La Strada Documentation Center

Cyber-Bullying and online Grooming: helping to protect against the risks A scenario on data mining / profiling of data available on the Internet

Document number
2869
Date
2011
Title
Cyber-Bullying and online Grooming: helping to protect against the risks A scenario on data mining / profiling of data available on the Internet
Author/publisher
European Network and Information Security Agency
Availability
View/save PDF version of this document
Document type(s)
Research/Study/Analysis,
Keywords
Identification (of Victims), Protection, Victims of trafficking, Trafficked persons, Sex tourism, Pornography, Sexual exploitation, Palermo protocol; Child trafficking; Best Interests Principle, Child Victims of Trafficking, Separated Migrant Children, Unaccompanied minors, Family reunification, Guardian, Family Tracing, Age Assessment, Freedom from Detention, Interim Care, Health, Education, Training, Integration, Adoption, Return, Remaining in a Host Country/Country of Asylum, Child protection systems, Convention on the Rights of the Child (CRC), Reflection period, Residency permit, Identification, Social assistance, Victim protection, Advocacy, Civil society, NGO, Human Rights approach,
Summary
Although the issue of children's exposure to internet risks has been addressed in great depth by many organisations (also during the generation of this report), we have performed this risk assessment in order to point out emerging risks and issue non-technical recommendations for their mitigation. Thus, we believe that the findings of this assessment will help in triggering further activities at various levels of society, while contributing to the necessary awareness of the online protection of minors. To this extent, this document should not be considered as overlapping with existing national and international initiatives in the area of child online protection. Rather, it complements them by pointing out additional elements that might be interesting to look at in the future. On the other hand, although non-technical, the assessed risks are based on very detailed analysis down to technological elements. Security experts might find this analysis interesting and even worth reusing in their own work/considerations.
Related documents