Abstract
In September 2019, The New York Times reported that in the previous year, technology companies reported to the US National Center for Missing & Exploited Children (NCMEC) over 45 million photographs and videos of children being sexually abused, which was more than double what had been reported in the previous year (Keller & Dance, 2019). This hard-hitting article made reference to a paper completed in collaboration with NCMEC which stated that ‘… online sharing platforms have accelerated the pace of CSAI [child sexual abuse image] content creation and distribution to a breaking point where NCMEC’s manual review capabilities and law enforcement investigations no longer scale’ (Bursztein et al., 2019 p. 1). While meaningful estimates of these crimes are highly problematic, Wager et al. (2018) have argued that there are essentially four ways in which online-facilitated child sexual abuse (OCSA) can be measured: by counting the number of offences committed, the number of perpetrators, the number of victims and the number of images that have been viewed, downloaded and exchanged. However, they note that quantification based on each of these four measures inevitably produces very different figures, partly because they are attempting to count different aspects of OCSA. For example, disaggregated police data in Scotland would indicate that the number and proportion of police-recorded ‘other sexual crimes’ in Scotland which were cyber-enabled (the internet used as a means to commit the crime) had increased significantly over 2 years. In 2016/2017, 51% of ‘other sexual crimes’ were cyber-enabled, up from 38% in 2013/2014. However, a meta-analysis of the prevalence of online solicitation amongst youth (one specific form of OCSA) would indicate that one in nine young people experiences online solicitation but that moderator analyses indicated that prevalence rates had decreased over time (Madigan et al., 2018).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
boyd, D. (2008). Taken out of context: American teen sociality in networked publics, ProQuest Dissertations and Theses.
Babchishin, K. M., Hanson, R. K., & VanZuylen, H. (2015). Online child pornography offenders are different: A meta-analysis of the characteristics of online and offline sex offenders against children. Archives of Sexual Behavior, 44, 45–66. https://doi.org/10.1007/s10508-014-0270-x
Balfe, M., Gallagher, B., Masson, H., Balfe, S., Brugha, R., & Hackett, S. (2015). Internet child sex offenders’ concerns about online security and their use of identity protection technologies: A review. Child Abuse Review, 24(6), 427–439.
BBC News. (2019). Facebook removes 11.6 million child abuse posts. Available from https://www.bbc.co.uk/news/technology-50404812
Brantingham, P., & Faust, F. (1976). A conceptual model of crime prevention. Crime & Delinquency, 22(3), 284–296.
Brewer, R., Cale, j., Goldsmith, A., Holt, T. (2018). Young people, the Internet, and emerging pathways into criminality: a study of Australian adolescents. International Journal of Cyber Criminology. 12(1), 115–132
Bursztein, E., Bright, T., DeLaune, M., Elifff, D. M., Hsu, N., Olson, L., … Thomas, K. (2019). Re-thinking the detection of child sexual abuse imagery on the Internet. In Proceedings of the 2019 World Wide Web Conference (WWW’19), May 13–17, 2019, San Francisco, CA, USA.
Carr, J. (2019). Let there be light. Desiderata. Available from https://johncarr.blog/2019/11/24/let-there-be-light/
Chan, T., Cheung, C., & Wong, R. (2019). Cyberbullying on social networking sites: The crime opportunity and affordance perspectives. Journal of Management Information Systems, 36(2), 574–609.
Clarke, R. V., & Cornish, D. B. (1985). Modeling offenders’ decisions: A framework for research and policy. In M. Tonry & N. Morris (Eds.), Crime and justice: A review of research (Vol. 6). Chicago, IL: University of Chicago Press.
Cohen, L., E., & Felson, M. (1979). Social change and crime rate trends: a routine activity approach. American Sociological Review. 44(4), 588–608.
Cornish, D. B., & Clarke, R. V. (2003). Opportunities, precipitators and criminal dispositions: A reply to Wortley’s critique of situational crime prevention. In M. J. Smith & D. B. Cornish (Eds.), Theory for practice in situational crime prevention (Crime Prevention Studies) (Vol. 16). Monsey, NJ: Criminal Justice Press.
Costa, E. (2018). Affordances-in-practice: An ethnographic critique of social media logic and context collapse. New Media & Society, 20(10), 3641–3656.
Covington, P., Adams, J. & Sargin, E. (2016). Deep neural networks for YouTube recommendations. In Proceedings of the 10th ACM conference on recommender systems 978-1-4503-4035-9 Boston, MA, USA.
