SlideShare a Scribd company logo
1 of 16
Download to read offline
INSAFE CONFERENCE
PROMOTING INTERNET SAFETY GLOBALLY: CONNECTING GENERATIONS




                Plenary session 15th May, 2012


        SEXUALITY: JUST TWO SIDES TO THE COIN?

      SUPPOSITIONS, HOPES AND REALITIES – lessons
      learned from working with children abused online


                  Tink Palmer
           CEO, Marie Collins Foundation
                     Cyprus, May 2012




                 Marie Collins Foundation
Survey of Barnardo’s services November 2002/3
   Just one click! Report published in 2004

 •   Children who view adult pornography - 5
 •   Children abused through prostitution using the Internet and mobile phones to
     contact their abusers - 4
 •   Adults or young people who engage in ‘cyber sex’ with children - 0
 •   Children of adults who download or distribute sexually abusive images of
     children - 1
 •   Children groomed online for sexual abuse offline - 15
 •   Children sold online for sexual abuse offline - 7
 •   Young people who place images of other young people online - 0
 •   Children who download sexually abusive images of children - 22
 •   Children sold online for live sexual abuse online - 1
 •   Children made the subject of child abuse images - 28



                            Marie Collins Foundation
Children who view adult pornography - 5


•   Availability, quantity and nature of the subject matter
•   What might be the long term impact on their understanding of intimacy
    and sex in the context of personal relationships?
•   Chose to search for adult pornography or encouraged to do so by
    another?

•   Impacts on girls
•   Age at which they start viewing/time spent
•   I this a growing problem? - Portman clinic – referrals for problematic
    internet usage – 0% 1997 to 26% in 2010 – adult pornography
    addiction being the major reason for referral
•   Key issue is their current developmental stage and the impact such
    imagery has on the way they think, feel and behave
•   Case study


                        Marie Collins Foundation
Adults or young people who engage in
          cybersex with children - 0

•   No cases referred under this category but during treatment
    programmes it became apparent that cybersex has occurred
•   Predicted that young people would be most unlikely to report such
    abuse


•   No case reported as the presenting problem
•   Such behaviour on the part of the perpetrator tends to be part of the
    grooming repertoire
•   No child has volunteered this information during treatment – counsellor
    is required to introduce this as a possibility




                        Marie Collins Foundation
Children abused through prostitution using the internet and
     mobile phones to contact their abusers and children sold
             online for sexual abuse offline - 4 + 1 = 5


•    New technology changed the manner in which contact is made – more
     hidden, less risks
•    Young people “appear” to be pro-active in developing the relationship
•    They do not (“can not”) perceive themselves as victims
•    The perpetrator(s) ensures dependency through isolating, drugs, drink,
     cigarettes

•    Large increase in online activity since mobile phones internet
     connectivity
•    Generally perpetrators are working in groups – mobile technolgies used
     for frequent and quick communication amongst perpetrators and
     between perpetrators and children
•    What happens to the evidence?
•    Case example


                        Marie Collins Foundation
Children of adults who download or distribute
            abusive images of children - 1


•   Operation Ore – a need to understand better the relationship between viewing
    and commissioning further sexual offences against children
•   What risk does the adult pose to the children in the home?
•   Impacts on family dynamics
•   No research
•   Practice guidance needed

•   Rise in prosecutions
•   Better recognition of that the need to understand the relationship
    between viewing and doing is driven, not only by law enforcement but
    also by child protection agencies
•   Still a paucity of research – but we have some useful advances –
    Michael Seto et al
•   Little guidance on determining risk
•   Decisions are disparate regarding outcomes

                           Marie Collins Foundation
Children who download sexually abusive
             images of children - 22

•   Number of children seen as a cause for concern
•   Self initiated or introduced by another?
•   Current practice does not give time for an accurate assessment and for
    decision making regarding disposal of the matter

•   The research that we have to date reinforces the initial impression –
    namely that a significant number of young people are viewing abusive
    images of children – 30%+ -
•   Recognition for a timelydual assessment process
•   Assessment and intervention models developed
•   No universal application across the UK




                       Marie Collins Foundation
Young people who place images of other
           young people online = 0

•   Motivation – innocently sending an image to a friend,, intending to
    embarrass and humiliate someone, a bullying tool
•   Little reported regarding this behaviour

