Online child abuse

From The Right Wiki
Jump to navigationJump to search

Online child abuse is a unique form of child abuse also known as “Cyber Molestation” due to its virtual, distanced, and anonymous nature. Such abuse may not happen face-to-face, nor does it necessarily require physical contact. However, online abuse can result in negative face-to-face consequences in the form of statutory rape, forcible sexual assault, harassment, etc.[1] In the United States, online child abuse is recognized as a form of child abuse by the National Society for the Prevention of Cruelty to Children.[2] Online abuse of children can occur through a variety of forms. Including, but not limited, to cyber-bullying, grooming, and sexual abuse. Such abuse requires the use of the World Wide Web or cellphones, increasing its significance in an increasingly technological world.[3] The perpetrator of such online abuse may be a stranger or someone who is previously known by the victim.[3] A report by the Data & Society Research Institute and the Center for Innovative Public Health Research showed that 72% of U.S. Internet users have witnessed some form of online harassment or abuse, while 47% have personally experienced it. This study found no distinction between genders with respect to harassment, but deduced that women were at risk for a wider variety of online abuse.[4][relevant?] Governments across the world have acknowledged the importance of recognizing and combating online abuse of children.[not verified in body] In the United States this effort is led by the Internet Crimes Against Children Task Force. This task force consists of 61 individual task forces engaging with 4,500 federal, state, and local law-enforcement agencies all with the goal of combating online abuse of children.[5]

Cyber-bullying

Cyber-bullying, or Internet bullying, occurs when an individual or group electronically distributes negative, false, or otherwise harmful content about an individual or group using personal or private information that causes humiliation or distress to that individual.[6] Cyber-bullying can happen through the use of any device that is able to connect to the Internet (desktop, mobile devices, gaming devices, etc.) of cellphones and does not require the perpetrator to be in the same vicinity of the victim.[6][7][8] Cyber-bullying is especially prevalent among children as an extension of bullying within schools.[9] A Canadian research study found that children who were victims of cyber-bullying and also bullied in school were more likely to bully others over cyberspace.[9]

Prevalence

Variation

A study in 2011 found three primary reasons for targeting others over the Internet: informal social control, dominance, and entertainment.[8] Informal social control is applying pressure to change another person's behavior. Dominance refers to the attempt(s) of hurting someone, humiliating someone, or gaining access to their personal information (secrets, explicit photos, etc.). Entertainment refers to what is commonly known as trolling:[8] purposefully humiliating, annoying, or bothering someone for the purpose of eliciting an emotional response for the bully's enjoyment.[8] Perpetrators of trolling are called trolls, which are a subset of cyberbullies.[8][10]

Effects

Cyber-bullying is very common among children and young adults that are ten to eighteen years old.[11] Victims of cyber-bullying, often feel negative about themselves after being bullied. It is also common for cyber-bullying to have negative effects on cyber victims' social well-being because it has a negative impact on their self-esteem.[12] Another consequence of cyber-bullying is that a cyber victim may fear for their own safety.[13] Further research conducted by Patchin & Hinduja (2010) found that those involved with cyber-bullying, as perpetrators, victims, or both, have significantly lower self-esteem than those who have little to no exposure to cyber-bullying.[14] Kowalski & Limber (2013) also found that bullies and victims had the most negative scores on most measures of psychological health, physical, health, and academic performance.[15][16]

