InTechOpen uses cookies to offer you the best online experience. By continuing to use our site, you agree to our Privacy Policy.

Psychology » "Contemporary Perspective on Child Psychology and Education", book edited by Şenay Çetinkaya, ISBN 978-953-51-3739-9, Print ISBN 978-953-51-3738-2, Published: January 24, 2018 under CC BY 3.0 license. © The Author(s).

Chapter 7

Children and Young People’s Vulnerabilities to Grooming

By Jane Reeves, Emma Soutar, Sally Green and Tracy Crowther
DOI: 10.5772/intechopen.71672

Article top

Children and Young People’s Vulnerabilities to Grooming

Jane Reeves, Emma Soutar, Sally Green and Tracy Crowther
Show details


Child abuse is evolving, pervasive and complex and children are vulnerable to its widespread reach in many aspects of their lives, from face-to-face interactions to those they have online. This chapter aims to review contemporary literature which outlines the vulnerabilities of children to face-to-face and online grooming as part of a process leading to child abuse and exploitation. The chapter will undertake a review of literature on two aspects of grooming: child sexual exploitation (CSE) and radicalisation. It will draw on contemporary case examples to illustrate grooming drawn from UK Serious Case Reviews (SCR) on CSE and, on radicalisation, the case of the three girls from Bethnal Green who were groomed for travel to Syria. It will then reflect on the push and pull factors of grooming to highlight the similarities between CSE and radicalisation. Moving on, the chapter will then consider how and if interactive social media simulations, linked to an innovative, preventative educational approach and designed with reference to Vygotsky’s social construction theory, have the potential to educate young people to help protect them from being groomed. The chapter will then make reference to the findings of a small pilot study which evaluated the use of this approach with young people.

Keywords: child abuse, grooming, preventative learning, simulations, radicalisation, child sexual exploitation

1. The context of grooming in the UK

While many children across the globe experience happy, secure childhoods, amassing the skills to help them thrive into adulthood, many are abused in the most horrific and sustained ways possible. UNICEF in a report from 2014 [1] estimate that around 120 million girls worldwide (about 1 in 10) will have experienced forced intercourse or other forced sexual acts at some time in their lives; a shocking almost incomprehensible amount. Child abuse is an evolving, pervasive contemporary social problem for humanity, but for some it is a multi-million pound business with transactions carried out on the ‘dark web’ via the internet as well as face-to-face in contact abuse. Some young people are born into this type of abuse in families or community circumstances or latterly in the form of trafficking and modern day slavery, others are groomed into being abused. ‘Stop the traffik’ [2] estimate that 600,000–800,000 men, women and children are trafficked across international borders each year with an approximation of 80% women and girls. Up to 50% are estimated to be minors. A recent report by The Children’s Society [3] estimates that ‘The scale of child trafficking, as officially monitored, has increased by 55% between 2012 and 2014 and the numbers of boys and young men trafficked has more than doubled in the same period’—though the recorded levels are widely regarded as underestimating the issue.

Grooming children and young people into abuse in the form of CSE, to be trafficked into becoming slaves and victims of multiple abuse as well as for radicalisation and terrorism, is now a well-documented ‘process’ [4]. Vulnerable young people are targeted, often online, and groomed via different social media, as well as face-to-face, to become victims of abuse or to commit or contribute to terrorist offences. Serious Case Reviews in the UK on CSE [58] and radicalisation [9] clearly document the consequences of this for the victim, professionals and policy makers.

Grooming is currently defined in the UK by the NSPCC as: ‘when someone builds an emotional connection with a child to gain their trust for the purposes of sexual abuse, sexual exploitation or trafficking. Children and young people can be groomed online or face-to-face, by a stranger or by someone they know - for example a family member, friend or professional. Groomers may be male or female. They could be any age. Many children and young people don’t understand that they have been groomed or that what has happened is abuse’ [10].

