The Quarterly Journal of Judicial Law Views

The Quarterly Journal of Judicial Law Views

The Components of the Optimal Preventive Criminal Policy Toward Sexual Victimization of Children in Cyberspace

Document Type : p

Authors
1 Assistant Professor of Shahed University Law Department
2 Doctoral student of criminal law and criminology of Mazandaran University
Abstract
The third millennium has confronted man with a space parallel to the real space, which is much wider and more accessible than that, a space that, in addition to the countless benefits it has for today's mankind, is also a platform that makes it easier to commit some crimes. In fact, the new human life in this space is exposed to serious threats, one of these threats in this space is the sexual abuse of children, children due to not having enough control over their actions and not being able to defend themselves against threats. Like the real world, they are considered one of the most vulnerable sections of the society, and this vulnerable situation of children requires the double attention of policymakers in the virtual world. In this article, information has been collected in a library form and analyzed using a descriptive analytical method. In order to prevent the sexual victimization of children in this space, the best policy is comprehensive and coherent global policies that will minimize the possibility of children being victimized in sexual crimes, the most important of these policies; Compilation of international treaties is the accession of all countries to these treaties, and domestic policies such as the formulation of special regulations in the field of children in cyberspace and on the other hand the control of entry and the level of access and quality of children in cyberspace should be taken into consideration. Due to the fact that we are at the beginning of the use of cyberspace, in line with the expansion of cyberspace, comprehensive and reliable preventive policies have not been adopted to prevent sexual abuse of children, both domestically and internationally.
.
Keywords

  • Ajeet Singh Poonia, Dr., & G. S. Awadesh Bhardwaj (2011), Dangayach the First International Conference on Interdisciplinary Research and Development, 31 May ـ 1 June 2011, Thailand.
  • Clarke, R. V. (1997), Situational Crime Prevention. Crime and Justice, 19, 91–150. http://www.jstor.org/stable/1147596
  • Cornish, D.B. (1994), The procedural analysis of offending and its relevance for situational prevention.
  • Chawki, M. (2009), “Online Child Sexual Abuse: The French Response”, Journal of Digital Forensics, Security and Law, Vol. 4, No. 4.
  • Coleman, C. (2003), “Security Cyberspace—New Laws and Developing Strategies”, Computer Law and Security Report, No.19(2).
  • Finkelhor, D., & R. Ormrod (2000), Characteristics of Crimes Against Juveniles, U.S. Department of Justice, Office of Juvenile Justice and Delinquency Prevention (OJJDP).
  • Falshaw, L., K. Browne & C. Hollin (1996), “Victim to Offender”, A Review. Aggression and Violent Behavior, No.1.
  • Folsom, Th. C. (2006), “Cyberspace Defining (Finding Real Virtue in the Place of Virtual Reality)”, Tulane Journal of Technology & Intellectual Property, Vol. 9, p. 75, 2007, Available at SSRN: https://ssrn.com/abstract=1350999 .
  • Fazio, L. De. (2016), “Young People and Cyberspace: Introduction”, Eur J Crim Policy Res, 22:211–217
  • Farrell, G. (2010), Repeat Victimization, Theories of. 10.4135/9781412979993.n259.
  • Kellermann, T. (2010), “Building a Foundation for Global Cybercrime law Enforcement”, Computer Fraud and Security, May, 5.
  • Keith, F., R.Durkin, & L. DeLong (2012), ‘Internet Crimes against Children”, in Encyclopedia of Cyber Behavior, vol. 1, Published in the United States of America by Information Science Reference (an imprint of IGI Global).
  • Mbanaso, U., & E. Dandaura (2015), “The Cyberspace: Redefining A New World”, Journal of Computer Engineering (IOSR ـ 17. 2278 ـ 661. 10.9790/0661 ـ 17361724).
  • Marzban, E., & A. Rezayan (2020), “Futures of Iranian Children and Teenagers Engagement in Cyberspace”, journal of cyberspace studies, vol. 4. No 2.
  • Marion, N. E. (2010), “The Council of Europe’s Cyber Crime Treaty: An exercise in Symbolic Legislation”, International Journal of Cyber Criminology, Vol. 4, Issue 1&2.
  • Ospina, M., Ch. Harstall & L. Dennett (2010), Sexual Exploitation of Children and Youth Over the Internet: A Rapid Review of the Scientific Literature, Institute of Health Economics in Canada.
  • ـ Pourmasjedian, F., & S. Ebrahimi (2021), “Legal Research on Protection of Child’s Privacy in Cyberspace with Overview on Iranian Laws and International Conventions”, Journal of Woman and Family Studies, No.8(4).
  • Poullet, Y. (2011), “e ـ Youth before its judges e Legal protection of minors in cyberspace”, Computer law & security review,2 7. 6 e2 0
  • Steinmetz, M. L. (2005), “Cyberspace crimes against children”, Senior Honors Theses & Projects. 79.https://commons.emich.edu/honors/79.
  • Stanley, J. (2001), Child Abuse and the Internet. Child Abuse Prevention Issues. 15.Published by the Australian institute of family studies. 1 ـ
  • Wolak, J., K. Mitchell & D. Finkelhor (2006), Online victimization of youth: Five years later. National Center for Missing & Exploited Children Bulletin ـ #07 ـ 06 ـ Alexandria, VA.

  • Receive Date 15 June 2023
  • Revise Date 08 December 2023
  • Accept Date 02 June 2024