Cyber Predators
Lindsay E
Comm 250: Communications &
Technology
“Cyber Predators”: Who are
they?
O Do not fit clinical profile of pedophiles since
primarily target adolescents, not child...
The “cyber predators”: Who are
they?
(Wolak et al., 2013)
The “cyber predators”: What
do they do?
O Spend as much as 6 hours/day searching for victims
(Myers, 2014)
O Have substant...
“Cyber Victims”: Who are
they?
O 13-17 years old (Wolak et al., 2013)
O ¼ are 13 years old
O Characteristics and risky beh...
The “cyber victims”: Who are
they?
(Wolak et al., 2013)
The “cyber victims”: What do
they do?
O Anonymity and Deception cause victims to not know who
they are interacting with
O ...
Modeling Predation Theory
O Olson et al. Luring Communication
Theoretical (LCT) Model
O 5 phases of predation
1. Gaining a...
Phase 1: Gaining Access
O Predator must be “motivated and able
to gain access to potential victims and
their families” (Ol...
Phase 2: Deceptive Trust
Development
O “a perpetrator’s ability to cultivate relationships with
potential victims and poss...
Phase 3: Grooming
O “the subtle communication strategies that sexual
abusers use to prepare their potential victims to
acc...
Phase 4: Isolation
O Physical isolation- attempt to spend time alone with
victim
O Ensures victim has no parental supervis...
Phase 5: Approach
O “The initial physical contact or verbal lead-ins
that occur prior to the actual sexual act”
(Olson et ...
Examples of LCT Model in
Predators’ Language Use
(Edwards et al., 2010)
Examples of CMC between
Predators and Victims
(www.perverted-justice.com)
Where does this CMC occur?
O Internet
O Cell phones
O Social media sites
O Some examples (Datar & Mislan, 2010) :
O Chat r...
Preventative Measures
O “Perverted-Justice.com”- “the largest and best
anti-predator organization online”
O This website h...
Cyber Predators via CMC
Upcoming SlideShare
Loading in …5
×

Cyber Predators via CMC

662 views

Published on

Published in: Internet, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
662
On SlideShare
0
From Embeds
0
Number of Embeds
57
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cyber Predators via CMC

  1. 1. Cyber Predators Lindsay E Comm 250: Communications & Technology
  2. 2. “Cyber Predators”: Who are they? O Do not fit clinical profile of pedophiles since primarily target adolescents, not children O Indeed, 1 in 8 offenders arrested for actually committed crimes against adolescents (Wolak et al., 2013) O Seek certain characteristics: seek admiration from victims who may be sexually naïve; may fear adult relationships; want to “feel young”; feel empowered exerting power or control over naïve youth (Wolak et al., 2013) O May be primarily sexually attracted to adults but target youth for reasons including empowerment, impulse desires, curiosity, and anger
  3. 3. The “cyber predators”: Who are they? (Wolak et al., 2013)
  4. 4. The “cyber predators”: What do they do? O Spend as much as 6 hours/day searching for victims (Myers, 2014) O Have substantial amount of children in contacts on social networking sites O Keep “meticulous” notes on these victims or contacts O Rapidly shift from “grooming” to upfront sexualized conversations O Abandon these traditional “time-consuming” processes O “Offenders reported that, if a child did not respond to their online initiations, the offender would move on to another child; there was no need to bother with the process of grooming when immediately asking children for sex or to meet them produced results” (Myers, 2014). O Use the social media to “fast-track” abuse process
  5. 5. “Cyber Victims”: Who are they? O 13-17 years old (Wolak et al., 2013) O ¼ are 13 years old O Characteristics and risky behaviors that increase likelihood of victimization: O Youth questioning their sexuality; youths with histories of sexual/physical abuse, and other troubled or confused youth; youths with poor relationships with parents; youths who frequent chat rooms, talk online to strangers about sex or who already engage in risky sexual behavior offline (Wolak et al., 2013)
  6. 6. The “cyber victims”: Who are they? (Wolak et al., 2013)
  7. 7. The “cyber victims”: What do they do? O Anonymity and Deception cause victims to not know who they are interacting with O 4/5 youth cannot tell difference between “chatting” with peer or an adult online (Myers, 2014) O Causes them to engage and respond to these predators O 5 common behavioral mistakes (Tedeschi, 2009) 1. “Broadcasting personal info to entire internet” 2. “Sharing Passwords” 3. “Befriending strangers” 4. “Baring their souls” (revealing too much intimate information via CMC) 5. “Forgetting their futures” (posting incriminating posts/pictures which may lead to unwanted consequences such as reducing employment chances or college enrollment opportunities)
  8. 8. Modeling Predation Theory O Olson et al. Luring Communication Theoretical (LCT) Model O 5 phases of predation 1. Gaining access 2. Deceptive trust development 3. Grooming 4. Isolation 5. Approach
  9. 9. Phase 1: Gaining Access O Predator must be “motivated and able to gain access to potential victims and their families” (Olson et al., 2007) O Exchanging of personal info between predator and victim O Gains this access through IM forums, MySpace or Facebook, chat room that contain minors
  10. 10. Phase 2: Deceptive Trust Development O “a perpetrator’s ability to cultivate relationships with potential victims and possibly their families that are intended to benefit the perpetrator’s own sexual interest” (Olson et al., 2007) O Exists throughout CMC relationship between victim and predator O 4 subcategories 1. Personal information- details about victim and predator’s locations, names, ages, etc. 2. Relationship details- discuss how each begin or maintain relationships with friends or family 3. Activities- victim and predators’ preferred hobbies or social behaviors 4. Compliments- predator or victim complimenting the other on his or her qualities
  11. 11. Phase 3: Grooming O “the subtle communication strategies that sexual abusers use to prepare their potential victims to accept the sexual conduct” (Olson et al., 2007) O Two subcategories 1. Communicative desensitization O Predator uses vulgar sexual language and attempts to initiate or encourage interest within the victim about sex 2. Reframing O “contact or sex play between victim and adults that may be communicated in ways that would make it beneficial to the victim later in life” (Olson et al., 2007) O Sex portrayed as positive and beneficial learning experience
  12. 12. Phase 4: Isolation O Physical isolation- attempt to spend time alone with victim O Ensures victim has no parental supervision or is in a private place when chat online O Mental isolation- attempt to increase emotional support and dependency O Predator may provide sympathy and support to victim’s problems O “The predator seeks to isolate the victim and then to fill the social gaps in the victim’s life as a tool to facilitate abuse and gain control of the victim” (Edwards et al., 2010)
  13. 13. Phase 5: Approach O “The initial physical contact or verbal lead-ins that occur prior to the actual sexual act” (Olson et al., 2007) O “The final step when the predator requests to meet the victim offline with the intent of beginning a sexual relationship” (Edwards et al., 2010). O After gains trust, provides grooming, isolates minor from current social offline contacts and ensures victim’s dependency on the predator, then approaches
  14. 14. Examples of LCT Model in Predators’ Language Use (Edwards et al., 2010)
  15. 15. Examples of CMC between Predators and Victims (www.perverted-justice.com)
  16. 16. Where does this CMC occur? O Internet O Cell phones O Social media sites O Some examples (Datar & Mislan, 2010) : O Chat rooms
  17. 17. Preventative Measures O “Perverted-Justice.com”- “the largest and best anti-predator organization online” O This website has convicted more than 584 sexual predators since June 2004 (Perverted- Justice.com) O Place “pseudo-adolescents” in chat rooms and create decoy profiles in attempt to identify internet predators and convict or incarcerate them

×