13.07.2015 Views

The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Moessner, Chris. “Cyberbullying.” Trends <strong>and</strong> Tudes, April 2007, 1–4. http://www.harrisinteractive.com/news/newsletters/k12news/HI_TrendsTudes_2007_v06_i04.pdf (accessedMarch 23, 2009).Mitchell, Kimberly J., David Finkelhor, <strong>and</strong> Janis Wolak. “Online Requests <strong>for</strong> Sexual Picturesfrom Youth: Risk Factors <strong>and</strong> Incident Characteristics.” Journal of Adolescent Health 41, no. 2(2007): 196–203. http://www.unh.edu/ccrc/pdf/CV155.pdf (accessed March 27, 2009).Mitchell, Kimberly J., David Finkelhor, <strong>and</strong> Janis Wolak. “Victimization of Youths on theInternet.” Journal of Aggression, Maltreatment <strong>and</strong> Trauma 8, nos. 1–2 (May 2003): 1–39.Mitchell, Kimberly J., Janis Wolak, <strong>and</strong> David Finkelhor. “Police Posing as Juveniles Online toCatch Sex Offenders: Is It Working?” Sexual Abuse: A Journal of Research <strong>and</strong> Treatment 17,no. 3 (July 2005): 241–67. http://www.unh.edu/ccrc/pdf/CV82.pdf (accessed March 28, 2009).Mitchell, Kimberly J., Janis Wolak, <strong>and</strong> David Finkelhor. “Trends in Youth Reports of SexualSolicitations, Harassment <strong>and</strong> Unwanted Exposure to Pornography on the Internet.” Journal ofAdolescent Health 40, no. 2 (2007): 116–26. http://www.unh.edu/ccrc/pdf/ CV135.pdf (accessedMarch 24, 2009).Roban, Whitney. “<strong>The</strong> Net Effect: Girls <strong>and</strong> New Media.” Executive Summary, Girl ScoutResearch Institute, Girl Scouts of the United States of America, New York, 2002.http://www.girlscouts.org/research/pdf/net_effect.pdf (accessed March 20, 2009).Sabina, Chiara, Janis Wolak, <strong>and</strong> David Finkelhor. “Rapid Communication: <strong>The</strong> Nature <strong>and</strong>Dynamics of Internet Pornography Exposure <strong>for</strong> Youth.” CyberPsychology <strong>and</strong> Behavior 11, no.6 (2008): 691–93.Strom, Paris S., <strong>and</strong> Robert D. Strom. “Cyberbullying by Adolescents: A PreliminaryAssessment.” Educational Forum 70, no. 1 (Fall 2005): 21–36.U.S. Congress. House of Representatives. Committee on Energy <strong>and</strong> Commerce. Subcommitteeon Oversight <strong>and</strong> Investigations. “Sexual <strong>Exploitation</strong> of <strong>Child</strong>ren over the Internet.” 109thCong., 2d sess., January 2007. Staff Report. http://republicans.energycommerce.house.gove/108/News/01032007_Report.pdf (accessed May 2009).U. S. General Accounting Office. “File-Sharing Programs: Peer-to-Peer Networks ProvideReady Access to <strong>Child</strong> Pornography.” Report to the Chairman <strong>and</strong> Ranking Minority Member,Committee on Government Re<strong>for</strong>m, House of Representatives, no. GAO–03–351, Washington,DC, 2003.Wells, Melissa, David Finkelhor, Janis Wolak, <strong>and</strong> Kimberly J. Mitchell. “Defining <strong>Child</strong>Pornography: Law En<strong>for</strong>cement Dilemmas in Investigations of Internet <strong>Child</strong> PornographyPossession.” Police Practice <strong>and</strong> Research 8, no. 3 (July 2007): 269–82.F-9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!