Journal of International Commercial Law and Technology
2025, Volume:6, Issue:1 : 507-513 doi: dx.doi.org/10.61336/Jiclt/25-01-46
Research Article
Cross-Border Jurisdiction and IP Enforcement Challenges in Dark Web Distribution of Child Sexual Abuse Material
 ,
 ,
 ,
 ,
 ,
1
Research Scholar, School of Law, Pacific Academy of Higher Education and Research University, Udaipur and Assistant Professor, School of Law, UPES, Dehradun.
2
Assistant Professor, Department of Law, Amity University, Jharkhand
3
Assistant Professor, Amity Law School, Amity University, Jharkhand.
4
Assistant Professor, Department of Law, KLEF (Deemed to be) University, Guntur, Andhra Pradesh
5
Campus Coordinator, Department of Forensic Science, National Forensic Sciences University, Tripura Campus
6
Assistant Professor, TMCLLS, Teerthanker Mahaveer University, Moradabad
Received
Sept. 6, 2025
Revised
Sept. 20, 2025
Accepted
Oct. 2, 2025
Published
Oct. 22, 2025
Abstract

In this paper, the author discusses the complex issues of cross-border jurisdiction and enforcement of intellectual property laws as relates to the distribution of Child Sexual Abuse Material content within the Dark Web and specifically the legal and technological environment in India. It examines the complex trends of digital abuse and its resulting effects on the victimization of Indian women, in the narrower context of non-consensual image-based harassment, but it also contemplates a larger problem of online child sexual abuse and exploitation that is facilitated by the ubiquitous digital technologies. The paper also examines how the anonymity provided by the Dark Web, along with the advent of cryptocurrency markets, makes investigating and prosecuting hackers more difficult, providing a complicated sentencing ground on such crimes. Another factor that contributes to this challenge is the prevalence of child pornography on the internet that would require stringent legal systems and international collaboration to protect the children around the world. Coupled with the disastrous figures that show how every third internet user in the world is a child, it is possible to state that there is a high level of exposure of this demographic on the online market, to its exploitation.

Keywords
INTRODUCTION

Child Sexual Abuse Material proliferation on the dark web is a global problem unmatched by any other challenge that requires thorough analysis of cross-border jurisdictional issues and limitations on intellectual property enforcement especially in the Indian context (Ngo et al., 2023). Being enabled by encrypted networks and advanced evasion methods, this cyber threat highlights a serious disconnect between existing legal and technical frameworks created to protect children online (Sayyed & Paul, 2025) . The anonymity provided by the dark web and encryption technologies creates a favorable environment to distribute CSAM, and it is quite impossible to identify the perpetrators and break their network considering that law enforcement agencies need a substantial amount of time to identify them. This problem is further complicated by the sheer amount of CSAM shared in these shadowy virtual realms that makes it a major social issue clogging hotline and law enforcement agencies. To make the situation even more problematic, battery-made CSAM, widely discussed in dark web forums, has marked a new aspect of this danger, with AI models being disseminated as open source and thus an accidental contributor to the development of advanced content creation and distribution techniques (Kokolaki and Fragopoulou, 2025). This should require a multisided and immediate response to strengthen the current legal frameworks, improve interstate collaboration, and come up with sophisticated technologies that could be utilized to counteract this variant of cybercrime that is taking new forms (Ngo et al., 2023). In the following paper, the author will look into the particular issues that obstruct the execution of the intellectual property law and self-assertion of jurisdiction by Indian officials over organizations that engage in the cross-border shipment of CSAM via the dark web, focusing on the complexity of the interplay between international legislation and domestic legislative weaknesses. More precisely, this discussion shall examine how the anonymity inherent in the dark web and how it will hinder the conventional IP enforcement systems and give rise to considerable evidentiary problems in prosecution under Indian law.

 

The Dark Web and Child Sexual Abuse Material (CSAM)

