Premium Essay

Online Child Exploitation

In:

Submitted By jaswartz
Words 1694
Pages 7
Understanding and Preventing Online Child Exploitation

Julie Swartzendruber

Kaplan University

Understanding and Preventing Online Child Exploitation

Online child exploitation is a growing concern in the United States and abroad. Children of all age groups use the internet for socializing, school projects, entertainment, and music. The internet opens up a world of information but can unfortunately open up a world of danger for children who are particularly vulnerable to this risk. Sexual predators lurk in chat rooms and social networking sites searching for victims. After the first initial contact has been made they develop friendships by saying that they have common interests which they don’t. The internet allows the predator to anonymously hide their identity and the child thinks they are talking to someone around their own age. We need more solutions to stop child exploitation. Educating parents, children, and adults as well as legislation and policy change are one step, but more needs to be done.

Strategies to combine education, training for those in the criminal justice field, resources from law enforcement, public health, and other private and public sector organizations to prevent this from happening are underway and also provide a solution to the problem. Even with the knowledge and up-to-date training, technology is always advancing making it harder for those in criminal justice to stop online child exploitation from happening since the predators are finding new ways all the time to stay a head of law enforcement by using chat rooms, surfing the net anonymously or composing electronic email, and by encrypting their data. With more training and education it will help better educate the public and people in law enforcement to understand online child exploitation along with ways of

Similar Documents

Free Essay

Cruel and Unusual Punishment Clause

...FINAL EXAM Course Name: ________________CRIMINAL LAW CLJ2100________________ School Name: _____________PALM BEACH STATE COLLEGE___________________ Any words, works, or statement are solely my own, And I shall not cheat, take another words, plagiarize or commit any violations of this course, this Professor’s rules, or the University’s Policies, Otherwise seek the consequences of a failure and possible suspension or expulsion. 1 Explain the Eighth Amendment (Cruel and Unusual Punishment Clause). The Cruel and Unusual Punishment Clause can be found in the English Bill of Rights in 1689 and later adopted by the Eighth Amendment to the United States Constitution in 1787. The phrase describes “punishment which is considered unacceptable due to the suffering, pain or humiliation it inflicts on the condemned person”. This amendment also includes the text that “excessive bail shall not be required, nor excessive fines imposed...”. It is thought that defendants who are not bailed have a more difficult time preparing for their defense. And by being “imprisoned” they are therefore being “punished” for the duration. That is why that questions of bail are always to be taken seriously by the courts. However, the Cruel and Unusual Punishment Clause did not make our Founding Fathers necessarily opponents against the Death Penalty. The Crimes Act of 1790 mandated the death penalty for treason, and also the mutilation of the corpse. There is no doubt, our modern courts...

Words: 3204 - Pages: 13

Free Essay

Information Technology Acts Paper

...ASHLEI MCQUEEN Information Technology Acts Paper BIS/220 PROFESSOR ZAMIR DEEN July 21, 2014 Information Technology Acts Paper The Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act, 2003 was enacted into law in January 2004 (Kigerl, 2009). This law was created from the enormous bulk spam in emails that hit airwaves I the 2000 's. everyone now has a computer of some sort Weathersby desktop laptop or tablet well and the new millennium decade everyone had a desktop home computer. What kept reoccurring was some of these balk messages would contain pornographic material and unwanted irritating and embarrassing material into people's inboxes of their email. This created a really bad phenomenon of people not liking to use email because I cannot tell what real email was and what was junk and there was nothing to break down each email or monitor what you were really writing to people because of all the horrendous spam. This is when can spam Law was created it big knowledge the ethical issues and recognized the marketing downfall people would face if they cannot protect email users from unwanted messages . As far as it manages an informational technology based on the ethical issues above they have had many advancements. For one the email service allows people to write a message to anyone on the continent with the click of a button. However many features have made ethical problems and prevailed through and made spam one of the most unwanted things...

Words: 956 - Pages: 4

Free Essay

To Snoop or Not to Snoop

...protecting children on the internet, we will consider family values, current laws and age appropriate monitoring. In my opinion, judgments and views from outside sources should not penetrate the “Family Values” that are usually dictated by the Head of Household. In most cases Family Values are there to deter any risky behavior by minor children. While the Internet allow kids the freedom to make friends, play games and research homework with the click of a button, it can pose a potential danger as online predators, cyber bullies and scam artists share the same freedoms. While there is no easy solution, preventative measures can greatly reduce a child’s chances of becoming a victim. Given the potential dangers of children’s internet usage, see the following suggestions for addressing internet safety in the home. 1. Explain to your children the potential hazards of online sexual solicitation and the risks associated with internet communication with strangers. 2. Teach your child to avoid sending personally identifying information via the internet. Such as a real name, address, school, telephone number, photos or names of family members. 3. Install a firewall, privacy filtration software and an antivirus program. 4. Discourage children from downloading games and other media which could contain Trojan and worm programs that enable remote access to computers by...

