Please use this identifier to cite or link to this item: https://anrows.intersearch.com.au/anrowsjspui/handle/1/20320
Record ID: fffdd03c-a655-4ac0-a608-e8363e58d315
Full metadata record
DC FieldValueLanguage
dc.contributor.authorCrowther, Tanyaen
dc.contributor.authorBarnard, Matten
dc.contributor.authorDeMarco, Jeffreyen
dc.contributor.authorSharrock, Sarahen
dc.date.accessioned2022-06-30T23:52:33Z-
dc.date.available2022-06-30T23:52:33Z-
dc.date.issued2018en
dc.identifier.urihttps://anrows.intersearch.com.au/anrowsjspui/handle/1/20320-
dc.languageenen
dc.publisherNatCen Social Researchen
dc.subjectTechnology-facilitated abuseen
dc.subjectInterneten
dc.subjectEvidenceen
dc.subjectCharacteristicsen
dc.subjectOnline abuseen
dc.subjectPerpetratorsen
dc.subjectChildrenen
dc.subjectAbuseen
dc.titleBehaviour and characteristics of perpetrators of online-facilitated child sexual abuse and exploitation : a rapid evidence assessment. Final reporten
dc.typeReporten
dc.identifier.catalogid15044en
dc.identifier.urlhttps://webarchive.nationalarchives.gov.uk/ukgwa/https://www.iicsa.org.uk/key-documents/3720/view/rapid-evidence-assessment-behaviour-characteristics-perpetrators-online-facilitated-child-sexual-abuse-exploitation.pdfen
dc.subject.keywordExploitationen
dc.subject.keywordnew_recorden
dc.subject.keywordCharacteristicsen
dc.subject.keywordAbuseen
dc.subject.keywordChild abuseen
dc.subject.keywordChildrenen
dc.subject.keywordonline abuseen
dc.subject.keywordPerpetratorsen
dc.subject.keywordTechnologyen
dc.subject.keywordInterneten
dc.description.notes"The aim of this rapid evidence assessment was to answer the question: what is known<br/ >about the behaviour and characteristics of people who sexually abuse and exploit<br/ >children, where such abuse is facilitated by the internet?<br/ ><br/ >It considered how perpetrators use particular technologies, including social media<br/ >platforms, peer-to-peer file sharing, live streaming or webcams, the darknet and The<br/ >Onion Router (TOR) (freely available technology for enabling anonymous<br/ >communication). In addition, the rapid evidence assessment sought to answer the<br/ >following sub-questions:<br/ ><br/ >? How does the availability of these technologies – and the availability and changing nature of social media – influence perpetrators' behaviour?<br/ ><br/ >? How do perpetrators identify and target potential victims on different forums?<br/ ><br/ >? What are the key safeguarding challenges for institutions raised by these new and developing technologies and associated perpetrator behaviour?<br/ ><br/ >The rapid evidence assessment also sought to identify evidence regarding emerging<br/ >types of offences, specifically those involving children's self-generated sexual images<br/ >or material, including:<br/ ><br/ >? the role of self-generated material in sexual solicitation, exploitation and abuse<br/ >of children<br/ ><br/ >? sexual extortion, where the threat of sharing self-generated sexual material is used to blackmail children into performing sexual acts, or other gains by the perpetrator<br/ ><br/ >? offences in which self-generated sexual material shared freely online by children is identified and circulated by perpetrators with an interest in child sexual exploitation material<br/ ><br/ >Lastly, the rapid evidence assessment aimed to capture information pertaining to:<br/ ><br/ >? children who perpetrate online-facilitated sexual abuse against peers<br/ ><br/ >? the relationship between different types of offending (internet-only offences and<br/ >contact offences)<br/ ><br/ >? pathways into offending"<br/ ><br/ >Open access<br/ >See more: https://www.iicsa.org.uk/key-documents/3720/view/Rapid%20Evidence%20Assessment%20Behaviour%20and%20Characteristics%20of%20Perpetrators%20of%20Online-facilitated%20Child%20Sexual%20Abuse%20and%20Exploitation.pdfen
dc.date.entered2018-03-06en
dc.publisher.placeLondon, UKen
Appears in Collections:Reports

Files in This Item:
There are no files associated with this item.


Items in ANROWS library are protected by copyright, with all rights reserved, unless otherwise indicated.

Google Media

Google ScholarTM

Who's citing