Research Paper on "Combat Online Sexual Predators"

Research Paper 7 pages (1882 words) Sources: 7

[EXCERPT] . . . .

Combat Online Sexual Predators

Online sexual exploitation of minors by adults has grown precipitously since the advent of the Internet in the mid-1990s, the ability of minors to engage with older adults in a non-confrontational environment has facilitated a problem of sexual predators soliciting minors for sexual contact. The means to solve this problem may reside in the same technology that enables its proliferation.

Sexual predators have proliferated via the expansion of the internet into millions of homes throughout the world. The very nature of what a sexual predator does is to satiate an innate and animalistic sickness that generally involves the manipulation of the youth into a trusting and innocent relationship linked to sexual content and strong sexual language.

Often times, the sexual predator does not approach and establish interaction with a minor in any manner that is predatory. There is no law against engaging a minor in an online chat room when there is no indication of a crime being committed or the planning of a crime to be committed. In fact, a youth can meet with an adult off line when the conversation has established the interaction to be friendly and of a non-sexual nature. Should the adult violate that trust and break the law by engaging in sexual contact with the minor then the issue of labeling one a sexual predator arises.

The Internet has enabled sexual predators to use chat rooms as a vehicle to engage minors in 'chatting' and enticing them with items that would attract a minor to want to meet with and see these adults. Additionally, the predator engages in sexually charged language that entails the real
Continue scrolling to

download full paper
intent behind the interaction. The difference with the sexual predator is that the relationship is a means to satisfy a sexual desire. The psychosis of the sexual predator is seen in the language used.

The computer enables the sexual predator to not appear as an older individual, which would perhaps appear threatening in a face-to-face encounter. Therefore, the computer and the Internet allow for the sexual predator to engage the youth in a more friendly and innocent manner. However, the intent and manner of engagement often is not any different. Indeed, the only difference is the act is not a forcible abduction however such abduction is possible once the adolescent reveals their home location or decides to meet with the potential sexual predator in person.

Literature Review

So what actually is currently in place to combat online sexual predators? According to the U.S. Fed News Service (2007), "House Bill 2734 would add online identities such as email, instant messaging, and other social networking names to the sex offender registry requirements. If passed, sex offenders would incur the same penalties for failing to update their online identity information as they would for failing to update their physical address. The information would be available on the DPS website, so parents could check and verify who their children are talking to online. The online world has created the perfect sanctuary for sexual predators to hide and they are increasingly using the Internet and its many social networking sites to target our children. Parents deserve to have access to the information the state has on sex offenders." (U.S. Fed News Service, 2007)

According to Markon (2006), "The dimensions of the problem are staggering, according to federal statistics and law enforcement officials. Since an FBI program called Innocent Images National Initiative began targeting child pornography and child sexual enticement in 1995, arrests have increased by more than 2,000%, jumping from 68 in 1996 to 1,649 in 2005. Justice Department prosecutions over child pornography and child abuse have also skyrocketed in the past decade, going from 344 cases in 1995 to 1,576 last year. In Northern Virginia, cases are on the rise as well, though federal officials could not provide specific numbers. Law enforcement officials and child advocates blame the technology and anonymity of the Internet." (Markon, 2006)

According to McColgan & Giardino, (2005), "Unfortunately, some of the more than 77 million people accessing the Internet do so for inappropriate or illegal reasons. Some will "disguise" themselves and use chat rooms, bulletin boards, or instant messaging services to communicate with a child and inappropriately gain his or her confidence. In a nationally representative sample of 1,501 children and teenagers between ages 10 and 17 who used the Internet regularly, 19% were the targets of unwanted solicitation during a 1-year period. The highest risk were for girls, older teenagers, those having problems of one type or another (troubled youth), those using the Internet more frequently, those participating in chat room discussions, and those communicating with strangers online." (McColgan, Giardino, 2005)

State law is often in place and defines the legal age of sexual contact for minors as well as the minimum age of female to male sexual contact. In some states, it takes only communication of an improper nature to violate the law. According to McCollam (2007), "Under a Texas law adopted in 2005 to combat Internet predators, it is a second-degree felony to have such communications with someone under the age of fourteen, even if no actual sexual contact takes place." (McCollam, 2007)

