<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1578-908X</journal-id>
<journal-title><![CDATA[Acción Psicológica]]></journal-title>
<abbrev-journal-title><![CDATA[Acción psicol.]]></abbrev-journal-title>
<issn>1578-908X</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional de Educación a Distancia (UNED)]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1578-908X2017000200007</article-id>
<article-id pub-id-type="doi">10.5944/ap.14.2.20766</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Online child pornography: a cultural focus literature review]]></article-title>
<article-title xml:lang="es"><![CDATA[Pornografía infantil online: una revisión literaria de enfoque cultural]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Lovelle]]></surname>
<given-names><![CDATA[María Inés]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Yepes-Baldó]]></surname>
<given-names><![CDATA[Montserrat]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Romeo]]></surname>
<given-names><![CDATA[Marina]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Soria]]></surname>
<given-names><![CDATA[Miguel Ángel]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universitat de Barcelona  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>España</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2017</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2017</year>
</pub-date>
<volume>14</volume>
<numero>2</numero>
<fpage>99</fpage>
<lpage>112</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.isciii.es/scielo.php?script=sci_arttext&amp;pid=S1578-908X2017000200007&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.isciii.es/scielo.php?script=sci_abstract&amp;pid=S1578-908X2017000200007&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.isciii.es/scielo.php?script=sci_pdf&amp;pid=S1578-908X2017000200007&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract Due to the Internet expansion around the world, child pornography is internationally considered as a crime, but we are uncertain of whether culture has some impact on it. The objective of the present review was to explore cultural aspects included in literature as key variables to analyse this type of crimes, using Hofstede's cultural dimensions (2010) as theoretical framework. A total of 125 papers on pornography (period: 2003-2016) were found in Web of Science®; but only 50 contain some implicit or explicit cultural references. The results showed few cultural variables considered for the scientific approach to child pornography, being the country of birth or race the mainly only ones considered. The major contribution of our research highlights the importance to incorporate the cultural dimension in the police task to assess the indicators that determine the risk factors in aggressors. In this sense, the present research contributes to hypothesize probable cultural differences when using tools as the Kent Internet Risk Assessment Tool (KIRAT) in the European context.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen La eclosión de Internet a nivel mundial ha facilitado la diseminación de pornografía infantil, siendo esta considerada un crimen a escala internacional. Por ello, hemos considerado relevante analizar los aspectos culturales vinculados a este delito. El objetivo de la presente investigación ha sido explorar los aspectos culturales incluidos en la literatura científica como variables clave para analizar este tipo de delitos, partiendo de las dimensiones culturales de Hofstede (2010) como marco teórico. Durante los años 2003 a 2016 se han publicado un total de 125 artículos sobre pornografía en la Web of Science®, si bien sólo 50 de ellos contenían referencias culturales implícitas o explícitas. Los resultados mostraron que son pocas las variables culturales consideradas, siendo el país de nacimiento o la raza las principalmente incluidas. El principal resultado de nuestra investigación constata la importancia de incorporar la dimensión cultural en el trabajo policial al establecer los indicadores que determinan el factor de riesgo en agresores. En este sentido, en el contexto europeo, herramientas como la Kent Internet Risk Assessment Tool (KIRAT) se han visto enriquecidas a partir de los resultados de esta investigación.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Online]]></kwd>
<kwd lng="en"><![CDATA[Child pornography]]></kwd>
<kwd lng="en"><![CDATA[Culture]]></kwd>
<kwd lng="en"><![CDATA[Internet]]></kwd>
<kwd lng="en"><![CDATA[Hofstede's cultural dimensions]]></kwd>
<kwd lng="es"><![CDATA[En línea]]></kwd>
<kwd lng="es"><![CDATA[Pornografía infantil]]></kwd>
<kwd lng="es"><![CDATA[Cultura]]></kwd>
<kwd lng="es"><![CDATA[Internet]]></kwd>
<kwd lng="es"><![CDATA[Dimensiones culturales de Hofstede]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ainsaar]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Lööf]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<source><![CDATA[Online Behaviour related to Child Sexual Abuse]]></source>
<year>2011</year>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Burgess]]></surname>
<given-names><![CDATA[A. W]]></given-names>
</name>
<name>
<surname><![CDATA[Mahoney]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Visk]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Morgenbesser]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber Child Sexual Explotation]]></article-title>
<source><![CDATA[Journal of Psychosocial Nursing]]></source>
<year>2008</year>
<volume>46</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>38-45</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dando]]></surname>
<given-names><![CDATA[C. J]]></given-names>
</name>
<name>
<surname><![CDATA[Oxburgh]]></surname>
<given-names><![CDATA[G. E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Empathy in the field: Towards a Taxonomy of Empathic Communication in Information Gathering Interviews with Suspected Sex Offenders]]></article-title>
<source><![CDATA[European Journal of Psychology Applied to Legal Context]]></source>
<year>2016</year>
<volume>8</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>27-33</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Delgado-Coto]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[França-Tarragó]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Flujo de material pornográfico infantil online: Estudio exploratorio en 10 países de América Latina con foco en Uruguay]]></article-title>
<source><![CDATA[Ciencias Psicológicas]]></source>
<year>2014</year>