The dark web is an ambiguous online space that allows the creation, sharing, and communication of Child Sexual Abuse Material with a higher level of anonymity without being detected by the regular search engines and political regulation (Ngo et al., 2023). This dark corner of the internet uses encryption and decentralized systems to obscure user identities and locations, thus anti-authorized practices, such as the prodigal spread of CSAM (Sayyed and Paul, 2025). It is also supported by the specialized programs, such as Tor that redirects internet traffic and uses several relays to make it incredibly difficult to locate the source or the destination of data packets (Singh and Bhanu, 2025). Therefore, offenders use such technological protective measures to escape control measures, which make it hard to trace and arrest people that are engaging in the distribution of CSAM (Huikuri, 2023). The utilization of artificial intelligence to create extremely realistic, but totally fake material has been a boon to the proliferation of CSAM on the dark web, and has made the process of identifying victims and prosecuting them more difficult (Parti & Szabo, 2024)(Wolbers et al., 2025). This atmosphere creates some kind of an illusion of reality in which the lives of real victims may be subjected to distortion, making the identification of victims a pressing issue in society and investigations (Huikuri, 2023). Additionally, the intrinsic difficulties in assigning online actions to the definite individuals or groups concerning the anonymizing infrastructure of the dark web greatly hinder the legal process and the successful enforcement of the national and international laws on the topic of sexually participating in exploitation (Gallo-Serpillo and Valls-Prieto, 2024). The pornification of children, as it existed in ancient erotic works and images, has been further promoted by the digital era, where the information and technology revolution have made the creation and distribution of child pornography much easier and cheaper (Ahmed and Faujdar, 2022). The dark web serves to aggravate the problem; therefore, it also offers the location where not only the already-existing CSAM can be shared with communities that support and encourage the criminal behavior of the perpetrators without imposing any restrictions but also offers the learning models that allow the perpetrators to commit further abuse (Huikuri, 2023).

 

International Legal Frameworks for CSAM Enforcement

Although the efforts of the war on the distribution of CSAM in the dark web space are decentralized and encrypted, international laws and multilateral cooperation are the key tools in the process, although the jurisdictional issues and anonymity of these solutions frequently compromise their efficiency (Kareem, 2024).

 

United Nations Conventions and Protocols

The United Nations has developed established tools like the Convention on the Rights of the Child and its Optional Protocol on the Sale of Children, Child Prostitution and Child Pornography giving a complete international legal framework on how states can criminalize and prosecute crimes against CSAM. To provide a harmonised resolution on child protection, these protocols require signatory countries to domestically criminalise the production, distribution and possession of child pornography. Nevertheless, the enforcement of these international requirements in practice differs widely across jurisdictions, with numerous constraints on cross-border enforcement between countries, particularly against the anonymization nature of dark web transactions (Kloess and Bruggen, 2021).

 

Council of Europe's Budapest Convention

The Convention on Cybercrime (also known as the Budapest Convention) is the only binding international convention that regulates cybercrime, including crimes involving CSAM, and tries to harmonize the national laws, promote investigative efforts, and increase international cooperation. It establishes a framework regulating signatory states to enforce substantive criminal law provisions in cybercrimes, such as child sexual exploitation, and specifies the process of international mutual assistance in investigations (Huikuri, 2023). But India is yet to ratify the Budapest Convention that can be quite a challenge to support the smooth international cooperation and international intelligence exchange in any incident of dark web CSAM across borders. This non-ratification poses a major barrier to Indian law enforcement agencies exploiting the international cooperation systems put in place by the Convention, thus making it difficult to effectively target the cross-boundary dark web criminal syndicates (Vendius, 2015).

 

Mutual Legal Assistance Treaties (MLATs)

Mutual Legal Assistance Treaties are bilateral or multilateral pacts diplomatic in the exchange of evidence and other legal aid amongst nations associated with criminal investigations and criminal charges, and especially important because a law-enforcement agency is usually unable to conduct its operations outside its national boundaries ("The Cambridge Handbook of Digital Evidence in Criminal Investigations," 2025). These agreements allow Indian authorities to request and receive important digital evidence, including user information or content of servers in other countries, which is typically crucial in prosecuting dark web CSAM cases (Sharma, 2020). Nevertheless, the slow diplomatic procedures, divergent legal frameworks and the degree of political goodwill may impede the effectiveness of MLATs and result in delays that undermine the timeliness and efficacy of investigations into emergent criminal networks on the dark web.

