New User Special Price Expires in

Let's log you in.

Sign in with Facebook


Don't have a StudySoup account? Create one here!


Create a StudySoup account

Be part of our community, it's free to join!

Sign up with Facebook


Create your account
By creating an account you agree to StudySoup's terms and conditions and privacy policy

Already have a StudySoup account? Login here


by: Fern Schmeler


Marketplace > University of Louisville > Social Work > SW 601 > HUM BEH IN SOC ENVIRON I
Fern Schmeler
U of L
GPA 3.62


Almost Ready


These notes were just uploaded, and will be ready to view shortly.

Purchase these notes here, or revisit this page.

Either way, we'll remind you when they're ready :)

Preview These Notes for FREE

Get a free preview of these Notes, just enter your email below.

Unlock Preview
Unlock Preview

Preview these materials now for free

Why put in your email? Get access to more of this material and other relevant free materials for your school

View Preview

About this Document

Class Notes
25 ?




Popular in Course

Popular in Social Work

This 7 page Class Notes was uploaded by Fern Schmeler on Friday October 23, 2015. The Class Notes belongs to SW 601 at University of Louisville taught by Staff in Fall. Since its upload, it has received 28 views. For similar materials see /class/228344/sw-601-university-of-louisville in Social Work at University of Louisville.




Report this Material


What is Karma?


Karma is the currency of StudySoup.

You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!

