Abstract
Children all over the world are constantly at risk of becoming a victim of webcam child sex tourism (hereafter WCST). Law enforcement agencies are struggling with tackling the problem. Little is known about the behaviour of online perpetrators who persuade minors to engage in webcam sex. In order to gain more information about the behaviour of this group, the ten-year-old Philippine avatar Sweetie was deployed as a tool. In this first preliminary study 200 chat conversations were analysed. Based on the first findings, almost all online perpetrators were male with an average reported age of 29 years old living in Europe, North America and Asia. Two types of perpetrators were found: the Clint-type, who had clear intentions to talk about sex related topics or about starting a webcam conversation to persuade the minor to engage in (online) sexual activities; and the Small talk type, who used small talk to persuade the minor to engage in (online) sexual activities. This study shows that online perpetrators can be classified into perpetrators who display avoiding and approaching behaviour, which is comparable to the offline offending pathways of Ward and Hudson.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Schermer et al. 2016, p. 6.
- 2.
Wolak et al. 2008, p. 111.
- 3.
Marcum 2007, p. 100.
- 4.
Schermer et al. 2016, pp. 6, 18.
- 5.
Further information on the project known as ‘Sweetie 1.0’ can be found on https://www.terredeshommes.nl/en/sweetie-face-webcam-child-sex-tourism.
- 6.
United States Department of Justice 2010, p. 36.
- 7.
Taylor and Quayle 2003, pp. 204–208.
- 8.
Broséus et al. 2016, p. 7.
- 9.
Schermer et al. 2016, p. 6.
- 10.
Regional Overview: Sexual exploitation of children in Southeast Asia. Report retrieved from: http://www.ecpat.org/wp-content/uploads/2018/02/Regional-Overview_Southeast-Asia.pdf.
- 11.
- 12.
- 13.
- 14.
Lanning 2010, pp. 32, 33.
- 15.
- 16.
Malesky 2007, p. 28.
- 17.
Wolak et al. 2008, p. 112.
- 18.
- 19.
- 20.
Malesky 2007, p. 28.
- 21.
Ward and Hudson 1998.
- 22.
Bickley and Beech 2002, p. 375.
- 23.
Ward and Hudson 1998, pp. 710–713.
- 24.
Ibid, pp. 710–713.
- 25.
Ward and Hudson 1998, pp. 710–713.
- 26.
Bickley and Beech 2002, pp. 380–381.
- 27.
Webster 2005, pp. 1192–1193.
- 28.
Further information can be found at www.terredeshommes.nl.
- 29.
Ward and Hudson 1998.
- 30.
Ibid.
- 31.
Briggs et al. 2011, p. 11.
- 32.
Kloes et al. 2017, pp. 570–571.
- 33.
Malesky 2007, p. 28.
- 34.
Marcum 2007, pp. 108, 112.
- 35.
Ward and Hudson 1998, pp. 712–713.
- 36.
Ward and Hudson 1998, pp. 712–713.
- 37.
Ward and Hudson 1998, pp. 711–713.
References
Bickley JA, Beech AR (2002) An investigation of the Ward and Hudson pathways model of the sexual offense process with child abusers. Journal of Interpersonal Violence 17: 71–393
Briggs P et al (2011) An exploratory study of Internet-initiated sexual offenses and the chat room sex offender: Has the Internet enabled a new typology of sex offender? Sexual Abuse: A Journal of Research and Treatment 23: 72–91
Broséus J et al (2016) Studying illicit drug trafficking on Darknet markets: structure and organisation from a Canadian perspective. Forensic Science International 264: 7–14
Dehart D et al (2016) Internet sexual solicitation of children: a proposed typology of offenders based on their chats, e-mails, and social network posts. Journal of Sexual Aggression 23: 77–89
Houtepen JABM et al (2014) From child pornography offending to child sexual abuse: a review of child pornography offender characteristics and risks for cross-over. Aggression and Violent Behavior 19: 466–473
Kloes JA et al (2017) A qualitative analysis of offenders’ modus operandi in sexually exploitative interactions with children online. Sexual Abuse 29: 563–591
Krone T (2004) A typology of online child pornography offending. Trends and Issues in Crime and Criminal Justice 297: 1–6
Lanning KV (2010) Child Molesters: A behavioral analysis, 5th edn. National Center for Missing & Exploited Children, Alexandria VA
Malesky LA (2007) Predatory online behavior: modus operandi of convicted sex offenders in identifying potential victims and contacting minors over the Internet. Journal of Child Sexual Abuse 16: 23–32
Marcum CD (2007) Interpreting the intentions of Internet predators: An examination of online predatory behavior. Journal of Child Sexual Abuse 16: 99–114
Merdian HL et al (2013) The three dimensions of online child pornography offending. Journal of Sexual Aggression 19: 121–132
Schermer BW et al (2016) Legal aspects of Sweetie 2.0 Center for Law and Digital Technologies/Tilburg Institute for Law, Technology, and Society, Leiden/Tilburg
Taylor M, Quayle E (2003) Child Pornography: An Internet Crime. Brunner Routledge, New York
United States Department of Justice (2010) The national strategy for child exploitation prevention and interdiction: A report to Congress. USDOJ, Washington DC
Van Wijk APH et al (2009) Achter de schermen. Een verkennend onderzoek naar downloaders van kinderporno. Bureau Beke, Arnhem
Ward T, Hudson SM (1998) A model of the relapse process in sexual offenders. Journal of Interpersonal Violence 13: 700–725
Webster SD (2005) Pathways to sexual offence recidivism following treatment: an examination of the Ward and Hudson self-regulation model of relapse. Journal of Interpersonal Violence 20: 1175–1196
Wolak J et al (2008) Online ‘predators’ and their victims: myths, realities, and implications for prevention and treatment. American Psychologist 63: 111–128
Wortley R, Smallbone S (2006) Child pornography on the Internet. Problem-oriented guides for police, problem specific guides series, 41. US Department of Justice, Washington DC
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 T.M.C. Asser press and the authors
About this chapter
Cite this chapter
Kleijn, M., Bogaerts, S. (2019). Sexual-Orientated Online Chat Conversations—Characteristics and Testing Pathways of Online Perpetrators. In: van der Hof, S., Georgieva, I., Schermer, B., Koops, BJ. (eds) Sweetie 2.0. Information Technology and Law Series, vol 31. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-288-0_2
Download citation
DOI: https://doi.org/10.1007/978-94-6265-288-0_2
Published:
Publisher Name: T.M.C. Asser Press, The Hague
Print ISBN: 978-94-6265-287-3
Online ISBN: 978-94-6265-288-0
eBook Packages: Law and CriminologyLaw and Criminology (R0)