The Digital Economy: Potential, Perils, and Promises

Total Page:16

File Type:pdf, Size:1020Kb

The Digital Economy: Potential, Perils, and Promises The Digital Economy: Potential, Perils, and Promises A REPORT OF THE DIGITAL ECONOMY TASK FORCE MARCH 2014 CO-CHAIRS ERNIE ALLEN International Centre for Missing & Exploited Children STEVE RUBLEY Thomson Reuters VICE-CHAIR JOHN VILLASENOR The Brookings Institution/UCLA TABLE OF CONTENTS 1 TASK FORCE LISTING 3 PREFACE 5 INTRODUCTION 10 PREVENTING SEXUAL EXPLOITATION OF CHILDREN: A MULTI-FACETED APPROACH 11 LAW ENFORCEMENT 16 REGULATION 20 INTERAGENCY COORDINATION IN THE UNITED STATES 26 CONCLUSION AND FINAL RECOMMENDATIONS 29 GLOSSARY The Digital Economy: Potential, Perils and Promises A REPORT OF THE DIGITAL ECONOMY TASK FORCE TASK FORCE ON THE DIGITAL ECONOMY CO-CHAIRS TASK FORCE MEMBERS Ernie Allen César Alonso-Iriarte President and Chief Executive Officer, DG Home Affairs, International Centre for Missing & Exploited European Commission Children Jerry Brito Steve Rubley Senior Research Fellow and Director of Technology Managing Director, Government Segment, Policy Program, Thomson Reuters Mercatus Center at George Mason University Don Codling VICE-CHAIR President, CGI-LLC John Villasenor Nonresident Senior Fellow, The Brookings Institution Marina Colby Professor of Electrical Engineering and Public Senior Counter-Trafficking in Persons Fellow, Center Policy, UCLA for Excellence on Democracy, Human Rights and Governance, United States Agency for International Development POLICY ADVISORY GROUP Julie Cordua Luis CdeBaca Executive Director, Ambassador-at-Large, Office to Monitor and Combat Thorn: Digital Defenders of Children Trafficking in Persons, U.S. Department of State Cindy Dyer Vice President, Human Rights, The Honorable Paula J. Dobriansky Vital Voices Senior Fellow, Harvard University Belfer Center for Science and International Affairs and former Under Kate Friedrich Secretary of State for Democracy and Global Affairs Vice President, Government Affairs, Thomson Reuters Frances Fragos Townsend Executive Vice President at MacAndrews and Tom Kellermann, CISM Forbes Holdings, LLC. and former Homeland and Managing Director for Cyber Protection, Counterterrorism Security Advisor, The White House Alvarez & Marsal Juan Zarate Scott McCleskey Senior Adviser, Senior Advisor, Transnational Threats Project and Homeland Security The Ethisphere Institute and Counterterrorism Program 1 The Digital Economy: Potential, Perils and Promises A REPORT OF THE DIGITAL ECONOMY TASK FORCE Sheila Miller ACKNOWLEDGEMENTS Program Officer, Financial Services for the Poor Global Policy & Advocacy, Nancy Dube Bill & Melinda Gates Foundation Executive Vice President & Chief Operating Officer, Kelley Misata International Centre for Missing & Exploited Director of Outreach, Marketing & Communications, Children The Tor Project, Inc. Judith Grabski Cody Monk Project Manager, Digital Economy Task Force, Special Agent, International Centre for Missing & Exploited Federal Bureau of Investigation Children Patrick Murck Eliza Harrell General Counsel, Marketing Manager, Bitcoin Foundation International Centre for Missing & Exploited Children Neil J. O’Callaghan Section Chief, Sandra Marchenko Homeland Security Investigations Director, Koons Family Institute on International Cyber Crimes Center, Child Exploitation Law & Policy, Investigations Unit International Centre for Missing & Exploited Children Xiomara Ramos-Bonakdar AML Compliance Officer, Ellie Moseley Citigroup Senior Consultant, Strategy, Policy & Regulation Deloitte Ron Rowe Assistant to the Special Agent in Charge, Katherine Sagona-Stophel United States Secret Service, Criminal Government Analyst, Research, Investigative Division – Cyber Intelligence Section Thomson Reuters Special Services, LLC Maria C. Stephens Jason Thomas Chief, Innovation and Strategy, Thomson Reuters Special Services, LLC Mark Witzal Deputy Assistant Director for the Financial Narcotics and Special Operations Division, Homeland Security Investigations Veronica Zeitlin Human Trafficking and Gender Advisor, United States Agency for International Development 2 The Digital Economy: Potential, Perils and Promises A REPORT OF THE DIGITAL ECONOMY TASK FORCE PREFACE In 2013, the International Centre for Missing & Exploited Among the