SlideShare a Scribd company logo
2
2
Reported data versus the unknown data within sexual
exploitation of children
Sexual exploitation of children is a form of sexual abuse
whereby a child is given money, gifts, among others, in
exchange for doing sexual activities. In this case, the children
are misled into thinking they are in a consensual and loving
relationship and hence may end up trusting their abuser and thus
not understand that they are being abused. The issue of sexual
exploitation has gained much attention especially with the
evolution of the internet which has elevated child trafficking
across the globe. However, the true scale of the issue is
unknown. This is because centralized data is lacking and also
reporting bodies are inadequate. This is further contributed by
the culture of shame, stigma, and silence, and also the
expansion of information technology all of which are risk
factors for the issue. Hence the relevance of the research topic
is to assess the available resources regarding the issue to
understand the scale of the problem.
Boyd, D., & Mitchell, K. J. (2014). “Understanding the role of
technology in the commercial sexual exploitation of children:
the perspective of law enforcement”.
In this article, Boyd & Mitchell (2014), conducted an
exploratory study to evaluate how technology could be utilized
in investigating child trafficking. According to the authors,
commercial sexual exploitation of children, also known as child
sex trafficking constitute a wide context of sexual victimization
because, in addition to the victims being sexually assaulted and
abused, they are treated as commodities and used for economic
and financial gain. It is now obvious that many types of social
activities involve the use of technology. However, criminal and
child protection investigators are always struggling to use
technology effectively to assess the underlying issues. Also,
empirical research on the issue is almost non-existence, and
hence media stories and legal reports offer guidance on
summaries of case characteristics and the use of technology in
such cases. The use of technology to investigate the issue is
seen to offer both benefits and drawbacks. The drawbacks lean
more towards the offender which includes giving them more
opportunity to widen their activities. Hence, the investigators
instead feel overwhelmed to deal with what they do not have
control over and hence turn to analog means. This, in turn,
contributes to the lack of data for research on the issue.
Franchino-Olsen, H. (2019). “Vulnerabilities relevant for
commercial sexual exploitation of children/domestic minor sex
trafficking: A systematic review of risk factors. Trauma,
Violence, & Abuse, 1524838018821956”.
In this article, Franchino-Olsen (2019) conducted a review of
the reviewed publications to identify the risk factors for
commercial sexual exploitation for children. According to the
author, the issue has become widespread across the United
States, violating the health and the rights of many children and
youth. Also, the author identifies that those researchers trying
to understand the issue face several barriers. For example, the
united states do not have a common database for statistics
collection and hence most agencies use their databases leading
to double counting hence overlap and widening the gap for
identification. The area on the identification of risk factors has
numerous gaps with little focus placed on exploited boys. The
main identified risk factor in the reviewed literature includes
the role of childhood abuse.
Wurtele, S. K., & Miller-Perrin, C. (2017). “Sex trafficking and
the commercial sexual exploitation of children. Women &
Therapy, 40(1-2), 123-151”.
In this article, Wurtele & Miller-Perrin (2017) conducted a
comprehensive review to assess what is known concerning the
issue of child sex trafficking. According to the authors, the
associated problem of human trafficking has become an area of
major concern and of international discussion. Despite this
recognition, the attention of social workers, psychologists, and
other legal and mental health professions towards the issue is
seen as being relatively limited up to the present. Several
factors contribute to the true number of victims not accurately
being identified. The first is the covert nature of the crime due
to the effect of law enforcement and mainstream culture. Also,
there is a lack of uniform reporting system on victims. These
factors, among others, contribute to underreporting of cases
hence creating a gap between the known and the unknown.
CCAN, Crawford-Jakubiak, J. E., & Greenbaum, J. (2015).