Many children and young people are consequently at risk of being groomed. In the UK Ofsted, the Office for Standards in Education, Children’s Services and Skills, who inspect and regulate services that care for and educate children and young people, require organisations to teach children and young people about being groomed: ‘…how to keep themselves safe from relevant risks such as abuse, sexual exploitation and extremism, including when using the internet and social media’ [11].

However, this is a difficult and complex task, often requiring specialist knowledge. Research suggests that many professionals do not feel equipped to tackle these issues, particularly in relation to radicalisation, where lack of appropriate training impacts on practitioner confidence [12, 13]. Brighton and Hove SCR on siblings W and X indicates how the social workers in this case lacked the knowledge, experience and training to deal with radicalisation [9].

2. Vulnerabilities to being groomed

Risk factors for being particularly vulnerable to CSE are identified in literature and SCRs and include those listed in Table 1 .

Having a prior experience of neglect, physical and/or sexual abuse;
Lack of a safe/stable home environment, now or in the past (domestic violence or parental substance misuse, mental health issues or criminality);
Recent bereavement or loss;
Social isolation or social difficulties;
Absence of a safe environment to explore sexuality;
Economic vulnerability;
Homelessness or insecure accommodation status;
Connections with other children and young people who are being sexually exploited;
Family members or other connections involved in adult sex work;
Having a physical or learning disability;
Being in care (particularly those in residential care and those with interrupted care histories);
Sexual identity.

Table 1.

Vulnerabilities to CSE.

CSE has been identified as being widespread in some areas of the UK, with several cases highlighted in the local and national press following court appearances of perpetrators, often gangs of men, and subsequent serious case reviews [58]. CSE can affect all ages and is described as happening when:

…an individual or group takes advantage of an imbalance of power to coerce, manipulate or deceive a child or young person under the age of 18 into sexual activity (a) in exchange for something the victim needs or wants, and/or (b) for the financial advantage or increased status of the perpetrator or facilitator. The victim may have been sexually exploited even if the sexual activity appears consensual. Child sexual exploitation does not always involve physical contact; it can also occur through the use of technology’ [13].

The consequences of being groomed for CSE are considerable for each young person ( Table 2 ) and some extreme cases have resulted in young people being murdered (see for example the cases of Breck Bednar [14] and Kayleigh Haywood [15]), suffering long term physical and psychological trauma [13] and being groomed into gangs [16] a life of crime, drug and alcohol related activities [17].

It all began when I was about 12. They gave us more than my mum could
It was exciting – Asian boys with flash cars. They made me trust them for months. I was their friend ’.
When the grooming started they were so kind and nice. They were a lot older. It was flattering. Then things started to change
They took us to a field where there were other men who came to have sex with us. I tried not to do it. There were five of them
They threatened to blow my house up with my mum in it. I was expected to do things: if I did not they said they would come to my house and burn me alive
I turned up at the police station at 2/3 am, blood all over me soaked through my trousers to the crotch. They dismissed me as being naughty, a nuisance
Oxford Gang rape victims [7]

Table 2.

CSE: why do young people get drawn in?.

In terms of understanding grooming in the context of radicalisation in the UK, schools, colleges, Universities and health and social care organisations are obligated under the Prevent Duty to address radicalisation with children, young people and young adults:

‘In order for schools and childcare providers to fulfil the Prevent duty, it is essential that staff are able to identify children who may be vulnerable to radicalisation, and know what to do when they are identified. Protecting children from the risk of radicalisation should be seen as part of schools’ and childcare providers’ wider safeguarding duties, and is similar in nature to protecting children from other harms (e.g. drugs, gangs, neglect, sexual exploitation), whether these come from within their family or are the product of outside influences’ [18, 19].

The Channel vulnerability assessment framework [20] outlines 22 factors that may cause someone to engage with a terrorist group, cause or ideology. The list is designed to assess whether individuals need support to safeguard them from the risk of being targeted by terrorists and radicalisers. These factors have been contested, including human rights groups who claim that the assessment framework is divisive and stigmatises and alienates segments of the population [21].

