1 / 46

Jennifer Coolbear, PhD, C. Psych The Suspected Child Abuse & Neglect (SCAN) Program

Understanding How Children/Youth are Victimized on the Internet: Assessment and Treatment of Child & Youth Victims of Internet Sex Crimes. Jennifer Coolbear, PhD, C. Psych The Suspected Child Abuse & Neglect (SCAN) Program. Objectives. How are children/youth victimized via the internet?

Download Presentation

Jennifer Coolbear, PhD, C. Psych The Suspected Child Abuse & Neglect (SCAN) Program

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Understanding How Children/Youth are Victimized on the Internet: Assessment and Treatment of Child & Youth Victims of Internet Sex Crimes Jennifer Coolbear, PhD, C. Psych The Suspected Child Abuse & Neglect (SCAN) Program

  2. Objectives • How are children/youth victimized via the internet? • Overview of the “Internet Sexual Exploitation Program” • Presentation of a Case study • Highlight current literature and practice themes • Practical recommendations

  3. Child/Youth Victimization • Child/Youth Sexual Abuse Images • Luring & Sexual Offences • Other forms of sexual victimization • Impact on families of child/youth victimization

  4. Images of direct sexual abuse of the child/youth that have been taken and are then distributed on the internet Children/youth whose caregivers have been charged with possession/distribution of child pornography Children/youth exposed to pornography intentionally or accidentally Child sexual abuse images

  5. Luring & Sexual Offences • It is a criminal offense to use a computer system to communicate with • A person under 18 years for the purpose of committing sexual exploitation or incest or sexual assault • A person under 16 years for the purpose of abduction (removal against the will of parent or guardian) • A person under 16 years for the purpose of committing sexual interference, invitation to sexual touching, bestiality or indecent exposure • A person for the purpose of committing a sexual assault

  6. Other forms of sexual victimization • Using on-line pornographic images to seduce/groom/desensitize a child/adolescent for the purpose of engaging in sexually abusive behaviour with the child/adolescent • Child/adolescent who has experienced unwanted on-line sexual activity • Peer victimization – images shared between peers – then sent over internet, images taken when youth intoxicated • Sexual contact via web-cam on the internet • Growing list…..

  7. Impact on Families • Distress and emotional upset of knowledge that child/youth has been victimized • Caregiver response to the child/youth • Understanding the nature of the victimization (e.g., internet technology) • Negotiating the “system” – police, CAS, SCAN (medical), assessment, treatment

  8. Examination of an empirically-based service model for the assessment & treatment of child/youth victims of internet sexual exploitation • Funded by the Ontario Victim Services Secretariat – Ministry of the Attorney General • Review literature • Consult with experts in the field of internet exploitation • Provide service to victims and their families – “The Internet Sexual Exploitation Program” • Disseminate knowledge to professionals in the community

  9. Goals of the Study • Improve the standard of care for child/youth victims of internet exploitation and their families • Develop a service model for children and youth as currently there is a paucity of assessment and treatment services to meet the unique needs of this population.

  10. Research Questions • What are the unique characteristics of this population? • What are the assessment and treatment needs of these victims and their families? • What characteristics (victim/victimization) differentiate nature and length of intervention? • What are the broader system responses to these victims, and how can system response be improved?

  11. Review of current literature • Law enforcement investigations • Offender characteristics • Crimes Against Children Research Center – research specific to online-victimization of teens • Specificity of services/unique approach for this population • Prevention strategies for youth on-line • Minimal on how to assess and/or treat victims

  12. Cases Referred to SCAN • Recent cases investigated by police and/or CAS • Child/youth sexual abuse images • Child/youth caregiver charged • Child/youth exposed intentionally or accidentally • No charges but concern for child/youth • Luring & sexual offences

  13. Assessment and Treatment • Medical assessment and treatment • Psychological assessment and treatment

  14. Medical Assessment/Treatment • Medical history taking • Assess for physical symptoms, suicidality/self-harm, depression, acute trauma • Physical examination • Forensic evidence collection • Emergency contraceptive pill • STI treatment • Crisis support • will not prove abuse/assault • can be done at anytime throughout assessment/treatment

  15. Psychological Assessment • 4 sessions • Children/youth and their families will complete demographic forms, standardized measures, and clinical interviews with the project clinician.

