Counter-Surveillance Strategies Adopted By Child Pornographers
Marie Eneman
Additional contact information
Marie Eneman: University of Gothenburg, Sweden
International Journal of Technology and Human Interaction (IJTHI), 2009, vol. 5, issue 4, 1-17
Abstract:
On the one side, it could be argued that ICT provide a perceived anonymity for people downloading and distributing child abusive material, also labelled child pornography. While, on the other side the technology offers powerful surveillance mechanisms to monitor these activities and thus constitutes a powerful tool for law enforcement. This article aims to explore how offenders manage the risk of surveillance when downloading, distributing and exchanging child abusive material. Critical research with a focus on panopticon is used as a theoretical framework. The data is drawn from interviews with offenders, convicted of child pornography. The findings show that the offenders have developed technological and social strategies to reduce the risk of surveillance and addresses the need of a new theoretical concept better adjusted to surveillance practices that allow the many to watch the many. The ultimate motivation for researching this topic is to contribute to the development of effective child protection strategies.
Date: 2009
References: Add references at CitEc
Citations:
Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 4018/jthi.2009062501 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:igg:jthi00:v:5:y:2009:i:4:p:1-17
Access Statistics for this article
International Journal of Technology and Human Interaction (IJTHI) is currently edited by Anabela Mesquita
More articles in International Journal of Technology and Human Interaction (IJTHI) from IGI Global
Bibliographic data for series maintained by Journal Editor ().