It has also been recently argued [13] that the way harm manifests in radicalisation can be quite different to CSE. Young people targeted do not have to be ‘vulnerable’ in the CSE sense (for example being in care) they can be well educated and well cared for as in the case of the three Bethnal Green girls ( Table 3 ). As a consequence, some young people may not have overt signs of being groomed; for example, they often do not go missing for extended periods of time, as with grooming for CSE. Detection of this type of grooming may well require a detailed examination of their social media profiles and online activity.

On Tuesday February 17th 2015, CCTV cameras at Gatwick airport captured Amira Abase, Shamima Begum and Khadiza Sultana, clearing security checks before a flight. The three young girls (aged between 15 and 16 years old) boarded a Turkish airline’s flight to Istanbul, on the first phase of their journey to join ISIS. This collection of images of the three girls has become synonymous with the phenomenon of female migrants to ISIS territory, particularly within British consciousness [22].
The girls travelled to Isis Syrian stronghold of Raqqa and all three girls were reported to have become ‘jihadi brides’. All contact with the girls was lost in mid-December—around the time British, American and Russian warplanes stepped up their bombardment of Raqqa and Kadiza Sultana is believed to have died in May 2016, raising fears for her two classmates—whose fate remains unknown.
The girls attended Bethnal Green Academy and were hardworking, straight A’ students who formed a close-knit friendship group. It is well-documented that Isis has specifically targeted western women (at least 100 of the more than 800 people who have travelled from Britain to Syria are female), using female propagandists to offer practical advice and sell a utopian vision of the sisterhood on offer in Islamic State. The online recruiters are prolific and online grooming played a role with the Bethnal Green girls. However the group psychology of this close-knit friendship was also crucial. One of the reasons the case made such an impact was that it was the first widely known example of a group of women radicalising together offline.
The number of Britons joining Isis has slowed, thanks to better policing in the UK and the loss of Isis caliphate. They no longer place such emphasis on convincing people to travel to Syria, but have changed their strategy to encourage radicalised cells at home.

Table 3.

The case of the Bethnal Green girls.

3. The ‘process’ of grooming

Today, online grooming has a whole new use. Radicalising young, impressionable minds by extremists. If you’re young and struggling to find your place in the world, and someone appears to understand you, that makes you vulnerable. Many children and young people are unaware they are being controlled. Groomers will hide their true intentions, often spending a long time gaining a young person’s trust, slowly manipulating their thoughts so they can begin introducing their twisted ideologies’ [23].

Young people are naturally inquisitive and keen to explore new avenues and ideas. When ideas are shared on-line, and an apparent likeminded person replies reiterating their beliefs and opinions, this can increase vulnerability to grooming. Grooming for radicalisation in particular does not necessitate face-to face meetings, highlighting the power of the internet and social media in covert grooming. Five hypotheses identified in the literature [24] links the internet with increased opportunities to become radicalised; it acts as an ‘echo chamber’ to find like-minded individuals, accelerates the process of radicalisation, increases opportunities for self-radicalisation and allows radicalisation to occur without physical contact. In the case of Breck Bednar there were several months of grooming activity via online gaming sites prior to meeting his attacker Lewis Daynes. During this time Daynes groomed Breck to be anti-establishment and anti-government. Breck was told by Daynes that he has contributed to Daesh through making money from his computing business. Just months after the grooming started Daynes lured Breck to his address and murdered him in a sexual motivated attack. This is thought to be the only time the two had met in person. Links between the sexual exploitation process and that of radicalisation can clearly be seen in this case [14].

Such is the power of grooming, in cases of CSE, victims may be coerced into initially sending indecent images or making videos while radicalisers can convince someone to create a homemade device without directly meeting them. The internet acts as a place where individuals find their ideas supported and echoed by others, giving them a misplaced sense of empowerment and belonging.

