Centro de Documentação da PJ
Monografia

CD268
NAÇÕES UNIDAS. Office on Drugs and Crime
Study on the effects of new information technologies on the abuse and exploitation of children [Documento electrónico] / United Nations Office On Drugs And Crime.- New York : United Nations, 2015.- 1 CD-ROM ; 12 cm
Ficheiro de 1,13 MB em formato PDF (76 p.).


CRIME SEXUAL, EXPLORAÇÃO DE MENORES, TECNOLOGIA DA INFORMAÇÃO, CRIME VIA INTERNET, PERFIL PSICOLÓGICO, METODOLOGIAS

Executive summary. Opportunities to enhance the fight against ICT-facilitated child abuse and exploitation. Introduction. Scope and structure of the study. I. Identifying and describing the problem. Key terms and concepts . Main forms of ICT-facilitated child abuse and exploitation. Cyberenticement, solicitation and online grooming. Cyberbullying, cyberharassment and cyberstalking. Exposure to harmful content. II. Evaluating the problem. Effects of ICT on common existing forms of child abuse and exploitation. Enhanced access to victims and to child sexual abuse material. Increased profits for criminal enterprises. Reducing offenders’ risk of detection. Increased levels of harm for victims. Provision of social affirmation for offenders. Information and communication technologies as a tool for detection. New forms of child abuse and exploitation. Made-to-order child sexual abuse material. User-generated content and self-generated content, including “sexting”. Broadcasting of live sex abuse. Victimization risk factors. Gender and sexual orientation. Prior abuse and family dysfunction. Poverty and migration. Age. Risky online behaviour and inattention to online safety and privacy. Social isolation. Profile of offenders. General profile and motivations of offenders. Gender. Age. Other demographic characteristics. Technological sophistication. Groups of offenders. Organized criminal groups. III. Combating the problem. International instruments. United Nations Convention on the Rights of the Child (CRC). The Optional Protocol to the CRC on the sale of children, child prostitution, and child pornography. United Nations Convention against Transnational Organized Crime. The Protocol to Prevent, Suppress, and Punish Trafficking in Persons, Especially Women and Children. Guidelines on Justice in Matters involving Child Victims and Witnesses of Crime. Regional instruments. Council of Europe Convention on Cybercrime. Council of Europe Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse. African Charter on the Rights and Welfare of the Child. National laws and policies. Child sexual abuse material. Commercial sexual exploitation of children. Cyberenticement, solicitation or online grooming. Cyberbullying, stalking and harassment. Limiting children’s exposure to harmful content. Investigation of ICT-facilitated child abuse and exploitation. Image analysis and image databases. Digital forensics. Automated search. Data mining and analytics. Undercover operations. Mechanisms for international cooperation. Prosecution of ICT-facilitated child abuse and exploitation. Private sector responses. Self-regulation in the private sector. ISP regulation and opportunities for self-regulation. Financial coalitions. Self-monitoring by travel and tourism companies. Civil society responses. Parental controls. User monitoring or “flagging”. Hotlines. Use of “apps”. Education and psychosocial methods of prevention. Opportunities to enhance the fight against ICT-facilitated child abuse and exploitation. Balancing child protection with human rights. Ensuring that legislation keeps pace with technological innovation. Establishing specialized units with dedicated personnel. Accessing state-of-the-art technological resources. Access to third-party data and other evidentiary challenges. Establishing the means to conduct undercover investigations. Increasing awareness and knowledge of the issues. Addressing research gaps. Developing policy guidance on harmful conduct committed by youth. Mitigating negative effects by the private sector. Glossary.