Date Created: 10/23/15
N E 4 Hello Class and welcome to our presentation on Online Predators Strangers in Your Home This presentation will be presented by Buford Edwards Anetha Caldwell and Tami Cowherd We hope you enjoy our presentation so sit back and enjoy First let s de ne some terms Predator the word predator is de ned as an organism that lives by preying on other organisms or one that victimizes plunders or destroys especially for one s own gain What is a Cyber crime A Cyber crime encompasses any criminal act dealing with computers and networks or it could be called hacking Additionally Cyber crime also includes traditional crimes conducted through the intemet For example these could include hate crimes telemarketing intemet fraud identity theft credit card account theft and other cyber crimes not speci cally related to sexual abuse However our main focus in this presentation will be on how the computer is used to commit online sexual felonies Here are some more de nitions Under federal law child pornography is de ned as visual depiction of any kind including a drawing cartoon sculpture or painting photograph lm video or computer generated image or picture whether it be made or produced by electronic Mechanical or other means of sexually explicit conduct Whether it depicts a minor engaged in sexually explicit conduct and is obscene or depicts an image that is appears to be a minor engaged in graphic bestiality sadistic masochistic abuse or sexual intercourse Which would include genitaltogenital oraltogenital analtogenital or oraltoanal whether between persons of the same or opposite sex and such depiction lacks serious literary artistic poetic or scienti c value Also sexually explicit conduct includes various forms of sexual activity such as those mentioned above It is illegal to possess distribute or manufacture these images Finally these images can be presented in various forms including print media videotape lm compact disc readonly memory CDROM or digital versatile technology DVD and can be transmitted through computer bulletinboard systems BBS USENET Newsgroups Internet Relay Chat webbased groups peertopeer technology and an array of constantly changing world wide web sites Some facts about cyber crimes involving children First they do not have to involve physical contact between the child and the perpetrator This is unlike traditional sex crimes Also the victimization of the child can and is often times a very longterm process Often times there is more than one victim located in various areas across the country Also due to the nature of the victimization the victims do not disclose the abuse that has occurred What typically happens is that you have a perpetrator who will get online and chat with the child and then over time build a rapport and relationship and eventually will try to either get this child to send the predator them pictures of themselves or in some instances meet the actual perpetrator in different areas across the country That is one of the V39 05 gt1 9 reasons that cyber crimes child pornography and online predators is such a scary and pervasive crime Some of the types of internet victimization include the enticement of the child or engaging the child in conversation giving the child extra attention or offering the child rewards money or different things to get the child to do what the perpetrator asks Another type of victimization is pornography Often times the perpetrator will bombard the child with pornography of themselves other children cartoons anything to get that child s attention and to draw away the fact that this is a crime and that it is wrong Also the perpetrator will encourage the youth to make pornography of themselves and exchange that among the group of perpetrators The final and most scary type of victimization is enticing and exploiting the children for sexual tourism Sexual tourism is actually getting the child to travel some distance to meet the perpetrator and engage in sexual activity with them Some interesting and startling from the United States include Two in five Internet users visited an adult site in August of 2005 The largest group of viewers of Internet porn is children between ages 12 and 17 and According to the Florida Family Association PomCrawler their specialized software program identified 20 US companies that accounted for more than 70 percent of 297 million porn links on the Internet Also The commercial business of child pornography over the Internet has been estimated to be as high as 20 billion worldwide according to the National Center for Missing amp Exploited Children and according to quotThe Global Coalition To End Human Trafficking Nowquot 34 Billion generated annually from Internet child pornography with victims as young as infants and of those arrested in the US for the possession of child pornography between 2000 and 2001 83 had images involving children between ages 6 and 12 39 had images involving children between ages 3 and 5 and 19 had images of infants and toddlers under age 3 More information about online predators include the fact that internet pedophiles are increasingly adopting counterintelligence techniques to protect themselves from being traced Forty percent of people charged with child pornography also sexually abuse children police say But finding the predators and identifying the victims are daunting tasks One in five children who use computer chat rooms has been approached over the Internet by pedophiles l in 5 received sexual solicitation or approach in last year 1 in 33 received AGGRESSIVE sexual solicitation asked to meet called them via phone sent mail money or gifts 25 of youth who received sexual solicitation told a parent So that leaves 75 who did not and l in 4 kids participate in Real Time Chat which is the forum that most predators often times use in the beginning No specific data exists for the Commonwealth of Kentucky due to the broad spectrum of the internet the relatively young age of Kentucky s Internet Crimes division and the absolute shady nature of the crime itself However in a study of 3 1400 cases of reported child molestation in Louisville Kentucky between the years of 1980 and 1984 pornography was connected with every incident and child pornography was connected in a majority of cases Also in the Commonwealth we currently have 4813 registered sex offenders Out of those only 1389 or 29 are living in the major cities of Kentucky These include the cities of Lexington Louisville Owensboro and the Northern KentuckyGreater Cincinnati Area So this translates to 71 of the sex offenders or 3424 live in small towns across the Commonwealth So where did cyber crimes and online predators get their origin Cybersex any form of sexual expression that is accessed through the computer is a phenomenon unknown before the mid 1980 s As use of computers and the Internet has exploded in the United States and other countries accessing the Internet to obtain sexual stimulation has increased exponentially in prevalence In the year 2000 about one in four regular Internet users or translated roughly to 21 million Americans visited one of the more than 60000 sex sites on the Web at least once a month Although sources vary on the exact beginning of the distribution of child pornography on the intemet and online predators it is known that child pornography was on the rise in the 1970s and present on the intemet soon after the technology could be supported So basically as soon as you could post a picture on the intemet and transport it from one person to the other child pornography showed up Currently approximately 20 of all Internet pornography involves children More than 20000 images of child pornography are posted on the Internet every week More babies and toddlers are appearing on the net and the abuse is getting worse It is more torturous and sadistic than ever before The typical age of children is between six and 12 but the profile is getting younger and younger every year Approximately 20 new children appear on the porn sites every month Many of these children are kidnapped or sold into sex So how do we fair for the future The total number of crime offenses recorded decreased 2 percent from 1997 to 2000 However child pornography and pornographic offenses increased 68 percent and juvenile victim child exploitation pornography offenses