 

Indian Legal Framework for CSAM Enforcement

Information Technology Act, 2000 and its Amendments

Although this is a 40-year old primary legislation that was originally enacted to give that legal legitimacy to the electronic transactions, it has been later on amended to cover other cybercrimes in a more detailed manner incorporating into the provisions special provisions against the spread of obscene content and child pornography (Chakraborty and Tiwari, 2025). Particularly, under the amended versions of 67, 67A and 67B of the IT Act, 2000 publications, sexually explicit materials and child pornography respectively are criminalized, so the Indian commitment to fighting online child sexual abuse (Shetty, 2025). These regulations along with the Protection of Children from Sexual Offences Act of 2012 are designed to establish a solid legal framework of actions, yet they are significantly challenged by the anonymity and jurisdiction difficulties of the dark web activities (Manoj et al., 2024). Moreover, the amount of child sexual abuse content that is going through the Internet is quite overwhelming; therefore, the process of identification and intervention becomes severely problematic (Joleby et al., 2020). Additionally, the legal issues that emerge in the light of the Protection of Children Sexual Offences Act that criminalizes sexual activity under 18 years old intersect with the complexities of relationships between adolescents, making the judicial situation of offenses involving CSAM even more challenging (Shukla et al., 2024).

 

Protection of Children from Sexual Offences (POCSO) Act, 2012

The Protection of Children from Sexual Offences Act, 2012 was introduced with a special purpose of combating child sexual abuse and exploitation and created a legal framework that is friendly to children, where the punishments imposed on perpetrators are very strict (Shetty, 2025)(Mallick, 2024). The bill is central to the Indian struggle against CSA, making many types of victimization illegal, including the use of digital tools, but its extension to the complex field of the dark web distribution of CSAM has cannot be effectively implemented (Shinde, 2024). There is a major loophole in the legal framework, with India, as well as most other nations, not clearly criminalizing online grooming, without the intention of meeting in person, which is dangerous in the face of the profound psychological effects such abuses may have on children (Joleby et al., 2020). Moreover, the Act definition of child sexual abuse includes the actions that children might not result in understanding or informed agreement, which corresponds to the international standards, such as the World Health Organization (Tyagi and Karande, 2021)(Saini et al., 2022). The Act also provides mechanisms that are friendly to children regarding reporting, recording of evidence, investigation, and prompt trials by Special Courts reflecting a holistic treatment of children interest by the judicial system (Mohanty and Banerjee, 2021).

 

Challenges in Applying Indian Laws to Dark Web Activities

The nature and anonymity of the dark web makes it extremely difficult to identify the attackers and trace the digital footprint, complicating the task of collecting admissible evidence immensely because of the decentralized nature thereof and anonymity (Manoj et al., 2024). Also, the world-spanning nature of the dark web infrastructure further complicates investigations due to constraints by national borders and necessitates multinational collaboration. These obstacles are also increased by the fact that different legal norms of different countries may also hinder cross-national legal aid, and the free flow of essential information required to prosecute and successfully bring charges against crimes committed in the dark web.

 

Cross-Border Jurisdiction Challenges

This is a fundamental conflict between the decentralized and anonymous nature of the dark web and the much more conventional jurisdictional concepts based on geography, and thus present substantial complexities with the ability to prosecute crimes such as CSAM distribution. In particular, it is extremely challenging to trace digital actions to individuals when the IP addresses are anonymized and information is sent through the many nodes across the world, which makes the traditional investigation techniques relatively ineffective when determining jurisdictions (Huikuri, 2023). Furthermore, the fact that encryption technologies are evolving rapidly, and advanced methods of anonymization used by dark web participants are regularly ahead of legislative and technological efforts to combat it leaves a significant enforcement gap that dilutes the perception of bringing offenders to justice (Joleby et al., 2020). This digital forensics imbalance between countries coupled with the varying legal systems across different countries further fuels the jurisdiction issues, impeding the collaborative international effort required to break up international dark web CSAM networks. Additionally, there is no internationally agreed manner of defining and prosecute cybercrimes on the dark web, and as a result, what would be considered a crime in one country would be a safe haven in another, thus making cybercriminals less vulnerable (Kareem, 2024). This ambiguity is most acute with cryptocurrencies transactions as the activities of different nation states complicate the application of national legislation, creating opportunities to be exploited by illegal activities (Uzougbo et al., 2024). The international character of the internet and the speed at which technological changes are being made continue to outpace the creation of legal frameworks, further weakening the preventive capacity of legal systems and the effectiveness of the law enforcement practices (Zhou et al., 2024)(Vendius, 2015). Transnationalism of cybercrime, especially the dissemination of CSAM through the dark web, implies improved cooperation of the countries, as the investigations often involve more than one country, and the exchange and collection of electronic evidence can be played (Casino et al., 2022). Hence, combating such compound technical issues would need consistent research and development of cybersecurity to be able to detect and prevent such rogue associations as effectively as possible (Kareem, 2024).

