{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T19:13:01Z","timestamp":1767985981947,"version":"3.49.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,1,25]],"date-time":"2018-01-25T00:00:00Z","timestamp":1516838400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s10676-018-9449-5","type":"journal-article","created":{"date-parts":[[2018,1,25]],"date-time":"2018-01-25T17:04:28Z","timestamp":1516899868000},"page":"101-113","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["The virtual simulation of child sexual abuse: online gameworld users\u2019 views, understanding and responses to sexual ageplay"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3840-2921","authenticated-orcid":false,"given":"Carla","family":"Reeves","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,25]]},"reference":[{"key":"9449_CR1","volume-title":"Internet Child Pornography and the Law: National and International Responses","author":"Y Akdeniz","year":"2008","unstructured":"Akdeniz, Y. (2008). Internet Child Pornography and the Law: National and International Responses. Aldershot: Ashgate."},{"key":"9449_CR2","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s10676-015-9381-x","volume":"17","author":"R Ali","year":"2015","unstructured":"Ali, R. (2015). A new solution to the gamer\u2019s dilemma\u2019. Ethics and Information Technology, 17, 267\u2013274.","journal-title":"Ethics and Information Technology"},{"issue":"1","key":"9449_CR3","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s10676-011-9280-8","volume":"14","author":"C Bartel","year":"2012","unstructured":"Bartel, C. (2012). Resolving the gamer\u2019s dilemma. Ethics and Information Technology, 14(1), 11\u201316.","journal-title":"Ethics and Information Technology"},{"issue":"2","key":"9449_CR4","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/s12119-007-9003-9","volume":"11","author":"A Butts","year":"2007","unstructured":"Butts, A. (2007).\u201dSigned, Sealed, Delivered \u2026 I\u2019m Yours\u201d: Calibrating body ownership through the consensual mastery\/slavery dynamic. Sexuality and Culture, 11(2), 62\u201376.","journal-title":"Sexuality and Culture"},{"key":"9449_CR5","volume-title":"The discovery of grounded theory: Strategies for qualitative research","author":"BG Glaser","year":"1967","unstructured":"Glaser, B. G., & Strauss, A. L. (1967). The discovery of grounded theory: Strategies for qualitative research. Chicago: Aldine."},{"key":"9449_CR6","volume-title":"Stigma: Notes on the management of spoiled identity","author":"E Goffman","year":"1963","unstructured":"Goffman, E. (1963). Stigma: Notes on the management of spoiled identity. Jamaica: Pelican."},{"key":"9449_CR7","first-page":"70","volume":"1","author":"J Herczeg","year":"2014","unstructured":"Herczeg, J. (2014). Actual problems of possession and viewing of child pornography in internet. JURA, 1, 70\u201380.","journal-title":"JURA"},{"issue":"6","key":"9449_CR8","doi-asserted-by":"publisher","first-page":"2160","DOI":"10.1016\/j.chb.2012.06.022","volume":"28","author":"SAA Jin","year":"2012","unstructured":"Jin, S. A. A. (2012). The virtual malleable self and the virtual identity discrepancy model: Investigative frameworks for virtual possible selves and others in avatar-based identity construction and social interaction. Computers in Human Behavior, 28(6), 2160\u20132168.","journal-title":"Computers in Human Behavior"},{"key":"9449_CR9","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.clsr.2007.11.004","volume":"24","author":"S Kierkegaard","year":"2008","unstructured":"Kierkegaard, S. (2008). Cybering, online grooming and ageplay. Computer Law and Security Report, 24, 41\u201355.","journal-title":"Computer Law and Security Report"},{"key":"9449_CR10","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1023\/A:1021372601566","volume":"4","author":"N Levy","year":"2002","unstructured":"Levy, N. (2002). Virtual child pornography: The eroticization of inequality. Ethics and Information Technology, 4, 319\u2013323.","journal-title":"Ethics and Information Technology"},{"key":"9449_CR11","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s10676-008-9168-4","volume":"11","author":"M Luck","year":"2009","unstructured":"Luck, M. (2009). The gamer\u2019s