Words: 972 - Pages: 4

Premium Essay

Technology Acts

...are negative. Children are exposed to inappropriate material and materials that can be potentially harmful: promotion of violence, hate sites, pornography, etc… According to Department of Commerce (2003), “In October 2000, Congress passed the Children’s Internet Protection Act (CIPA), which requires schools and libraries that receive federal funds for discounted telecommunications, internet access, or internal connections services to adopt an internet safety policy and employ technological protections that block or filter certain visual depictions deemed obscene, pornographic, or harmful to minors” (para. 3). This implementation was successful after previous Congressional attempts to protect children from inappropriate content online. Congress' first attempt was in 1996 by passing the Communications Decency Act (CDA). The CDA restricted the introduction to inappropriate or obscene material via the internet to individuals under the age of 18; however, the Supreme Court found the law to be unconstitutional. According to Department of Commerce (2003), "The law violated free speech...

Words: 754 - Pages: 4

Premium Essay

Trends in Cybercrime-"Sextortion" in Teens and Children

...cyber-based terrorist attempts, computer intrusions, and major cyberfrauds. Cyberextortion is an outsider threat designed to obtain money, products, or favorable considerations from an organization or individuals by using illegal means of persuasion related to computer intrusion (Cybercrime Investigation & Intelligence, 2012). This paper addresses the relatively new form of sexual exploitation called “sextortion” that has emerged on the cybersex crime scene recently, and its affect upon teenagers and children. In addition, the paper addresses the dangers of scams associated with “sextortion”, its criminal profile, law enforcement initiatives to combat “sextortion”, and the penalties for committing these types of crimes. “Sextortion” is a method of sexual exploitation in which individuals are extorted with nude images of themselves shared online over the Internet. Texting has become the modern day method of communication among teens and children, and in the case of “sextortion” these images are displayed online via the new term of “Sexting” that is done via cell phones. Sexual predators that live online, in chat rooms, and on social networking websites eventually coerce their victims into performing sexual acts, or even performing hardcore pornography by sending threating e-mails through personal sites or social networking sites, such as Facebook, and MySpace. The demands of the extortionist...

Words: 2163 - Pages: 9

Premium Essay

Impact of Childhood Sexual Abuse

...Impact of Childhood Sexual Abuse Shobila Kaligounder Marymount University Introduction As per UNICEF’s (2014) definition, sexual violence against children comprises any sexual activities imposed by an adult on a child against which the child is entitled to protection by criminal law. This includes: (a) The inducement or coercion of a child to engage in any unlawful or psychologically harmful sexual activity; (b) The use of children in commercial sexual exploitation; (c) The use of children in audio or visual images of child sexual abuse; and (d) Child prostitution, sexual slavery, sexual exploitation in travel and tourism, trafficking for purposes of sexual exploitation (within and between countries), sale of children for sexual purposes and forced marriage. Sexual activities are also considered as abuse when committed against a child by another child if the offender is significantly older than the victim or uses power, threat or other means of pressure. Consensual sexual activities between children are not considered as sexual abuse if the children are older than the age limit defined by the State Party. In spite of a clear definition for child sexual abuse violence in the lives of children is so real and as an international community we do very little to protect them. There is also a dearth of data to prove the prevalence of violence due to the hidden nature of the abuse and gives a false notion that it is a rare occurrence. Children are vulnerable to sexual victimization...

Words: 3402 - Pages: 14

Premium Essay

Gender Exploitation in Social Networks

...GENDER EXPLOITATION IN SOCIAL NETWORKS A Research Proposal presented to The Faculty of College of Arts and Sciences Cebu Technological University – Main Campus In Partial Fulfillment Of the Requirements for DC 4117 (Manuscript Planning and Preparation) For the Degree Bachelor of Science in Development Communication Jievah Cris Codeniera Cantiveros Mark Anthony Dumaguit Gumera Genevive Jakosalem Monteceno 2013 Chapter I THE PROBLEM AND ITS SCOPE INTRODUCTION Rationale of the Study The 20th century has been a remarkable era in the communication field. The entertainment and information industries have been developed through motion pictures, sound recordings, print serials, radio, television, computers, video games and the Internet. All these are now universally available and can distribute any form of content imaginable (Grimes et al., 2008). While the flow of technology continues to advance, humanity cannot help it but go along with it. The more people are inclined to the new technological advancements, the more they struggle with its various advantages and disadvantages. One of these technologies is the Internet. The Internet is a data communication system that provides connectivity between computers. It encompasses a variety of electronic forms of communication such as moving images, audio transmission, electronic mail, online chat, file transfer and sharing, and databases, some of which are live and in real time. Interaction with other individuals...