Laws

United States

In the United States, parents are encouraged to monitor their children's online activity and deal with cyber-bullying appropriately. If cyber-bullying involves sexual content or sexting, however, the cyberbully and their parents can also be subject to legal consequences, including being registered as sexual offenders.[17] Cyber-bullying that does not involve explicit sexual content can be more difficult to prosecute because there are no federal laws directly protecting children from direct forms of cyber-bullying.[18] Cases of cyber-bullying are difficult to pursue in the United States due to infringement on First Amendment rights (i.e.: freedom of speech).[19] U.S. schools can take action on incidents that occur outside of school if there is either a clear 'disruption to the educational process' or a 'true' threat to one (or more) of the students.[19] For an expression to be considered a 'true' threat, the federal court must determine "whether a reasonable person would foresee that the statement would be interpreted by those to whom the maker communicates the statement as a serious expression of intent to harm or assault".[19] As cyberbullying is increasingly recognized as a nationwide issue in the United States, whether or not public schools can limit their students' speech outside of school hours is becoming more of an issue.[19][8] High-profile cases of cyberbullying have been brought to the attention of state and local legislatures, and most U.S. states have implemented laws that ban any online communication that aims to cause humiliation, emotional distress, or fright.[20] Prosecution of cyber-bullying cases are usually a combination of civil laws that best fit the nature of each individual case.[21] Most states have both anti-bullying laws and policies, save for Arizona, Arkansas, Colorado, Hawaii, Mississippi, Missouri, North Carolina, and Texas. Stopbullying.gov, a federal agency tasked with preventing all forms of bullying, has created a detailed list of state laws and policies. An examples of a state anti-bullying campaign is the Massachusetts Aggression Reduction Center, which provides curriculum to educators about cyber-bullying and its connection to bullying inside of schools.[22] Cyber-bullying was specifically targeted in federal law by the Megan Meier Cyber-bullying Prevention Act introduced to the House of Representatives in 2009.[23][needs update] This prevention act sought to:

Amend the federal criminal code to impose criminal penalties on anyone who transmits in interstate or foreign commerce a communication intended to coerce, intimidate, harass, or cause substantial emotional distress to another person, using electronic means to support severe, repeated, and hostile behavior.[23]

This act was the result of the suicide of Megan Meier in 2006. Megan was the victim of cyber-bullying by a mother and teen daughter, which resulted in Megan committing suicide in her home in Missouri.[24]

Grooming

Grooming is a phenomenon that can occur on or offline. The official definition of grooming used by the U.S. Department of Justice is:

a method used by offenders that involves building trust with a child and the adults around a child in an effort to gain access to and time alone with her/him. In extreme cases, offenders may use threats and physical force to sexually assault or abuse a child... The offender may assume a caring role, befriend the child or even exploit their position of trust and authority to groom the child and/or the child's family. These individuals intentionally build relationships with the adults around a child or seek out a child who is less supervised by adults in her/his life. This increases the likelihood that the offender's time with the child is welcomed and encouraged.[25]

The above definition emphasizes the use of the child's family in building trust with the child. When grooming occurs online, however, this is frequently done without the knowledge or compliance of any adult. When children can use the Internet without supervision, there is more room for potential abuse. Online grooming itself can be driven by a variety of things. Most common is the use of online grooming to build a trusting relationship with a child in order to engage in either online or in-person sexual acts. The Internet is used to lead a child to potential sexual behavior. Grooming can also be used for other forms of exploitation of the child, such as blackmail for monetary gain and more. The two forms may be used in combination, with groomers convincing children to perform these sexual acts, such as the sending of nude photographs, and then blackmailing the victim by threatening to release information about them.[26]

Variation

Online grooming can occur in a variety of ways. Most commonly, chat rooms or social networks are used to make initial contact with possible victims. Groomers may also use photo-sharing apps, dating apps, or gaming websites to find their victims.[27] After establishing an online relationship, the groomer turns conversations to more personal matters, frequently sexual topics.[27] Groomers may then engage in sexual conversations with their victims, send nude photos or videos, encourage sexual acts on webcam, or persuade the victim to meet in person for sexual acts.[27] Groomers are not exclusively strangers. They can be family friends or individuals who have met the child before but primarily use the Internet in order to strengthen that relationship for future exploitation of the child. Individual groomers can be of any sex, gender, or age. Grooming is considered a complicated matter, and groomers may use many tactics. Groomers may use compliments or make promises to the child in order to elicit certain behaviors. Groomers may also assert control over the child to exploit natural sexual curiosity.[28] Frequently, groomers make a fake profile in order to create a persona more likely to be trusted by their possible victims. Such a phenomenon is known as catfishing. The definition of a catfish is "a person who sets up a false personal profile on a social networking site for fraudulent or deceptive purposes."[29] Although catfishing is not exclusively used by online groomers, it is a common way in which groomers contact their potential victim and build trust through a more-trustworthy false identity. Catfishing itself is not illegal in the United States, unlike identity theft, but when used as a method for online grooming is considered as the crime of grooming.[30]

