The Resource Understanding and preventing online sexual exploitation of children, edited by Ethel Quayle and Kurt M. Ribisl
Understanding and preventing online sexual exploitation of children, edited by Ethel Quayle and Kurt M. Ribisl
Resource Information
The item Understanding and preventing online sexual exploitation of children, edited by Ethel Quayle and Kurt M. Ribisl represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Yuma County Library District.This item is available to borrow from 1 library branch.
Resource Information
The item Understanding and preventing online sexual exploitation of children, edited by Ethel Quayle and Kurt M. Ribisl represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Yuma County Library District.
This item is available to borrow from 1 library branch.
- Language
- eng
- Extent
- xv, 278 p.
- Contents
-
- Pt. I. Abusive images and their emergence as a significant problem :
- 1. An introduction to the problem / Ethel Quayle and Roberta Sinclair: Harm or rights?, The use of abusive images, Image content, Desistance, Social contexts for image use, Self-generated content
- 2. Children within the images / Linda Jonsson and Carl Göran Svedin: Self-produced sexual material, Children in sexually abusive images
- 3. Understanding the emergence of the Internet sex offender: how useful are current theories in understanding the problem? / Anthony R. Beech and Ian A. Elliott: Applying the integrated theory of sexual offending to understanding the online exploitation of children, Ward and Siegert's pathways model explanation of online sexually abusive behaviours, Explanations of the offence process in Internet offending
- 4. Child pornography in international law / Alisdair A. Gillespie: What is international law?, Jurisdiction, Global instruments, Regional instruments, Enforceability --
- Myth 5: Children are 'innocent' victims
- 8. Sexual behaviour, adolescents and problematic content / Lars Lööf: Risks and risk-takin, Coercion, peer pressure, grooming, Exploitation or abuse, Young people's sexual behaviour online and their safety when using information and communication technologies, Emergence of self-generated content, Young people who are same-sex attracted and knowledge about online behaviour, Exposure to pornography/accessing pornography, Balancing the rights of the child to explore their sexuality and the right to be protected from that which might cause harm
- 9. Risk assessment of child pornography offenders: applications for law enforcement / Angela W. Eke and Michael C. Seto: The scope of the proble, The present chapte, Definition, Risk assessment within law enforcemen, Risk assessment of child pornography offender, Contact offending historie, Comparisons of child pornography and contact offender, Recidivism of child pornography offender, Risk factor, Development of an offence-specific risk measure, Summary and implications for law enforcemen, Future directions for research --
- Pt. II. Legal, social and familial contexts of abuse :
- 5. Child pornography and law in East Asia / Bernard Y. Kao: Legislative control of child pornography
- 6. The social dimension of the online trade of child sexual exploitation material / Angela Carr: Child pornography and contact child sexual offending, The similarities and differences between child pornography and contact child sexual offenders, So why don't more child pornography offenders commit contact offences?, The dark side of social control, The new relationship between media consumption and contact offending
- 7. Online child pornography, paedophilia and the sexualized child: mediated myths and moral panics / Yvonne Jewkes:
- Myth 1: Sexual attraction to children is a problem of late-modern, technologically advanced nations,
- Myth 2: CSA is an offence carried out by strangers and children are protected within the home,
- Myth 3: Child sexual abuse is less pervasive within societies with strong family structures,
- Myth 4: Paedophia is an individual pathology,
- Pt. III. Prevention and harm reduction :
- 10. The importance of digital evidence in Internet sex offending / David Glasgow: Risk assessment and Internet offender, Candidate measures for risk assessmen, Informing community risk assessments
- 11. Situational prevention of child abuse in the new technologies / Richard Wortley: Theoretical orientation: the person-situational interactio, Situational prevention