“Child sex trafficking and commercial sexual exploitation:
health care needs of victims. Pediatrics, 135(3), 566-574”.
In this article, Greenbaum et al. (2015) provide a detailed view
on the issue of human trafficking and barriers that pediatricians
encounter while assisting the victims. Although large numbers
of youths and children are affected there many challenges are
prevalent which contribute to inadequate data available to
pediatricians concerning the issue. According to the authors, the
limited research regarding the issue is a common challenge
contributed by various factors. An example is the victim
identification challenge associated with misidentification of
youth as criminals instead of identifying them as victims of
child exploitation and abuse. Other challenges include
variations in the definition of terms, mixed populations, and
small sample sizes. Also, the underlying social factors, family-
related factors, and also identification of possible victims make
it difficult for the pediatricians to understand and tackle the
underlying consequences.
Takaoka, K., Aoyama, I., Tanaka, M., MacMillan, H. L., &
Suzuki, Y. E. (2017). “Child sexual abuse in Japan: A
systematic review and future directions. Child abuse &
neglect, 66, 31-40”.
In this article, Suzuki et al. (2017) conducted a systematic
review to review non-clinical studies that estimate the
prevalence of child sexual abuse in japan. According to the
authors, although data on the issue is available in many
countries, very little is known in japan concerning the
epidemiology of child sexual abuse. Paradoxically, rape which
is a very serious sexual offense is not often considered a crime.
Also, devotion to traditional gender roles may act as a
hindrance to the victims not acknowledging victimization. This
is seen in japan where men are expected to have male
characteristics hence not judged for their actions. Also, the
culture of Japanese places emphasis on group harmony. This
introduces the context of shame, stigma, and acknowledging
sexual victimization. Also, the responsibility for sexual contact
lies in women and girls and thus the issue of sexual abuse
revolves around children under 13 years especially in Japan.
References
Franchino-Olsen, H. (2019). The Vulnerabilities relevant for
commercial sexual exploitation of children/domestic minor sex
trafficking: A systematic review of risk factors. Trauma, Abuse
& Violence, 1524838018821956.
Crawford-Jakubiak, J. E., & Greenbaum, J., Committee on Child
Abuse and Neglect. (2015). Child sex trafficking and
commercial sexual exploitation: health care needs of
victims. Pediatrics, 135(3), 566-574.
Wurtele, S. K., & Miller-Perrin, C. (2017). The commercial
sexual exploitation of children and Sex trafficking. Women &
Therapy, 40(1-2), 123-151.
Boyd, D., & Mitchell, K. J. (2014). “Understanding the role of
technology in the commercial sexual exploitation of children:
the perspective of law enforcement”.
Suzuki, Y. E., Tanaka, M., Aoyama, I., MacMillan, H. L., &
Takaoka, K. (2017). Child sexual abuse in Japan: A systematic
review and future directions. Neglect & Child abuse, 66, 31-40.
Watch the documentary for this week (No Impact Man) (Links
to an external site.) before answering the question. There are
no viewing questions that accompany this video. You will need
to take notes on it.
Our documentary and our articles for this week argue that our
society cannot continue being based on consumption. This was
reinforced by the IPCC special report we read earlier this term.
These materials argue that we must re-conceive our lives and
our attitudes toward consumption because, no matter what, we
will soon not be able to continue on with this life-style
anyway.
Often sustainable living is described as a sacrifice made for the
sake of environment. Do you think a sustainable lifestyle could
improve the quality of your life? If so, how, and if not, why
not?
Composition:
Is the writing clear and error free?
Do citations reflect adherence to a style manual?
Argument (reply to forum question):
Does the main argument have reasons that are stated clearly and
led to the conclusion the author presented?
Does the author bring in at least one credible outside source and
used it effectively?
Counterargument:
Does student cite an outside author’s argument with which they
disagreed (VERY important).
Is the argument paraphrased so that the outline contains at least
three lines but no more than five?
Is the text color changed to make the outline identifiable?
Conclusion:
Is conclusion clearly specified in forum post?
Is color changed to blue and the length of conclusion limited?
Write a 250 word post APA.

