Counter-Surveillance Strategies Adopted By Child Pornographers
نویسنده
چکیده
On the one side, it could be argued that ICT provide a perceived anonymity for people downloading and distributing child abusive material, also labelled child pornography. While, on the other side the technology offers powerful surveillance mechanisms to monitor these activities and thus constitutes a powerful tool for law enforcement. This article aims to explore how offenders manage the risk of surveillance when downloading, distributing and exchanging child abusive material. Critical research with a focus on panopticon is used as a theoretical framework. The data is drawn from interviews with offenders, convicted of child pornography. The findings show that the offenders have developed technological and social strategies to reduce the risk of surveillance and addresses the need of a new theoretical concept better adjusted to surveillance practices that allow the many to watch the many. The ultimate motivation for researching this topic is to contribute to the development of effective child protection strategies. DOI: 10.4018/jthi.2009062501 IGI PUBLISHING This paper appears in the publication, International Journal of Technology and Human Interaction, Volume 5, Issue 4 edited by Bernd Carsten Stahl © 2009, IGI Global 701 E. Chocolate Ave ue, Hershey PA 17033-1240, USA Tel: 717/533-8845; Fax 717/533-8661; URL-http://www.igi-global.com ITJ 5349
منابع مشابه
The Economics of Community Detection and Hiding
We present a model of surveillance based on the detection of community structure in social networks. We examine the extent of network topology information an adversary is required to gather in order to obtain high quality intelligence about community membership. We show that selective surveillance strategies can improve the adversary’s resource efficiency. However, the use of counter-surveillan...
متن کاملThe Economics of Covert Community Detection and Hiding
We present a model of surveillance based on the detection of community structure in social networks. We examine the extent of network topology information an adversary is required to gather in order to obtain high quality intelligence about community membership. We show that selective surveillance strategies can improve the adversary’s resource efficiency. However, the use of counter-surveillan...
متن کاملPlanning Strategies for Decision-Theoretic Robotic Surveillance
In this paper, a decision theoretic view of the goal of surveillance is adopted. Subsequently a very simple formal model of the environment is introduced with the purpose of deening and comparing surveillance strategies. Several existing surveillance strategies are discussed. Then our decision-theoretic strategy is proposed and compared with the existing strategies on a theoretical level. In or...
متن کاملExplanation of Adoptive Families’ Experiences of Adopted Children Problems: a Grounded Theory Approach
Extended Abstract Introduction: Adoption of a child is a complex social construct that is often challenging and does not always result in immediate happiness. Children who are adopted, particularly those with a history of adversity prior to adoption, are at the risk of developing problems in behavioral and emotional self-regulation, attention deficits, or inhibitory control; as well as problem...
متن کاملExplanation of Adoptive Families’ Experiences of Adopted Children Problems: a Grounded Theory Approach
Extended Abstract Introduction: Adoption of a child is a complex social construct that is often challenging and does not always result in immediate happiness. Children who are adopted, particularly those with a history of adversity prior to adoption, are at the risk of developing problems in behavioral and emotional self-regulation, attention deficits, or inhibitory control; as well as problem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJTHI
دوره 5 شماره
صفحات -
تاریخ انتشار 2009