"Con este informe, se pretende arrojar algo de luz sobre un fenómeno especialmente complejo y todavía difícil de delimitar, en parte por la falta de una definición única y por la ausencia de datos que revelen su prevalencia real, pero también en parte por la normalización de determinadas cond
...
uctas que contribuyen a ocultar su gravedad. Para ello, se ha preguntado a profesionales y personas expertas en la materia, provenientes de diversos ámbitos: jurídico, ciberseguridad y delitos informáticos, psicología, criminología, academia e investigación, y del ámbito de la protección y los derechos de la infancia. Además, se quiere conocer qué riesgos asociados a la explotación sexual digital identifica, asume y naturaliza la adolescencia en el entorno digital. Para ello, se ha realizado una encuesta a 1.008 jóvenes de entre 18 y 21 años, en la que se les ha preguntado por sus percepciones y conductas online durante la adolescencia, con especial foco en los conocimientos, creencias y experiencias relacionadas con la explotación sexual en línea. También se organizaron dos talleres presenciales con adolescentes de entre 15 y 18 años, para profundizar en las preocupaciones y riesgos que identifican en su uso de Internet, así como en cómo perciben y distribuyen la responsabilidad frente a la exposición a estos riesgos.
A partir de este análisis, se busca formular recomendaciones que fortalezcan la protección de niños, niñas y adolescentes frente a esta forma de violencia, también a través de los procesos legislativos actualmente en marcha, para que puedan ejercer de forma segura todos sus derechos en el entorno digital. Y se hace desde un enfoque de infancia, entendiendo que la tecnología y el mundo digital forman parte de la esfera en la que los niños, niñas y adolescentes se desarrollan, y que lo tecnológico está intrínsecamente ligado a su socialización, y también a cómo descubren y exploran su sexualidad, lo que implica riesgos específicos. Pero entendiendo también que estos riesgos no se originan en el vacío, sino que el ecosistema digital proporciona el caldo de cultivo que facilita y condiciona estas dinámicas." (Introducción, páginas 5-6)
more
"Cyber-deviance has been studied extensively over the past two decades, though owing to the elusive nature of cyberspace and the anonymity it affords its users, research has yet to paint a clear picture of the risk factors that predict online deviance. Early identification of these factors is critic
...
al to the development of effective crime prevention strategies. To date, a comprehensive review of the longitudinal risk factors associated with juvenile cyber-deviance, in all its forms, has yet to be examined. This study aims to address this research gap by conducting an exploratory systematic literature review appraising current knowledge on the risk factors associated with juvenile cyber-deviance. Various databases were systematically searched for relevant English-language journal articles comprising longitudinal studies on young people aged 12–17 years. Eligible studies included an outcome measure of any distinct form of deviance perpetrated using digital devices and/or the Internet, potential risk and/or protective factors, and quantitative analyses. This search yielded 26,926 studies, of which 38 met the inclusion criteria. Most of the studies found examined the longitudinal risk factors associated with cyberbullying, followed by studies on sexting, cyber dating abuse, and general cyber-delinquency. Results indicated several longitudinal factors were consistently associated with cyber-deviance (e.g., gender, physical bullying, low self-control, child-rearing, parental attachment, and deviant peers). Physical bullying had the most consistent and pronounced association with cyber-deviance. Most studies had a relatively sound methodological quality; however, the small number of studies and their concentration on cyberbullying requires that the findings be interpreted with caution. Additional high-quality research is needed examining the longitudinal risk factors associated with all types of cyber-deviance to identify vulnerable young people and prioritise them for intervention prospectively." (Abstract)
more
"In dieser Open-Access-Publikation stellen Katharina Kärgel und Frederic Vobbe anhand sieben typischer Fallbeispiele Handlungsempfehlungen für einen adäquaten Umgang mit mediatisierter sexualisierter Gewalt dar. Die Empfehlungen sind das Ergebnis des vom Bundesministerium für Bildung und Forschu
...
ng geförderten Projekts „HUMAN“. Sie wurden empirisch unter Beteiligung von Betroffenen sowie Expert*innen der Bereiche Recht, Psychologie, Pädagogik und Soziale Arbeit entwickelt. Sie umfassen jeweils Fallreflexionen sowie konkrete Handlungsansätze. Digitale Medien sind Instrument und Kontext sexualisierter Gewalt gegen Kinder und Jugendliche. Sie müssen bei Übergriffen durch zuvor fremde wie nahestehende Personen stets mitbedacht werden. Ihr Einsatz verstetigt die Belastungen Betroffener und führt zu einer hohen Komplexität von Interventionen." (Verlagsbeschreibung)
more
"Digitale Gewalt kommt nicht nur im öffentlichen Raum vor, sondern auch in privaten Beziehungen – und hat in Kombination mit häuslicher und sexualisierter Gewalt eine deutlich geschlechtsspezifische Komponente. Durch Informations- und Kommunikationstechnologien haben Gewaltformen wie Doxing, Sta
...
