U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Internet and Child Sexual Offending: A Criminological Review

NCJ Number
223994
Journal
Aggression and Violent Behavior: A Review Journal Volume: 13 Issue: 3 Dated: June-July 2008 Pages: 216-228
Author(s)
Anthony R. Beech; Ian A. Elliott; Astrid A. Birgden; Donald Findlater
Date Published
June 2008
Length
13 pages
Annotation
This article provides a review of literature related to those using the Internet for child predatory offenses.
Abstract
This paper outlines the current literature on what is known about the processes by which individuals utilize the Internet for child sexual abuse. First, three ways in which the Internet is utilized are outlined, to include: dissemination of sexually abusive images of children for personal and/or commercial reasons; communication with other individuals with a sexual interest in children; and those maintaining and developing online pedophilic networks. Second, the content and availability of abusive images are described, along with the difficulties faced by criminal justice agencies in both the definition of abusive images and their prohibition. Third, the potential for offenders to ‘cross-over’ from online offenses to contact sexual victimization of children is examined and placed within a context of various Internet offender typologies that have been developed. These include browser; private fantasy; trawler; nonsecure collector; secure collector; groomer; physical abuser; producer; and distributor. Finally, the implications of this body of research for law and public policy are considered. It is noted that there appears to be a trend toward increasingly more extreme and graphic images involving the sexual abuse of progressively younger children which highlights the need for further research to ascertain the potential risk of Internet offender’s crossing-over from online to offline offenses as a clear overlap exists for some but not all offenders. Tables, references