SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
INSAFE CONFERENCE
PROMOTING INTERNET SAFETY GLOBALLY: CONNECTING GENERATIONS




                Plenary session 15th May, 2012


        SEXUALITY: JUST TWO SIDES TO THE COIN?

      SUPPOSITIONS, HOPES AND REALITIES – lessons
      learned from working with children abused online


                  Tink Palmer
           CEO, Marie Collins Foundation
                     Cyprus, May 2012




                 Marie Collins Foundation
Survey of Barnardo’s services November 2002/3
   Just one click! Report published in 2004

 •   Children who view adult pornography - 5
 •   Children abused through prostitution using the Internet and mobile phones to
     contact their abusers - 4
 •   Adults or young people who engage in ‘cyber sex’ with children - 0
 •   Children of adults who download or distribute sexually abusive images of
     children - 1
 •   Children groomed online for sexual abuse offline - 15
 •   Children sold online for sexual abuse offline - 7
 •   Young people who place images of other young people online - 0
 •   Children who download sexually abusive images of children - 22
 •   Children sold online for live sexual abuse online - 1
 •   Children made the subject of child abuse images - 28



                            Marie Collins Foundation
Children who view adult pornography - 5


•   Availability, quantity and nature of the subject matter
•   What might be the long term impact on their understanding of intimacy
    and sex in the context of personal relationships?
•   Chose to search for adult pornography or encouraged to do so by
    another?

•   Impacts on girls
•   Age at which they start viewing/time spent
•   I this a growing problem? - Portman clinic – referrals for problematic
    internet usage – 0% 1997 to 26% in 2010 – adult pornography
    addiction being the major reason for referral
•   Key issue is their current developmental stage and the impact such
    imagery has on the way they think, feel and behave
•   Case study


                        Marie Collins Foundation
Adults or young people who engage in
          cybersex with children - 0

•   No cases referred under this category but during treatment
    programmes it became apparent that cybersex has occurred
•   Predicted that young people would be most unlikely to report such
    abuse


•   No case reported as the presenting problem
•   Such behaviour on the part of the perpetrator tends to be part of the
    grooming repertoire
•   No child has volunteered this information during treatment – counsellor
    is required to introduce this as a possibility




                        Marie Collins Foundation
Children abused through prostitution using the internet and
     mobile phones to contact their abusers and children sold
             online for sexual abuse offline - 4 + 1 = 5


•    New technology changed the manner in which contact is made – more
     hidden, less risks
•    Young people “appear” to be pro-active in developing the relationship
•    They do not (“can not”) perceive themselves as victims
•    The perpetrator(s) ensures dependency through isolating, drugs, drink,
     cigarettes

•    Large increase in online activity since mobile phones internet
     connectivity
•    Generally perpetrators are working in groups – mobile technolgies used
     for frequent and quick communication amongst perpetrators and
     between perpetrators and children
•    What happens to the evidence?
•    Case example


                        Marie Collins Foundation
Children of adults who download or distribute
            abusive images of children - 1


•   Operation Ore – a need to understand better the relationship between viewing
    and commissioning further sexual offences against children
•   What risk does the adult pose to the children in the home?
•   Impacts on family dynamics
•   No research
•   Practice guidance needed

•   Rise in prosecutions
•   Better recognition of that the need to understand the relationship
    between viewing and doing is driven, not only by law enforcement but
    also by child protection agencies
•   Still a paucity of research – but we have some useful advances –
    Michael Seto et al
•   Little guidance on determining risk
•   Decisions are disparate regarding outcomes

                           Marie Collins Foundation
Children who download sexually abusive
             images of children - 22

•   Number of children seen as a cause for concern
•   Self initiated or introduced by another?
•   Current practice does not give time for an accurate assessment and for
    decision making regarding disposal of the matter

•   The research that we have to date reinforces the initial impression –
    namely that a significant number of young people are viewing abusive
    images of children – 30%+ -
•   Recognition for a timelydual assessment process
•   Assessment and intervention models developed
•   No universal application across the UK




                       Marie Collins Foundation
Young people who place images of other
           young people online = 0

•   Motivation – innocently sending an image to a friend,, intending to
    embarrass and humiliate someone, a bullying tool
•   Little reported regarding this behaviour

•   Sexting - the act of sending sexually explicit messages or photos
    electronically, primarily between cell phones (mobile phones)”
•   40% saw nothing wrong with a topless image and 15% saw nothing
    wrong with naked images - 27% of respondents said that sexting
    happens regularly or all of the time