Dodge, A. (2019). Nudes are forever: Judicial interpretations of digital technology’s impact on “Revenge Porn”. Canadian Journal of Law and Society, 34(1), 121–143.
Dunne, M., Purdie, D., Cook, M., Boyle, F., & Najman, J. (2003). Is child sexual abuse declining? Evidence from a population-based survey of men and women in Australia. Child Abuse & Neglect, 27(2), 141–152.
Earl, J., & Kimport, K. (2011). Digitally enabled social change. Cambridge, MA: MIT Press.
ECPAT International. (2015). Factsheet on Live Streaming of Online Child Sexual Abuse. http://www.ecpat.org/wp-content/uploads/2016/04/Live-abuse-via-webcam-Factsheet.pdf
ECPAT International. (2016). Terminology guidelines for the protection of children from sexual exploitation and sexual abuse. Luxembourg, Europe: ECPAT.
EUROPOL. (2017). Police2Peer. https://www.europol.europa.eu/partners-agreements/police2peer
EUROPOL. (2018). Internet organised crime threat assessment. Available from https://www.europol.europa.eu/internet-organised-crime-threat-assessment-2018
Farrell, G., & Birks, D. (2018). Did cybercrime cause the crime drop? Crime Science, 7(8), 1–4. https://doi.org/10.1186/s40163-018-0082-8
Felson, M., & Clarke, R. (1998). Opportunity makes the thief: Practical theory for crime prevention. London, UK: The Policing and Reducing Crime Unit.
Finkelhor, D., & Jones, L. (2006). Why have child maltreatment and child victimization declined? Journal of Social Issues, 62(4), 685–716.
Fisher, M. & Taub, A. (2019) On YouTube’s digital playground, an open gate for pedophiles. Available from https://www.nytimes.com/2019/06/03/world/americas/youtube-pedophiles.html?module=inline
Gibson, J. J. (1979). The ecological approach to perception. London, UK: Houghton Mifflin.
Gillespie, S., Dervley, R., & Squire, T. (2015). Internet offenders and “inform plus”: An evaluation of a community based groupwork programme. NOTA News, 75, 19–20.
Horsman, G. (2018). A forensic examination of the technical and legal challenges surrounding the investigation of child abuse on live streaming platforms: A case study on Periscope. Journal of Information Security and Applications, 42, 107–117.
Jarzabkowski, P., & Kaplan, S. (2015). Strategy tools-in-use: A framework for understanding “technologies of rationality” in practice. Strategic Management Journal, 36(4), 537–558.
Jerde, R. (2017). Follow the silk road: How internet affordances influence and transform crime and law enforcement. Master’s Dissertation from the Naval Postgraduate School Monterey, CA.
Jones, L. M., Mitchell, K., & Walsh, W. A. (2014b). A content analysis of youth internet safety programs: Are effective prevention strategies being used? Durham, NH: Crimes Against Children Research Center (CCRC), University of New Hampshire.
Jones, L. M., Mitchell, K. J., & Walsh, W. A. (2014a). A systematic review of effective youth prevention education: Implications for internet safety education. Durham, NH: Crimes against Children Research Center (CCRC), University of New Hampshire.
Kaufmann, L., & Clément, F. (2007). How culture comes to mind: From social affordances to cultural analogies. Intellectica, 46, 1–36.
Keller, M. H. & Dance, G. J. X. (2019) The internet is overrun with images of child sexual abuse. What went wrong? https://www.nytimes.com/interactive/2019/09/28/us/child-sex-abuse.html
Laaksonen, T., Sariola, H., Johansson, A., Jern, P., Varjonen, M., Von Der Pahlen, B., … Santtila, P. (2011). Changes in the prevalence of child sexual abuse, its risk factors, and their associations as a function of age cohort in a Finnish population sample. Child Abuse & Neglect, 35(7), 480–490.
Livingstone, S. (2019). What are the key issues for research and intervention in the field of youth mental health? And how might the digital environment play into this? https://blogs.lse.ac.uk/parenting4digitalfuture/2019/11/06/what-are-the-key-issues-for-research-and-intervention-in-the-field-of-youth-mental-health-and-how- might-the-digital-environment-play-into-this/
Loeb, J. (2017). Europol study assesses technology for fighting online child abuse. Engineering Technology, 12(10), 8–8.
