{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T23:50:44Z","timestamp":1774309844576,"version":"3.50.1"},"reference-count":52,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DP160100601"],"award-info":[{"award-number":["DP160100601"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Honeypots have been a key tool in controlling and understanding digital crime for several decades. The tool has traditionally been deployed against actors who are attempting to hack into systems or as a discovery mechanism for new forms of malware. This paper presents a novel approach to using a honeypot architecture in conjunction with social networks to respond to non-technical digital crimes. The tool is presented within the context of Child Exploitation Material (CEM), and to support the goal of taking an educative approach to Internet users who are developing an interest in this material. The architecture that is presented in the paper includes multiple layers, including recruitment, obfuscation, and education. The approach does not aim to collect data to support punitive action, but to educate users, increasing their knowledge and awareness of the negative impacts of such material.<\/jats:p>","DOI":"10.3390\/fi14040121","type":"journal-article","created":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T21:44:06Z","timestamp":1649972646000},"page":"121","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Creating Honeypots to Prevent Online Child Exploitation"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0003-2285-8932","authenticated-orcid":false,"given":"Joel","family":"Scanlan","sequence":"first","affiliation":[{"name":"Australian Institute of Health Service Management, University of Tasmania, Hobart, TAS 7005, Australia"}]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-1399-7175","authenticated-orcid":false,"given":"Paul A.","family":"Watters","sequence":"additional","affiliation":[{"name":"Cyberstronomy, Melbourne, VIC 3000, Australia"}]},{"given":"Jeremy","family":"Prichard","sequence":"additional","affiliation":[{"name":"School of Law, University of Tasmania, Hobart, TAS 7005, Australia"}]},{"given":"Charlotte","family":"Hunn","sequence":"additional","affiliation":[{"name":"School of Law, University of Tasmania, Hobart, TAS 7005, Australia"}]},{"given":"Caroline","family":"Spiranovic","sequence":"additional","affiliation":[{"name":"School of Law, University of Tasmania, Hobart, TAS 7005, Australia"}]},{"given":"Richard","family":"Wortley","sequence":"additional","affiliation":[{"name":"Department of Security and Crime Science, University College London, London WC1H 9EZ, UK"}]}],"member":"1968","published-online":{"date-parts":[[2022,4,14]]},"reference":[{"key":"ref_1","unstructured":"Australian Federal Police (2022, April 09). Available online: https:\/\/linproxy.fan.workers.dev:443\/https\/www.afp.gov.au\/what-we-do\/crime-types\/cyber-crim."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1177\/0002716218783679","article-title":"Regulating Cybercrime through Law Enforcement and Industry Mechanisms","volume":"679","author":"Holt","year":"2018","journal-title":"Ann. Am. Acad. Political Soc. Sci."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.ijlcj.2016.07.002","article-title":"Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian cybercriminals","volume":"47","author":"Ibrahim","year":"2016","journal-title":"Int. J. Law Crime Justice"},{"key":"ref_4","unstructured":"Ashworth, A.J. (2013). Positive Obligations in Criminal Law, Bloomsbury Publishing."},{"key":"ref_5","unstructured":"Wortley, R., and Smallbone, S. (2012). Child Pornography on the Internet: Causes Investigation and Prevention, Pager."},{"key":"ref_6","unstructured":"Ingham, K., and Forrest, S. (2002). A History and Survey of Network Firewalls. [Ph.D. Thesis, Department of Computer Science University of New Mexico]. Available online: https:\/\/linproxy.fan.workers.dev:443\/https\/www.researchgate.net\/publication\/228602583."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TSE.1987.232894","article-title":"An intrusion-detection model","volume":"SE-13","author":"Denning","year":"1987","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref_8","unstructured":"Spitzner, L. (2003, May 08). Definitions and Value of Honeypots. Available online: https:\/\/linproxy.fan.workers.dev:443\/https\/www.eetimes.com\/definitions-and-value-of-honeypots\/."},{"key":"ref_9","first-page":"1998","article-title":"The deception toolkit","volume":"19","author":"Cohen","year":"1998","journal-title":"Risks Dig."},{"key":"ref_10","unstructured":"Hunn, T., Watters, C., Prichard, P., Wortley, J., Scanlan, R., Spiranovic, J., and Krone, C. (2022). Implementing Online Warnings to Prevent CSAM Use: A Technical Overview, in press."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/MSECP.2003.1193207","article-title":"The Honeynet Project: Trapping the hackers","volume":"1","author":"Spitzner","year":"2003","journal-title":"IEEE Secur. Priv."},{"key":"ref_12","unstructured":"Stoll, C. (1989). The Cuckoo\u2019s Egg: Inside the World of Computer Espionage, Doubleday."},{"key":"ref_13","unstructured":"Nawrocki, M., W\u00e4hlisch, M., Schmidt, T.C., Keil, C., and Sch\u00f6nfelder, J. (2016). A survey on honeypot software and data analysis. arXiv."