•   ACPO lead on Child Protection and Abuse Investigations – position
    statement




                        Marie Collins Foundation
Children groomed online for sexual abuse
                offline/online - 15

•   Grooming scenario - Find out as much as they can about their potential
    victim, establish the risk and likelihood of child telling find out about
    child’s family and social network if “safe enough” will isolate their victim
    – may use flattery and promises or threats and blackmail – and get
    control
•   Give false information, including false self images
•   A muted understanding of the lack of inhibition
•   Reframe the grooming scenario
•   Victims are not going to report –of all the case I have worked with non
    self reported
•   Minimal information given when interviewed by the police
•   Formed online relationships 12/13 – age when abuse was discovered
    14/15 – nb . Vulnerable groups/vulnerable stages in development
•   Very few presented with a history of troubled backgrounds
•   Recovery is a long haul!
                         Marie Collins Foundation
What’s different online?
                                Yas – aged 14



•   “The internet is a weird version of the real world where you can do
    everything
•   Groomers don’t have to worry about seeming suspicious
•   Children can act like adults
•   I used people online to make me feel good
•   Girls use groomers to make them feel mature – groomers use girls for
    sex – it’s mutual using of one another
•   Girls get involved with men because nothing much seems to be
    happening when you’re 12-14 but you want to be older
•   The most talkative (girls) online are the quietest offline
•   The most normal (man) online is a real weirdo offline
•   We rarely talk about our behaviour online – kind of embarrassing”

                         Marie Collins Foundation
Quotes from children




•   “I would never have told anyone if the police hadn’t come
    knocking at our door. It turned out that they had arrested the
    bloke I was friends with online and had traced me through
    examining his computer. First off, I said they’d got the wrong
    person….I was terrified my mum and dad would know what I had
    been talking about….you don’t even talk to your friends about
    what you say online….somehow it seems a different world….one
    in which I can act like I’m 22 when I’m actually only 14”




                     Marie Collins Foundation
Children made the subjects of child abuse
                  images - 27

•   History – availability, old images, introduction of the digital camera
•   COPINE – monitored the online behaviour of sexual abusers within
    newsgroups
•   Numbers
•   Perpetrators’ strategies to silence children
•   My hope – very young children, criminal justice system response
•   Silence/denial
•   Recovery issues – impotence, shame, responsibility, non resolution of
    the abuse
•   Still little evidence base research regarding victims
•   Insufficient resources to open pandora’s box


                         Marie Collins Foundation
continued


• Data from NCMEC
•   Relationship of indentified victims to their abuser
•   1998-2010
•   3358 identified victims
•   66% known to the child
•   14% coerced through online grooming
•   14% self produced
•   3% human trafficker
•   3% unknown to the child – un-established relationships
•   The making of child abuse images is, in the main, an offline crime
    commtted by people known to the victims

•   The UK Sentencing Commission – victim statements


                        Marie Collins Foundation
Some thoughts



•   Lack of critical understanding of the harms posed by the new
    technologies
•   Lack of training, expertise and capacity to investigate such crimes
    against children, to protect them from harm and assist in their recovery.
•   Online and offline abuse of children are merged activities
•   Intervention is a form of prevention (secondary and tertiary)
•   Children are resilient – with the right help they can recover and lead
    safe lives
•   We need to consider vulnerability within the context of child
    development
•   We are not reaching the 11 to 14 year olds with the right messages
•   The children’s workforce – social workers, health, education, police –
    are not asking the pertinent questions – they need to because the
    children will not voluntarily tell


                        Marie Collins Foundation
Barriers to effective
    listening and to asking
    the relevant questions
                                         The Adult
                                    Own pain, experiences,
                    Personal         memories, sexuality.
                                 View of child/alleged abuser .
                                   Values, attitudes, beliefs

               Feelings         Pity, Horror, Shame, Distress,
                               Embarrassment, Anger, Disgust,
                                          Uncertainty

        Doubts                 Will I cope? Will I make it worse?
                                      Is it true? What next?

