Center for Problem-Oriented Policing

References

Adegoke, Y. (2003). “Top Brands Start to Pull Ads From P2P Networks. New Media Age, April 24, p. 1.

Adler, A. (2001). “The Perverse Law of Child Pornography.” Columbia Law Review 101(2):209–273.

Aftab, P. (2000). The Parent’s Guide to Protecting Your Children in Cyberspace. New York: McGraw-Hill.

Aloysius, C. (2001). “The Media Response: A Journalist’s View of the Problem in Asia.” In C.A. Arnaldo, ed., Child Abuse on the Internet: Ending the Silence. New York: Berghahn Books.

Anonymous (2003). “Buried by a Pile of Porn: Child Pornography.” The Economist (U.S.), Jan. 18, 2003, Vol. 366, Issue 8307.

Arnaldo, C. (2002). “The Naked, Hairy Caveman: Child Abuse on the Internet.” In C. von Feilitzen and U. Carlsson, eds., Children in the New Media Landscape. Goteberg, Sweden: UNESCO International Clearinghouse on Children and Violence on the Screen at Nordicom.

Arnaldo, C. (2001). Child Abuse on the Internet: Ending the Silence. Paris: UNESCO Publishing; New York: Berghahn Books.

Arvada (Colorado) Police Department (1996). “Arvada Police Department Crimes Against Children Unit.” Submission for the Herman Goldstein Award for Excellence in Problem-Oriented Policing.[Full Text]

BBC News, “Tackling Online Child Pornography.” news.bbc.co.uk/1/hi/uk/1166135.stm (Accessed February 13, 2001).

BBC News, “Operation Avalanche: Tracking Child Porn.” news.bbc.co.uk/2/hi/uk_news/2445065.stm (Accessed November 11, 2002).

BBC News, “Police Trap Online Paedophiles.” news.bbc.co.uk/1/hi/uk/3329567.stm (Accessed December 18, 2003).

Blundell, B., M. Sherry, A. Burke, and S. Sowerbutts (2002). “Child Pornography and the Internet: Accessibility and Policing.” Australian Police Journal 56(1):59–65.

Burke, A., S. Sowerbutts, B. Blundell, and M. Sherry (2002). “Child Pornography and the Internet: Policing and Treatment Issues.” Psychiatry, Psychology and Law 9(1):79–4.

Calder, M. (2004). Child Sexual Abuse and the Internet: Tackling the New Frontier. Lyme Regis (United Kingdom): Russell House Publishing.

Canadian Resource Centre for Victims of Crime (2000). “Child Sexual Exploitation and the Internet.” Ottawa (Ontario). the Author.[Full Text]

Carr, J. (2004). Child Abuse, Child Pornography and the Internet. London: NCH.[Full Text]

Cooper, A., D.E. Putnam, L.A. Planchon, and S.C. Boies. (1999). “Online Sexual Compulsivity: Getting Tangled in the Net.” Sexual Addiction and Compulsivity 6:79–104.

Crewdson, J. (1998). By Silence Betrayed: Sexual Abuse of Children in America. Boston: Little Brown.

DeMarco, R.T. (2005). “Technology and the Fight Against Child Pornography. Watch Right.” blog.watchright.com/ ?itemid=337.

Dobson, A. (2003). “Caught in the Net.” Care and Health, Feb. 13 pp. 6–9.

Donnerstein, E. (2002). “The Internet.” In V.C. Strasburger and B.J. Wilson, eds., Children, Adolescents and the Media. Thousand Oaks (California): Sage Publications.

Duff-Brown, B. (2005). “Software Helps Track Child Pornographers.” Associated Press.

Esposito, L. (1998). “Regulating the Internet: The New Battle Against Child Pornography.” Case Western Reserve Journal of International Law 30:541–565.

Federal Bureau of Investigation (2002). “Operation Candyman.” [Full Text]

Ferraro, M., E. Casey, and M. McGrath (2004). Investigating Child Exploitation and Pornography: The Internet, The Law and Forensic Science. Amsterdam, Boston: Elsevier/Academic.