conclusions of the conference: cross-sector Children (ICMEC) and Thomson Reuters joined forces to communication and collaboration is vital to address a lead an effort focused on exploring the benefits and risks worldwide response to the growing digital economy. The of the emerging digital economy. DETF approached key stakeholders, ranging from web industry leaders to law enforcement officials and advocacy In June 2013, we co-hosted a one-day conference to organizations, to assess the risks and advantages of the discuss these key issues, which for the first time convened digital economy with the goal of offering informative and thought leaders from academia, government, the financial timely recommendations for those who seek to understand and web services industries, as well as the nonprofit sector. its impact on our world. Our shared belief in the power of innovation brought these At the first meeting of the DETF, members agreed that stakeholders together to address the economic opportunities use of digital economy tools and technologies for the that arise from the digital economy while confronting illicit victimization of children is morally abhorrent and of urgent activities from money laundering, to the illegal drug and importance. From this point, we set out to frame the policy weapons trade, to human sex trafficking, and more. This was discussion in a manner that enables the digital economy to the birth of the Digital Economy Task Force (DETF) and the grow while creating an inhospitable environment for those ongoing discussion of several pressing topics. who seek to abuse it. We realize that piecemeal regulation can’t tackle a global issue, but we believe these initial The technological frontier of the digital economy presents recommendations can lead to a broader exploration of these countless opportunities and challenges for the public and issues beyond this report. private sectors, including for example, the potential to provide financial tools for more of the world’s poor who Our hope is that the recommendations contained in are currently “unbanked.” It is also evident that new forms this report can lead to a worldwide policy debate of the of payment and trade continue to emerge – including digital economy. We need to inform decision makers digital currencies, prepaid cards, and alternative payment and digital pioneers in order to develop new methods systems, among others – where anonymity reigns and their and mechanisms for addressing these groundbreaking growth has been left largely unchecked. technologies. And we must create a coordinated and thoughtful approach in light of this global, technological While the growth of the digital economy can lead to many revolution. Together we can ensure that the potential of benefits, it also opens the door to those who seek new and the digital economy is not exploited by those who seek to profitable avenues to perpetrate illicit activities. The child use it for harm. pornography and sexual exploitation industries, in particular, are moving outside of traditional economic mechanisms and Our global community deserves no less. into the shadows of the digital world. It’s on this central issue that the DETF has decided to focus their effort. Ernie Allen Steve Rubley President & CEO Managing Director, Government Segment International Centre for Missing Thomson Reuters & Exploited Children 3 The Digital Economy: Potential, Perils and Promises A REPORT OF THE DIGITAL ECONOMY TASK FORCE The International Centre for Missing & Exploited Children (ICMEC), together with Thomson Reuters, have assembled a task force of leading experts from academia, think tanks and the private sector, as well as government representatives, to discuss the impact of the digital economy on illicit activity, particularly the sexual exploitation of children. The views expressed in this Report do not necessarily reflect a consensus among the task force members, nor do they necessarily reflect the views of the public and private organizations for whom the various task force members work. The text (but not the images) in this Report is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. 