Academic Master

Education

Online Children Sexual Abuse

Technology has its fair share of advantages, but with the passage of time, there are some adverts impact of the way technology has been used for disruptive purposes has been witnessed. These days, the technology is facilitating the online sexual exploitation of the children. That includes the streaming of the sexual abuse of the children using the web cameras as well as cell phones. These activities are carried out for the purpose of generating profit which makes the act more disgusting to say the least (Adams and Flynn, 2017, p.45).

Grooming of Children for Sexual Exploitation

The unfortunate part is that the mobile devices have added new dimension to the way sexual exploitation of the children is supposed to be carried out (Adams and Flynn, 2017, p.45). There are applications that are supposed to target, recruit and bring children on board for sexual exploitation. Children are being coerced to partake in the sexual activity (Adams and Flynn, 2017, p.45). There are careful estimate that talk about the fact that how about thousands of children are being coerced into this racket through online mediums (Shields and Letourneau, 2015, p.11). The sad part is that the number is growing with the passage of time (Adams and Flynn, 2017, p.45). The common perception is that the girls are more prone to be the victims of online sexual exploitation and it is true to an extent, but that does not mean that boys are safe in any manner. From very young children to the adolescent is the victim of this abuse. Not only is that, children from all the ethnic and social background being faced with this situation (Shields and Letourneau, 2015, p.11).

Key Threats in the Area of the Child Sexual Exploitation

There are number of key threats that are faced by the children when it comes to the online sexual exploitation (Shields and Letourneau, 2015, p.11). For instance, peer to peer networks and the anonymous accesses like Darknet are one of the prime threats as far as the children sexual exploitation is supposed to be carried out (Adams and Flynn, 2017, p.45). These environments remain consistent when it comes to the availability of the child abuse material as well as the way non commercial distribution is supposed to be carried out (Shields and Letourneau, 2015, p.11). At the same time, they are also attractive avenues for the offenders, not only that, they are easy to use as well (Adams and Flynn, 2017, p.45). The key thing that is needed to be noted is that the greater the level of anonymity, the better it is for the abusers to make sure that they can carry out their activity without facing any consequence (Adams and Flynn, 2017, p.45). The problem is the global network has become so strong with the passage of time that it exists beneath the surface and thus the confidence and the comfort level of the abusers have increased (Shields and Letourneau, 2015, p.11). The profit driven abuse of the children in the overseas market that is carried out in front of the live camera is another thing that is needed to be kept in mind (Shields and Letourneau, 2015, p.11).

Sexting and Revenge Pornography of Children

The recent reports have implied that the children as young as 11 years are the victim of revenge porn (Adams and Flynn, 2017, p.45). At the same time, the worrying statistics is that how about 25 % of the cases in the revenge pornography involved someone who was younger than 18 years old. The problem is that there is culture of victim blaming and slut shaming that is being witnessed in the cases of revenge pornography and due to that, it is safe to assume that the actual number is going to be much higher as compared to what one gets to see in the mainstream media (Adams and Flynn, 2017, p.45). The problem is that the way sexting has become common these days, as it is seen is that the advent of the peer to peer networks and the online mediums have allowed people to share the intimate image with each other with great regularity. It has to be said that the child can be reported with revenge pornography if they share the images of someone that is above 18 years old (Adams and Flynn, 2017, p.45). The statistics are also something that is something that is needed to be looked at (Adams and Flynn, 2017, p.45). The key thing that is needed to be sorted out is that the way legality in these cases is needed to be reported (Adams and Flynn, 2017, p.45). If the sharing of the image is carried out at a certain point of time, even if the child is in the image, then they should be charged with the revenge pornography as well sharing the image of the children without their consent as they are not in the position to approve of such actions at such a young age (Adams and Flynn, 2017, p.45).

