Présentation de l'éditeur :
New communication technology can help abusers gain access to children... It can allow groups of abusers to communicate with and incite one another... It can allow them to plan and undertake their abuse in new ways... At the same time, its apparent cover of anonymity can cause children to unwittingly, knowingly or naively put themselves at greater risk... Most of us are aware of some of these problems. But are we aware enough of how the various types of abuse happen, why they happen, and how perpetrators can be identified and prosecuted under law? This book gives a conceptual understanding of new technologies, new laws and new court decisions; and provides insights into a range of sexually abusive behaviours that both evolve and stay distressingly the same. It can help: - those who work and study in law and criminology - those involved with safeguarding children - those providing therapeutic responses to both perpetrators and those impacted by their abuse. - those in IT industries who want to assist their efforts. It explores: · offending behaviour of adults. Each behavioural type is given a distinct chapter, and common themes are drawn out, including: inappropriate adult response to being tempted by the behaviour exhibited by certain teenagers; exploiting teenagers vulnerability; and seeking to turn their experimentation into inappropriate sexual contact. · the behaviour of children and young people. This can include distributing personal sexual images to a sweetheart ; acts of self-exploitation such as posting indecent images of themselves, perhaps when dared , or providing images of themselves when financially enticed; cyber-bullying, harassment; and sexually inappropriate behaviour by children themselves, such as the filming of non-consensual sexual attacks, passing on inappropriate images received, or seeking out sexual images of younger children. · issues of identity: how and why people create different identities there, and how and why some people are taken in, or perhaps naively go along. · technology-specific behaviours including those involving: the world-wide web; email; chatrooms (including Internet Relay Chat (IRC)); peer-to-peer systems; short messaging system (SMS) aka text messages ; instant messenger; 3G technology. Brief introductions to each of these technologies allow anyone unfamiliar with technological development to gain enough understanding to see how each technology can be used to facilitate the abuse of children. · social and corporate responses: how the pressure to improve technology and get the next uses out there does not always appear to involve the same attention being given to social responsibility; and how corporate responsibility can strive to ensure that the virtual world is safe for children. · legal and judicial responses: how the law makes distinctions between different behaviours, how it applies in different contexts, and why different risk and understanding of risk can result in adoption of sometimes absolute limits and sometimes more dynamic ones. READERSHIP All professionals involved in the safeguarding of children who need to understand and respond to the behaviour of both adults and children using communication technologies in ways that put other children at risk of bullying, image/identity theft and sexual exploitation: police, social services, child protection agencies, safeguarding children boards, probation, education, health, the law.
Revue de presse :
"Gives a conceptual understanding of new technologies, new laws and new court decisions; and provides insights into a range of sexually abusive behaviours that both evolve and stay distressingly the same... extremely useful for all working in a child protection framework." --ChildRIGHT
"Useful to anyone who wants to be better informed about this insidious use of technology to abuse children. It covers bullying and harassment, child pornography, indecent images, grooming, child procurement and prostitution. The author does not talk down to his reader as he has that rare gift of communication that sets out difficult ideas in a way that is easy to understand. What it does show is the difficulty the law has in addressing these crimes and their fast evolving nature... very useful and enlightening... as technology marches ever forwards with new dangers for children eager to embrace it... it will be a useful addition to the library of books that informs our understanding of child protection." --Rostrum
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.