What Practices Can Protect School-Aged Minors from Online Sexual Predators in the United States?



Similar documents
Internet Safety Fact Sheet Facts about Social Networking:

Counselors Guidelines for the Healthy Development of Youth in the Digital Age

ONLINE PREDATORS & PREDATORS

Who's chatting to your kids?

The purpose of this policy is to support a comprehensive and collaborative approach to responding to child abuse and neglect by:

Digital Citizenship Lesson Plan

Adolescent Sexual Offenders

Empowering young people to be safe on the Internet. Information for parents, teachers and community members

Current Internet Facts

School Bullying and the Law in the Republic of Ireland David Quirke BA, LLM

9. Children, Technology and Gambling

June Canadian Teachers Federation Fédération canadienne des enseignantes et des enseignants

MEA-MFT Teachers Conference

Education Committee inquiry into PSHE and SRE in schools. Written evidence submitted by Childnet International

How To Protect Children From Abuse

Affirmative Action Presentation

Domestic Violence Law Reform The Victim s Voice Survey: Victim s Experience of Domestic Violence and the Criminal Justice System

i-safe America Internet Safety Tips for Parents

Clustering of Internet Risk Behaviors in a Middle School Student Population

Inquiry into the harm being done to Australian children through access to pornography on the internet, with particular reference to:

2014 Teen Internet Safety Survey. Conducted by The Futures Company

E-Safety Issues and Online Safety

Online Safety How to Protect Yourself and Your Family

Online grooming: What changes with the new legislation?

Are Social Networking Sites a Source of Online Harassment for Teens? Evidence from Survey Data

WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY

Social Media Guidelines Resource

Networking and Social Media Policy

TEEN ONLINE EXPOSURE: A SNAPSHOT OF DATA

E-Safety Issues and Online Safety. Parents Evening

E-Safety Policy (Parent/Pupil) March 2013

Briefing for House of Lords debate, November 2012

Education Department Policy

TOWARD A SAFER INTERNET ENVIRONMENT FOR CHILDREN

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2

Facts for Teens: Youth Violence

E-Safety Issues and Online Safety

A Guide for Childhood Sexual Abuse Survivors

Inspecting e-safety in schools

Cyber safety Parent Easy Guide 63

The research was divided into two key phases:

Today s teens use technology more than ever. Most have

Online Predators & Strangers

Scottish Parliament Health and Sport Committee s Inquiry into Teenage Pregnancy in Scotland Evidence from CHILDREN 1 ST

King David Primary School Staff Social Networking Policy

Youth Online Behavior

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

BOR 6432 Cybersecurity and the Constitution. Course Bibliography and Required Readings:

Book Review of Sexual Predators: How to Recognize Them on the Internet and on the Street - How to Keep Your Kids Away

Techno-Panic & 21st Century Education:

DARKNESS to LIGHT S 5 STEPS TO PROTECTING OUR CHILDREN. A guide for responsible adults

The European Online Grooming Project_

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents

Julia Davidson, PhD Professor of Criminology, Kingston University Safer Internet. Pl Keeping Children & Young People Safe Online, 3 rd International

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito

Under the Start Your Search Now box, you may search by author, title and key words.

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

SUMMARY VIOLENCE AGAINST WOMEN STATISTICS:

EARLY INTERVENTION AND PREVENTION PROGRAMME: WITH CHILDREN WHO DISPLAY CONCERNING SEXUALISED BEHAVIOUR. Report for the Ministry of Justice

Online Harassment and Victimization of College Students

Duty to report. However, duty-to-report is not well understood in terms of student safety in digital contexts.

Journeys through the Criminal Justice System for Suspects, Accused and Offenders with Learning Disabilities. A Graphic Representation

Guideline on Windows 7 Parental Controls

Protecting Children. Information for families and carers involved in the child protection process

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve

Cyberbullying, Sexting & Predators Oh My!

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

Online Safety for Middle and High School

Glossary: Cybersafety and Technology

Child Abuse & Neglect

National Cybersecurity Awareness Campaign. Kids Presentation

Lessons for Teens: Risky Internet and Social Networking

Online Reputation. Luke 29/09/2015. Never give out your personal information.

