SlideShare a Scribd company logo
1 of 26
Policy Cyber Crime
by: Petter Gottschalk
Presented by: Group 2
Topics to Discuss
3. Child Grooming Case
3.1 Online Offenders
3.2 Internet characteristics
3.3 Internet Relationship
3.4 Grooming Legislation
Child Grooming Case
Child Grooming Case
• The case of child grooming as computer crime
• 9-19 age young people are accessed from the Internet in one
day.
• Internet provides the opportunity to interact with friends on
social networking sites.
• Myspace and Bebo are websites for enable to access
information for the young people.
• There is increasing evidence that the Internet is used by some
adults to access children and young people in order to groom
them for the purpose of sexual abuse.
Child Grooming Case
• What is Child Grooming?
Child grooming is befriending and establishing an emotional
connection with a child, and sometimes the family, to lower
the child's inhibitions with the object of sexual abuse.
• Ex. Family, friends, etc.
Child Grooming Case
• Myspace - is a social
networking sites offering an
interactive, user-submitted
network of friends, personal
profiles, blogs, groups,
photos, music, and videos.
Child Grooming Case
• Bebo - is a social networking
website launched in 2005. It
now describes itself as "a
company that dreams up
ideas for fun social apps;" Joe
Mbu, the man behind the
Bebo relaunch, has confirmed
that the site will not be
returning as a social network
but as a company that makes
social apps.
Online Offenders
Online Offenders
• Recent advance in computer technology
have been aiding sexual sex offenders,
stalkers, child pornographers, child
traffickers, and others with the intent of
exploiting children (Kierkegraad, 2008:41).
• Men who target young people online for
sex are pedophiles (Kierkegraad, 2008;
Wolak et al., 2008).
• According to Dunaigre (2001), the
pedophile is an emblematic figure, made
into caricature and imbued with all the
fears.
Online Offenders
• According to Davidson and Martellozo (2008: 227), internet sex
offender behavior can include: “the construction of sites to be
used for the exchange of information, experiences, and
indecent images of children; the organization of criminal
activities that seek to use children for prostitution purposes and
that produce indecent images of children at professional level;
the organization of criminal activities that promote sexual
tourism”.
Internet Characteristics
Internet Characteristics
• Internet is an international network of networks that connects
people all over the world.
• The internet has created a universal technology platform on
which to build all sorts of new products, services communities
and solutions.
• The internet has provided an expedient mode of communication
and access to a wealth of information.
- (Dombrowski et al., 2007)
Internet Characteristics
• Internet has moved from a strange communication medium to
an obvious tool in our homes, schools, workplaces and travels.
• Searching information, perform routine task and communicate
with others.
• Developing same speed as number of users globally.
- (Quayle et al., 2006)
Internet Characteristics
• The WWW is a system with universally accepted standards of
storing, retrieving, formatting, changing and displaying
information.
• Web pages can be viewed by any type of computer.
Internet Characteristics
• 78% of the respondents said that involve in chatting, 8-17 yrs
old.
• 9% have been plagued while chatting.
• 1/3 has first met with person in reality while chatting.
- (Medietilsynet, 2008).
Internet Characteristics
• The internet is a valuable tool; however, it can also detrimental to the
wellbeing of children due to numerous online hazards
- (Dombrowski et al., 2007: 153).
Internet Relationships
Internet relationship
• The internet is a special artifact system that has enormous
technical and social positive impacts on modern society
(Kierkegaard, 2008: 41).
the online environment enables access to a wealth of
information and communication across both distance and time.
there is a vast amount of data available on virtually every subject,
making it an effective learning tool
Internet relationship
• However, the internet is also a double-edge sword with negative
and positive consequences (Kierkegaard, 2008: 41).
It has a potential for misuse and has generated social
concerns. Today, the danger for children is even greater because
the Internet provides anonymity to predators.
Internet relationship
• In the other hand, the internet is not all negative concerning
sexual communication (Caldar, 2004: 3).
it can be used for sexual expression.
• Relationships are built using software. Conversations using
social software are collectively referred to as social media, a
wide-ranging terms than encompasses the practice and
resulting output of all kinds of information created online by
those who were previous consumers of that media (Cook, 2008:
7).
Internet relationship
• Philosophically, social media describes the way in which
content has become democratized by the Internet and the role
people now play not only in consuming information and
conveying it to others, but also in creating and sharing content
with them, be it textual, aural or visual.
Grooming Legislation
Grooming Legislation
• Sexual offences Act(2003)
• Section 15: meeting a child following sexual grooming
- this applies to the internet, to other technologies such as mobile
phones and to the real world
• Protection of Children and Prevention of Sexual Offences Act (2005)
- meeting a child following certain preliminary contact
• Section 1: Preliminary Contact
- refers to occasions where a person arranges to meet a child who is
under 16, having communicated with them on at least previous occasions.
Grooming Legislation
• General Civil Penal Code (“staffeloven”) 2007- the relevant sections
concerned with sexual offenders
• Section 195: any person who engages in sexual activity with a child who is
under 14 years of age shall be liable to imprisonment for a term not
exceed to 10 years.
• Section 196: any person who engages in sexual activity with a child who is
under 16 years of age shall not be liable to imprisonment for a term not
exceed to 5 years.
Grooming Legislation
• Section 201a: the new grooming section

