skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 219156 Find in a Library
Title: Safeguarding Young People From Cyber Pornography and Cyber Sexual Predation: A Major Dilemma of the Internet
Journal: Child Abuse Review  Volume:16  Issue:3  Dated:May/June 2007  Pages:153-170
Author(s): Stefan C. Dombrowski; Karen L. Gischlar; Theo Durst
Date Published: May 2007
Page Count: 18
Type: Report (Study/Research)
Format: Article
Language: English
Country: United Kingdom
Annotation: This article discusses how to safeguard children from and educate them about online sexual solicitation and pornography.
Abstract: The article first discusses the various techniques that pornographic Web sites and sexual predators use to attract or make themselves accessible to Internet users. Generally, the acquisition of technological computer software such as a firewall, anti-spyware software, wireless encryptions, and antivirus software will protect children and youth computer users from a predator's attempt to access personal information of computer users; however, these programs or applications cannot protect young users from a predator who has already received contact information voluntarily given by a youth. Attention to a child's online activities should be the primary tool for protecting them from sexually explicit interactions with predators. The filtering of computer communications (e.g., NetNanny) is a primary tool for preventing Internet exposure to inappropriate material. This tool enables parents to exclude from access to their children all but approved Web sites. Evasive techniques are available, however, which means that technology should not be the only technique used. Other methods used should include discussing with children specific Internet dangers, parental monitoring of the people with whom children have Internet interactions, the monitoring of children's screen names to ensure they do not attract predators, having the family's Internet-connected computer in a public area in the home, and reporting any inappropriate solicitations to the authorities. 44 references and appended caregiver-young person contract for safe Internet use
Main Term(s): Juvenile victims
Index Term(s): Child protection services; Computer crime prevention measures; Computer privacy and security; Computer related crime; Pornography; Science and Technology; Sex offenders; Technology transfer
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.