jumped 200 percent In addition the proportion of all pornography offenses involving child exploitation or juvenile victims increased from 15 percent in 1997 to 26 percent in the year 2000 One way we combat child pornography is through legislation In 1986 the Attorney General s Commission on Child Pornography was published This report is divided into five parts and thirtyfive chapters and details most aspects of the pornography industry including the history of pornography and the extent of First Amendment protections The report also documents what the committee found to be the harmful effects of pornography and connections between pomographers and organized crime 14 Another piece of legislation was the Child Online Protection Act This was passed in 1998 COPA requires all commercial distributors of quotmaterial harmful to minorsquot to protect their sites from access by minors Material harmful to minorsquot was de ned as material that by quotcontemporary community standardsquot was judged to appeal to the quotprurient interestquot and that showed sexual acts or nudity including female breasts This is a much lower standard than obscenity and covers all hardcore and softcore pornography However this law was blocked by the courts and has never taken effect 15 The newest piece of legislation is the Deleting Online Predators Act which was introduced to congress in May of 2006 The proposed act would amend the Communications Act of 1934 requiring schools and libraries that receive Erate funding to protect minors from online predators in the absence of parental supervision when using quotCommercial Social Networking Websitesquot and quotChat Roomsquot The act would prohibit schools and libraries from providing access to these types of websites to minors The act also requires the institutions to be capable of disabling the restrictions for quotuse by an adult or by minors with adult supervision to enable access for educational purposes However this has not yet become law 16 The Child Internet Protection Act which was passed in 2000 states that Schools and libraries subject to CIPA may not receive the discounts olTered by the ERate program unless they certify that they have an Internet safety policy and technology protection measures in place An Internet safety policy must include technology protection measures to block or filter Internet access to pictures that a are obscene b are child pornography or c are harmful to minors for computers that are accessed by minors Schools subject to CIPA are required to adopt and enforce a policy to monitor online activities of minors and Schools and libraries subject to CIPA are required to adopt and implement a policy addressing a access by minors to inappropriate matter on the Internet b the safety and security of minors when using electronic mail chat rooms and other forms of direct electronic communications c unauthorized access including socalled hacking and other unlawful activities by minors online d unauthorized disclosure use and dissemination of personal information regarding minors and e restricting minors access to materials harmful to them 17 Kentucky s law dealing with pornography and intemet crimes in KRS Chapter 531 Specifically it is found in sections Distribution of obscene matter 030 Distribution of obscene matter to minors 040 Using minors to distribute obscene material 050 Advertising obscene material 060 Promoting sale of obscenity 090 Voyeurism 100 Video voyeurism N O 310 Use ofa minor in a sexual performance 320 Promoting a sexual performance by a minor 335 Possession of matter portraying a sexual performance by a minor 340 Distribution of matter portraying a sexual performance by a minor 350 Promoting sale of material portraying a sexual performance by a minor 360 Advertising material portraying a sexual performance by a minor 370 Using minors to distribute material portraying a sexual performance by a m1nor 18 The penalties for these crimes range from a Class B misdemeanor to a Class A felony for violations of KRS 531310 and KRS 531320 Misdemeanor offenses can constitute a fine and up to one year in jail Felony convictions can constitute a fine and from one year to life in prison 19 Some safety tips for parents include a Talk to your kids about sexual predators and potential online dangers b Young children should not use chat rooms c If your children take part in chat rooms make sure you know which ones they visit and with whom they talk Monitor the chat areas yourself to see what kind of conversations take place d Instruct your children to never leave the chat room39s public area e Keep the Intemetconnected computer in a common area of the house never in a child39s bedroom f When your children are young they should share the family email address rather than have their own email accounts g Tell your children to never respond to instant messaging or emails from strangers h If all precautions fail and your kids do meet an online predator don t blame them The offender always bears full responsibility Take decisive action to stop your child from any further contact with this person 20 Some safety tips for kids include a Never download images from an unknown sourceithey could be sexually explicit b Use email filters c Tell an adult immediately if anything that happens online makes a child feel uncomfortable or frightened d Choose a genderneutral screen name that doesn t contain sexually suggestive words or reveal personal information e Never reveal personal information about themselves including age and gender or information about their family to anyone online never fill out online personal profiles f Stop any email communication instant messaging conversations or chats if anyone starts to ask questions that are too personal or sexually suggestive g Post the family online agreement near the computer to remind children to protect their privacy on the Internet at all times 21 Anyone can become a victim of an online predator However young adolescents are the most vulnerable age group and are at high risk from online predators Young adolescents tend to explore their sexuality move away from parental control and look for new relationships outside the family Under the guise of anonymity they are more likely to take risks online even if they don t fully understand the possible implications r r39wqowrv oocrw Young people who are most vulnerable to online predators tend to be new to online activity and unfamiliar with netiquette aggressive computer users the type to try new edgy activities in life actively seeking attention or affection rebellious isolated or lonely curious confused regarding sexual identity easily tricked by adults attracted by subcultures apart from their parents39 world Kids feel they are aware of the dangers of predators but in reality they are quite naive about online relationships 22 How do you tell if your child has been a target a Is your child or teen spends a great deal of time online b Do you find pornography on the family computer c Does your child or teen receive phone calls from people you don t know or makes calls sometimes long distance to numbers you don t recognize d Does your child or teen receive mail gifts or packages from someone you don t know e Is your child or teen withdrawn from family and friends or quickly turns the computer monitor off or changes the screen if an adult enters the room f Is your child is using someone else s online account If any of these things are happening your child may be at risk 23 Websites use by online predators You didn t actually think we d post that did you give them some place to go Actually here are some resource pages instead National Alert Regist Sex Offender Report Stop Sex Offender Parents for Megans Law DOJ Registered Sex Offender Site Sex Criminals I SexualOffenderscom l MAKO All of these sites give valuable information to help protect you and your family from online predators 24 One nal thought Remember to think twice about who you are dealing with in cyberspace You may think your chatting with a normal everyday person like yourself when in fact you may be carrying on a conversation with this jerk This concludes our presentation We hope that you found it educational and informative We look forward to hearing your questions and comments posted in discussion board See you in class 25 References 7 No audio