<volume>8</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>55-67</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Diamond]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Jozifkova]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Weiss]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Pornography and Sex Crimes in the Czech Republic]]></article-title>
<source><![CDATA[Archives of Sexual Behavior]]></source>
<year>2011</year>
<volume>40</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>1037-43</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="">
<collab>Children Exploitation and Online Protection Centre</collab>
<source><![CDATA[Threat Assessment of Child Sexual Exploitation and Abuse]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fariña]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Arce]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Real]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ruedas de identificacion: de la simulación y la realidad]]></article-title>
<source><![CDATA[Psicothema]]></source>
<year>1994</year>
<volume>7</volume>
<page-range>395-402</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fariña]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Arce]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Sobral]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Carames]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Predictors of Anxiety Towards Computers]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>1991</year>
<volume>7</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>263-7</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Frei]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Erenay]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Dittmann]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Graf]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Paedophilia on the Internet - a Study of 33 Convicted Offenders in the Canton of Lucerne]]></article-title>
<source><![CDATA[Swiss Medical Weekly]]></source>
<year>2005</year>
<volume>135</volume>
<numero>33-34</numero>
<issue>33-34</issue>
<page-range>488-94</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ganescu]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Gangone]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Asandei]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Assessing the Impact of the National Cultural Framework on Responsible Corporate Behaviour Towards Consumers: An Application of Geert Hofstede's Cultural Model]]></article-title>
<source><![CDATA[Amfiteatru Economic]]></source>
<year>2014</year>
<volume>16</volume>
<numero>35</numero>
<issue>35</issue>
<page-range>351-66</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Goethals]]></surname>
<given-names><![CDATA[F. G]]></given-names>
</name>
<name>
<surname><![CDATA[Carugati]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Leclercq]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Differences in e-Commerce Behavior between Neighboring Countries - The case of France and Belgium]]></article-title>
<source><![CDATA[Data Base for Advances in Information Systems]]></source>
<year>2009</year>
<volume>40</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>88-116</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Haag]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Duan]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Mathews]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[Knowledge Development in e-Learning Environments: A Cross-Cultural Perspective]]></source>
<year>2007</year>
<volume>1</volume>
<conf-name><![CDATA[ Proceedings of the 8th European Conference on Knowledge Management (ECKM 2007)]]></conf-name>
<conf-loc>Barcelona, Spain </conf-loc>
<page-range>391-7</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hernandez]]></surname>
<given-names><![CDATA[A. E]]></given-names>
</name>
</person-group>
<source><![CDATA[Self-reported Contact Sexual Offenses by Participants in the Federal Bureau of Prison's Sex Offender Treatment Program: Implications for Internet Sex Offenders]]></source>
<year>2000</year>
<conf-name><![CDATA[ Paper presented at the 19th Research and Treatment Conference of the Association for the Treatment of Sexual Abusers]]></conf-name>
<conf-loc>San Diego, California </conf-loc>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hinkson]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Australia's Bill Henson Scandal: Notes on the New Cultural Attitude to Images]]></article-title>
<source><![CDATA[Visual Studies]]></source>
<year>2009</year>
<volume>24</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>202-13</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hofstede]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<source><![CDATA[Culture's Consequences: Comparing Values, Behaviors, Institutions, and Organizations across Nations]]></source>
<year>2001</year>
<edition>2nd Ed</edition>
<publisher-loc><![CDATA[London, UK ]]></publisher-loc>
<publisher-name><![CDATA[Sage]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hofstede]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<source><![CDATA[Country Comparison]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hofstede]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Hofstede]]></surname>
<given-names><![CDATA[G. J]]></given-names>
</name>
<name>
<surname><![CDATA[Minkov]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Cultures and Organizations. Software of the mind]]></source>
<year>2010</year>
<publisher-loc><![CDATA[London, UK ]]></publisher-loc>
<publisher-name><![CDATA[McGraw-Hill]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Holt]]></surname>
<given-names><![CDATA[T. J]]></given-names>
</name>
<name>
<surname><![CDATA[Blevins]]></surname>
<given-names><![CDATA[K. R]]></given-names>
</name>
<name>
<surname><![CDATA[Burkert]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Considering the Pedophile Subculture Online]]></article-title>
<source><![CDATA[Sexual Abuse: A Journal of Research and Treatment]]></source>
<year>2010</year>
<volume>22</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>3-24</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[House]]></surname>
<given-names><![CDATA[R. J]]></given-names>
</name>
<name>
<surname><![CDATA[Hanges]]></surname>
<given-names><![CDATA[P. J]]></given-names>
</name>
<name>
<surname><![CDATA[Javidan]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Dorfman]]></surname>
<given-names><![CDATA[P. W]]></given-names>
</name>
