July 2024

Volume 07 Issue 07 July 2024
Cyberspace and Sex Trafficking Through Social Media in Cantilan, Surigao Del Sur, Philippines: The Moderating Role of Self Concept
1Laurence P. Bazan, PHD, 2Police Colonel Apolinario G. Hipolito (Ret.), MPA, RCrim, 3Teresito O. Delos Arcos Jr., MSRCIM, 4Eduard Jan E. Plaza, RCrim, JD, 5Marjune I, Millones PHD
1,3,4North Eastern Mindanao State University Cantilan Campus, Cantilan Surigao Del Sur, Philippines
2The New El Salvador College, El Salvador City, Misamis Oriental, Philippines
5Saint Joseph Institute of Technology, Butuan City, Philippines
DOI : https://doi.org/10.47191/ijsshr/v7-i07-60

Google Scholar Download Pdf
ABSTRACT

Cybersex trafficking is a widespread and escalating worldwide problem that surpasses geographical boundaries, cultural differences, and socio-economic conditions. The internet has not only increased the scope and anonymity of traffickers, but it has also made it more difficult to combat these crimes due to transactions and exchanges taking place in the hidden realms of cyberspace. In spite its ubiquity, very few studies have looked into the subject of interest in a localised lens. Thus, this study is conducted to empirically assess the influence of exposure in sex trafficking through social media platforms on the level of participation of cybersex trafficking in Cantilan, Surigao Del Sur, Philippines. The study also delved into testing the possible moderating role of self-concept on the association of the said variables. Using 337 structured survey responses from conveniently sampled individuals, the results of the study showed that a moderate level of both exposure and participation was present in the observed group. In addition, the moderation analysis further demonstrated that exposure significantly influences participation, confirming that individuals who frequently encounter suspicious profiles, unsolicited messages, and related advertisements are more likely to engage in cybersex trafficking activities. Finally, the analysis conducted also proved that self-concept significantly moderates the influence of exposure to sex trafficking through social media on the level of participation in cybersex trafficking, was also supported by the data. Thus, the interaction between exposure and self-concept was found to be significant, indicating that self-concept indeed moderates this relationship.

KEYWORDS:

Cybersex, Self-concept, Sex Trafficking, Social Media

REFERENCES
1) Adeolu, J., Owoaje, E., & Olumide, A. (2018). Association between exposure to sexually explicit content in the electronic media and sexual intentions of in-school adolescents in Southwest Nigeria. International Journal of Adolescent Medicine and Health, 30. https://doi.org/10.1515/ijamh-2016-0056.

2) Alqahtani, M., Partin, R., Back, S., & Jo, S. (2019). The Role of Technology in Facilitating, Connecting, and Ending CYBERCRIME, Drug Trafficking, and Money Laundering. Journal of Instrumentation, 4, 23-33. https://doi.org/10.22471/terrorism.2019.4.2.23.

3) Camelo-Avedoy, J. (2020). Self-exploitation as a concept in the capitalism of the 21st century. ECORFAN Journal Mexico. https://doi.org/10.35429/ejm.2020.25.11.1.11.

4) Didier, E., Hellweger, A., Powell, R., & Kampen, C. (2022). Exploring Legal Accountability of Global Technology And Social Media Companies for the Cyber Exploitation And Online Human Trafficking of Yezidis and Other Minorities By ISIS. Journal of Human Trafficking, Enslavement and Conflict-Related Sexual Violence. https://doi.org/10.7590/266644722x16563337545111.

5) Doornwaard, S. M., Bickham, D. S., Rich, M., ter Bogt, T. F., & van den Eijnden, R. J. (2015). Adolescents’ use of sexually explicit internet material and their sexual attitudes and behavior: Parallel development and directional effects. Developmental Psychology, 51(10), 1476.

6) Fan, X., Jiang, X., Deng, N., Dong, X., & Lin, Y. (2020). Does role conflict influence discontinuous usage intentions? Privacy concerns, social media fatigue and self-esteem. Inf. Technol. People, 34, 1152-1174. https://doi.org/10.1108/itp-08-2019-0416.

7) Franchino-Olsen, H. (2019). Vulnerabilities Relevant for Commercial Sexual Exploitation of Children/Domestic Minor Sex Trafficking: A Systematic Review of Risk Factors. Trauma, Violence, & Abuse, 22, 99 - 111. https://doi.org/10.1177/1524838018821956.

