"Das deutsche Rechtssystem basiert grundsätzlich auf individuellem Rechtsschutz. Nur die bzw. der Einzelne kann also eigene Rechte einklagen. Doch gerade wenn es um strukturelle Rechtsverletzungen geht, wie es zum Beispiel bei digitaler Gewalt meist der Fall ist, wäre eine kollektive Rechtsmobilis
...
ierung hilfreich. Betroffene müssten dann nicht allein klagen, sondern können sich zusammenschließen oder mit Unterstützung eines Beistands klagen, oder ein Verband könnte an ihrer Stelle den Rechtsstreit führen. Im Folgenden werden Möglichkeiten kollektiver Rechtsmobilisierung dargestellt. Dafür werden zentrale Begriffe wie Streitgenossenschaft, Prozessstandschaft, Sammel- und Musterklage sowie Verbandsklage kurz erläutert. Eines der wesentlichen Probleme kollektiver Rechtsmobilisierung gegen digitale Gewalt ist, dass es an einschlägigem Recht fehlt, welches überhaupt – individuell oder kollektiv – mobilisiert werden könnte. Daher wird nach einer knappen Einführung in die Problematik zunächst das mobilisierbare (einklagbare) Recht gegen digitale Gewalt bzw. dessen Fehlen dargestellt, bevor auf prozessuale Fragen eingegangen werden kann." (Einleitung)
more
"La presente propuesta metodológica para la promoción del uso seguro del Internet producto de un acuerdo de trabajo entre el Instituto Interamericano del Niño, la Niña y Adolescentes (IIN-OEA) y World Visión República Dominicana aborda, en forma conjunta, los desafíos que, desde la perspectiv
...
a de los Derechos de la niñez y adolescencia nos presenta la expansión del Internet y su creciente presencia en la vida cotidiana de las nuevas generaciones. No se trata de diabolizar los avances tecnológicos ni los cambios en las comunicaciones humanas, producto de dichos avances, sino de reconocer las oportunidades y las amenazas que representan el uso masivo de las mismas. El acceso a Internet es para niños, niñas y adolescentes una herramienta de enorme valor para la obtención de información, comunicación y expresión de sus puntos de vista, así como el conocimiento de nuevas y variadas realidades. Para muchos el acceso a Internet, en la fase histórica en que vivimos, tiene un significado similar a lo que fue la incorporación de la lectoescritura a principios del siglo pasado: una herramienta imprescindible de integración, comunicación y acceso a los bienes de la cultura. Desde esta mirada, el no acceso constituye una brecha de exclusión que se entrelaza y potencializa con otras variables asociadas a la producción social de la vulnerabilidad. Por otra parte, no podemos desconocer que las potencialidades del internet coexisten con riesgos y amenazas. Para los niños, niñas y adolescentes navegar en Internet tiene riesgos similares o tal vez superiores a los que supone el transitar cualquier espacio público sin el acompañamiento responsable de un adulto [...]
Muchas experiencias dan cuenta de continuidades entre violencias virtuales y físicas. Solo a modo de ejemplo, podemos citar el bullying que es extendido a través del cyberbullying o la utilización de Internet para reclutar posibles víctimas de trata o de explotación sexual. El dualismo del Internet nos enfrenta al desafío de articular acceso e inclusión con protección. Acceso seguro con realización de derechos y es aquí donde es necesario reafirmar algunos principios y conceptos presentes en la Convención de los Derechos del niño. En primer lugar, el principio de corresponsabilidad, los niveles de protección de los niños, niñas y adolescentes requieren una corresponsabilidad entre familia, comunidad y Estado." (Palabras introductorias, página 7)
more
"It is our sincerest hope that this guide will have provided you with a greater understanding about online child sexual exploitation. We hope it has also given you a clearer realisation of the important role that you and your faith community can play in helping to prevent and end this crime. Togethe
...
r, we can combine the spiritual maturity, influence, expertise and authority you carry as leaders in your community, with the technical experience gained from policymakers, law enforcement and child-focused experts to ensure this violence stops." (Conclusion, page 36)
more
"This online guide is designed to: inform a wide range of organisations about Internet hotlines and their essential role in forming a comprehensive national response to online child sexual exploitation and abuse [...]; advise organisations that are considering or are already planning to set up an In
...
ternet Hotline about the main requirements and considerations; recommend good practice in relation to the hotline status, structure, operations and interinstitutional relationship; connect potential hotline operators with hotline development support available from the INHOPE Foundation, experienced INHOPE member hotlines around the world, leading initiatives and support available from law enforcement, NGOs, the private sector and governmental partners around the world." (Page 1)
more
"This paper does suggest that child abuse content is the most popular type of content on the Tor Dark Net. While law enforcement may crawl such sites, the number of requests that would be seen would be only a tiny fraction, and hence not skew the outline ratios. Similarly, denial of service attacks
...
were not observed and so are also unlikely to account for the high requests. The usage of Tor2Web may underrepresent some categories, but it is not currently clear whether, or why, such groups would exclusively use this tool." (Page 9)
more
"This handbook is a compilation of advice from child psychologists and the police and also the personal narratives of people who have been subjected to abuse. We hope this book will make it easier for adults to talk to children about the risks of the internet. We also hope it will inspire you and he
...
lp you to be part of children’s everyday activities on the internet." (Page 3)
more
"Sex offenders know that social media offer new opportunities for contacting children and forming friendships with them. They have also realised how simple it is to take pictures and make videos of sexual abuse and share them with other people with the same sexual interests. Digital information tech
...