A U.S. Postal Inspector s Guide to Internet Safety for Children

2011 Parent-Teen Internet Safety Report

United Nations Study on Violence against Children. Response to the questionnaire received from the Government of the Republic of GUYANA

Internet Safety Guide for Parents

RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois

Administrator Suggestions Regarding the Recruitment of Male Elementary Teachers. Julia Wilkins, Ph.D. Robert J. Gamble, Ph.D.

Female Perpetrators and Male Victims of Sexual Abuse: Facts and Resources

Parenting & Technology: The Internet, Texting & Social Networks

Staying Safe Online. A Practical Guide for Parents and Children.

Juvenile Sexual Offenders: An. Analytical View of Effective. Programming

Results. Contact sexual crimes based on PSI and self-report after SOTP participation

Undercover Online: An Extension of Traditional Policing in the United States

Sociology- Is it just Common Sense? True or False?

Social Networking Policy

a resource guide for parents and guardians INTERNET SAFETY North Carolina Department of Justice

National Cybersecurity Awareness Campaign Families Presentation

E-Safety and Acceptable Use Policy

Sexual Assault of People in Aged Care Settings: Towards a Better Understanding and Response

SAFEGUARDING CHILDREN AND CHILD PROTECTION POLICY

Digital Detecting: New Resources for Determining Internet Authorship

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Lethal Violence in Schools A National Study Final Report

How to Protect Students from Sexual Harassment: A Primer for Schools

Legislating for Violence against Children. With a focus on the juvenile justice system

A guide to cyberbullying GET WITH IT! understanding and identifying cyberbullying to help protect your children. A joint initiative by:

Transcription:

Southern Adventist Univeristy KnowledgeExchange@Southern Undergraduate Research Projects Social Work and Family Studies 12-10-2015 What Practices Can Protect School-Aged Minors from Online Sexual Predators in the United States? Elizabeth Helton besshelton@southern.edu, besshelton@southern.edu Follow this and additional works at: http://knowledge.e.southern.edu/undergrad_socwork Recommended Citation Helton, Elizabeth, "What Practices Can Protect School-Aged Minors from Online Sexual Predators in the United States?" (2015). Undergraduate Research Projects. Paper 2. http://knowledge.e.southern.edu/undergrad_socwork/2 This Article is brought to you for free and open access by the Social Work and Family Studies at KnowledgeExchange@Southern. It has been accepted for inclusion in Undergraduate Research Projects by an authorized administrator of KnowledgeExchange@Southern. For more information, please contact dbravo@southern.edu.

Running head: WHAT PRATICES CAN PROTECT SCHOOL-AGED MINORS 1 What Practices Can Protect School-Aged Minors from Online Sexual Predators in the United States? Bess Helton Southern Adventist University HBSE I December 10, 2015

WHAT PRATICES CAN PROTECT SCHOOL-AGED MINORS 2 Statement of the Problem With the rapid rise in technology, children encounter sexual predators during everyday life, especially in the online world. Understanding the criminal psychology is important, researchers must detail what practices can protect school-aged minors from online sexual predators, especially those living within the United States. While researchers have often questioned specific strategies for dealing with online predators, educational solutions are often overlooked. Fleming, Greentree, Cocotti-Muller, Elias, and Morrison in the article Safety in Cyberspace, Adolescents Safety and Exposure online, states that as of 2005, approximately twenty-one million minors in the United States, between the ages of 12 and 17, used the Internet (2006). According to research conducted by May-Chahal et al. (2014) in the article Safeguarding Cyborg Childhoods: Incorporating the On/Offline Behavior of Children into Everyday Social Work Practices, of those using the Internet, 99 percent of victims of Internetinitiated sex crimes were thirteen to seventeen years old. Dowell, Burgess, and Cavanaugh conducted a study of 1,501 minors between the ages of ten and seventeen in their article, Clustering of Internet Risk Behaviors in a Middle School Student Population. The researchers found that one in five minors received unwanted sexual solicitation online and that one in thirty-three minors received aggressive sexual solicitation while online (2006). Research further concluded that 31.1 percent of boys, and 27 percent of girls reported posting personal information on the Internet (Dowell, Burgess, & Cavanaugh, 2009). Furthermore, 20.3 percent of students posted their email addresses online and 7.7 percent stated that they had posted the name of their school (Dowell et al., 2009).