Professional          Practicalities ( time, other responsibilities etc.),
                   Knowledge, Skills, Confidence, Legislation, Language,
                        Support available, Possible repercussions.
tinkpalmer@mariecollinsfoundation.org.uk
          Mobile; 07825 501180

              Tink Palmer
                  CEO
        Marie Collins Foundation




          Marie Collins Foundation

Mais conteúdo relacionado

Mais procurados

Mc afee digital deception study 2013
Mc afee digital deception study 2013Mc afee digital deception study 2013
Mc afee digital deception study 2013PNMI
 
Synopsis of the baseline assessment
Synopsis of the baseline assessmentSynopsis of the baseline assessment
Synopsis of the baseline assessmentMohamed Rafique
 
Social Media Impact On Children
Social Media Impact On ChildrenSocial Media Impact On Children
Social Media Impact On Childrenjtheis22
 
Tackling Technology Assisted Harmful Sexual Behaviour - Education Scotland
Tackling Technology Assisted Harmful Sexual Behaviour - Education ScotlandTackling Technology Assisted Harmful Sexual Behaviour - Education Scotland
Tackling Technology Assisted Harmful Sexual Behaviour - Education ScotlandGeorgeMilliken2
 
Presentation 2
Presentation 2Presentation 2
Presentation 2bdonaghy
 
The Influence of Media and Technology on Our Children
The Influence of Media and Technology on Our ChildrenThe Influence of Media and Technology on Our Children
The Influence of Media and Technology on Our ChildrenAnne Soh
 
The Role of Social Media in Bullying and Teen Dating Violence PCA GA conference
The Role of Social Media in Bullying and Teen Dating Violence PCA GA conferenceThe Role of Social Media in Bullying and Teen Dating Violence PCA GA conference
The Role of Social Media in Bullying and Teen Dating Violence PCA GA conferenceGeorgia State School of Public Health
 
Start Strong - Building Healthy Teen Relationships thru Online Tools
Start Strong - Building Healthy Teen Relationships thru Online ToolsStart Strong - Building Healthy Teen Relationships thru Online Tools
Start Strong - Building Healthy Teen Relationships thru Online ToolsYTH
 
Adolescent social media -- Medical perspective
Adolescent social media -- Medical perspectiveAdolescent social media -- Medical perspective
Adolescent social media -- Medical perspectiveClinton Pong
 
Out Proud And Confident Peter Smith
Out Proud And Confident   Peter SmithOut Proud And Confident   Peter Smith
Out Proud And Confident Peter Smithguest99fbb
 
short-6december presentation-teen sex thesis
short-6december presentation-teen sex thesisshort-6december presentation-teen sex thesis
short-6december presentation-teen sex thesisEmilie Gomart
 
Making the Right Decision: Student Leadership to Change the World www.mannren...
Making the Right Decision: Student Leadership to Change the World www.mannren...Making the Right Decision: Student Leadership to Change the World www.mannren...
Making the Right Decision: Student Leadership to Change the World www.mannren...Mann Rentoy
 
Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jfJohn Field
 

Mais procurados (20)

Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Marta wojtas
Marta wojtasMarta wojtas
Marta wojtas
 
Andy Higgins (PACE)
Andy Higgins (PACE)Andy Higgins (PACE)
Andy Higgins (PACE)
 
Mc afee digital deception study 2013
Mc afee digital deception study 2013Mc afee digital deception study 2013
Mc afee digital deception study 2013
 
Youth, Sex & the Internet: What practitioners need to know
Youth, Sex & the Internet:  What practitioners need to knowYouth, Sex & the Internet:  What practitioners need to know
Youth, Sex & the Internet: What practitioners need to know
 
Synopsis of the baseline assessment
Synopsis of the baseline assessmentSynopsis of the baseline assessment
Synopsis of the baseline assessment
 
Social Media Impact On Children
Social Media Impact On ChildrenSocial Media Impact On Children
Social Media Impact On Children
 
Tackling Technology Assisted Harmful Sexual Behaviour - Education Scotland
Tackling Technology Assisted Harmful Sexual Behaviour - Education ScotlandTackling Technology Assisted Harmful Sexual Behaviour - Education Scotland
Tackling Technology Assisted Harmful Sexual Behaviour - Education Scotland
 
Presentation 2
Presentation 2Presentation 2
Presentation 2
 
The Influence of Media and Technology on Our Children
The Influence of Media and Technology on Our ChildrenThe Influence of Media and Technology on Our Children
The Influence of Media and Technology on Our Children
 
The Role of Social Media in Bullying and Teen Dating Violence PCA GA conference
The Role of Social Media in Bullying and Teen Dating Violence PCA GA conferenceThe Role of Social Media in Bullying and Teen Dating Violence PCA GA conference
The Role of Social Media in Bullying and Teen Dating Violence PCA GA conference
 
Templatecareers ppt madeline courtney
Templatecareers ppt madeline courtneyTemplatecareers ppt madeline courtney
Templatecareers ppt madeline courtney
 
Start Strong - Building Healthy Teen Relationships thru Online Tools
Start Strong - Building Healthy Teen Relationships thru Online ToolsStart Strong - Building Healthy Teen Relationships thru Online Tools
Start Strong - Building Healthy Teen Relationships thru Online Tools
 
Don't be invisible
Don't be invisibleDon't be invisible
Don't be invisible
 
Adolescent social media -- Medical perspective
Adolescent social media -- Medical perspectiveAdolescent social media -- Medical perspective
Adolescent social media -- Medical perspective
 
Out Proud And Confident Peter Smith
Out Proud And Confident   Peter SmithOut Proud And Confident   Peter Smith
Out Proud And Confident Peter Smith
 
short-6december presentation-teen sex thesis
short-6december presentation-teen sex thesisshort-6december presentation-teen sex thesis
short-6december presentation-teen sex thesis
 
Making the Right Decision: Student Leadership to Change the World www.mannren...
Making the Right Decision: Student Leadership to Change the World www.mannren...Making the Right Decision: Student Leadership to Change the World www.mannren...
Making the Right Decision: Student Leadership to Change the World www.mannren...
 
Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jf
 
Internet social
Internet socialInternet social
Internet social
 

Destaque

HMA TECH PORTFOLIO
HMA TECH PORTFOLIOHMA TECH PORTFOLIO
HMA TECH PORTFOLIOManoj Kumar
 
Broker Price Opinion, Price It Right!
Broker Price Opinion, Price It  Right!Broker Price Opinion, Price It  Right!
Broker Price Opinion, Price It Right!Marki Lemons Ryhal
 
BPO Operations Management
BPO Operations ManagementBPO Operations Management
BPO Operations ManagementSantosh Singh
 
Quality assurance-in-bpo
Quality assurance-in-bpoQuality assurance-in-bpo
Quality assurance-in-bpoPuneet B
 
Marketing 101 chapter2 building customer satisfaction
Marketing 101 chapter2 building customer satisfactionMarketing 101 chapter2 building customer satisfaction
Marketing 101 chapter2 building customer satisfactionMarivic Macale
 
Quality management in bpo
Quality management in bpoQuality management in bpo
Quality management in bpoGrm Venkatesh
 
Project on BPO
Project on BPOProject on BPO
Project on BPOVivek Saha
 
1 Quality Assurance Presentation
1 Quality Assurance Presentation1 Quality Assurance Presentation
1 Quality Assurance Presentationguest337c19
 
Quality Assurance in Hospitals
Quality Assurance in HospitalsQuality Assurance in Hospitals
Quality Assurance in HospitalsNc Das
 
Callcenter Training
Callcenter TrainingCallcenter Training
Callcenter Trainingvivaankumar
 
Quality control and quality assurance
Quality control and quality assuranceQuality control and quality assurance
Quality control and quality assuranceLeola Ramirez
 
Call centre presentation.ppt
Call centre presentation.pptCall centre presentation.ppt
Call centre presentation.pptKAFLAT
 
Quality Assurance Vs Quality Control
Quality Assurance Vs Quality ControlQuality Assurance Vs Quality Control
Quality Assurance Vs Quality ControlYogita patil
 
Quality Control
Quality ControlQuality Control
Quality Controlvishakeb
 

Destaque (20)

HMA TECH PORTFOLIO
HMA TECH PORTFOLIOHMA TECH PORTFOLIO
HMA TECH PORTFOLIO
 
Broker Price Opinion, Price It Right!
Broker Price Opinion, Price It  Right!Broker Price Opinion, Price It  Right!
Broker Price Opinion, Price It Right!
 
BPO Operations Management
BPO Operations ManagementBPO Operations Management
BPO Operations Management
 
Quality assurance-in-bpo
Quality assurance-in-bpoQuality assurance-in-bpo
Quality assurance-in-bpo
 
Marketing 101 chapter2 building customer satisfaction
Marketing 101 chapter2 building customer satisfactionMarketing 101 chapter2 building customer satisfaction
Marketing 101 chapter2 building customer satisfaction
 
Quality management in bpo
Quality management in bpoQuality management in bpo
Quality management in bpo
 
Operation management in Bpo
Operation management in BpoOperation management in Bpo
Operation management in Bpo
 
Project on BPO
Project on BPOProject on BPO
Project on BPO
 
2 quality assurance
2 quality assurance2 quality assurance
2 quality assurance
 
1 Quality Assurance Presentation
1 Quality Assurance Presentation1 Quality Assurance Presentation
1 Quality Assurance Presentation
 