4 The Digital Economy: Potential, Perils and Promises A REPORT OF THE DIGITAL ECONOMY TASK FORCE INTRODUCTION While improving the quality of life for people around the address their potential misuse by those who conduct unlawful world, advances in digital technology and the growth of the activities. digital economy have also led to a rise in illicit activities including drug trafficking, money laundering, human Identification occurs when identifiers are collected that trafficking, and sexual exploitation of children. provide sufficient assurance of who a person or thing is. The identifiers that are “sufficient” for any given interaction, Technologies that facilitate online anonymity, such as transaction, or relationship can vary widely depending on bulletproof hosting, anonymizing networks, and anonymous context. Many formal and interpersonal interactions are fully payments systems, offer a particular challenge: balancing “identified;” meaning that the parties know who each other their use for positive social impact against their potential are. Because these interactions are more memorable and misuse by those who perpetrate illicit activities. important, many
Recommended publications
  • The Internet and Drug Markets
    INSIGHTS EN ISSN THE INTERNET AND DRUG MARKETS 2314-9264 The internet and drug markets 21 The internet and drug markets EMCDDA project group Jane Mounteney, Alessandra Bo and Alberto Oteo 21 Legal notice This publication of the European Monitoring Centre for Drugs and Drug Addiction (EMCDDA) is protected by copyright. The EMCDDA accepts no responsibility or liability for any consequences arising from the use of the data contained in this document. The contents of this publication do not necessarily reflect the official opinions of the EMCDDA’s partners, any EU Member State or any agency or institution of the European Union. Europe Direct is a service to help you find answers to your questions about the European Union Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). More information on the European Union is available on the internet (http://europa.eu). Luxembourg: Publications Office of the European Union, 2016 ISBN: 978-92-9168-841-8 doi:10.2810/324608 © European Monitoring Centre for Drugs and Drug Addiction, 2016 Reproduction is authorised provided the source is acknowledged. This publication should be referenced as: European Monitoring Centre for Drugs and Drug Addiction (2016), The internet and drug markets, EMCDDA Insights 21, Publications Office of the European Union, Luxembourg. References to chapters in this publication should include, where relevant, references to the authors of each chapter, together with a reference to the wider publication. For example: Mounteney, J., Oteo, A. and Griffiths, P.
    [Show full text]
  • An Evolving Threat the Deep Web
    8 An Evolving Threat The Deep Web Learning Objectives distribute 1. Explain the differences between the deep web and darknets.or 2. Understand how the darknets are accessed. 3. Discuss the hidden wiki and how it is useful to criminals. 4. Understand the anonymity offered by the deep web. 5. Discuss the legal issues associated withpost, use of the deep web and the darknets. The action aimed to stop the sale, distribution and promotion of illegal and harmful items, including weapons and drugs, which were being sold on online ‘dark’ marketplaces. Operation Onymous, coordinated by Europol’s Europeancopy, Cybercrime Centre (EC3), the FBI, the U.S. Immigration and Customs Enforcement (ICE), Homeland Security Investigations (HSI) and Eurojust, resulted in 17 arrests of vendors andnot administrators running these online marketplaces and more than 410 hidden services being taken down. In addition, bitcoins worth approximately USD 1 million, EUR 180,000 Do in cash, drugs, gold and silver were seized. —Europol, 20141 143 Copyright ©2018 by SAGE Publications, Inc. This work may not be reproduced or distributed in any form or by any means without express written permission of the publisher. 144 Cyberspace, Cybersecurity, and Cybercrime THINK ABOUT IT 8.1 Surface Web and Deep Web Google, Facebook, and any website you can What Would You Do? find via traditional search engines (Internet Explorer, Chrome, Firefox, etc.) are all located 1. The deep web offers users an anonym- on the surface web. It is likely that when you ity that the surface web cannot provide. use the Internet for research and/or social What would you do if you knew that purposes you are using the surface web.
