Skip to content
You are not logged in |Login  

LEADER 00000cam a2200589 a 4500 
001    ocn727702535 
005    20140619142013.0 
008    110819s2012    enka     b    001 0 eng   
010      2011034553 
016 7  015869998|2Uk 
020    9780415689403|qhardback 
020    0415689406|qhardback 
020    9780415689410|qpaperback 
020    0415689414|qpaperback 
024 8  6824613 
035    (OCoLC)ocn727702535 
035    580590 
040    DLC|beng|cDLC|dYDX|dBTCTA|dYDXCP|dCDX|dUKMGB|dOCLCO|dBWX
       |dCOO|dSDB|dYUS|dPUL|dCLU|dSTF|dGUL|dEEK 
042    pcc 
049    RIDM 
050 00 HV6773.15.O58|bU53 2012 
082 00 364.1/74083|223 
090    HV6773.15.O58 U53 2012 
245 00 Understanding and preventing online sexual exploitation of
       children /|cedited by Ethel Quayle and Kurt M. Ribisl. 
264  1 Abingdon, Oxon ;|aNew York :|bRoutledge,|c2012. 
300    xv, 278 pages :|billustrations ;|c24 cm 
336    text|btxt|2rdacontent 
337    unmediated|bn|2rdamedia 
338    volume|bnc|2rdacarrier 
504    Includes bibliographical references and index. 
505 0  pt. 1. Abusive images and their emergence as a significant
       problem. 1. An introduction to the problem / Ethel Quayle 
       and Roberta Sinclair : Harm or rights? ; The use of 
       abusive images ; Image content ; Desistance ; Social 
       contexts for image use ; Self-generated content -- 2. 
       Children within the images / Linda Jonsson and Carl Göran 
       Svedin : Self-produced sexual material ; Children in 
       sexually abusive images -- 3. Understanding the emergence 
       of the Internet sex offender: how useful are current 
       theories in understanding the problem? / Anthony R. Beech 
       and Ian A. Elliott : Applying the integrated theory of 
       sexual offending to understanding the online exploitation 
       of children ; Ward and Siegert's pathways model 
       explanation of online sexually abusive behaviours ; 
       Explanations of the offence process in Internet offending 
       -- 4. Child pornography in international law / Alisdair A.
       Gillespie : What is international law? ; Jurisdiction ; 
       Global instruments ; Regional instruments ; Enforceability
       -- 
505 0  pt. 2. Legal, social and familial contexts of abuse. 5. 
       Child pornography and law in East Asia / Bernard Y. Kao : 
       Legislative control of child pornography -- 6. The social 
       dimension of the online trade of child sexual exploitation
       material / Angela Carr : Child pornography and contact 
       child sexual offending ; The similarities and differences 
       between child pornography and contact child sexual 
       offenders ; So why don't more child pornography offenders 
       commit contact offences? ; The dark side of social control
       ; The new relationship between media consumption and 
       contact offending -- 7. Online child pornography, 
       paedophilia and the sexualized child: mediated myths and 
       moral panics / Yvonne Jewkes : Myth 1: Sexual attraction 
       to children is a problem of late-modern, technologically 
       advanced nations ; Myth 2: CSA is an offence carried out 
       by strangers and children are protected within the home ; 
       Myth 3: Child sexual abuse is less pervasive within 
       societies with strong family structures ; Myth 4: 
       Paedophia is an individual pathology ; Myth 5: Children 
       are 'innocent' victims -- 8. Sexual behaviour, adolescents
       and problematic content / Lars Lööf : Risks and risk-
       taking ; Coercion, peer pressure, grooming ; Exploitation 
       or abuse ; Young people's sexual behaviour online and 
       their safety when using information and communication 
       technologies ; Emergence of self-generated content ; Young
       people who are same-sex attracted and knowledge about 
       online behaviours ; Exposure to pornography/accessing 
       pornography? ; Balancing the rights of the child to 