WHAT PRATICES CAN PROTECT SCHOOL-AGED MINORS 3 While the behavior of the child is important, research on the perpetrators is also relevant and often explored by many authors. Malesky Jr., (2007), interviewed 31 men who had perpetrated or had attempted to perpetrate a crime via online communication in his article Predatory Online Behavior: Modus Operandi of Convicted Sex Offenders in Identifying Potential Victims and Contacting Minors Over the Internet. Malesky found that 80 percent of participants used chat rooms geared towards minors, and that over half of the participants viewed the child s profile in order to choose their potential victim (2007). These chat rooms could be hosted on a variety of platforms, including those tied to Internet based games and social media sites. Marcum (2007) in the article Interpreting the Intentions of Internet Predators: An Examination of Online Predatory Behavior studied predators by examining transcripts from online chat rooms in order to gain a better understanding of how perpetrators seek out their victims. This study found that perpetrators participated in grooming activities (Marcum, 2007). A grooming activity slowly introduces a child to explicit material or topics; often times the perpetrator would gain the child s trust so that when they initiated contact the child was not concerned by the inappropriate behavior (Marcum, 2007). Keeping children safe in an online environment goes well beyond someone s personal beliefs. As professionals, all people must work towards a safer online environment. Even if one does not have children in his or her life personally, this topic will most likely be something that one will deal with as a social worker. Wells (2006) conducted a study on 264 school social workers in her article Internet-Related Problems Coming to the Attention of School Social Workers. The social workers were sent questionnaires about the work that they had done in regards to Internet-related problems amongst minors (Wells, 2006). This study found that 46

WHAT PRATICES CAN PROTECT SCHOOL-AGED MINORS 4 percent of the social workers had worked with a student that had been sexually exploited or approached while online (Wells, 2006). This study also found that adults would sexually approach children in online chat rooms while pretending to be a similar age (Wells, 2006). The social workers also reported seven incidences in which children responded to the sexual solicitation and met an adult in person (Wells, 2006). This topic is relevant to me because I have a nephew and a niece that are beginning to use the Internet on a daily basis. I worry constantly about what they are exposed to when they are simply looking up videos. With so many children being affected because they do not take the necessary precautions, I believe the world needs to be better educated in order to keep every child out of the clutches of sexual predators. Problem Exploration Within the research, multiple interventions that have attempted to fix this horrible epidemic. With such a sweeping issue, there are many different viewpoints represented within each article. This literature review will highlight three practices; Internet service provider blocks, parental control, and educational programs. The first safety practice that literature states has been used to protect children from online sexual predators is Internet Service Providers (ISP) filtering. In the article, Internet Service Provider (ISP) Filtering of Child-Abusive Material: A Critical Reflection of its Effectiveness, Enemen defined an ISP as the organizational use of Internet filtering of harmful and illegal material (2010). While in theory ISP filtering sounds like the ideal solution, researchers have found that its use is severely flawed. There are three different types of ISP filtering. The first type is inclusion filtering, which is having a list of pre-approved websites that one can visit while online (Eneman, 2010). The