According to Bremer (2000), "Therapists have the opportunity and duty to warn patients and their parents of online threats and to educate them about how to stay safe online. It is important to educate patients not to reveal any personal information, especially identifying information. Real names, phone numbers, addresses, schools, towns, etc., should be avoided during Internet socializing." (Bremer, 2000)

According to Business Wire (2006), "ADF Solutions announced on Wednesday that the FBI has licensed its ADF-Examiner software to combat the usage and distribution of images and other content related to child pornography and sexual exploitation of children. ADF-Examiner integrates state-of-the-art Content-Based Image Retrieval (CBIR) technologies to automate the detection of image and video files. These technologies can identify known child exploitation images as well as any altered or similar versions of these images. Unlike most other image search technologies -- which tend to have a media-centric focus -- technologies from ADF Solutions focus primarily on conclusive data identification. This unique approach leads to incomparable image matching accuracy for child exploitation and other law enforcement related images, while delivering significantly faster computation times. (Business Wire, 2006)

According to The Wilson Quarterly (2007), "Other researchers are developing ways to track malefactors across chatrooms, blogs, and e-mail. Using the same techniques scholars employ to establish authorship of a manuscript-word preference, punctuation, and style-investigators can now identify a person's unique "writeprint" even if he or she adopts an online alias. The technology has been used to identify messages from terrorists, sexual predators, digital pirates, and others. The ability to identify people through the timing of their keystrokes grew out of a 1980 study by Rand Corporation researchers, according to Julie Rehmeyer, a former Science News editorial aide. In the study, several trained typists keyed in three separate passages, then repeated the task four months later. Without fail, analyzing only "the grids of data showing average pauses between pairs of letters," says Rehmeyer, researchers were able to correctly match all seven typists with their keystroke profiles." (The Wilson Quarterly, 2007)

According to the PR Newswire (2007), "Launched in May 2006, Project Safe Childhood is a nationwide initiative designed to protect children from sexual exploitation and abuse. Let by the U.S. Attorney's Offices, Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as identify and rescue victims." (PR Newswire, 2007)

According to Ryan (2008), "To combat online sexual predators, a regional task force that will include the Rockingham County Sheriff's Office is being formed. The multi-jurisdictional Piedmont Internet Crimes Against Children Task Force will be established through a $475,960 federal grant awarded to the Guilford County Sheriff's Office. The grant will allow the task force, which will cover 3,412 square miles and serve more than 1.3 million residents, to concentrate on locating and arresting people attempting to exploit and prey upon children by computer. Thanks to the grant, investigators from Barnes' office will be educating a detective from each of the participating agencies, Barnes said the detectives will learn how to investigate these kinds of cases and how to use the software and other equipment during a week of training." (Ryan, 2008)

According to Case Law Developments (2010), "Invasion of a privacy interest is not a violation of the state constitutional right to privacy if the invasion is justified by a competing interest." Here, the compelling social interests in disclosure of information relating to sexual predators of children outweigh the individual friars' privacy interests. "All citizens have a compelling interest in knowing if a prominent and powerful institution has cloaked in secrecy decades of sexual abuse revealed in the psychiatric records of counselors who continued to have intimate contact with vulnerable children while receiving treatment for their tendencies toward child molestation." (Case Law Developments, 2010)

Conclusion

In conclusion,… READ MORE

Quoted Instructions for "Combat Online Sexual Predators" Assignment:

One of the biggest societal changes in recent years has been the rapid expansion of computer technology. How has the internet changed the tactics of sexual predators? Develop a plan of action that a law enforcement agency may use to combat the use of the internet by sexual predators to attract young victims. Include in your plan discussions on the ethical and legal ramifications of your approach to this problem and the utilization of human resources.

Paper must include:

1. APA format

a. Formatted correctly

b. In APA everything is double spaced.

