Internet Child Sex Offenders' Concerns about Online Security and their Use of Identity Protection Technologies

A Review

Myles Balfe, Bernard Gallagher, Helen Masson, Shane Balfe, Ruairi Brugha, Simon Hackett

Research output: Contribution to journalArticle

9 Citations (Scopus)

Abstract

The purpose of this article is to review what is known about the technologies that internet child sex offenders use to abuse or exploit children, offenders' attitudes towards online security and surveillance risk, and their use of identity protection tactics and technologies. The peer-reviewed literature on internet sex offenders published between 2000 and 2011 was surveyed. Internet child sex offenders use a mixture of new and old technologies to abuse children. Offenders' awareness of internet-related risk appears to exist along a continuum. A number of psychological and demographic factors may influence offenders' perceptions of online security risk and their willingness to take security precautions. A surprisingly large number of apprehended offenders in the time period examined by this review did not seem to use any technologies to disguise their identities. A major research programme into internet offenders' use of identity protection technologies, and their use of technologies in general, is needed.

Original languageEnglish
Pages (from-to)427-439
Number of pages13
JournalChild Abuse Review
Volume24
Issue number6
DOIs
Publication statusPublished - 1 Nov 2015

Fingerprint

Internet
offender
Technology
abuse
psychological factors
Child Abuse
demographic factors
tactics
surveillance
Demography
Psychology
Research

Cite this

Balfe, Myles ; Gallagher, Bernard ; Masson, Helen ; Balfe, Shane ; Brugha, Ruairi ; Hackett, Simon. / Internet Child Sex Offenders' Concerns about Online Security and their Use of Identity Protection Technologies : A Review. In: Child Abuse Review. 2015 ; Vol. 24, No. 6. pp. 427-439.
@article{b57dbe86f3ed4857a4f3b7be0d8ddbe5,
title = "Internet Child Sex Offenders' Concerns about Online Security and their Use of Identity Protection Technologies: A Review",
abstract = "The purpose of this article is to review what is known about the technologies that internet child sex offenders use to abuse or exploit children, offenders' attitudes towards online security and surveillance risk, and their use of identity protection tactics and technologies. The peer-reviewed literature on internet sex offenders published between 2000 and 2011 was surveyed. Internet child sex offenders use a mixture of new and old technologies to abuse children. Offenders' awareness of internet-related risk appears to exist along a continuum. A number of psychological and demographic factors may influence offenders' perceptions of online security risk and their willingness to take security precautions. A surprisingly large number of apprehended offenders in the time period examined by this review did not seem to use any technologies to disguise their identities. A major research programme into internet offenders' use of identity protection technologies, and their use of technologies in general, is needed.",
keywords = "child pornography, child sexual abuse, encryption, internet, offender",
author = "Myles Balfe and Bernard Gallagher and Helen Masson and Shane Balfe and Ruairi Brugha and Simon Hackett",
year = "2015",
month = "11",
day = "1",
doi = "10.1002/car.2308",
language = "English",
volume = "24",
pages = "427--439",
journal = "Child Abuse Review",
issn = "0952-9136",
publisher = "John Wiley and Sons Ltd",
number = "6",

}

Internet Child Sex Offenders' Concerns about Online Security and their Use of Identity Protection Technologies : A Review. / Balfe, Myles; Gallagher, Bernard; Masson, Helen; Balfe, Shane; Brugha, Ruairi; Hackett, Simon.

In: Child Abuse Review, Vol. 24, No. 6, 01.11.2015, p. 427-439.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Internet Child Sex Offenders' Concerns about Online Security and their Use of Identity Protection Technologies

T2 - A Review

AU - Balfe, Myles

AU - Gallagher, Bernard

AU - Masson, Helen

AU - Balfe, Shane

AU - Brugha, Ruairi

AU - Hackett, Simon

PY - 2015/11/1

Y1 - 2015/11/1

N2 - The purpose of this article is to review what is known about the technologies that internet child sex offenders use to abuse or exploit children, offenders' attitudes towards online security and surveillance risk, and their use of identity protection tactics and technologies. The peer-reviewed literature on internet sex offenders published between 2000 and 2011 was surveyed. Internet child sex offenders use a mixture of new and old technologies to abuse children. Offenders' awareness of internet-related risk appears to exist along a continuum. A number of psychological and demographic factors may influence offenders' perceptions of online security risk and their willingness to take security precautions. A surprisingly large number of apprehended offenders in the time period examined by this review did not seem to use any technologies to disguise their identities. A major research programme into internet offenders' use of identity protection technologies, and their use of technologies in general, is needed.

AB - The purpose of this article is to review what is known about the technologies that internet child sex offenders use to abuse or exploit children, offenders' attitudes towards online security and surveillance risk, and their use of identity protection tactics and technologies. The peer-reviewed literature on internet sex offenders published between 2000 and 2011 was surveyed. Internet child sex offenders use a mixture of new and old technologies to abuse children. Offenders' awareness of internet-related risk appears to exist along a continuum. A number of psychological and demographic factors may influence offenders' perceptions of online security risk and their willingness to take security precautions. A surprisingly large number of apprehended offenders in the time period examined by this review did not seem to use any technologies to disguise their identities. A major research programme into internet offenders' use of identity protection technologies, and their use of technologies in general, is needed.

KW - child pornography

KW - child sexual abuse

KW - encryption

KW - internet

KW - offender

UR - http://www.scopus.com/inward/record.url?scp=84893846162&partnerID=8YFLogxK

U2 - 10.1002/car.2308

DO - 10.1002/car.2308

M3 - Article

VL - 24

SP - 427

EP - 439

JO - Child Abuse Review

JF - Child Abuse Review

SN - 0952-9136

IS - 6

ER -