More Related Content

Similar to 22Reported data versus the unknown data within sexual exploi.docx

Running head THE RAMAYANA AND SEI SHONAGON .docx
Running head THE RAMAYANA AND SEI SHONAGON                       .docxRunning head THE RAMAYANA AND SEI SHONAGON                       .docx
Running head THE RAMAYANA AND SEI SHONAGON .docx
agnesdcarey33086
 
STRYVE Juvenile Delinquency Program
STRYVE Juvenile Delinquency ProgramSTRYVE Juvenile Delinquency Program
STRYVE Juvenile Delinquency ProgramColton Robinson
 
McDonald 6Name Sonja McDonaldCourse Name ENG 111-2902.docx
McDonald     6Name Sonja McDonaldCourse Name ENG 111-2902.docxMcDonald     6Name Sonja McDonaldCourse Name ENG 111-2902.docx
McDonald 6Name Sonja McDonaldCourse Name ENG 111-2902.docx
alfredacavx97
 
A Risk and Resilience Framework for Child, Youth, and Family Policy
A Risk and Resilience Framework for Child, Youth, and Family PolicyA Risk and Resilience Framework for Child, Youth, and Family Policy
A Risk and Resilience Framework for Child, Youth, and Family Policy
The International Journal of Business Management and Technology
 
Child sexual abuse
Child sexual abuseChild sexual abuse
Recantations and-false-allegations-bibliography
Recantations and-false-allegations-bibliographyRecantations and-false-allegations-bibliography
Recantations and-false-allegations-bibliography
Efraín Suárez-Arce, M.Ed
 
Break the Silence Project Overview
Break the Silence Project OverviewBreak the Silence Project Overview
Break the Silence Project Overview
G4TP
 
Elder AbuseJamiah RiddickWalden UniversityFPSY -
Elder AbuseJamiah RiddickWalden UniversityFPSY -Elder AbuseJamiah RiddickWalden UniversityFPSY -
Elder AbuseJamiah RiddickWalden UniversityFPSY -
EvonCanales257
 
Running head IDENTIFYING THE POLICY PROBLEM1IDENTIFYING THE .docx
Running head IDENTIFYING THE POLICY PROBLEM1IDENTIFYING THE .docxRunning head IDENTIFYING THE POLICY PROBLEM1IDENTIFYING THE .docx
Running head IDENTIFYING THE POLICY PROBLEM1IDENTIFYING THE .docx
wlynn1
 
Running head IDENTIFYING THE POLICY PROBLEM1IDENTIFYING THE .docx
Running head IDENTIFYING THE POLICY PROBLEM1IDENTIFYING THE .docxRunning head IDENTIFYING THE POLICY PROBLEM1IDENTIFYING THE .docx
Running head IDENTIFYING THE POLICY PROBLEM1IDENTIFYING THE .docx
jeanettehully
 
While this weeks topic highlighted the uncertainty of Big Data, th.docx
While this weeks topic highlighted the uncertainty of Big Data, th.docxWhile this weeks topic highlighted the uncertainty of Big Data, th.docx
While this weeks topic highlighted the uncertainty of Big Data, th.docx
harold7fisher61282
 
Running head INITIAL RESEARCH ARTICLE SUMMARY AND ANALYSIS1.docx
Running head INITIAL RESEARCH ARTICLE SUMMARY AND ANALYSIS1.docxRunning head INITIAL RESEARCH ARTICLE SUMMARY AND ANALYSIS1.docx
Running head INITIAL RESEARCH ARTICLE SUMMARY AND ANALYSIS1.docx
jeanettehully
 

Similar to 22Reported data versus the unknown data within sexual exploi.docx (12)

Running head THE RAMAYANA AND SEI SHONAGON .docx
Running head THE RAMAYANA AND SEI SHONAGON                       .docxRunning head THE RAMAYANA AND SEI SHONAGON                       .docx
Running head THE RAMAYANA AND SEI SHONAGON .docx
 
STRYVE Juvenile Delinquency Program
STRYVE Juvenile Delinquency ProgramSTRYVE Juvenile Delinquency Program
STRYVE Juvenile Delinquency Program
 
McDonald 6Name Sonja McDonaldCourse Name ENG 111-2902.docx
McDonald     6Name Sonja McDonaldCourse Name ENG 111-2902.docxMcDonald     6Name Sonja McDonaldCourse Name ENG 111-2902.docx
McDonald 6Name Sonja McDonaldCourse Name ENG 111-2902.docx
 
A Risk and Resilience Framework for Child, Youth, and Family Policy
A Risk and Resilience Framework for Child, Youth, and Family PolicyA Risk and Resilience Framework for Child, Youth, and Family Policy
A Risk and Resilience Framework for Child, Youth, and Family Policy
 
