Online Child Sex Solicitation: Exploring the feasibility of a research ‘sting’
A small scale test of the integrity of Internet Web 2.0 social network sites was undertaken over several weeks in 2007. The fictional identities of four female underage children where posted on three network sites and later introduced to relay chat forums in order to explore the impact of apparent vulnerability on potential selection of Internet victims. Only one of the three social network sites in the study recognised that the postings violated child protection policies and subsequently closed down the underage postings.
Two basic identities were created: one that engendered a needy and vulnerable characterisation of a child while the other identity was created to represent a happy and attached child character. The number of contacts and suspicious contacts were monitored to test assumptions about child ‘vulnerability’ and risks of unwanted sexual solicitations. The characters created also included either an avatar and/or contact details. These variants of the experiment showed that the inclusion of an image or access details increased the likelihood of contacts, including suspicious contact regardless of ‘vulnerability’. This small experiment noted that although vulnerable children with additional cues maybe at more risk all children who posted details about themselves on social network sites faced the risk of contact by predators. The need for further research and better means of regulating such sites was suggested.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
|Item Type:||Journal Article|
|Keywords:||cybercrime, on, line child safety, sex offences, Web 2, 0, on, line sex offenders, Internet misuse|
|Subjects:||Australian and New Zealand Standard Research Classification > LAW AND LEGAL STUDIES (180000)|
|Divisions:||Current > QUT Faculties and Divisions > Faculty of Law|
|Copyright Owner:||Copyright 2007 International Journal of Cyber Criminology|
|Copyright Statement:||This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by-nc-sa/2.5/in/), which permits unrestricted use, distribution, and reproduction in any medium, share alike, for non-commercial use, provided the original work is properly cited. This license does not permit commercial exploitation or the creation of derivative works without specific permission.|
|Deposited On:||19 Sep 2007|
|Last Modified:||09 Jun 2010 12:44|
Repository Staff Only: item control page