Availability of the Smartphone’s and Online Solicitation

The key thing that is needed to be noted here is that how the growing numbers of children these days own a Smartphone and due to that, they are able to make sure that they are able to self generate indecent material (Balfe et al. 2015, p.439). This type of material that is initially shared for the innocent intent can land into hands of the abuser. Either the person to whom this material is being sent might use these images in the wrong manner (Balfe et al. 2015, p.439). At the same time, the level of security and encryption that one gets to see in these peer to peer networks is far from ideal. As soon as this material lands into the hands of the abuser, they are in the position to exploit these images as a means of extortion (Mitchell et al. 2011, p.43). The key thing is that the parents need to have certain degree of control with regards to the way they watch the online activities of their children. At least, some sort of education is supposed to be provided to these children, so that they have an idea about how serious the consequences are if any intimate information lands into the wrong hands (DeHart et al. 2017, p.77).

Effect of Sexual Abuse and Exploitation on Children

There are many affects of the long term child abuse and exploitation on children. One of the key things in this regard is that what are the short term and long term impacts. The studies have showed that the victims of the child abuse have to face bullying at school and hurtful behavior from their peers (Flannery and O’Brien, 2016, p.45). The problem is that the lack of support that they receive at this point of time is very daunting for them and it has long term impact of the mental health of these children. Their grades develop due to that and as they lose interest in their studies, the key thing is that how the sexual exploitation is supposed to be carried out at the given time period (Flannery and O’Brien, 2016, p.45). The first thing that they lose is their self esteem and how they view themselves and at the same time, there is also prevalence of the stress disorder at the each and every level. Not only that, they also develop suicidal tendencies at the given point of time. There are also instances when they develop violent tendencies and resort to violence against some of the people who are facing these issues in the long run (Flannery and O’Brien, 2016, p.45). There are issues related to the drug and alcohol abuse as well that are needed to be taken into consideration (Flannery and O’Brien, 2016, p.45). The studies have also showed that how they tend to develop this habit in future that they resort to substance abuse in the later parts of their life as well (Merdian et al. 2017, p.65).

Commercial Child Sexual Exploitation

To some extent, there is considerable evidence that some form of the child sexual exploitation is a commercial market and there exists a demand for the live streaming of sexual acts and what it is doing is that it is contributing towards the increase in the amount of the abuse that one gets to see at the given point of time (Greenbaum et al. 2015, p.574). Live distant children abuse has the most obvious connection with the way commercial distribution of the whole thing is carried out (Merdian et al. 2017, p.65). There exists a vile community that approves of these actions in a distant manner. The material of such type is also valued highly in the commercial market to say the least (Greenbaum et al. 2015, p.574).

Are Girls More Prone to the Sexual Abuse and Exploitation at Online Forums

It has to be noted that girls are more at the risk of the online abuse and sexual exploitation as compared to the boys. There exists a commercial market that values child pornography and due to that, girls are at more risk of being sexually exploited at these online forums. As per empirical evidence, it can be seen that in 35 % of the cases of the sexual exploitation, usually the victims are girls (Greenbaum et al. 2015, p.574). Again, that does not mean that the risk factor for the boys is on the lower side. The boys are also at higher risk and the repercussions for the abuse and problem is as serious for boys as is the case for the girls. The problem is that the after affects for girls are much more serious for girls as they face complete social rejection in the wake of the sexual abuse (Merdian et al. 2017, p.191).

How Situation Can Be Improved

There are concrete steps that are needed to be taken to make sure that this whole community is being roped (Kloess et al. 2014, p.126). There are many challenges, but the governments, international organizations as well as NGO’s are making sure that they address these concerns together to make sure that the sexual exploitation is being stopped at one way or the another (Kloess et al. 2014, p.126). The first thing that is needed to be done is to make sure that the successful detection and prosecution of the perpetrators is being carried out to make sure that these crimes are being stopped. Not only that, the improvement is also needed to be placed towards securing the cyber evidence as well as allowing for the criminal prosecution of the crimes that are committed at online mediums (Kloess et al. 2014, p.126). The biggest challenge is that the low encryption in the peer to peer networks is something that is needed to be looked at the close manner to make sure that the level of control can be developed. The mechanism is also needed to be developed that allows the prosecution of the criminals (Kloess et al. 2014, p.126).