•   Sexting - the act of sending sexually explicit messages or photos
    electronically, primarily between cell phones (mobile phones)”
•   40% saw nothing wrong with a topless image and 15% saw nothing
    wrong with naked images - 27% of respondents said that sexting
    happens regularly or all of the time

•   ACPO lead on Child Protection and Abuse Investigations – position
    statement




                        Marie Collins Foundation
Children groomed online for sexual abuse
                offline/online - 15

•   Grooming scenario - Find out as much as they can about their potential
    victim, establish the risk and likelihood of child telling find out about
    child’s family and social network if “safe enough” will isolate their victim
    – may use flattery and promises or threats and blackmail – and get
    control
•   Give false information, including false self images
•   A muted understanding of the lack of inhibition
•   Reframe the grooming scenario
•   Victims are not going to report –of all the case I have worked with non
    self reported
•   Minimal information given when interviewed by the police
•   Formed online relationships 12/13 – age when abuse was discovered
    14/15 – nb . Vulnerable groups/vulnerable stages in development
•   Very few presented with a history of troubled backgrounds
•   Recovery is a long haul!
                         Marie Collins Foundation
What’s different online?
                                Yas – aged 14



•   “The internet is a weird version of the real world where you can do
    everything
•   Groomers don’t have to worry about seeming suspicious
•   Children can act like adults
•   I used people online to make me feel good
•   Girls use groomers to make them feel mature – groomers use girls for
    sex – it’s mutual using of one another
•   Girls get involved with men because nothing much seems to be
    happening when you’re 12-14 but you want to be older
•   The most talkative (girls) online are the quietest offline
•   The most normal (man) online is a real weirdo offline
•   We rarely talk about our behaviour online – kind of embarrassing”

                         Marie Collins Foundation
Quotes from children




•   “I would never have told anyone if the police hadn’t come
    knocking at our door. It turned out that they had arrested the
    bloke I was friends with online and had traced me through
    examining his computer. First off, I said they’d got the wrong
    person….I was terrified my mum and dad would know what I had
    been talking about….you don’t even talk to your friends about
    what you say online….somehow it seems a different world….one
    in which I can act like I’m 22 when I’m actually only 14”




                     Marie Collins Foundation
Children made the subjects of child abuse
                  images - 27

•   History – availability, old images, introduction of the digital camera
•   COPINE – monitored the online behaviour of sexual abusers within
    newsgroups
•   Numbers
•   Perpetrators’ strategies to silence children
•   My hope – very young children, criminal justice system response
•   Silence/denial
•   Recovery issues – impotence, shame, responsibility, non resolution of
    the abuse
•   Still little evidence base research regarding victims
•   Insufficient resources to open pandora’s box


                         Marie Collins Foundation
continued


• Data from NCMEC
•   Relationship of indentified victims to their abuser
•   1998-2010
•   3358 identified victims
•   66% known to the child
•   14% coerced through online grooming
•   14% self produced
•   3% human trafficker
•   3% unknown to the child – un-established relationships
•   The making of child abuse images is, in the main, an offline crime
    commtted by people known to the victims

•   The UK Sentencing Commission – victim statements


                        Marie Collins Foundation
Some thoughts



•   Lack of critical understanding of the harms posed by the new
    technologies
•   Lack of training, expertise and capacity to investigate such crimes
    against children, to protect them from harm and assist in their recovery.
•   Online and offline abuse of children are merged activities
•   Intervention is a form of prevention (secondary and tertiary)
•   Children are resilient – with the right help they can recover and lead
    safe lives
•   We need to consider vulnerability within the context of child
    development
•   We are not reaching the 11 to 14 year olds with the right messages
•   The children’s workforce – social workers, health, education, police –
    are not asking the pertinent questions – they need to because the
    children will not voluntarily tell


                        Marie Collins Foundation
Barriers to effective
    listening and to asking
    the relevant questions
                                         The Adult
                                    Own pain, experiences,
                    Personal         memories, sexuality.
                                 View of child/alleged abuser .
                                   Values, attitudes, beliefs

               Feelings         Pity, Horror, Shame, Distress,
                               Embarrassment, Anger, Disgust,
                                          Uncertainty

        Doubts                 Will I cope? Will I make it worse?
                                      Is it true? What next?