 

Intellectual Property (IP) Enforcement in the Context of CSAM

Although all people agreed on the issue of CSAM, the larger discussion surrounding the enforcement of intellectual property in the dark web creates intricate issues related to the process of enforcing conventional laws of intellectual property on digital illegal materials. This is quite difficult due to the anonymity of onion routing networks, which conceals the identity of content distributors and consumers, making it more difficult to establish ownership or authority over digital resources (Kareem, 2024). The natural challenges of tracing the origin and the spread of illegal sources on the dark web are that it is rather difficult to implement the traditional mechanisms of IP enforcement that have traditionally built on the basis of the clear ownership and distribution chains that can be verified (Jin et al., 2023). The CSAM spreads quickly due to the anonymity provided by the dark web, and due to the anonymity, it is almost impossible to tell the point of content origin or to trace further instances of its re-distribution, which is a stark difference to the usual infringement of IP violation cases where the content source is usually easy to determine (Ghanem et al., 2023)(Kareem, 2024). As a result, police departments face substantial challenges with the collection and attribution of evidences during the investigation of cybercrimes through those networks of anonymity, which once more indicates the problem with jurisdiction and the necessity of international cooperation (Kareem, 2024). Technology keeps evolving at an extremely quick rate compared to the legal system, which is why there is a strong discrepancy between the potential of cybercriminals and the tools law enforcement uses (Amoo et al., 2024). It requires sustained modification of both legal and investigation policies in order to be successful in fighting the recurrent menace presented by dark web activities (Kareem, 2024)(Davies, 2020). The adaptation can include the creation of the advanced methods of traffic analysis, the use of machine learning algorithms, and the establishment of the collaboration with other countries to respond to the changing situation in cybercrime (Kareem, 2024). This involves investigating new ways to conduct digital forensic examination in encrypted space and developing the uniformed procedures of data exchange across borders (Kareem, 2024).

CONCLUSION

To sum up, combating the distribution of CSAM on the dark web in India is a complex problem that requires an all-encompassing strategy which would resort to the use of advances in technology, international collaboration of legal efforts, and effective policy frameworks. This includes both proactive steps to detect and disrupt the activities of the dark web as well as steps to gain insights into the changing criminal procedures and adjust the countermeasures (Kareem, 2024). Moreover, the two-way character of technologies, including Tor and I2P, is a cause of a serious dilemma, which requires a delicate effort to maintain privacy on the one hand and to fight criminal acts on the other (Ghanem et al., 2023). As such, the development of traffic analytics and blockchain-based forensics is paramount to identifying and addressing cybercrime in such anonymous networks, although the nature of this problem is difficult to tackle (Kareem, 2024) (Gjorgjev et al., 2025). Law enforcement agencies may greatly speed up the investigation process through the development of automated tools based on machine learning (Horan and Saiedian, 2021). In addition to that, judicial capacity should be strengthened by providing specialized training on cybercrime and work with digital evidence in order to achieve the effectiveness of prosecution and prevent further crimes in the future. Such an integrated approach should focus on the dynamism of cyber threats, constantly revising the legal framework and methods of investigations to keep up with the advancing tricks of the offenders (Gupta and Gupta, 2025). This involves the promotion of public-private collaborations in taking advantage of shared skills and resources in innovating solutions to detect, investigate, and prosecute dark web-related offenses, especially crimes related to CSAM (Kareem, 2024). In addition, the international cooperation used in intelligence sharing and the coordination of law enforcement activities cannot be continued without future international cooperation as these criminal networks are cross-border (Cilleruelo et al., 2020).

