Skip to main content

Affordances, Social Media and the Criminogenic Nature of the Internet: Technology-Mediated Child Sexual Abuse

  • Chapter
  • First Online:
Online Child Sexual Exploitation

Abstract

In September 2019, The New York Times reported that in the previous year, technology companies reported to the US National Center for Missing & Exploited Children (NCMEC) over 45 million photographs and videos of children being sexually abused, which was more than double what had been reported in the previous year (Keller & Dance, 2019). This hard-hitting article made reference to a paper completed in collaboration with NCMEC which stated that ‘… online sharing platforms have accelerated the pace of CSAI [child sexual abuse image] content creation and distribution to a breaking point where NCMEC’s manual review capabilities and law enforcement investigations no longer scale’ (Bursztein et al., 2019 p. 1). While meaningful estimates of these crimes are highly problematic, Wager et al. (2018) have argued that there are essentially four ways in which online-facilitated child sexual abuse (OCSA) can be measured: by counting the number of offences committed, the number of perpetrators, the number of victims and the number of images that have been viewed, downloaded and exchanged. However, they note that quantification based on each of these four measures inevitably produces very different figures, partly because they are attempting to count different aspects of OCSA. For example, disaggregated police data in Scotland would indicate that the number and proportion of police-recorded ‘other sexual crimes’ in Scotland which were cyber-enabled (the internet used as a means to commit the crime) had increased significantly over 2 years. In 2016/2017, 51% of ‘other sexual crimes’ were cyber-enabled, up from 38% in 2013/2014. However, a meta-analysis of the prevalence of online solicitation amongst youth (one specific form of OCSA) would indicate that one in nine young people experiences online solicitation but that moderator analyses indicated that prevalence rates had decreased over time (Madigan et al., 2018).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • boyd, D. (2008). Taken out of context: American teen sociality in networked publics, ProQuest Dissertations and Theses.

    Google Scholar 

  • Babchishin, K. M., Hanson, R. K., & VanZuylen, H. (2015). Online child pornography offenders are different: A meta-analysis of the characteristics of online and offline sex offenders against children. Archives of Sexual Behavior, 44, 45–66. https://doi.org/10.1007/s10508-014-0270-x

    Article  PubMed  Google Scholar 

  • Balfe, M., Gallagher, B., Masson, H., Balfe, S., Brugha, R., & Hackett, S. (2015). Internet child sex offenders’ concerns about online security and their use of identity protection technologies: A review. Child Abuse Review, 24(6), 427–439.

    Article  Google Scholar 

  • BBC News. (2019). Facebook removes 11.6 million child abuse posts. Available from https://www.bbc.co.uk/news/technology-50404812

  • Brantingham, P., & Faust, F. (1976). A conceptual model of crime prevention. Crime & Delinquency, 22(3), 284–296.

    Article  Google Scholar 

  • Brewer, R., Cale, j., Goldsmith, A., Holt, T. (2018). Young people, the Internet, and emerging pathways into criminality: a study of Australian adolescents. International Journal of Cyber Criminology. 12(1), 115–132

    Google Scholar 

  • Bursztein, E., Bright, T., DeLaune, M., Elifff, D. M., Hsu, N., Olson, L., … Thomas, K. (2019). Re-thinking the detection of child sexual abuse imagery on the Internet. In Proceedings of the 2019 World Wide Web Conference (WWW’19), May 13–17, 2019, San Francisco, CA, USA.

    Google Scholar 

  • Carr, J. (2019). Let there be light. Desiderata. Available from https://johncarr.blog/2019/11/24/let-there-be-light/

  • Chan, T., Cheung, C., & Wong, R. (2019). Cyberbullying on social networking sites: The crime opportunity and affordance perspectives. Journal of Management Information Systems, 36(2), 574–609.

    Article  Google Scholar 

  • Clarke, R. V., & Cornish, D. B. (1985). Modeling offenders’ decisions: A framework for research and policy. In M. Tonry & N. Morris (Eds.), Crime and justice: A review of research (Vol. 6). Chicago, IL: University of Chicago Press.

