Reference Hub6
Counter-Surveillance Strategies Adopted By Child Pornographers

Counter-Surveillance Strategies Adopted By Child Pornographers

Marie Eneman
Copyright: © 2009 |Volume: 5 |Issue: 4 |Pages: 17
ISSN: 1548-3908|EISSN: 1548-3916|ISSN: 1548-3908|EISBN13: 9781616920500|EISSN: 1548-3916|DOI: 10.4018/jthi.2009062501
Cite Article Cite Article

MLA

Eneman, Marie. "Counter-Surveillance Strategies Adopted By Child Pornographers." IJTHI vol.5, no.4 2009: pp.1-17. http://doi.org/10.4018/jthi.2009062501

APA

Eneman, M. (2009). Counter-Surveillance Strategies Adopted By Child Pornographers. International Journal of Technology and Human Interaction (IJTHI), 5(4), 1-17. http://doi.org/10.4018/jthi.2009062501

Chicago

Eneman, Marie. "Counter-Surveillance Strategies Adopted By Child Pornographers," International Journal of Technology and Human Interaction (IJTHI) 5, no.4: 1-17. http://doi.org/10.4018/jthi.2009062501

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

On the one side, it could be argued that ICT provide a perceived anonymity for people downloading and distributing child abusive material, also labelled child pornography. While, on the other side the technology offers powerful surveillance mechanisms to monitor these activities and thus constitutes a powerful tool for law enforcement. This article aims to explore how offenders manage the risk of surveillance when downloading, distributing and exchanging child abusive material. Critical research with a focus on panopticon is used as a theoretical framework. The data is drawn from interviews with offenders, convicted of child pornography. The findings show that the offenders have developed technological and social strategies to reduce the risk of surveillance and addresses the need of a new theoretical concept better adjusted to surveillance practices that allow the many to watch the many. The ultimate motivation for researching this topic is to contribute to the development of effective child protection strategies.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.