Professional          Practicalities ( time, other responsibilities etc.),
                   Knowledge, Skills, Confidence, Legislation, Language,
                        Support available, Possible repercussions.
tinkpalmer@mariecollinsfoundation.org.uk
          Mobile; 07825 501180

              Tink Palmer
                  CEO
        Marie Collins Foundation




          Marie Collins Foundation

More Related Content

What's hot

Mc afee digital deception study 2013
Mc afee digital deception study 2013Mc afee digital deception study 2013
Mc afee digital deception study 2013
PNMI
 
Out Proud And Confident Peter Smith
Out Proud And Confident   Peter SmithOut Proud And Confident   Peter Smith
Out Proud And Confident Peter Smith
guest99fbb
 
short-6december presentation-teen sex thesis
short-6december presentation-teen sex thesisshort-6december presentation-teen sex thesis
short-6december presentation-teen sex thesis
Emilie Gomart
 
Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jf
John Field
 

What's hot (20)

Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Marta wojtas
Marta wojtasMarta wojtas
Marta wojtas
 
Andy Higgins (PACE)
Andy Higgins (PACE)Andy Higgins (PACE)
Andy Higgins (PACE)
 
Mc afee digital deception study 2013
Mc afee digital deception study 2013Mc afee digital deception study 2013
Mc afee digital deception study 2013
 
Youth, Sex & the Internet: What practitioners need to know
Youth, Sex & the Internet:  What practitioners need to knowYouth, Sex & the Internet:  What practitioners need to know
Youth, Sex & the Internet: What practitioners need to know
 
Synopsis of the baseline assessment
Synopsis of the baseline assessmentSynopsis of the baseline assessment
Synopsis of the baseline assessment
 
Social Media Impact On Children
Social Media Impact On ChildrenSocial Media Impact On Children
Social Media Impact On Children
 
Tackling Technology Assisted Harmful Sexual Behaviour - Education Scotland
Tackling Technology Assisted Harmful Sexual Behaviour - Education ScotlandTackling Technology Assisted Harmful Sexual Behaviour - Education Scotland
Tackling Technology Assisted Harmful Sexual Behaviour - Education Scotland
 
Presentation 2
Presentation 2Presentation 2
Presentation 2
 
The Influence of Media and Technology on Our Children
The Influence of Media and Technology on Our ChildrenThe Influence of Media and Technology on Our Children
The Influence of Media and Technology on Our Children
 
The Role of Social Media in Bullying and Teen Dating Violence PCA GA conference
The Role of Social Media in Bullying and Teen Dating Violence PCA GA conferenceThe Role of Social Media in Bullying and Teen Dating Violence PCA GA conference
The Role of Social Media in Bullying and Teen Dating Violence PCA GA conference
 
Templatecareers ppt madeline courtney
Templatecareers ppt madeline courtneyTemplatecareers ppt madeline courtney
Templatecareers ppt madeline courtney
 
Start Strong - Building Healthy Teen Relationships thru Online Tools
Start Strong - Building Healthy Teen Relationships thru Online ToolsStart Strong - Building Healthy Teen Relationships thru Online Tools
Start Strong - Building Healthy Teen Relationships thru Online Tools
 
Don't be invisible
Don't be invisibleDon't be invisible
Don't be invisible
 
Adolescent social media -- Medical perspective
Adolescent social media -- Medical perspectiveAdolescent social media -- Medical perspective
Adolescent social media -- Medical perspective
 
Out Proud And Confident Peter Smith
Out Proud And Confident   Peter SmithOut Proud And Confident   Peter Smith
Out Proud And Confident Peter Smith
 
short-6december presentation-teen sex thesis
short-6december presentation-teen sex thesisshort-6december presentation-teen sex thesis
short-6december presentation-teen sex thesis
 
Making the Right Decision: Student Leadership to Change the World www.mannren...
Making the Right Decision: Student Leadership to Change the World www.mannren...Making the Right Decision: Student Leadership to Change the World www.mannren...
Making the Right Decision: Student Leadership to Change the World www.mannren...
 
Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jf
 
Internet social
Internet socialInternet social
Internet social
 

Viewers also liked

HMA TECH PORTFOLIO
HMA TECH PORTFOLIOHMA TECH PORTFOLIO
HMA TECH PORTFOLIO
Manoj Kumar
 
Broker Price Opinion, Price It Right!
Broker Price Opinion, Price It  Right!Broker Price Opinion, Price It  Right!
Broker Price Opinion, Price It Right!
Marki Lemons Ryhal
 
Quality management in bpo
Quality management in bpoQuality management in bpo
Quality management in bpo
Grm Venkatesh
 
1 Quality Assurance Presentation
1 Quality Assurance Presentation1 Quality Assurance Presentation
1 Quality Assurance Presentation
guest337c19
 
Call centre presentation.ppt
Call centre presentation.pptCall centre presentation.ppt
Call centre presentation.ppt
KAFLAT
 

Viewers also liked (20)

HMA TECH PORTFOLIO
HMA TECH PORTFOLIOHMA TECH PORTFOLIO
HMA TECH PORTFOLIO
 
Broker Price Opinion, Price It Right!
Broker Price Opinion, Price It  Right!Broker Price Opinion, Price It  Right!
Broker Price Opinion, Price It Right!
 
BPO Operations Management
BPO Operations ManagementBPO Operations Management
BPO Operations Management
 
Quality assurance-in-bpo
Quality assurance-in-bpoQuality assurance-in-bpo
Quality assurance-in-bpo
 
Marketing 101 chapter2 building customer satisfaction
Marketing 101 chapter2 building customer satisfactionMarketing 101 chapter2 building customer satisfaction
Marketing 101 chapter2 building customer satisfaction
 
Quality management in bpo
Quality management in bpoQuality management in bpo
Quality management in bpo
 
Operation management in Bpo
Operation management in BpoOperation management in Bpo
Operation management in Bpo
 
Project on BPO
Project on BPOProject on BPO
Project on BPO
 
2 quality assurance
2 quality assurance2 quality assurance
2 quality assurance
 
1 Quality Assurance Presentation
1 Quality Assurance Presentation1 Quality Assurance Presentation
1 Quality Assurance Presentation
 
Quality control
Quality controlQuality control
Quality control
 
Quality Assurance in Hospitals
Quality Assurance in HospitalsQuality Assurance in Hospitals
Quality Assurance in Hospitals
 
Callcenter Training
Callcenter TrainingCallcenter Training
Callcenter Training
 
Quality control and quality assurance
Quality control and quality assuranceQuality control and quality assurance
Quality control and quality assurance
 
QUALITY ASSURANCE
QUALITY ASSURANCEQUALITY ASSURANCE
QUALITY ASSURANCE
 
Call centre presentation.ppt
Call centre presentation.pptCall centre presentation.ppt
Call centre presentation.ppt
 
Quality Assurance Vs Quality Control
Quality Assurance Vs Quality ControlQuality Assurance Vs Quality Control
Quality Assurance Vs Quality Control
 
Bpo presentation
Bpo presentationBpo presentation
Bpo presentation
 
Quality Assurance & Control
Quality Assurance & ControlQuality Assurance & Control
Quality Assurance & Control
 
Quality Control
Quality ControlQuality Control
Quality Control
 

Similar to Tink palmer

Iowa Bullying Prevention
Iowa Bullying Prevention Iowa Bullying Prevention
Iowa Bullying Prevention
emilyensign
 

Similar to Tink palmer (20)

Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
Keeping Children Safe Online
Keeping Children Safe OnlineKeeping Children Safe Online
Keeping Children Safe Online
 
DR JON GOLDIN - THE RISKS AND BENEFITS OF SOCIAL MEDIA ON THE MENTAL HEALTH O...
DR JON GOLDIN - THE RISKS AND BENEFITS OF SOCIAL MEDIA ON THE MENTAL HEALTH O...DR JON GOLDIN - THE RISKS AND BENEFITS OF SOCIAL MEDIA ON THE MENTAL HEALTH O...
DR JON GOLDIN - THE RISKS AND BENEFITS OF SOCIAL MEDIA ON THE MENTAL HEALTH O...
 
Cranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura BatesCranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura Bates
 
A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...
A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...
A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...
 