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<source><![CDATA[Culture, Leadership, and Organizations: The GLOBE Study of 62 Societies]]></source>
<year>2004</year>
<publisher-loc><![CDATA[London, UK ]]></publisher-loc>
<publisher-name><![CDATA[Sage]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="">
<collab>International Centre for Missing &amp; Exploited Children</collab>
<source><![CDATA[Pornografía Infantil: Modelo de Legislación y Revisión Global]]></source>
<year>2010</year>
<edition>6th Ed&gt;</edition>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="">
<collab>International Centre for Missing &amp; Exploited Children</collab>
<source><![CDATA[Pornografía Infantil: Modelo de Legislación y Revisión Global]]></source>
<year>2012</year>
<edition>7th Ed</edition>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="">
<collab>International Telecommunication Union</collab>
<source><![CDATA[Guidelines for Policy Makers on Child Online Protection]]></source>
<year>2009</year>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="">
<collab>International Telecommunication Union</collab>
<source><![CDATA[Gender ICT Statistics (2010-2012)]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="">
<collab>Internet Watch Foundation</collab>
<source><![CDATA[Annual Report]]></source>
<year>2010</year>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jewkes]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Much ado about Nothing? Representations and Realities of Online Soliciting of Children]]></article-title>
<source><![CDATA[Journal of Sexual Aggression]]></source>
<year>2010</year>
<volume>16</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>5-18</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Laulik]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Allam]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Sheridan]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Investigation into Maladaptive Personality Functioning in Internet Sex Offenders]]></article-title>
<source><![CDATA[Psychology, Crime &amp; Law]]></source>
<year>2007</year>
<volume>13</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>523-35</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Long]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Alison]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Tejeiro]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Hendricks]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Giles]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[KIRAT: Law Enforcement's Prioritization Tool for Investigating Indecent Image Offenders]]></article-title>
<source><![CDATA[Psychology, Public Policy, and Law]]></source>
<year>2016</year>
<volume>22</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>12-21</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[K. J]]></given-names>
</name>
<name>
<surname><![CDATA[Finkelhor]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Jones]]></surname>
<given-names><![CDATA[L. M]]></given-names>
</name>
<name>
<surname><![CDATA[Wolak]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Prevalence and Characteristics of Youth Sexting: A National Study]]></article-title>
<source><![CDATA[Pediatrics]]></source>
<year>2012</year>
<volume>129</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>13-20</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Moller]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Eisend]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Global Investigation into the Cultural and Individual Antecedents of Banner Advertising Effectiveness]]></article-title>
<source><![CDATA[Journal of International Marketing]]></source>
<year>2010</year>
<volume>18</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>80-98</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Negredo]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Herrero]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Pornografía infantil en Internet]]></article-title>
<source><![CDATA[Papeles del Psicólogo]]></source>
<year>2016</year>
<volume>37</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>217-23</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Niveau]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber-Pedocriminality: Characteristics of a Sample of Internet Child Pornography Offenders]]></article-title>
<source><![CDATA[Child Abuse &amp; Neglect]]></source>
<year>2010</year>
<volume>34</volume>
<page-range>570-5</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Northouse]]></surname>
<given-names><![CDATA[P. G]]></given-names>
</name>
</person-group>
<source><![CDATA[Leadership: Theory and practice]]></source>
<year>2012</year>
<edition>6th Ed</edition>
<publisher-loc><![CDATA[Thousand Oaks, CA ]]></publisher-loc>
<publisher-name><![CDATA[Sage Publications]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Omi]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Howard]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<source><![CDATA[Racial Formation in the United States: From the 1960s to the 1990s]]></source>
<year>1994</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Onel]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Mukherjee]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Effects of National Culture and Human Development on Environmental Health]]></article-title>
<source><![CDATA[Environment Development and Sustainability]]></source>
<year>2014</year>
<volume>16</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>79-101</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Quayle]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Jones]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sexualized Images of Children on the Internet]]></article-title>
<source><![CDATA[Sexual Abuse: A Journal of Research and Treatment]]></source>
<year>2011</year>
<volume>23</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>7-21</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Reijnen]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Bulten]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Nijman]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Demographic and Personality Characteristics of Internet child Pornography Downloaders in Comparison to other Offenders]]></article-title>
<source><![CDATA[Journal of Child Sexual Abuse]]></source>
<year>2009</year>
<volume>18</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>611-22</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rimm]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Marketing Pornography on the Information Superhighway: A Survey of 917.410 Images, Descriptions, Short Stories, and Animations downloaded 8.5 million times by Consumers in over 2000 Cities in Forty Countries, Provinces, and Territories]]></article-title>