Buy Material

Are you sure you want to buy this material for

25 Karma

Buy Material

BOOM! Enjoy Your Free Notes!

We've added these Notes to your profile, click here to view them now.


You're already Subscribed!

Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'

Why people love StudySoup

Jim McGreen Ohio University

"Knowing I can count on the Elite Notetaker in my class allows me to focus on what the professor is saying instead of just scribbling notes the whole time and falling behind."

Janice Dongeun University of Washington

"I used the money I made selling my notes & study guides to pay for spring break in Olympia, Washington...which was Sweet!"

Bentley McCaw University of Florida

"I was shooting for a perfect 4.0 GPA this semester. Having StudySoup as a study aid was critical to helping me achieve my goal...and I nailed it!"

Parker Thompson 500 Startups

"It's a great way for students to improve their educational experience and it seemed like a product that everybody wants, so all the people participating are winning."

Become an Elite Notetaker and start selling your notes online!

Refund Policy


All subscriptions to StudySoup are paid in full at the time of subscribing. To change your credit card information or to cancel your subscription, go to "Edit Settings". All credit card information will be available there. If you should decide to cancel your subscription, it will continue to be valid until the next payment period, as all payments for the current period were made in advance. For special circumstances, please email


StudySoup has more than 1 million course-specific study resources to help students study smarter. If you’re having trouble finding what you’re looking for, our customer support team can help you find what you need! Feel free to contact them here:

Recurring Subscriptions: If you have canceled your recurring subscription on the day of renewal and have not downloaded any documents, you may request a refund by submitting an email to

Satisfaction Guarantee: If you’re not satisfied with your subscription, you can contact us for further help. Contact must be made within 3 business days of your subscription purchase and your refund request will be subject for review.

Please Note: Refunds can never be provided more than 30 days after the initial purchase date regardless of your activity on the site.