13.07.2015 Views

The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction

The National Strategy for Child Exploitation Prevention and Interdiction

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

providers assisting child victims, <strong>and</strong> examine ways to integrate child survivors of trafficking into society. <strong>The</strong> research focuses on the cohort of child victims receiving services through foster care <strong>and</strong> unaccompanied refugee minors (URM) programs. By analyzing patterns of victimization be<strong>for</strong>e emancipation as well as post-emancipation experiences of child survivors within the United States Federal system of care, this research project attempts to exp<strong>and</strong> the knowledge base of the special service needs of child victims of trafficking, enhance treatment modalities, provide an underst<strong>and</strong>ing of repeat victimization, <strong>and</strong> take steps to prevent it in the future. Does the World of International Aid Need a Watchdog? Naik, Asmita. Forced Migration Review, no. 29, pp. 62-63, Dec 2007. Abstract: Five years on from the sc<strong>and</strong>al of sexual exploitation of West African refugee children by humanitarians, has enough been done to ensure that the system of international humanitarian assistance really does the good it is intended <strong>for</strong>? Adapted from the source document. Interpreting the Intentions of Internet Predators: An Examination of Online Predatory Behavior. Marcum, Catherine D. Journal of <strong>Child</strong> Sexual Abuse, vol. 16, no. 4, pp. 99 - 114, 2007. Abstract: This study examined three chat room transcripts between adult predators <strong>and</strong> adult volunteers of the group Perverted Justice who posed as children on the internet in order to provide insight on child sexual abuse on the internet. <strong>The</strong> findings of the study indicated that of the three men whose transcripts were analyzed, all used manipulation to lure their victims; the predators bluntly indicated their sexual intentions to the adolescent females. Only one man vocalized any sort of reservation about his wrongdoing while aggressively attempting to arrange a sexual encounter. <strong>The</strong> purpose of the study was to provide an underst<strong>and</strong>ing of the speed <strong>and</strong> aggressive nature of online solicitation of minors <strong>for</strong> sex. Few studies have actually taken place regarding behaviors <strong>and</strong> characteristics of Internet predators. <strong>The</strong> study had several limitations that could be improved in later research. It would be beneficial to review the communications between not only female adolescents <strong>and</strong> male adults, but also combinations of different genders of adolescents <strong>and</strong> adults as the type of conversations <strong>and</strong> deceptions techniques may be quite different between two males than between two females. A greater number of case studies should be examined to allow <strong>for</strong> a better representation of the population of Internet predators. Analysis of the lifestyles <strong>and</strong> past experiences of these predators would allow <strong>for</strong> a better underst<strong>and</strong>ing of their choices <strong>and</strong> activities. Perverted Justice (PeeJ) is a civilian watch group that is dedicated to exposing adult predators searching <strong>for</strong> children in chat rooms. Volunteers <strong>for</strong> PeeJ enter chat rooms <strong>and</strong> pose as children ranging in age from 10 to 15 years old <strong>and</strong> wait <strong>for</strong> predators to approach them <strong>for</strong> conversation. PeeJ methods are supported by the Department of Justice as well as local law en<strong>for</strong>cement agencies. This line of research proves valuable as it exposes tactics used by predators, helps policymakers counter predators with appropriate preventative courses of action, educates the public regarding the manipulation techniques used to lure children on <strong>and</strong> offline, <strong>and</strong> helps children underst<strong>and</strong> how to protect themselves. ReferencesF-51

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!