Incongruity between the subjective comfort level and objective danger of young people in reference to cyber sexual victimization is prevalent.
Computers have forensic programs to protect youth. This includes the identification of threats through word and content analysis of potential threats. These methods involve accessing and modifying control filters, settings, browsers, and restriction options to track histories and block content and/or websites that may seem to be innocuous traditional business websites, or political websites. but are means of access to unsuspecting young girls. Computer algorithms need to be studied and enhanced to help parents, adolescents and young adults, and school officials and police protect potential victims. Forensic computer security and offender profiling must adapt as offenders become more proficient at their trade.
References
Felson, M. (1994). Crime and everyday life: Insight and implications for society. Thousand Oaks, CA: Pine.
Geiger, B., & Fischer., M. (2016) Incarcerated Sex Offenders in Rehabilitation Account for their Offending. Journal of Investigative Psychology and Offender Profiling, June 26, 2016. Wiley on Line: DOI:10.1002/jip.1460
Geiger, B. & Fischer, M. (2017, Sept). Works in Israeli Prison-Based Sex Offender
Rehabilitation Programs: Program Participants’ Perspective. International Journal of Offender Therapy and Comparative Criminology, Sage, on line Reprints and permissions: sagepub.com/journalsPermissions.nav DOI: 10.1177/0306624X17731830 journals.sagepub.com/home/ijo
Hawdon, J. E. (1999). Daily Routines and Crime: Using Routine Activities as Measures of Hirschi’s Involvement. Youth & Society, 30(4), 395-415