    Google Scholar 

  • Cohen, L., E., & Felson, M. (1979). Social change and crime rate trends: a routine activity approach. American Sociological Review. 44(4), 588–608.

    Google Scholar 

  • Cornish, D. B., & Clarke, R. V. (2003). Opportunities, precipitators and criminal dispositions: A reply to Wortley’s critique of situational crime prevention. In M. J. Smith & D. B. Cornish (Eds.), Theory for practice in situational crime prevention (Crime Prevention Studies) (Vol. 16). Monsey, NJ: Criminal Justice Press.

    Google Scholar 

  • Costa, E. (2018). Affordances-in-practice: An ethnographic critique of social media logic and context collapse. New Media & Society, 20(10), 3641–3656.

    Google Scholar 

  • Covington, P., Adams, J. & Sargin, E. (2016). Deep neural networks for YouTube recommendations. In Proceedings of the 10th ACM conference on recommender systems 978-1-4503-4035-9 Boston, MA, USA.

    Google Scholar 

  • Dodge, A. (2019). Nudes are forever: Judicial interpretations of digital technology’s impact on “Revenge Porn”. Canadian Journal of Law and Society, 34(1), 121–143.

    Article  Google Scholar 

  • Dunne, M., Purdie, D., Cook, M., Boyle, F., & Najman, J. (2003). Is child sexual abuse declining? Evidence from a population-based survey of men and women in Australia. Child Abuse & Neglect, 27(2), 141–152.

    Article  Google Scholar 

  • Earl, J., & Kimport, K. (2011). Digitally enabled social change. Cambridge, MA: MIT Press.

    Book  Google Scholar 

  • ECPAT International. (2015). Factsheet on Live Streaming of Online Child Sexual Abuse. http://www.ecpat.org/wp-content/uploads/2016/04/Live-abuse-via-webcam-Factsheet.pdf

  • ECPAT International. (2016). Terminology guidelines for the protection of children from sexual exploitation and sexual abuse. Luxembourg, Europe: ECPAT.

    Google Scholar 

  • EUROPOL. (2017). Police2Peer. https://www.europol.europa.eu/partners-agreements/police2peer

  • EUROPOL. (2018). Internet organised crime threat assessment. Available from https://www.europol.europa.eu/internet-organised-crime-threat-assessment-2018

  • Farrell, G., & Birks, D. (2018). Did cybercrime cause the crime drop? Crime Science, 7(8), 1–4. https://doi.org/10.1186/s40163-018-0082-8

    Article  PubMed  PubMed Central  Google Scholar 

  • Felson, M., & Clarke, R. (1998). Opportunity makes the thief: Practical theory for crime prevention. London, UK: The Policing and Reducing Crime Unit.

    Google Scholar 

  • Finkelhor, D., & Jones, L. (2006). Why have child maltreatment and child victimization declined? Journal of Social Issues, 62(4), 685–716.

    Article  Google Scholar 

  • Fisher, M. & Taub, A. (2019) On YouTube’s digital playground, an open gate for pedophiles. Available from https://www.nytimes.com/2019/06/03/world/americas/youtube-pedophiles.html?module=inline

  • Gibson, J. J. (1979). The ecological approach to perception. London, UK: Houghton Mifflin.

    Google Scholar 

  • Gillespie, S., Dervley, R., & Squire, T. (2015). Internet offenders and “inform plus”: An evaluation of a community based groupwork programme. NOTA News, 75, 19–20.

    Google Scholar 

  • Horsman, G. (2018). A forensic examination of the technical and legal challenges surrounding the investigation of child abuse on live streaming platforms: A case study on Periscope. Journal of Information Security and Applications, 42, 107–117.

    Article  Google Scholar 

  • Jarzabkowski, P., & Kaplan, S. (2015). Strategy tools-in-use: A framework for understanding “technologies of rationality” in practice. Strategic Management Journal, 36(4), 537–558.