REFERENCES
  1. Ahmed, S., & Faujdar, R. (2022). An Overview of Cyber Pornography in India (p. 264). https://doi.org/10.55662/book.2022ccrs.014
  2. Amoo, O. O., Atadoga, A., Abrahams, T. O., Farayola, O. A., Osasona, F., & Ayinla, B. S. (2024). The legal landscape of cybercrime: A review of contemporary issues in the criminal justice system [Review of The legal landscape of cybercrime: A review of contemporary issues in the criminal justice system]. World Journal of Advanced Research and Reviews, 21(2), 205. GSC Online Press. https://doi.org/10.30574/wjarr.2024.21.2.0438
  3. Casino, F., Pina, C., López-Aguilar, P., Batista, E., Solanas, A., & Patsakis, C. (2022). SoK: cross-border criminal investigations and digital evidence. Journal of Cybersecurity, 8(1). https://doi.org/10.1093/cybsec/tyac014
  4. Chakraborty, A., & Tiwari, S. (2025). An analytical study on challenges and gaps in India’s cyber security framework. International Journal of Criminal Common and Statutory Law, 5(1), 4. https://doi.org/10.22271/27899497.2025.v5.i1a.110
  5. Cilleruelo, C., de‐Marcos, L., Junquera-Sánchez, J., & Martínez-Herráiz, J.-J. (2020). Interconnection Between Darknets. IEEE Internet Computing, 25(3), 61. https://doi.org/10.1109/mic.2020.3037723
  6. Davies, G. (2020). Shining a Light on Policing of the Dark Web: An Analysis of UK Investigatory Powers. The Journal of Criminal Law, 84(5), 407. https://doi.org/10.1177/0022018320952557
  7. Gallo-Serpillo, F., & Valls-Prieto, J. (2024). Analysis of CSEM offenders on the dark web using honeypots to geolocate IP addresses from Spain. Computers in Human Behavior, 154, 108137. https://doi.org/10.1016/j.chb.2024.108137
  8. Ghanem, M. C., Mulvihill, P., Ouazzane, K., Djemai, R., & Dunsin, D. (2023). D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities. Journal of Cybersecurity and Privacy, 3(4), 808. https://doi.org/10.3390/jcp3040036
  9. Gjorgjev, J., Ramadhan, M., & Dhamayana, S. (2025). Blockchain Forensics - Unmasking Anonymity in Dark Web Transactions. International Journal of Criminology and Sociology, 14, 68. https://doi.org/10.6000/1929-4409.2025.14.07
  10. Gupta, M., & Gupta, A. (2025). Cyber Security Legal Framework in India – Overlaps, Problems and Challenges. Journal of Business Management and Information Systems, 12(1), 11. https://doi.org/10.48001/jbmis.1201002
  11. Horan, C., & Saiedian, H. (2021). Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions. Journal of Cybersecurity and Privacy, 1(4), 580. https://doi.org/10.3390/jcp1040029
  12. Huikuri, S. (2023). Users of Online Child Sexual Abuse Material. Journal of Police and Criminal Psychology, 38(4), 904. https://doi.org/10.1007/s11896-023-09611-4
  13. Jin, P., Kim, N., Lee, S., & Jeong, D. (2023). Forensic investigation of the dark web on the Tor network: pathway toward the surface web. International Journal of Information Security, 23(1), 331. https://doi.org/10.1007/s10207-023-00745-4
  14. Joleby, M., Lunde, C., Landström, S., & Jönsson, L. (2020). “All of Me Is Completely Different”: Experiences and Consequences Among Victims of Technology-Assisted Child Sexual Abuse. Frontiers in Psychology, 11. https://doi.org/10.3389/fpsyg.2020.606218
  15. Kareem, K. M. (2024). Guardians of Anonymity: Exploring Tactics to Combat Cyber Threats in  Onion Routing Environments. arXiv (Cornell University). https://doi.org/10.48550/arxiv.2406.07563
  16. Kloess, J. A., & Bruggen, M. van der. (2021). Trust and Relationship Development Among Users in Dark Web Child Sexual Exploitation and Abuse Networks: A Literature Review From a Psychological and Criminological Perspective [Review of Trust and Relationship Development Among Users in Dark Web Child Sexual Exploitation and Abuse Networks: A Literature Review From a Psychological and Criminological Perspective]. Trauma Violence & Abuse, 24(3), 1220. SAGE Publishing. https://doi.org/10.1177/15248380211057274
  17. Kokolaki, E., & Fragopoulou, P. (2025). Unveiling AI’s Threats to Child Protection: Regulatory efforts to Criminalize AI-Generated CSAM and Emerging Children’s Rights Violations. https://doi.org/10.48550/ARXIV.2503.00433
  18. Mallick, P. (2024). Comparative analysis of the POCSO Act with international child protection laws: Lessons and Suggestions. International Journal of Political Science and Governance, 6(2), 247. https://doi.org/10.33545/26646021.2024.v6.i2d.393