- 12. Proactive strategies to prevent the use of child abusive images: the Dunkelfeld project / Klaus M. Beier and Janina Neutze: 'Dunkelfeld': offences that go undetected, Sexual preference for children: paedophilia and hebephilia, Primary and secondary prevention effort, Legal framework conditions in German, The Berlin Prevention Project Dunkelfel, First results from the Berlin Prevention Project Dunkelfel, Special focus on child pornography offence, The treatment, Treatment setting and manual construction, Treatment target, Outlook and new challenges
- 13. Technological solutions to offending / Awais Rashid, Phil Greenwood, James Walkerdine, Alistair Baron and Paul Rayson: Current technological landscap, Filtering software, Forensic software, Internet-based offending: a moving target, Evolving offender tactics, Public to private shifts, Fluid identities, Data-overloading, Ethical and legal issues, Overcoming the challenges: from reactive to proactive policing, A roadmap;
- 14. A public health approach to addressing Internet child sexual exploitation / Megan Clarke, Kurt M. Ribisl, Desmond Runyan and Carol Runyan: Overview: the public health burden of the issue, What is a public health approach and how does it apply to Internet child exploitation?, Logic models
- Isbn
- 9780415689410
- Label
- Understanding and preventing online sexual exploitation of children
- Title
- Understanding and preventing online sexual exploitation of children
- Statement of responsibility
- edited by Ethel Quayle and Kurt M. Ribisl
- Language
- eng
- Cataloging source
- DLC
- Dewey number
- 364.1/74083
- Illustrations
- illustrations
- Index
- index present
- LC call number
- HV6773.15.O58
- LC item number
- U53 2012
- Literary form
- non fiction
- Nature of contents
- bibliography
- http://library.link/vocab/relatedWorkOrContributorDate
- 1953-
- http://library.link/vocab/relatedWorkOrContributorName
-
- Quayle, Ethel
- Ribisl, Kurt M
- http://library.link/vocab/subjectName
-
- Online sexual predators
- Child pornography
- Internet pornography
- Child sexual abuse
- Internet and children
- Child Abuse, Sexual
- Child Abuse, Sexual
- Erotica
- Internet
- Pedophilia
- Label
- Understanding and preventing online sexual exploitation of children, edited by Ethel Quayle and Kurt M. Ribisl
- Bibliography note
- Includes bibliographical references and index
- Contents
-
- Pt. I. Abusive images and their emergence as a significant problem :
- 1. An introduction to the problem / Ethel Quayle and Roberta Sinclair: Harm or rights?, The use of abusive images, Image content, Desistance, Social contexts for image use, Self-generated content
- 2. Children within the images / Linda Jonsson and Carl Göran Svedin: Self-produced sexual material, Children in sexually abusive images
- 3. Understanding the emergence of the Internet sex offender: how useful are current theories in understanding the problem? / Anthony R. Beech and Ian A. Elliott: Applying the integrated theory of sexual offending to understanding the online exploitation of children, Ward and Siegert's pathways model explanation of online sexually abusive behaviours, Explanations of the offence process in Internet offending
- 4. Child pornography in international law / Alisdair A. Gillespie: What is international law?, Jurisdiction, Global instruments, Regional instruments, Enforceability --
- Myth 5: Children are 'innocent' victims
- 8. Sexual behaviour, adolescents and problematic content / Lars Lööf: Risks and risk-takin, Coercion, peer pressure, grooming, Exploitation or abuse, Young people's sexual behaviour online and their safety when using information and communication technologies, Emergence of self-generated content, Young people who are same-sex attracted and knowledge about online behaviour, Exposure to pornography/accessing pornography, Balancing the rights of the child to explore their sexuality and the right to be protected from that which might cause harm
- 9. Risk assessment of child pornography offenders: applications for law enforcement / Angela W. Eke and Michael C. Seto: The scope of the proble, The present chapte, Definition, Risk assessment within law enforcemen, Risk assessment of child pornography offender, Contact offending historie, Comparisons of child pornography and contact offender, Recidivism of child pornography offender, Risk factor, Development of an offence-specific risk measure, Summary and implications for law enforcemen, Future directions for research --
- Pt. II. Legal, social and familial contexts of abuse :
- 5. Child pornography and law in East Asia / Bernard Y. Kao: Legislative control of child pornography