Finkelhor, D., K.J. Mitchell, and J. Wolak (2000). Online Victimization: A Report on the Nation’s Youth. Crimes Against Youth Research Center. [Full Text]

Forde, P., and A. Patterson (1998). Paedophile Internet Activity. Trends & Issues in Crime and Criminal Justice, No. 97. Canberra: Australian Institute of Criminology.[Full Text]

Goldstein, S. (1999). The Sexual Exploitation of Children: A Practical Guide to Assessment, Investigation, and Intervention. (2nd ed.). Boca Raton (Florida): CRC Press.

Graham, W., Jr. (2000). “Uncovering and Eliminating Child Pornography Rings on the Internet: Issues Regarding and Avenues Facilitating Law Enforcement’s Access to ‘Wonderland’.” The Law Review of Michigan State University-Detroit College of Law 2:457–484.[Full Text]

Grant, A., F. David, and P. Grabosky (1997). “Child Pornography in the Digital Age.” Transnational Organized Crime 3(4):171–188.

Grasz, L., and P. Pfaltzgraff (1998). “Child Pornography and Child Nudity: Why and How States May Constitutionally Regulate the Production, Possession, and Distribution of Nude Visual Depictions of Children.” Temple Law Review 71:609–636.[Full Text]

Jenkins, P. (2001). Beyond Tolerance: Child Pornography on the Internet. New York: New York University Press.

Jewkes, Y., and C. Andrews (2005). “Policing the Filth: The Problems of Investigating Online Child Pornography in England and Wales.” Policing and Society 15: 42–62.

Kennedy-Souza, B.L. (1998). “Internet Addiction Order.” Interpersonal Computing and Technology 6:1–2.

Khan, K. (2000). “Child Pornography on the Internet.” Police Journal 73(1):7–17.[Full Text]

Klain, E., H. Davies and M. Hicks (2001). Child Pornography: The Criminal-Justice-System Response. Washington, D.C.: National Center for Missing & Exploited Children. [Full Text]

Kreston, S.S. (2004). “Computer Search and Seizure Issues in Internet Crimes Against Children Cases.” Rutgers Computer and Technology Law Journal 30:327–373.

Krone, T. (2004). A Typology of Online Child Pornography Offending. Trends & Issues in Crime and Criminal Justice, No. 279. Canberra: Australian Institute of Criminology. [Full Text]

Lanning, K., and A. Burgess (1989). “Child Pornography and Sex Rings.” In D. Zillmann and J. Bryant, eds., Pornography: Research Advances & Policy Considerations. Hillsdale (New Jersey): Lawrence Erlbaum.

Lee, P., S. Hui, and A. Fong (2003). “A Structural and Content-Based Analysis for Web Filtering.” Internet Research: Electronic Networking Applications and Policy 13(1):27–37.

Lesce, T. (1999). “Pedophiles on the Internet: Law Enforcement Investigates Abuse.” Law and Order 47(5):74–78.[Full Text]

Linz, D., and D. Imrich (2001). “Child Pornography.” In S. White, ed., Handbook of Youth and Justice. New York: Kluwer Academic/Plenum.

Marshall, W.L. (1988). “The Use of Explicit Sexual Stimuli by Rapists, Child Molesters and Nonoffender Males.” Journal of Sex Research 25:267–288.

Marshall, W.L. (2000). “Revisiting the Use of Pornography by Sexual Offenders: Implications for Theory and Practice.” The Journal of Sexual Aggression 6:67–77.

Mostyn, M. (2000). “The Need for Regulating Anonymous Remailers.” International Review of Law, Computers & Technology 14(1):79–88.

Newman, G.R. (2004). “Identity Theft.” Problem Oriented Guides for Police. Problem-Specific Guide Series, No. 25. U.S. Department of Justice Office of Community Oriented Policing Services. www.cops.usdoj.gov/mime/open. pdf?Item=1271.

O’Connell, R. (2001). “Pedophiles Networking on the Internet.” In C. Arnaldo, ed., Child Abuse on the Internet: Ending the Silence. New York: Berghahn Books.

Proulx, J., C. Perreult, and M. Ouimet (1999). “Pathways in the Offending Process of Extrafamilial Sexual Child Molesters.” Sexual Abuse: A Journal of Research and Treatment 11:117–29.

Quayle, E., and M. Taylor (2001). “Child Seduction and Self-Representation on the Internet.” CyberPsychology & Behavior 4(5):597–608.