Child sexual abuse
Child sexual abuseChild sexual abuse
Child sexual abuse
 
Recantations and-false-allegations-bibliography
Recantations and-false-allegations-bibliographyRecantations and-false-allegations-bibliography
Recantations and-false-allegations-bibliography
 
Break the Silence Project Overview
Break the Silence Project OverviewBreak the Silence Project Overview
Break the Silence Project Overview
 
Elder AbuseJamiah RiddickWalden UniversityFPSY -
Elder AbuseJamiah RiddickWalden UniversityFPSY -Elder AbuseJamiah RiddickWalden UniversityFPSY -
Elder AbuseJamiah RiddickWalden UniversityFPSY -
 
Running head IDENTIFYING THE POLICY PROBLEM1IDENTIFYING THE .docx
Running head IDENTIFYING THE POLICY PROBLEM1IDENTIFYING THE .docxRunning head IDENTIFYING THE POLICY PROBLEM1IDENTIFYING THE .docx
Running head IDENTIFYING THE POLICY PROBLEM1IDENTIFYING THE .docx
 
Running head IDENTIFYING THE POLICY PROBLEM1IDENTIFYING THE .docx
Running head IDENTIFYING THE POLICY PROBLEM1IDENTIFYING THE .docxRunning head IDENTIFYING THE POLICY PROBLEM1IDENTIFYING THE .docx
Running head IDENTIFYING THE POLICY PROBLEM1IDENTIFYING THE .docx
 
While this weeks topic highlighted the uncertainty of Big Data, th.docx
While this weeks topic highlighted the uncertainty of Big Data, th.docxWhile this weeks topic highlighted the uncertainty of Big Data, th.docx
While this weeks topic highlighted the uncertainty of Big Data, th.docx
 
Running head INITIAL RESEARCH ARTICLE SUMMARY AND ANALYSIS1.docx
Running head INITIAL RESEARCH ARTICLE SUMMARY AND ANALYSIS1.docxRunning head INITIAL RESEARCH ARTICLE SUMMARY AND ANALYSIS1.docx
Running head INITIAL RESEARCH ARTICLE SUMMARY AND ANALYSIS1.docx
 

More from domenicacullison

5 to 8  sentence each 1. Declining marriage rates have led many .docx
5 to 8  sentence each 1. Declining marriage rates have led many .docx5 to 8  sentence each 1. Declining marriage rates have led many .docx
5 to 8  sentence each 1. Declining marriage rates have led many .docx
domenicacullison
 
5-7 PagesYou will craft individual essays in response to the pro.docx
5-7 PagesYou will craft individual essays in response to the pro.docx5-7 PagesYou will craft individual essays in response to the pro.docx
5-7 PagesYou will craft individual essays in response to the pro.docx
domenicacullison
 
5.1 Assignment Reading and RemediationGetting Start.docx
5.1 Assignment Reading and RemediationGetting Start.docx5.1 Assignment Reading and RemediationGetting Start.docx
5.1 Assignment Reading and RemediationGetting Start.docx
domenicacullison
 
4TH EDITIONManaging and UsingInformation Systems.docx
4TH EDITIONManaging and UsingInformation Systems.docx4TH EDITIONManaging and UsingInformation Systems.docx
4TH EDITIONManaging and UsingInformation Systems.docx
domenicacullison
 
5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx
5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx
5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx
domenicacullison
 
5.1 Provide a brief definition of network access control.5.2 W.docx
5.1 Provide a brief definition of network access control.5.2 W.docx5.1 Provide a brief definition of network access control.5.2 W.docx
5.1 Provide a brief definition of network access control.5.2 W.docx
domenicacullison
 
4Discussion 6 Review of Four Indiana State Policies.docx
4Discussion 6 Review of Four Indiana State Policies.docx4Discussion 6 Review of Four Indiana State Policies.docx
4Discussion 6 Review of Four Indiana State Policies.docx
domenicacullison
 