  16. Psychological Assessment • Nature of exploitation (details from multiple sources – e.g., parent, child/youth, police, CAS) • Child/adolescent’s overall functioning (home, school, community) • developmental history • History of maltreatment (physical, sexual, emotional, neglect)/trauma history

  17. Psychological Assessment • Self-harm, suicidal ideation • Social problems (e.g., poor peer relationships, social isolation, bullying) • Attentional problems/impulsivity • Stressful events, losses

  18. Psychological Assessment • Relevant contextual history (detailed description of the on-line relationship) • Type of disclosure (no disclosure, voluntary/involuntary disclosure) • Internet use (understanding of the internet, internet use and previous, current internet relationships)

  19. Assessing for risky online behaviour (Ybarra et al, 2007) • Do you talk online to unknown people about sex • Do you visit x-rated sites on purpose • Types of chat rooms (e.g., explicit sexual talk, sexual innuendo, fringe sites) • Do you download sexually explicit images from file-sharing programs • Do you send out personal information to unknown people that you met online

  20. Assessing for risky online behaviour (Ybarra et al, 2007) • Do you use the internet to make rude and nasty comments to others • Do you have unknown people on your buddy/friends list • Do you interact online with unknown people • Do you post personal information online

  21. Psychological Assessment Assessment Measures: • Behavior Assessment System for Children (BASC-II) – assess general emotional and behavioural functioning • Children’s Depression Inventory (CDI) • Trauma Symptom Checklist (TSI/TSCYC/TSCC) • Anxiety • Self-Esteem • PTSD

  22. Following assessment, a feedback session is coordinated with the family • Review assessment findings and any clinical concerns (anxiety, depression) • Provide an overview of therapeutic process of method of understanding the assault / abuse

  23. Treatment • 4-6 sessions, depending on the needs of the victim • based on a TF-CBT approach (trauma focused cognitive-behavioral therapy) that is consistent with other hospital-based treatment programs offering psychological services to children who have experienced trauma. Treatment modified to meet the unique needs of this population. • A psycho-educational component about the risks and impact of Internet use and exploitation is included in these sessions • Parenting/support sessions for non-offending parents.

  24. Case Example • 15 year old Maria • Facebook account – no privacy settings • Stated she lived in the GTA and was having issues with her parents • A “friend” contacted her • Began e-mailing and developed on-line relationship with 35 year old male

  25. Case - Maria • Communicating online for 2 months • Showed up at her house 11:30 pm with van … coerced her into having sex • Parents read diary -called police- not charged because consent issues and age • Perpetrator two young children

  26. Maria’s Assessment Medical Assessment – physical exam, STI testing, pregnancy test Psychological Assessment • Past abuse history • Use of internet in forming relationships • Measures • Consent issues • Disparity between parents perception and teens perception

  27. The chats • Chats may help to understand the methodical progression of manipulation of the relationship • The documented chats may allow one to think that the youth willingly participated and engaged in the discussion – look at it differently • Can be used therapeutically

  28. Maria – 15yrs old – 2 weeks • “if you want I could come get you around 11:30 and bring you back here for a couple of hours” • “I have really fallen for you in a way I have not felt in a long time and it hurts” • “Personally I don’t care about the age difference anymore I am past that, I am not afraid to say I am falling in love with you” • “I forgot to ask what is your whole mailing address? I want to send you some money for the phone and stuff. I will mail it and pretend I am someone from school who owes you money” • “You definitely have been emotionally abused”

  29. Maria • “I really wish I was younger. You know your family and friends will never ever except me. Ever” • “I am going to drop by your house and leave a pack of Plan B…I know we don’t want a baby (at least right now! :-)” • “BTW I have a book you might want to read it is a small pocket book about…you guessed it…sex, It has lots of full colour photos of couples and stuff. You might want to study it and then I will test you”

  30. Luring a modern day grooming? • identify weaknesses, provide support & advice • provides comfort, affection and understanding - Seek out youth who are susceptible to seduction • openly seduce and develop intimate relationships with them, discuss sexual topics • Progress to meet, usually with an expectation of sexual contact

  31. Treatment Issues • Relationship vs. trauma – how does the youth view it • Consent issues • Can youth really consent if they have been groomed • Pressured, coerced or intimidated to engage in sex • Youth may not be able to articulate this when asked by law enforcement • Vulnerability (self esteem, bullying, family issues) … isolation • On-going risky on-line and off-line behaviours • Healthy relationships and internet issues

  32. Themes of Treatment • Grooming process on-line, review emails • Understand intensity of relationships developed on-line & safety concerns • Deconstructing teens’ beliefs about the on-line “relationship” • Deconstructing teens’ beliefs about police and parent reaction • Understanding the function of teens’ deception in relationship • Consent to sexual activity

