A review of online grooming: Characteristics and concerns

Aggression and Violent Behavior - Tập 18 - Trang 62-70 - 2013
Helen Whittle1,2, Catherine Hamilton-Giachritsis1, Anthony Beech1, Guy Collings2
1School of Psychology, The University of Birmingham, Edgbaston, Birmingham, B15 2TT, UK
2CEOP, 33, Vauxhall Bridge Road, Pimlico, London SW1V 2WG, UK

Tài liệu tham khảo

Atkinson, 2010, Online behaviours of adolescents: Victims, perpetrators and web 2.0, Journal of Sexual Aggression, 16, 107, 10.1080/13552600903337683 Bebbington, 2011, Child sexual abuse reported by an English national sample: Characteristics and demography, Social Psychiatry, 46, 255 Beech, 2008, The internet and child sexual offending: A criminological review, Aggression and Violent Behavior, 13, 216, 10.1016/j.avb.2008.03.007 Berliner, 1990, The process of victimization: A victims' perspective, Child Abuse & Neglect, 14, 29, 10.1016/0145-2134(90)90078-8 Berson, 2000, The computer can't see you blush, Kappa Delta Pi Record, summer, 36, 158, 10.1080/00228958.2000.10518777 Berson, 2003, Grooming cybervictims: The psychosocial effects of online exploitation for youth, Journal of School Violence, 2, 5, 10.1300/J202v02n01_02 Briggs, 2011, An exploratory study of internet-initiated sexual offenses and the chat room sex offender: Has the internet enabled a new typology of sex offender?, Sexual Abuse: A Journal of Research and Treatment, 23, 72, 10.1177/1079063210384275 Bryce, 2010, Online sexual exploitation of children and young people, 320 Burgoon, 1992, Interpretations, evaluations and consequences of interpersonal touch, Human Communication Research, 19, 237, 10.1111/j.1468-2958.1992.tb00301.x Byron Review: Children, new technology Carr Child Exploitation and Online Protection Centre Child Exploitation and Online Protection Centre Craven, 2006, Sexual grooming of children: Review of literature and theoretical considerations, Journal of Sexual Aggression, 12, 287, 10.1080/13552600601069414 Craven, 2007, Current responses to sexual grooming: Implication for prevention, The Howard Journal, 46, 60, 10.1111/j.1468-2311.2007.00454.x Davidson, 2008, Protecting children online: “Towards a safer internet”, 1 Davidson, 2009 Dombrowski, 2004, Protecting children from online sexual predators: Technological, psychoeducational, and legal considerations, Professional Psychology: Research and Practice, 35, 65, 10.1037/0735-7028.35.1.65 Elliott, 2009, Understanding online child pornography use: Applying sexual offense theory to internet offenders, Aggression and Violent Behavior, 14, 180, 10.1016/j.avb.2009.03.002 Elliott, 2009, Psychological profiles of internet sexual offenders, Sexual Abuse: A Journal of Research and Treatment, 21, 76, 10.1177/1079063208326929 Elliott, 1995, Child sexual abuse prevention: What offenders tell us, Child Abuse & Neglect, 19, 579, 10.1016/0145-2134(95)00017-3 European Commission, 2008, Towards a safer use of the internet for children in the EU — A parents' perspective: Analytical report European Online Grooming Project Finkelhor, 1984 Finkelhor, 1997, The victimisation of children and youth: Developmental victimology, 86 Finkelhor Fleming, 2006, Safety in cyberspace, adolescents' safety and exposure online, Youth & Society, 38, 135, 10.1177/0044118X06287858 Gallagher, 2006 Gillespie, 2004, Grooming definitions and the law, The New Law Journal, 154, 586 Hall, 1992, Sexual aggression against children: A conceptual perspective of etiology, Criminal Justice and Behavior, 19, 8, 10.1177/0093854892019001003 Harkins, 2010, Sexual offending in groups: An evaluation, Aggression and Violent Behavior, 15, 87, 10.1016/j.avb.2009.08.006 Jewkes, 2010, Much ado about nothing? Representations and realities of the online soliciting of children, Journal of Sexual Aggression, 16, 5, 10.1080/13552600903389452 Langlois, 2000, Maxims or myths of beauty? A meta-analytic and theoretical review, Psychological Bulletin, 126, 390, 10.1037/0033-2909.126.3.390 Leander, 2008, Internet-initiated sexual abuse: Adolescent victims' reports about on- and off-line sexual activities, Applied Cognitive Psychology, 22, 1260, 10.1002/acp.1433 Livingstone Livingstone, 2005 Livingstone Malesky, 2007, Predatory online behaviour: Modus operandi of convicted sex offenders in identifying potential victims and contacting minors over the internet, Journal of Child Sexual Abuse, 16, 23, 10.1300/J070v16n02_02 Marshall, 1990, An integrated theory of the etiology of sexual offending McAlinden, 2006, ‘Setting 'em up’: Personal, familial and institutional grooming in the sexual abuse of children, Social and Legal Studies, 15, 339, 