Words: 4999 - Pages: 20

Premium Essay

Child Prostitution in Bangladesh

...1. Introduction: ECPAT (End Child Prostitution, Child Pornography and Trafficking of Children for Sexual Purposes) has described a clear idea about child prostitution. According to ECPAT (End Child Prostitution, Child Pornography and Trafficking of Children for Sexual Purposes), which became prominent in the late twentieth century for its work toward the elimination of child prostitution, child pornography, and trafficking of children for sexual purposes, defines child prostitution as "the use of a child in sexual activities for remuneration or any other consideration." According to UN Human Rights Commission (1989) “Child Prostitution” refers to the sexual exploitation of a child for remuneration in cash or in kind, usually but not always organized by an intermediary (parent, family member, procurer, teacher, etc.). Around the world today, there is a human right crisis of sexual abuse of millions of women, children and thousands of men in the prostitution & other form of sexual abuse. Child prostitution is the major part of total prostitution. Children are also involved in prostitution when they engage in sex in return for basic needs such as food, shelter or safety, or pocket money to purchase consumer goods. My paper explores the criminological factors associated with child prostitution in Bangladesh such as human trafficking and child prostitution, forced into prostitution, street children, broken home, social reintegration, livelihood and poverty, marital ...

Words: 3781 - Pages: 16

Premium Essay

10c - Child Maltreatment P3

...10C - Child Maltreatment P3: Explain the factors that would lead to suspicion of child maltreatment or abuse. Child maltreatment, also referred to as child maltreatment and neglect, includes all the various forms of abuse ranging from physical, emotional and sexual abuse to neglect and exploitation. This type of abuse can result in the potential or actual harm to a child's health, there development and dignity. Physical Abuse: Physical abuse also defined as non-accidental trauma or physical injury, of which can be caused by punching, beating, kicking, biting, burning or harming the child. Physical abuse is the most visible and second most common form of child maltreatment. In most cases, physical abuse is the result of inappropriate or excessive physical discipline. The child's parent or caregiver may strike out in anger, unaware of the magnitude of the force in which they strike the child. There are other various factors which can contribute to child abuse; this includes the immaturity of the parent(s), lack of parenting skills, poor childhood experiences and social isolation, as well as drug or alcohol problems and domestic violence. Other signs that would lead to suspicion of child maltreatment or abuse include: ● Unexplained bruises ● Unexplained burns – this would include cigarette burns or immersion burns ● Unexplained fractures, lacerations or abrasions ● Swollen areas ● Evidence of delayed or inappropriate treatment for injuries ● Withdrawn...

Words: 3255 - Pages: 14

Premium Essay

Computer Crime

...Research questions • • • • • • • • • • How are cyber crimes committed (e.g. credit cards, internet)? How many crimes are committed and what are the crime trends? Who commits them and why do people commit them? How much money is at stake, lost and recovered? How can such crime be reduced – by prevention or punishment? Online and desk-based reviews of books, reports and articles Legislative and case-law analysis, including sentencing research Consultations with business, government and the community Surveys of households, businesses, offenders and victims Analysis of media reporting of crime Research methods Dissemination of findings • Reports, books, articles, conference papers, roundtables, online, media Cyber crime concepts Organised Crime e.g. OMCGs Identity Crime Cyber Crime e.g. off-line crimes e.g. ID theft Internet Crime e.g. Offensive Content Phishing Financial Crime e.g. Home renovation scams A chronology of cyber crime Cloud computing risks 2009 Wireless vulnerabilities 2007 M-commerce attacks 2006 Phishing 2002 Cyberstalking 1998 Cyberterrorism attacks 1997 Spam 1995 Identity crime 1995 Online piracy 1995 Botnets 1993 Child exploitation1990 ATM fraud 1985 Funds transfer fraud 1985 Extortion 1980 Denial of service 1980 Creeper virus 1971 Computer hacking 1970 Telemarketing scams 1965 Phreaking 1961 Organised...