    Article  Google Scholar 

  • Jerde, R. (2017). Follow the silk road: How internet affordances influence and transform crime and law enforcement. Master’s Dissertation from the Naval Postgraduate School Monterey, CA.

    Google Scholar 

  • Jones, L. M., Mitchell, K., & Walsh, W. A. (2014b). A content analysis of youth internet safety programs: Are effective prevention strategies being used? Durham, NH: Crimes Against Children Research Center (CCRC), University of New Hampshire.

    Google Scholar 

  • Jones, L. M., Mitchell, K. J., & Walsh, W. A. (2014a). A systematic review of effective youth prevention education: Implications for internet safety education. Durham, NH: Crimes against Children Research Center (CCRC), University of New Hampshire.

    Google Scholar 

  • Kaufmann, L., & Clément, F. (2007). How culture comes to mind: From social affordances to cultural analogies. Intellectica, 46, 1–36.

    Google Scholar 

  • Keller, M. H. & Dance, G. J. X. (2019) The internet is overrun with images of child sexual abuse. What went wrong? https://www.nytimes.com/interactive/2019/09/28/us/child-sex-abuse.html

  • Laaksonen, T., Sariola, H., Johansson, A., Jern, P., Varjonen, M., Von Der Pahlen, B., … Santtila, P. (2011). Changes in the prevalence of child sexual abuse, its risk factors, and their associations as a function of age cohort in a Finnish population sample. Child Abuse & Neglect, 35(7), 480–490.

    Article  Google Scholar 

  • Livingstone, S. (2019). What are the key issues for research and intervention in the field of youth mental health? And how might the digital environment play into this? https://blogs.lse.ac.uk/parenting4digitalfuture/2019/11/06/what-are-the-key-issues-for-research-and-intervention-in-the-field-of-youth-mental-health-and-how- might-the-digital-environment-play-into-this/

  • Loeb, J. (2017). Europol study assesses technology for fighting online child abuse. Engineering Technology, 12(10), 8–8.

    Article  Google Scholar 

  • Madigan, S., Villani, V., Azzopardi, C., Laut, D., Smith, T., Temple, J. R., … Dimitropoulos, G. (2018). The prevalence of unwanted online sexual exposure and solicitation among youth: A meta-analysis. Journal of Adolescent Health, 63(2), 133–141.

    Article  Google Scholar 

  • Majchrzak, A., Faraj, S., Kane, G., & Azad, B. (2013). The contradictory influence of social media affordances on online communal knowledge sharing. Journal of Computer – Mediated Communication, 19(1), 38–55.

    Article  Google Scholar 

  • Matamoros-Fernández, A. & Gray, J. (2019). Understanding the algorithms: YouTube attempts to avoid problematic content. Available from https://www.nzherald.co.nz/business/news/article.cfm?c_id=3&objectid=1228137

  • May-Chahal, C., Mason, C., Rashid, A., Walkerdine, J., Rayson, P., & Greenwood, P. (2014). Safeguarding cyborg childhoods: Incorporating the on/offline behaviour of children into everyday social work practices. British Journal of Social Work, 44(3), 596–614.

    Article  Google Scholar 

  • May-Chahal, C. & Palmer, E. (2018). Rapid Evidence Assessment characteristics and vulnerabilities of victims of online-facilitated child sexual abuse and exploitation. Available from www.iicsa.org.uk

  • McGuire, M., & Dowling, S. (2013). Cybercrime: A review of the evidence. London, UK: Home Office.

    Google Scholar 

  • Meredith, J. (2017). Analysing technological affordances of online interactions using conversation analysis. Journal of Pragmatics, 115, 42–55.

