literature , 2014, Comput. Secur..

[26]  Jennifer Martin “It's Just an Image, Right?”: Practitioners’ Understanding of Child Sexual Abuse Images Online and Effects on Victims , 2014 .

[27]  Brian Neil Levine,et al.  Measuring a year of child pornography trafficking by U.S. computers on a peer-to-peer network. , 2014, Child abuse & neglect.

[28]  Ivo Mhike Trafficking in Slavery's Wake. Law and the Experience of Women and Children in Africa , 2014 .

[29]  Diane M. Strong,et al.  Critical Realism and Affordances: Theorizing IT-Associated Organizational Change Processes , 2013, MIS Q..

[30]  Paul M. Leonardi,et al.  When Does Technology Use Enable Network Change in Organizations? A Comparative Study of Feature Use and Shared Affordances , 2013, MIS Q..

[31]  Giulio Calcara The Role of INTERPOL and Europol in the Fight Against Cybercrime, with Reference to the Sexual Exploitation of Children Online and Child Pornography , 2013 .

[32]  Giulio Calcara THE ROLE OF INTERPOL AND EUROPOL IN THE FIGHT AGAINST CYBERCRIME , WITH PARTICULAR REFERENCE TO THE SEXUAL EXPLOITATION OF CHILDREN ONLINE AND CHILD PORNOGRAPHY , 2013 .

[33]  James Backhouse,et al.  Risk, trust and eID: Exploring public perceptions of digital identity systems , 2012, First Monday.

[34]  K. Ribisl,et al.  Understanding and Preventing Online Sexual Exploitation of Children , 2012 .

[35]  Jade Guan,et al.  Children in the digital age: exploring issues of cybersecurity , 2012, iConference '12.

[36]  David Barnard-Wills,et al.  E-safety education: Young people, surveillance and responsibility , 2012 .

[37]  Jörgen Sandberg,et al.  Generating Research Questions Through Problematization , 2011 .

[38]  Janis Wolak,et al.  Growth and change in undercover online child exploitation investigations, 2000–2006 , 2010 .

[39]  Henri Barki,et al.  User Participation in Information Systems Security Risk Management , 2010, MIS Q..

[40]  Simson L. Garfinkel,et al.  Digital forensics research: The next 10 years , 2010, Digit. Investig..

[41]  J. McCarthy,et al.  Internet sexual activity: A comparison between contact and non-contact child pornography offenders , 2010 .

[42]  Julia von Weiler,et al.  Care and treatment of child victims of child pornographic exploitation (CPE) in Germany , 2010 .

[43]  Catherine D. Marcum,et al.  Assessing Sex Experiences of Online Victimization: An Examination of Adolescent Online Behaviors Using Routine Activity Theory , 2010 .

[44]  Alison M. Smith Protection of Children Online: Federal and State Laws Addressing Cyberstalking, Cyberharassment, and Cyberbullying , 2009 .

[45]  A. Beech,et al.  Understanding online child pornography use: Applying sexual offense theory to internet offenders , 2009 .

[46]  Luciano Floridi,et al.  Information ethics: a reappraisal , 2008, Ethics and Information Technology.

[47]  Sonia Livingstone,et al.  Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression , 2008, New Media Soc..

[48]  Melissa Wells,et al.  How Do High-Risk Youth Use the Internet? Characteristics and Implications for Prevention , 2008, Child maltreatment.

[49]  M. Lynne Markus,et al.  A Foundation for the Study of IT Effects: A New Look at DeSanctis and Poole's Concepts of Structural Features and Spirit , 2008, J. Assoc. Inf. Syst..

[50]  L Alvin Malesky,et al.  Predatory Online Behavior: Modus Operandi of Convicted Sex Offenders in Identifying Potential Victims and Contacting Minors Over the Internet , 2007, Journal of child sexual abuse.

[51]  Bob Breeden,et al.  Investigating 'Internet Crimes Against Children' (ICAC) cases in the state of Florida , 2006, SAC '06.

[52]  Stuart E. Middleton,et al.  Ontological user profiling in recommender systems , 2004, TOIS.

[53]  Rob Kling,et al.  Reconceptualizing Users as Social Actors in Information Systems Research , 2003, MIS Q..

[54]  Miguel P Caldas,et al.  Research design: qualitative, quantitative, and mixed methods approaches , 2003 .

[55]  Steven Philippsohn,et al.  Money Laundering on the Internet , 2001, Comput. Secur..

[56]  Ian Hutchby,et al.  Technologies, Texts and Affordances , 2001 .

[57]  N. Hoffart Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory , 2000 .

[58]  Michael D. Myers,et al.  A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information Systems , 1999, MIS Q..

[59]  Geoff Walsham,et al.  The Emergence of Interpretivism in IS Research , 1995, Inf. Syst. Res..

[60]  Wanda J. Orlikowski,et al.  CASE Tools as Organizational Change: Investigating Incremental and Radical Changes in Systems Development , 1993, MIS Q..

[61]  A. Strauss Basics Of Qualitative Research , 1992 .

[62]  B. Turner,et al.  Grounded Theory and Organizational Research , 1986 .

[63]  B. Glaser Theoretical Sensitivity: Advances in the Methodology of Grounded Theory , 1978 .

[64]  R. Shaw,et al.  Perceiving, Acting and Knowing : Toward an Ecological Psychology , 1978 .