Quality control
Quality controlQuality control
Quality control
 
Quality Assurance in Hospitals
Quality Assurance in HospitalsQuality Assurance in Hospitals
Quality Assurance in Hospitals
 
Callcenter Training
Callcenter TrainingCallcenter Training
Callcenter Training
 
Quality control and quality assurance
Quality control and quality assuranceQuality control and quality assurance
Quality control and quality assurance
 
QUALITY ASSURANCE
QUALITY ASSURANCEQUALITY ASSURANCE
QUALITY ASSURANCE
 
Call centre presentation.ppt
Call centre presentation.pptCall centre presentation.ppt
Call centre presentation.ppt
 
Quality Assurance Vs Quality Control
Quality Assurance Vs Quality ControlQuality Assurance Vs Quality Control
Quality Assurance Vs Quality Control
 
Bpo presentation
Bpo presentationBpo presentation
Bpo presentation
 
Quality Assurance & Control
Quality Assurance & ControlQuality Assurance & Control
Quality Assurance & Control
 
Quality Control
Quality ControlQuality Control
Quality Control
 

Semelhante a Tink palmer

Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationspringvillegi
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimesNilendra Kumar
 
DR JON GOLDIN - THE RISKS AND BENEFITS OF SOCIAL MEDIA ON THE MENTAL HEALTH O...
DR JON GOLDIN - THE RISKS AND BENEFITS OF SOCIAL MEDIA ON THE MENTAL HEALTH O...DR JON GOLDIN - THE RISKS AND BENEFITS OF SOCIAL MEDIA ON THE MENTAL HEALTH O...
DR JON GOLDIN - THE RISKS AND BENEFITS OF SOCIAL MEDIA ON THE MENTAL HEALTH O...iCAADEvents
 
Cranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura BatesCranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura BatesCranleigh School
 
A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...
A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...
A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...James Marsh
 
81-260-1 Chapter 13
81-260-1 Chapter 1381-260-1 Chapter 13
81-260-1 Chapter 13mpalaro
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measureskanika sharma
 
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year oldsRumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year oldsYTH
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentConnectSafely
 
Return Home Interview Intelligence
Return Home Interview IntelligenceReturn Home Interview Intelligence
Return Home Interview IntelligenceClaudia Megele
 
Sexting all schools handout no video.pptx
Sexting all schools handout no video.pptxSexting all schools handout no video.pptx
Sexting all schools handout no video.pptxkathy olsson
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateMarian Merritt
 
Christine Ann Raymond - Safeguarding Disabled Children Training Seminar - IEF...
Christine Ann Raymond - Safeguarding Disabled Children Training Seminar - IEF...Christine Ann Raymond - Safeguarding Disabled Children Training Seminar - IEF...
Christine Ann Raymond - Safeguarding Disabled Children Training Seminar - IEF...IEFE
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Larry Magid
 
YTHTechSex: An Exploration of Youth Sexual Health and the Digital Landscape
YTHTechSex: An Exploration of Youth Sexual Health and the Digital LandscapeYTHTechSex: An Exploration of Youth Sexual Health and the Digital Landscape
YTHTechSex: An Exploration of Youth Sexual Health and the Digital LandscapeYTH
 
Iowa Bullying Prevention
Iowa Bullying Prevention Iowa Bullying Prevention
Iowa Bullying Prevention emilyensign
 

Semelhante a Tink palmer (20)

Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
Keeping Children Safe Online
Keeping Children Safe OnlineKeeping Children Safe Online
Keeping Children Safe Online
 
DR JON GOLDIN - THE RISKS AND BENEFITS OF SOCIAL MEDIA ON THE MENTAL HEALTH O...
DR JON GOLDIN - THE RISKS AND BENEFITS OF SOCIAL MEDIA ON THE MENTAL HEALTH O...DR JON GOLDIN - THE RISKS AND BENEFITS OF SOCIAL MEDIA ON THE MENTAL HEALTH O...
DR JON GOLDIN - THE RISKS AND BENEFITS OF SOCIAL MEDIA ON THE MENTAL HEALTH O...
 
Cranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura BatesCranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura Bates
 
A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...
A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...
A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...
 
