SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Lilley CM. Child Abuse Rev. 2016; 25(5): 386-398.

Copyright

(Copyright © 2016, John Wiley and Sons)

DOI

10.1002/car.2444

PMID

unavailable

Abstract

The last 20 years have seen an explosion in the availability, ownership and use of devices used to access the internet. There has been a simultaneous increase in the number of people viewing child abuse images. The ease of access to this material online has removed a key inhibitor for offenders. Technology has facilitated the distribution of child abuse images, but is also used to prevent and identify offending, as well as to manage offenders. There is a range of technological tools currently used in England and Wales to manage those offenders who have been convicted of accessing child abuse images and who are living in the community. Some are specific to the computer as the situation of the crime. This article analyses the evidence base for each. The article concludes that each tool has features which might contribute to the management of internet child sex offenders, but that none have yet been proven or disproven to be effective. Copyright © 2017 John Wiley & Sons, Ltd.


Language: en

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print