Skip to main content

Sexual-Orientated Online Chat Conversations—Characteristics and Testing Pathways of Online Perpetrators

  • Chapter
  • First Online:
Sweetie 2.0

Part of the book series: Information Technology and Law Series ((ITLS,volume 31))

  • 785 Accesses

Abstract

Children all over the world are constantly at risk of becoming a victim of webcam child sex tourism (hereafter WCST). Law enforcement agencies are struggling with tackling the problem. Little is known about the behaviour of online perpetrators who persuade minors to engage in webcam sex. In order to gain more information about the behaviour of this group, the ten-year-old Philippine avatar Sweetie was deployed as a tool. In this first preliminary study 200 chat conversations were analysed. Based on the first findings, almost all online perpetrators were male with an average reported age of 29 years old living in Europe, North America and Asia. Two types of perpetrators were found: the Clint-type, who had clear intentions to talk about sex related topics or about starting a webcam conversation to persuade the minor to engage in (online) sexual activities; and the Small talk type, who used small talk to persuade the minor to engage in (online) sexual activities. This study shows that online perpetrators can be classified into perpetrators who display avoiding and approaching behaviour, which is comparable to the offline offending pathways of Ward and Hudson.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Schermer et al. 2016, p. 6.

  2. 2.

    Wolak et al. 2008, p. 111.

  3. 3.

    Marcum 2007, p. 100.

  4. 4.

    Schermer et al. 2016, pp. 6, 18.

  5. 5.

    Further information on the project known as ‘Sweetie 1.0’ can be found on https://www.terredeshommes.nl/en/sweetie-face-webcam-child-sex-tourism.

  6. 6.

    United States Department of Justice 2010, p. 36.

  7. 7.

    Taylor and Quayle 2003, pp. 204–208.

  8. 8.

    Broséus et al. 2016, p. 7.

  9. 9.

    Schermer et al. 2016, p. 6.

  10. 10.

    Regional Overview: Sexual exploitation of children in Southeast Asia. Report retrieved from: http://www.ecpat.org/wp-content/uploads/2018/02/Regional-Overview_Southeast-Asia.pdf.

  11. 11.

    Houtepen et al. 2014, p. 467; Van Wijk et al. 2009, p. 49.

  12. 12.

    Briggs et al. 2011, p. 75; Van Wijk et al. 2009, p. 49.

  13. 13.

    Briggs et al. 2011, pp. 14, 15; Merdian et al. 2013, pp. 124–126.

  14. 14.

    Lanning 2010, pp. 32, 33.

  15. 15.

    Briggs et al. 2011, pp. 16, 17; Krone 2004, p. 4; Wortley and Smallbone 2006, pp. 16, 17.

  16. 16.

    Malesky 2007, p. 28.

  17. 17.

    Wolak et al. 2008, p. 112.

  18. 18.

    Briggs et al. 2011, p. 4; Marcum 2007, p. 108.

  19. 19.

    Briggs et al. 2011, p. 75; Dehart et al. 2016, p. 78; Kloes et al. 2017, pp. 570–571; Marcum 2007, p. 100.

  20. 20.

    Malesky 2007, p. 28.

  21. 21.

    Ward and Hudson 1998.

  22. 22.

    Bickley and Beech 2002, p. 375.

  23. 23.

    Ward and Hudson 1998, pp. 710–713.

  24. 24.

    Ibid, pp. 710–713.

  25. 25.

    Ward and Hudson 1998, pp. 710–713.

  26. 26.

    Bickley and Beech 2002, pp. 380–381.

  27. 27.

    Webster 2005, pp. 1192–1193.

  28. 28.

    Further information can be found at www.terredeshommes.nl.

  29. 29.

    Ward and Hudson 1998.

  30. 30.

    Ibid.

  31. 31.

    Briggs et al. 2011, p. 11.

  32. 32.

    Kloes et al. 2017, pp. 570–571.

  33. 33.

    Malesky 2007, p. 28.

  34. 34.

    Marcum 2007, pp. 108, 112.

  35. 35.

    Ward and Hudson 1998, pp. 712–713.

  36. 36.

    Ward and Hudson 1998, pp. 712–713.

  37. 37.

    Ward and Hudson 1998, pp. 711–713.