WHAT PRATICES CAN PROTECT SCHOOL-AGED MINORS 5 next type of filtering is exclusion, this is having list of websites that one is not allowed to access at all; this can also be called blacklisting (Eneman, 2010). The last type of filtering is content analysis, which is when there are no lists but when a website is requested the content is scanned for inappropriate topics so that one does not have to block an entire website (Eneman, 2010). Dowell et al., (2009), questioned 1,501 minors between the ages of ten and fifteen on their online behaviors. This study found that 60.2 percent of girls and 49.2 percent of boys reported having a block on their computer (Dowell et al., 2009). What was more troubling is that 32.6 percent of boys and 15.7 percent of girls stated that they knew how to manipulate the blocks (Dowell et al., 2009). Eneman (2010) conducted a survey of fifteen male offenders between the ages of nineteen and fifty-five regarding ISP effectiveness, and had some interesting results (Eneman, 2010). One participant in the study stated, this type of filtering is completely pointless (Eneman, 2010). This study also quotes someone as saying that it is very easy to bypass and many participants believed that the filtering was nothing more than a simple annoyance (Eneman, 2010). With the data demonstrating the failures of Internet filtering, other safety protocols need to be investigated and utilized for child safety. The next practice that has been used to protect children in an online environment is parental controls. Cohen-Almagor (2013) states in the article Online child Sex Offenders: Challenges and Counter-Measures, that often times, children who are victims of child predation are less receptive to the advice of their parents. This article goes on to say that may victims have been estranged from their families or have experienced familial abuse (Cohen-Almagor, 2013). It was also found that predators were likely to use information gathered from simple

WHAT PRATICES CAN PROTECT SCHOOL-AGED MINORS 6 conversations within a chat room to determine the level of parental involvement in a child s home (Malesky, 2007). Hopper-Losenicky assesses the relationships between mothers and their children in relation to Internet usage in her article Risk Communication in the Internet Age: Parental Challenges in Monitoring the Internet use of Adolescents (2010). The study that Hopper- Losenicky conducted consisted of ten parent-child pairs, specifically chosen based on the mothers likelihood to monitor the child s media use (2010). It was concluded that if children who are more involved in activities outside of school tend to spend less time online, therefore making them less likely to become victims of child predation (Hopper-Losenicky, 2010). Hopper-Losenicky s study also found that many children did not know if their parents had safety settings on their computers (2010). Along with this, they found that many parents over trusted blocking software and safety settings (Hopper-Losenicky, 2010). One example of this is that parents set up their child's Facebook account with the maximum safety settings, but the child changes it later without the parent s consent or knowledge (Hopper-Losenicky, 2010). Hopper- Losenicky also found that four out of five parents underestimated the time that their children actually spent on the Internet (2010). The last method for maintaining a safe online environment for children is education. While children have a healthy curiosity about sex, adults need to be candid in their conversations (Cohen-Almagor, 2013). The article Assessing Middle School Students Knowledge of Conduct and Consequences and Their Behaviors Regarding the Use of Social Networking Sites, written by Kite, Gable, and Filippelli (2010), conducted a study on 558 students in seventh and eight grade. Their study found that educating students on the risk associated with social media is of key importance (Kite, Gable, & Filippelli, 2010).

WHAT PRATICES CAN PROTECT SCHOOL-AGED MINORS 7 The researchers go on to state that 71 percent of students did not believe that a predator would contact them simply because of their online posts, and only 40 percent of the student participants indicated that they would inform an adult if they were contacted by a stranger online (Kite et al., 2010). Parents should instruct their children not to use chat rooms, as predators use these to contact children (Marcum, 2007). Cohen-Almagor informs his readers of an educational program in the United Kingdom that educates not only children but also parents and professionals in the area about the dangers of online activity (2013). Theoretical Perspective One theoretical perspective in which to view the practices of preventing predation of children is the ecological perspective. Zastrow and Kirst-Ashman analyze the ecological perspective stating that it provides a specific vantage point through which the social worker can view the world (2015). The emphasis is placed on the individual and their family within their environment (Zastrow, C., & Kirst-Ashman, K.K., 2015). This is applicable to the literature stated above because it focuses on the individual. The articles involved in this literature review focus on how an individual s relationship with their school environment as well as their parents can keep them safe when they are online. One term associated with this theory is social environment (Zastrow, C., & Kirst-Ashman, K.K., 2015). A social environment is defined as the actual physical setting that the society or culture provides (Zastrow, C., & Kirst-Ashman, K.K., 2015). Another term that is used in this perspective is transactions (Zastrow, C., & Kirst- Ashman, K.K., 2015). This refers to how a person interacts with other people (Zastrow, C., & Kirst-Ashman, K.K., 2015). The text states that these interactions can be either positive or negative (Zastrow, C., & Kirst-Ashman, K.K., 2015). If social workers and other professionals