       explore their sexuality and the right to be protected from
       that which might cause harm -- 9. Risk assessment of child
       pornography offenders: applications for law enforcement / 
       Angela W. Eke and Michael C. Seto : The scope of the 
       problem ; The present chapter ; Definitions ; Risk 
       assessment within law enforcement ; Risk assessment of 
       child pornography offenders ; Contact offending histories 
       ; Comparisons of child pornography and contact offenders ;
       Recidivism of child pornography offenders ; Risk factors ;
       Development of an offence-specific risk measure? ; Summary
       and implications for law enforcement ; Future directions 
       for research -- 
505 0  pt. 3. Prevention and hard reduction. 10. The importance 
       of digital evidence in Internet sex offending / David 
       Glasgow : Risk assessment and Internet offenders ; 
       Candidate measures for risk assessment ; Informing 
       community risk assessments -- 11. Situational prevention 
       of child abuse in the new technologies / Richard Wortley :
       Theoretical orientation: the person-situational 
       interaction ; Situational prevention -- 12. Proactive 
       strategies to prevent the use of child abusive images: the
       Dunkelfeld project / Klaus M. Beier and Janina Neutze : 
       'Dunkelfeld': offences that go undetected ; Sexual 
       preference for children: paedophilia and hebephilia ; 
       Primary and secondary prevention efforts ; Legal framework
       conditions in Germany ; The Berlin Prevention Project 
       Dunkelfeld ; First results from the Berlin Prevention 
       Project Dunkelfeld ; Special focus on child pornography 
       offences ; The treatment ; Treatment setting and manual 
       construction ; Treatment targets ; Outlook and new 
       challenges -- 13. Technological solutions to offending / 
       Awais Rashid, Phil Greenwood, James Walkerdine, Alistair 
       Baron and Paul Rayson : Current technological landscape ; 
       Filtering software ; Forensic software ; Internet-based 
       offending: a moving target ; Evolving offender tactics ; 
       Public to private shifts ; Fluid identities ; Data-
       overloading ; Ethical and legal issues ; Overcoming the 
       challenges: from reactive to proactive policing ; A 
       roadmap -- 14. A public health approach to addressing 
       Internet child sexual exploitation / Megan Clarke, Kurt M.
       Ribisl, Desmond Runyan and Carol Runyan : The public 
       health burden of the issue ; What is a public health 
       approach and how does it apply to Internet child 
       exploitation? ; Logic models. 
561    Gift of Paul and Mary Haas. 
650  0 Online sexual predators.|0https://id.loc.gov/authorities/
       subjects/sh2008003855 
650  0 Child pornography.|0https://id.loc.gov/authorities/
       subjects/sh85023536 
650  0 Internet pornography.|0https://id.loc.gov/authorities/
       subjects/sh00007414 
650  0 Child sexual abuse|xPrevention.|0https://id.loc.gov/
       authorities/subjects/sh2008100402 
650  0 Internet and children.|0https://id.loc.gov/authorities/
       subjects/sh95010275 
650  7 Online sexual predators.|2fast|0https://id.worldcat.org/
       fast/1745657 
650  7 Child pornography.|2fast|0https://id.worldcat.org/fast/
       1430022 
650  7 Internet pornography.|2fast|0https://id.worldcat.org/fast/
       977279 
650  7 Child sexual abuse|xPrevention.|2fast|0https://
       id.worldcat.org/fast/854648 
650  7 Internet and children.|2fast|0https://id.worldcat.org/fast
       /977226 
700 1  Quayle, Ethel,|d1953-|0https://id.loc.gov/authorities/
       names/n94105502 
700 1  Ribisl, Kurt M.|0https://id.loc.gov/authorities/names/
       n2011056787 
901    MARCIVE 20231220 
935    580590 
994    C0|bRID 
Location Call No. Status OPAC Message Public Note Gift Note
 Moore Stacks  HV6773.15.O58 U53 2012    Available  ---