13.07.2015 Views

The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

APPENDIX FSYNTHESIS OF MAJOR STUDIESIn 2009, the Federal Research Division of the Library of Congress prepared a synthesis of majorstudies surrounding Internet crimes against children using funding from the <strong>National</strong> Institute ofJustice. As previously noted, the inclusion of any study or project does not indicate that theDepartment supports the conclusions of such study or project.Research conducted relative to Internet crimes against children can be grouped into severalsubtopics: unwanted solicitation <strong>for</strong> sexual contact or pictures; pornography (children as thesubject); harassment <strong>and</strong> bullying; <strong>and</strong> unwanted exposure to sexually explicit material. Many ofthe studies described in this document have been conducted by researchers affiliated with theCrimes Against <strong>Child</strong>ren Research Center at the University of New Hampshire who extrapolateddata from the First (2000) <strong>and</strong> Second (2005) Youth Internet Safety Survey. <strong>The</strong>se surveyscanvassed a nationally representative sample of 1,500 youth ages 10 to 17 to determine theincidence <strong>and</strong> risk factors of youth exposure to sexual material on the Internet. Researchers alsoextrapolated data from the <strong>National</strong> Juvenile Online Victimization Study, which was intended toestimate the incidence of Internet sex crimes against minors occurring during a one-year period(2000–2001) that were known to law en<strong>for</strong>cement officials. This bibliography reviews thefindings of the studies conducted using these surveys, as well as other surveys conducted <strong>for</strong> thepurpose of identifying the patterns <strong>and</strong> frequency of criminal use of the Internet involvingchildren. <strong>The</strong> bibliography also reviews the results of focus-group studies, literature reviews, <strong>and</strong>reports commissioned by the U.S. Congress.<strong>The</strong> purpose of the studies, surveys, <strong>and</strong> reports reviewed herein was multifaceted. Researchersprimarily sought to determine how frequently children view sexually explicit material online <strong>and</strong>are approached <strong>for</strong> sexual activity online, as well as the demographics of the vulnerablepopulations. <strong>The</strong>y also wanted to identify what specific crimes were being committed, <strong>and</strong> bywhom, the role law en<strong>for</strong>cement plays in curtailing <strong>and</strong> preventing these activities, <strong>and</strong> whatinfluence pornography <strong>and</strong> sexualized material have on the moral values <strong>and</strong> sexual attitudes ofchildren <strong>and</strong> youth. <strong>The</strong>y looked at broader issues as well: how children use the Internetgenerally (as compared with adults) <strong>and</strong> what role family dynamics <strong>and</strong> the parent–childrelationship play in the prevention of Internet crime. Some of the studies examine a particularaspect of Internet crimes against children. For example, Patricia M. Greenfield, in testimonybe<strong>for</strong>e Congress, addressed the role of peer-to-peer file-sharing networks. She concludes that thenetworks are part of a pervasive, sexualized media environment that leads to inadvertentexposure of children <strong>and</strong> youth to pornography <strong>and</strong> other adult sexual content. In 2003 the U.S.General Accounting Office reported that child pornography is easily found <strong>and</strong> downloaded frompeer-to-peer networks, confirming observations of the <strong>National</strong> Center <strong>for</strong> Missing & Exploited<strong>Child</strong>ren.Other researchers looked at one aspect of online sexual exploitation —the grooming of childrenby adult predators. Ilene R. Berson <strong>and</strong> Duncan Brown, in their articles, describe how onlinepredators use deceptive techniques to gain a young child’s trust <strong>and</strong> manipulate him or her intoviewing pornography <strong>and</strong> agreeing to a personal meeting. Janis Wolak, David Finkelhor, <strong>and</strong>Kimberly J. Mitchell, in “Internet-Initiated Sex Crimes Against Minors,” describe characteristicsF-1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!