Although adults in romantic relationships currently show more openness to online sexual behaviors [1], these behaviors can nevertheless increase couple conflicts and instability [2]. In the current study, we assess th...Although adults in romantic relationships currently show more openness to online sexual behaviors [1], these behaviors can nevertheless increase couple conflicts and instability [2]. In the current study, we assess the mediating role of Internet pornography use and cyber infidelity in the relationship between 1) personality and attachment, and 2) couple and sexual satisfaction. A total of 779 participants in couple relationships (average age = 29.9 years) completed a series of online questionnaires. According to their responses, 65% of participants visited an adult site at least once during the six months preceding the study, while 16.3% did so multiple times per week. Path model results showed that Internet pornography use and cyber infidelity were sequential mediators between, on the one hand, personality and attachment, and on the other hand, couple and sexual satisfaction. The discussion highlights the importance of properly documenting the correlates of online sexual behavior to better understand new couple realities and dynamics.展开更多
The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hy...The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hypothetical Trojan Horse author to be included in quantifying the relative plausibility of competing explanations for the existence of uncontested digital evidence.This new model has been applied to the case of the Trojan Horse defence( THD) against the possession of child pornography.Our results demonstrate that the THD in this case cannot be plausibly sustained unless it can be shown that an ‘off-theshelf'( OTS) Trojan Horse for this task is available and it is not detectable by the target computer,at the material time.展开更多
Results of several studies point to an increase in reported child sexual abuse offences in Germany and an even higher number of undetected cases are assumed. In addition, even more cases regarding the distribution of ...Results of several studies point to an increase in reported child sexual abuse offences in Germany and an even higher number of undetected cases are assumed. In addition, even more cases regarding the distribution of child pornography have been reported. On behalf of victims of child sexual abuse and for the general public, a preventive treatment approach for people with a sexual interest in children is of prime importance. Currently, there is no published, evaluated therapeutic approach for treating potential offenders, dark field offenders and bright field offenders with a sexual interest in children in an outpatient setting. We designed a cognitive-behavioral therapeutic approach that integrated need- and resource-oriented concepts for the specific treatment of those people. This treatment program comprises thirteen modules and is established for a period of about one and a half years. The therapy concept is presented in detail and we report experiences with two male clients. We found a reduction of child abusive behavior (on- and off-line), cognitive distortions and subjective psychological distress, an increase of the extent of self-perceived sexual self-regulation, life satisfaction and self-efficacy in general and a high level of clients’ satisfaction with the therapy concept. The present therapy concept shows promising results as a potential viable treatment program to protect children by reaching out to people with a self-reported sexual interest in children in an outpatient setting, but further research is necessary.展开更多
A table of 95%confidence limits on the probabilities for randomly downloading relatively small numbers of illegal images or sensitive documents amongst a relatively large number of other images or documents has been c...A table of 95%confidence limits on the probabilities for randomly downloading relatively small numbers of illegal images or sensitive documents amongst a relatively large number of other images or documents has been computed.It is anticipated that these data will assist prosecution officials in arriving at a decision as to whether or not there is a reasonable likelihood of a successful criminal prosecution when the inadvertent download defence is employed in cases of possession of child pornography,terrorist material or espionage-related documents.The same data can also be used by defence counsels to assess the strength of the prosecution’s case.展开更多
文摘Although adults in romantic relationships currently show more openness to online sexual behaviors [1], these behaviors can nevertheless increase couple conflicts and instability [2]. In the current study, we assess the mediating role of Internet pornography use and cyber infidelity in the relationship between 1) personality and attachment, and 2) couple and sexual satisfaction. A total of 779 participants in couple relationships (average age = 29.9 years) completed a series of online questionnaires. According to their responses, 65% of participants visited an adult site at least once during the six months preceding the study, while 16.3% did so multiple times per week. Path model results showed that Internet pornography use and cyber infidelity were sequential mediators between, on the one hand, personality and attachment, and on the other hand, couple and sexual satisfaction. The discussion highlights the importance of properly documenting the correlates of online sexual behavior to better understand new couple realities and dynamics.
文摘The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hypothetical Trojan Horse author to be included in quantifying the relative plausibility of competing explanations for the existence of uncontested digital evidence.This new model has been applied to the case of the Trojan Horse defence( THD) against the possession of child pornography.Our results demonstrate that the THD in this case cannot be plausibly sustained unless it can be shown that an ‘off-theshelf'( OTS) Trojan Horse for this task is available and it is not detectable by the target computer,at the material time.
文摘Results of several studies point to an increase in reported child sexual abuse offences in Germany and an even higher number of undetected cases are assumed. In addition, even more cases regarding the distribution of child pornography have been reported. On behalf of victims of child sexual abuse and for the general public, a preventive treatment approach for people with a sexual interest in children is of prime importance. Currently, there is no published, evaluated therapeutic approach for treating potential offenders, dark field offenders and bright field offenders with a sexual interest in children in an outpatient setting. We designed a cognitive-behavioral therapeutic approach that integrated need- and resource-oriented concepts for the specific treatment of those people. This treatment program comprises thirteen modules and is established for a period of about one and a half years. The therapy concept is presented in detail and we report experiences with two male clients. We found a reduction of child abusive behavior (on- and off-line), cognitive distortions and subjective psychological distress, an increase of the extent of self-perceived sexual self-regulation, life satisfaction and self-efficacy in general and a high level of clients’ satisfaction with the therapy concept. The present therapy concept shows promising results as a potential viable treatment program to protect children by reaching out to people with a self-reported sexual interest in children in an outpatient setting, but further research is necessary.
文摘A table of 95%confidence limits on the probabilities for randomly downloading relatively small numbers of illegal images or sensitive documents amongst a relatively large number of other images or documents has been computed.It is anticipated that these data will assist prosecution officials in arriving at a decision as to whether or not there is a reasonable likelihood of a successful criminal prosecution when the inadvertent download defence is employed in cases of possession of child pornography,terrorist material or espionage-related documents.The same data can also be used by defence counsels to assess the strength of the prosecution’s case.