Because the outcomes of being groomed for CSE or radicalisation are often very serious, resulting in serious injury trauma and death, it is often assumed that the process of grooming is therefore aggravated or aggressive. Groomers, however, are often quite sophisticated in their approaches, often unknowingly adopting techniques more usually associated with attachment; providing a ‘secure base’ or a ‘safe haven’ for individuals while they flatter, accept and ‘nurture’ them. Young people are often drawn to groomers’ because of a need for ‘attachment or affection’ [25, 26]. While the threats and fear do materialise, as indicated by the quotes from the Oxford Serious Case Review in Table 2 , the initial approaches, whether face-to face or online will often be enticing and flattering, often accompanied by gifts, in order to facilitate trust and confidence.

It is often argued that grooming is a ‘process’ with clearly defined stages leading to the ultimate end goals of sexual abuse or radicalisation, however face- to-face and online grooming often have different starting points and consequently variables may be different. Moreover, a process suggests a linear route and this may not necessarily be the case as one or more grooming techniques can be occurring at the same time. Consequently, rather than a ‘process’ grooming can be visualised as more of a matrix ( Figure 1 ) with some, many or all of the following features slotting together and overlapping in time and context:


Figure 1.

The grooming matrix [4, 13, 20, 24, 2629].

4. How do we currently try to protect children and young people from being groomed for radicalisation and CSE?

Because grooming is such a serious and widespread social problem on and offline, educational resources from a variety of sources have been produced to work with children and young people on the topic (see Table 4 ).

CSEWeb Links
Childline (Parent Against CSE)
Blast project for boys
See me hear me!
Radicalisation Web Links
Educate against hate
Let us talk about it
Addressing extremism and radicalisation lesson plans
Prevent Education for Schools
Stop It Now
Kayleigh Haywood story
Breck Foundation

Table 4.

Resources on CSE and radicalisation in the UK for use with young people.

Many of these resources are used as part of personal, health and social education (PHSE) in schools in the UK and some are very impactful, delivering clear messages via a popular medium of film. However, because some are often film based they are essentially ‘passive’ tools for young people. Film based approaches, while popular with students and teachers alike may also have drawbacks [30] and may not involve learners in the development of critical thinking and analytical skills so important for evaluating the myriad of information often inundating young people in their daily lives through social media [31]. A clear example of this is the current trend towards ‘fake’ news, often celebrity related which can be hard to evaluate truth from fiction.

5. Using simulated learning

Simulated learning is used in many different contexts with adults and with children and young people. Simulation can, however, mean different things in different contexts. From a simulated suite of learning at UWE, which is in fact a physical learning ward, to using actors with young people in mental health, as well as attending a school in Second Life [33], these are all considered simulations [32].

However, using simulations in child protection are in their infancy [12, 34]. The Centre for Child Protection at the University of Kent is at the forefront of this development and has now created, by working in partnership with health & social care, law enforcement and education organisations, seven simulations on different aspects of child protection, designed for use with both professionals and young people.

Simulated learning is associated with a tranche of associated benefits; they are engaging [35]; promote good discussion [36]; offer opportunities for immersion & interaction in a ‘safe’ space [37] allowing individuals to take risks safely. Perhaps of most significance however, is that they offer experiential learning [38] which many people thrive on and they are learner centred rather than teacher led: the ‘teacher’ becomes the facilitator rather than disseminator. With young people in particular it is argued that ‘virtual role play allows students to develop ‘embodied empathy’ for complex social systems’ [39].

Drawing on social constructionist educational theory, it can be argued that in order for children and young people to develop into individuals who can reflect and evaluate knowledge, they need to be active learners and develop skills of critical self-reflection, which they are prepared to apply to their worlds and themselves [39]. Learners do this at different rates and times and some may not have opportunities to develop these skills at all. It is suggested by Barnett [40] that to become critical beings young people have to ‘think collaboratively’ and this must be sustained through shared activity and discourse around collective standards in a community’. Wass [41] argues that Vygotsky (1896–1934) conceptualised the zone of proximal development (ZPD) [42] to help teachers assist people to develop skills beyond their immediate reach, and this can include critical thinking. He argued that ZPD is the difference between what a learner can do on their own and what he or she can achieve with help. Put simply teachers, peers, activities and some learning environments can help develop critical skill via scaffolding: structuring an issue clearly and problematizing it.