},{"key":"ref_14","unstructured":"Schneier, B. (2003). Secrets and Lies: Digital Security in a Networked World, Wiley."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Lavorgna, A., and Holt, T.J. (2021). Honeypots for Cybercrime Research BT\u2014Researching Cybercrimes: Methodologies, Ethics, and Critical Approaches, Springer International Publishing.","DOI":"10.1007\/978-3-030-74837-1"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"101464","DOI":"10.1016\/j.avb.2020.101464","article-title":"Assessing the challenges affecting the investigative methods to combat online child exploitation material offenses","volume":"55","author":"Holt","year":"2020","journal-title":"Aggress. Violent Behav."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Wortley, R., and Smallbone, S. (2012). Internet Child Pornography: Causes, Investigation, and Prevention, ABC-CLIO.","DOI":"10.5040\/9798400671708"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1080\/09540261.2018.1541872","article-title":"Primary and secondary prevention of child sexual abuse","volume":"31","author":"Knack","year":"2019","journal-title":"Int. Rev. Psychiatry"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1111\/jsm.12785","article-title":"The German Dunkelfeld Project: A Pilot Study to Prevent Child Sexual Abuse and the Use of Child Abusive Images","volume":"12","author":"Beier","year":"2015","journal-title":"J. Sex. Med."},{"key":"ref_20","unstructured":"Thorn (2022, April 04). Available online: https:\/\/linproxy.fan.workers.dev:443\/https\/www.thorn.org."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1080\/10538712.2019.1703232","article-title":"Child Sexual Abuse: The Need for a Perpetration Prevention Focus","volume":"29","author":"Fix","year":"2020","journal-title":"J. Child Sex. Abus."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.chiabu.2014.12.009","article-title":"Web-based child pornography: The global impact of deterrence efforts and its consumption on mobile platforms","volume":"44","author":"Steel","year":"2015","journal-title":"Child Abus. Negl."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.ssresearch.2016.04.010","article-title":"Liking and hyperlinking: Community detection in online child sexual exploitation networks","volume":"59","author":"Westlake","year":"2016","journal-title":"Soc. Sci. Res."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Prichard, J., Krone, T., Spiranovic, C., and Watters, P. (2018). Transdisciplinary research in virtual space: Can online warning messages reduce engagement with child exploitation material. Routledge Handbook of Crime Science, Routledge.","DOI":"10.4324\/9780203431405-23"},{"key":"ref_25","unstructured":"Koontz, L.D. (2005). File Sharing Programs: The Use of Peer-to-Peer Networks to Access Pornography, US Government Accountability Office."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1080\/13552600.2016.1241308","article-title":"A methodology for profiling paraphilic interest in Child Sexual Exploitation Material users on peer-to-peer networks","volume":"23","author":"Brennan","year":"2016","journal-title":"J. Sex. Aggress."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/j.chiabu.2015.10.022","article-title":"Characterization of contact offenders and child exploitation material trafficking on five peer-to-peer networks","volume":"52","author":"Bissias","year":"2016","journal-title":"Child Abus. Negl."},{"key":"ref_28","unstructured":"Grant, H. (2022, March 08). World\u2019s Biggest Porn Site under Fire over Rape and Abuse Videos. The Guardian, Available online: https:\/\/linproxy.fan.workers.dev:443\/https\/www.theguardian.com\/global-development\/2020\/mar\/09\/worlds-biggest-porn-site-under-fire-over-videos-pornhub."},{"key":"ref_29","unstructured":"Olfman, S. (2009). Childified women: How the mainstream porn industry sells child pornography to men. The Sexualization of Childhood, Westport, Praeger."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1002\/bsl.2450","article-title":"Motivational pathways underlying the onset and maintenance of viewing child pornography on the Internet","volume":"38","author":"Knack","year":"2020","journal-title":"Behav. Sci. Law"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1016\/j.clsr.2011.09.009","article-title":"Internet subcultures and pathways to the use of child pornography","volume":"27","author":"Prichard","year":"2011","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1080\/1478601X.2018.1492389","article-title":"All part of the process? A qualitative examination of change in online child pornography behaviors","volume":"31","author":"Steely","year":"2018","journal-title":"Crim. Justice Stud."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1080\/13552600.2016.1201158","article-title":"Internet sexual offending from an anthropological perspective: Analysing offender perceptions of online spaces","volume":"23","author":"Rimer","year":"2016","journal-title":"J. Sex. Aggress."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1177\/1079063213502678","article-title":"Correlates and Moderators of Child Pornography Consumption in a Community Sample","volume":"26","author":"Ray","year":"2013","journal-title":"Sex. Abus."