81-260-1 Chapter 13
81-260-1 Chapter 1381-260-1 Chapter 13
81-260-1 Chapter 13
 
Web safety
Web safetyWeb safety
Web safety
 
Trends and characteristics of youth Internet victimization
Trends and characteristics of youth Internet victimizationTrends and characteristics of youth Internet victimization
Trends and characteristics of youth Internet victimization
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measures
 
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year oldsRumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
Rumination, Cyberbullying, and the use of Cell Phones among 11 and 12 year olds
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
Return Home Interview Intelligence
Return Home Interview IntelligenceReturn Home Interview Intelligence
Return Home Interview Intelligence
 
Sexting all schools handout no video.pptx
Sexting all schools handout no video.pptxSexting all schools handout no video.pptx
Sexting all schools handout no video.pptx
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
Christine Ann Raymond - Safeguarding Disabled Children Training Seminar - IEF...
Christine Ann Raymond - Safeguarding Disabled Children Training Seminar - IEF...Christine Ann Raymond - Safeguarding Disabled Children Training Seminar - IEF...
Christine Ann Raymond - Safeguarding Disabled Children Training Seminar - IEF...
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
YTHTechSex: An Exploration of Youth Sexual Health and the Digital Landscape
YTHTechSex: An Exploration of Youth Sexual Health and the Digital LandscapeYTHTechSex: An Exploration of Youth Sexual Health and the Digital Landscape
YTHTechSex: An Exploration of Youth Sexual Health and the Digital Landscape
 
Iowa Bullying Prevention
Iowa Bullying Prevention Iowa Bullying Prevention
Iowa Bullying Prevention
 

Mais de Agencija za odgoj i obrazovanje - Education and Teacher Training Agency

Mais de Agencija za odgoj i obrazovanje - Education and Teacher Training Agency (20)

naslov
naslovnaslov
naslov
 
IzbornaNastava-TK-5.raz
IzbornaNastava-TK-5.razIzbornaNastava-TK-5.raz
IzbornaNastava-TK-5.raz
 
IzbornaNastava-TK-6.raz.
IzbornaNastava-TK-6.raz.IzbornaNastava-TK-6.raz.
IzbornaNastava-TK-6.raz.
 
IzbornaNastava-TK-8.raz
IzbornaNastava-TK-8.razIzbornaNastava-TK-8.raz
IzbornaNastava-TK-8.raz
 
IzbornaNastava-TK-7.raz
IzbornaNastava-TK-7.razIzbornaNastava-TK-7.raz
IzbornaNastava-TK-7.raz
 
Info@Edu 4_Trogir_2015
Info@Edu 4_Trogir_2015Info@Edu 4_Trogir_2015
Info@Edu 4_Trogir_2015
 
DaniTehnickeKulture_Trogir_2015.
DaniTehnickeKulture_Trogir_2015.DaniTehnickeKulture_Trogir_2015.
DaniTehnickeKulture_Trogir_2015.
 
Ucenje kroz igru (Maja Barbic)
Ucenje kroz igru (Maja Barbic)Ucenje kroz igru (Maja Barbic)
Ucenje kroz igru (Maja Barbic)
 
Sat kodiranja hour of code (Davor Banovic)
Sat kodiranja   hour of code (Davor Banovic)Sat kodiranja   hour of code (Davor Banovic)
Sat kodiranja hour of code (Davor Banovic)
 
Projekt karijernog savjetovanja ucenika (Renato Barisic)
Projekt karijernog savjetovanja ucenika (Renato Barisic)Projekt karijernog savjetovanja ucenika (Renato Barisic)
Projekt karijernog savjetovanja ucenika (Renato Barisic)
 
Pocetnica proogramiranja (Marina Cicin Sain i Snjezana Babic)
Pocetnica proogramiranja (Marina Cicin Sain i Snjezana Babic)Pocetnica proogramiranja (Marina Cicin Sain i Snjezana Babic)
Pocetnica proogramiranja (Marina Cicin Sain i Snjezana Babic)
 
Office mix (Zeljka Knezovic)
Office mix (Zeljka Knezovic)Office mix (Zeljka Knezovic)
Office mix (Zeljka Knezovic)
 
Office 365 za os i ss (Zeljka Knezovic)
Office 365 za os i ss (Zeljka Knezovic)Office 365 za os i ss (Zeljka Knezovic)
Office 365 za os i ss (Zeljka Knezovic)
 
Mema (Marina icin Sain i Snjezana Babic)
Mema (Marina icin Sain i Snjezana Babic)Mema (Marina icin Sain i Snjezana Babic)
Mema (Marina icin Sain i Snjezana Babic)
 
Ict4 scf (Darko Vencl)
Ict4 scf (Darko Vencl)Ict4 scf (Darko Vencl)
Ict4 scf (Darko Vencl)
 