81-260-1 Chapter 13
81-260-1 Chapter 1381-260-1 Chapter 13
81-260-1 Chapter 13
 
Web safety
Web safetyWeb safety
Web safety
 
Trends and characteristics of youth Internet victimization
Trends and characteristics of youth Internet victimizationTrends and characteristics of youth Internet victimization
Trends and characteristics of youth Internet victimization
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measures
 
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year oldsRumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
Return Home Interview Intelligence
Return Home Interview IntelligenceReturn Home Interview Intelligence
Return Home Interview Intelligence
 
Sexting all schools handout no video.pptx
Sexting all schools handout no video.pptxSexting all schools handout no video.pptx
Sexting all schools handout no video.pptx
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
Christine Ann Raymond - Safeguarding Disabled Children Training Seminar - IEF...
Christine Ann Raymond - Safeguarding Disabled Children Training Seminar - IEF...Christine Ann Raymond - Safeguarding Disabled Children Training Seminar - IEF...
Christine Ann Raymond - Safeguarding Disabled Children Training Seminar - IEF...
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
YTHTechSex: An Exploration of Youth Sexual Health and the Digital Landscape
YTHTechSex: An Exploration of Youth Sexual Health and the Digital LandscapeYTHTechSex: An Exploration of Youth Sexual Health and the Digital Landscape
YTHTechSex: An Exploration of Youth Sexual Health and the Digital Landscape
 
Iowa Bullying Prevention
Iowa Bullying Prevention Iowa Bullying Prevention
Iowa Bullying Prevention
 

More from Agencija za odgoj i obrazovanje - Education and Teacher Training Agency

More from Agencija za odgoj i obrazovanje - Education and Teacher Training Agency (20)

naslov
naslovnaslov
naslov
 
IzbornaNastava-TK-5.raz
IzbornaNastava-TK-5.razIzbornaNastava-TK-5.raz
IzbornaNastava-TK-5.raz
 
IzbornaNastava-TK-6.raz.
IzbornaNastava-TK-6.raz.IzbornaNastava-TK-6.raz.
IzbornaNastava-TK-6.raz.
 
IzbornaNastava-TK-8.raz
IzbornaNastava-TK-8.razIzbornaNastava-TK-8.raz
IzbornaNastava-TK-8.raz
 
IzbornaNastava-TK-7.raz
IzbornaNastava-TK-7.razIzbornaNastava-TK-7.raz
IzbornaNastava-TK-7.raz
 
Info@Edu 4_Trogir_2015
Info@Edu 4_Trogir_2015Info@Edu 4_Trogir_2015
Info@Edu 4_Trogir_2015
 
DaniTehnickeKulture_Trogir_2015.
DaniTehnickeKulture_Trogir_2015.DaniTehnickeKulture_Trogir_2015.
DaniTehnickeKulture_Trogir_2015.
 
Ucenje kroz igru (Maja Barbic)
Ucenje kroz igru (Maja Barbic)Ucenje kroz igru (Maja Barbic)
Ucenje kroz igru (Maja Barbic)
 
Sat kodiranja hour of code (Davor Banovic)
Sat kodiranja   hour of code (Davor Banovic)Sat kodiranja   hour of code (Davor Banovic)
Sat kodiranja hour of code (Davor Banovic)
 
Projekt karijernog savjetovanja ucenika (Renato Barisic)
Projekt karijernog savjetovanja ucenika (Renato Barisic)Projekt karijernog savjetovanja ucenika (Renato Barisic)
Projekt karijernog savjetovanja ucenika (Renato Barisic)
 
Pocetnica proogramiranja (Marina Cicin Sain i Snjezana Babic)
Pocetnica proogramiranja (Marina Cicin Sain i Snjezana Babic)Pocetnica proogramiranja (Marina Cicin Sain i Snjezana Babic)
Pocetnica proogramiranja (Marina Cicin Sain i Snjezana Babic)
 
Office mix (Zeljka Knezovic)
Office mix (Zeljka Knezovic)Office mix (Zeljka Knezovic)
Office mix (Zeljka Knezovic)
 
Office 365 za os i ss (Zeljka Knezovic)
Office 365 za os i ss (Zeljka Knezovic)Office 365 za os i ss (Zeljka Knezovic)
Office 365 za os i ss (Zeljka Knezovic)
 
Mema (Marina icin Sain i Snjezana Babic)
Mema (Marina icin Sain i Snjezana Babic)Mema (Marina icin Sain i Snjezana Babic)
Mema (Marina icin Sain i Snjezana Babic)
 
Ict4 scf (Darko Vencl)
Ict4 scf (Darko Vencl)Ict4 scf (Darko Vencl)
Ict4 scf (Darko Vencl)
 
Ict curricula (Viktorija Hrzica)
Ict curricula (Viktorija Hrzica)Ict curricula (Viktorija Hrzica)
Ict curricula (Viktorija Hrzica)
 
Code eu (Ivana Ruzic)
Code eu (Ivana Ruzic)Code eu (Ivana Ruzic)
Code eu (Ivana Ruzic)
 