    Article  Google Scholar 

  • Mews, A., Di Bella, L., & Purver, M. (2017). Impact evaluation of the prison-based core sex offender treatment programme. Ministry of Justice. Available from https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/623876/sotp-report-web-pdf

  • Microsoft. (2019). PhotoDNA. Available from https://www.microsoft.com/en-us/PhotoDNA

  • Middleton, D., Mandeville-Norden, R., & Hayes, E. (2009). Does treatment work with internet sex offenders? Emerging findings from the Internet Sex Offender Treatment Programme (i-SOTP). Journal of Sexual Aggression, 15(1), 5–19.

    Article  Google Scholar 

  • Miraz, M., Ali, M., Excell, P., & Picking, R. (2018). Internet of nano-things, things and everything: Future growth trends. Future Internet, 10(8).

    Google Scholar 

  • Mirea, M., Wang, V., & Jung, J. (2019). The not so dark side of the darknet: A qualitative study. Security Journal, 32(2), 102–118.

    Article  Google Scholar 

  • Mir-Llinares, F., & Moneva, A. (2019). What about cyberspace (and cybercrime alongside it)? A reply to Farrell and Birks “Did cybercrime cause the crime drop?”. Crime Science, 8, 12. https://doi.org/10.1186/s40163-019-0107-y

    Article  Google Scholar 

  • Mitchell, K.J., Finkelhor, D.J, Jones, L.M., & Wolak, J. (2010). Use of Social Networking Sites in Online Sex Crimes Against Minors: An Examination of National Incidence and Means of Utilization. Journal of Adolescent Health, 47(2), 183–190.

    Google Scholar 

  • Moreno, M.A., D’Angelo, J. (2019). Social media intervention design: applying an affordances framework. Journal of Medical Internet Research 21(3), e11014. https://doi.org/10.2196/11014

  • National Crime Agency. (2016). National strategic assessment of serious and organised crime 2016 Available at: http://www.nationalcrimeagency.gov.uk/publications/731-national-strategic-assessment-of-serious-and-organised-crime-2016/file. Accessed 23 Nov 2017

  • Newman, E., Efthymiadou, E., Stelzmann, D., Quayle, E., Squire, T., Beier, K., … Wortley, R. (2019). Campaigns to deter viewing of child sexual abuse images online: Results of two campaign cases in Europe. London, UK: NSPCC.

    Google Scholar 

  • Norman, D. A. (1988). The psychology of everyday things. New York, NY: Basic Books.

    Google Scholar 

  • Quayle, E. (2016). Researching online child sexual exploitation and abuse: Are there links between online and offline vulnerabilities? London, UK: Global Kids Online. Available from: www.globalkidsonline.net/sexual-exploitation

    Google Scholar 

  • Quayle, E., Allegro, S., Hutton, L., Sheath, M., & Lööf, L. (2014). Rapid skill acquisition and online sexual grooming of children. Computers in Human Behavior, 39, 368–375.

    Article  Google Scholar 

  • Quayle, E., & Koukopoulos, N. (2019). Deterrence of online child sexual abuse and exploitation. Policing – A Journal Of Policy And Practice, 13(3), 345–362.

    Article  Google Scholar 

  • Reyns, B., Fisher, W., Bossler, B., Holt, S. (2019). Opportunity and self-control: do they predict multiple forms of online victimization? American Journal of Criminal Justice, 44(1), 63–82

    Google Scholar 

  • Robey, D., Anderson, C., & Raymond, B. (2013). Information technology, materiality, and organizational change: A professional odyssey. Journal of the Association for Information Systems, 14(7), 386–389.

    Article  Google Scholar 

  • Sarre, R., Lau, L. Y.-C., & Chang, L. Y. C. (2018). Responding to cybercrime: Current trends. Police Practice and Research, 19(6), 515–518.

    Article  Google Scholar 

  • Seto, M. C. (2019). The Motivation-Facilitation Model of Sexual Offending. Sexual Abuse, 31(1), 3–24.

    Google Scholar 

  • Share, M., Williams, C., & Kerrins, L. (2018). Displaying and performing: Polish transnational families in Ireland skyping grandparents in Poland. New Media & Society, 20(8), 3011–3028.

