{"id":145,"date":"2023-11-20T14:06:04","date_gmt":"2023-11-20T14:06:04","guid":{"rendered":"https:\/\/staffblogs.le.ac.uk\/criminology\/?p=145"},"modified":"2025-02-26T13:38:39","modified_gmt":"2025-02-26T13:38:39","slug":"protecting-children-online","status":"publish","type":"post","link":"https:\/\/staffblogs.le.ac.uk\/criminology\/2023\/11\/20\/protecting-children-online\/","title":{"rendered":"Protecting Children Online"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"340\" height=\"404\" src=\"https:\/\/staffblogs.le.ac.uk\/criminology\/files\/2023\/06\/DiLevine.jpg\" alt=\"\" class=\"wp-image-96\" style=\"width:67px;height:auto\" srcset=\"https:\/\/staffblogs.le.ac.uk\/criminology\/files\/2023\/06\/DiLevine.jpg 340w, https:\/\/staffblogs.le.ac.uk\/criminology\/files\/2023\/06\/DiLevine-252x300.jpg 252w\" sizes=\"auto, (max-width: 340px) 100vw, 340px\" \/><\/figure>\n\n\n\n<p style=\"font-size:12px\">Di Levine &#8211; Assistant Professor\/Lecturer and Impact Lead, School of Criminology &amp; Research Associate (visiting researcher), Centre for Social Development in Africa, University of Johannesburg<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p style=\"font-size:14px\">Yesterday \u2013 19<sup>th<\/sup> November &#8211; was <a href=\"https:\/\/ispcan.org\/public-health-campaign\/\"><strong>World Day for the Prevention of Child Abuse<\/strong><\/a>. I would normally have said that \u2018this couldn\u2019t have come at a more prescient time\u2019 or something along those lines, but actually, <em>every<\/em> day is focused on the prevention of child abuse for social workers, teachers, organisations, policy makers, researchers, and survivors. However, while this is \u2018just another day\u2019 for many of us, it does offer us an opportunity to shine a light on the risks, protective, and promotive factors inherent in child protection systems at this particular moment in time.<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color wp-elements-e0e943676d144042fab15892f5e55d55\">&#8212;<\/p>\n\n\n\n<p style=\"font-size:14px\">And this particular moment in time appears to be digitally-mediated. There have been a number of reports in recent months representing the increasing importance of this aspect of child protection.<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color wp-elements-8083412f4bb3fcd3508327b19f4c890a\">,,,<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-size:14px\"><strong>Financial sexual extortion and AI-generated imagery<\/strong><\/h3>\n\n\n\n<p style=\"font-size:14px\">The <a href=\"https:\/\/www.weprotect.org\/global-threat-assessment-23\/#full-report\">We Protect Global Threat Assessment 2023<\/a> indicated that the volume of child sexual abuse material reports increased by 87% since 2019 (to 32 million reports). The nature of this abuse has also shifted in two regards. First, financial sexual extortion reports increased by 7,200% between 2021 and 2022 in the US. Second, AI-generated imagery is predicted to become a serious problem within a year, with <a href=\"https:\/\/www.iwf.org.uk\/about-us\/why-we-exist\/our-research\/how-ai-is-being-abused-to-create-child-sexual-abuse-imagery\/\">one study conducted by the Internet Watch Foundation<\/a> over a\u00a0 5-week period in early 2023 finding 29 URLs containing suspected AI-generated abuse images, of which seven contained child sexual abuse imagery. There are some early indications that boys and girls may have different forms of vulnerabilities in these emerging risk categories, with boys more at risk of financial sexual coercion than girls, and LGBTQ+ young people in the US more likely to stay in contact with someone who makes them uncomfortable online, claiming the friendship as the primary cause for maintaining the relationship. The report suggests three steps to reducing risks: i) investment in public health initiatives focusing on prevention, ii) centring children\u2019s rights and perspectives in intervention design and delivery, and iii) implementation of <em>globally<\/em>-aligned legislation. If you had asked me 15 years ago whether this last was necessary, I would have said \u2018no\u2019. Now, my personal perspective is that \u2018incentivising\u2019 platforms to reduce or eliminate harm is not far enough. We need legislative and regulatory tools that force platforms to implement \u2018safety by design\u2019 and painful sanctions if they are found to breach their responsibilities.