<source><![CDATA[The Georgetown Law Journal]]></source>
<year>1995</year>
<volume>83</volume>
<page-range>1849-934</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Romeo]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Yepes-Baldó]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Soria]]></surname>
<given-names><![CDATA[M. A]]></given-names>
</name>
<name>
<surname><![CDATA[Lovelle]]></surname>
<given-names><![CDATA[M. I]]></given-names>
</name>
</person-group>
<source><![CDATA[Incest and Culture. Unedited manuscript, Fighting International Internet Paedophilia (FIIP) Project]]></source>
<year>2013</year>
<publisher-name><![CDATA[European Comission]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sadeghi]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Amani]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Mahmudi]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Structural Model of the Impact of Organizational Culture on Job Satisfaction among Secondary School Teachers]]></article-title>
<source><![CDATA[Asia-Pacific Education Researcher]]></source>
<year>2013</year>
<volume>22</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>687-700</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schmidt]]></surname>
<given-names><![CDATA[A. F]]></given-names>
</name>
<name>
<surname><![CDATA[Gykiere]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Vanhoeck]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Mann]]></surname>
<given-names><![CDATA[R. E]]></given-names>
</name>
<name>
<surname><![CDATA[Banse]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Direct and Indirect Measures of Sexual Maturity Preferences Differentiate Subtypes of Child Sexual Abusers]]></article-title>
<source><![CDATA[Sexual Abuse: A Journal of Research and Treatment]]></source>
<year>2014</year>
<volume>26</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>107-28</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Seigfried-Spellar]]></surname>
<given-names><![CDATA[K. C]]></given-names>
</name>
<name>
<surname><![CDATA[Rogers]]></surname>
<given-names><![CDATA[M. K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Low neuroticism and high hedonistic traits for female internet child pornography consumers]]></article-title>
<source><![CDATA[Cyberpsychology Behavior and Social Networking]]></source>
<year>2010</year>
<volume>13</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>629-35</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Bond]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Ka&#287;itçiba&#351;i]]></surname>
<given-names><![CDATA[Ç]]></given-names>
</name>
</person-group>
<source><![CDATA[Understanding social psychology across cultures: Living and working in a changing world]]></source>
<year>2006</year>
<publisher-loc><![CDATA[London, UK ]]></publisher-loc>
<publisher-name><![CDATA[Sage]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Steel]]></surname>
<given-names><![CDATA[C. M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Web-based child pornography: The global impact of deterrence efforts and its consumption on mobile platforms]]></article-title>
<source><![CDATA[Child Abuse &amp; Neglect]]></source>
<year>2015</year>
<volume>44</volume>
<page-range>150-8</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tokunaga]]></surname>
<given-names><![CDATA[R. S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Internet access to the other: The influence of cultural orientations on self-disclosures in Offline and Online Relationships]]></article-title>
<source><![CDATA[Journal of Intercultural Communication Research]]></source>
<year>2009</year>
<volume>38</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>133-47</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tsourela]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Roumeliotis]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Moderating Role of Technology Readiness, Gender, and Sex in Consumer Acceptance and Actual Use of Technology-Based Services]]></article-title>
<source><![CDATA[The Journal of High Technology Management Research]]></source>
<year>2015</year>
<volume>26</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>124-36</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Webb]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Craissati]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Keen]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Characteristics of Internet Child Pornography Offenders: A Comparison with Child Molesters]]></article-title>
<source><![CDATA[Sexual Abuse: A Journal of Research and Treatment]]></source>
<year>2007</year>
<volume>19</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>449-65</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wolak]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Finkelhor]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Child Pornography Possessors: Trends in Offender and Case Characteristics]]></article-title>
<source><![CDATA[Sexual Abuse: A Journal of Research and Treatment]]></source>
<year>2011</year>
<volume>23</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>22-42</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wolak]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Finkelhor]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[K. J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[How often are Teens Arrested for Sexting? Data from a National Sample of Police Cases]]></article-title>
<source><![CDATA[Pediatrics]]></source>
<year>2012</year>
<volume>129</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>4-12</page-range></nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wolak]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Finkelhor]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<source><![CDATA[Internet Sex Crimes against Minors: The Response of Law Enforcement]]></source>
<year>2003</year>
<publisher-loc><![CDATA[Alexandria, Virginia ]]></publisher-loc>
<publisher-name><![CDATA[National Center for Missing &amp; Exploited Children]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wortley]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Smallbone]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Child Pornography on the Internet]]></source>
<year>2006</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