Schneider, J.P. (2000). “Effects of Cybersex Addiction on the Family: Results of a Survey.” In A. Cooper, ed., Cybersex: The Dark Side of the Force. New York: Brunner/Mazel.

Schwartz, M.F., and S. Southern (2000). “Compulsive Cybersex.” In A. Cooper, ed., Cybersex: The Dark Side of the Force. New York: Brunner/Mazel.

Shelley, G.B., T.J. Cashman, and M.E. Vermaat (2004). Discovering Computers: A Gateway to Information. Boston: Thomson.

Silbert, M. (1989). “The Effects on Juveniles of Being Used for Pornography and Prostitution.” In D. Zillmann and J. Bryant, eds., Pornography: Research Advances & Policy Considerations. Hillsdale (New Jersey): Lawrence Erlbaum.

Simon, L. (2000). “An Examination of the Assumptions of Specialization, Mental Disorder, and Dangerousness in Sex Offenders.” Behavioral Sciences and the Law 18:275–308.

Smallbone, S., and R. Wortley (2000). Child Sexual Abuse in Queensland: Offender Characteristics and Modus Operandi. Brisbane: Queensland Crime Commission. [Full Text]

Stanley, J. (2001). Child Abuse and the Internet. National Child Protection Clearinghouse, No. 15 Summer. Melbourne: Australian Institute of Family Studies. [Full Text] .

Stewart, J. (1997). “If This Is the Global Community, We Must Be On the Bad Side of Town: International Policing of Child Pornography on the Internet.” Houston Journal of International Law 20(1):205–246.

Sutton, D., and V. Jones (2004). Position Paper on Child Pornography and Internet-Related Sexual Exploitation of Children. Save the Children.[Full Text]

Tate, T. (1990). Child Pornography: An Investigation. London: Methuen.

Taylor, M., G. Holland, and E. Quayle (2001). “Typology of Paedophile Picture Collections.” Police Journal 74(2):97–107.[Full Text]

Taylor, M., and E. Quayle. (2006). “The Internet and Abuse Images of Children: Search, Precriminal Situations and Opportunity.” In R. Wortley and S. Smallbone (eds.) Situational Prevention of Child Sexual Abuse. Crime Prevention Studies, Vol. 19. Monsey (New York): Criminal Justice Press.[Abstract Only ]

Taylor, M., and E. Quayle (2003). Child Pornography: An Internet Crime. London: Brunner-Routledge.

Thomas, D.S. (1997). “Cyberspace Pornography: Problems with Enforcement.” Internet Research: Electronic Networking Applications and Policy 7(3):201–207.

Thornburgh, D., and H. Lin (2002). Youth, Pornography, and the Internet. Washington, D.C.: National Academy Press.

Tyler, R. (1985). “Child Pornography: Perpetuating the Sexual Victimization of Children.” Child Abuse & Neglect 9(3):313–318.

U.S. Department of Justice (2004). Department of Justice, Homeland Security Announce Child Pornography File-Sharing Crackdown: Law Enforcement Initiative Targets Child Pornography Over Peer-to-Peer Networks. [Full Text]

U.S. General Accounting Office (2002). Combating Child Pornography: Federal Agencies Coordinate Law Enforcement Efforts, But An Opportunity Exists for Further Enhancement. Washington, D.C.: the Author. [Full Text]

U.S. General Accounting Office (2003). File-sharing Programs: Peer-to-Peer Networks Provide Ready Access to Child Pornography. Washington, D.C.: the Author. [Full Text]

U.S. Postal Inspection Service, (n.d.). Operation Avalanche. [Full Text]

Wang, J., J. Li, G. Wiederhold, and O. Firschein (1998). “System for Screening Objectionable Images.” Computer Communications 21:1355–1360.

Wellard, S.S. (2001). “Cause and Effect.” Community Care March 15–21, pp. 26–27.[Full Text]

Williams, K. (2003). “Controlling Internet Child Pornography and Protecting the Child.” Information & Communications Technology Law 12(1):3–24.

Wolak, J., K. Mitchell, and D. Finkelhor (2003). “Escaping or Connecting? Characteristics of Youth Who Form Close Online Relationships.” Journal of Adolescence 26:105–119.