Prevalence

Grooming and overall online abuse of children is an issue of growing concern in the modern technological era. Victims of online grooming are frequently young teens, with the majority of victims being between the ages of 13 and 15.[28] In a 2012 literature review of research in the area conducted by various English scholarly institutions, it was found that 9% of Internet users aged 10–17 reported unwanted online sexual solicitation or attempted grooming.[31]

Laws

United States

In the United States, grooming is considered a federal offense. Several federal laws include sections involving grooming. Under section § 2422 of the United States Criminal Code:

(a) Whoever knowingly persuades, induces, entices, or coerces any individual to travel in interstate or foreign commerce, or in any Territory or Possession of the United States, to engage in prostitution, or in any sexual activity for which any person can be charged with a criminal offense, or attempts to do so, shall be fined under this title or imprisoned not more than 20 years, or both. (b) Whoever, using the mail or any facility or means of interstate or foreign commerce, or within the special maritime and territorial jurisdiction of the United States knowingly persuades, induces, entices, or coerces any individual who has not attained the age of 18 years, to engage in prostitution or any sexual activity for which any person can be charged with a criminal offense, or attempts to do so, shall be fined under this title and imprisoned not less than 10 years or for life.[32]

The U.S. Bar Association claims that this statute "targets the sexual grooming of minors as well as the actual sexual exploitation of them."[25]

Non-governmental advocacy

In addition to legislation, there are several non-governmental programs and initiatives aimed at the issue. For example, R.AGE, a Malaysian-based group of journalists, aims to spread information about many important issues, including online safety and the occurrence of online grooming, in the hopes of "telling stories that matter, that make a difference, that hold people accountable, that give a voice to those who don't have one."[33] In addition, Pandora's Protect is a nonprofit organization that aims to provide support to the victims of crimes such as online grooming and assault. In addition, they spread information in order to prevent further assaults.[34]

Sexual abuse

Online sexual abuse is a relatively modern trend, in which perpetrators utilize modern forms of technology such as live stream web cameras, cell phones, or social media to coerce targeted victims into inappropriate and sometimes illegal sex acts.[35] Abusers do not discriminate and target victims of every walk of life. Online sexual abuse differs from other forms of sexual abuse in that it can be perpetrated stealthily on a global scale, allowing the offender to evade capture. At the same time, technology offers predators greater opportunities to find the youth that they prey upon.[contradictory][36] Children are often the targets of online sexual predators who will often bully, emotionally manipulate, blackmail, or befriend willing communicators on the web in order to obtain their desires.[37] Online sexual abuse may vary from personal interactions between a victim and offender to a more mechanized process, in which children are sexually exploited for the perpetrators' profit.[38] Online sexual predators often target young victims, with a study showing that 13% of children receive negative unwanted attention of a sexual nature on the Internet.[39] Predators make contact with prospective targets in a variety of settings, although the most prolific place that predators troll is chat rooms, where 76% of known first encounters with online sexual predators occur.[39] Predators troll chat rooms and other forms of social media like MySpace or Facebook, seeking people who outwardly share personal information.[1] Detection and deterrence of online sexual abuse are difficult because of the anonymous nature of the Internet; however, stopping and detecting an online predator's criminal activity is the task of various government organizations like the Federal Bureau of Investigation (FBI). The FBI's Violent Crimes Against Children Program was specifically created, "...to provide a rapid, proactive, and comprehensive counter to all threats of abuse and exploitation of children" in its jurisdiction.[40] The FBI accomplishes quick response times by having agents scouring the Internet in search of perpetrators; they ask for information in forums and chat-rooms and look for the telltale signs of abusive behavior in the children they interact with. Online sexual predators, however, are often difficult to distinguish because they show a misleading representation of themselves to avoid incriminating evidence.[40] Rather than relying completely on authorities to apprehend the perpetrators of online sexual abuse, one may decrease the chances of unwanted and unsolicited advances from online predators by keeping one's intimately private details off of the Internet.[1] Another way to avoid unwanted sexual solicitations is to ignore, block, and report an offender to the website's management staff.[1]