- 6. The social dimension of the online trade of child sexual exploitation material / Angela Carr: Child pornography and contact child sexual offending, The similarities and differences between child pornography and contact child sexual offenders, So why don't more child pornography offenders commit contact offences?, The dark side of social control, The new relationship between media consumption and contact offending
- 7. Online child pornography, paedophilia and the sexualized child: mediated myths and moral panics / Yvonne Jewkes:
- Myth 1: Sexual attraction to children is a problem of late-modern, technologically advanced nations,
- Myth 2: CSA is an offence carried out by strangers and children are protected within the home,
- Myth 3: Child sexual abuse is less pervasive within societies with strong family structures,
- Myth 4: Paedophia is an individual pathology,
- Pt. III. Prevention and harm reduction :
- 10. The importance of digital evidence in Internet sex offending / David Glasgow: Risk assessment and Internet offender, Candidate measures for risk assessmen, Informing community risk assessments
- 11. Situational prevention of child abuse in the new technologies / Richard Wortley: Theoretical orientation: the person-situational interactio, Situational prevention
- 12. Proactive strategies to prevent the use of child abusive images: the Dunkelfeld project / Klaus M. Beier and Janina Neutze: 'Dunkelfeld': offences that go undetected, Sexual preference for children: paedophilia and hebephilia, Primary and secondary prevention effort, Legal framework conditions in German, The Berlin Prevention Project Dunkelfel, First results from the Berlin Prevention Project Dunkelfel, Special focus on child pornography offence, The treatment, Treatment setting and manual construction, Treatment target, Outlook and new challenges
- 13. Technological solutions to offending / Awais Rashid, Phil Greenwood, James Walkerdine, Alistair Baron and Paul Rayson: Current technological landscap, Filtering software, Forensic software, Internet-based offending: a moving target, Evolving offender tactics, Public to private shifts, Fluid identities, Data-overloading, Ethical and legal issues, Overcoming the challenges: from reactive to proactive policing, A roadmap;
- 14. A public health approach to addressing Internet child sexual exploitation / Megan Clarke, Kurt M. Ribisl, Desmond Runyan and Carol Runyan: Overview: the public health burden of the issue, What is a public health approach and how does it apply to Internet child exploitation?, Logic models
- Control code
- ocn727702535
- Dimensions
- 24 cm.
- Extent
- xv, 278 p.
- Isbn
- 9780415689410
- Isbn Type
- (pbk.)
- Lccn
- 2011034553
- Other control number
- 6824613
- Other physical details
- ill.
- System control number
- (OCoLC)727702535
- Label
- Understanding and preventing online sexual exploitation of children, edited by Ethel Quayle and Kurt M. Ribisl
- Bibliography note
- Includes bibliographical references and index
- Contents
-
- Pt. I. Abusive images and their emergence as a significant problem :
- 1. An introduction to the problem / Ethel Quayle and Roberta Sinclair: Harm or rights?, The use of abusive images, Image content, Desistance, Social contexts for image use, Self-generated content
- 2. Children within the images / Linda Jonsson and Carl Göran Svedin: Self-produced sexual material, Children in sexually abusive images
- 3. Understanding the emergence of the Internet sex offender: how useful are current theories in understanding the problem? / Anthony R. Beech and Ian A. Elliott: Applying the integrated theory of sexual offending to understanding the online exploitation of children, Ward and Siegert's pathways model explanation of online sexually abusive behaviours, Explanations of the offence process in Internet offending
- 4. Child pornography in international law / Alisdair A. Gillespie: What is international law?, Jurisdiction, Global instruments, Regional instruments, Enforceability --
- Myth 5: Children are 'innocent' victims
- 8. Sexual behaviour, adolescents and problematic content / Lars Lööf: Risks and risk-takin, Coercion, peer pressure, grooming, Exploitation or abuse, Young people's sexual behaviour online and their safety when using information and communication technologies, Emergence of self-generated content, Young people who are same-sex attracted and knowledge about online behaviour, Exposure to pornography/accessing pornography, Balancing the rights of the child to explore their sexuality and the right to be protected from that which might cause harm