    Article  Google Scholar 

  • Shields, M., Tonmyr, L., & Hovdestad, W. (2019). The decline of child sexual abuse in Canada: Evidence from the 2014 general social survey. The Canadian Journal of Psychiatry, 64(9), 638–646.

    Article  PubMed  Google Scholar 

  • Staksrud, E., Ólafsson, K., & Livingstone, S. (2012). Does the use of social networking sites increase children’s risk of harm? Computers in Human Behavior, 29(1), 40–50.

    Article  Google Scholar 

  • Steel, C. (2015). Web-based child pornography: The global impact of deterrence efforts and its consumption on mobile platforms. Child Abuse & Neglect, 44, 150–158.

    Article  Google Scholar 

  • Taylor, M. (2015). Criminogenic qualities of the internet. Dynamics of Asymmetric Conflict, 8(2), 97–106.

    Article  Google Scholar 

  • Taylor, M., & Quayle, E. (2008). Criminogenic qualities of the internet in the collection and distribution of abuse images of children. The Irish Journal of Psychology, 29, 119–130. In J. McCarthy, E. Quayle, S. Aylwin, & F. Lyddy (Eds.), Applying psychology: A festschrift for Dr Elizabeth A. Dunne.

    Article  Google Scholar 

  • Taylor, M., & Quayle, E. (2006). The Internet and abuse images of children: Search, precriminal situations and opportunity. In R. Wortley and S. Smallbone (Eds) Situational prevention of child sexual abuse. Crime Prevention Studies, Volume 19, Monsey, N.Y: Criminal Justice Press/Willan Publishing.

    Google Scholar 

  • UNOCDC. (2019). Cybercrime. Available from https://www.unodc.org/unodc/en/cybercrime/index.html

  • Vaidhyanathan, S. (2011). The Googlization of everything (and why we should worry). Berkeley, CA: University of California Press.

    Book  Google Scholar 

  • Wager, N., Armitage, R., Christmann, K., Gallagher, B., Ioannou, M. Parkinson, S., … Synnott, J. (2018). Rapid evidence assessment: Quantifying the extent of online-facilitated child sexual abuse: Report for the independent inquiry into child sexual abuse. http://cdn.basw.co.uk/upload/basw_103534-9.pdf. Accessed 19 Feb 2018.

  • Wall, D. S. (2017). Crime, security and information communication technologies: The changing cybersecurity threat landscape and implications for regulation and policing. In R. Brownsword, E. Scotford, & K. Yeung (Eds.), The Oxford handbook on the law and regulation of technology. Oxford, UK: Oxford University Press.

    Google Scholar 

  • Walsh, W., Wolak, J., & Finkelhor, D. (2013). Prosecution dilemmas and challenges for child pornography crimes: The Third National Juvenile Online Victimization Study (NJOV- 3). Durham, NH: Crimes against Children Research Center.

    Google Scholar 

  • Wellman, B., Quan-Haase, A., Boase, J., Chen, W., Hampton, K., Ila de Diaz, I., & Miyata, K. (2003). The social affordances of the Internet for networked individualism. Journal of Computer Mediated Communication, 8(3), 1–43.

    Google Scholar 

  • Wolak, J., Finkelhor, D., & Mitchell, K. (2012). Trends in arrests for child pornography possession: The third National Juvenile Online Victimization Study (NJOV-3). Durham, NH: Crimes against Children Research Center.

    Google Scholar 

  • Wortley, R. (2012). Exploring the person-situation interaction in situational crime prevention. In N. Tilley & G. Farrell (Eds.), The reasoning criminologist: Essays in Honour of Ronald V. Clarke (pp. 184–193). London, UK: Routledge.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ethel Quayle .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Quayle, E. (2021). Affordances, Social Media and the Criminogenic Nature of the Internet: Technology-Mediated Child Sexual Abuse. In: Caffo, E. (eds) Online Child Sexual Exploitation. Springer, Cham. https://doi.org/10.1007/978-3-030-66654-5_4

Download citation

Publish with us

Policies and ethics