메뉴 건너뛰기




Volumn 12, Issue 4, 2010, Pages 516-525

Policing Possession of Child Pornography Online: Investigating the Training and Resources Dedicated to the Investigation of Cyber Crime

Author keywords

child pornography; cyber crime; policing; task forces

Indexed keywords


EID: 84857531733     PISSN: 14613557     EISSN: 14781603     Source Type: Journal    
DOI: 10.1350/ijps.2010.12.4.201     Document Type: Article
Times cited : (31)

References (25)
  • 2
    • 85128955607 scopus 로고    scopus 로고
    • Retrieved May 29, 2010, from
    • CNN.com. (2010). Feds shut child porn social networking site. Retrieved May 29, 2010, from http://news.blogs.cnn.com/2010/05/27/feds-shut-child-porn-social-networking-site/?iref=allsearch.
    • (2010) Feds shut child porn social networking site
  • 6
    • 8844253975 scopus 로고    scopus 로고
    • Perceptions of local and state law enforcement concerning the role of computer crime investigative teams
    • Hinduja S. (2004). Perceptions of local and state law enforcement concerning the role of computer crime investigative teams. Policing: An International Journal of Police Strategies & Management, 27(3), 341–357.
    • (2004) Policing: An International Journal of Police Strategies & Management , vol.27 , Issue.3 , pp. 341-357
    • Hinduja, S.1
  • 8
    • 84900222383 scopus 로고    scopus 로고
    • Retrieved March 1, 2010, from
    • Kabay M. E. (2000). Studies and surveys of computer crime. Retrieved March 1, 2010, from http://www.securityportal.com/cover/coverstory20001211.html.
    • (2000) Studies and surveys of computer crime
    • Kabay, M.E.1
  • 9
  • 10
    • 23944446840 scopus 로고    scopus 로고
    • Alexandria, VA, American Bar Association Center on Children and the Law for the National Center for Missing & Exploited Children
    • Klain E. Davies H. Hicks M. (2001). Child pornography: The criminal justice system response. Alexandria, VA: American Bar Association Center on Children and the Law for the National Center for Missing & Exploited Children.
    • (2001) Child pornography: The criminal justice system response
    • Klain, E.1    Davies, H.2    Hicks, M.3
  • 11
    • 8844261949 scopus 로고    scopus 로고
    • How law enforcement cracks cyber crimes
    • Leibowitz W. R. (1999). How law enforcement cracks cyber crimes. New York Law Journal, 5.
    • (1999) New York Law Journal , pp. 5
    • Leibowitz, W.R.1
  • 12
    • 34548835751 scopus 로고    scopus 로고
    • Interpreting the intentions of internet predators: An analysis of online chat room transcripts
    • Marcum C. D. (2007). Interpreting the intentions of internet predators: An analysis of online chat room transcripts. Journal of Child Sexual Abuse, 16(4), 99–114.
    • (2007) Journal of Child Sexual Abuse , vol.16 , Issue.4 , pp. 99-114
    • Marcum, C.D.1
  • 14
    • 0040082973 scopus 로고    scopus 로고
    • Using the correct statistical test for the equality of regression coefficients
    • Paternoster R. Brame R. Mazerolle P. Piquero A. (1998). Using the correct statistical test for the equality of regression coefficients. Criminology, 36, 859–866.
    • (1998) Criminology , vol.36 , pp. 859-866
    • Paternoster, R.1    Brame, R.2    Mazerolle, P.3    Piquero, A.4
  • 15
    • 0037328260 scopus 로고    scopus 로고
    • Model of problematic internet use in people with a sexual interest in children
    • Quayle E. Taylor M. (2003). Model of problematic internet use in people with a sexual interest in children. CyberPsychology & Behavior, 6, 93–106.
    • (2003) CyberPsychology & Behavior , vol.6 , pp. 93-106
    • Quayle, E.1    Taylor, M.2
  • 19
    • 76149098346 scopus 로고    scopus 로고
    • Self-reported online child pornography behavior: A psychological analysis
    • Seigfried K. Lovely R. Rogers M. (2008). Self-reported online child pornography behavior: A psychological analysis. International Journal of Cyber Criminology, 2(1), 286–297.
    • (2008) International Journal of Cyber Criminology , vol.2 , Issue.1 , pp. 286-297
    • Seigfried, K.1    Lovely, R.2    Rogers, M.3
  • 20
    • 0036036094 scopus 로고    scopus 로고
    • Issues in cybersecurity: Understanding the potential risks associated with hackers/crackers
    • Smith A. Rupp W. (2002). Issues in cybersecurity: Understanding the potential risks associated with hackers/crackers. Information Management & Computer Security, 10(4), 178–183.
    • (2002) Information Management & Computer Security , vol.10 , Issue.4 , pp. 178-183
    • Smith, A.1    Rupp, W.2
  • 21
    • 60949088206 scopus 로고    scopus 로고
    • The Internet and abuse images of children: Search, precriminal situations and opportunity
    • Wortley R., Smallbone S., (eds), Monsey, N.Y, Criminal Justice Press/Willan Publishing, (Eds.), (., –
    • Taylor M. Quayle E. (2006). The Internet and abuse images of children: Search, precriminal situations and opportunity. In Wortley R. Smallbone S. (Eds.) Crime prevention studies: Vol. 19 Situational prevention of child sexual abuse (pp. 169–195). Monsey, N.Y: Criminal Justice Press/Willan Publishing.
    • (2006) Crime prevention studies: Vol. 19 Situational prevention of child sexual abuse , pp. 169-195
    • Taylor, M.1    Quayle, E.2
  • 24
    • 76149093946 scopus 로고    scopus 로고
    • Defining child pornography: Law enforcement dilemmas in investigations of internet child pornography possession
    • Wells M. Finkelhor D. Wolak J. Mitchell K. (2007). Defining child pornography: Law enforcement dilemmas in investigations of internet child pornography possession. Police Practice & Research, 8(3), 269–282.
    • (2007) Police Practice & Research , vol.8 , Issue.3 , pp. 269-282
    • Wells, M.1    Finkelhor, D.2    Wolak, J.3    Mitchell, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.