nology and social media add new aspects to our understanding of how sexual abuse takes place and how it affects victims. It is necessary for all practitioners working with children and young people to have knowledge of this field. All types of sexual abuse are shameful and taboo-ridden. Consequently, children and young people who feel unhappy need to be asked directly how negative online encounters have affected them. However, the dialogue with them must proceed with an understanding of ow demeaning, intimidating and traumatic such experiences can be, including when living through them on the internet. Save the Children Denmark has compiled this anthology with the latest knowledge in a field that is in constant flux and full of professional challenges." (Back cover)
more
"In enhancing the fight against ICT-facilitated child abuse and exploitation, governments and national authorities may focus on a child protection approach that fully respects human rights; on ensuring that legislation keeps pace with technological innovation; on recruiting, training and maintaining
...
specialized personnel; on gaining access to state-of-the-art technological resources; developing effective mechanisms for accessing third party data and conducting undercover investigations that are consistent with the rule of law; as well as developing policyguidance on harmful conduct committed by youth. The formulation of policies in this area is best based on a multidisciplinary approach that draws on research findings and best practices from social science, legal policy and public policy." (Executive summary, page xi)
more
"Welcome to the guide! The guide has been written to tell children and young people about sexual exploitation online. We hope you will find it interesting and useful." (Page 2)
"As part of its ongoing commitment to fighting online child sexual abuse content and, in particular, to helping its members realise the objectives of the Mobile Alliance Against Child Sexual Abuse Content, the GSMA has worked with INHOPE, Save the Children, ECPAT, IWF, Net Safe Latvia, Meldpunt, ICM
...
EC and Interpol to collate information which will help organisations build fully-functioning hotlines in countries where no such facility is currently in place. This information is presented in the document below." (Page 3)
more
"Four Terre des Hommes Netherlands researchers spent 10 weeks posing as prepubertal Filipino girls on 19 public chat rooms. During that short period, a total of 20,172 predators from 71 countries committed crimes by soliciting the Webcam child sex tourism (WCST) research researchers, whom the predat
...
ors believed to be minors, for paid webcam sex performances. But 20,172 crimes in a sample of 19 chat rooms likely reflects only a small fraction of the number of crimes actually taking place every day when we consider the US Federal Bureau of Investigation’s estimates that there are 40,000 online chat rooms on which predators lurk. Moreover, WCST takes place on social networking sites, adult webcam sites and online dating sites, in addition to chat rooms. It is likely that WCST takes place tens of thousands of times each day. Four Terre des Hommes Netherlands researchers spent 10 weeks posing as prepubertal Filipino girls on 19 public chat rooms. During that short period, a total of 20,172 predators from 71 countries committed crimes by soliciting the WCST researchers, whom the predators believed to be minors, for paid webcam sex performances. But 20,172 crimes in a sample of 19 chat rooms likely reflects only a small fraction of the number of crimes actually taking place every day when we consider the US Federal Bureau of Investigation’s estimates that there are 40,000 online chat rooms on which predators lurk. Moreover, WCST takes place on social networking sites, adult webcam sites and online dating sites, in addition to chat rooms. It is likely that WCST takes place tens of thousands of times each day. The finding that WCST is such a common crime on public chat rooms led us to investigate whether law enforcement agencies are not adequately enforcing existing child protection laws because they are unable to identify predators engaging in WCST. We found that identifying predators seeking webcam sexual performances from children can be achieved through the use of a proactive investigation technique. During the 10 weeks spent collecting data, the four Terre des Hommes Netherlands researchers identified 1,000 predators seeking webcam sex performance from children on public chat rooms. They were identified using only information available in public online databases and data provided by predators. No computer hacking or illegal methods were applied. Instead, we just asked predators to provide identifying information under the fictional pretext—a technique known as “social hacking." (Executive summary, page 4-5)
more
"This compilation has been divided into four chapters. The first chapter briefly explains what a child helpline is, draws attention to the key elements of a child helpline and attempts to answer some of the questions you may have regarding particular activities of a child helpline and about getting
...
started and scaling-up. The second chapter outlines the operations of a child helpline. The third chapter provides an overview of the structure of a child helpline and the implications this has. The fourth chapter outlines the suggested processes and steps to help you get prepared to launch or scale-up a child helpline in your country. The annexes at the end of the manual contain draft material from several child helplines. Please feel free to adapt this material to your own specific situation." (Preface)
more
"While the safety of children and young people in digital spaces has become an important issue of qualitative as well as quantitative research in the developed world and has led to a significant body of knowledge, the research efforts in the developing nations, with few exceptions, are still relativ
...
ely early stage. A brief analysis of digitally relevant developing world characteristics suggests that various contextual factors such as technological, economic, market, educational, and cultural parameters need to be taken into account at the levels of risk analysis and risk evaluation and with regard to response strategies." (Summary/conclusions, page 30)
more
"This report is intended to provide a framework for promoting recognition and understanding of the real risks of violence for children and young people within cyberspace and through the use of new technologies, in particular the Internet and mobile phones. It identifies the harms confronted by child
...
ren and young people in this environment and uses the data available to assess current and emerging patterns. It raises concerns about new areas where harm may occur, which may be averted if early action is taken. Finally, it makes recommendations that may be enacted by a wide range of actors to serve the best interests of all children and young people, and thus the wider society." (Executive summary)
more