In terms of answering the question posed by this chapter what can be done to prevent children and young people being groomed? Part of the answer may lie in designing interactive content on grooming for young people which is just beyond their reach which, as a consequence, then stimulates them to interrogate the issue. It is often easy to develop passive learning information on radicalisation and CSE, including films, listening to visiting speakers, and watching actors. These resources can be positive as they can simplify key information on these complex and emotive topics which then leads to discussion. However, these type of activities often provide a ‘structure’ through radicalisation or CSE where the solutions are often provided in the film or by the presenter or actors. An alternative model could be to scaffold an issue, including the complexities & problems, (which may be just outside of a learners reach) and with help allow the learner to work through the scaffolding to develop their critical thinking, reasoning and evaluation skills on the topic. As Wass [41] suggests ‘Scaffolding allows students to identify and solve the educative problems, while structuring removes these problems for the student’.

In the simulation ‘Looking Out for Lottie’ on grooming and CSE, we follow the life of 14 year old Lottie through four different social media site, including a vlog. We have access to her social media and her private ‘phone messages, allowing learners to interrogate her life, build rapport with her and evaluate events in her life as they unfold. The simulation is split into separate scenes and in each scene the learner (preferably in small groups to promote community thinking mentioned earlier) completes a set of questions reflecting on the social media content and on their own experiences. Using the ‘boyfriend’ model of grooming, set out in Figure 1 , users find and are exposed to indicators of grooming and how manipulative and focussed groomers can be to achieve what they want. The final scene is, uniquely, from the groomers’ perspective so learners are able to understand the motivating factors and consequences for Jake as a groomer.

In the simulation ‘Maryam and Joe: Behind Closed Doors’ learners follow BBC and Sky news clips on radicalisation and are able to follow two storylines to analyse how different characters respond to the same news events and evaluate, through the characters social media sites and private messages, how these events impact on their lives. Again learners are interrogating information via social media, looking for the groomers and critically evaluating how the characters react to this grooming. The social media format is the ‘scaffolding’ and engages the learner by making the way they receive information current and young person focused. Learners are ‘forensically’ searching for signs of grooming for radicalisation in a format that is familiar to them, therefore encouraging them to engage with the simulation subject matter. Clues are hidden in popular social media formats (‘Wetube’ ‘Hashtagged’ ‘whatchat’ ‘snappit’ etc.) ( Figure 2 ) and young people have to evaluate this content to identify the groomers and evaluate the effects this has on the young people being groomed ( Table 5 ).


Figure 2.

Screen shots ‘Maryam and Joe – Behind Closed Doors’ (top) and ‘Looking out for Lottie’ (bottom).

Learners have to solve a challenge (‘who is the groomer’ & ‘why?’)
It involves them in making choices, in ‘ forensic analysis of evidence for example interrogating Lottie’s phone conversations with the groomer, Jake, so learners can evaluate the different evidence before them and come to their own reasoned conclusions
They can see, weigh up & evaluate the different consequences of certain actions via various social media (which are familiar to them).
If young people work in small groups they observe and have the opportunity to learn from their peers critical evaluation skills
Radicalisation and CSE are structured as a topic; social media, however, is the scaffolding . The issues and complexities are buried in the stories and narratives of the simulation and have to be found: thus developing critical evaluation skills
We have provided tools to activate thinking, interrogate evidence for themselves and see the consequences of different actions and behaviour

Table 5.

How do we do this in our child protection simulations?.

6. Pilot research with young people on the effectiveness of ‘behind closed doors’

Research [43] into the effectiveness of child protection simulations [12, 26, 34] has only just begun and is ongoing. However, by embedding teaching and learning techniques into a simulation which require young people to ‘forensically’ interrogate a story via ‘scaffolding’ in a format which they use in their everyday lives, namely social media platforms, appears to have encouraging results ( Table 5 ).

