Corpus ID: 55444843

Developing child protection strategies:A Critical Study of Offenders’ Use of Information Technology for the Sexual Exploitation of Children

@inproceedings{Eneman2010DevelopingCP,
  title={Developing child protection strategies:A Critical Study of Offenders’ Use of Information Technology for the Sexual Exploitation of Children},
  author={Marie Eneman},
  year={2010}
}
  • Marie Eneman
  • Published 2010
  • Political Science
  • The overall aim of this thesis is to critically explore offenders’ use of information technology for the sexual exploitation of children, focusing upon child abusive material and grooming, in relation to the societal response, i.e. legal and technological regulation models. The following aspects are highlighted (i) How can offenders’ use of information technology for child abusive material and grooming be understood in relation to current regulation models? (i) What alternative models for… CONTINUE READING

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    Tables from this paper.

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 89 REFERENCES

    19. Information Systems

    VIEW 6 EXCERPTS
    HIGHLY INFLUENTIAL

    Doing Qualitative Research

    VIEW 16 EXCERPTS
    HIGHLY INFLUENTIAL

    Child exploitation and communication technologies

    VIEW 33 EXCERPTS
    HIGHLY INFLUENTIAL

    Information Systems: Critical Perspectives

    VIEW 36 EXCERPTS
    HIGHLY INFLUENTIAL

    Cybercrime: The Transformation of Crime in the Information Age

    VIEW 7 EXCERPTS
    HIGHLY INFLUENTIAL

    Sex Offenders and the Internet

    VIEW 12 EXCERPTS
    HIGHLY INFLUENTIAL

    Critical Engagement: Why, What and How?

    VIEW 9 EXCERPTS
    HIGHLY INFLUENTIAL