Madigan, S., Villani, V., Azzopardi, C., Laut, D., Smith, T., Temple, J. R., … Dimitropoulos, G. (2018). The prevalence of unwanted online sexual exposure and solicitation among youth: A meta-analysis. Journal of Adolescent Health, 63(2), 133–141.
Majchrzak, A., Faraj, S., Kane, G., & Azad, B. (2013). The contradictory influence of social media affordances on online communal knowledge sharing. Journal of Computer – Mediated Communication, 19(1), 38–55.
Matamoros-Fernández, A. & Gray, J. (2019). Understanding the algorithms: YouTube attempts to avoid problematic content. Available from https://www.nzherald.co.nz/business/news/article.cfm?c_id=3&objectid=1228137
May-Chahal, C., Mason, C., Rashid, A., Walkerdine, J., Rayson, P., & Greenwood, P. (2014). Safeguarding cyborg childhoods: Incorporating the on/offline behaviour of children into everyday social work practices. British Journal of Social Work, 44(3), 596–614.
May-Chahal, C. & Palmer, E. (2018). Rapid Evidence Assessment characteristics and vulnerabilities of victims of online-facilitated child sexual abuse and exploitation. Available from www.iicsa.org.uk
McGuire, M., & Dowling, S. (2013). Cybercrime: A review of the evidence. London, UK: Home Office.
Meredith, J. (2017). Analysing technological affordances of online interactions using conversation analysis. Journal of Pragmatics, 115, 42–55.
Mews, A., Di Bella, L., & Purver, M. (2017). Impact evaluation of the prison-based core sex offender treatment programme. Ministry of Justice. Available from https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/623876/sotp-report-web-pdf
Microsoft. (2019). PhotoDNA. Available from https://www.microsoft.com/en-us/PhotoDNA
Middleton, D., Mandeville-Norden, R., & Hayes, E. (2009). Does treatment work with internet sex offenders? Emerging findings from the Internet Sex Offender Treatment Programme (i-SOTP). Journal of Sexual Aggression, 15(1), 5–19.
Miraz, M., Ali, M., Excell, P., & Picking, R. (2018). Internet of nano-things, things and everything: Future growth trends. Future Internet, 10(8).
Mirea, M., Wang, V., & Jung, J. (2019). The not so dark side of the darknet: A qualitative study. Security Journal, 32(2), 102–118.
Mir-Llinares, F., & Moneva, A. (2019). What about cyberspace (and cybercrime alongside it)? A reply to Farrell and Birks “Did cybercrime cause the crime drop?”. Crime Science, 8, 12. https://doi.org/10.1186/s40163-019-0107-y
Mitchell, K.J., Finkelhor, D.J, Jones, L.M., & Wolak, J. (2010). Use of Social Networking Sites in Online Sex Crimes Against Minors: An Examination of National Incidence and Means of Utilization. Journal of Adolescent Health, 47(2), 183–190.
Moreno, M.A., D’Angelo, J. (2019). Social media intervention design: applying an affordances framework. Journal of Medical Internet Research 21(3), e11014. https://doi.org/10.2196/11014
National Crime Agency. (2016). National strategic assessment of serious and organised crime 2016 Available at: http://www.nationalcrimeagency.gov.uk/publications/731-national-strategic-assessment-of-serious-and-organised-crime-2016/file. Accessed 23 Nov 2017
Newman, E., Efthymiadou, E., Stelzmann, D., Quayle, E., Squire, T., Beier, K., … Wortley, R. (2019). Campaigns to deter viewing of child sexual abuse images online: Results of two campaign cases in Europe. London, UK: NSPCC.
Norman, D. A. (1988). The psychology of everyday things. New York, NY: Basic Books.
Quayle, E. (2016). Researching online child sexual exploitation and abuse: Are there links between online and offline vulnerabilities? London, UK: Global Kids Online. Available from: www.globalkidsonline.net/sexual-exploitation
Quayle, E., Allegro, S., Hutton, L., Sheath, M., & Lööf, L. (2014). Rapid skill acquisition and online sexual grooming of children. Computers in Human Behavior, 39, 368–375.
Quayle, E., & Koukopoulos, N. (2019). Deterrence of online child sexual abuse and exploitation. Policing – A Journal Of Policy And Practice, 13(3), 345–362.