dilemma: An analysis of the arguments for the moral distinction between virtual murder and virtual paedophilia. Ethics and Information Technology, 11, 31\u201336.","journal-title":"Ethics and Information Technology"},{"issue":"3","key":"9449_CR100","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s10676-013-9322-5","volume":"15","author":"M Luck","year":"2013","unstructured":"Luck, M., & Ellerby, N. (2013). Has Bartel resolved the gamer\u2019s dilemma? Ethics and Information Technology, 15(3), 229\u2013233.","journal-title":"Ethics and Information Technology"},{"issue":"1","key":"9449_CR12","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1177\/1461444813504270","volume":"17","author":"RM Martey","year":"2015","unstructured":"Martey, R. M., Stromer-Galley, J., Consalvo, M., Wu, J., Banks, J., & Strzalkowski, T. (2015). Communicating age in Second Life: The contributions of textual and visual factors. New Media and Society, 17(1), 41\u201361.","journal-title":"New Media and Society"},{"key":"9449_CR13","first-page":"88","volume":"9","author":"C Meek-Prieto","year":"2008","unstructured":"Meek-Prieto, C. (2008). Just age playing around? How second life aids and abets child pornography. North Carolina Journal of Law and Technology, 9, 88\u2013109.","journal-title":"North Carolina Journal of Law and Technology"},{"issue":"3","key":"9449_CR14","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1177\/1354856514531532","volume":"20","author":"P Nagy","year":"2014","unstructured":"Nagy, P., & Koles, B. (2014). The digital transformation of human identity: Towards a conceptual model of virtual identity in virtual worlds. Convergence, 20(3), 276\u2013292.","journal-title":"Convergence"},{"issue":"3","key":"9449_CR15","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1080\/13600869.2010.523611","volume":"24","author":"A Nair","year":"2010","unstructured":"Nair, A. (2010). Real porn and pseudo porn: The regulatory road. International Review of Law, Computers and Technology, 24(3), 223\u2013232.","journal-title":"International Review of Law, Computers and Technology"},{"issue":"2","key":"9449_CR16","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.tourman.2009.12.005","volume":"32","author":"A Papathanassis","year":"2011","unstructured":"Papathanassis, A., & Knolle, F. (2011). Exploring the adoption and processing of online holiday reviews: A grounded theory approach. Tourism Management, 32(2), 215\u2013224.","journal-title":"Tourism Management"},{"key":"9449_CR17","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s10676-012-9310-1","volume":"15","author":"SL Partridge","year":"2013","unstructured":"Partridge, S. L. (2013). Pornography, ethics, and video games. Ethics and Information Technology, 15, 25\u201334.","journal-title":"Ethics and Information Technology"},{"issue":"2","key":"9449_CR18","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1177\/0907568212462255","volume":"20","author":"D Pasura","year":"2012","unstructured":"Pasura, D., Jones, A. D., Hafner, J. A. H., Maharaj, P. E., Nathaniel-De Caires, K., & Johnson, J. E. (2012). Competing meanings of childhood and the social construction of child sexual abuse in the Caribbean. Childhood, 20(2), 200\u2013214.","journal-title":"Childhood"},{"key":"9449_CR001","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1080\/13552600.2011.640947","volume":"19","author":"C Reeves","year":"2013","unstructured":"Reeves, C. (2013). Fantasy depictions of child sexual abuse: The problem of ageplay in Second Life. Journal of Sexual Aggression. 19, 236\u2013246.","journal-title":"Journal of Sexual Aggression"},{"key":"9449_CR19","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1057\/9781137345899_5","volume-title":"The palgrave handbook of the psychology of sexuality and gender","author":"C Richards","year":"2015","unstructured":"Richards, C. (2015). Further sexualities. In C. Richards & M. J. Barker (Eds.) The palgrave handbook of the psychology of sexuality and gender. Palgrave MacMillan, Basingstoke, pp 60\u201376."