492020 Print Previewhttpsng.cengage.comstaticnbui.docx
492020 Print Previewhttpsng.cengage.comstaticnbui.docx492020 Print Previewhttpsng.cengage.comstaticnbui.docx
492020 Print Previewhttpsng.cengage.comstaticnbui.docx
domenicacullison
 
4pagesone is assginmentthe other 3 essays are related wo.docx
4pagesone is assginmentthe other 3 essays are related wo.docx4pagesone is assginmentthe other 3 essays are related wo.docx
4pagesone is assginmentthe other 3 essays are related wo.docx
domenicacullison
 
47PATIENT FILEThe Case The sleepy woman with anxiety.docx
47PATIENT FILEThe Case The sleepy woman with anxiety.docx47PATIENT FILEThe Case The sleepy woman with anxiety.docx
47PATIENT FILEThe Case The sleepy woman with anxiety.docx
domenicacullison
 
4To Replace with name Comment by Sharon Rose Use down ar.docx
4To  Replace with name Comment by Sharon Rose Use down ar.docx4To  Replace with name Comment by Sharon Rose Use down ar.docx
4To Replace with name Comment by Sharon Rose Use down ar.docx
domenicacullison
 
5 pages in length (not including title page or references)This.docx
5 pages in length (not including title page or references)This.docx5 pages in length (not including title page or references)This.docx
5 pages in length (not including title page or references)This.docx
domenicacullison
 
5 to 7 DAY EXERCISE LOG Exercise Log Name___Hejin Lin__.docx
5 to 7 DAY EXERCISE LOG Exercise Log  Name___Hejin Lin__.docx5 to 7 DAY EXERCISE LOG Exercise Log  Name___Hejin Lin__.docx
5 to 7 DAY EXERCISE LOG Exercise Log Name___Hejin Lin__.docx
domenicacullison
 
5 Pages 1. Should nonprofit organizations be viewed principally .docx
5 Pages 1. Should nonprofit organizations be viewed principally .docx5 Pages 1. Should nonprofit organizations be viewed principally .docx
5 Pages 1. Should nonprofit organizations be viewed principally .docx
domenicacullison
 
5 pagesResearch either a wildfire and mass movement (one tha.docx
5 pagesResearch either a wildfire and mass movement (one tha.docx5 pagesResearch either a wildfire and mass movement (one tha.docx
5 pagesResearch either a wildfire and mass movement (one tha.docx
domenicacullison
 
5 Establishing Organizational ObjectivesiStockThinkstock.docx
5 Establishing Organizational ObjectivesiStockThinkstock.docx5 Establishing Organizational ObjectivesiStockThinkstock.docx
5 Establishing Organizational ObjectivesiStockThinkstock.docx
domenicacullison
 
465 Current Procedural Terminology © 2015 American Medical A.docx
465 Current Procedural Terminology © 2015 American Medical A.docx465 Current Procedural Terminology © 2015 American Medical A.docx
465 Current Procedural Terminology © 2015 American Medical A.docx
domenicacullison
 
450+ WordsDiscussion Questions What are the main tenants of.docx
450+ WordsDiscussion Questions What are the main tenants of.docx450+ WordsDiscussion Questions What are the main tenants of.docx
450+ WordsDiscussion Questions What are the main tenants of.docx
domenicacullison
 
459- Provide a substantive response to at least two of your pe.docx
459- Provide a substantive response to at least two of your pe.docx459- Provide a substantive response to at least two of your pe.docx
459- Provide a substantive response to at least two of your pe.docx
domenicacullison
 
4th Grade Science-A Discussion of how Students Learn to Self Assess.docx
4th Grade Science-A Discussion of how Students Learn to Self Assess.docx4th Grade Science-A Discussion of how Students Learn to Self Assess.docx
4th Grade Science-A Discussion of how Students Learn to Self Assess.docx
domenicacullison
 

More from domenicacullison (20)

5 to 8  sentence each 1. Declining marriage rates have led many .docx
5 to 8  sentence each 1. Declining marriage rates have led many .docx5 to 8  sentence each 1. Declining marriage rates have led many .docx
5 to 8  sentence each 1. Declining marriage rates have led many .docx
 
