1 / 17

Abuse via Technology

Abuse via Technology. Barbara Richardson-Todd. Technological Abuse. Abusive images of children (although these are not confined to the Internet). A child or young person being groomed for the purpose of sexual abuse. Exposure to pornographic or other offensive material on the Internet.

dash
Download Presentation

Abuse via Technology

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Abuse via Technology Barbara Richardson-Todd

  2. Technological Abuse • Abusive images of children (although these are not confined to the Internet). • A child or young person being groomed for the purpose of sexual abuse. • Exposure to pornographic or other offensive material on the Internet. • Cyberbullying

  3. Cyberbullying Being cruel to others by sending or posting harmfulmaterial using technological means; an individual or group that usesinformation and communication involvingelectronic technologies to facilitatedeliberate and repeated harassment orthreat to an individual or group.

  4. Differences BULLYING • DIRECT • Occurs on school property • Poor relationships with teachers • Fear retribution Physical: Hitting, Punching & Shoving Verbal: Teasing, Name calling & Gossip Nonverbal: Use of gestures & Exclusion www.stopbullyingnow.hrsa.gov CYBERBULLYING • ANONYMOUS • Occurs off school property • Good relationships with teachers • Fear loss of technology privileges • Further under the radar than bullying • Emotional reactions cannot be determined {McKenna & Bargh, 2004; Ybarra & Mitchell, 2004}

  5. WHAT • Viewing adult pornography • Abused through prostitution and/or trafficking – abusers use the Internet and mobile phones to control their victims • Made the subjects of abusive images • Groomed online and abused offline and/or online • Made the subjects of abusive images, groomed online and abused online and or offline • Young people displaying sexually harmful behaviours online • Young people presenting as gay, lesbian or bi-sexual online who are groomed online and sexually abused offline • Living in a household where a family member has been apprehended for viewing child abuse images

  6. Concerns • Becoming secretive about where they are going to or who they are meeting. • Will not let you see what they are accessing online. • Using a webcam in a closed area, away from other people. • Accessing the web or using a mobile or tablet for long periods and at all hours. • Clears the computer history every time they use it. • Receives unexpected money or gifts from people you don’t know.

  7. Who is Vulnerable? • There are few common indicators of vulnerability • It seems to be more about the stage of development of the child starting around 11 to 12 years of age • It may affect children of any age, sex and ethnicity • The risks are often from people known to them

  8. Findings from Clinical PracticeGIRLS • Victims are most unlikely to report the abuse that had occurred • Most say they would not have told anyone of the abuse had it not been discovered • 5 reasons for not telling • All gave minimal information on initial interview with police – many denied • Talking in any detail about what happened is very difficult • Shame, guilt, feeling conned, broken hearted • Formed online relationships with the offenders when 12/13 • Age when abuse was discovered 14/15 • Very few present with a history of troubled backgrounds • Recovery is a long haul – role of family cannot be under-estimated

  9. Findings - BOYS • Few facilities in the off-line environment for them – the internet is their refuge • 12/13 when first encountered abusers • Relief that there’s someone else “like them” • Eager and needy for relationships • Multiple engagements with abusing men • Reinforcement given through experiencing sex and a belief that their “friend/lover” understands them whereas their family and others around them don’t • Start coming out of the abyss around 16/17 years

  10. Barriers to effective listening and to asking the relevant questions The Adult Own pain, experiences, memories, sexuality. View of child/alleged abuser . Values, attitudes, beliefs Pity, Horror, Shame, Distress, Embarrassment, Anger, Disgust, Uncertainty Will I cope? Will I make it worse? Is it true? What next? Practicalities ( time, other responsibilities etc.), Knowledge, Skills, Confidence, Legislation, Language, Support available, Possible repercussions. Personal Feelings Doubts Professional

  11. What can be done? Talking to them about safety online, Supervise internet sessions andregularly check what children are doing online, Only allow use of certain websites, in a certain location/room, for a certain amount of time, at certain times of the day Check use of social networking sites, Don’t allow use of ‘chat’ programmes Use special software to filter / block access, Ensure access is password protected.

  12. If abused what can be done? • The young person needs to be believed • They need to be in a safe place • They need to be protected from contact with the perpetrator • Continuity and consistency of key workers is essential – they can act as role models

  13. TOP TIPS for Young People • IF you haven’t met them in real life don’t link to them. • Use a nickname online • Meeting up with an online friend can be dangerous • ALWAYS have a good look at the privacy settings • Look out for your friends online • Delete chain-mails - they're just rubbish.

  14. The Child Exploitation and Online Protection Centre (CEOP) is working to protect young people online by posting an icon on certain websites;  by clicking on this button help or advice can be  gained or suspicious behaviour reported.

  15. Acknowledgement Tink Palmer, CEO Marie Collins Foundation

More Related