Greek Primary Educators' Perceptions of Strategies for Mitigating Cyber Child Exploitation Aikaterini Fragkou Walden University
Total Page:16
File Type:pdf, Size:1020Kb
Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2018 Greek Primary Educators' Perceptions of Strategies for Mitigating Cyber Child Exploitation Aikaterini Fragkou Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Public Policy Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by Aikaterini Fragkou has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. John Walker, Committee Chairperson, Criminal Justice Faculty Dr. Ashley Dickinson, Committee Member, Criminal Justice Faculty Dr. Howard Henderson, University Reviewer, Criminal Justice Faculty Chief Academic Officer Eric Riedel, Ph.D. Walden University 2018 Abstract Greek Primary Educators’ Perceptions of Strategies for Mitigating Cyber Child Exploitation by Aikaterini Fragkou MA, Michigan State University, 2015 BS, City University of London, 2011 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Criminal Justice Walden University May 2018 Abstract Cyber child exploitation is a problem in Greece due to the economic crisis and the resulting lack of government focus on social improvements. Research reveals the importance of educating school teachers of the potential for cyber exploitation of children and argues that early detection of child-focused cybercrimes will decrease the prevalence of child exploitation. The purpose of this interpretive qualitative study was to explore the phenomenon of cyber child exploitation in Greece and to identify strategies teachers may employ to identify and avert cyber child exploitation. Grounded theory provided the framework for this research. The sample consisted of 20 school teachers from a private primary school in suburban Greece. The 20 teachers were over 21 years old, presently certified as teachers and working in primary school, willing to share on voluntary basis information about their experiences and concerns with cyber child exploitation awareness among students, as well as parents. One-to-one interviews were conducted to gather data. Coding was the procedure followed to divide the interview data and rearrange based on common patterns. The resulting themes revealed that no consistent strategies were used to protect children, teachers play a significant role in the prevention of cyber child exploitation, and there is a need for professional development of programs to protect children. Implications for positive social change suggest that educational institutions will help protect children as teachers become more knowledgeable about specific measures to effectively recognize cyber predators. With the guidance of well-informed teachers, students may learn to use the World Wide Web in an effective fashion while being able to avoid the dangers posed by cyber predators. Greek Primary Educators’ Perceptions of Strategies for Mitigating Cyber Child Exploitation by Aikaterini Fragkou MA, Michigan State University, 2015 BS, City University of London, 2011 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Criminal Justice Walden University May 2018 Dedication I dedicate my research to Jesus Christ, without whom this would not have been possible. I dedicate this study to my mother, the most important person in my life, for her untiring support and encouragement throughout my 10 years of academic study. She never allowed me to give up on my dream. Mum, I will always love you and be grateful for your belief in me. You are my strength and my pillar of support, and for that I thank you. I also want to thank my dad, who passed away; he was the one who cheered me to do my best and achieve a doctoral degree. Until the last day I saw him, he was encouraging me to keep up until completion. Acknowledgments Again, I am thankful to God, who was the source within myself of strength and courage to complete this big chapter in my life. Thanks to my chair and committee member, Dr. John Walker and Dr. Ashley Dickinson, who spent time providing me their help, feedback, and support right away when I needed it. Thanks to Dr. Henderson, my URR, for his generous assistance and immediate response when needed in the dissertation process. A warm thanks to all of the members of Walden University for their continual support and help throughout the process. Table of Contents List of Tables ..................................................................................................................... iv Chapter 1: Introduction to the Study ................................................................................... 1 Background ................................................................................................................... 3 Problem Statement ........................................................................................................ 7 Purpose of the Study ..................................................................................................... 8 Conceptual Framework ................................................................................................. 9 Research Objectives .................................................................................................... 10 Research Questions ..................................................................................................... 10 Rationale of the Study ................................................................................................. 11 Operational Definitions ............................................................................................... 12 Assumptions, Scope, Limitations, and Delimitations ................................................. 14 Significance ................................................................................................................. 15 Transition Statement ................................................................................................... 17 Chapter 2: Literature Review ............................................................................................ 18 Literature Search Strategy ........................................................................................... 18 Theoretical Framework ............................................................................................... 19 Literature Review ........................................................................................................ 22 Impact of Pornography on the Child ..................................................................... 23 Cyber Child Exploitation ...................................................................................... 27 Grooming Through Social Media ......................................................................... 29 Profile of Sexual Offenders .................................................................................. 32 i E-Safety ................................................................................................................. 35 Self-Reliance and Child Exploitation ................................................................... 37 European Union Development Programs ............................................................. 40 Teachers’ Impact on Children ............................................................................... 43 Parent-Child Relationships ................................................................................... 45 Related Studies and Methodologies ...................................................................... 47 Summary ..................................................................................................................... 52 Conclusions ................................................................................................................. 56 Chapter 3: Research Method ............................................................................................. 57 Research Design and Rationale .................................................................................. 58 Role of the Researcher ................................................................................................ 60 Data Collection ........................................................................................................... 61 Data Analysis .............................................................................................................. 65 Trustworthiness ........................................................................................................... 67 Ethical Considerations ................................................................................................ 69 Conclusion .................................................................................................................. 70 Chapter 4: Results ............................................................................................................. 71 Data Gathering Process ..............................................................................................