5-7 PagesYou will craft individual essays in response to the pro.docx
5-7 PagesYou will craft individual essays in response to the pro.docx5-7 PagesYou will craft individual essays in response to the pro.docx
5-7 PagesYou will craft individual essays in response to the pro.docx
 
5.1 Assignment Reading and RemediationGetting Start.docx
5.1 Assignment Reading and RemediationGetting Start.docx5.1 Assignment Reading and RemediationGetting Start.docx
5.1 Assignment Reading and RemediationGetting Start.docx
 
4TH EDITIONManaging and UsingInformation Systems.docx
4TH EDITIONManaging and UsingInformation Systems.docx4TH EDITIONManaging and UsingInformation Systems.docx
4TH EDITIONManaging and UsingInformation Systems.docx
 
5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx
5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx
5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx
 
5.1 Provide a brief definition of network access control.5.2 W.docx
5.1 Provide a brief definition of network access control.5.2 W.docx5.1 Provide a brief definition of network access control.5.2 W.docx
5.1 Provide a brief definition of network access control.5.2 W.docx
 
4Discussion 6 Review of Four Indiana State Policies.docx
4Discussion 6 Review of Four Indiana State Policies.docx4Discussion 6 Review of Four Indiana State Policies.docx
4Discussion 6 Review of Four Indiana State Policies.docx
 
492020 Print Previewhttpsng.cengage.comstaticnbui.docx
492020 Print Previewhttpsng.cengage.comstaticnbui.docx492020 Print Previewhttpsng.cengage.comstaticnbui.docx
492020 Print Previewhttpsng.cengage.comstaticnbui.docx
 
4pagesone is assginmentthe other 3 essays are related wo.docx
4pagesone is assginmentthe other 3 essays are related wo.docx4pagesone is assginmentthe other 3 essays are related wo.docx
4pagesone is assginmentthe other 3 essays are related wo.docx
 
47PATIENT FILEThe Case The sleepy woman with anxiety.docx
47PATIENT FILEThe Case The sleepy woman with anxiety.docx47PATIENT FILEThe Case The sleepy woman with anxiety.docx
47PATIENT FILEThe Case The sleepy woman with anxiety.docx
 
4To Replace with name Comment by Sharon Rose Use down ar.docx
4To  Replace with name Comment by Sharon Rose Use down ar.docx4To  Replace with name Comment by Sharon Rose Use down ar.docx
4To Replace with name Comment by Sharon Rose Use down ar.docx
 
5 pages in length (not including title page or references)This.docx
5 pages in length (not including title page or references)This.docx5 pages in length (not including title page or references)This.docx
5 pages in length (not including title page or references)This.docx
 
5 to 7 DAY EXERCISE LOG Exercise Log Name___Hejin Lin__.docx
5 to 7 DAY EXERCISE LOG Exercise Log  Name___Hejin Lin__.docx5 to 7 DAY EXERCISE LOG Exercise Log  Name___Hejin Lin__.docx
5 to 7 DAY EXERCISE LOG Exercise Log Name___Hejin Lin__.docx
 
5 Pages 1. Should nonprofit organizations be viewed principally .docx
5 Pages 1. Should nonprofit organizations be viewed principally .docx5 Pages 1. Should nonprofit organizations be viewed principally .docx
5 Pages 1. Should nonprofit organizations be viewed principally .docx
 
5 pagesResearch either a wildfire and mass movement (one tha.docx
5 pagesResearch either a wildfire and mass movement (one tha.docx5 pagesResearch either a wildfire and mass movement (one tha.docx
5 pagesResearch either a wildfire and mass movement (one tha.docx
 
5 Establishing Organizational ObjectivesiStockThinkstock.docx
5 Establishing Organizational ObjectivesiStockThinkstock.docx5 Establishing Organizational ObjectivesiStockThinkstock.docx
5 Establishing Organizational ObjectivesiStockThinkstock.docx
 
465 Current Procedural Terminology © 2015 American Medical A.docx
465 Current Procedural Terminology © 2015 American Medical A.docx465 Current Procedural Terminology © 2015 American Medical A.docx
465 Current Procedural Terminology © 2015 American Medical A.docx
 