lking, Hate Speech und Online-Belästigung und -Bedrohung stark zugenommen und durch die Nutzung des Internets ihre Wirkmächtigkeit verstärkt. Die Beiträger*innen des Bandes liefern für den Umgang mit diesen Gewaltformen grundlegende interdisziplinäre Analysen und diskutieren sowohl juristische, technische und aktivistische Interventionen als auch Erfahrungen aus der Beratungspraxis. Dabei werden zentrale politische Änderungsbedarfe ausgemacht und entsprechende Handlungsoptionen aufgezeigt." (Verlagsbeschreibung)
more
"The review found that while there is a growing global body of evidence around effective education programming to prevent child sexual exploitation and abuse (CSEA), much of the available evidence is from high income countries (HICs) and largely focuses on programmes which address offline rather tha
...
n online abuse. The evidence that does exist on prevention of online CSEA is also from HICs, is of low quality overall and tends to focus on whether the intervention enhanced knowledge rather than changed behaviour. Further, as Internet use amongst children varies between high income and low income countries, it is important to be cautious in applying lessons learned across different contexts. Although online and offline CSEA are closely linked, it was also found that there is often an artificial division, with programmes tending to look at only online or only offline CSEA. Therefore, there is limited evidence of how programmes impact on both online and offline CSEA. In the East Asia and Pacific region, the evidence base on what works to tackle CSEA in education programming is at an early stage in scope and scale. Few comprehensive assessments or evaluations of education programmes tackling CSEA have taken place and/or are publicly available. It is also unclear whether majority of existing interventions are being evaluated and whether they were designed using evidence-informed theories of change methodology. Despite the constraints faced, this review draws on promising global and regional practice, emerging lessons and findings from available data on online risks, to highlight key factors to consider in the development of effective educational materials in East Asia and the Pacific." (Executive summary)
more
"The highest levels of regulation, from international treaties to constitutions, are unambiguous about creating an environment in which women thrive. However, this egalitarian space must be progressively realized, and one aspect of this work is eliminating discrimination, including in relation to ge
...
nder-based violence (GBV). Whether authorities care to admit it or not, the Internet is an inseparable part of the society in which we live, and online GBV demands a resolute hand. Unfortunately, the gaps in legal frameworks, not to mention deficient law enforcement, are forcing women to self-censor online or even wholly abandon platforms that could be used for legitimate expression and the exercise of other fundamental rights. Unless governments take urgent, comprehensive action, the inadequate protection of women’s rights online will continue to erode any other legislative attempts to achieve equality across different spheres of life." (Conclusion)
more
"Das Werk vermittelt verständlich und anschaulich den aktuellen Stand des Wissens zum Einsatz neuer Medien in der Klinischen Psychologie und Psychotherapie. Neben dem Wandel psychologischen und psychotherapeutischen Denkens und Handelns beleuchten die AutorInnen auch die daraus entstehenden ethisch
...
en und rechtlichen Rahmenbedingungen. Ein weiterer Schwerpunkt liegt auf der Diskussion jener Veränderungen, die durch die Digitalisierung im therapeutischen Behandlungsalltag entstanden sind. Fallbeispiele veranschaulichen die konkreten Chancen und Herausforderungen der psychologischen und psychotherapeutischen Arbeit. Zuletzt werden auch Problemfelder wie die problematische Internetnutzung, Cybermobbing und Extremismus im Internet dargestellt und diskutiert. Am Ende jedes Kapitels finden sich Take-Home-Messages, welche zentrale Punkte zusammenfassen und eine Handlungsorientierung bieten." (Verlagsbeschreibung)
more
"This booklet contains three series of factsheets related to online child sexual exploitation providing easy, ready-to-use resources to anyone interested in getting a better grasp of this issue. The first series is comprised of factsheets describing different manifestations of online child sexual ex
...
ploitation. The second series covers the five relevant regional and/or international legal frameworks containing provisions regarding one or more of the manifestations of online child sexual exploitation. Finally, the third series consists of Internet and Technology factsheets describing terms and tools which are relevant to understand the Internet and how different technologies are (potentially) used by child sex offenders or those trying to obstruct the perpetrators." (Foreword)
more
"En los últimos 20 años, se han dado pasos importantes para construir y fortalecer a la sociedad civil y la participación religiosa en la lucha contra la explotación sexual de niñas, niños y adolescentes. Sin embargo, debemos hacer mucho más y, por consiguiente, Religiones por la Paz (RfP) y
...