Laws

Examples

The murder of Kacie Woody occurred after 13-year-old Woody had befriended who she thought was a 17-year-old boy named Dave Fagen via Yahoo! Messenger, but in reality this person was a 47-year-old pedophile named David Fuller. After grooming Woody through the social network, Fuller traveled to Woody's home in rural Holland, Arkansas and abducted her. After Woody was reported missing and an investigation was launched, Arkansas law enforcement and FBI agents located Woody and Fuller's bodies in a storage unit in Conway. Fuller had bound and raped Woody inside his rented minivan in the unit before shooting her in the head, and shot himself in the head before officers could arrest him.[41][42]

See also

References

  1. 1.0 1.1 1.2 1.3 Janis Wolak, David Finkelhor, Kimberly J. Mitchell, Michele L. Ybarra (February–March 2008). Online "Predators" and Their Victims (PDF) (Vol 63 ed.). American Psychological Association. pp. 111–128. Retrieved 2 March 2018.{{cite book}}: CS1 maint: multiple names: authors list (link)
  2. "Child abuse and neglect". NSPCC.
  3. 3.0 3.1 "Online abuse". NSPCC. National Society for the Prevention of Cruelty to Children.
  4. "New report shows the reach of online harassment, digital abuse, and cyberstalking". Data&Society. Retrieved 28 February 2018.
  5. "ICAC TASK FORCE PROGRAM". iCAC. Retrieved 6 March 2017.
  6. 6.0 6.1 "What is Cyberbullying". stopbullying.gov. US Department of Health and Human Services. Retrieved 12 February 2018.
  7. Slonje, R., & Smith, P. K. (2008). Cyber-bullying: Another main type of bullying? Scandinavian Journal of Psychology, 49(2), 147-154. doi:10.1111/j.1467-9450.2007.00611.x
  8. 8.0 8.1 8.2 8.3 8.4 8.5 Rafferty, R. S. (2011). Motivations behind Cyber Bullying and Online Aggression: Cyber Sanctions, Dominance, and Trolling Online (Doctoral dissertation, Ohio University).
  9. 9.0 9.1 Beran, Tanya; Li, Qing (31 January 2008). "The Relationship between Cyber-bullying and School Bullying". The Journal of Student Well-being. 1 (2): 16. doi:10.21913/JSW.v1i2.172. ISSN 1835-7806.
  10. Craker, N., & March, E. (2016). The dark side of Facebook®: The Dark Tetrad, negative social potency, and trolling behaviors. Personality and Individual Differences, 102, 79-84.
  11. Vandebosch, H., & Cleemput, K. V. (2008). Defining Cyber-bullying: A Qualitative Research into the Perceptions of Youngsters. Cyber-Psychology & Behavior, 11(4), 499-503. doi:10.1089/cpb.2007.0042
  12. Dianne L. Hoff, Sidney N. Mitchell, (2009) "Cyber-bullying: causes, effects, and remedies", Journal of Educational Administration, Vol. 47 Issue: 5, pp.652-665, https://doi.org/10.1108/09578230910981107 Permanent link to this document:https://doi.org/10.1108/09578230910981107 Downloaded on: 16 February 2018, At: 14:44 (PT)
  13. Chandrashekhar, A. M., Muktha, G. S., & Anjana, D. K. (2016). Cyber-bullying and cyber-stalking. Imperial Journal of Interdisciplinary Research (IJIR), 3(1), 147-168. doi:10.1017/cbo9780511843846.008
  14. Patchin, J. W. and Hinduja, S. (2010), Cyber-bullying and Self-Esteem*. Journal of School Health, 80: 614-621. doi:10.1111/j.1746-1561.2010.00548.x
  15. Kowalski, R. M., & Limber, S. P. (2013). Psychological, Physical, and Academic Correlates of Cyber-bullying and Traditional Bullying. Journal of Adolescent Health, 53(1). doi:10.1016/j.jadohealth.2012.09.018
