Coverart for item
The Resource Understanding and preventing online sexual exploitation of children, edited by Ethel Quayle and Kurt M. Ribisl

Understanding and preventing online sexual exploitation of children, edited by Ethel Quayle and Kurt M. Ribisl

Label
Understanding and preventing online sexual exploitation of children
Title
Understanding and preventing online sexual exploitation of children
Statement of responsibility
edited by Ethel Quayle and Kurt M. Ribisl
Contributor
Subject
Language
eng
Cataloging source
DLC
Dewey number
364.1/74083
Illustrations
illustrations
Index
index present
LC call number
HV6773.15.O58
LC item number
U53 2012
Literary form
non fiction
Nature of contents
bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1953-
http://library.link/vocab/relatedWorkOrContributorName
  • Quayle, Ethel
  • Ribisl, Kurt M
http://library.link/vocab/subjectName
  • Online sexual predators
  • Child pornography
  • Internet pornography
  • Child sexual abuse
  • Internet and children
  • Child Abuse, Sexual
  • Child Abuse, Sexual
  • Erotica
  • Internet
  • Pedophilia
Label
Understanding and preventing online sexual exploitation of children, edited by Ethel Quayle and Kurt M. Ribisl
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Contents
  • Pt. I. Abusive images and their emergence as a significant problem :
  • 1. An introduction to the problem / Ethel Quayle and Roberta Sinclair: Harm or rights?, The use of abusive images, Image content, Desistance, Social contexts for image use, Self-generated content
  • 2. Children within the images / Linda Jonsson and Carl Göran Svedin: Self-produced sexual material, Children in sexually abusive images
  • 3. Understanding the emergence of the Internet sex offender: how useful are current theories in understanding the problem? / Anthony R. Beech and Ian A. Elliott: Applying the integrated theory of sexual offending to understanding the online exploitation of children, Ward and Siegert's pathways model explanation of online sexually abusive behaviours, Explanations of the offence process in Internet offending
  • 4. Child pornography in international law / Alisdair A. Gillespie: What is international law?, Jurisdiction, Global instruments, Regional instruments, Enforceability --
  • Myth 5: Children are 'innocent' victims
  • 8. Sexual behaviour, adolescents and problematic content / Lars Lööf: Risks and risk-takin, Coercion, peer pressure, grooming, Exploitation or abuse, Young people's sexual behaviour online and their safety when using information and communication technologies, Emergence of self-generated content, Young people who are same-sex attracted and knowledge about online behaviour, Exposure to pornography/accessing pornography, Balancing the rights of the child to explore their sexuality and the right to be protected from that which might cause harm
  • 9. Risk assessment of child pornography offenders: applications for law enforcement / Angela W. Eke and Michael C. Seto: The scope of the proble, The present chapte, Definition, Risk assessment within law enforcemen, Risk assessment of child pornography offender, Contact offending historie, Comparisons of child pornography and contact offender, Recidivism of child pornography offender, Risk factor, Development of an offence-specific risk measure, Summary and implications for law enforcemen, Future directions for research --
  • Pt. II. Legal, social and familial contexts of abuse :
  • 5. Child pornography and law in East Asia / Bernard Y. Kao: Legislative control of child pornography
  • 6. The social dimension of the online trade of child sexual exploitation material / Angela Carr: Child pornography and contact child sexual offending, The similarities and differences between child pornography and contact child sexual offenders, So why don't more child pornography offenders commit contact offences?, The dark side of social control, The new relationship between media consumption and contact offending
  • 7. Online child pornography, paedophilia and the sexualized child: mediated myths and moral panics / Yvonne Jewkes:
  • Myth 1: Sexual attraction to children is a problem of late-modern, technologically advanced nations,
  • Myth 2: CSA is an offence carried out by strangers and children are protected within the home,
  • Myth 3: Child sexual abuse is less pervasive within societies with strong family structures,
  • Myth 4: Paedophia is an individual pathology,
  • Pt. III. Prevention and harm reduction :
  • 10. The importance of digital evidence in Internet sex offending / David Glasgow: Risk assessment and Internet offender, Candidate measures for risk assessmen, Informing community risk assessments
  • 11. Situational prevention of child abuse in the new technologies / Richard Wortley: Theoretical orientation: the person-situational interactio, Situational prevention
  • 12. Proactive strategies to prevent the use of child abusive images: the Dunkelfeld project / Klaus M. Beier and Janina Neutze: 'Dunkelfeld': offences that go undetected, Sexual preference for children: paedophilia and hebephilia, Primary and secondary prevention effort, Legal framework conditions in German, The Berlin Prevention Project Dunkelfel, First results from the Berlin Prevention Project Dunkelfel, Special focus on child pornography offence, The treatment, Treatment setting and manual construction, Treatment target, Outlook and new challenges
  • 13. Technological solutions to offending / Awais Rashid, Phil Greenwood, James Walkerdine, Alistair Baron and Paul Rayson: Current technological landscap, Filtering software, Forensic software, Internet-based offending: a moving target, Evolving offender tactics, Public to private shifts, Fluid identities, Data-overloading, Ethical and legal issues, Overcoming the challenges: from reactive to proactive policing, A roadmap;