Reyns, B., Fisher, W., Bossler, B., Holt, S. (2019). Opportunity and self-control: do they predict multiple forms of online victimization? American Journal of Criminal Justice, 44(1), 63–82
Robey, D., Anderson, C., & Raymond, B. (2013). Information technology, materiality, and organizational change: A professional odyssey. Journal of the Association for Information Systems, 14(7), 386–389.
Sarre, R., Lau, L. Y.-C., & Chang, L. Y. C. (2018). Responding to cybercrime: Current trends. Police Practice and Research, 19(6), 515–518.
Seto, M. C. (2019). The Motivation-Facilitation Model of Sexual Offending. Sexual Abuse, 31(1), 3–24.
Share, M., Williams, C., & Kerrins, L. (2018). Displaying and performing: Polish transnational families in Ireland skyping grandparents in Poland. New Media & Society, 20(8), 3011–3028.
Shields, M., Tonmyr, L., & Hovdestad, W. (2019). The decline of child sexual abuse in Canada: Evidence from the 2014 general social survey. The Canadian Journal of Psychiatry, 64(9), 638–646.
Staksrud, E., Ólafsson, K., & Livingstone, S. (2012). Does the use of social networking sites increase children’s risk of harm? Computers in Human Behavior, 29(1), 40–50.
Steel, C. (2015). Web-based child pornography: The global impact of deterrence efforts and its consumption on mobile platforms. Child Abuse & Neglect, 44, 150–158.
Taylor, M. (2015). Criminogenic qualities of the internet. Dynamics of Asymmetric Conflict, 8(2), 97–106.
Taylor, M., & Quayle, E. (2008). Criminogenic qualities of the internet in the collection and distribution of abuse images of children. The Irish Journal of Psychology, 29, 119–130. In J. McCarthy, E. Quayle, S. Aylwin, & F. Lyddy (Eds.), Applying psychology: A festschrift for Dr Elizabeth A. Dunne.
Taylor, M., & Quayle, E. (2006). The Internet and abuse images of children: Search, precriminal situations and opportunity. In R. Wortley and S. Smallbone (Eds) Situational prevention of child sexual abuse. Crime Prevention Studies, Volume 19, Monsey, N.Y: Criminal Justice Press/Willan Publishing.
UNOCDC. (2019). Cybercrime. Available from https://www.unodc.org/unodc/en/cybercrime/index.html
Vaidhyanathan, S. (2011). The Googlization of everything (and why we should worry). Berkeley, CA: University of California Press.
Wager, N., Armitage, R., Christmann, K., Gallagher, B., Ioannou, M. Parkinson, S., … Synnott, J. (2018). Rapid evidence assessment: Quantifying the extent of online-facilitated child sexual abuse: Report for the independent inquiry into child sexual abuse. http://cdn.basw.co.uk/upload/basw_103534-9.pdf. Accessed 19 Feb 2018.
Wall, D. S. (2017). Crime, security and information communication technologies: The changing cybersecurity threat landscape and implications for regulation and policing. In R. Brownsword, E. Scotford, & K. Yeung (Eds.), The Oxford handbook on the law and regulation of technology. Oxford, UK: Oxford University Press.
Walsh, W., Wolak, J., & Finkelhor, D. (2013). Prosecution dilemmas and challenges for child pornography crimes: The Third National Juvenile Online Victimization Study (NJOV- 3). Durham, NH: Crimes against Children Research Center.
Wellman, B., Quan-Haase, A., Boase, J., Chen, W., Hampton, K., Ila de Diaz, I., & Miyata, K. (2003). The social affordances of the Internet for networked individualism. Journal of Computer Mediated Communication, 8(3), 1–43.
Wolak, J., Finkelhor, D., & Mitchell, K. (2012). Trends in arrests for child pornography possession: The third National Juvenile Online Victimization Study (NJOV-3). Durham, NH: Crimes against Children Research Center.
Wortley, R. (2012). Exploring the person-situation interaction in situational crime prevention. In N. Tilley & G. Farrell (Eds.), The reasoning criminologist: Essays in Honour of Ronald V. Clarke (pp. 184–193). London, UK: Routledge.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Quayle, E. (2021). Affordances, Social Media and the Criminogenic Nature of the Internet: Technology-Mediated Child Sexual Abuse. In: Caffo, E. (eds) Online Child Sexual Exploitation. Springer, Cham. https://doi.org/10.1007/978-3-030-66654-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-66654-5_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-66653-8
Online ISBN: 978-3-030-66654-5
eBook Packages: Behavioral Science and PsychologyBehavioral Science and Psychology (R0)