Jezicni savjeti strucni ispit
Jezicni savjeti    strucni ispitJezicni savjeti    strucni ispit
Jezicni savjeti strucni ispit
 
GOO u nastavnim temama iz informatike u srednjoj skoli
GOO u nastavnim temama iz informatike u srednjoj skoliGOO u nastavnim temama iz informatike u srednjoj skoli
GOO u nastavnim temama iz informatike u srednjoj skoli
 
GOO u nastavnim temama iz informatike u osnovnoj skoli
GOO u nastavnim temama iz informatike u osnovnoj skoliGOO u nastavnim temama iz informatike u osnovnoj skoli
GOO u nastavnim temama iz informatike u osnovnoj skoli
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

Tink palmer

  • 1. INSAFE CONFERENCE PROMOTING INTERNET SAFETY GLOBALLY: CONNECTING GENERATIONS Plenary session 15th May, 2012 SEXUALITY: JUST TWO SIDES TO THE COIN? SUPPOSITIONS, HOPES AND REALITIES – lessons learned from working with children abused online Tink Palmer CEO, Marie Collins Foundation Cyprus, May 2012 Marie Collins Foundation
  • 2. Survey of Barnardo’s services November 2002/3 Just one click! Report published in 2004 • Children who view adult pornography - 5 • Children abused through prostitution using the Internet and mobile phones to contact their abusers - 4 • Adults or young people who engage in ‘cyber sex’ with children - 0 • Children of adults who download or distribute sexually abusive images of children - 1 • Children groomed online for sexual abuse offline - 15 • Children sold online for sexual abuse offline - 7 • Young people who place images of other young people online - 0 • Children who download sexually abusive images of children - 22 • Children sold online for live sexual abuse online - 1 • Children made the subject of child abuse images - 28 Marie Collins Foundation
  • 3. Children who view adult pornography - 5 • Availability, quantity and nature of the subject matter • What might be the long term impact on their understanding of intimacy and sex in the context of personal relationships? • Chose to search for adult pornography or encouraged to do so by another? • Impacts on girls • Age at which they start viewing/time spent • I this a growing problem? - Portman clinic – referrals for problematic internet usage – 0% 1997 to 26% in 2010 – adult pornography addiction being the major reason for referral • Key issue is their current developmental stage and the impact such imagery has on the way they think, feel and behave • Case study Marie Collins Foundation
  • 4. Adults or young people who engage in cybersex with children - 0 • No cases referred under this category but during treatment programmes it became apparent that cybersex has occurred • Predicted that young people would be most unlikely to report such abuse • No case reported as the presenting problem • Such behaviour on the part of the perpetrator tends to be part of the grooming repertoire • No child has volunteered this information during treatment – counsellor is required to introduce this as a possibility Marie Collins Foundation
  • 5. Children abused through prostitution using the internet and mobile phones to contact their abusers and children sold online for sexual abuse offline - 4 + 1 = 5 • New technology changed the manner in which contact is made – more hidden, less risks • Young people “appear” to be pro-active in developing the relationship • They do not (“can not”) perceive themselves as victims • The perpetrator(s) ensures dependency through isolating, drugs, drink, cigarettes • Large increase in online activity since mobile phones internet connectivity • Generally perpetrators are working in groups – mobile technolgies used for frequent and quick communication amongst perpetrators and between perpetrators and children • What happens to the evidence? • Case example Marie Collins Foundation
  • 6. Children of adults who download or distribute abusive images of children - 1 • Operation Ore – a need to understand better the relationship between viewing and commissioning further sexual offences against children • What risk does the adult pose to the children in the home? • Impacts on family dynamics • No research • Practice guidance needed • Rise in prosecutions • Better recognition of that the need to understand the relationship between viewing and doing is driven, not only by law enforcement but also by child protection agencies • Still a paucity of research – but we have some useful advances – Michael Seto et al • Little guidance on determining risk • Decisions are disparate regarding outcomes Marie Collins Foundation
  • 7. Children who download sexually abusive images of children - 22 • Number of children seen as a cause for concern • Self initiated or introduced by another? • Current practice does not give time for an accurate assessment and for decision making regarding disposal of the matter • The research that we have to date reinforces the initial impression – namely that a significant number of young people are viewing abusive images of children – 30%+ - • Recognition for a timelydual assessment process • Assessment and intervention models developed • No universal application across the UK Marie Collins Foundation