    [Show full text]
  • Honeypots: Not for Winnie the Pooh But
    2018] 259 HONEYPOTS: NOT FOR WINNIE THE POOH BUT FOR WINNIE THE PEDO — LAW ENFORCEMENT’S LAWFUL USE OF TECHNOLOGY TO CATCH PERPETRATORS AND HELP VICTIMS OF CHILD EXPLOITATION ON THE DARK WEB Whitney J. Gregory* Cruelty, like every other vice, requires no motive outside itself—it only requires opportunity.1 INTRODUCTION Lawyers, doctors, teachers, politicians, and Hollywood stars—what do they all have in common? Smarts? Success? Wealth? Respect in their com- munities? Demonstrating the terrible divergence between appearance and re- ality, some members of these professions are also frequent customers and producers of child pornography. Contrary to what some may assume, child pornographers are not just antisocial, out-of-work, reclusive basement dwellers. They may be people you would least expect.2 Take, for instance, the teen heartthrob Mark Salling, who starred on Fox’s hit show Glee as handsome bad-boy Puck from 2009 to 2015. Twenty-fifteen was also the year Salling was arrested and charged * Antonin Scalia Law School at George Mason University, J.D. Candidate, May 2019; Articles Editor, George Mason Law Review, 2018–19. This Comment is dedicated to the memory of my grandfa- ther Guido A. Ianiero. 1 George Eliot, Janet’s Repentance, in SCENES OF CLERICAL LIFE 102, 146 (Harper & Bros. 1858). 2 Judges have described child pornography defendants as seemingly ordinary, even upstanding, men (and a few women). “The defendants’ professional careers [are] often highlighted, including Air Force Captain, physician, trust specialist, and teacher.” Melissa Hamilton, The Efficacy of Severe Child Pornography Sentencing: Empirical Validity or Political Rhetoric?, 22 STAN.
    [Show full text]
  • USA -V- Julian Assange Judgment
    JUDICIARY OF ENGLAND AND WALES District Judge (Magistrates’ Court) Vanessa Baraitser In the Westminster Magistrates’ Court Between: THE GOVERNMENT OF THE UNITED STATES OF AMERICA Requesting State -v- JULIAN PAUL ASSANGE Requested Person INDEX Page A. Introduction 2 a. The Request 2 b. Procedural History (US) 3 c. Procedural History (UK) 4 B. The Conduct 5 a. Second Superseding Indictment 5 b. Alleged Conduct 9 c. The Evidence 15 C. Issues Raised 15 D. The US-UK Treaty 16 E. Initial Stages of the Extradition Hearing 25 a. Section 78(2) 25 b. Section 78(4) 26 I. Section 78(4)(a) 26 II. Section 78(4)(b) 26 i. Section 137(3)(a): The Conduct 27 ii. Section 137(3)(b): Dual Criminality 27 1 The first strand (count 2) 33 The second strand (counts 3-14,1,18) and Article 10 34 The third strand (counts 15-17, 1) and Article 10 43 The right to truth/ Necessity 50 iii. Section 137(3)(c): maximum sentence requirement 53 F. Bars to Extradition 53 a. Section 81 (Extraneous Considerations) 53 I. Section 81(a) 55 II. Section 81(b) 69 b. Section 82 (Passage of Time) 71 G. Human Rights 76 a. Article 6 84 b. Article 7 82 c. Article 10 88 H. Health – Section 91 92 a. Prison Conditions 93 I. Pre-Trial 93 II. Post-Trial 98 b. Psychiatric Evidence 101 I. The defence medical evidence 101 II. The US medical evidence 105 III. Findings on the medical evidence 108 c. The Turner Criteria 111 I.