Ict curricula (Viktorija Hrzica)
Ict curricula (Viktorija Hrzica)Ict curricula (Viktorija Hrzica)
Ict curricula (Viktorija Hrzica)
 
Code eu (Ivana Ruzic)
Code eu (Ivana Ruzic)Code eu (Ivana Ruzic)
Code eu (Ivana Ruzic)
 
Jezicni savjeti strucni ispit
Jezicni savjeti    strucni ispitJezicni savjeti    strucni ispit
Jezicni savjeti strucni ispit
 
GOO u nastavnim temama iz informatike u srednjoj skoli
GOO u nastavnim temama iz informatike u srednjoj skoliGOO u nastavnim temama iz informatike u srednjoj skoli
GOO u nastavnim temama iz informatike u srednjoj skoli
 
GOO u nastavnim temama iz informatike u osnovnoj skoli
GOO u nastavnim temama iz informatike u osnovnoj skoliGOO u nastavnim temama iz informatike u osnovnoj skoli
GOO u nastavnim temama iz informatike u osnovnoj skoli
 

Último

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 

Último (20)

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 

Tink palmer

  • 1. INSAFE CONFERENCE PROMOTING INTERNET SAFETY GLOBALLY: CONNECTING GENERATIONS Plenary session 15th May, 2012 SEXUALITY: JUST TWO SIDES TO THE COIN? SUPPOSITIONS, HOPES AND REALITIES – lessons learned from working with children abused online Tink Palmer CEO, Marie Collins Foundation Cyprus, May 2012 Marie Collins Foundation
  • 2. Survey of Barnardo’s services November 2002/3 Just one click! Report published in 2004 • Children who view adult pornography - 5 • Children abused through prostitution using the Internet and mobile phones to contact their abusers - 4 • Adults or young people who engage in ‘cyber sex’ with children - 0 • Children of adults who download or distribute sexually abusive images of children - 1 • Children groomed online for sexual abuse offline - 15 • Children sold online for sexual abuse offline - 7 • Young people who place images of other young people online - 0 • Children who download sexually abusive images of children - 22 • Children sold online for live sexual abuse online - 1 • Children made the subject of child abuse images - 28 Marie Collins Foundation
  • 3. Children who view adult pornography - 5 • Availability, quantity and nature of the subject matter • What might be the long term impact on their understanding of intimacy and sex in the context of personal relationships? • Chose to search for adult pornography or encouraged to do so by another? • Impacts on girls • Age at which they start viewing/time spent • I this a growing problem? - Portman clinic – referrals for problematic internet usage – 0% 1997 to 26% in 2010 – adult pornography addiction being the major reason for referral • Key issue is their current developmental stage and the impact such imagery has on the way they think, feel and behave • Case study Marie Collins Foundation
  • 4. Adults or young people who engage in cybersex with children - 0 • No cases referred under this category but during treatment programmes it became apparent that cybersex has occurred • Predicted that young people would be most unlikely to report such abuse • No case reported as the presenting problem • Such behaviour on the part of the perpetrator tends to be part of the grooming repertoire • No child has volunteered this information during treatment – counsellor is required to introduce this as a possibility Marie Collins Foundation
  • 5. Children abused through prostitution using the internet and mobile phones to contact their abusers and children sold online for sexual abuse offline - 4 + 1 = 5 • New technology changed the manner in which contact is made – more hidden, less risks • Young people “appear” to be pro-active in developing the relationship • They do not (“can not”) perceive themselves as victims • The perpetrator(s) ensures dependency through isolating, drugs, drink, cigarettes • Large increase in online activity since mobile phones internet connectivity • Generally perpetrators are working in groups – mobile technolgies used for frequent and quick communication amongst perpetrators and between perpetrators and children • What happens to the evidence? • Case example Marie Collins Foundation
  • 6. Children of adults who download or distribute abusive images of children - 1 • Operation Ore – a need to understand better the relationship between viewing and commissioning further sexual offences against children • What risk does the adult pose to the children in the home? • Impacts on family dynamics • No research • Practice guidance needed • Rise in prosecutions • Better recognition of that the need to understand the relationship between viewing and doing is driven, not only by law enforcement but also by child protection agencies • Still a paucity of research – but we have some useful advances – Michael Seto et al • Little guidance on determining risk • Decisions are disparate regarding outcomes Marie Collins Foundation
  • 7. Children who download sexually abusive images of children - 22 • Number of children seen as a cause for concern • Self initiated or introduced by another? • Current practice does not give time for an accurate assessment and for decision making regarding disposal of the matter • The research that we have to date reinforces the initial impression – namely that a significant number of young people are viewing abusive images of children – 30%+ - • Recognition for a timelydual assessment process • Assessment and intervention models developed • No universal application across the UK Marie Collins Foundation
