Child Online Sexual Exploitation and Abuse: understanding adversarial tactics, techniques, and procedures

Yeboah-Ofori, Abel ORCID logoORCID: https://orcid.org/0000-0001-8055-9274 and Amenyah, Awo Aidam (2026) Child Online Sexual Exploitation and Abuse: understanding adversarial tactics, techniques, and procedures. Social Sciences, 15 (5).

[thumbnail of Yeboah-OforiA_Child Online Sexual Exploitation and Abuse_VoR_PDFA.pdf]
Preview
PDF/A
Yeboah-OforiA_Child Online Sexual Exploitation and Abuse_VoR_PDFA.pdf - Published Version
Available under License Creative Commons Attribution.

Download (1MB) | Preview

Abstract

Background: Child Sexual Exploitation and Abuse is a longstanding global issue, increasingly amplified by digital technologies, mobile devices, and internet access. This shift has intensified Child Online Sexual Exploitation and Abuse (COSEA). WeProtect 2020, a Global Alliance Intelligence brief report, indicated a 200% rise in online abuse forums. Existing studies focus on child protection, grooming, and survey-based analyses and draw inferences regarding grooming tactics and thematic analysis. Social issues such as underreporting, limited threat intelligence sharing, and low cyber awareness persist, leading to vulnerabilities and various exploitations. Further, a lack of social engagement and support persists, posing serious challenges for victims and law enforcement. Multiple studies have used the term Online Child Sexual Exploitation and Abuse (OCSEA) that focus on a technology-centric approach. However, the paper considers Child Online Sexual Exploitation and Abuse (COSEA) child-centric approach as we explore challenges of a child accessing the internet and engaging in online activities.

Methods: This study analyses COSEA using the MITRE tactics, techniques, and procedures (TTP) framework to examine perpetrator behavior, motives, and potential attribution, considering the evolving threat landscape. Results: TTP-based analysis enables the identification of adversary intent, methods, and opportunities. The study contributions are threefold: (1) we explore COSEA and its manifestations; (2) we apply the MITRE TTP framework with subjective expert judgment to analyze perpetrator behavior and the victim; for instance, what leads victims to become complicit in wrong acts; and (3) propose mitigation strategies and stakeholder roles.

Conclusion: By integrating technical, social, and behavioral perspectives, it highlights the roles of economic, societal, and deterrence factors and recommends policy, education, and collaborative threat-intelligence sharing to enhance child online safety.

Item Type: Article
Identifier: 10.3390/socsci15050305
Keywords: child abuse; online Child Sexual Exploitation; tactics, techniques, and procedures (TTP); child online protection; child safety; cyberattacks; cyber threat intelligence
Subjects: Computing > Information security > Cyber security
Date Deposited: 11 May 2026
URI: https://repository.uwl.ac.uk/id/eprint/14944

Downloads

Downloads per month over past year

Actions (admin access)

View Item

Menu