  19. Manoj, D., James, R. I., Kumaran, S., Devnath, G. P., Varughese, B. T., Arakkal, A. L., & Johnson, L. R. (2024). Behind the Screens: Understanding the Gaps in India’s Fight Against Online Child Sexual Abuse and Exploitation. Deleted Journal, 4, 100088. https://doi.org/10.1016/j.chipro.2024.100088
  20. Mohanty, H., & Banerjee, D. (2021). An Analysis of Protection of Children from Sexual Offences Act, 2012 (POCSO ACT). SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3768096
  21. Ngo, V. M., Gajula, R., Thorpe, C., & McKeever, S. (2023). Discovering child sexual abuse material creators’ behaviors and preferences on the dark web. Child Abuse & Neglect, 147, 106558. https://doi.org/10.1016/j.chiabu.2023.106558
  22. Parti, K., & Szabó, J. (2024). The Legal Challenges of Realistic and AI-Driven Child Sexual Abuse Material: Regulatory and Enforcement Perspectives in Europe. Laws, 13(6), 67. https://doi.org/10.3390/laws13060067
  23. Saini, R., Manral, I., Panjrattan, C., Roy, S., & Singh, A. (2022). A multi-speciality approach to the protection of children from sexual offences act: A review [Review of A multi-speciality approach to the protection of children from sexual offences act: A review]. Industrial Psychiatry Journal, 32(1), 4. Medknow. https://doi.org/10.4103/ipj.ipj_169_21
  24. Sayyed, H., & Paul, S. R. (2025). Exploring the role of encryption and the dark web in cyber terrorism: legal challenges and countermeasures in India. Cogent Social Sciences, 11(1). https://doi.org/10.1080/23311886.2025.2479654
  25. Sharma, S. (2020). Issues with enforcing Mutual Legal Assistance Treaties (MLATs): Access to cross-border data in criminal investigation. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3815270
  26. Shetty, S. S. (2025). Digital Predators: The Legal Landscape of Child Pornography in India. https://doi.org/10.2139/ssrn.5051692
  27. Shinde, D. (2024). Understanding the POCSO Act and its Role in Addressing Child Sexual Abuse Cases in India. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.4886923
  28. Shukla, S., Tiwari, P., Datta, A., Agaarwal, S., Goswami, D., & Galoria, D. (2024). Legal Complexities of Adolescent Relationships: A Study of Protection of Child Sexual Offense Cases in India. Cureus. https://doi.org/10.7759/cureus.60475
  29. Singh, K., & Bhanu, A. P. (2025). Dark Web: The Hidden Face of Cyber Crime. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.5218159
  30. The Cambridge Handbook of Digital Evidence in Criminal Investigations. (2025). In Cambridge University Press eBooks. Cambridge University Press. https://doi.org/10.1017/9781009049771
  31. Tyagi, S. V., & Karande, S. (2021). Child sexual abuse in India. Journal of Postgraduate Medicine, 67(3), 125. https://doi.org/10.4103/jpgm.jpgm_264_21
  32. Uzougbo, N. S., Ikegwu, C. G., & Adewusi, A. O. (2024). International enforcement of cryptocurrency laws: Jurisdictional challenges and collaborative solutions. Magna Scientia Advanced Research and Reviews, 11(1), 68. https://doi.org/10.30574/msarr.2024.11.1.0075
  33. Vendius, T. T. (2015). Proactive Undercover Policing and Sexual Crimes against Children on the Internet. Research Portal Denmark, 2(2), 6. https://local.forskningsportal.dk/local/dki-cgi/ws/cris-link?src=ku&id=ku-b588d487-afb3-4f86-8bed-5bd06cfc6ec8&ti=Proactive%20Undercover%20Policing%20and%20Sexual%20Crimes%20against%20Children%20on%20the%20Internet
  34. Wolbers, H., Cubitt, T., & Cahill, M. T. (2025). Artificial intelligence and child sexual abuse: A rapid evidence assessment. https://doi.org/10.52922/ti77802
  35. Zhou, Y., Tiwari, M., Bernot, A., & Lin, K. (2024). Metacrime and Cybercrime: Exploring the Convergence and Divergence in Digital Criminality. Asian Journal of Criminology, 19(3), 419. https://doi.org/10.1007/s11417-024-09436-y
Recommended Articles
Research Article
Marketing Management in the Digital Era: Promoting Women’s Voices through Social Media Campaigns
...
Published: 22/10/2025
Research Article
From Scrolls to Sales – An Impact of Credibility, Information & Entertainment on Gen Z's Purchase & Behavioural Intention
...
Published: 22/10/2025
Original Article
The Role Of Ai-Driven Personalisation In Shaping Customer Empowerment, And Trust In Digital Financial Services: An Empirical Study
...
Original Article
Corporate Social Responsibility In Healthcare Sector: A Study In Delhi
Loading Image...
Volume:6, Issue:1
Citations
67 Views
16 Downloads
Share this article
© Copyright Journal of International Commercial Law and Technology