Why do users continue to contribute to darknet Child Sexual Abuse Material forums? Examining social exchange, social capital, and social learning explanations using digital forensic artifacts

The darknet hosts an increasing number of hidden services dedicated to the distribution of child sexual abuse material (CSAM). Given that by contributing CSAM to the forum members subject themselves to criminal prosecution, questions regarding the motivation for members contributing to darknet CSAM...

Full description

Saved in:
Bibliographic Details
Published inChild abuse & neglect Vol. 153; p. 106815
Main Authors Blokland, Arjan, Daser, Anton, de Boer, Meike, Gannon, Colm, Gnielka, Frederic, Huikuri, Salla, Reichel, Rebecca, Shäfer, Thomas, Schmidt, Alexander F., Staciwa, Katarzyna, Lehmann, Robert
Format Journal Article
LanguageEnglish
Published England Elsevier Ltd 01.07.2024
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The darknet hosts an increasing number of hidden services dedicated to the distribution of child sexual abuse material (CSAM). Given that by contributing CSAM to the forum members subject themselves to criminal prosecution, questions regarding the motivation for members contributing to darknet CSAM forums arise. Building on insights gained from research into clearnet communities, here we examine the extent to which social incentives generated by the online CSAM community may explain members' posting behavior on darknet CSAM forums. We analyze digital forensic artifacts on the online behavior of members of a darknet CSAM forum that was shut down by law enforcement agencies in July 2015. We apply group-based trajectory modelling (GBTM), social network analysis, and mixed-effect survival models. Applying GBTM three posting trajectories can be distinguished. Social network analyses finds the reply network to be more centralized than predicted by chance. Mixed-effect survival models show positive associations between the length of members' first post and the time since members' first registration on the forum and subsequent posting. Contrarily, the number of replies received appears to mitigate subsequent posting. Findings show posting activity on the forum to be concentrated in a minority of forum members who show posting trajectories that are both frequent and persistent. Results further suggest persistence in posting is motivated by social identity and, to a lesser extent, differential association processes. •Only a minority of darknet CSAM forum members participates in public forum communications.•Even among active forum members, a minority of members generates the bulk of public communications.•Forum members’ continued contributing is associated with self-presentation and prolonged exposure to the forum environment.•Unexpectedly, peer feedback seems to mitigate continued participation.
AbstractList The darknet hosts an increasing number of hidden services dedicated to the distribution of child sexual abuse material (CSAM). Given that by contributing CSAM to the forum members subject themselves to criminal prosecution, questions regarding the motivation for members contributing to darknet CSAM forums arise. Building on insights gained from research into clearnet communities, here we examine the extent to which social incentives generated by the online CSAM community may explain members' posting behavior on darknet CSAM forums. We analyze digital forensic artifacts on the online behavior of members of a darknet CSAM forum that was shut down by law enforcement agencies in July 2015. We apply group-based trajectory modelling (GBTM), social network analysis, and mixed-effect survival models. Applying GBTM three posting trajectories can be distinguished. Social network analyses finds the reply network to be more centralized than predicted by chance. Mixed-effect survival models show positive associations between the length of members' first post and the time since members' first registration on the forum and subsequent posting. Contrarily, the number of replies received appears to mitigate subsequent posting. Findings show posting activity on the forum to be concentrated in a minority of forum members who show posting trajectories that are both frequent and persistent. Results further suggest persistence in posting is motivated by social identity and, to a lesser extent, differential association processes. •Only a minority of darknet CSAM forum members participates in public forum communications.•Even among active forum members, a minority of members generates the bulk of public communications.•Forum members’ continued contributing is associated with self-presentation and prolonged exposure to the forum environment.•Unexpectedly, peer feedback seems to mitigate continued participation.
The darknet hosts an increasing number of hidden services dedicated to the distribution of child sexual abuse material (CSAM). Given that by contributing CSAM to the forum members subject themselves to criminal prosecution, questions regarding the motivation for members contributing to darknet CSAM forums arise.BACKGROUNDThe darknet hosts an increasing number of hidden services dedicated to the distribution of child sexual abuse material (CSAM). Given that by contributing CSAM to the forum members subject themselves to criminal prosecution, questions regarding the motivation for members contributing to darknet CSAM forums arise.Building on insights gained from research into clearnet communities, here we examine the extent to which social incentives generated by the online CSAM community may explain members' posting behavior on darknet CSAM forums.OBJECTIVEBuilding on insights gained from research into clearnet communities, here we examine the extent to which social incentives generated by the online CSAM community may explain members' posting behavior on darknet CSAM forums.We analyze digital forensic artifacts on the online behavior of members of a darknet CSAM forum that was shut down by law enforcement agencies in July 2015.PARTICIPANTS AND SETTINGWe analyze digital forensic artifacts on the online behavior of members of a darknet CSAM forum that was shut down by law enforcement agencies in July 2015.We apply group-based trajectory modelling (GBTM), social network analysis, and mixed-effect survival models.METHODSWe apply group-based trajectory modelling (GBTM), social network analysis, and mixed-effect survival models.Applying GBTM three posting trajectories can be distinguished. Social network analyses finds the reply network to be more centralized than predicted by chance. Mixed-effect survival models show positive associations between the length of members' first post and the time since members' first registration on the forum and subsequent posting. Contrarily, the number of replies received appears to mitigate subsequent posting.RESULTSApplying GBTM three posting trajectories can be distinguished. Social network analyses finds the reply network to be more centralized than predicted by chance. Mixed-effect survival models show positive associations between the length of members' first post and the time since members' first registration on the forum and subsequent posting. Contrarily, the number of replies received appears to mitigate subsequent posting.Findings show posting activity on the forum to be concentrated in a minority of forum members who show posting trajectories that are both frequent and persistent. Results further suggest persistence in posting is motivated by social identity and, to a lesser extent, differential association processes.CONCLUSIONSFindings show posting activity on the forum to be concentrated in a minority of forum members who show posting trajectories that are both frequent and persistent. Results further suggest persistence in posting is motivated by social identity and, to a lesser extent, differential association processes.
