Results 61 to 70 of about 81,689 (240)

Understanding South Korean Immigrant Adolescents' Experiences of Staying Home Alone

open access: yesChild &Family Social Work, EarlyView.
ABSTRACT Adequate caregiver supervision is crucial for the well‐being of children and adolescents, helping to promote healthy development and to prevent injuries and emotional–behavioural problems. The transition from childhood to adolescence requires careful consideration of cultural norms.
Sol Park, Mónica Ruiz‐Casares
wiley   +1 more source

Using Internet Artifacts to Profile a Child Pornography Suspect

open access: yesJournal of Digital Forensics, Security and Law, 2014
Digital evidence plays a crucial role in child pornography investigations. However, in the following case study, the authors argue that the behavioral analysis or “profiling” of digital evidence can also play a vital role in child pornography ...
Marcus K. Rogers   +1 more
doaj  

Crying Over the Cache: Why Technology Has Compromised the Uniform Application of Child Pornography Laws [PDF]

open access: yes, 2012
As thousands of individuals surf the internet daily, every image on every web page is saved automatically to their computer’s cache, absent user direction. Sections 2252(a)(2) and 2252(a)(4)(B) of Title 18 of the U.S.
Gant, Katie
core   +1 more source

Intermediate Effects Between Experiences of Violence at Home, School, Street, TV and Child‐to‐Parent Violence

open access: yesChild &Family Social Work, EarlyView.
ABSTRACT Exposure to violence is an adverse experience related to child‐to‐parent violence. The objectives were to examine differences in child‐to‐parent violence according to the sex and age of the children and to analyse the mediating role of reactive and instrumental reasons between exposure to direct and indirect violence across different contexts ...
Luis Burgos‐Benavides   +3 more
wiley   +1 more source

Internet-Facilitated Commercial Sexual Exploitation of Children. [PDF]

open access: yes, 2013
This bulletin summarizes findings from the Internet‐Facilitated Commercial Sexual Exploitation of Children (IF‐CSEC) component of the 2006 Second National Juvenile Online Victimization study.
Jones, Lisa M., Mitchell, Kimberly J
core   +1 more source

Trends in Law Enforcement Responses toTechnology‐facilitated Child Sexual Exploitation Crimes: TheThird National Juvenile OnlineVictimization Study (NJOV‐3) [PDF]

open access: yes, 2012
Overall arrests for technology‐facilitated child sexual exploita‐ tion crimes did not continue to increase from 2006 to 2009 as they had earlier in the decade.
Finkelhor, David   +2 more
core   +2 more sources

‘We Teach Kids About It So They Don't Get Addicted’: Gender, Porn and Sex Education in New Zealand

open access: yesChildren &Society, EarlyView.
ABSTRACT This research sought to explore young people's and teachers' understandings of porn. Drawing on a qualitative content analysis of small focus group interview data with 106 young people aged 12–16 years old and semi‐structured interviews with six teachers in Aotearoa, New Zealand, I examine their perceptions of porn and the place of porn in sex
Claire Meehan
wiley   +1 more source

Imposing restrictions on pornography: its potential impact and effectiveness in Sri Lanka

open access: yesSri Lanka Journal of Psychiatry, 2011
The government of Sri Lanka recently introduced many measures to limit the accessibility and availability of pornography in the country including censorship of websites containing sexually explicit material and active prosecution of Sri Lankans who ...
Ranmali Waduge   +2 more
doaj   +3 more sources

Fighting Child Pornography: A Review of Legal and Technological Developments

open access: yesJournal of Digital Forensics, Security and Law, 2014
In our digitally connected world, the law is arguably behind the technological developments of the Internet age.  While this causes many issues for law enforcement, it is of particular concern in the area of child pornography in the United States.
Jasmine Eggestein, Kenneth Knapp
doaj  

Home - About - Disclaimer - Privacy