WHAT PRATICES CAN PROTECT SCHOOL-AGED MINORS 8 could understand and use positive online interaction or transactions, the outcomes of child involvement online could be improved. This theory allows one to view the child within their different environments, such as their school, home, or online lives in order to understand their safety. Gaps in the Literature While the research on education is important, it is one that is rarely discussed in the literature. Many of the articles found in relation to this topic were regarding perpetrator behavior. One example of this would be the articles written by Marcum, in which the research examined how perpetrators chose their victims (2007). Rather than focusing on criminal behavior and blocking systems placed by parents, the social communities surrounding the child should work cohesively to educate and prepare the individual for online activity. Education is a huge part of the lives of minors, and if they have access to any chat rooms or social media sites, they must first be educated on how to properly behave in their online environment. Children need to learn to inform parents when they feel they have been solicited in any way while online (Malesky, 2007). If a child is educated on proper online decorum, and have a good relationship with any educator or guardian, then they will be better prepared for their own safety in today s online society. Another area of research that should be explored is parental education. Fleming et al., found that many parents are not well equipped enough to prepare their children for online safety (2006). Children experience education not only at school but at home with their parents, and with a lack of education of online safety, comes greater danger when the child uses the Internet. Conclusion

WHAT PRATICES CAN PROTECT SCHOOL-AGED MINORS 9 Our digital age has progressed at an alarming rate. There have been many attempts at preventing child predation. Internet service provider blocks have proven to be easy to break by not only criminals (Eneman, 2010), but also children (Dowell et al., 2009). In regards to how parental controls have been helpful when protecting children, it has been found that many parents do not have enough knowledge to fully protect their children (Fleming et al., 2006). There has been very little done when it comes to educating children on safe online habits. Children have stated that they post personal information on their social media (Dowell et al., 2009); it has also been found that the chat rooms that are geared towards minors have also attracted the attention of predators (Malesky Jr., 2007). There is an educational program in the UK that educates not only the children but also professional in the area (Cohen-Almagor, 2013). There is no tension between my personal believes and what the literature has found. I believe that it is important for children to be educated, have good relationships with their parents, and have appropriate ISP filtering, if necessary. Based on this evidence, I believe that it is imperative that adults be candid with children about the topic of sex. In my experience, the only time many students discuss sex with an adult, is the single conversation that takes place at school, or possibly with a parent. I knew many people who had questions about sex, yet were afraid to ask an adult for fear they would get in trouble. Instead, they chose look up the topic online. These seemingly casual Internet searches can lead to dangerous conversations with potential predators. This type of unhealthy exploration has led to children becoming victims of crimes. The technology itself cannot be blamed for putting children at risk; rather it is the behavior of the child (Hopper-Losenicky, 2010). I believe that the responsibility to educate minors should be placed not only on social workers, but also on educators and parents. When educators work with

WHAT PRATICES CAN PROTECT SCHOOL-AGED MINORS 10 the parents, children are further protected from sexual predators, inappropriate chat room activities, and cyber bullying (Kite et al., 2010). I say this because if a child has adults in their life that are willing to be completely honest and open with them and answer all of their questions, then they are less likely to go searching for answers in dangerous places. Social workers are in the helping profession. I believe that in order to keep children safe, we must partner with our communities and teach local professionals about how to keep these children safe. The literature stated that children participated in risky online behavior such as posting their email and the name of their school (Dowell et al., 2009). Many of these students did not believe that a predator would view their social media profiles (Kite et al., 2010). It was also found that many social workers have to work with children who have experienced sexual solicitation through the Internet (Wells, 2006). Because of these facts, I believe that social workers must be educators for families, educators, and local professionals. In accordance with the micro level of social work, an effective prevention would be for social workers to counsel parents and their children in order to help foster healthy and trusting relationships. It was found that if parents set out clear rules and follow through with punishments there was a lack of resistance among minors (Hopper-Losenicky, 2010). The research goes on to suggest that by having parents set their standards, children are likely to be more honest and practice safely while online (Hopper-Losenicky, 2010). In the meso approach, social works can promote educational programs within schools and communities in order to foster a safe online environment for minors. Literature found that children have a healthy curiosity when it comes to sex, and with curiosity comes a need to for adults to be upright and honest (Cohen-Almagor, 2013). Educational programs have been the least researched among the articles reviewed, but it has been stated that with the vast