Developing the Appropriate Legal Framework

At the moment, the biggest challenge that is being faced by the legal prosecutors across the world is due to the different interpretations that one gets to see as far as the way these are developed. The other thing that is needed to be looked at is to make sure that the essential steps are also needed to be taken that there should be level of consistency with regards to how sexual abuse, online exploitation, revenge pornography as it is the vagueness in the legislation that is causing lot of issues with regards to the development of the controls in this regard (Merdian et al. 2017, p.191).

Conclusion

It can be seen that the online sexual exploitation is one of the biggest criminal and legislative issues (Merdian et al. 2017, p.191). The problem is that the criminal network is working in a very discrete manner and there is lot of vagueness attached to the whole sexual abuse thing due to which victims are not coming forward and reporting the incidents. At the same time, the other major problem that is faced with regards to the legislation (Merdian et al. 2017, p.191). The legal framework in this regard is also needed to be looked at to make sure that the criminals can be prosecuted (Merdian et al. 2017, p.191). Despite such challenges, governments, international organizations, and NGOs are working together to address the online sexual exploitation of children.  Governments must rally significant political will and resources to hold perpetrators accountable, provide comprehensive services to child victims, and prevent the crime from occurring (Merdian et al. 2017, p.191).

References

Adams, W. and Flynn, A., 2017. Federal Prosecution of Commercial Sexual Exploitation of Children Cases, 2004-2013. US Department of Justice, Office of Justice Programs, Bureau of Justice Statistics.

Balfe, M., Gallagher, B., Masson, H., Balfe, S., Brugha, R. and Hackett, S., 2015. Internet child sex offenders’ concerns about online security and their use of identity protection technologies: a review. Child Abuse Review24(6), pp.427-439.

DeHart, D., Dwyer, G., Seto, M.C., Moran, R., Letourneau, E. and Schwarz-Watts, D., 2017. Internet sexual solicitation of children: a proposed typology of offenders based on their chats, e-mails, and social network posts. Journal of sexual aggression23(1), pp.77-89.

Flannery, M.T. and O’Brien, R.C., 2016. The Sexual Exploitation of Children. Carolina Academic Press.

Greenbaum, J., Crawford-Jakubiak, J.E. and Committee on Child Abuse and Neglect, 2015. Child sex trafficking and commercial sexual exploitation: health care needs of victims. Pediatrics135(3), pp.566-574.

Kloess, J.A., Beech, A.R. and Harkins, L., 2014. Online child sexual exploitation: Prevalence, process, and offender characteristics. Trauma, Violence, & Abuse15(2), pp.126-139.

Merdian, H., Kettleborough, D., McCartan, K. and Perkins, D.E., 2017. Strength-based approaches to online child sexual abuse: using self-management strategies to enhance desistance behaviour in users of child sexual exploitation material. Journal of Criminal Psychology7(3), pp.182-191.

Merdian, H.L., Perkins, D. and McCashin, D., 2017. Assessment and treatment planning for individuals having accessed child sexual exploitation material: a feasibility study.

Mitchell, K.J., Jones, L.M., Finkelhor, D. and Wolak, J., 2011. Internet-facilitated commercial sexual exploitation of children: Findings from a nationally representative sample of law enforcement agencies in the United States. Sexual Abuse23(1), pp.43-71.

Shields, R.T. and Letourneau, E.J., 2015. Commercial sexual exploitation of children and the emergence of safe harbor legislation: implications for policy and practice. Current psychiatry reports17(3), p.11.

SEARCH

Top-right-side-AD-min
WHY US?

Calculate Your Order




Standard price

$310

SAVE ON YOUR FIRST ORDER!

$263.5

YOU MAY ALSO LIKE

Pop-up Message