Words: 1301 - Pages: 6

Premium Essay

Sex Tourism in Thailand

...The emergence of the Child Sex Market: The market for children prostitutes has been created by a number of factors. During the 1970"s pedophiles from Western countries were attracted to Thailand because of its lenient laws against prostitution and the high currency exchange rate (Jubilee, p. 3). The supply of customers caused pimps to acquire children through sale and through kidnapping to meet their demand. Widespread rural poverty and the low socioeconomic status of children caused the influx of a large supply of rural children that could be acquired relatively cheep. To prevent the interference of the government Thai officials were bribed or in some cases offered a portion of the profits of the trade. When the AIDS epidemic severely hit the sex industry during the 1980"s many sex tourist began to engage in child sex tourism because children were seen as a safe alternative to adults. Child prostitutes were seen as being less risky due to their young age. Contrary to this notion sex with child prostitutes actually increases the likelihood of the transmission of AIDS due to the immature bodies of children (Jubilee, p. 4). In the past decade the media, most specifically the travel industry, has developed a taste for women with "girly" qualities. The result of this trend is a steadily increasing demand for underage prostitutes as well as the continual decline in the desired age for child prostitutes. Due to these unfortunate circumstances the child sex trade has steadily grown...

Words: 4881 - Pages: 20

Free Essay

Law Enforcement Challenges

...Law Enforcement Challenges August 23, 2015 The world is policed by many different forms of authority. The physical aspect of law enforcement has been seen in the media in the modern day for many good and many poor reasons. While race unfortunately gets tied in as a major role in many events today, it is tough to pull the race when a crime is committed behind a keyboard. While this challenge can pretty much be crossed off of the list, there are many more that law enforcement agencies face when investigating computer crime. There are so many laws that apply to regions of enforcement and also to the rights of the suspected criminal. The even more difficult part is that while all parties are working together to achieve the same goal, there are so many grey areas in the chain of command and jurisdictional rules. Agencies investigation crimes such as corruption face a number of different challenges as well. In my eyes, if the crime can be solved, it should not matter where the officer is from. All members of law enforcement have the same goals and that is to keep the citizens of this nation safe by preventing crime. When prevention is not possible or fails, the teams investigating should not have to worry about whether they are allowed to be doing their job. They should simply work together and document evidence and witness material accordingly. Before we tackle the jurisdiction let us point out some of the other challenges that law enforcement faces with different types...

Words: 1964 - Pages: 8

Premium Essay

3.1 Explain The Importance Of Legislation Relevant To The Study

...responsibilities of the practitioners and professionals that work with children and young people on a daily basis. Systems for recording information and dealing with complaints are also needed to ensure implementation and compliance. All child protection procedures should be linked with the Local Safeguarding Children Board. The procedures and systems should include:  A named person (and deputy) with a clearly defined role and responsibilities in relation to child protection.  A description of what child abuse is.  The procedures practitioners are required to follow where there are concerns about...

Words: 927 - Pages: 4

Premium Essay

Human Trafficking

...become a problem the entire world is faced with and there are no countries that are immune to this rapidly growing crisis. Human trafficking is the second largest illegal industry globally, behind the drug trade. The main contributors for human trafficking are governmental corruption, economic, and social crisis within each nation’s borders. In this report, I will cover the definition of human trafficking, some statistics gathered over the years, and what is being done to prevent human trafficking. Human trafficking is defined as the illegal trade in human beings for the purpose of commercial sexual exploitation or force labor and is considered as the modern day form of slavery. Human trafficking is an umbrella term used to describe all forms of modern-day slavery. These forms include, but not limited to forced labor, bonded labor, sex trafficking, child labor, and child soldiers. Forced labor makes up the majority of human trafficking in the world. The International Labour Organization (ILO) estimates that for every trafficking victim subjected to forced prostitution, nine people are forced to work. Forced labor is also known as involuntary servitude. Immigrants are particularly vulnerable, but individuals also may be forced into labor in their own countries. Bonded labor is the least known form, but it is one of the most widely used to enslave people. Victims become bonded laborers when their labor is demanded as a repayment of services. Such services may be illegal...

Words: 1284 - Pages: 6

Free Essay

Evidence

...Child Victims ITT Technical Institute CJ 1320 Investigations May 20, 2013 The general crimes that are committed against children who are 18 years of age and under are several. The list as follows: * Child exploitation * Child abuse * Child molester * Child abduction * Child abuse aggravated * Child labor * Child maltreatment * Child /sex trafficking * Children drug abuse * Under-age drinking * Bullying * Exposure to domestic violence When it comes to crimes against children it depends on who is the witness as well as where the crime was committed. Everything above has to go through Children & Youth Families Department (CYFD) and go through interviews with a forensic officer to see the nature of the alleged crime then being evaluated to see if the child needs to go through any therapy. This also based on first responders who can be the officer who responded to the call, and contacting the child protective services which then completes a safe house appointment when it comes to child abuse/molestation. As well depending on the crime it may go directly to FBI for further investigation for example child abductions, child exploitation, online predators or juvenile trafficking (sex trafficking). Depending on the nature of the crime then after full evaluation of the child’s mental state and age would go through and investigation which can go for years until it can go through trial based on district attorneys findings....

Words: 319 - Pages: 2