The darknet hosts an increasing number of hidden services dedicated to the distribution of child sexual abuse material (CSAM). Given that by contributing CSAM to the forum members subject themselves to criminal prosecution, questions regarding the motivation for members contributing to darknet CSAM forums arise. Building on insights gained from research into clearnet communities, here we examine the extent to which social incentives generated by the online CSAM community may explain members' posting behavior on darknet CSAM forums. We analyze digital forensic artifacts on the online behavior of members of a darknet CSAM forum that was shut down by law enforcement agencies in July 2015. We apply group-based trajectory modelling (GBTM), social network analysis, and mixed-effect survival models. Applying GBTM three posting trajectories can be distinguished. Social network analyses finds the reply network to be more centralized than predicted by chance. Mixed-effect survival models show positive associations between the length of members' first post and the time since members' first registration on the forum and subsequent posting. Contrarily, the number of replies received appears to mitigate subsequent posting. Findings show posting activity on the forum to be concentrated in a minority of forum members who show posting trajectories that are both frequent and persistent. Results further suggest persistence in posting is motivated by social identity and, to a lesser extent, differential association processes.
ArticleNumber 106815
Author Shäfer, Thomas
Gannon, Colm
Reichel, Rebecca
Gnielka, Frederic
Blokland, Arjan
de Boer, Meike
Huikuri, Salla
Schmidt, Alexander F.
Staciwa, Katarzyna
Lehmann, Robert
Daser, Anton
Author_xml – sequence: 1
  givenname: Arjan
  orcidid: 0000-0003-0366-2205
  surname: Blokland
  fullname: Blokland, Arjan
  email: ablokland@nscr.nl
  organization: Netherlands Institute for the Study of Crime and Law Enforcement (NSCR), and Leiden Law School, Institute of Criminal Law and Criminology, Leiden University, Leiden, the Netherlands
– sequence: 2
  givenname: Anton
  surname: Daser
  fullname: Daser, Anton
  organization: Institute of Psychology, Social & Legal Psychology, Johannes Gutenberg University Mainz, Mainz, Germany
– sequence: 3
  givenname: Meike
  surname: de Boer
  fullname: de Boer, Meike
  organization: Netherlands Institute for the Study of Crime and Law Enforcement (NSCR), and Leiden Law School, Institute of Criminal Law and Criminology, Leiden University, Leiden, the Netherlands
– sequence: 4
  givenname: Colm
  surname: Gannon
  fullname: Gannon, Colm
  organization: School of Computing, Engineering and Mathematical Science, La Trobe University, Melbourne, Australia
– sequence: 5
  givenname: Frederic
  surname: Gnielka
  fullname: Gnielka, Frederic
  organization: Department of Psychology, MSB Medical School Berlin, Berlin, Germany
– sequence: 6
  givenname: Salla
  surname: Huikuri
  fullname: Huikuri, Salla
  organization: Strategic Steering and Development, Ministry of the Interior, Helsinki, Finland
– sequence: 7
  givenname: Rebecca
  surname: Reichel
  fullname: Reichel, Rebecca
  organization: Department of Psychology, MSB Medical School Berlin, Berlin, Germany
– sequence: 8
  givenname: Thomas
  surname: Shäfer
  fullname: Shäfer, Thomas
  organization: Department of Psychology, MSB Medical School Berlin, Berlin, Germany
– sequence: 9
  givenname: Alexander F.
  orcidid: 0000-0001-6449-2946
  surname: Schmidt
  fullname: Schmidt, Alexander F.
  organization: Institute of Psychology, Social & Legal Psychology, Johannes Gutenberg University Mainz, Mainz, Germany
– sequence: 10
  givenname: Katarzyna
  surname: Staciwa
  fullname: Staciwa, Katarzyna
  organization: Polish Platform for Homeland Security, Poznan, Poland
– sequence: 11
  givenname: Robert
  surname: Lehmann
  fullname: Lehmann, Robert
  organization: Department of Psychology, MSB Medical School Berlin, Berlin, Germany
BackLink https://www.ncbi.nlm.nih.gov/pubmed/38735124$$D View this record in MEDLINE/PubMed
BookMark eNqFUcFuEzEUtFARTQt_gJCPHJqw3vWuF4RAVdQWpCIOgDhab-3nxOnGDrYXJV_Hr-FNmksv8cV-45nxe54Lcua8Q0Jes2LGCta8W83U0kI3zMqi5BlqWlY_IxPWimoqRC3OyKRgvJ6WrOLn5CLGVZFXLeoX5LzKpJqVfEL-_V7uqPZ0iBgiVd4l6wakye_PwXZD2lcawoPDROdL22v6A7cD9PS6yzL6DRIGm0vjw7COn-nNFtbWWbeg0avxArdqCW6BV0dAwcYm6K8oOH3EeoSwF-F204ODZL2Lua8R0nYx8scX0EWrKIRkDagUX5LnBvqIrx73S_Lr9ubn_Mv0_vvd1_n1_VTxhqUpM8BNCTXvBKsQTccZtroqQBgjWgNMGdBNpQqGHLmom5aDZrqouSq5KMrqkrw9-G6C_zNgTHJto8I-d4p-iLLKVF5x8Z5l6ptH6tCtUctNsGsIO3n89Ez4cCCo4GMMaKTK043zpgC2l6yQY8JyJQ8JyzFheUg4i_kT8dH_hOzTQYb5k_5aDDIqi06htgFVktrbUwYfnxioPoesoH_A3Wn5f5ZA2k8
CitedBy_id crossref_primary_10_25205_2542_0410_2024_20_4_50_59
crossref_primary_10_1057_s41599_024_03954_x
crossref_primary_10_1080_01639625_2025_2453813
Cites_doi 10.1177/0011128714526499
10.1177/1079063220981063
10.1287/isre.1110.0411
10.3389/fpsyg.2021.623668
10.1016/j.avb.2022.101793
10.1016/S0740-8188(03)00031-8
10.1111/j.1083-6101.2006.00033.x
10.1016/j.diin.2014.07.003
10.7560/JHS31202
10.1177/15248380211057274
10.1080/13552601003760006
10.1016/j.socnet.2006.05.001
10.1007/s12144-022-03307-4
10.1111/j.1745-9125.2010.00185.x
10.1080/03610926.2012.719986
10.1089/109493103321168009
10.1016/j.avb.2022.101809
10.1038/s41598-019-56704-4
10.54501/jots.v1i2.29
10.1111/1556-4029.14820
10.1016/j.avb.2022.101808
10.1016/j.im.2015.07.005
10.1080/01449290110084683
10.1016/j.avb.2009.08.006
10.1177/0894439321994894
10.1037/0022-3514.89.5.747
10.1177/1536867X19893639
10.1007/s11757-023-00790-8
10.1111/j.1083-6101.2012.01582.x
10.1080/01639620290086413
10.1080/0144929X.2022.2073472
ContentType Journal Article
Copyright 2024 The Author(s)
Copyright © 2024 The Author(s). Published by Elsevier Ltd.. All rights reserved.