  • 8. Young people who place images of other young people online = 0 • Motivation – innocently sending an image to a friend,, intending to embarrass and humiliate someone, a bullying tool • Little reported regarding this behaviour • Sexting - the act of sending sexually explicit messages or photos electronically, primarily between cell phones (mobile phones)” • 40% saw nothing wrong with a topless image and 15% saw nothing wrong with naked images - 27% of respondents said that sexting happens regularly or all of the time • ACPO lead on Child Protection and Abuse Investigations – position statement Marie Collins Foundation
  • 9. Children groomed online for sexual abuse offline/online - 15 • Grooming scenario - Find out as much as they can about their potential victim, establish the risk and likelihood of child telling find out about child’s family and social network if “safe enough” will isolate their victim – may use flattery and promises or threats and blackmail – and get control • Give false information, including false self images • A muted understanding of the lack of inhibition • Reframe the grooming scenario • Victims are not going to report –of all the case I have worked with non self reported • Minimal information given when interviewed by the police • Formed online relationships 12/13 – age when abuse was discovered 14/15 – nb . Vulnerable groups/vulnerable stages in development • Very few presented with a history of troubled backgrounds • Recovery is a long haul! Marie Collins Foundation
  • 10. What’s different online? Yas – aged 14 • “The internet is a weird version of the real world where you can do everything • Groomers don’t have to worry about seeming suspicious • Children can act like adults • I used people online to make me feel good • Girls use groomers to make them feel mature – groomers use girls for sex – it’s mutual using of one another • Girls get involved with men because nothing much seems to be happening when you’re 12-14 but you want to be older • The most talkative (girls) online are the quietest offline • The most normal (man) online is a real weirdo offline • We rarely talk about our behaviour online – kind of embarrassing” Marie Collins Foundation
  • 11. Quotes from children • “I would never have told anyone if the police hadn’t come knocking at our door. It turned out that they had arrested the bloke I was friends with online and had traced me through examining his computer. First off, I said they’d got the wrong person….I was terrified my mum and dad would know what I had been talking about….you don’t even talk to your friends about what you say online….somehow it seems a different world….one in which I can act like I’m 22 when I’m actually only 14” Marie Collins Foundation
  • 12. Children made the subjects of child abuse images - 27 • History – availability, old images, introduction of the digital camera • COPINE – monitored the online behaviour of sexual abusers within newsgroups • Numbers • Perpetrators’ strategies to silence children • My hope – very young children, criminal justice system response • Silence/denial • Recovery issues – impotence, shame, responsibility, non resolution of the abuse • Still little evidence base research regarding victims • Insufficient resources to open pandora’s box Marie Collins Foundation
  • 13. continued • Data from NCMEC • Relationship of indentified victims to their abuser • 1998-2010 • 3358 identified victims • 66% known to the child • 14% coerced through online grooming • 14% self produced • 3% human trafficker • 3% unknown to the child – un-established relationships • The making of child abuse images is, in the main, an offline crime commtted by people known to the victims • The UK Sentencing Commission – victim statements Marie Collins Foundation
  • 14. Some thoughts • Lack of critical understanding of the harms posed by the new technologies • Lack of training, expertise and capacity to investigate such crimes against children, to protect them from harm and assist in their recovery. • Online and offline abuse of children are merged activities • Intervention is a form of prevention (secondary and tertiary) • Children are resilient – with the right help they can recover and lead safe lives • We need to consider vulnerability within the context of child development • We are not reaching the 11 to 14 year olds with the right messages • The children’s workforce – social workers, health, education, police – are not asking the pertinent questions – they need to because the children will not voluntarily tell Marie Collins Foundation
  • 15. Barriers to effective listening and to asking the relevant questions The Adult Own pain, experiences, Personal memories, sexuality. View of child/alleged abuser . Values, attitudes, beliefs Feelings Pity, Horror, Shame, Distress, Embarrassment, Anger, Disgust, Uncertainty Doubts Will I cope? Will I make it worse? Is it true? What next? Professional Practicalities ( time, other responsibilities etc.), Knowledge, Skills, Confidence, Legislation, Language, Support available, Possible repercussions.
  • 16. tinkpalmer@mariecollinsfoundation.org.uk Mobile; 07825 501180 Tink Palmer CEO Marie Collins Foundation Marie Collins Foundation