  • 8. Young people who place images of other young people online = 0 • Motivation – innocently sending an image to a friend,, intending to embarrass and humiliate someone, a bullying tool • Little reported regarding this behaviour • Sexting - the act of sending sexually explicit messages or photos electronically, primarily between cell phones (mobile phones)” • 40% saw nothing wrong with a topless image and 15% saw nothing wrong with naked images - 27% of respondents said that sexting happens regularly or all of the time • ACPO lead on Child Protection and Abuse Investigations – position statement Marie Collins Foundation
  • 9. Children groomed online for sexual abuse offline/online - 15 • Grooming scenario - Find out as much as they can about their potential victim, establish the risk and likelihood of child telling find out about child’s family and social network if “safe enough” will isolate their victim – may use flattery and promises or threats and blackmail – and get control • Give false information, including false self images • A muted understanding of the lack of inhibition • Reframe the grooming scenario • Victims are not going to report –of all the case I have worked with non self reported • Minimal information given when interviewed by the police • Formed online relationships 12/13 – age when abuse was discovered 14/15 – nb . Vulnerable groups/vulnerable stages in development • Very few presented with a history of troubled backgrounds • Recovery is a long haul! Marie Collins Foundation
  • 10. What’s different online? Yas – aged 14 • “The internet is a weird version of the real world where you can do everything • Groomers don’t have to worry about seeming suspicious • Children can act like adults • I used people online to make me feel good • Girls use groomers to make them feel mature – groomers use girls for sex – it’s mutual using of one another • Girls get involved with men because nothing much seems to be happening when you’re 12-14 but you want to be older • The most talkative (girls) online are the quietest offline • The most normal (man) online is a real weirdo offline • We rarely talk about our behaviour online – kind of embarrassing” Marie Collins Foundation
  • 11. Quotes from children • “I would never have told anyone if the police hadn’t come knocking at our door. It turned out that they had arrested the bloke I was friends with online and had traced me through examining his computer. First off, I said they’d got the wrong person….I was terrified my mum and dad would know what I had been talking about….you don’t even talk to your friends about what you say online….somehow it seems a different world….one in which I can act like I’m 22 when I’m actually only 14” Marie Collins Foundation
  • 12. Children made the subjects of child abuse images - 27 • History – availability, old images, introduction of the digital camera • COPINE – monitored the online behaviour of sexual abusers within newsgroups • Numbers • Perpetrators’ strategies to silence children • My hope – very young children, criminal justice system response • Silence/denial • Recovery issues – impotence, shame, responsibility, non resolution of the abuse • Still little evidence base research regarding victims • Insufficient resources to open pandora’s box Marie Collins Foundation
  • 13. continued • Data from NCMEC • Relationship of indentified victims to their abuser • 1998-2010 • 3358 identified victims • 66% known to the child • 14% coerced through online grooming • 14% self produced • 3% human trafficker • 3% unknown to the child – un-established relationships • The making of child abuse images is, in the main, an offline crime commtted by people known to the victims • The UK Sentencing Commission – victim statements Marie Collins Foundation
  • 14. Some thoughts • Lack of critical understanding of the harms posed by the new technologies • Lack of training, expertise and capacity to investigate such crimes against children, to protect them from harm and assist in their recovery. • Online and offline abuse of children are merged activities • Intervention is a form of prevention (secondary and tertiary) • Children are resilient – with the right help they can recover and lead safe lives • We need to consider vulnerability within the context of child development • We are not reaching the 11 to 14 year olds with the right messages • The children’s workforce – social workers, health, education, police – are not asking the pertinent questions – they need to because the children will not voluntarily tell Marie Collins Foundation
  • 15. Barriers to effective listening and to asking the relevant questions The Adult Own pain, experiences, Personal memories, sexuality. View of child/alleged abuser . Values, attitudes, beliefs Feelings Pity, Horror, Shame, Distress, Embarrassment, Anger, Disgust, Uncertainty Doubts Will I cope? Will I make it worse? Is it true? What next? Professional Practicalities ( time, other responsibilities etc.), Knowledge, Skills, Confidence, Legislation, Language, Support available, Possible repercussions.
  • 16. tinkpalmer@mariecollinsfoundation.org.uk Mobile; 07825 501180 Tink Palmer CEO Marie Collins Foundation Marie Collins Foundation