More Related Content

What's hot

3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.jessy0121
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationpamelazuley
 
Cyber Crime and how to prevent it?
Cyber Crime and how to prevent it?Cyber Crime and how to prevent it?
Cyber Crime and how to prevent it?Mujeeb Riaz
 
Contemporary performing arts
Contemporary performing artsContemporary performing arts
Contemporary performing artsJeremy Torres
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingckeeling
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying CarlosE15
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 

What's hot (20)

3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyberbullying ppt.
Cyberbullying ppt.Cyberbullying ppt.
Cyberbullying ppt.
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyber Crime and how to prevent it?
Cyber Crime and how to prevent it?Cyber Crime and how to prevent it?
Cyber Crime and how to prevent it?
 
Contemporary performing arts
Contemporary performing artsContemporary performing arts
Contemporary performing arts
 
Alfred Hitchcock
Alfred HitchcockAlfred Hitchcock
Alfred Hitchcock
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Keith haring
Keith haringKeith haring
Keith haring
 
CYBERBULLYING
CYBERBULLYINGCYBERBULLYING
CYBERBULLYING
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Performance Art
Performance ArtPerformance Art
Performance Art
 

Similar to Child grooming

Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyProtecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyCTIC Technology Centre
 
Lecture 5 - Growth of the internet, UK & Global trends
Lecture 5 - Growth of the internet, UK & Global trendsLecture 5 - Growth of the internet, UK & Global trends
Lecture 5 - Growth of the internet, UK & Global trendsJames Stanfield
 
Lecture 4: Global Trends
Lecture 4: Global TrendsLecture 4: Global Trends
Lecture 4: Global TrendsJames Stanfield
 
Lecture 4: Global Trends 2019
Lecture 4: Global Trends 2019Lecture 4: Global Trends 2019
Lecture 4: Global Trends 2019James Stanfield
 
Internet Safety And The Internet
Internet Safety And The InternetInternet Safety And The Internet
Internet Safety And The InternetStephanie King
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftHeather Dionne
 
Projektfuzet angol-web
Projektfuzet angol-webProjektfuzet angol-web
Projektfuzet angol-webOmbodi Gábor
 
Children and Online Safety
Children and Online SafetyChildren and Online Safety
Children and Online Safetyalandang
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write upvictoriahoo
 
Does the Usage of Internet harm Child DevelopmentIs the interne.docx
Does the Usage of Internet harm Child DevelopmentIs the interne.docxDoes the Usage of Internet harm Child DevelopmentIs the interne.docx
Does the Usage of Internet harm Child DevelopmentIs the interne.docxjacksnathalie
 
Cyberethics accompanying text
Cyberethics accompanying text Cyberethics accompanying text
Cyberethics accompanying text Geoffrey Lowe
 