<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color wp-elements-3ed1a65d90b2d73893f4f6cbb2501a16\">&#8230;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-size:14px\"><strong>Young survivors of CSEA want to understand themselves and others<\/strong><\/h3>\n\n\n\n<p style=\"font-size:14px\">In <a href=\"https:\/\/www.end-violence.org\/sites\/default\/files\/2023-01\/Disrupting%20Harm-Conversations%20with%20young%20survivors%20about%20online%20child%20sexual%20exploitation%20and%20abuse.pdf\">Disrupting Harm: Conversations with young survivors about online child sexual exploitation and abuse<\/a>, End Violence Against Children found 11 key messages emerged from young people focusing on both prevention and response. As is often the case, the participants made some points that have made many times before, but that we persist in ignoring or addressing only superficially in system change. Particularly striking for me were \u2018Help me understand myself\u2019, \u2018Online sexual exploitation does not take place in isolation\u2019, and \u2018Do not judge me\u2019. Understanding ourselves is about giving children the language <em>and<\/em> the structures to both understand themselves and articulate that understanding in relation to themselves and others. Our work on building a \u2018digital ethics of care\u2019 model (<a href=\"https:\/\/figshare.le.ac.uk\/collections\/Digital_Ethics_of_Care\/6338918\">pilot project<\/a>, <a href=\"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/02643944.2020.1774635?casa_token=X2tFqaLaddEAAAAA%3AKjn_T8hKySKL0G9rUEzFFiPQD1ol17eIdFWkQR3nxTAi-H1tT1d_fpq7hLeY83ACJXx5Rx7hnmtt\">adolescent-focused article<\/a>) takes steps in this direction. \u00a0The importance of multi-systemic approaches to tackling online sexual exploitation is exemplified in the second point. And the ways in which we work with \u2018youth advisors\u2019 or \u2018peer workers\u2019 is going to be fundamental in mitigating the risks of stigma and judgement.<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color wp-elements-3ed1a65d90b2d73893f4f6cbb2501a16\">&#8230;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-size:14px\"><strong>Platforms need to take more action and responsibility<\/strong><\/h3>\n\n\n\n<p style=\"font-size:14px\">Following on depressingly neatly, the most recent OECD benchmarking report on the top 50 online services &#8211; <a href=\"https:\/\/www.oecd.org\/digital\/transparency-reporting-on-child-sexual-exploitation-and-abuse-online-554ad91f-en.htm\">Transparency Reporting on Child Sexual Exploitation and Abuse Online<\/a> &#8211; has three key findings. First, a minority of services have suitable policies for managing child sexual abuse online. Of the 50 studied, only 10 have explicit policies on Child Sexual Exploitation and Abuse. Another 25 include general prohibitions on this kind of abuse, though without detailed explanations. Additionally, 15 services address child sexual abuse within broader prohibitions, while few define &#8220;child&#8221; or reference legal definitions. Second, of the 50 online services studies, only 20 issue Transparency Reports (TRs), and of those 20 the TRs vary wildly in terms of the data reported. Only 15 TRs provided proactive detection rates, with little detail on the violations in question. The lack of consistency means getting a clear sectoral and system view is very difficult. Finally, the benchmarking report found that there was limited and inconsistent information on content moderation. Of the 50 online services included, 29 used a combination of staff, automated tools, and user reporting. Only 16 of these offered detailed information about their detection methods. While 28 had policies for user notifications and appeals, these may not apply to violations like child sexual exploitation and abuse.<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color wp-elements-3ed1a65d90b2d73893f4f6cbb2501a16\">&#8230;<\/p>\n\n\n\n<p style=\"font-size:14px\"><strong>What can we DO?