Article Preview
TopIntroduction
The widespread dissemination and use of information and communication technologies (ICT) (Knights & Murray, 1994) in combination with technological advances have facilitated for individuals with a sexual interest in children to produce, download, distribute and exchange child abusive material (Taylor & Quayle, 2003; Sheldon & Howitt, 2007; Gillspie, 2008). Another characteristic of the technology is that it easily can be used to create networks where people with a sexual interest in children can meet other like-minded individuals (Thomas & Loader, 2000). Research shows that these kind of networks are considered important by people with a sexual interest in children, since they offer the possibility to share and exchange child abusive material regardless of national boundaries (Taylor & Quayle, 2003; Eneman, 2008). Murray (2006) highlights the dualistic nature of ICT and uses the metaphor of a double-edged sword. One could argue that, on the one side, the technology provides ‘perceived anonymity’ (Sheldon & Howitt, 2007) or ‘apparent cover of anonymity’ (Gillespie, 2008), accessibility and affordability. Another feature of the technology is that it reduces the social exposure for people downloading and distributing child abusive material (Taylor & Quayle, 2003; Adam, 2005; Eneman, 2008). Whilst, on the other side the technology offers powerful surveillance mechanisms that can be used to monitor these activities and thus constitute a powerful tool for law enforcement in crime detection (Gillespie, 2008; Lyon, 2006; Thomas & Loader, 2000). Contemporary surveillance systems have become less obvious and overt, and more systematic and subtle in our everyday life (Lyon, 2001; Haggerty, 2006). Consequently, even that people are aware of the risk of being monitored when downloading and/or distributing child abusive material, they do not know exactly when they are subject of surveillance or how comprehensive others’ knowledge of them actually is (Lyon, 1994).