    [Show full text]
  • Julian Assange Judgment
    JUDICIARY OF ENGLAND AND WALES District Judge (Magistrates’ Court) Vanessa Baraitser In the Westminster Magistrates’ Court Between: THE GOVERNMENT OF THE UNITED STATES OF AMERICA Requesting State -v- JULIAN PAUL ASSANGE Requested Person INDEX Page A. Introduction 2 a. The Request 2 b. Procedural History (US) 3 c. Procedural History (UK) 4 B. The Conduct 5 a. Second Superseding Indictment 5 b. Alleged Conduct 9 c. The Evidence 15 C. Issues Raised 15 D. The US-UK Treaty 16 E. Initial Stages of the Extradition Hearing 25 a. Section 78(2) 25 b. Section 78(4) 26 I. Section 78(4)(a) 26 II. Section 78(4)(b) 26 i. Section 137(3)(a): The Conduct 27 ii. Section 137(3)(b): Dual Criminality 27 1 The first strand (count 2) 33 The second strand (counts 3-14,1,18) and Article 10 34 The third strand (counts 15-17, 1) and Article 10 43 The right to truth/ Necessity 50 iii. Section 137(3)(c): maximum sentence requirement 53 F. Bars to Extradition 53 a. Section 81 (Extraneous Considerations) 53 I. Section 81(a) 55 II. Section 81(b) 69 b. Section 82 (Passage of Time) 71 G. Human Rights 76 a. Article 6 84 b. Article 7 82 c. Article 10 88 H. Health – Section 91 92 a. Prison Conditions 93 I. Pre-Trial 93 II. Post-Trial 98 b. Psychiatric Evidence 101 I. The defence medical evidence 101 II. The US medical evidence 105 III. Findings on the medical evidence 108 c. The Turner Criteria 111 I.
    [Show full text]
  • Sex, Drugs, and Bitcoin: How Much Illegal Activity Is Financed Through Cryptocurrencies? *
    Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies? * Sean Foley a, Jonathan R. Karlsen b, Tālis J. Putniņš b, c a University of Sydney b University of Technology Sydney c Stockholm School of Economics in Riga January, 2018 Abstract Cryptocurrencies are among the largest unregulated markets in the world. We find that approximately one-quarter of bitcoin users and one-half of bitcoin transactions are associated with illegal activity. Around $72 billion of illegal activity per year involves bitcoin, which is close to the scale of the US and European markets for illegal drugs. The illegal share of bitcoin activity declines with mainstream interest in bitcoin and with the emergence of more opaque cryptocurrencies. The techniques developed in this paper have applications in cryptocurrency surveillance. Our findings suggest that cryptocurrencies are transforming the way black markets operate by enabling “black e-commerce”. JEL classification: G18, O31, O32, O33 Keywords: blockchain, bitcoin, detection controlled estimation, illegal trade * We thank an anonymous referee, Andrew Karolyi, Maureen O’Hara, Paolo Tasca, Michael Weber, as well as the conference/seminar participants of the RFS FinTech Workshop of Registered Reports, the Behavioral Finance and Capital Markets Conference, the UBS Equity Markets Conference, and the University of Technology Sydney. Jonathan Karlsen acknowledges financial support from the Capital Markets Co-operative Research Centre. Tālis Putniņš acknowledges financial support from the Australian Research Council (ARC) under grant number DE150101889. The Online Appendix that accompanies this paper can be found at goo.gl/GvsERL Send correspondence to Tālis Putniņš, UTS Business School, University of Technology Sydney, PO Box 123 Broadway, NSW 2007, Australia; telephone: +61 2 95143088.