2. Abstract

3. An introduction of the problem or question at hand (what your paper is about)

4. Literature review

a. What experts think or have said about the subject ( literature reviews)

b. DO NOT use the same author twice in your paper. There are many experts that you can use. Do some research!!!!!

c. It is important to leave yourself out of any research paper. Keep yourself out of the paper until the conclusion. The conclusion is the only place where it is proper to voice your thoughts or opinions. Do not use *****I*****. Only use this researcher feels, this researcher thinks etc*****¦..

d. Clear concise writing

e. Do not make paragraphs too long, 5 to 6 sentences max

f. Watch your grammar and spelling. My suggestion let someone read your work before you turn it in. Also read aloud that may help you clear up many grammatical mistakes.

g. Indent paragraphs (except abstract)

h. Be non *****judgmental, or objective in the content of your paper

i. Proper citing of an author ( see below)

5. A conclusion

a. A must!!!!

b. What your final thoughts were on the subject or what the experts might have said.

c. Start out the last paragraph with: In conclusion*****¦*****¦*****¦*****¦*****¦*****¦*****¦*****¦*****¦

6. The reference page is always on a separate page.

a. Formatted correctly

How to Reference "Combat Online Sexual Predators" Research Paper in a Bibliography

Combat Online Sexual Predators.” A1-TermPaper.com, 2011, https://www.a1-termpaper.com/topics/essay/combat-online-sexual-predators/5493723. Accessed 6 Jul 2024.

Combat Online Sexual Predators (2011). Retrieved from https://www.a1-termpaper.com/topics/essay/combat-online-sexual-predators/5493723
A1-TermPaper.com. (2011). Combat Online Sexual Predators. [online] Available at: https://www.a1-termpaper.com/topics/essay/combat-online-sexual-predators/5493723 [Accessed 6 Jul, 2024].
”Combat Online Sexual Predators” 2011. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/combat-online-sexual-predators/5493723.
”Combat Online Sexual Predators” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/combat-online-sexual-predators/5493723.
[1] ”Combat Online Sexual Predators”, A1-TermPaper.com, 2011. [Online]. Available: https://www.a1-termpaper.com/topics/essay/combat-online-sexual-predators/5493723. [Accessed: 6-Jul-2024].
1. Combat Online Sexual Predators [Internet]. A1-TermPaper.com. 2011 [cited 6 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/combat-online-sexual-predators/5493723
1. Combat Online Sexual Predators. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/combat-online-sexual-predators/5493723. Published 2011. Accessed July 6, 2024.

Related Research Papers:

Government Take to Protect Children From Pornography Term Paper

Paper Icon

government take to protect children from pornography and sexual predators on the Internet?

Children are considered to be our most precious asset and the society's future. They offer the guarantee… read more

Term Paper 10 pages (3373 words) Sources: 8 Style: APA Topic: Child Development / Youth / Teens


Informing Adults on Secured Online Environments for Children Term Paper

Paper Icon

Adults on Secured Online Environments for Children

Conceptual Framework

Scope

Title Searches, Articles, Research Documents, Journals and Websites..

Historical Overview of Individual Technology Usage

Changing Roles of the Instructor, Parent,… read more

Term Paper 50 pages (12910 words) Sources: 1+ Style: APA Topic: Computers / IT / Internet


Myspace Over the Last Decade the Internet Term Paper

Paper Icon

MySpace

Over the last decade the internet has transformed the manner in which people all over the world socialize and connect. The internet social network MySpace.com was one of the… read more

Term Paper 20 pages (5921 words) Sources: 5 Style: Chicago Topic: Computers / IT / Internet


Child Porn Term Paper

Paper Icon

Child Porn on the Internet

Pedophiles once moved about in a secret underworld to purchase and swap sexually explicit images of children, however today, they are merely a click away… read more

Term Paper 2 pages (561 words) Sources: 2 Style: MLA Topic: Child Development / Youth / Teens


Pedophiles and Methods of Rehabilitating Term Paper

Paper Icon

Human sexuality manifests itself in many ways, such as intimacy between two people that might lead to forming life-long bonds of partnership or marriage. As an expression of the sharing… read more

Term Paper 31 pages (8600 words) Sources: 25 Topic: Sexuality / Gender


Sat, Jul 6, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!