• Zvonimir Ivanović University of criminal investigation and police studies Belgrade
  • Božidar Banović Faculty of Security Belgrade


child sexual exploitation, law enforcement, child abuse images and videos, law, society reactions


Authors in this article are trying to address problems in the Serbian law system and Law enforcement practice at first level in determining what represents child sexual abuse activity (CSA) and material following it. On the next level it is pointed out to the problems and illusions in creation malfunctional paradigms with fawl definitions, and noneficient working material for law enforcing. Definitions are shown in ommissions even from the strategical law acts down to the last norm. Practically it is shown through analysis of statistical values and variables in the phenomena on the field. Authors are providing comparative analysis of the issue on the strategic, tactial and operationa level, colliding total of registered high-tech crimes HTC and comparing it with whole criminal activity in Republic of Serbia, and dispersing it to specific crimes in CSA and material creating for CSA. Results show low incidence of CSA crimes, but in this article it is intention to directly compare real incidence through comparison of crime rate and clearance rate of those crimes in order to get statistically and scientifically significant results.


Download data is not yet available.


Bidgoli, H. (2006) Handbook of Information Security, Volume 2, John Wiley & Sons, Inc., Hoboken, NJ.

Budimlic M. I Puharic, P. (2009) In Computer Crime, Criminology, Criminal Justice, Criminal Justice and Security Aspects, Sarajevo.

Cirović, D. Janković, N. Ladjevic, M. (2005) Cyber Underground in Serbia, Reporter, 11/16/2005.

Chen, L., Murad, H., Paras, M., Colbenson, K., Sattler, A., Goranson, E., ... Zirakzadeh, A. (2010). Sexual abuse and lifetime diagnosis of psychiatric disorders: Systematic review and meta-analysis. Mayo Clinic Proceedings, 85, 618–629.

Giovannoni, J., & Becerra, R. (1979). Defining child abuse. New York, NY: Free Press.

Edwards, V., Freyd, J., Dube, S., Anda, R., & Felitti, V. (2012). Health outcomes by closeness of sexual abuse perpetrator: A test of betrayal trauma theory. Journal of Aggression, Maltreatment & Trauma, 21, 133–148.

EUROPOL High tech crimes within the eu: old crimes new tools, new crimes new toolS, Threat Assessment 2007, High Tech Crime Centre dostupno na str. poslednji put pristupljeno 20.07.2010.

Finkelhor, D. (1979). What’s wrong with sex between adults and children: Ethics and the problem of sexual abuse. American Journal of Orthopsychiatry, 49, 692–697.

Gerke, M. Đokić, D. Radulović, S. Petrović Z. Lazović, V. Prah, R. (2008) Priručnik za istragu krivičnih dela u oblasti visokotehnološkog kriminala, Savet Evrope, 2008.

Haugaard, J. (2000). The challenge of defining child sexual abuse. American Psychologist, 55, 1036–1039.

Ivanović, Z. Lajić, O. Pretresanje i oduzimanje predmeta u vezi sa automatskom obradom podataka, Kultura polisa Br. 41, godina XVII, 2020, str.: 323-342.

Ignjatović, Đ. (2000): Pojmovno određivanje računarskog kriminala (u: Petrović, S. Komjuterski kriminal, Beograd 2000.)

Judicial Training Manual on Cybercrime Judges available at: dana 26.01.2010.

Komlen Nikolić, L. i dr. (2010) Suzbijanje viskotehnološkog kriminala, Udruženje javnih tužilaca i zamenika javnih tužilaca, AECID..

Mathews, B. Collin-Ve´zina, D.(2019): Child Sexual Abuse: Toward a Conceptual Model and Definition, TRAUMA, VIOLENCE, & ABUSE, 2019, Vol. 20(2) 131-148

Petrović, S. (2000): Računarski kriminal, Ministarstvo unu-trašnjih poslova Republike Srbije, Beograd.

McQuade, S. C. (2009): III Encyclopedia of cybercrime 2009. Greenwood Press, 88 Post Road West, Westport,.p.44.

Jerković, R. Rad je objavljen na Internetu u elektronskoj formi i dostupan je na: poslednji put pristupljeno 20.05.2010.god

Tenth United Nations Congress on the Prevention of Crime and the treatment of Offenders, poslednji put pris-tupljeno 20.09.2010.god

UNODC poslednji put pristupljeno 21.02.2020.god.

Paolucci, E., Genuis, M., & Violato, C. (2001). A meta-analysis of the published research on the effects of child sexual abuse. The Journal of Psychology, 135, 17–36.

Smith, R. G. Grabosky, P. N. Urban, G. F., Cyber criminals on trial, defining and mesuring cyber crime, (2004) Cambridge ; New York : Cambridge University Press.

Trickett, P., Noll, J., & Putnam, F. (2011). The impact of sexual abuse on female development: Lessons from a multigenerational, longitudinal research study. Development and Psychopathology, 23, 453–476. doi:10.1017/S0954579411000174

Negriff, S., Schneiderman, J., Smith, C., Schreyer, J., & Trickett, P. (2014). Characterizing the sexual abuse experiences of young adolescents. Child Abuse & Neglect, 38, 261–270. doi:10.1016/j. chiabu.2013.08.021

Trickett, P. (2006). Defining child sexual abuse. In M. Feerick, J. Knutson, P. Trickett, & S. Flanzer (Eds.), Child abuse and neglect: Definitions, classifications and a framework for research (pp. 129–149). Baltimore, MD: Brookes. Trickett, P., Noll, J., & Putnam, F. (2011). The impact of sexual abuse on female development: Lessons from a multigenerational, longitudinal research study. Development and Psychopathology, 23, 453–476. doi:10.1017/S0954579411000174

Trickett, P., Noll, J., Reiffman, A., & Putnam, F. (2001). Variants of intrafamilial sexual abuse experience: Implications for long term development. Development and Psychopathology, 13, 1001–1019.

Urosevic, V. Ivanovic, Z. (2010) Conferece papers from Conference forum BISEC, pp.64-71.

NCIS (National Criminal Intelligence Service, NCIS).

Крылов В.В. (1997) Информационные компьютерные преступления: Учебное и практическое пособие. – М.: Инфра-М – Нормa.




How to Cite




Original scientific work


Most read articles by the same author(s)

1 2 > >>