  • 14. A public health approach to addressing Internet child sexual exploitation / Megan Clarke, Kurt M. Ribisl, Desmond Runyan and Carol Runyan: Overview: the public health burden of the issue, What is a public health approach and how does it apply to Internet child exploitation?, Logic models
Control code
ocn727702535
Dimensions
24 cm.
Extent
xv, 278 p.
Isbn
9780415689410
Isbn Type
(pbk.)
Lccn
2011034553
Other control number
6824613
Other physical details
ill.
System control number
(OCoLC)727702535
Label
Understanding and preventing online sexual exploitation of children, edited by Ethel Quayle and Kurt M. Ribisl
Publication
Bibliography note
Includes bibliographical references and index
Contents
  • Pt. I. Abusive images and their emergence as a significant problem :
  • 1. An introduction to the problem / Ethel Quayle and Roberta Sinclair: Harm or rights?, The use of abusive images, Image content, Desistance, Social contexts for image use, Self-generated content
  • 2. Children within the images / Linda Jonsson and Carl Göran Svedin: Self-produced sexual material, Children in sexually abusive images
  • 3. Understanding the emergence of the Internet sex offender: how useful are current theories in understanding the problem? / Anthony R. Beech and Ian A. Elliott: Applying the integrated theory of sexual offending to understanding the online exploitation of children, Ward and Siegert's pathways model explanation of online sexually abusive behaviours, Explanations of the offence process in Internet offending
  • 4. Child pornography in international law / Alisdair A. Gillespie: What is international law?, Jurisdiction, Global instruments, Regional instruments, Enforceability --
  • Myth 5: Children are 'innocent' victims
  • 8. Sexual behaviour, adolescents and problematic content / Lars Lööf: Risks and risk-takin, Coercion, peer pressure, grooming, Exploitation or abuse, Young people's sexual behaviour online and their safety when using information and communication technologies, Emergence of self-generated content, Young people who are same-sex attracted and knowledge about online behaviour, Exposure to pornography/accessing pornography, Balancing the rights of the child to explore their sexuality and the right to be protected from that which might cause harm
  • 9. Risk assessment of child pornography offenders: applications for law enforcement / Angela W. Eke and Michael C. Seto: The scope of the proble, The present chapte, Definition, Risk assessment within law enforcemen, Risk assessment of child pornography offender, Contact offending historie, Comparisons of child pornography and contact offender, Recidivism of child pornography offender, Risk factor, Development of an offence-specific risk measure, Summary and implications for law enforcemen, Future directions for research --
  • Pt. II. Legal, social and familial contexts of abuse :
  • 5. Child pornography and law in East Asia / Bernard Y. Kao: Legislative control of child pornography
  • 6. The social dimension of the online trade of child sexual exploitation material / Angela Carr: Child pornography and contact child sexual offending, The similarities and differences between child pornography and contact child sexual offenders, So why don't more child pornography offenders commit contact offences?, The dark side of social control, The new relationship between media consumption and contact offending
  • 7. Online child pornography, paedophilia and the sexualized child: mediated myths and moral panics / Yvonne Jewkes:
  • Myth 1: Sexual attraction to children is a problem of late-modern, technologically advanced nations,
  • Myth 2: CSA is an offence carried out by strangers and children are protected within the home,
  • Myth 3: Child sexual abuse is less pervasive within societies with strong family structures,
  • Myth 4: Paedophia is an individual pathology,
  • Pt. III. Prevention and harm reduction :
  • 10. The importance of digital evidence in Internet sex offending / David Glasgow: Risk assessment and Internet offender, Candidate measures for risk assessmen, Informing community risk assessments
  • 11. Situational prevention of child abuse in the new technologies / Richard Wortley: Theoretical orientation: the person-situational interactio, Situational prevention
  • 12. Proactive strategies to prevent the use of child abusive images: the Dunkelfeld project / Klaus M. Beier and Janina Neutze: 'Dunkelfeld': offences that go undetected, Sexual preference for children: paedophilia and hebephilia, Primary and secondary prevention effort, Legal framework conditions in German, The Berlin Prevention Project Dunkelfel, First results from the Berlin Prevention Project Dunkelfel, Special focus on child pornography offence, The treatment, Treatment setting and manual construction, Treatment target, Outlook and new challenges
  • 13. Technological solutions to offending / Awais Rashid, Phil Greenwood, James Walkerdine, Alistair Baron and Paul Rayson: Current technological landscap, Filtering software, Forensic software, Internet-based offending: a moving target, Evolving offender tactics, Public to private shifts, Fluid identities, Data-overloading, Ethical and legal issues, Overcoming the challenges: from reactive to proactive policing, A roadmap;
  • 14. A public health approach to addressing Internet child sexual exploitation / Megan Clarke, Kurt M. Ribisl, Desmond Runyan and Carol Runyan: Overview: the public health burden of the issue, What is a public health approach and how does it apply to Internet child exploitation?, Logic models
Control code
ocn727702535
Dimensions
24 cm.
Extent
xv, 278 p.
Isbn
9780415689410
Isbn Type
(pbk.)
Lccn
2011034553
Other control number
6824613
Other physical details
ill.
System control number
(OCoLC)727702535

Library Locations

    • Academic LibraryBorrow it
      2020 S. Avenue 8E, Yuma, AZ, 85366, US
      32.6910976 -114.6289698
Processing Feedback ...