450+ WordsDiscussion Questions What are the main tenants of.docx
450+ WordsDiscussion Questions What are the main tenants of.docx450+ WordsDiscussion Questions What are the main tenants of.docx
450+ WordsDiscussion Questions What are the main tenants of.docx
 
459- Provide a substantive response to at least two of your pe.docx
459- Provide a substantive response to at least two of your pe.docx459- Provide a substantive response to at least two of your pe.docx
459- Provide a substantive response to at least two of your pe.docx
 
4th Grade Science-A Discussion of how Students Learn to Self Assess.docx
4th Grade Science-A Discussion of how Students Learn to Self Assess.docx4th Grade Science-A Discussion of how Students Learn to Self Assess.docx
4th Grade Science-A Discussion of how Students Learn to Self Assess.docx
 

Recently uploaded

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 

Recently uploaded (20)

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 

22Reported data versus the unknown data within sexual exploi.docx

  • 1. 2 2 Reported data versus the unknown data within sexual exploitation of children Sexual exploitation of children is a form of sexual abuse whereby a child is given money, gifts, among others, in exchange for doing sexual activities. In this case, the children are misled into thinking they are in a consensual and loving relationship and hence may end up trusting their abuser and thus not understand that they are being abused. The issue of sexual exploitation has gained much attention especially with the evolution of the internet which has elevated child trafficking across the globe. However, the true scale of the issue is unknown. This is because centralized data is lacking and also reporting bodies are inadequate. This is further contributed by the culture of shame, stigma, and silence, and also the expansion of information technology all of which are risk factors for the issue. Hence the relevance of the research topic is to assess the available resources regarding the issue to understand the scale of the problem. Boyd, D., & Mitchell, K. J. (2014). “Understanding the role of technology in the commercial sexual exploitation of children: the perspective of law enforcement”. In this article, Boyd & Mitchell (2014), conducted an exploratory study to evaluate how technology could be utilized in investigating child trafficking. According to the authors, commercial sexual exploitation of children, also known as child sex trafficking constitute a wide context of sexual victimization because, in addition to the victims being sexually assaulted and abused, they are treated as commodities and used for economic and financial gain. It is now obvious that many types of social activities involve the use of technology. However, criminal and
  • 2. child protection investigators are always struggling to use technology effectively to assess the underlying issues. Also, empirical research on the issue is almost non-existence, and hence media stories and legal reports offer guidance on summaries of case characteristics and the use of technology in such cases. The use of technology to investigate the issue is seen to offer both benefits and drawbacks. The drawbacks lean more towards the offender which includes giving them more opportunity to widen their activities. Hence, the investigators instead feel overwhelmed to deal with what they do not have control over and hence turn to analog means. This, in turn, contributes to the lack of data for research on the issue. Franchino-Olsen, H. (2019). “Vulnerabilities relevant for commercial sexual exploitation of children/domestic minor sex trafficking: A systematic review of risk factors. Trauma, Violence, & Abuse, 1524838018821956”. In this article, Franchino-Olsen (2019) conducted a review of the reviewed publications to identify the risk factors for commercial sexual exploitation for children. According to the author, the issue has become widespread across the United States, violating the health and the rights of many children and youth. Also, the author identifies that those researchers trying to understand the issue face several barriers. For example, the united states do not have a common database for statistics collection and hence most agencies use their databases leading to double counting hence overlap and widening the gap for identification. The area on the identification of risk factors has numerous gaps with little focus placed on exploited boys. The main identified risk factor in the reviewed literature includes the role of childhood abuse. Wurtele, S. K., & Miller-Perrin, C. (2017). “Sex trafficking and the commercial sexual exploitation of children. Women & Therapy, 40(1-2), 123-151”.