},{"issue":"1","key":"9449_CR20","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1057\/ejis.2012.52","volume":"23","author":"U Schultze","year":"2014","unstructured":"Schultze, U. (2014). Performing embodied identity in virtual worlds. European Journal of Information Systems, 23(1), 84\u201395.","journal-title":"European Journal of Information Systems"},{"issue":"10","key":"9449_CR21","doi-asserted-by":"publisher","first-page":"1372","DOI":"10.1177\/1049732307307031","volume":"17","author":"H Stark","year":"2007","unstructured":"Stark, H., & Trinidad, B. S. (2007). Choose your method: A comparison of phenomenology, discourse analysis, and grounded theory. Qualitative Health Research, 17(10), 1372\u20131380.","journal-title":"Qualitative Health Research"},{"key":"9449_CR22","first-page":"311","volume":"58","author":"P Stoup","year":"2008","unstructured":"Stoup, P. (2008). The development and failure of social norms in Second Life. Duke Law Journal, 58, 311\u2013344.","journal-title":"Duke Law Journal"},{"key":"9449_CR23","first-page":"195","volume":"44","author":"CL Takeuchi","year":"2015","unstructured":"Takeuchi, C. L. (2015). Regulating Lolicon: Toward Japanese compliance with its international legal obligations to ban virtual child pornography. Georgia Journal of International & Comparative Law, 44, 195\u2013236.","journal-title":"Georgia Journal of International & Comparative Law"},{"key":"9449_CR24","first-page":"1127","volume":"66","author":"RF Wilson","year":"2009","unstructured":"Wilson, R. F. (2009). Protecting virtual playgrounds: Children, law and play online: sex play in virtual worlds. Washington and Lee Law Review, 66, 1127\u20131174.","journal-title":"Washington and Lee Law Review"},{"key":"9449_CR25","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s10676-012-9306-x","volume":"15","author":"G Young","year":"2013","unstructured":"Young, G. (2013). Enacting taboos as a means to an end; but what end? On the morality of motivations for child murder and padophilia wihin gamespace. Ethics and Information Technology, 15, 13\u201323.","journal-title":"Ethics and Information Technology"},{"key":"9449_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46595-1","volume-title":"Resolving the gamer\u2019s dilemma: Examining the moral and psychological differences between virtual murder and virtual paedophilia","author":"G Young","year":"2016","unstructured":"Young, G. (2016). Resolving the gamer\u2019s dilemma: Examining the moral and psychological differences between virtual murder and virtual paedophilia. Basingstoke: Palgrave Macmillan."},{"key":"9449_CR27","doi-asserted-by":"publisher","first-page":"1228","DOI":"10.1016\/j.chb.2010.03.023","volume":"26","author":"G Young","year":"2010","unstructured":"Young, G., & Whitty, M. T. (2010). Games without frontiers: On the moral and psychological implications of violating taboos within multi-player virtual spaces. Computers in Human Behavior, 26, 1228\u20131236.","journal-title":"Computers in Human Behavior"},{"key":"9449_CR28","doi-asserted-by":"crossref","DOI":"10.4135\/9781446214831","volume-title":"The vertigo of late modernity","author":"J Young","year":"2007","unstructured":"Young, J. (2007). The vertigo of late modernity. London: Sage."},{"key":"9449_CR29","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.ijinfomgt.2010.07.007","volume":"31","author":"Z Zhou","year":"2011","unstructured":"Zhou, Z., Jin, X., Vogel, D. R., Fang, Y., & Chen, X. (2011). Individual motivations and demographic differences in social virtual world uses: An exploratory investigation in Second Life. International Journal of Information Management, 31, 261\u2013271.","journal-title":"International Journal of Information Management"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-018-9449-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9449-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9449-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T05:57:24Z","timestamp":1660370244000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-018-9449-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,25]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["9449"],"URL":"https:\/\/doi.org\/10.1007\/s10676-018-9449-5","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,25]]},"assertion":[{"value":"25 January 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The author declares that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}