Copyright_xml – notice: 2024 The Author(s)
– notice: Copyright © 2024 The Author(s). Published by Elsevier Ltd.. All rights reserved.
DBID 6I.
AAFTH
AAYXX
CITATION
CGR
CUY
CVF
ECM
EIF
NPM
7X8
DOI 10.1016/j.chiabu.2024.106815
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
Medline
MEDLINE
MEDLINE (Ovid)
MEDLINE
MEDLINE
PubMed
MEDLINE - Academic
DatabaseTitle CrossRef
MEDLINE
Medline Complete
MEDLINE with Full Text
PubMed
MEDLINE (Ovid)
MEDLINE - Academic
DatabaseTitleList
MEDLINE - Academic
MEDLINE

Database_xml – sequence: 1
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 2
  dbid: EIF
  name: MEDLINE
  url: https://proxy.k.utb.cz/login?url=https://www.webofscience.com/wos/medline/basic-search
  sourceTypes: Index Database
DeliveryMethod fulltext_linktorsrc
Discipline Social Welfare & Social Work
EISSN 1873-7757
ExternalDocumentID 38735124
10_1016_j_chiabu_2024_106815
S0145213424002059
Genre Research Support, Non-U.S. Gov't
Journal Article
GroupedDBID ---
--K
--M
-~X
..I
.1-
.FO
.GJ
.~1
0R~
186
1B1
1P~
1RT
1VV
1~.
1~5
29B
2KS
4.4
457
4G.
53G
5GY
5VS
7-5
71M
85S
8P~
9JM
9JO
9M8
AABNK
AADFP
AAEDT
AAEDW
AAFJI
AAGJA
AAGUQ
AAIKC
AAIKJ
AAKOC
AALRI
AAMNW
AAOAW
AAQFI
AAQXK
AATTM
AAWTL
AAXKI
AAXUO
AAYJJ
AAYWO
ABBQC
ABFNM
ABIVO
ABJNI
ABMAC
ABMMH
ABMZM
ABOYX
ABPPZ
ABWVN
ABXDB
ACDAQ
ACGFO
ACGFS
ACHQT
ACIEU
ACNCT
ACRLP
ACRPL
ACVFH
ACXNI
ADBBV
ADCNI
ADEZE
ADMHG
ADMUD
ADNMO
ADVLN
ADXHL
AEBSH
AEIPS
AEKER
AETEA
AEUPX
AEVXI
AFFNX
AFJKZ
AFPUW
AFRHN
AFTJW
AFXIZ
AGCQF
AGHFR
AGQPQ
AGUBO
AGYEJ
AHHHB
AHMBA
AIEXJ
AIGII
AIIUN
AIKHN
AITUG
AJRQY
AJUYK
AKBMS
AKRWK
AKYEP
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
ANKPU
ANZVX
AOMHK
APXCP
ASPBG
AVARZ
AVWKF
AXJTR
AZFZN
BKOJK
BKOMP
BLXMC
BNPGV
CS3
D0S
DU5
EBS
EFJIC
EFKBS
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
HEG
HF~
HMK
HMO
HMW
HMY
HVGLF
HZ~
H~9
IHE
J1W
KOM
L7B
LPU
M29
M39
M3V
M3Y
M41
MO0
MVM
N9A
NEJ
NHB
O-L
O9-
OAUVE
OH0
OHT
OKEIE
OMK
OU-
OZT
P-8
P-9
P2P
PC.
PQQKQ
PRBVW
Q38
R2-
ROL
RPZ
RXW
SAE
SCC
SCU
SDF
SDG
SDP
SES
SEW
SKT
SPCBC
SPS
SSB
SSH
SSO
SSS
SSY
SSZ
T5K
TAE
TAF
TN5
TWZ
UBW
UMD
WH7
WUQ
X6Y
XOL
XPP
XSW
YQR
YYQ
Z5R
ZCG
ZGI
ZY4
~G-
6I.
AACTN
AAFTH
AAIAV
AAYOK
ABTAH
AFCTW
AFKWA
AJOXV
AMFUW
B-7
RIG
AAYXX
AGRNS
CITATION
CGR
CUY
CVF
ECM
EIF
NPM
7X8
ID FETCH-LOGICAL-c461t-1fa4f2a54b713eefb41e8d30a7ff78fa1cfad63c01e4e475684ad1d054c247023
IEDL.DBID .~1
ISSN 0145-2134
1873-7757
IngestDate Fri Jul 11 10:27:54 EDT 2025
Wed Aug 13 02:09:44 EDT 2025
Tue Jul 01 01:04:30 EDT 2025
Thu Apr 24 23:13:11 EDT 2025
Sat Jul 13 15:32:55 EDT 2024
Tue Aug 26 18:19:09 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords Online community
Differential association
Self-presentation
Reciprocity
Lawless space
Language English
License This is an open access article under the CC BY license.