<\/strong><\/p>\n\n\n\n<p style=\"font-size:14px\">If you have a specific concern about a website, report it to the <a href=\"https:\/\/www.iwf.org.uk\/report\/\">Internet Watch Foundation<\/a>. <a href=\"https:\/\/www.internetmatters.org\/\">Keep talking<\/a> with your children\/young people, regardless of the role you play in their lives.<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color wp-elements-3ed1a65d90b2d73893f4f6cbb2501a16\">&#8230;<\/p>\n\n\n\n<p style=\"font-size:14px\">Keep the systems around them as flexible as possible, and help them to build a language to describe how they and others around them are feeling.<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color wp-elements-3ed1a65d90b2d73893f4f6cbb2501a16\">&#8230;<\/p>\n\n\n\n<p style=\"font-size:14px\">Access <a href=\"https:\/\/ispcan.org\/webinars\/breaking-barriers-with-song-the-global-impact-of-mbimbs-music-programme\/\">webinars<\/a> and <a href=\"https:\/\/ispcan.org\/ispcan-resources\/library\/downloadable-resource-library\/\">downloadable resources<\/a> via the International Society for the Prevention of Child Abuse and Neglect.<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color wp-elements-3ed1a65d90b2d73893f4f6cbb2501a16\">&#8230;<\/p>\n\n\n\n<p style=\"font-size:14px\">And put pressure on your local representative\/Member of Parliament to make online platforms take the responsibility they need to take \u2013 beyond lip service and committee formation &#8211; to keep our children safe and making the most of the riches of the internet. The <a href=\"https:\/\/bills.parliament.uk\/bills\/3137\">Online Safety Act<\/a> (2023) is only one small, and (<a href=\"https:\/\/www.nspcc.org.uk\/about-us\/news-opinion\/2023\/2023-09-19-the-online-safety-bill-has-been-passed-in-a-momentous-day-for-children\/\">some have argued flawed<\/a>) step in achieving the long term goals of digital child protection.<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color wp-elements-3ed1a65d90b2d73893f4f6cbb2501a16\">&#8230;<\/p>\n\n\n\n<p style=\"font-size:14px\">Digitally-mediated child abuse has lifelong physical, psychological, and social consequences. On this World Day for the Prevention of Child Abuse we need to take courageous action to break the cycle and ensure that children have the opportunity to grow up in safe and nurturing digital environments.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n","protected":false},"excerpt":{"rendered":"<p>Di Levine &#8211; Assistant Professor\/Lecturer and Impact Lead, School of Criminology &amp; Research Associate (visiting researcher), Centre for Social Development in Africa, University of Johannesburg Yesterday \u2013 19th November &#8211; was World Day for the Prevention of Child Abuse. I would normally have said that \u2018this couldn\u2019t have come at a more prescient time\u2019 or [&hellip;]<\/p>\n","protected":false},"author":341,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[159,155,156,160,18,154,157,158],"class_list":["post-145","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-ai","tag-child-protection","tag-child-protection-online","tag-child-sexual-exploitation-and-abuse","tag-criminology","tag-di-levine","tag-online","tag-world-day-for-the-prevention-of-child-abuse"],"_links":{"self":[{"href":"https:\/\/staffblogs.le.ac.uk\/criminology\/wp-json\/wp\/v2\/posts\/145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staffblogs.le.ac.uk\/criminology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/staffblogs.le.ac.uk\/criminology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/staffblogs.le.ac.uk\/criminology\/wp-json\/wp\/v2\/users\/341"}],"replies":[{"embeddable":true,"href":"https:\/\/staffblogs.le.ac.uk\/criminology\/wp-json\/wp\/v2\/comments?post=145"}],"version-history":[{"count":3,"href":"https:\/\/staffblogs.le.ac.uk\/criminology\/wp-json\/wp\/v2\/posts\/145\/revisions"}],"predecessor-version":[{"id":148,"href":"https:\/\/staffblogs.le.ac.uk\/criminology\/wp-json\/wp\/v2\/posts\/145\/revisions\/148"}],"wp:attachment":[{"href":"https:\/\/staffblogs.le.ac.uk\/criminology\/wp-json\/wp\/v2\/media?parent=145"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/staffblogs.le.ac.uk\/criminology\/wp-json\/wp\/v2\/categories?post=145"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/staffblogs.le.ac.uk\/criminology\/wp-json\/wp\/v2\/tags?post=145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}