    [Show full text]
  • Says a Friend of Benthall's
    54 I At 3:15 P.M. on October 1, 2013, Ross Ulbricht’s career as a drug kingpin came to an end in the science- fiction section of San Francisco’s Glen Park Library. The 29-year- old had walked up the steps just inside the modern stone building, passed the librarian working at the circula- tion desk and taken a seat at a far corner table near a window. It was a sunny day, but the small community library was filled with people. Ulbricht, with his easy smile and thick mop of brown hair, was dressed in blue jeans web of lies_ AN UNDERGROUND, ANONYMOUS INTERNET— THE DEEP WEB—IS THE LAST LAWLESS FRONTIER ON EARTH. BUT NOTHING COULD SAVE ITS KINGPINS FROM THE PAINFUL CONSEQUENCES OF HUMAN ERROR BY JOSHUA HUNT and a T-shirt. The hand- ful of people reading and wandering among rows of novels nearby weren’t dressed much differently, but beneath their shirts and jackets they wore vests that identified them as FBI agents. Until the moment they rushed Ulbricht, pushing him up against a window to handcuff him as other agents seized his laptop before he could lock it down, nobody suspected anything out of place. The cuffs went on and a small crowd gathered, but Ulbricht just looked out at the afternoon sun. Ulbricht was an educated person, with a master’s degree in 55 materials science and engi- neering from Penn State. He was a good son from a good Texas family, an un- likely addition to the list of men who had changed the shape and scale of drug distribution in Amer- ica.
    [Show full text]
  • Deepweb and Cybercrime It’S Not All About TOR
    A Trend Micro Research Paper Deepweb and Cybercrime It’s Not All About TOR Vincenzo Ciancaglini, Marco Balduzzi, Max Goncharov, and Robert McArdle Forward-Looking Threat Research Team Trend Micro | Deepweb and Cybercrime Contents Abstract ..................................................................................................................................................3 Introduction ...........................................................................................................................................3 Overview of Existing Deepweb Networks ......................................................................................5 TOR ............................................................................................................................................5 I2P ...............................................................................................................................................6 Freenet .......................................................................................................................................7 Alternative Domain Roots ......................................................................................................7 Cybercrime in the TOR Network .......................................................................................................9 TOR Marketplace Overview ..................................................................................................9 TOR Private Offerings ..........................................................................................................14
    [Show full text]
  • Troll Hunting
    For my father, Brian, who taught me to love wor ds. Hell is empty, and all the devils are here. William Shakespeare, The Tempest, Act 1, Scene 2 THIS IS A work of nonfiction, researched and documented to the best of my ability. There were significant security risks in writing this book. I sought expert advice and wrote according to it. Therefore, some of the trolling syndicates mentioned within these pages have been given pseudonyms or go unnamed. Likewise, some of the trolls themselves are discussed only with a pseudonym. A few of the trolls who spoke to me behind the scenes are not named at all and others are composites or have been segmented. Some readers may be critical of the decision to provide anonymity for people who are hurting others so much. However, sometimes access to information comes at a cost – and, all things being equal, the trolls gave me great access. By the same token, some predator-troll victims are in physical danger. This is especially true where domestic violence is involved. In those cases, names and other identifying details may have been altered but the facts of the stories are unchanged. I have worked hard to quote all interviewees verbatim, but for the sake of readability have corrected some spelling errors and syntax. When I’m messaging with trolls in the United States, I use Australian spelling and they use American spelling. For authenticity, I’ve left this as is. This is a book about the internet and how it bleeds into real life. When quoting links and screenshots, I’ve aimed for accuracy.
    [Show full text]
  • 20120906Wdlawyss(Dre
    US Justice: Print Friendly Version Page 1 of 3 Home » Briefing Room » Justice News Department of Justice Office of Public Affairs FOR IMMEDIATE RELEASE Thursday, September 6, 2012 Third Dreamboard Member Sentenced to Life in Prison for Participating in International Criminal Network Organized to Sexually Exploit Children WASHINGTON – A Wisconsin man was sentenced today to life in prison for his participation in an international criminal network, known as Dreamboard, dedicated to the sexual abuse of children and the creation and dissemination of graphic images and videos of child sexual abuse throughout the world, announced Assistant Attorney General Lanny A. Breuer of the Justice Department’s Criminal Division, U.S. Attorney Stephanie Finley of the Western District of Louisiana and Director of U.S. Immigration and Customs Enforcement (ICE) John Morton. John Wyss, aka “Bones,” 55, of Monroe, Wis., was sentenced by U.S. District Judge Maurice Hicks in the Western District of Louisiana. On May 17, 2012, Wyss was found guilty after trial of one count of engaging in a child exploitation enterprise, one count of conspiracy to advertise child pornography and one count of conspiracy to distribute child pornography. Evidence presented at trial revealed that Wyss had been an active member of Dreamboard, an online child pornography bulletin board, since January 2008 and had made numerous postings revealing that he had produced child pornography by capturing images of minors engaging in sexually explicit activity via webcam, including one video in which adult males were engaged in sexual intercourse with prepubescent girls. Wyss was charged in an indictment unsealed on Aug.