Copyright © 2024 The Author(s). Published by Elsevier Ltd.. All rights reserved.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c461t-1fa4f2a54b713eefb41e8d30a7ff78fa1cfad63c01e4e475684ad1d054c247023
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ORCID 0000-0001-6449-2946
0000-0003-0366-2205
OpenAccessLink https://www.sciencedirect.com/science/article/pii/S0145213424002059
PMID 38735124
PQID 3054434791
PQPubID 23479
ParticipantIDs proquest_miscellaneous_3054434791
pubmed_primary_38735124
crossref_citationtrail_10_1016_j_chiabu_2024_106815
crossref_primary_10_1016_j_chiabu_2024_106815
elsevier_sciencedirect_doi_10_1016_j_chiabu_2024_106815
elsevier_clinicalkey_doi_10_1016_j_chiabu_2024_106815
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate July 2024
2024-07-00
20240701
PublicationDateYYYYMMDD 2024-07-01
PublicationDate_xml – month: 07
  year: 2024
  text: July 2024
PublicationDecade 2020
PublicationPlace England
PublicationPlace_xml – name: England
PublicationTitle Child abuse & neglect
PublicationTitleAlternate Child Abuse Negl
PublicationYear 2024
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Gannon, Blokland, Huikuri, Babchishin, Lehmann (bb0030) 2023; 17
Hsieh, Hou, Chen, Truong (bb0050) 2013
Nagin (bb0135) 2005
Karremann (bb0085) 2007
Kloess, van der Bruggen (bb0095) 2023; 24
Harkins, Dixon (bb0040) 2010; 15
Kim, Chan, Kankanhalli (bb0090) 2012; 23
Nielsen, Rosenthal, Sun, Day, Bevc, Duchesne (bb0140) 2014; 43
Postmes, Spears, Lee, Novak (bb0150) 2005; 89
van der Bruggen, van Balen, van Bunningen, Talens, Owens, Clapp (bb0215) 2022; 67
Owens, Clapp, Craun, van der Bruggen, van Balen, van Bunningen, Talens (bb0145) 2023
Insoll, Ovaska, Nurmi, Aaltonen, Vaaranen-Valkonen (bb0060) 2022; 1
McCarthy (bb0110) 2010; 16
Quayle, Taylor (bb0165) 2003; 6
von Lampe (bb0220) 2016
Joyce, Kraut (bb0080) 2006; 11
Quayle, Taylor (bb0160) 2002; 23
Akers (bb0005) 1973
Herring (bb0045) 2004; 338
Huikuri (bb0055) 2023
Miller, Morris (bb0120) 2016; 62
van der Bruggen, Blokland (bb0210) 2022; 40
Woodhams, Kloess, Jose, Hamilton-Giachritsis (bb0230) 2021; 12
Skrondal, Rabe-Hesketh (bb0190) 2004
van der Bruggen, Blokland (bb0205) 2021; 33
Friedrichs (bb0025) 2022; 31
Morselli, Giguère, Petit (bb0125) 2007; 29
Sutherland (bb0200) 1947
Skardhamar (bb0185) 2010; 48
Hall (bb0035) 2003; 25
IWF (bb0065) 2023
Jin, Li, Zhong, Zhai (bb0075) 2015; 52
Crowther (bb0010) 2019; 19
Rogers, Seigfried-Spellar, Bates, Rux (bb0170) 2021; 66
Seigfried-Spellar (bb0180) 2014; 11
da Cunha, MacCarron, Passold, dos Santos Jr, Oliveira, Gleeson (bb0015) 2020; 10
Li (bb0105) 2015; 8
Merdian (bb0115) 2012
Jenkins (bb0070) 2001
Schwämmlein, Wodzicki (bb0175) 2012; 17
Steel, Newman, O’Rourke, Quayle (bb0195) 2023; 68
Mustafa, Zhang, Naveed (bb0130) 2023; 42
Preece (bb0155) 2001; 20
Krone (bb0100) 2004
Wang, Majeed (bb0225) 2023; 42
Fonhof, van der Bruggen, Takes (bb0020) 2019
Miller (10.1016/j.chiabu.2024.106815_bb0120) 2016; 62
Gannon (10.1016/j.chiabu.2024.106815_bb0030) 2023; 17
Huikuri (10.1016/j.chiabu.2024.106815_bb0055) 2023
Merdian (10.1016/j.chiabu.2024.106815_bb0115) 2012
Schwämmlein (10.1016/j.chiabu.2024.106815_bb0175) 2012; 17
Krone (10.1016/j.chiabu.2024.106815_bb0100) 2004
Joyce (10.1016/j.chiabu.2024.106815_bb0080) 2006; 11
Rogers (10.1016/j.chiabu.2024.106815_bb0170) 2021; 66
McCarthy (10.1016/j.chiabu.2024.106815_bb0110) 2010; 16
van der Bruggen (10.1016/j.chiabu.2024.106815_bb0210) 2022; 40
Karremann (10.1016/j.chiabu.2024.106815_bb0085) 2007
Friedrichs (10.1016/j.chiabu.2024.106815_bb0025) 2022; 31
Seigfried-Spellar (10.1016/j.chiabu.2024.106815_bb0180) 2014; 11
Kloess (10.1016/j.chiabu.2024.106815_bb0095) 2023; 24
Nagin (10.1016/j.chiabu.2024.106815_bb0135) 2005
Preece (10.1016/j.chiabu.2024.106815_bb0155) 2001; 20
von Lampe (10.1016/j.chiabu.2024.106815_bb0220) 2016
IWF (10.1016/j.chiabu.2024.106815_bb0065)
Insoll (10.1016/j.chiabu.2024.106815_bb0060) 2022; 1
Li (10.1016/j.chiabu.2024.106815_bb0105) 2015; 8
Hall (10.1016/j.chiabu.2024.106815_bb0035) 2003; 25
Skardhamar (10.1016/j.chiabu.2024.106815_bb0185) 2010; 48
Postmes (10.1016/j.chiabu.2024.106815_bb0150) 2005; 89
Jenkins (10.1016/j.chiabu.2024.106815_bb0070) 2001
Kim (10.1016/j.chiabu.2024.106815_bb0090) 2012; 23
Steel (10.1016/j.chiabu.2024.106815_bb0195) 2023; 68
da Cunha (10.1016/j.chiabu.2024.106815_bb0015) 2020; 10
Skrondal (10.1016/j.chiabu.2024.106815_bb0190) 2004
van der Bruggen (10.1016/j.chiabu.2024.106815_bb0215) 2022; 67
Morselli (10.1016/j.chiabu.2024.106815_bb0125) 2007; 29
van der Bruggen (10.1016/j.chiabu.2024.106815_bb0205) 2021; 33
Fonhof (10.1016/j.chiabu.2024.106815_bb0020) 2019
Woodhams (10.1016/j.chiabu.2024.106815_bb0230) 2021; 12
Owens (10.1016/j.chiabu.2024.106815_bb0145) 2023
Sutherland (10.1016/j.chiabu.2024.106815_bb0200) 1947
Herring (10.1016/j.chiabu.2024.106815_bb0045) 2004; 338
Jin (10.1016/j.chiabu.2024.106815_bb0075) 2015; 52
Harkins (10.1016/j.chiabu.2024.106815_bb0040) 2010; 15
Hsieh (10.1016/j.chiabu.2024.106815_bb0050) 2013
Wang (10.1016/j.chiabu.2024.106815_bb0225) 2023; 42
Quayle (10.1016/j.chiabu.2024.106815_bb0160) 2002; 23
Crowther (10.1016/j.chiabu.2024.106815_bb0010) 2019; 19
Nielsen (10.1016/j.chiabu.2024.106815_bb0140) 2014; 43
Quayle (10.1016/j.chiabu.2024.106815_bb0165) 2003; 6
Akers (10.1016/j.chiabu.2024.106815_bb0005) 1973
Mustafa (10.1016/j.chiabu.2024.106815_bb0130) 2023; 42
References_xml – year: 2001
  ident: bb0070
  article-title: Beyond tolerance: Child pornography on the Internet
– volume: 11
  start-page: 723
  year: 2006
  end-page: 747
  ident: bb0080
  article-title: Predicting continued participation in newsgroups
  publication-title: Journal of Computer-Mediated Communication
– volume: 6
  start-page: 93
  year: 2003
  end-page: 106
  ident: bb0165
  article-title: Model of problematic Internet use in people with a sexual interest in children
  publication-title: Cyberpsychology & Behavior
– volume: 42
  start-page: 10468
  year: 2023
  end-page: 10481
  ident: bb0130
  article-title: What motivates online community contributors to contribute consistently? A case study on Stackoverflow netizens
  publication-title: Current Psychology
– year: 2012
  ident: bb0115
  article-title: Offenders who use child sexual exploitation material: Development of an integrated model for their classification, assessment, and treatment
– year: 2023
  ident: bb0065