10.1177/0964663906066613 McCarthy, 2010, Internet sexual activity: A comparison between contact and non-contact child pornography offenders, Journal of Sexual Aggression, 16, 181, 10.1080/13552601003760006 Mishna, 2009 Mitchell, 2005, The internet and family and acquaintance sexual abuse, Child Maltreatment, 10, 49, 10.1177/1077559504271917 Mitchell, 2007, Youth internet users at risk for the most serious online sexual solicitations, American Journal of Preventive Medicine, 32, 532, 10.1016/j.amepre.2007.02.001 Mitchell, 2011, Internet-facilitated commercial sexual exploitation of children: Findings from a nationally representative sample of law enforcement agencies in the United States, Sexual Abuse: A Journal of Research and Treatment, 23, 43, 10.1177/1079063210374347 National Audit Office Memorandum National Society for the Prevention of Cruelty to Children Noll, 2009, Childhood abuse, avatar choices and other risk factors associated with internet-initiated victimisation of adolescent girls, Pediatrics, 123, 1078, 10.1542/peds.2008-2983 O'Connell, 2003 Ofcom Olson, 2007, Entrapping the innocent: Toward a theory of child sexual predators' luring communication, Communication Theory, 17, 231, 10.1111/j.1468-2885.2007.00294.x Ospina, 2010 Palmer, 2004 Palmer, 2010, The impact of internet abuse on children and how best to intervene, The Link, The Official Newsletter of the International Society for Prevention of Child Abuse and Neglect, 19 Peter, 2006, Characteristics and motives of adolescents talking with strangers on the internet, Cyberpsychology & Behavior, 9, 526, 10.1089/cpb.2006.9.526 Quayle, 2002, Paedophiles, pornography and the internet: Assessment issues, British Journal of Social Work, 32, 863, 10.1093/bjsw/32.7.863 Rosen, 2008, The association of parenting style and child age with parental limit setting and adolescent MySpace behaviour, Journal of Applied Developmental Psychology, 29, 459, 10.1016/j.appdev.2008.07.005 Snyder, 1977, Social perception and interpersonal behavior: On the self-fulfilling nature of social stereotypes, Journal of Personality and Social Psychology, 35, 656, 10.1037/0022-3514.35.9.656 Spielhofer, 2010, Children's online risks and safety: A review of the available evidence. Prepared for the UK Council for Child Internet Safety Suler, 2004, The online disinhibition effect, Cyberpsychology & Behavior, 7, 321, 10.1089/1094931041291295 Sullivan, J., (2009). Professionals who sexually abuse the children with whom they work. Unpublished Ph.D. Thesis, School of Psychology, University of Birmingham. Sullivan, 2002, Professional perpetrators: Sex offenders who use their employment to target and sexually abuse the children with whom they work, Child Abuse Review, 11, 153, 10.1002/car.737 Sullivan, 2012, Manipulation styles of abusers who work with children Ward, 2002, Toward a comprehensive theory of child sexual abuse: A theory knitting perspective, Psychology, Crime & Law, 8, 319, 10.1080/10683160208401823 Webb, 2007, Characteristics of internet child pornography offenders: A comparison with child molesters, Sexual Abuse, 19, 449, 10.1177/107906320701900408 Wells, 2008, How do high risk youth use the internet? Characteristics and implications for prevention, Child Maltreatment, 13, 227, 10.1177/1077559507312962 Williams, R., Elliott, I. A., & Beech, A. R. (in submission). Identifying sexual grooming themes used by internet sex offenders. Journal of Applied Social Science. Wolak, 2004, Internet-initiated sex crimes against minors: Implications for prevention based on findings from a national study, Journal of Adolescent Health, 35, e11, 10.1016/j.jadohealth.2004.05.006 Wolak, 2008, Online “predators” and their victims: Myths, realities and implications for prevention and treatment, American Psychologist, 63, 111, 10.1037/0003-066X.63.2.111 Wolak, 2002, Close online relationships in a national sample of adolescents, Adolescence, 37, 441 Wolak Ybarra, 2008, How risky are social networking sites? A comparison of places online where youth sexual solicitation and harassment occurs, Pediatrics, 121, 350, 10.1542/peds.2007-0693 Ybarra, 2007, Internet prevention messages; Are we targeting the right online behaviors?, Archives of Pediatrics and Adolescent Medicine, 161, 138 Yee, 2007, The proteus effect: The effect of transformed self representation on behaviour, Human Communication Research, 33, 271, 10.1111/j.1468-2958.2007.00299.x Young, 1996, Height and perceived competence of U.S. presidents, Perceptual and Motor Skills, 82, 1002, 10.1177/003151259608200301 Young, 2007, Adolescent online victimization, The Prevention Researcher, 14, 8