The Internet and Sexual Predators

2011 ◽  
pp. 140-163
Author(s):  
Kareena McAloney ◽  
Joanne E. Wilson

Young people can potentially be exposed to sexual material from a variety of sources, both accidentally and purposefully. One such source, the internet, plays host to a vast array of information and imagery, among which sexually explicit material and pornography are in high concentration. Indeed within this virtual catalogue of material it is possible to find both adult and child pornography, particularly if one is aware of the correct methods of accessing such content. This chapter provides an in-depth overview of current knowledge regarding young people’s exposure to and experiences of sexual material and sexual predators online, including those particular aspects of young people’s online interactions that make them vulnerable to receive unwanted sexual material and solicitation. The authors then discuss the use of the Internet for the sexual exploitation of children and young people both in the nature of sexual material to which they are exposed to online including the transmission of images of child pornography and molestation, the processes by which young people access sexual material online, the solicitation of children by sexual predators in targeting young people and how young people in turn come to interact with sexual predators online. Finally they address current mechanisms designed to protect children and young people as they engage in online activities.


2018 ◽  
Vol 7 (4.19) ◽  
pp. 919
Author(s):  
Rafeef Kareem ◽  
Wesam Bhaya

Today, OSNs (Online Social Networks) considered the most platforms common on the Internet. It plays a substantial role for users of the internet to hold out their everyday actions such as news reading, content sharing, product reviews, messages posting, and events discussing etc. Unfortunately, on the OSNs some new attacks have been recognized. Different types of spammers are existing in these OSNs. These cyber-criminals containing online fraudsters, sexual predators, catfishes, social bots, and advertising campaigners etc.OSNs abuse in different ways especially by creating fake profiles to carry out scams and spread their content. The identities of all these malicious are so damaging to the service providers and the users. From the opinion of OSNs service providers, the loss of bandwidth moreover the overall reputation of the network is affected by fake profiles. Thus, needing more complex automated methods, and tremendous effort manpower to discover and stopping these harmful users.This paper explains different kinds of OSNs risk generators such as cloned profiles, compromised profiles, and online bots (spam-bots, chat-bots, and social-bots). In addition, it presents several classifications of features that have been used for training classifiers in order to discover fake profiles. We try to show different ways that used to detect every kind of these malicious profiles. Also, this paper trying to show what is the dangerous type of profile attacks and the most popular in OSNs.  


2021 ◽  
pp. 51-67
Author(s):  
ŽELJKO BJELAJAC ◽  
ALEKSANDAR FILIPOVIĆ

The Internet has undoubtedly become a dynamic and sublime tool of communication. It gives us the freedom to create and maintain contacts with individuals and groups from all over the world, to cooperate, socialize and exchange information, content and experiences. At the same time, nowadays it is almost impossible to imagine an internet business or presentation without a presence on social networks / media. These are online web services that open unlimited spaces for users for various forms of communication and personal promotion. Some of the most popular social networks that are especially receptive to most users from global spaces are: Twitter, Facebook, Instagram, Google+, LinkedIn, TikTok… By the way, on most social networks, the presence is free. Digital media have the capacity to inform visitors in the most efficient and practical way about important events, current campaigns and innovations related to the business, products or services offered, with the quality content of the texts they manifest. Also, their significant impact is reflected in the domain of education and / or providing certain advice. In addition to colossal achievements and obvious positive sides, with the advent of the Internet and digital media, sexual predators have been given a new field / playground, in which to establish contacts with others (often with children). In this digital environment, they manipulatively lurk and recruit potential victims for various forms of abuse and sexual exploitation.


Author(s):  
Vinitha Johnson

Technophobia, computer illiteracy, poverty, lack of necessity to counter the downward arch of the learning curve, and fear of sexual predators online are among the more popularly cited reasons for explaining the gender divide. It might be useful to elaborate on the concept of “access” in relation to the Gender Divide. Barriers to access could be physical such as spatial difficulty in gaining physical proximity to a computer, or internet connectivity, mental or related to ability to understand or utilise computer technology or computer usage, or attitudinal. The attitudinal aspect of a woman impeding herself from using the internet is possibly worthy of analysis.


2010 ◽  
Vol 3 (3) ◽  
Author(s):  
Benjamin Sanders ◽  
Steven Furnell ◽  
Paul Dowland ◽  
Shirley Atkinson

Some may argue that the proliferation of personal computers together with the widespread use of the Internet has brought many benefits to society.  The popularity of the internet and its associated online services continues to grow at an exponential rate and consequently, so does the number of avenues for potential exploitation.  Prior research has already established that sexual predators and social engineers use the Internet as a means to target and exploit individuals.  Indeed, previous studies highlight the significant threats faced by users of instant messaging and social networking facilities.  Online role-playing games and virtual environments provide yet another platform for users to interact with one another.   Evidence suggests that subscribers of such services often become so immersed in a fantasy world that their ability to differentiate between the virtual and real world is reduced.  This monograph investigates the level of threat faced by users of  virtual environments and online role-playing games.  The study made use of an online survey to assess the current level of awareness and understanding amongst individuals who spend excessive amounts of time engaging in such environments.


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


2001 ◽  
Vol 120 (5) ◽  
pp. A735-A735
Author(s):  
C STREETS ◽  
J PETERS ◽  
D BRUCE ◽  
P TSAI ◽  
N BALAJI ◽  
...  

1996 ◽  
Vol 16 (4) ◽  
pp. 244-245 ◽  
Author(s):  
L. Smessaert
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document