WHAT PRATICES CAN PROTECT SCHOOL-AGED MINORS 11 technological age, there is a need to educate children on safety practices while online (Kite et al., 2010). In application with macro social work, it is imperative that social workers know and understand any legislation regarding online practices. Social workers must advocate for the protection of children within their online environments. If a social worker knows and understands government legislation, he or she will be better prepared to ensure the safety of minors within the United States. Furthermore, the technological advances of this day and age have provided children with the opportunity to learn more than ever before. This age of progression has also brought along new threats. Keeping minors safe should be of utmost importance to not only parents, but also professionals. Social workers must be willing to counsel students and their families, promote and enhance educational programs, and be aware of legislation in place so that they can better the lives of those around them.

WHAT PRATICES CAN PROTECT SCHOOL-AGED MINORS 12 References Cohen-Almagor, R. (2013). Online child sex offenders: Challenges and counter-measures. Howard Journal of Criminal Justice, 52(2), 190-215. doi:10.1111/hojo.12006 Dowell, E. B., Burgess, A. W., & Cavanaugh, D. J. (2009). Clustering of internet risk behaviors in a middle school student population. Journal of School Health, 79(11), 547-553. doi:10.1111/j.1746-1561.2009.00447.x Eneman, M. (2010). Internet service provider (ISP) filtering of child-abusive material: A critical reflection of its effectiveness. Journal of Sexual Aggression, 16(2), 223-235. doi:10.1080/13552601003760014 Fleming, M. J., Greentree, S., Cocotti-Muller, D., Elias, K. A., & Morrison, S. (2006). Safety in cyberspace: Adolescents' safety and exposure online. Youth & Society, 38(2), 135-154. Retrieved from http://yas.sagepub.com/ Hopper-Losenicky, K. (2010). Risk communication in the internet age: Parental challenges in monitoring the internet use of adolescents (M.S.). Available from ProQuest Dissertations & Theses Global. (848497217). Kite, S. L., Gable, R., & Filippelli, L. (2010). Assessing middle school students knowledge of conduct and consequences and their behaviors regarding the use of social networking sites. Clearing House, 83(5), 158-163. doi:10.1080/00098650903505365 Malesky Jr., L. A. (2007). Predatory online behavior: Modus operandi of convicted sex offenders in identifying potential victims and contacting minors over the internet. Journal of Child

WHAT PRATICES CAN PROTECT SCHOOL-AGED MINORS 13 Sexual Abuse, 16(2), 23-32. Retrieved from http://www.tandfonline.com/loi/wcsa20#.vggq9j1viko Marcum, C. D. (2007). Interpreting the intentions of internet predators: An examination of online predatory behavior. Journal of Child Sexual Abuse, 16(4), 99-114. Retrieved from http://www.tandfonline.com/toc/wcsa20/current May-Chahal, C., Mason, C., Rashid, A., Walkerdine, J., Rayson, P., & Greenwood, P. (2014). Safeguarding cyborg childhoods: Incorporating the on/offline behaviour of children into everyday social work practices. British Journal of Social Work, 44(3), 596-614. Retrieved from http://bjsw.oxfordjournals.org/ Wells, M. (2006). Internet-related problems coming to the attention of school social workers. Children & Schools, 28(4), 237-242. Retrieved from http://cs.oxfordjournals.org/ Zastrow, C., & Kirst-Ashman, K.K. (2015). Understanding key concepts in the ecological perspective. Understanding human behavior and the social environment (10th ed., pp. 33). Boston: Cengage Learning.