  • 3. In this article, Wurtele & Miller-Perrin (2017) conducted a comprehensive review to assess what is known concerning the issue of child sex trafficking. According to the authors, the associated problem of human trafficking has become an area of major concern and of international discussion. Despite this recognition, the attention of social workers, psychologists, and other legal and mental health professions towards the issue is seen as being relatively limited up to the present. Several factors contribute to the true number of victims not accurately being identified. The first is the covert nature of the crime due to the effect of law enforcement and mainstream culture. Also, there is a lack of uniform reporting system on victims. These factors, among others, contribute to underreporting of cases hence creating a gap between the known and the unknown. CCAN, Crawford-Jakubiak, J. E., & Greenbaum, J. (2015). “Child sex trafficking and commercial sexual exploitation: health care needs of victims. Pediatrics, 135(3), 566-574”. In this article, Greenbaum et al. (2015) provide a detailed view on the issue of human trafficking and barriers that pediatricians encounter while assisting the victims. Although large numbers of youths and children are affected there many challenges are prevalent which contribute to inadequate data available to pediatricians concerning the issue. According to the authors, the limited research regarding the issue is a common challenge contributed by various factors. An example is the victim identification challenge associated with misidentification of youth as criminals instead of identifying them as victims of child exploitation and abuse. Other challenges include variations in the definition of terms, mixed populations, and small sample sizes. Also, the underlying social factors, family- related factors, and also identification of possible victims make it difficult for the pediatricians to understand and tackle the underlying consequences.
  • 4. Takaoka, K., Aoyama, I., Tanaka, M., MacMillan, H. L., & Suzuki, Y. E. (2017). “Child sexual abuse in Japan: A systematic review and future directions. Child abuse & neglect, 66, 31-40”. In this article, Suzuki et al. (2017) conducted a systematic review to review non-clinical studies that estimate the prevalence of child sexual abuse in japan. According to the authors, although data on the issue is available in many countries, very little is known in japan concerning the epidemiology of child sexual abuse. Paradoxically, rape which is a very serious sexual offense is not often considered a crime. Also, devotion to traditional gender roles may act as a hindrance to the victims not acknowledging victimization. This is seen in japan where men are expected to have male characteristics hence not judged for their actions. Also, the culture of Japanese places emphasis on group harmony. This introduces the context of shame, stigma, and acknowledging sexual victimization. Also, the responsibility for sexual contact lies in women and girls and thus the issue of sexual abuse revolves around children under 13 years especially in Japan. References Franchino-Olsen, H. (2019). The Vulnerabilities relevant for commercial sexual exploitation of children/domestic minor sex trafficking: A systematic review of risk factors. Trauma, Abuse & Violence, 1524838018821956. Crawford-Jakubiak, J. E., & Greenbaum, J., Committee on Child Abuse and Neglect. (2015). Child sex trafficking and commercial sexual exploitation: health care needs of victims. Pediatrics, 135(3), 566-574. Wurtele, S. K., & Miller-Perrin, C. (2017). The commercial sexual exploitation of children and Sex trafficking. Women & Therapy, 40(1-2), 123-151. Boyd, D., & Mitchell, K. J. (2014). “Understanding the role of
  • 5. technology in the commercial sexual exploitation of children: the perspective of law enforcement”. Suzuki, Y. E., Tanaka, M., Aoyama, I., MacMillan, H. L., & Takaoka, K. (2017). Child sexual abuse in Japan: A systematic review and future directions. Neglect & Child abuse, 66, 31-40. Watch the documentary for this week (No Impact Man) (Links to an external site.) before answering the question. There are no viewing questions that accompany this video. You will need to take notes on it. Our documentary and our articles for this week argue that our society cannot continue being based on consumption. This was reinforced by the IPCC special report we read earlier this term. These materials argue that we must re-conceive our lives and our attitudes toward consumption because, no matter what, we will soon not be able to continue on with this life-style anyway. Often sustainable living is described as a sacrifice made for the sake of environment. Do you think a sustainable lifestyle could improve the quality of your life? If so, how, and if not, why not? Composition: Is the writing clear and error free? Do citations reflect adherence to a style manual? Argument (reply to forum question): Does the main argument have reasons that are stated clearly and led to the conclusion the author presented? Does the author bring in at least one credible outside source and used it effectively? Counterargument: Does student cite an outside author’s argument with which they disagreed (VERY important). Is the argument paraphrased so that the outline contains at least
  • 6. three lines but no more than five? Is the text color changed to make the outline identifiable? Conclusion: Is conclusion clearly specified in forum post? Is color changed to blue and the length of conclusion limited? Write a 250 word post APA.