309,185 research outputs found
Internet-Facilitated Commercial Sexual Exploitation of Children.
This bulletin summarizes findings from the Internet‐Facilitated Commercial Sexual Exploitation of Children (IF‐CSEC) component of the 2006 Second National Juvenile Online Victimization study. Following are some key findings from the Office of Juvenile Justice and Delinquency Prevention‐sponsored study: • An estimated 569 arrests for IF‐CSEC were made in the United States in 2006; more than half of the arrests involved the offender marketing and selling child pornography. • Most offenders (83%) purchased child pornography or sex with a minor, but an important minority (17%) profited from the exploitation. Profiteers appeared to be more seasoned offenders who were involved in larger, organized networks of criminals, such as prostitution and human trafficking rings. • Many offenders (39%) were acquaintances of the IF‐CSEC victims, 23% were family members, and 17% were people the victims had met online. The rest were mostly pimps. • Compared with victims of Internet sexual crimes that do not involve a commercial aspect, a greater per‐ centage of IF‐CSEC victims, as part of the current crime, were assaulted, given drugs or alcohol, and were the subject of child pornography
Exploiting tacit knowledge through knowledge management technologies
The purpose of this paper is to examine the contributions and suitability of the available knowledge management (KM) technologies, including the Web 2.0 for exploiting tacit knowledge. It proposes an integrated framework for extracting tacit knowledge in organisations, which includes Web 2.0 technologies, KM tools, organisational learning (OL) and Community of Practice (CoP). It reviews a comprehensive literature covering overview of KM theories, KM technologies and OL and identifies the current state of knowledge relating to tacit knowledge exploitation. The outcomes of the paper indicate that Internet and Web 2.0 technologies have stunning prospects for creating learning communities where tacit knowledge can be extracted from people. The author recommends that organisations should design procedures and embed them in their Web 2.0 collaborative platforms persuading employees to record their ideas and share them with other members. It is also recommended that no idea should be taken for granted in a learning community where tacit knowledge exploitation is pursued. It is envisaged that future research should adopt empirical approach involving Complex Adaptive Model for Tacit Knowledge Exploitation (CAMTaKE) and the Theory of Deferred Action in examining the effectiveness of KM technologies including Web 2.0 tools for tacit knowledge exploitation
HUMAN TRAFFICKING IN CYBERSPACE
Once with the spread and use of computers and Internet on a larger scale, trafficking in persons has conquered a new space: cyberspace. The recruitment of victims through the Internet, the use of e-mails for the moral coercion of the victim and ultimately, the exploitation of victims with the purpose of obtaining widespread Internet pornography constitute human trafficking in cyberspace. This area of crime deployment raises many questions like: who will be criminally liable, which is the applicable law, which is the end point of the crime?computer crime, human trafficking
Internet Sex Crimes Against Minors: The Response of Law Enforcement.
The Internet1 and computers have come to play a growing role in sex crimes that are committed against children and youth.2 Since the mid-1990s these developing technologies have posed challenges for law enforcement requiring them to confront situations not anticipated in criminal statutes, master technical advances, develop new investigative techniques, and handle criminal cases that often span multiple jurisdictions. To assist, legislators have acted on a number of fronts creating new statutes that encompass Internet offenses, stiffening penalties, and creating a national clearinghouse for reports of Internet-related crimes against children and the CyberTipline® operated by the National Center for Missing & Exploited Children. In addition the federal government has increased funding in this area creating Internet Crimes Against Children Task Forces to support state and local law enforcement and specialized Internet, child-exploitation units in federal, law-enforcement agencies. Unfortunately the results of these initiatives are difficult to track. Criminaljustice authorities do not collect information specifically about Internet-related crimes. The National Juvenile Online Victimization (N-JOV) Study was undertaken to get a sense of the scope and types of law-enforcement activity in this area and serve as a baseline for monitoring the growth of Internet sex crimes against minors and related law-enforcement activities
Rage Against the Machines: How Subjects Learn to Play Against Computers
We use an experiment to explore how subjects learn to play against computers which are programmed to follow one of a number of standard learning algorithms. The learning theories are (unbeknown to subjects) a best response process, fictitious play, imitation, reinforcement learning, and a trial & error process. We test whether subjects try to influence those algorithms to their advantage in a forward-looking way (strategic teaching). We find that strategic teaching occurs frequently and that all learning algorithms are subject to exploitation with the notable exception of imitation. The experiment was conducted, both, on the internet and in the usual laboratory setting. We find some systematic differences, which however can be traced to the different incentives structures rather than the experimental environment.learning; fictitious play; imitation; reinforcement; trial & error; strategic teaching; Cournot duopoly; experiments; internet.
Trust among Internet Traders: A Behavioral Economics Approach
Standard economic theory does not capture trust among anonymous Internet traders. But when traders are allowed to have social preferences, uncertainty about a seller's morals opens the door for trust, reward, exploitation and reputation building. We report experiments suggesting that sellers' intrinsic motivations to be trustworthy are not sufficient to sustain trade when not complemented by a feedback system. We demonstrate that it is the interaction of social preferences and cleverly designed reputation mechanisms that solves to a large extent the trust problem on Internet market platforms. However, economic theory and social preference models tend to underestimate the difficulties of promoting trust in anonymous online trading communities.
Commercial and sexual exploitation of children and young people in the UK: a review
This paper reviews recent information and data relevant to the commercial sexual exploitation of children and young people in the UK. Three main aspects of exploitation are addressed: abuse through prostitution; abuse through pornography; and the trafficking of children and young people to and through the UK for the purposes of commercial sexual exploitation. Most published research in this area relates to young people exploited through prostitution. The review explores the range of vulnerability factors, the processes used to engage young people in prostitution and the types of support strategies for those being exploited. Rather less information is currently available on the scale of child pornography, or the links between the use of pornography and other forms of sexual abuse. The internet as a modern technology for proliferating child pornography is discussed, alongside its role in providing opportunities for paedophiles to access and 'groom' children for sexual purposes. Finally, the review provides a summary of research on trafficking of children to and through the UK for the purposes of commercial sexual exploitation and demonstrates the limited knowledge about this topic. Copyright © 2005 John Wiley & Sons, Ltd
- …