ECPAT International se complacen en presentar esta guía para la acción con el fin de ayudar a las comunidades religiosas a aprovechar al máximo sus capacidades para prevenir, responder y eliminar la explotación sexual de niñas, niños y adolescentes en línea. Esperamos que esta guía ofrezca algunas herramientas básicas para equipar a los y las líderes religiosos y a las comunidades y que puedan actuar, abogar, educar y colaborar entre sí y con iniciativas más amplias para que cada niña, niño y adolescente pueda vivir sin temor, desarrollar su verdadero potencial y disfrutar del regalo inviolable de su dignidad humana." (Preámbulo, página 2)
more
"Four Terre des Hommes Netherlands researchers spent 10 weeks posing as prepubertal Filipino girls on 19 public chat rooms. During that short period, a total of 20,172 predators from 71 countries committed crimes by soliciting the Webcam child sex tourism (WCST) research researchers, whom the predat
...
ors believed to be minors, for paid webcam sex performances. But 20,172 crimes in a sample of 19 chat rooms likely reflects only a small fraction of the number of crimes actually taking place every day when we consider the US Federal Bureau of Investigation’s estimates that there are 40,000 online chat rooms on which predators lurk. Moreover, WCST takes place on social networking sites, adult webcam sites and online dating sites, in addition to chat rooms. It is likely that WCST takes place tens of thousands of times each day. Four Terre des Hommes Netherlands researchers spent 10 weeks posing as prepubertal Filipino girls on 19 public chat rooms. During that short period, a total of 20,172 predators from 71 countries committed crimes by soliciting the WCST researchers, whom the predators believed to be minors, for paid webcam sex performances. But 20,172 crimes in a sample of 19 chat rooms likely reflects only a small fraction of the number of crimes actually taking place every day when we consider the US Federal Bureau of Investigation’s estimates that there are 40,000 online chat rooms on which predators lurk. Moreover, WCST takes place on social networking sites, adult webcam sites and online dating sites, in addition to chat rooms. It is likely that WCST takes place tens of thousands of times each day. The finding that WCST is such a common crime on public chat rooms led us to investigate whether law enforcement agencies are not adequately enforcing existing child protection laws because they are unable to identify predators engaging in WCST. We found that identifying predators seeking webcam sexual performances from children can be achieved through the use of a proactive investigation technique. During the 10 weeks spent collecting data, the four Terre des Hommes Netherlands researchers identified 1,000 predators seeking webcam sex performance from children on public chat rooms. They were identified using only information available in public online databases and data provided by predators. No computer hacking or illegal methods were applied. Instead, we just asked predators to provide identifying information under the fictional pretext—a technique known as “social hacking." (Executive summary, page 4-5)
more
"The Handbook of Internet Crime gathers together the leading scholars in the field to explore issues and debates surrounding internet-related crime, deviance, policing, law and regulation in the 21st century. The Handbook reflects the range and depth of cybercrime research and scholarship, combining
...
contributions from many of those who have established and developed cyber research over the past 25 years and who continue to shape it in its current phase, with more recent entrants to the field who are building on this tradition and breaking new ground. Contributions reflect both the global nature of cybercrime problems, and the international span of scholarship addressing its challenges." (Publisher description)
more
"This study presents the current methods used by traffickers to recruit their victims via the Internet, and identifies legal, administrative and technical means used to combat this misuse." (Back cover)
"Child pornography and the sexual abuse of children through misuse of the media and the internet are complex yet closely related issues. Not only do they necessitate complex solutions, they also demand a social response from all sectors of society. This volume records the response of these various s
...
ectors and shows how individuals and organizations can cooperate effectively. It describes the major work being carried out in some African countries, in Albania, Brazil, Guatemala, the Philippines, and Sri Lanka, and shows the efforts being made to share information and build networks. A reference section provides the site locations of organizations that have made significant advances in protecting children online. In addition, this book offers an action plan to encourage cooperation with others in the fields in a coherent and coordinated manner." (UNESCO website 11/2007)
more