Results 11 to 20 of about 287,101 (328)
Survivor Perspectives on Institutional Use of Child Sexual Abuse Material
This literature review draws together literature describing how child sexual abuse material (CSAM) is currently used in institutional contexts – by police, courts, academic and policy researchers and private sector entities.
Mya Ballin +4 more
doaj +2 more sources
Challenges in investigating self-generated online child sexual abuse material
Aim: The overall aim of this paper is to offer a greater understanding of the context of children’s online sexual behaviour through exploring what are some of the main challenges the police encounter when investigating digital content of a sexual nature
Boglárka Meggyesfalvi
doaj +3 more sources
Sexual posttraumatic stress among investigators of child sexual abuse material [PDF]
Abstract The current study aims to examine the sexual posttraumatic stress symptoms (sexual PTSS) among investigators of child sexual abuse material (CSAM). Previous findings indicated that sexual PTSS has a unique impact on mental health and well-being compared with traditional PTSS, highlighting a gap in the literature on how exposure ...
Ateret Gewirtz‐Meydan +2 more
openalex +2 more sources
Users of Online Child Sexual Abuse Material [PDF]
AbstractOnline communities on darknet contribute to sexual violence against children. They provide offender access to Child Sexual Abuse Material and to a group of peers that supports criminal activities. This article sheds light on online child sexual abusers and their justifications for Child Sexual Abuse (CSA).
Salla Huikuri
openalex +2 more sources
Metadata-Based Detection of Child Sexual Abuse Material [PDF]
Child Sexual Abuse Media (CSAM) is any visual record of a sexually-explicit activity involving minors. CSAM impacts victims differently from the actual abuse because the distribution never ends, and images are permanent. Machine learning-based solutions can help law enforcement quickly identify CSAM and block digital distribution.
Mayana Pereira +3 more
openalex +3 more sources
Child sexual abuse material on the darknet [PDF]
AbstractBy routing traffic through a random combination of servers worldwide, the darknet obfuscates the identity of its users, making it an attractive medium for journalists, dissidents, and individuals committing crimes. Since 2008, access to the darknet has been facilitated by the The Onion Router (TOR) browser, bringing the darknet within reach of ...
Colm Gannon +4 more
openalex +3 more sources
Investigation, Detection and Prevention of Online Child Sexual Abuse Materials: A Comprehensive Survey [PDF]
Child sexual abuse inflicts lifelong devastating consequences for victims and is an ongoing social concern. In most countries, child sexual abuse material (CSAM) distribution is illegal. As a result, there are many research papers in the literature which proposed technologies to detect and investigate CSAM. In this survey, a comprehensive search of the
Vuong M. Ngo +3 more
openalex +4 more sources
The Challenges of Identifying and Classifying Child Sexual Abuse Material. [PDF]
The aim of the present study was to (a) assess the reliability with which indecent images of children (IIOC) are classified as being of an indecent versus nonindecent nature, and (b) examine in detail the decision-making process engaged in by law enforcement personnel who undertake the difficult task of identifying and classifying IIOC as per the ...
Kloess JA +4 more
europepmc +6 more sources
Prevalence of viewing online child sexual abuse material among Australian adults [PDF]
Based on an online panel survey of 13,302 adults, this study examines the common demographic characteristics of those who have intentionally viewed child sexual abuse material (CSAM) in the past year. Overall, 0.8 percent of those surveyed reported they had intentionally viewed CSAM in the past year.
Rick Brown
openalex +2 more sources
Legal protection of children during armed conflicts is considered as a means to reduce suffering of this highly vulnerable group. Unfortunately, information and telecommunication technologies are intensively used to aggravate humanitarian condition of ...
Nataliya Maroz
doaj +2 more sources

