Preventing Child Sexual Exploitation

1103 words (4 pages) Essay

18th May 2020 Criminology Reference this

Disclaimer: This work has been submitted by a university student. This is not an example of the work produced by our Essay Writing Service. You can view samples of our professional work here.

Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of

Child Exploitation

 Most parents are guardians for their children. One purpose in life is to raise your child the best you can. In good health, education, and to become good people. That is the hope of each parent at one time or another. There are people with the criminal mind that will take advantage of an innocent child. They will use this child for cheap labor, sexual purposes, child pornography, and other purposes. It is a sad and real truth to our communities. We will be exploring child pornography.

Get Help With Your Essay

If you need assistance with writing your essay, our professional essay writing service is here to help!

Find out more

Child Pornography

 The perpetrators who take the photos are often related to the victims, or otherwise acquainted in some way (Wortley & Smallbone, 2006c). For example, January, 2012, Neng Yang, a school teacher in Clovis, California, was charged with four counts of producing child pornography. He pled guilty to two counts of exploitation of a minor and as part of a plea agreement admitted to using his computer to record, store, and transmit videos depicting the sexual abuse of a child under the age of 12. Yang was sentenced to spend 38 years in federal prison, and a fine of $250,000 (U.S. Department of Justice, 2014).

The fine was just the beginning for Neng Yang and the school where he worked. The victim’s family took a settlement of $2 million dollars. The investigation of was led by the Central California Internet Crimes Against Children Task Force, especially with the help of the Clovis Police Department and the Fresno U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI), that led to the prosecution of Neng Yang. If not for investigations like these the schools would have more Mr. Yangs (U.S. Department of Justice, 2014).

It is a time when we can’t even send our children to school and worry if they are being taught or being taken advantage of. There is a good chance that Mr. Yangs’ victim did not sue for profit. The trust this child had was most likely taken away. The result of this would be to be home schooled. The victim missed out on the traditional education, being part of a team, and competing and friending other children her own age.


Children are born innocent. They are exposed to criminality of adults that they are suppose to trust. Children are raised to look up to adults and authority figures. So, when they are told to do something by a teacher, the child will not question it too much, because they think “This is my teacher. I might get trouble for not listening.” 

Children with a stressful home life may also feel that they cannot confide in a parent because the parent is already burdened with so many problems and may not respond well (Murray, L. K., Nguyen, A., & Cohen, J. A., 2014). The child’s confidence is built through time and may not want to cause more problems by telling his or her parents about an inappropriate behavior. The child may think he or she might get in trouble if he or she told. A lot of children now-a-days are told not to tale-tell, that it is not nice, and they start to think in that mind set.

Perpetrators have their own ways on selecting their victims. They go after children who have problems at home or the loner. When a child has problems at home, he or she would be open and trust someone that is giving them the attention they’re looking for. If they are loners, will that would mean they are looking for a friend. Perpetrators go after the vulnerability of a child and play the part that the child is missing and looking for.

Today you see children with tablets, phone, and computers. No matter if it’s to help with their homework, attend classes online, or gaming, you are letting the threat of a perpetrator into you home. The internet provides them with significantly greater access to potential targets along with added anonymity and the ability to keep things secret (Collin-Vézina, D., Daigneault, I., & Hébert, M., 2013). Not only do these devices greatly expand a perpetrator’s reach, but they remove many barriers to perpetration (such as trying to isolate a child or being able to send inappropriate material) (Collin-Vézina, D., Daigneault, I., & Hébert, M., 2013). It turns out that parents, or guardians, are letting these perpetrators into our homes and the lives of our children.


Include a period at the end of a run-in heading. Note that you can include consecutive paragraphs with their own headings, where appropriate.  

Heading 4.

When using headings, don’t skip levels. If you need a heading 3, 4, or 5 with no text following it before the next heading, just add a period at the end of the heading and then start a new paragraph for the subheading and its text. (Last Name, Year)

Find out how can help you!

Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.

View our services
Heading 5.

Like all sections of your paper, references start on their own page, as you see on the page that follows. Just type in-text citations as you do any text of your paper, as shown at the end of this paragraph and the preceding paragraph. (Last Name, Year)

To see this document with all layout and formatting, such as hanging indents, on the View tab of the ribbon, click Reading View. 


Last Name, F. M. (Year). Article Title. Journal Title, Pages From – To.

Last Name, F. M. (Year). Book Title. City Name: Publisher Name

Cite This Work

To export a reference to this article please select a referencing stye below:

Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.

Related Services

View all

DMCA / Removal Request

If you are the original writer of this essay and no longer wish to have your work published on the website then please: