Australians who view live streaming of child sexual abuse: An analysis of financial transactions

@article{Brown2020AustraliansWV,
  title={Australians who view live streaming of child sexual abuse: An analysis of financial transactions},
  author={Rick Brown and Sara Napier},
  journal={Trends and issues in crime and criminal justice},
  year={2020},
  pages={1}
}
  • Rick Brown, Sara Napier
  • Published 19 February 2020
  • Psychology
  • Trends and issues in crime and criminal justice
In recent years, there has been growing evidence of live streaming technologies being used to facilitate child sexual abuse (CSA). This study examined a sample of financial transactions made by a cohort of Australians who provided funds to known facilitators of CSA live streaming in the Philippines. The results showed that these individuals were likely to be aged in their 50s or 60s and the majority (55%) had no criminal record. Ten percent had a sexual offence recorded in their criminal… 
5 Citations

Figures from this paper

Public Perceptions of Child Sexual Exploitation Abroad: A Vignette Experiment on the Influence of Social Distance

This study examines the impact of social and spatial distance on public opinion about sexual exploitation of children. A randomized vignette experiment among members of a Dutch household panel

Prevention, disruption and deterrence of online child sexual exploitation and abuse

European law has recognised the need for international cross-disciplinary collaboration to both identify, locate and safeguard victims and prevent, investigate and prosecute online child exploitation

Child Online Pornography

Online child pornography is a ubiquitous predicament over the internet, and its pessimistic effects and steady growth are significant in today's society. Online CSAM trading has recently gained much

The Deep Web and Children Cyber Exploitation

TLDR
A summary of the different types of online child sexual exploitation that take place across the deep web is explored, as well as the complexities of investigation and response being discussed so that readers can become conscious of this form of sexual abuse.

Developing automated methods to detect and match face and voice biometrics in child sexual abuse videos

TLDR
This research seeks to improve current investigative practices by developing a software prototype that uses both faces and voices to match victims and offenders across CSAM videos.

References

SHOWING 1-10 OF 33 REFERENCES

The Characteristics of Online Sex Offenders: A Meta-Analysis

TLDR
A meta-analysis was conducted to examine the extent to which online and offline offenders differ on demographic and psychological variables and found that online offenders had greater victim empathy, greater sexual deviancy, and lower impression management than offline offenders.

What is the profile of child exploitation material offenders

TLDR
This paper reviews recent literature to establish a profile of those who view or collect CEM, a form of child sexual exploitation offending that has proliferated and diversified through the advent of the internet and associated technology.

child pornography and the internet: perpetuating a cycle of abuse

Thirteen men convicted of downloading child pornography were interviewed with a view to understanding how these men talked about the photographs and the function such talk played in their accounts.

Online Child Exploitation Material – Trends and Emerging Issues: Research Report of the Australian National University Cybercrime Observatory with the input of the Office of the Children’s eSafety Commissioner

This report by the ANU Cybercrime Observatory provides an overview of three important areas for Child Exploitation Material (CEM): • The relationship between online and offline offending; • Horizon

Webcam Child Prostitution: An Exploration of Current and Futuristic Methods of Detection

IntroductionThe Internet and related technological developments have made the communication between people faster and cheaper. Voice-over-IP (VoIP) is one of those more efficient ways which users

GLOBAL THREAT ASSESSMENT 2009

The year 2009 will bring an increase of national security threats: terrorism, emulation of Al-Qaeda, instability in Iraq as Coalition troops withdraw, persistent threat in Afghanistan and Pakistan

The COPINE Project

Each new technological advance has brought with it abusive practices towards children. This is also the case for the Internet. This article describes the collaborative work of the COPINE research

National Police Reference System

  • https://www.acic.gov.au/our-services/national-police-reference-system
  • 2019

Trends in online child sexual abuse material

  • Bangkok: ECPAT International
  • 2018

Internet organised crime threat assessment 2019

  • The Hague: Europol
  • 2019