Digital ageandthefamilycomm102
Digital ageandthefamilycomm102Digital ageandthefamilycomm102
Digital ageandthefamilycomm102pamiller828
 
The usage of internet by youngsters of gujrat city (pakistan)
The usage of internet by youngsters of gujrat city (pakistan)The usage of internet by youngsters of gujrat city (pakistan)
The usage of internet by youngsters of gujrat city (pakistan)Alexander Decker
 
C20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINEC20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINEECPAT Indonesia
 
Children's Rights in Digital Age
Children's Rights in Digital AgeChildren's Rights in Digital Age
Children's Rights in Digital AgeKentCharlesNotario1
 

Similar to Child grooming (20)

Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyProtecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
 
Lecture 5 - Growth of the internet, UK & Global trends
Lecture 5 - Growth of the internet, UK & Global trendsLecture 5 - Growth of the internet, UK & Global trends
Lecture 5 - Growth of the internet, UK & Global trends
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Lecture 4: Global Trends
Lecture 4: Global TrendsLecture 4: Global Trends
Lecture 4: Global Trends
 
Lecture 4: Global Trends 2019
Lecture 4: Global Trends 2019Lecture 4: Global Trends 2019
Lecture 4: Global Trends 2019
 
ICT & Youth
ICT & YouthICT & Youth
ICT & Youth
 
Internet Safety And The Internet
Internet Safety And The InternetInternet Safety And The Internet
Internet Safety And The Internet
 
CYP E-Safety
CYP E-SafetyCYP E-Safety
CYP E-Safety
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
 
Robert final conference 2012 UNICEF presentation
Robert final conference 2012   UNICEF presentationRobert final conference 2012   UNICEF presentation
Robert final conference 2012 UNICEF presentation
 
Projektfuzet angol-web
Projektfuzet angol-webProjektfuzet angol-web
Projektfuzet angol-web
 
Children and Online Safety
Children and Online SafetyChildren and Online Safety
Children and Online Safety
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write up
 
Does the Usage of Internet harm Child DevelopmentIs the interne.docx
Does the Usage of Internet harm Child DevelopmentIs the interne.docxDoes the Usage of Internet harm Child DevelopmentIs the interne.docx
Does the Usage of Internet harm Child DevelopmentIs the interne.docx
 
Cyberethics accompanying text
Cyberethics accompanying text Cyberethics accompanying text
Cyberethics accompanying text
 
Digital ageandthefamilycomm102
Digital ageandthefamilycomm102Digital ageandthefamilycomm102
Digital ageandthefamilycomm102
 
Internet
InternetInternet
Internet
 
The usage of internet by youngsters of gujrat city (pakistan)
The usage of internet by youngsters of gujrat city (pakistan)The usage of internet by youngsters of gujrat city (pakistan)
The usage of internet by youngsters of gujrat city (pakistan)
 
C20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINEC20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINE
 
Children's Rights in Digital Age
Children's Rights in Digital AgeChildren's Rights in Digital Age
Children's Rights in Digital Age
 

Recently uploaded

POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 

Recently uploaded (20)

POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 

Child grooming

  • 1. Policy Cyber Crime by: Petter Gottschalk Presented by: Group 2
  • 2. Topics to Discuss 3. Child Grooming Case 3.1 Online Offenders 3.2 Internet characteristics 3.3 Internet Relationship 3.4 Grooming Legislation
  • 4. Child Grooming Case • The case of child grooming as computer crime • 9-19 age young people are accessed from the Internet in one day. • Internet provides the opportunity to interact with friends on social networking sites. • Myspace and Bebo are websites for enable to access information for the young people. • There is increasing evidence that the Internet is used by some adults to access children and young people in order to groom them for the purpose of sexual abuse.
  • 5. Child Grooming Case • What is Child Grooming? Child grooming is befriending and establishing an emotional connection with a child, and sometimes the family, to lower the child's inhibitions with the object of sexual abuse. • Ex. Family, friends, etc.
  • 6.
  • 7. Child Grooming Case • Myspace - is a social networking sites offering an interactive, user-submitted network of friends, personal profiles, blogs, groups, photos, music, and videos.
  • 8. Child Grooming Case • Bebo - is a social networking website launched in 2005. It now describes itself as "a company that dreams up ideas for fun social apps;" Joe Mbu, the man behind the Bebo relaunch, has confirmed that the site will not be returning as a social network but as a company that makes social apps.
  • 10. Online Offenders • Recent advance in computer technology have been aiding sexual sex offenders, stalkers, child pornographers, child traffickers, and others with the intent of exploiting children (Kierkegraad, 2008:41). • Men who target young people online for sex are pedophiles (Kierkegraad, 2008; Wolak et al., 2008). • According to Dunaigre (2001), the pedophile is an emblematic figure, made into caricature and imbued with all the fears.
  • 11. Online Offenders • According to Davidson and Martellozo (2008: 227), internet sex offender behavior can include: “the construction of sites to be used for the exchange of information, experiences, and indecent images of children; the organization of criminal activities that seek to use children for prostitution purposes and that produce indecent images of children at professional level; the organization of criminal activities that promote sexual tourism”.
  • 13. Internet Characteristics • Internet is an international network of networks that connects people all over the world. • The internet has created a universal technology platform on which to build all sorts of new products, services communities and solutions. • The internet has provided an expedient mode of communication and access to a wealth of information. - (Dombrowski et al., 2007)
  • 14. Internet Characteristics • Internet has moved from a strange communication medium to an obvious tool in our homes, schools, workplaces and travels. • Searching information, perform routine task and communicate with others. • Developing same speed as number of users globally. - (Quayle et al., 2006)
  • 15. Internet Characteristics • The WWW is a system with universally accepted standards of storing, retrieving, formatting, changing and displaying information. • Web pages can be viewed by any type of computer.
  • 16. Internet Characteristics • 78% of the respondents said that involve in chatting, 8-17 yrs old. • 9% have been plagued while chatting. • 1/3 has first met with person in reality while chatting. - (Medietilsynet, 2008).
  • 17. Internet Characteristics • The internet is a valuable tool; however, it can also detrimental to the wellbeing of children due to numerous online hazards - (Dombrowski et al., 2007: 153).
  • 19. Internet relationship • The internet is a special artifact system that has enormous technical and social positive impacts on modern society (Kierkegaard, 2008: 41). the online environment enables access to a wealth of information and communication across both distance and time. there is a vast amount of data available on virtually every subject, making it an effective learning tool
  • 20. Internet relationship • However, the internet is also a double-edge sword with negative and positive consequences (Kierkegaard, 2008: 41). It has a potential for misuse and has generated social concerns. Today, the danger for children is even greater because the Internet provides anonymity to predators.
  • 21. Internet relationship • In the other hand, the internet is not all negative concerning sexual communication (Caldar, 2004: 3). it can be used for sexual expression. • Relationships are built using software. Conversations using social software are collectively referred to as social media, a wide-ranging terms than encompasses the practice and resulting output of all kinds of information created online by those who were previous consumers of that media (Cook, 2008: 7).
  • 22. Internet relationship • Philosophically, social media describes the way in which content has become democratized by the Internet and the role people now play not only in consuming information and conveying it to others, but also in creating and sharing content with them, be it textual, aural or visual.
  • 24. Grooming Legislation • Sexual offences Act(2003) • Section 15: meeting a child following sexual grooming - this applies to the internet, to other technologies such as mobile phones and to the real world • Protection of Children and Prevention of Sexual Offences Act (2005) - meeting a child following certain preliminary contact • Section 1: Preliminary Contact - refers to occasions where a person arranges to meet a child who is under 16, having communicated with them on at least previous occasions.
  • 25. Grooming Legislation • General Civil Penal Code (“staffeloven”) 2007- the relevant sections concerned with sexual offenders • Section 195: any person who engages in sexual activity with a child who is under 14 years of age shall be liable to imprisonment for a term not exceed to 10 years. • Section 196: any person who engages in sexual activity with a child who is under 16 years of age shall not be liable to imprisonment for a term not exceed to 5 years.
  • 26. Grooming Legislation • Section 201a: the new grooming section