Seven year-old Katherine Smith is frolicking in her yard on a bright incandescent day when forty-three year old James Wells, a family friend, arrives at her home. Being used to him as an uncle figure she envelops him in a warm welcoming hug. Meanwhile Katherine’s parents are indoors preparing supper and have not realized James has come over. When supper is ready Katherine’s parents call her to come in for supper; however, when she does not come running in, they step out to look for her. As they walk around the house they meet their friend James and a despondent Katherine who looks frightened. Katherine’s parents invite James to stay and have supper with them and are oblivious to what James, a trusted man and friend, has done to their little girl. As the week continues, Katherine’s parents notice she is not their same ecstatic and zestful little girl; when Katherine’s parents ask her what is wrong, she finally voices the truth and reveals the horrendous act that James has committed against her and also has threatened her if she tells. Katherine’s parents immediately take her to the family doctor and their suspicions are confirmed; James, their trusted friend, has molested their seven year old little girl. However, amongst their animosity toward their friend, Katherine’s parents contact a lawyer and James is arrested three days later. In court James is convicted and sentenced to only two years in jail; nine months, later James is out of jail for good behavior and is allowed to be in public and interact with other children. Child molesters are divided into two groups: situational or preferential offenders; child molesters have many tricks to trap children in their clutches, but there are also many useful precautionary methods to prot... ... middle of paper ... ... preferential offenders; child molesters have many tricks to trap children in their clutches, but there are also a variety of countless precautionary methods to protect children that are very helpful. Works Cited Davis, LauraMcshane, Marilyn D. “Controlling Computer Access To Pornography: Special Conditions For Sex Offenders.” Federal Probation 59.2 (1995): 43. MasterFILE Premier. Web. 27 Feb. 2014. Ebony. Aug2002, Vol. 57 Issue 10, p116. 3p. 3 Color Photographs. ELDERS, M. JOYCELYN. “How To Keep Your Child Safe From Sexual Abuse.” Heart & Soul 30 (1998): 62. MasterFILE Premier. Web. 27 Feb. 2014. Jenish, D.DeMont, J. “Every Parent’s Nightmare. (Cover Story).” Maclean’s 105.25 (1992): 24. Middle Search Plus. Web. 26 Feb. 2014. Sandell, Laurie. “Web Watchdog Parry Aftab’s Battle Against Online Crime.” Biography 5.5 (2001): 92. Middle Search Plus.web.27. Feb.2014.
Howitt, D., & Sheldon, K. (2007). Sex offenders and the internet. Retrieved from http://books.google.com/books?id=-XO_wPs6a-gC&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false, 60-61.
Cowan, Neil M. and Cowan, Ruth Schwartz, Our Parents' Lives. New York: New York Press, 1989.
Veysey, B. M. Zgoba, K. & Dalessandro, M. (2008). A preliminary step towards evaluating the impact of Megan’s Law: A trend analysis of sexual offenses in New Jersey from 1985 to 2005. Justice Research and Policy, 10(2), 1-18.
Pornography Under The Federal Sentencing Guidelines In The United States. Law & Contemporary Problems, 76(1), 27-52.
Sex offender legislation has been encouraged and written to protect the community and the people at large against recidivism and or to help with the reintegration of those released from prison. Nevertheless, a big question has occurred as to if the tough laws created help the community especially to prevent recidivism or make the situation even worse than it already is. Sex offenders are categorized into three levels for example in the case of the state of Massachusetts; in level one the person is not considered dangerous, and chances of him repeating a sexual offense are low thus his details are not made available to the public (Robbers, 2009). In level two chances of reoccurrence are average thus public have access to this level offenders through local police departments in level three risk of reoffense is high, and a substantial public safety interest is served to protect the public from such individuals.
of Sex Offenders Via the Internet. The John Marshal Journal of Computer and Information Law
Zilney, L. J., & Zilney, L. A. (2009). The Case of Megan Kanka. Perverts and predators: the making of sexual offending laws (p. 86-91). Lanham, Md.: Rowman & Littlefield.
Child pornography is a form of child sexual exploitation. Federal law defines child pornography as any visual depiction of sexual explicit could use images of child pornography are also referred to as child sexual abuse images.
“Simply having children does not make mothers,” said john A. Shedd (“John”). When it comes to child maltreatment this is especially true, if a parent does not know how to take care of a child, they can abuse or neglect their child. The definition that the Centers for disease Control and Prevention uses is, “Any act or series of acts of commission or omission by a parent or any other caregiver that results in harm, potential for harm, or threat of harm to a child.” Maltreatment can be split into two umbrella categories, acts of omission or acts of commission. Acts of omission are most commonly known as neglect, and can include not meeting the child’s physical, emotional, educational, or medical needs. An act of commission is most commonly physical abuse, but can also extend to the psychological or sexual abuse of a child (“Child Maltreatment”). Child maltreatment is a problem worldwide; the only way to stop it is to give parents a better understanding of the issue.
Rosen, Christine. "The Parents Who Don't Want To Be Adults." Commentary 127.7 (2009): 31. MAS Ultra - School Edition. Web. 13 Dec. 2013.
There are many different types of victims we have discussed over the course of this class, but we’re only going to talk about two types in the following paper. These two types of victims are common just as any another victim across America. These include sex assault victims and child abuse victims, which are both primary victims in cases. The two share a tie together, both are a victim of abuse and can cause lifelong consequences, but they also pose many differences as well. Many questions arise when talking about victims, for example why is a child or adult being abused and what are the life altering affects to these actions. Throughout this paper we discuss both sexual assault victims and child abuse victims and compare and contrast between the two.
Haley, Jacqueline. "Anonymity of Cyberstalkers: The Cyber-Watchdog's Tough Collar." Georgia State University College of Law May 2001.
Child Pornography, as stated in section 18 of the United States Constitution, defines child pornography as generally “any visual depiction involving the use of a minor in sexually explicit conduct.” Sexually explicit conduct is defined as “actual or simulated” sexual intercourse, which includes genital-genital, oral-genital, anal-genital, or anal-anal, “whether between persons of the same or opposite sex.” Sexually explicit conduct also entails the crucial “lascivious exhibition of genitals or pubic area,” which will be explored in more detail in the case study. Finally, section 18 depicts the transportation of such conduct through the use of computers. Basically, digital cameras, scanners, video capture cards etc. are all used to convert any image or such to the desired and needed format to easily store or transport child pornography.
To understand how to prevent child sexual abuse, one must begin by understanding what child sex abuse is. When a perpetrator intentionally harms a child physically, psychologically, sexually, or by acts of neglect, this crime is known as child abuse. Child sex abuse consists of any sexual activity that includes a minor. A child cannot consent to any form of sexual activity. More importantly, when a perpetrator engages with a child this way, they are committing a crime that can have lasting effects on the victim for years. Moreover, child sexual abuse does not need to include physical contact between a perpetrator and child, some forms include but not limited to; fondling, intercourse, sex trafficking, exposing oneself to a minor, masturbation
Wolf, Ulf. “Cyber-Crime: Law Enforcement Must Keep Pace With Tech-Savvy Criminals.” Digitalcommunities 27 Jan. 2009 .