- 9. Risk assessment of child pornography offenders: applications for law enforcement / Angela W. Eke and Michael C. Seto: The scope of the proble, The present chapte, Definition, Risk assessment within law enforcemen, Risk assessment of child pornography offender, Contact offending historie, Comparisons of child pornography and contact offender, Recidivism of child pornography offender, Risk factor, Development of an offence-specific risk measure, Summary and implications for law enforcemen, Future directions for research --
- Pt. II. Legal, social and familial contexts of abuse :
- 5. Child pornography and law in East Asia / Bernard Y. Kao: Legislative control of child pornography
- 6. The social dimension of the online trade of child sexual exploitation material / Angela Carr: Child pornography and contact child sexual offending, The similarities and differences between child pornography and contact child sexual offenders, So why don't more child pornography offenders commit contact offences?, The dark side of social control, The new relationship between media consumption and contact offending
- 7. Online child pornography, paedophilia and the sexualized child: mediated myths and moral panics / Yvonne Jewkes:
- Myth 1: Sexual attraction to children is a problem of late-modern, technologically advanced nations,
- Myth 2: CSA is an offence carried out by strangers and children are protected within the home,
- Myth 3: Child sexual abuse is less pervasive within societies with strong family structures,
- Myth 4: Paedophia is an individual pathology,
- Pt. III. Prevention and harm reduction :
- 10. The importance of digital evidence in Internet sex offending / David Glasgow: Risk assessment and Internet offender, Candidate measures for risk assessmen, Informing community risk assessments
- 11. Situational prevention of child abuse in the new technologies / Richard Wortley: Theoretical orientation: the person-situational interactio, Situational prevention
- 12. Proactive strategies to prevent the use of child abusive images: the Dunkelfeld project / Klaus M. Beier and Janina Neutze: 'Dunkelfeld': offences that go undetected, Sexual preference for children: paedophilia and hebephilia, Primary and secondary prevention effort, Legal framework conditions in German, The Berlin Prevention Project Dunkelfel, First results from the Berlin Prevention Project Dunkelfel, Special focus on child pornography offence, The treatment, Treatment setting and manual construction, Treatment target, Outlook and new challenges
- 13. Technological solutions to offending / Awais Rashid, Phil Greenwood, James Walkerdine, Alistair Baron and Paul Rayson: Current technological landscap, Filtering software, Forensic software, Internet-based offending: a moving target, Evolving offender tactics, Public to private shifts, Fluid identities, Data-overloading, Ethical and legal issues, Overcoming the challenges: from reactive to proactive policing, A roadmap;
- 14. A public health approach to addressing Internet child sexual exploitation / Megan Clarke, Kurt M. Ribisl, Desmond Runyan and Carol Runyan: Overview: the public health burden of the issue, What is a public health approach and how does it apply to Internet child exploitation?, Logic models
- Control code
- ocn727702535
- Dimensions
- 24 cm.
- Extent
- xv, 278 p.
- Isbn
- 9780415689410
- Isbn Type
- (pbk.)
- Lccn
- 2011034553
- Other control number
- 6824613
- Other physical details
- ill.
- System control number
- (OCoLC)727702535
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.yumalibrary.org/portal/Understanding-and-preventing-online-sexual/6Yq73mFDSu8/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.yumalibrary.org/portal/Understanding-and-preventing-online-sexual/6Yq73mFDSu8/">Understanding and preventing online sexual exploitation of children, edited by Ethel Quayle and Kurt M. Ribisl</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.yumalibrary.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.yumalibrary.org/">Yuma County Library District</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Understanding and preventing online sexual exploitation of children, edited by Ethel Quayle and Kurt M. Ribisl
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.yumalibrary.org/portal/Understanding-and-preventing-online-sexual/6Yq73mFDSu8/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.yumalibrary.org/portal/Understanding-and-preventing-online-sexual/6Yq73mFDSu8/">Understanding and preventing online sexual exploitation of children, edited by Ethel Quayle and Kurt M. Ribisl</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.yumalibrary.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.yumalibrary.org/">Yuma County Library District</a></span></span></span></span></div>