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1177\/1079063215603690","article-title":"Looking Beyond the Screen: A Critical Review of the Literature on the Online Child Pornography Offender","volume":"29","author":"Henshaw","year":"2015","journal-title":"Sex. Abus."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Quayle, E., and Ribisl, K. (2013). Situational prevention of child abuse in the new technologies. Understanding and Preventing Online Sexual Exploitation of Children, Routledge.","DOI":"10.4324\/9780203127766"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1177\/1079063208326929","article-title":"Psychological profiles of Internet sexual offenders: Comparisons with contact sexual offenders","volume":"21","author":"Elliott","year":"2009","journal-title":"Sex. Abus."},{"key":"ref_38","first-page":"41","article-title":"Opportunities, precipitators and criminal decisions: A reply to Wortley\u2019s critique of situational crime prevention","volume":"16","author":"Cornish","year":"2003","journal-title":"Crime Prev. Stud."},{"key":"ref_39","unstructured":"Wortley, R., and Mazerolle, L. (2008). Situational crime prevention. Environmental Criminology and Crime Analysis, Willan Publishing."},{"key":"ref_40","first-page":"34","article-title":"Characteristics of Internet Sexual Offenders: A Review","volume":"2","author":"Merdian","year":"2009","journal-title":"Sex. Abus. Aust. N. Z."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"863","DOI":"10.1093\/bjsw\/32.7.863","article-title":"Paedophiles, Pornography and the Internet: Assessment Issues","volume":"32","author":"Quayle","year":"2002","journal-title":"Br. J. Soc. Work"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1177\/0004865820903794","article-title":"Why internet users\u2019 perceptions of viewing child exploitation material matter for prevention policies","volume":"53","author":"Hunn","year":"2020","journal-title":"Aust. N. Z. J. Criminol."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1080\/03033910.2008.10446278","article-title":"Criminogenic qualities of the Internet in the collection and distribution of abuse images of children","volume":"29","author":"Taylor","year":"2008","journal-title":"Ir. J. Psychol."},{"key":"ref_44","unstructured":"Prichard, R., Scanlan, J., Krone, J., Spiranovic, T., Watters, C., and Wortley, P. (2022, April 04). Trends Issues Crime Crim. Justice. Available online: https:\/\/linproxy.fan.workers.dev:443\/https\/discovery.ucl.ac.uk\/id\/eprint\/10144666\/."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1080\/17482798.2010.510005","article-title":"A content analysis of youth sexualized language and imagery in adult film packaging, 1995\u20132007","volume":"4","author":"Jensen","year":"2010","journal-title":"J. Child. Media"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1007\/s12119-013-9210-5","article-title":"Age is in the Eye of the Beholder: Examining the Cues Employed to Construct the Illusion of Youth in Teen Pornography","volume":"18","author":"Peters","year":"2013","journal-title":"Sex. Cult."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"401","DOI":"10.2224\/sbp.2012.40.3.401","article-title":"Segmentation of Users of Social Networking Websites","volume":"40","year":"2012","journal-title":"Soc. Behav. Personal. Int. J."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1177\/0743558407306348","article-title":"Generation xxx pornography acceptance and use among emerging adults","volume":"23","author":"Carroll","year":"2008","journal-title":"J. Adolesc. Res."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.adolescence.2010.04.010","article-title":"Frequent users of pornography. A population based epidemiological study of Swedish male adolescents","volume":"34","author":"Svedin","year":"2011","journal-title":"J. Adolesc."},{"key":"ref_50","unstructured":"(2022, April 04). Google. A Secure Web Is Here to Stay. Available online: https:\/\/linproxy.fan.workers.dev:443\/https\/security.googleblog.com\/2018\/02\/a-secure-web-is-here-to-stay.html."},{"key":"ref_51","unstructured":"Volkman, E. (2022, March 08). Abuse of HTTPS on Nearly Three-Fourths of all Phishing Sites, Available online: https:\/\/linproxy.fan.workers.dev:443\/https\/info.phishlabs.com\/blog\/abuse-of-https-on-nearly-three-fourths-of-all-phishing-sites."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1177\/10790632211013809","article-title":"Effects of Automated Messages on Internet Users Attempting to Access \u201cBarely Legal\u201d Pornography","volume":"34","author":"Prichard","year":"2021","journal-title":"Sex. Abus. J. Res. Treat."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.mdpi.com\/1999-5903\/14\/4\/121\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:54:19Z","timestamp":1760136859000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.mdpi.com\/1999-5903\/14\/4\/121"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":52,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2022,4]]}},"alternative-id":["fi14040121"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.3390\/fi14040121","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,14]]}}}