  article-title: #BehindTheScreens. A deep dive into the digital and social emergency happening #BehindTheScreens, in children's bedrooms. The annual report 2022
– volume: 29
  start-page: 143
  year: 2007
  end-page: 153
  ident: bb0125
  article-title: The efficiency/security trade-off in criminal networks
  publication-title: Social Networks
– year: 2005
  ident: bb0135
  article-title: Group-based modeling of development
– volume: 25
  start-page: 287
  year: 2003
  end-page: 306
  ident: bb0035
  article-title: Borrowed theory: Applying exchange theories in information science research
  publication-title: Library & Information Science Research
– volume: 16
  start-page: 181
  year: 2010
  end-page: 195
  ident: bb0110
  article-title: Internet sexual activity: A comparison between contact and non-contact child pornography offenders
  publication-title: Journal of Sexual Aggression
– volume: 11
  start-page: 252
  year: 2014
  end-page: 260
  ident: bb0180
  article-title: Distinguishing the viewers, downloaders, and exchangers of Internet child pornography by individual differences: Preliminary findings
  publication-title: Digital Investigation
– volume: 10
  start-page: 73
  year: 2020
  ident: bb0015
  article-title: Assessing police topological efficiency in a major sting operation on the dark web
  publication-title: Scientific Reports
– volume: 23
  start-page: 365
  year: 2002
  end-page: 395
  ident: bb0160
  article-title: Child pornography and the Internet: Perpetuating a cycle of abuse
  publication-title: Deviant Behaviour: An Interdisciplinary Journal
– year: 2004
  ident: bb0100
  article-title: A typology of online child pornography offending
  publication-title: Trends & issues in crime and criminal justice
– year: 2004
  ident: bb0190
  article-title: Generalized latent variable modeling: Multilevel, longitudinal, and structural equation models
– year: 2023
  ident: bb0145
  article-title: Analysis of topic popularity within a child sexual exploitation Tor hidden service
  publication-title: Aggression and Violent Behavior
– volume: 67
  year: 2022
  ident: bb0215
  article-title: Even “lurkers” download: The behavior and illegal activities of members on a child sexual exploitation TOR hidden service
  publication-title: Aggression and Violent Behavior
– volume: 19
  start-page: 931
  year: 2019
  end-page: 949
  ident: bb0010
  article-title: Multilevel mixed-effects parametric survival analysis: Estimation, simulation, and application
  publication-title: The Stata Journal
– volume: 68
  year: 2023
  ident: bb0195
  article-title: Lawless space theory for online child sexual exploitation material offending
  publication-title: Aggression and Violent Behavior
– volume: 40
  start-page: 865
  year: 2022
  end-page: 891
  ident: bb0210
  article-title: Profiling darkweb child sexual exploitation material forum members using longitudinal posting history data
  publication-title: Social Science Computer Review
– year: 1947
  ident: bb0200
  article-title: Principles of criminology
– volume: 31
  start-page: 169
  year: 2022
  end-page: 191
  ident: bb0025
  article-title: Transnational networks of child sexual abuse and consumerism: Edward Brongersma and the pedophilia debate of the 1970s and 1980s
  publication-title: Journal of the History of Sexuality
– volume: 17
  start-page: 353
  year: 2023
  end-page: 365
  ident: bb0030
  article-title: Child sexual abuse material on the darknet
  publication-title: Forensische Psychiatrie, Psychologie, Kriminologie
– volume: 1
  start-page: 2
  year: 2022
  ident: bb0060
  article-title: Risk factors for child sexual abuse material users contacting children online: Results of an anonymous multilingual survey on the dark web
  publication-title: Journal of Online Trust and Safety
– volume: 15
  start-page: 87
  year: 2010
  end-page: 99
  ident: bb0040
  article-title: Sexual offending in groups: An evaluation
  publication-title: Aggression and Violent Behavior
– start-page: 1
  year: 2023
  end-page: 10
  ident: bb0055
  article-title: Users of online child sexual abuse material
  publication-title: Journal of Police and Criminal Psychology
– volume: 20
  start-page: 347
  year: 2001
  end-page: 356
  ident: bb0155
  article-title: Sociability and usability in online communities: Determining and measuring success
  publication-title: Behaviour & Information Technology
– volume: 89
  start-page: 747
  year: 2005
  ident: bb0150
  article-title: Individuality and social influence in groups: Inductive and deductive routes to group identity
  publication-title: Journal of Personality and Social Psychology
– volume: 23
  start-page: 1232
  year: 2012
  end-page: 1245
  ident: bb0090
  article-title: What motivates people to purchase digital items on virtual community websites? The desire for online self-presentation
  publication-title: Information Systems Research
– volume: 48
  start-page: 295
  year: 2010
  end-page: 320
  ident: bb0185
  article-title: Distinguishing facts and artifacts in group-based modeling
  publication-title: Criminology
– volume: 42
  start-page: 1357
  year: 2023
  end-page: 1373
  ident: bb0225
  article-title: How do users’ feedback influence creators’ contributions: An empirical study of an online music community
  publication-title: Behaviour & Information Technology
– year: 2007
  ident: bb0085
  article-title: Es geschieht am helllichten Tag. Die verborgene Welt der Pädophilen und wie wir unsere Kinder vor Missbrauch schützen
– volume: 17
  start-page: 387
  year: 2012
  end-page: 407
  ident: bb0175
  article-title: What to tell about me? Self-presentation in online communities
  publication-title: Journal of Computer-Mediated Communication
– volume: 33
  start-page: 950
  year: 2021
  end-page: 974
  ident: bb0205
  article-title: A crime script analysis of child sexual exploitation material fora on the darkweb
  publication-title: Sexual Abuse
– start-page: 827
  year: 2013
  end-page: 838
  ident: bb0050
  article-title: “Welcome!” social and psychological predictors of volunteer socializers in online communities
  publication-title: Proceedings of the 2013 conference on Computer supported cooperative work
– year: 1973
  ident: bb0005
  article-title: Deviant behavior: A social learning approach
– volume: 338
  start-page: 376
  year: 2004
  ident: bb0045
  article-title: Computer-mediated discourse analysis: An approach to researching online behavior
  publication-title: Designing for virtual communities in the service of learning
– volume: 52
  start-page: 840
  year: 2015
  end-page: 849
  ident: bb0075
  article-title: Why users contribute knowledge to online communities: An empirical study of an online social Q&A community
  publication-title: Information & Management
– volume: 62
  start-page: 1543
  year: 2016
  end-page: 1569
  ident: bb0120
  article-title: Virtual peer effects in social learning theory
  publication-title: Crime and Delinquency
– year: 2016
  ident: bb0220
  article-title: Organized crime: Analyzing illegal activities, criminal structures, and extra-legal governance
– start-page: 412
  year: 2019
  end-page: 423
  ident: bb0020
  article-title: Characterizing key players in child exploitation networks on the dark net
  publication-title: Complex networks and their applications VII: Volume 2 proceedings the 7th international conference on Complex networks and their applications COMPLEX NETWORKS 2018 7
– volume: 43
  start-page: 4337
  year: 2014
  end-page: 4356
  ident: bb0140
  article-title: Group-based criminal trajectory analysis using cross-validation criteria
  publication-title: Communications in Statistics-Theory and Methods
– volume: 66
  start-page: 2354
  year: 2021
  end-page: 2361
  ident: bb0170
  article-title: Online child pornography offender risk assessment using digital forensic artifacts: The need for a hybrid model
  publication-title: Journal of Forensic Sciences
– volume: 12
  year: 2021
  ident: bb0230
  article-title: Characteristics and behaviors of anonymous users of dark web platforms suspected of child sexual offenses
  publication-title: Frontiers in Psychology
– volume: 24
  start-page: 1220
  year: 2023
  end-page: 1237
  ident: bb0095
  article-title: Trust and relationship development among users in Dark Web child sexual exploitation and abuse networks: A literature review from a psychological and criminological perspective
  publication-title: Trauma, Violence, & Abuse
– volume: 8
  start-page: 170
  year: 2015
  end-page: 183
  ident: bb0105
  article-title: Knowledge sharing in virtual communities: A social exchange theory perspective
  publication-title: Journal of Industrial Engineering and Management
– volume: 62
  start-page: 1543
  year: 2016
  ident: 10.1016/j.chiabu.2024.106815_bb0120
  article-title: Virtual peer effects in social learning theory
  publication-title: Crime and Delinquency
  doi: 10.1177/0011128714526499
– volume: 33
  start-page: 950
  year: 2021
  ident: 10.1016/j.chiabu.2024.106815_bb0205
  article-title: A crime script analysis of child sexual exploitation material fora on the darkweb
  publication-title: Sexual Abuse
  doi: 10.1177/1079063220981063
– year: 2016
  ident: 10.1016/j.chiabu.2024.106815_bb0220
– volume: 23
  start-page: 1232
  year: 2012
  ident: 10.1016/j.chiabu.2024.106815_bb0090
  article-title: What motivates people to purchase digital items on virtual community websites? The desire for online self-presentation
  publication-title: Information Systems Research
  doi: 10.1287/isre.1110.0411
– volume: 12
  year: 2021
  ident: 10.1016/j.chiabu.2024.106815_bb0230
  article-title: Characteristics and behaviors of anonymous users of dark web platforms suspected of child sexual offenses
  publication-title: Frontiers in Psychology
  doi: 10.3389/fpsyg.2021.623668
– year: 2004
  ident: 10.1016/j.chiabu.2024.106815_bb0190
– volume: 67
  year: 2022
  ident: 10.1016/j.chiabu.2024.106815_bb0215
  article-title: Even “lurkers” download: The behavior and illegal activities of members on a child sexual exploitation TOR hidden service
  publication-title: Aggression and Violent Behavior
  doi: 10.1016/j.avb.2022.101793
– volume: 25
  start-page: 287
  year: 2003
  ident: 10.1016/j.chiabu.2024.106815_bb0035
  article-title: Borrowed theory: Applying exchange theories in information science research
  publication-title: Library & Information Science Research
  doi: 10.1016/S0740-8188(03)00031-8
– volume: 338
  start-page: 376
  year: 2004
  ident: 10.1016/j.chiabu.2024.106815_bb0045
  article-title: Computer-mediated discourse analysis: An approach to researching online behavior
– ident: 10.1016/j.chiabu.2024.106815_bb0065
– volume: 11
  start-page: 723
  year: 2006
  ident: 10.1016/j.chiabu.2024.106815_bb0080
  article-title: Predicting continued participation in newsgroups
  publication-title: Journal of Computer-Mediated Communication
  doi: 10.1111/j.1083-6101.2006.00033.x
– volume: 11
  start-page: 252
  year: 2014
  ident: 10.1016/j.chiabu.2024.106815_bb0180
  article-title: Distinguishing the viewers, downloaders, and exchangers of Internet child pornography by individual differences: Preliminary findings
  publication-title: Digital Investigation
  doi: 10.1016/j.diin.2014.07.003
– year: 2005
  ident: 10.1016/j.chiabu.2024.106815_bb0135
– start-page: 412
  year: 2019
  ident: 10.1016/j.chiabu.2024.106815_bb0020
  article-title: Characterizing key players in child exploitation networks on the dark net
– start-page: 1
  year: 2023
  ident: 10.1016/j.chiabu.2024.106815_bb0055
  article-title: Users of online child sexual abuse material
  publication-title: Journal of Police and Criminal Psychology
– volume: 31
  start-page: 169
  year: 2022
  ident: 10.1016/j.chiabu.2024.106815_bb0025
  article-title: Transnational networks of child sexual abuse and consumerism: Edward Brongersma and the pedophilia debate of the 1970s and 1980s
  publication-title: Journal of the History of Sexuality
  doi: 10.7560/JHS31202
– volume: 24
  start-page: 1220
  year: 2023
  ident: 10.1016/j.chiabu.2024.106815_bb0095
  article-title: Trust and relationship development among users in Dark Web child sexual exploitation and abuse networks: A literature review from a psychological and criminological perspective
  publication-title: Trauma, Violence, & Abuse
  doi: 10.1177/15248380211057274
– volume: 16
  start-page: 181
  year: 2010
  ident: 10.1016/j.chiabu.2024.106815_bb0110
  article-title: Internet sexual activity: A comparison between contact and non-contact child pornography offenders
  publication-title: Journal of Sexual Aggression
  doi: 10.1080/13552601003760006
– volume: 29
  start-page: 143
  year: 2007
  ident: 10.1016/j.chiabu.2024.106815_bb0125
  article-title: The efficiency/security trade-off in criminal networks