References

  • Bickley JA, Beech AR (2002) An investigation of the Ward and Hudson pathways model of the sexual offense process with child abusers. Journal of Interpersonal Violence 17: 71–393

    Article  Google Scholar 

  • Briggs P et al (2011) An exploratory study of Internet-initiated sexual offenses and the chat room sex offender: Has the Internet enabled a new typology of sex offender? Sexual Abuse: A Journal of Research and Treatment 23: 72–91

    Article  Google Scholar 

  • Broséus J et al (2016) Studying illicit drug trafficking on Darknet markets: structure and organisation from a Canadian perspective. Forensic Science International 264: 7–14

    Article  Google Scholar 

  • Dehart D et al (2016) Internet sexual solicitation of children: a proposed typology of offenders based on their chats, e-mails, and social network posts. Journal of Sexual Aggression 23: 77–89

    Article  Google Scholar 

  • Houtepen JABM et al (2014) From child pornography offending to child sexual abuse: a review of child pornography offender characteristics and risks for cross-over. Aggression and Violent Behavior 19: 466–473

    Article  Google Scholar 

  • Kloes JA et al (2017) A qualitative analysis of offenders’ modus operandi in sexually exploitative interactions with children online. Sexual Abuse 29: 563–591

    Google Scholar 

  • Krone T (2004) A typology of online child pornography offending. Trends and Issues in Crime and Criminal Justice 297: 1–6

    Google Scholar 

  • Lanning KV (2010) Child Molesters: A behavioral analysis, 5th edn. National Center for Missing & Exploited Children, Alexandria VA

    Google Scholar 

  • Malesky LA (2007) Predatory online behavior: modus operandi of convicted sex offenders in identifying potential victims and contacting minors over the Internet. Journal of Child Sexual Abuse 16: 23–32

    Article  Google Scholar 

  • Marcum CD (2007) Interpreting the intentions of Internet predators: An examination of online predatory behavior. Journal of Child Sexual Abuse 16: 99–114

    Article  Google Scholar 

  • Merdian HL et al (2013) The three dimensions of online child pornography offending. Journal of Sexual Aggression 19: 121–132

    Article  Google Scholar 

  • Schermer BW et al (2016) Legal aspects of Sweetie 2.0 Center for Law and Digital Technologies/Tilburg Institute for Law, Technology, and Society, Leiden/Tilburg

    Google Scholar 

  • Taylor M, Quayle E (2003) Child Pornography: An Internet Crime. Brunner Routledge, New York

    Google Scholar 

  • United States Department of Justice (2010) The national strategy for child exploitation prevention and interdiction: A report to Congress. USDOJ, Washington DC

    Google Scholar 

  • Van Wijk APH et al (2009) Achter de schermen. Een verkennend onderzoek naar downloaders van kinderporno. Bureau Beke, Arnhem

    Google Scholar 

  • Ward T, Hudson SM (1998) A model of the relapse process in sexual offenders. Journal of Interpersonal Violence 13: 700–725

    Article  Google Scholar 

  • Webster SD (2005) Pathways to sexual offence recidivism following treatment: an examination of the Ward and Hudson self-regulation model of relapse. Journal of Interpersonal Violence 20: 1175–1196

    Article  Google Scholar 

  • Wolak J et al (2008) Online ‘predators’ and their victims: myths, realities, and implications for prevention and treatment. American Psychologist 63: 111–128

    Article  Google Scholar 

  • Wortley R, Smallbone S (2006) Child pornography on the Internet. Problem-oriented guides for police, problem specific guides series, 41. US Department of Justice, Washington DC

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manon Kleijn .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 T.M.C. Asser press and the authors

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kleijn, M., Bogaerts, S. (2019). Sexual-Orientated Online Chat Conversations—Characteristics and Testing Pathways of Online Perpetrators. In: van der Hof, S., Georgieva, I., Schermer, B., Koops, BJ. (eds) Sweetie 2.0. Information Technology and Law Series, vol 31. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-288-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-94-6265-288-0_2

  • Published:

  • Publisher Name: T.M.C. Asser Press, The Hague

  • Print ISBN: 978-94-6265-287-3

  • Online ISBN: 978-94-6265-288-0

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy