CFP last date
22 July 2024
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 22 July 2024

Submit your paper
Know more
Reseach Article

A Framework to Investigate Cybergrooming Crimes

by Natalie Fernandes, Charles Edwards, Dinesh Mothi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 14
Year of Publication: 2023
Authors: Natalie Fernandes, Charles Edwards, Dinesh Mothi
10.5120/ijca2023922819

Natalie Fernandes, Charles Edwards, Dinesh Mothi . A Framework to Investigate Cybergrooming Crimes. International Journal of Computer Applications. 185, 14 ( Jun 2023), 9-16. DOI=10.5120/ijca2023922819

@article{ 10.5120/ijca2023922819,
author = { Natalie Fernandes, Charles Edwards, Dinesh Mothi },
title = { A Framework to Investigate Cybergrooming Crimes },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2023 },
volume = { 185 },
number = { 14 },
month = { Jun },
year = { 2023 },
issn = { 0975-8887 },
pages = { 9-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number14/32762-2023922819/ },
doi = { 10.5120/ijca2023922819 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:26:02.285848+05:30
%A Natalie Fernandes
%A Charles Edwards
%A Dinesh Mothi
%T A Framework to Investigate Cybergrooming Crimes
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 14
%P 9-16
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Grooming is when an adult builds an emotional connection with a child with the intention of exploiting the child’s trust by using them for their own sexual gratification. Groomers will first gain the trust of the child so that the child is less likely going to question their intentions. Groomers can do this by offering to buy gifts for the child, giving the child attention or pretending to be a child themselves therefore deceiving the child who may not know they are being groomed. Thus leading to sexual abuse, and as the groomer would find ways to convince the child to meet up with them to then take sexual advantage of the child. After review, it was found that a method or framework was missing. To address that gap, in this paper, we propose a theoretical framework to investigate child cybergrooming offences in the jurisdiction of England and Wales. The data was gathered through interviews, and grounded theory was applied to create the framework which could then be applied at the operational or managerial level. Future work would also focus on applying digital policing skills to investigate how cybergrooming could be reduced and tackled in this day and age of the cyberworld.

References
  1. ACPO (2012). ACPO Good Practice Guide for Digital Evidence. 5th ed. [ebook] Available at: http://www.digital-detective.net/digital-forensics-documents/ACPO_Good_Practice_Guide_for_Digital_Evidence_v5.pdf
  2. Aqib Riaz. (2014). Belkasoft RAM Capturer and Evidence center. [Online Video]. 6 December 2014. Available from: https://www.youtube.com/watch?v=kPA9bEJsar0.
  3. BBC Inside Out - the hidden scandal of sexual grooming of young Sikh girls by Muslim men. (2013). [video] Available at: https://www.youtube.com/watch?v=7hXTM7ehvtk
  4. BBC News (2018). Children could get online grooming 'alerts' - NSPCC. [online] Available at: http://www.bbc.co.uk/news/uk-42855172 [Accessed 22 Apr. 2018].
  5. Belkasoft. (2018a). Belkasoft Evidence Center 2017. [online] Available at: https://belkasoft.com/ec [Accessed 22 Apr. 2018].
  6. Belkasoft. (2018b). Belkasoft RAM Capturer: Volatile Memory Acquisition Tool. [online] Available at: https://belkasoft.com/ram-capturer [Accessed 22 Apr. 2018].
  7. Belkasoft. (2018c). Belkasoft Acquisition Tool. [online] Available at: https://belkasoft.com/bat [Accessed 22 Apr. 2018].
  8. Bond Solon (2010). Excellence in Written Evidence. pp.11-16.
  9. Bond, C., Solon, M., Harper, P. and Davies, G. (2007). The expert witness. 3rd ed. Kent: Shaw & Sons Limited, pp.47-76.
  10. Bowcott, O. (2018). Police should need warrants to search mobile phones, say campaigners. The Guardian. [online] Available at: https://www.theguardian.com/uk-news/2017/jan/13/police-warrant-search-mobile-phones-campaigners-privacy-international.
  11. Brodies LLP (2017). Search warrants - responding to search warrants in Scotland. [ebook] brodies, pp.1-4. Available at: http://www.brodies.com/sites/default/files/search_warrants_in_scotland.pdf
  12. Cellebrite. (2018). UFED Cloud Analyzer. [online] Available at: https://www.cellebrite.com/en/products/ufed-cloud-analyzer
  13. Cellebrite. (2018a). UFED Ultimate / PA. [online] Available at: https://www.cellebrite.com/en/products/ufed-ultimate/ [Accessed 22 Apr. 2018].
  14. Cellebrite. (2018b). Field Series. [online] Available at: https://www.cellebrite.com/en/solutions/field-series/ [Accessed 22 Apr. 2018].
  15. Cellebrite. (2018c). UFED Cloud Analyzer. [online] Available at: https://www.cellebrite.com/en/products/ufed-cloud-analyzer/ [Accessed 22 Apr. 2018].
  16. Childline. (2018). Online grooming | Childline. [online] Available at: https://www.childline.org.uk/info-advice/bullying-abuse-safety/online-mobile-safety/online-grooming/ [Accessed 22 Apr. 2018].
  17. Ciardhuáin, S.Ó., 2004. An extended model of cybercrime investigations. International Journal of Digital Evidence, 3(1), pp.1-22.
  18. College of Policing (2013). Investigation process. [online] App.college.police.uk. Available at: https://www.app.college.police.uk/app-content/investigations/investigation-process
  19. Criminal Law (Sexual Offenses) Act 2017 part 2, ss.8. Available at: http://www.irishstatutebook.ie/eli/2017/act/2/section/8/enacted/en/html ECPAT International. (2016). ECPAT International. [online] Available at: http://www.ecpat.org/
  20. Edwards, C. (2017) Interviewed by Natalie Fernandes, 29 November.
  21. Forensic Science Regulator (2014). Digital forensic services: codes of practice for forensic service providers. 1st ed. [ebook] p.7. Available at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/351220/2014.08.28_FSR-C-107_Digital_forensics.pdf.
  22. Forensic Science Regulator (2014a). Digital forensic services: codes of practice for forensic service providers. 1st ed. [ebook] Available at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/351220/2014.08.28_FSR-C-107_Digital_forensics.pdf.
  23. Halliday, J. (2015). Teenager who killed Breck Bednar in ‘sadistic’ attack jailed for life. The Guardian. [online] Available at: https://www.theguardian.com/uk-news/2015/jan/12/lewis-daynes-stabbed-breck-bednar-essex-sentenced-chelmsford-crown-court [Accessed 22 Apr. 2018].
  24. Home Office (2014). Guidance – Evidence in criminal investigations. 3rd ed. [ebook] pp.33-34. Available at:
Index Terms

Computer Science
Information Sciences

Keywords

Cybergrooming Digital Forensics Investigation Framework.