  publication-title: Social Networks
  doi: 10.1016/j.socnet.2006.05.001
– volume: 42
  start-page: 10468
  year: 2023
  ident: 10.1016/j.chiabu.2024.106815_bb0130
  article-title: What motivates online community contributors to contribute consistently? A case study on Stackoverflow netizens
  publication-title: Current Psychology
  doi: 10.1007/s12144-022-03307-4
– volume: 8
  start-page: 170
  year: 2015
  ident: 10.1016/j.chiabu.2024.106815_bb0105
  article-title: Knowledge sharing in virtual communities: A social exchange theory perspective
  publication-title: Journal of Industrial Engineering and Management
– volume: 48
  start-page: 295
  year: 2010
  ident: 10.1016/j.chiabu.2024.106815_bb0185
  article-title: Distinguishing facts and artifacts in group-based modeling
  publication-title: Criminology
  doi: 10.1111/j.1745-9125.2010.00185.x
– volume: 43
  start-page: 4337
  year: 2014
  ident: 10.1016/j.chiabu.2024.106815_bb0140
  article-title: Group-based criminal trajectory analysis using cross-validation criteria
  publication-title: Communications in Statistics-Theory and Methods
  doi: 10.1080/03610926.2012.719986
– volume: 6
  start-page: 93
  year: 2003
  ident: 10.1016/j.chiabu.2024.106815_bb0165
  article-title: Model of problematic Internet use in people with a sexual interest in children
  publication-title: Cyberpsychology & Behavior
  doi: 10.1089/109493103321168009
– year: 2007
  ident: 10.1016/j.chiabu.2024.106815_bb0085
– volume: 68
  year: 2023
  ident: 10.1016/j.chiabu.2024.106815_bb0195
  article-title: Lawless space theory for online child sexual exploitation material offending
  publication-title: Aggression and Violent Behavior
  doi: 10.1016/j.avb.2022.101809
– volume: 10
  start-page: 73
  year: 2020
  ident: 10.1016/j.chiabu.2024.106815_bb0015
  article-title: Assessing police topological efficiency in a major sting operation on the dark web
  publication-title: Scientific Reports
  doi: 10.1038/s41598-019-56704-4
– volume: 1
  start-page: 2
  year: 2022
  ident: 10.1016/j.chiabu.2024.106815_bb0060
  article-title: Risk factors for child sexual abuse material users contacting children online: Results of an anonymous multilingual survey on the dark web
  publication-title: Journal of Online Trust and Safety
  doi: 10.54501/jots.v1i2.29
– year: 1973
  ident: 10.1016/j.chiabu.2024.106815_bb0005
– volume: 66
  start-page: 2354
  year: 2021
  ident: 10.1016/j.chiabu.2024.106815_bb0170
  article-title: Online child pornography offender risk assessment using digital forensic artifacts: The need for a hybrid model
  publication-title: Journal of Forensic Sciences
  doi: 10.1111/1556-4029.14820
– year: 2023
  ident: 10.1016/j.chiabu.2024.106815_bb0145
  article-title: Analysis of topic popularity within a child sexual exploitation Tor hidden service
  publication-title: Aggression and Violent Behavior
  doi: 10.1016/j.avb.2022.101808
– volume: 52
  start-page: 840
  year: 2015
  ident: 10.1016/j.chiabu.2024.106815_bb0075
  article-title: Why users contribute knowledge to online communities: An empirical study of an online social Q&A community
  publication-title: Information & Management
  doi: 10.1016/j.im.2015.07.005
– year: 2004
  ident: 10.1016/j.chiabu.2024.106815_bb0100
  article-title: A typology of online child pornography offending
– volume: 20
  start-page: 347
  year: 2001
  ident: 10.1016/j.chiabu.2024.106815_bb0155
  article-title: Sociability and usability in online communities: Determining and measuring success
  publication-title: Behaviour & Information Technology
  doi: 10.1080/01449290110084683
– volume: 15
  start-page: 87
  year: 2010
  ident: 10.1016/j.chiabu.2024.106815_bb0040
  article-title: Sexual offending in groups: An evaluation
  publication-title: Aggression and Violent Behavior
  doi: 10.1016/j.avb.2009.08.006
– year: 2001
  ident: 10.1016/j.chiabu.2024.106815_bb0070
– start-page: 827
  year: 2013
  ident: 10.1016/j.chiabu.2024.106815_bb0050
  article-title: “Welcome!” social and psychological predictors of volunteer socializers in online communities
– volume: 40
  start-page: 865
  year: 2022
  ident: 10.1016/j.chiabu.2024.106815_bb0210
  article-title: Profiling darkweb child sexual exploitation material forum members using longitudinal posting history data
  publication-title: Social Science Computer Review
  doi: 10.1177/0894439321994894
– volume: 89
  start-page: 747
  year: 2005
  ident: 10.1016/j.chiabu.2024.106815_bb0150
  article-title: Individuality and social influence in groups: Inductive and deductive routes to group identity
  publication-title: Journal of Personality and Social Psychology
  doi: 10.1037/0022-3514.89.5.747
– volume: 19
  start-page: 931
  year: 2019
  ident: 10.1016/j.chiabu.2024.106815_bb0010
  article-title: Multilevel mixed-effects parametric survival analysis: Estimation, simulation, and application
  publication-title: The Stata Journal
  doi: 10.1177/1536867X19893639
– volume: 17
  start-page: 353
  year: 2023
  ident: 10.1016/j.chiabu.2024.106815_bb0030
  article-title: Child sexual abuse material on the darknet
  publication-title: Forensische Psychiatrie, Psychologie, Kriminologie
  doi: 10.1007/s11757-023-00790-8
– volume: 17
  start-page: 387
  year: 2012
  ident: 10.1016/j.chiabu.2024.106815_bb0175
  article-title: What to tell about me? Self-presentation in online communities
  publication-title: Journal of Computer-Mediated Communication
  doi: 10.1111/j.1083-6101.2012.01582.x
– year: 1947
  ident: 10.1016/j.chiabu.2024.106815_bb0200
– volume: 23
  start-page: 365
  year: 2002
  ident: 10.1016/j.chiabu.2024.106815_bb0160
  article-title: Child pornography and the Internet: Perpetuating a cycle of abuse
  publication-title: Deviant Behaviour: An Interdisciplinary Journal
  doi: 10.1080/01639620290086413
– year: 2012
  ident: 10.1016/j.chiabu.2024.106815_bb0115
– volume: 42
  start-page: 1357
  year: 2023
  ident: 10.1016/j.chiabu.2024.106815_bb0225
  article-title: How do users’ feedback influence creators’ contributions: An empirical study of an online music community
  publication-title: Behaviour & Information Technology
  doi: 10.1080/0144929X.2022.2073472
SSID ssj0000575
Score 2.444783
Snippet The darknet hosts an increasing number of hidden services dedicated to the distribution of child sexual abuse material (CSAM). Given that by contributing CSAM...