  33. Consent/Non-forcible Sex Crimes • Many are under-reported because youth may not view it as a crime, or themselves as a victim • Consensual/”voluntary” will be to varying degrees • Young adolescents have little experience with intimate relationships/romance • Lack ability to negotiate effectively with partners about sexual activity • Higher rates of coercive sexual activity • Concentration on more serious cases • Internet – pursue adult offenders 10 years or more older than underage victims (Wolak et al., 2004)

  34. Treatment Themes • Internet safety and risks, even when in place, do not seem to change behaviors (i.e. Friendships and relationships developed online are as real/meaningful as face-to-face relationships) • Perpetrators are not necessarily lying to adolescents about age or intention (“creepy guys would lie, good guys would be honest”) • High levels of trust – sharing secrets early • Biggest risk seems to be losing access to internet/phone/cell – not risks of being sexually exploited or assaulted

  35. Themes cont. • Noticeable difference in the population between children and adolescents • Children vulnerable to: • viewing images/having pictures/videos taken of them • be exploited by those in their ‘real’ life circle • Adolescents vulnerable to: • luring and grooming over the Internet (i.e. Webcams, chats) • be exploited by strangers and those they develop ‘relationships’ with online • Caregiver requires supportive assistance and psycho-education around the impact, prevention and risks of online victimization

  36. Treatment Themes - Caregiver • Common initial response • Take the computer away & no cell phone • Blocking software • Explaining the technology – work with police • Blaming, guilt, responsibility for failing to protect, should have identified • Discomfort in talking about issues • Understanding the issues – revictimization, pictures forever available

  37. Youth on-line themes • Emotionally isolated, abusive/unsupportive homes/peer groups, looking for acceptance, understanding and love • Little experience with intimate relationships – lack mature judgment & have limited emotional control • Interact in chat rooms to compensate for problems they have forming relationships offline (Peter et al, 2005) • Chat rooms are higher risk – live discussions

  38. Target most at-risk Youth(Wolak et al, 2008) • Youths with: • Histories of physical/sexual victimization off-line • conflict with parents • Mental health issues (e.g., depression, anxiety) • Delinquent tendencies • Struggle with social interaction/relationships • Pattern of risky on-line behaviour • Risky off-line behaviours • Sexual orientation • High risk youth in our service: • many have discussed suicide • 2 have had to be formed • Assess for patterns of risky online behaviour

  39. Change Prevention Strategies • “predators/strangers” • “predators lure young people into meetings” • “never give out personal information online” • “don’t have a social networking site or a personal web-page” • (CCRC, 2007)

  40. Prevention Strategies(Wolak et al, 2008) • Explain the Age of Consent • Talk to youth directly about the dynamics of internet-initiated and other non-forcible sex crimes • Direct discussions about seduction on-line and how adults evoke and exploit • Focus on healthy sexual development & avoiding on-line victimization

  41. Prevention Strategies(Wolak et al, 2008) • Focus on interactive aspects of Internet use-talking online about sex to unknown people • Empower youths to report inappropriate sexual discussions • Educate about child pornography & criminal behaviour • Reporting – www.cybertip.ca

  42. Inter Agency Collaboration • Case conferences • CAS • Police • Teachers • Mental health workers • Best Practices Document • Internet Child Exploitation Counseling Program

  43. In Summary • More research to understand victims • Evidence-based assessment/treatment programs are needed • Clinicians need to understand the risks • Clinicians working with high risk youth need to assess for risky online behaviour • Provide evidence-based prevention strategies

  44. Thank you • jennifer.coolbear@sickkids.ca • tanya.smith@sickkids.ca

  45. References • Finkelhor, D., Mitchell, KJ & Wolak J (2000). Online victimization: A report on the nation’s youth. Alexandria, VA: National Center for Missing & Exploited Children • Wolak J, Finkelhor D, Mitchell KJ & Ybarra ML. (2008). Online “Predators” and Their Victims: Myths, realities and implication for prevention and treatment. America Psychologist, 63(2): 111-128. • Wolak J, Mitchell K & Finkelhor D. (2006). Online victimization: 5 years later. Alexandria, VA: National Center of Missing and Exploited Children. • Wolak J, Finkelhor D & Mitchell KJ. (2004). Internet-initiated sex crimes against minors: Implications for prevention based on findings from a national study. Journal of Adolescent Health, 35, 424 e11-e20. • Wolak J, Finkelhor D & Mitchell KJ. (2005a). Child pornography possessors arrested in Internet-related crimes. Findings from the NJOV Study (NCMEC 06-05-023). • Ybarra ML, Mitchell K, Finkelhor D & Wolak J. (2007). Internet prevention messages: Are we targeting the right online behaviours?. Archives of Pedatric & Adolescent Medicine, 161, 138-145

More Related