  16. Mishna, F., Saini, M., & Solomon, S. (2009). Ongoing and online: Children and youth's perceptions of cyber bullying. Children and Youth Services Review, 31(12), 1222-1228.
  17. Cite error: Invalid <ref> tag; no text was provided for refs named Cyber-bullying Stats
  18. McCallion, Gail (2013). "Student Bullying: Overview of Research, Federal Initiatives, and Legal Issues". Congressional Research Service.
  19. 19.0 19.1 19.2 19.3 Donegan, R. "Bullying and Cyber-bullying: History, Statistics, Law, Prevention and Analysis". The Elon Journal of Undergraduate Research in Communications. 3 (1). doi:10.15417/1881.
  20. "[United States of America v. Lori Drew," 2009]
  21. Blanch, Joey (2013). "Cyber-bullying: How Can United States Attorneys' Offices Address This Problem in Our Schools and Communities?". The United States Attorneys' Bulletin. 64 (3).
  22. "Resources for Educators". Massachusetts Aggression Reduction Center.
  23. 23.0 23.1 Linda, Sanchez (30 September 2009). "H.R.1966 - 111th Congress (2009-2010): Megan Meier Cyber-bullying Prevention Act". www.congress.gov.
  24. "Teen Recalls Web Hoax That Led to Suicide". ABC News. 26 February 2009.
  25. 25.0 25.1 Pollack, Daniel; MacIver, Andrea. "Understanding Sexual Grooming in Child Abuse Cases". American Bar Association. Retrieved 6 March 2018.
  26. Peachey, Paul (20 September 2013). "Paedophiles blackmail thousands of UK teens into online sex acts". Independent. Archived from the original on 2022-05-24. Retrieved 6 March 2018.
  27. 27.0 27.1 27.2 "Online Grooming". childline. NSPCC Weston House. Retrieved 12 February 2018.
  28. 28.0 28.1 "Everything You Need to Know about Online Grooming". NObullying.com. Archived from the original on 8 March 2018. Retrieved 12 February 2018.
  29. "catfish". Merriam-Webster. Retrieved 6 March 2018.
  30. Wilson, Cherry (24 February 2017). "Should "catfishing" be made illegal?". BBC News. Retrieved 6 March 2018.
  31. Livingstone, Sonia; Davidson, Julia; Bryce, Joanne; Batool, Saqba (October 2017). Children's online activities, risks and safety (PDF). London School of Economics.
  32. "Child Grooming Law and Legal Definition". US Legal. Retrieved 6 March 2018.
  33. "What We Do". R.AGE. Archived from the original on 8 March 2018. Retrieved 6 March 2018.
  34. "Support and Resources for the Survivors of Rape and Sexual Abuse". Pandora's Project. Retrieved 6 March 2018.
  35. "Child sexual exploitation". NSPCC.
  36. "Impact of online and offline child sexual abuse". NSPCC. National Society for the Prevention of Cruelty to Children. Retrieved 1 March 2018.
  37. "Online abuse". NSPCC. National Society for the Prevention of Cruelty to Children. Retrieved 12 February 2018.
  38. "Online Sexual Exploitation of Children: An Alarming Trend". U.S. Department of State. The Office of Website Management, Bureau of Public Affairs. Archived from the original on 28 June 2017. Retrieved 12 February 2018.
  39. 39.0 39.1 "Facts and Statistics". The U.S. Department of Justice NSOPW. U.S. Department of Justice. Archived from the original on 10 March 2019. Retrieved 1 March 2018.
  40. 40.0 40.1 "Violent Crimes Against Children/Online Predators". FBI.gov. U.S. Department of Justice. Retrieved 16 February 2018.
  41. Wiese, Kelly (December 6, 2002). "Ark. Police Find Girl, Man Dead in Unit". Associated Press. Conway, Arkansas. Retrieved January 21, 2022.
  42. "Kacie's Story". Kacie Woody Foundation. Retrieved January 21, 2022.