SourceID proquest
pubmed
crossref
elsevier
SourceType Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 106815
SubjectTerms Child
Child Abuse, Sexual - psychology
Child Abuse, Sexual - statistics & numerical data
Differential association
Female
Humans
Law Enforcement - methods
Lawless space
Male
Online community
Reciprocity
Self-presentation
Social Capital
Social Learning
Social Media - statistics & numerical data
Social Network Analysis
Social Networking
Title Why do users continue to contribute to darknet Child Sexual Abuse Material forums? Examining social exchange, social capital, and social learning explanations using digital forensic artifacts
URI https://www.clinicalkey.com/#!/content/1-s2.0-S0145213424002059
https://dx.doi.org/10.1016/j.chiabu.2024.106815
https://www.ncbi.nlm.nih.gov/pubmed/38735124
https://www.proquest.com/docview/3054434791
Volume 153
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELaqcuGCKM-FUg0S4tSwm8SxzQmtqlYLqL1A1d4sv7IsXZLVJiu1F_4afw2PHS9CAhVxi0czymPG47HzzQwhr5TwrpGrMnOuLjKqijoTxm9WtPOrpapUyUJ1_tMzNjunHy6ryx1ylHJhEFY5-P7o04O3Hijj4WuOV4vFGGFJFdYjQxRk4aMEzGCnHK38zfdfMA-MRyKMscqQO6XPBYwXwon1xu8SC-pJTGBz3D8vT38LP8MydHKf3BviR5jGR9wjO655QPZjki1cuGWt1g5eQyK066uH5MfFlxuwLeCBRAcITl80Gwd9G65Dx6swsmp91bgeQrlj-BSKMcNUezE4VX0wVQjFG7p3cHytvoXeEhBP3cFdxxziw0QwKjQkOQTV2EQbelTMPfdqqeJBZAeIvZ-DXcyRH--AoHoDqAbMu-gekfOT489Hs2xo3JAZyvI-y2tFa69pqv0W2BuBprkTtpwoXtdc1Co3tbKsNJPcUUd5xQRVNrc-ejQF5T6KeEx2m7ZxTwm8LazmmglLtaC5YUJPKssZV46ZQhfliJRJX9IMVc2xucZSJvjaVxm1LFHLMmp5RLKt1CpW9biFv0qmIFPGqvex0i87t8jxrdxvVv0Pki-TxUk_4fEvjmpcu-mkd9CUYv5vPiJPoilu36EUvPQRHH323_d9Tu7iKAKS98luv964Fz7s6vVBmFcH5M70_cfZ2U8vdi-s
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NbtQwELaqcoAL4p-FAoMEnBp2kzhOOCBUQast7fZCq_Zm_Jdl6ZJdbbKivfBSPACvxoydLEICFSH1lkw8iuOxZ8bONzOMPVMFqsZcpZFzZRJxlZRRYXCzoh1aS5WpVPjs_KMDMTzi70-ykzX2vYuFIVhlq_uDTvfauqX029HszyeTPsGSMspHRijIBL2EFlm5586_4r6tfr37DoX8PEl2tg_fDqO2tEBkuIibKC4VL7EvXOMmDbupeewKmw5UXpZ5UarYlMqK1Axixx3PM1FwZWOL_o1JeO6zHaDev8JRXVDZhJfffuFKyAEKuMksou518XoeVEb4Zb3EbWnCkSQKqsb7Z3v4N3_X272dG-x667DCVhiTm2zNVbfYRojqhWM3LdXCwQvoCLPF6W324_jTOdgZ0AlIDYSGn1RLB83MX_sSW_7OqsVp5Rrw-ZXhg8_-DFsa2WCkGr82wGeLqN_A9pn64otZQDjmB3cWgpY3O4JRvgLKJqjKdrS2KMYYW8-nKpx81kBg_zHYyZja0xsIxW-A5E6BHvUddnQp4rzL1qtZ5e4zeJVYnWtRWK4LHhtR6EFmc5ErJ0yik7TH0k5e0rRp1Kmax1R2eLnPMkhZkpRlkHKPRSuueUgjckH7rJsKsguRRaUu0c5dwJev-H5bRv_A-bSbcRI1DP02UpWbLWuJFoFzCjiOe-xemIqrb0iLPEWXkT_47_c-YVeHh6N9ub97sPeQXaMnAQ29wdabxdI9Qp-v0Y_9GgP28bIX9U-8zmwI
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Why+do+users+continue+to+contribute+to+darknet+Child+Sexual+Abuse+Material+forums%3F+Examining+social+exchange%2C+social+capital%2C+and+social+learning+explanations+using+digital+forensic+artifacts&rft.jtitle=Child+abuse+%26+neglect&rft.au=Blokland%2C+Arjan&rft.au=Daser%2C+Anton&rft.au=de+Boer%2C+Meike&rft.au=Gannon%2C+Colm&rft.date=2024-07-01&rft.issn=1873-7757&rft.eissn=1873-7757&rft.volume=153&rft.spage=106815&rft_id=info:doi/10.1016%2Fj.chiabu.2024.106815&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0145-2134&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0145-2134&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0145-2134&client=summon