Sélection thématique "Pédopornographie"
(CSEM Child Sexual Exploitation Material)
Editée par la documentaliste du CRIAVS Franche-Comté (05/2020)
Pour obtenir les documents, contactez le CRIAVS de votre région.
Ajouter le résultat dans votre panier Affiner la recherche
Article
Angela W. EKE, Auteur ; Michael C. SETO, Auteur ; Jennette WILLIAMS, Auteur |We examined police occurrence and criminal records data for a sample of 201 registered male child pornography offenders originally reported by Seto and Eke (Sex Abus J Res Treat 17:201210, 2005), extending the average follow-up time for this sa[...]Article
Philip R. MAGALETTA, Auteur ; Erik FAUST, Auteur ; William BICKART, Auteur ; Alix M. McLEAREN, Auteur |Despite the dramatic increase in the number of convicted child pornography offenders, little is known about their potential clinical needs. The few studies that do explore this subgroup of sex offenders suggest clinical heterogeneity compared wi[...]Article
Robert J. EDELMANN, Auteur |Given the rapid expansion in access to the internet in the past decade with information flow being difficult to police it is perhaps not surprising that the internet is so open to misuse. One such misuse is by child sex offenders for whom the in[...]Article
Michelle A. McMANUS, Auteur ; Matthew L. LONG, Auteur ; Laurence A. ALISON, Auteur ; Louise ALMOND, Auteur |This study explored a sample of 244 UK adult male offenders convicted of offences involving indecent images of children (IIOC): 120 had a previous contact child sexual offence (defined as dual offenders) and 124 had no evidence of an offence aga[...]Article
This paper explores the arguments put forward for prohibiting the possession of fantasy images of child sexual abuse within the Coroners and Justice Act 2009, and applies them to sexual ageplay in Second Life. Sexual ageplay is the virtual act o[...]Article
Hannah L. MERDIAN, Auteur ; Nima MOGHADDAM, Auteur ; Douglas P. BOER, Auteur ; Nick WILSON, Auteur ; Jo THAKKER, Auteur ; Cate CURTIS, Auteur ; David L. DAWSON, Auteur |Since the advent of the Internet, convictions for the possession, display, trading, and distribution of child sexual exploitation material (CSEM) have risen steadily, but little is known about their appropriate assessment and treatment, especial[...]Article
Jenny A B M HOUTEPEN, Auteur ; Jelle J SIJTSEMA, Auteur ; Stefan BOGAERTS, Auteur |In this review, concrete directions are provided for individual risk assessment, treatment planning, and future research on child pornography offending. First, based on reviewing offender characteristics, including demographics, socio-affective [...]Article
Francis FORTIN, Auteur ; Sarah PAQUETTE, Auteur ; Benoit DUPONT, Auteur |Script theory explains how different types of crime may be committed in a particular sequence. While researchers have traditionally been interested in crimes against property and crimes against persons, this study analyzes a new form of crime: s[...]Article
Danielle G KETTLEBOROUGH, Auteur ; Hannah L. MERDIAN, Auteur |The endorsement of permission-giving thoughts, or so-called cognitive distortions, has been discussed as a contributing factor in sexually abusive behaviour. The current study set out to explore the thinking patterns of offenders who have used/d[...]Article
Le développement accéléré des technologies de linformation a considérablement modifié la problématique de la pornographie juvénile en facilitant sa distribution dans le cyberespace, particulièrement dans les groupes de nouvelles Usenet. Ces gro[...]Article
Virginia SOLDINO, Auteur ; Hannah L. MERDIAN, Auteur ; Ross M BARTELS, Auteur ; Hannah K. BRADSHAW, Auteur |Offense-supportive cognitions are thought to result from underlying implicit theories (ITs). As child sexual exploitation material (CSEM) users are a distinct type of sex offender, Bartels and Merdian proposed that CSEM offenders hold five diffe[...]Article
This paper is based on anthropological research focused on users of online child sexual exploitation material. The empirical foundations are 17 months of participant-observation in UK group programmes for offenders, and semi-structured interview[...]Article
Jessica N. OWENS, Auteur ; Jennifer D EAKIN, Auteur ; Tia A. HOFFER, Auteur ; Yvonne E MUIRHEAD, Auteur ; Joy Lynn E. SHELTON, Auteur |The prevalence and availability of child pornography on the Internet has increased the number of cases investigated by law enforcement and public concern regarding the extent to which individuals who collect child pornography also commit contact[...]Chapitre
Ouvrage
Au printemps 2000, Serge Garde dans le journal L'Humanité, puis Laurence Beneux dans le Figaro et dans l'émission L.B sur Canal + révèlent l'existence du CD-Rom de Zandvoort contenant 8500 documents pédosexuels, et d'un fichier établi par la pol[...]Ouvrage
A linstar de ses pareils, hommes de tous âges et de toutes conditions que leur addiction au sexe a conduits devant les tribunaux puis relégués loin des "zones sensibles", le Kid, vingt et un ans, bracelet électronique à la cheville, a pour quar[...]Article
Marie HENSHAW, Auteur ; James R. P OGLOFF, Auteur ; Jonathan A CLOUGH, Auteur |This article reviews the current literature pertaining to those who engage in child pornography offending. The basic characteristics of online child pornography offenders (CPOs) and related typologies are briefly presented prior to reviewing the[...]Article
La prévention et la lutte contre les crimes commis envers les enfants figurent au rang des moyens prioritaires de garantir aux citoyens un niveau élevé de protection dans un espace de liberté, de sécurité au sein de lUnion (art. 29 TUE). Lexpl[...]Article
Shelly L. CLEVENGER, Auteur ; Jordana N NAVARRO, Auteur ; Jana L JASINSKI, Auteur |This study examined the demographic and background characteristic differences between those arrested for child pornography (CP) possession (only), or CP production/distribution, or an attempted or completed sexual exploitation of a minor (SEM) t[...]Article
Janis WOLAK, Auteur ; Marc LIBERATORE, Auteur ; Brian Neil LEVINE, Auteur |We used data gathered via investigative RoundUp software to measure a year of online child pornography (CP) trafficking activity by U.S. computers on the Gnutella peer-to-peer network. The data include millions of observations of Internet Prot[...]