8) Jankowiak, B., Jaskulska, S., Sanz-Barbero, B., Waszyńska, K., Claire, K., Bowes, N., Silva, E., Neves, S., Albaladejo-Blázquez, N., Pyżalski, J., Chmura-Rutkowska, I., & Vives‐Cases, C. (2021). Will I Like Myself If You Hurt Me? Experiences of Violence and Adolescents’ Self-Esteem. Sustainability. https://doi.org/10.3390/su132111620.

9) Jost, J., Barberá, P., Bonneau, R., Langer, M., Metzger, M., Nagler, J., Sterling, J., & Tucker, J. (2018). How Social Media Facilitates Political Protest: Information, Motivation, and Social Networks. Political Psychology, 39, 85-118. https://doi.org/10.1111/POPS.12478.

10) Knight, L., Xin, Y., & Mengo, C. (2021). A Scoping Review of Resilience in Survivors of Human Trafficking. Trauma, Violence, & Abuse, 23, 1048 - 1062. https://doi.org/10.1177/1524838020985561.

11) Koletić, G., Kohut, T., & Štulhofer, A. (2019). Associations between adolescents’ use of sexually explicit material and risky sexual behavior: A longitudinal assessment. PLoS ONE, 14. https://doi.org/10.1371/journal.pone.0218962.

12) McHatton, J., & Ghazinour, K. (2023). Mitigating Social Media Privacy Concerns - A Comprehensive Study. Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics. https://doi.org/10.1145/3579987.3586565.

13) Mehlman-Orozco, K. (2020). Projected heroes and self-perceived manipulators: understanding the duplicitous identities of human traffickers. Trends in Organized Crime, 23, 95-114. https://doi.org/10.1007/S12117-017-9325-4.

14) Mitchell, J., & Raghavan, C. (2019). The Impact of Coercive Control on Use of Specific Sexual Coercion Tactics. Violence Against Women, 27, 187 - 206. https://doi.org/10.1177/1077801219884127.

15) Nichols, A., Slutsker, S., Oberstaedt, M., & Gilbert, K. (2023). Team Approaches to Addressing Sex Trafficking of Minors: Promising Practices for a Collaborative Model. Societies. https://doi.org/10.3390/soc13030066.

16) Noll, J., Haag, A., Shenk, C., Wright, M., Barnes, J., Kohram, M., Malgaroli, M., Foley, D., Kouril, M., & Bonanno, G. (2021). An observational study of Internet behaviours for adolescent females following sexual abuse. Nature Human Behaviour, 6, 74 - 87. https://doi.org/10.1038/s41562-021-01187-5.

17) O’Brien, J., & Li, W. (2020). The role of the internet in the grooming, exploitation, and exit of United States domestic minor sex trafficking victims. Journal of Children and Media, 14, 187 - 203. https://doi.org/10.1080/17482798.2019.1688668.

18) Rubtsova, O., Poskakalova, T., & Shiryaeva, E. (2021). Features of On-Line Behavior in Adolescents with Different Levels of Self-Concept Clarity. Психологическая наука и образование. https://doi.org/10.17759/pse.2021260402.

19) Sanchez, R., Speck, P., & Patrician, P. (2019). A Concept Analysis of Trauma Coercive Bonding in the Commercial Sexual Exploitation of Children.. Journal of pediatric nursing, 46, 48-54 . https://doi.org/10.1016/j.pedn.2019.02.030.

20) Sardá, T., Natale, S., Sotirakopoulos, N., & Monaghan, M. (2019). Understanding online anonymity. Media, Culture & Society, 41, 557 - 564. https://doi.org/10.1177/0163443719842074.

21) Seligman, M. (2018). Building Resilience. OECD Public Governance Policy Papers. https://doi.org/10.1057/9781137367839.0008.

22) Suarez-Tangil, G., Edwards, M., Peersman, C., Stringhini, G., Rashid, A., & Whitty, M. (2019). Automatically Dismantling Online Dating Fraud. IEEE Transactions on Information Forensics and Security, 15, 1128-1137. https://doi.org/10.1109/TIFS.2019.2930479.

23) Van Oosten, J. M., & Vandenbosch, L. (2017). Sexy online self-presentation on social network sites and the willingness to engage in sexting: A comparison of gender and age. Journal of adolescence, 54, 42-50.

24) Walt, E., Eloff, J., & Grobler, J. (2018). Cyber-security: Identity deception detection on social media platforms. Comput. Secur., 78, 76-89. https://doi.org/10.1016/j.cose.2018.05.015.
Volume 07 Issue 07 July 2024

Indexed In

Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar