Online predator

A West Midlands Police poster attempting to inform children about how to respond to online predators

Online predators are individuals who commit child sexual abuse that begins or takes place on the Internet.

Conceptions

Internet-facilitated sex crimes against minors involve deceit and begin with adults communicating with children over the Internet with the goal of coercing them into illegal sexual activity. Sometimes the sexual abuse happens face to face.[1][2]

Chat rooms, instant messaging, Internet forums, social networking sites, cell phones, and even video game consoles have issues with online predations.[3][4][5][6] These online areas attract predators because they allow them to have access to make contact with victims without drawing attention.[7] Also, the anonymity of online conversations leads to the disinhibition of minors, making them feel more comfortable and more likely to engage in risky behaviors.[8] This allows predators to use manipulation to put their targets into situations where they will comply with the predator's sexual demands. Initial manipulation often involves introducing the minors to sexual activity, showing them pornography, and requesting sexually explicit information and pictures.[9] This online predatory behavior does not often lead to offline contact.[7]

Even though it is the mainstream view that predators will use distinct tactics to meet victims, most actual in-person meetings do not involve any deception. In fact, the minors are usually complicit with perpetrators often using promises of love and romance to seduce victims to meet.[10]

Laws

In Australia, the murder of Carly Ryan in February 2007 led to public opinion pressure which eventually resulted in nationwide legal changes, nicknamed "Carly's Law", being made in 2017 to help protect minors online.[11] Ryan, aged 15, was a victim of online grooming and predatory behaviour, which was considered unique at the time, given that Ryan was the first person in Australia (and possibly the world[12]) killed by an online paedophile.[13][14]

In the U.S., some individuals have initiated actions against laws designed to protect children. Doe v. Shurtleff, 628 F.3d 1217 (10th Cir. 2010), was a United States Court of Appeals for the Tenth Circuit case assessing the constitutionality of Utah Code Ann. § 77-27-21.5, a law that requires sex offenders to register their internet identifiers with the state in order to "assist in investigating kidnapping and sex-related crimes, and in apprehending offenders".[15][16] In this case, a convicted sex offender, appearing anonymously as John Doe, appealed a decision by the U.S. District Court for the District of Utah to vacate an order enjoining the enforcement of Utah Code Ann. § 77-27-21.5.

Criticism

Cases involving stalking, violence, abduction, rape and/or murder are very rare. Most online sex offenders are young adults who target teens and seduce victims into sexual relationships. They take time to develop the trust and confidence of teens, so the teens see these relationships as romances or sexual adventures. Nearly 75 percent of victims who met offenders face-to-face did so more than once. Most of these offenders are charged with crimes such as statutory rape for non-forcible sexual contact as the victims are, by law, too young to consent. The youth most vulnerable to online sex offenders have histories of sexual or physical abuse, family problems, and tendencies to take risks both on- and offline. A 2007 study found no cases of minors being targeted by internet predators on the basis of information they had posted on social networking sites. The research that concluded the statistic that "1 in 5 children are sexually solicited online"[17] is being questioned.[18]

See also

References

  1. "Internet Safety: Keeping It Real". Oracle Thinkquest.
  2. "[CONTENT] - Parenting Tips". www.ahaparenting.com. Retrieved 12 October 2017.
  3. "Online Predators: Help minimize the risk". Microsoft Corporation. 24 September 2008.
  4. Williams, Pete (2006-02-03). "MySpace, Facebook attract online predators". MSNBC. Retrieved 2006-12-08.
  5. Burt, David (2009-03-16). "Playstation Pedophiles". Filtering Facts. Archived from the original on 2009-04-05. Retrieved 2009-03-16. [G]aming consoles such as PlayStation, Wii, and Xbox have become Internet-enabled, interactive devices. This provides an opportunity for pedophiles to befriend and groom minors.
  6. "Dr. Phil.com". www.drphil.com. Retrieved 12 October 2017.
  7. 1 2 "Are Crimes by Online Predators Different From Crimes by Sex Offenders Who Know Youth In-Person?". Journal of Adolescent Health. 53 (6): 736–741. 2013-12-01. doi:10.1016/j.jadohealth.2013.06.010. ISSN 1054-139X.
  8. Dombrowski, Stefan C.; Gischlar, Karen L.; Durst, Theo (2007-05-01). "Safeguarding young people from cyber pornography and cyber sexual predation: a major dilemma of the internet". Child Abuse Review. 16 (3): 153–170. doi:10.1002/car.939. ISSN 1099-0852.
  9. Lanning, Kenneth (2005). "Compliant Child Victims: Confronting an Uncomfortable Reality". ASPAC Advisor: 14.
  10. Troup-Leasure K, Snyder HN. Statutory rape known to law enforcement. Juvenile Justice Bulletin; 2005 Aug.
  11. "Criminal Code Amendment (Protecting Minors Online) Bill 2017". www.aph.gov.au. Retrieved 2018-08-23.
  12. "Today's top True Crime content". NewsComAu. Retrieved 2018-08-31.
  13. Australian Woman’s Weekly (2017-09-07). "My little girl was killed by an internet predator". www.pressreader.com. Retrieved 2018-08-23.
  14. "Case 91: Carly Ryan – Casefile: True Crime Podcast". Casefile: True Crime Podcast. 2018-08-04. Retrieved 2018-08-23.
  15. Doe v. Shurtleff, 628 F.3d 1217 (10th Cir. 2010).
  16. "Utah Code Ann. § 77-27-21.5". Archived from the original on 28 December 2011. Retrieved 12 October 2017.
  17. "Pennsylvania attorney general: cybersafety" (PDF). Retrieved 12 October 2017.
  18. Spreading "1 in 5" Number Does More Harm Than Good, Slashdot, Feb 26, 2008
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.