    [Show full text]
  • Child Sexual Exploitation and Abuse
    ChildFund Rapid Review of Online Safety Risks: Full Report April 2020 Table of Contents Glossary Executive Summary COVID-19 COVID-19 Impact on CSE and CSA - Interpol COVID-19, Children at Increased Risk How children (10-18) experienced online risks during the Covid-19 lockdown Surge in reports in UK during COVID-19 Online child sex abuse cases triple under lockdown in Philippines NetClean Report 2020 NGO / CSO Reports International Child Sexual Exploitation database Canada Cybertip.ca Analysis Online Sexual Exploitation of Children in the Philippines Rapid Evidence Assessment Measuring the scale and changing nature of child sexual abuse and child sexual exploitation Factsheet: Child Sexual Exploitation and Abuse What Works to Prevent Online and Offline Child Sexual Exploitation and Abuse? Child Online Protection in India Out of the shadows: Shining light on the response to child sexual abuse and exploitation Child Online Protection in Rwanda Child Online Protection in the MENA Region Global Threat Assessment Operation Delego and Dreamboard Child Online Safety Index (COSI) The State of the World’s Children 2017: Children in a Digital World GlobalKids Argentina GlobalKids Brazil GlobalKids Ghana GlobalKids Uruguay GlobalKids Chile Meta-Analysis / Systematic Reviews Prevalence of Multiple Forms of Sexting Behavior Among Youth Harms experienced by child users of online and mobile technologies The Prevalence of Unwanted Online Sexual Exposure and Solicitation Among Youth Cyberbullying Cyberbullying Among Adolescents and Children: Cyberbullying Survey UNICEF Cross-national aspects of cyberbullying victimization among 14–17-year-old adolescents across seven European countries Bibliography Glossary Child Sexual Exploitation (CSE) is a broad term that encompasses all forms of child sexual exploitation.
    [Show full text]
  • Economics of Illicit Behaviors: Exchange in the Internet Wild West
    ECONOMICS OF ILLICIT BEHAVIORS: EXCHANGE IN THE INTERNET WILD WEST by Julia R. Norgaard A Dissertation Submitted to the Graduate Faculty of George Mason University in Partial Fulfillment of The Requirements for the Degree of Doctor of Philosophy Economics Committee: ___________________________________________ Director ___________________________________________ ___________________________________________ ___________________________________________ Department Chairperson ___________________________________________ Program Director ___________________________________________ Dean, College of Humanities and Social Sciences Date: _____________________________________ Spring Semester 2017 George Mason University Fairfax, VA Economics of Illicit Behaviors: Exchange in the Internet Wild West A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy at George Mason University By Julia R. Norgaard Master of Arts George Mason University, 2015 Bachelor of Arts University of San Diego, 2012 Director: Dr. Thomas Stratmann, Professor and Dissertation Chair Department of Economics Spring Semester 2017 George Mason University Fairfax, VA Copyright 2017 Julia R. Norgaard All Rights Reserved ii Dedication This is dedicated to my wonderful parents Clark and Jill, who introduced me to economics and taught me how to be a dedicated scholar and a good and faithful person. iii Acknowledgements Thank you to my family and friends who have supported me throughout my graduate journey. My boyfriend, Ennio, who gave
    [Show full text]