In a small scale pilot of ‘Behind Closed Doors’ conducted in a College of Further Education, 39 students were divided into five sessions. After a brief introduction to the simulation, each student was asked to complete a consent form and then asked to ‘play’ scene 1 of the Maryam or Joe story. After playing the game, either in pairs or individually, each student filled in a feedback form of 13 questions rating the simulation, the story and the simulation features. The questionnaire elicited the following results: on the 1–10 rating scale, 85% of students rated the game as ‘Good to Excellent’ (39% males: 46% females) and 15% of student rated the game as ‘Ok to Not useful’ (0–6 on the rating scale) (7.5% male, 7.5% female).

While it is encouraging to have the simulation rated overall as good to excellent, what is noteworthy for future research is that 82% of students said that they had increased their knowledge about the topics of radicalization and grooming after playing the game. Additionally and of significance is that 61.5% of students said they would change their online behaviour after playing the game. Although this is only a very small scale pilot study, what these results give an insight into, and can be followed up in future studies, is that young people state that they are willing to change their online behaviour after going through an active process of learning whereby they have followed and interrogated the lives of young people who have been groomed and analysed how this happened. The features embedded in the simulation have allowed them to be active learners, constructing their own knowledge, being given a degree of control over how they learn and in what order, in a context which is meaningful to them and they have been given space and encouragement to reflect on a complex and difficult topic. Those students who said the simulation would not change their online behaviour often qualified this with a comment such as ‘because I am careful anyway’ or ‘because I already am safe online but this keeps me aware’.

7. Conclusions

Research reviewed clearly states that grooming is a serious contemporary threat to global childhoods. The research reviewed has shown that there are young people who are particularly vulnerable to being groomed and that policy and the law has moved to try to protect them. However, recent serious cases reviews in the UK clearly show that on-line and face-to-face groomers have a sophisticated modus operandi for entrapping children and exploiting them sexually and for radicalization. Children need to understand what these techniques and approaches are so that they can protect themselves and each other and keep safe online. Parents need to have an ongoing dialogue with their children on online and face-to-face grooming and promote regular conversations between their children and with them, in order to understand online behaviour. Additionally, they need to know what approaches schools are adopting on the topics of grooming, CSE and radicalisation to teach their children to be critical thinkers on these issues in order to protect themselves and their friends. Schools need to share the resources they are using and clearly signpost parents to them to enhance their knowledge and understanding on these complex topics.

Existing research on simulations indicates that simulated environments offer a safe way for young people to evaluate situations and take risks safely. This chapter has reviewed innovative simulations currently being developed to help children and young people learn to protect themselves online in the form of simulations. These tools follow the lives of young people who are themselves groomed, giving young people the scaffolding through which to develop their evaluative skills in a way that is significant to them. A small scale pilot study has revealed that this approach to learning about grooming for child protection is encouraging and has the potential to change online behaviour.


1 - United Nations Children’s Fund, Division of Data, Research and Policy. Hidden in Plain Sight: A Statistical Analysis of Violence against Children. New York: UNICEF; 2014. ISBN: 978-92-806-4767-9
2 - Stop The Traffik. The Scale of the Issue – Human Trafficking and Modern Slavery are Happening in Every - Corner of the Globe [Internet] 2017. Available from: [Accessed: 2017-09-04]
3 - Leon L, Raws P. Boys Don’t Cry - Improving Identification and Disclosure of Sexual Exploitation among Boys and Young Men Trafficked to the UK. The Children’s Society [Internet]. 2016. Available from: pcr059.pdf [Accessed 2017-09-04]
4 - Shepherd W, Lewis B. Working with Children Who Are Victims or at Risk of Sexual Exploitation: Barnardo’s Model of Practice. 2017
5 - RBSCB. The Overview Report of the Serious Case Review in Respect of Young People 1, 2, 3, 4, 5 & 6 2013 (Redacted Version): Available at:
6 - Jay A. Independent Inquiry into Child Sexual Exploitation in Rotherham (1997-2013) Independent Inquiry CSE in Rotherham [Internet]. 2014. Available from: [Accessed 2017-09-04]
7 - Bedford A. Serious Case Review into Child Sexual Exploitation in Oxfordshire: From the Experiences of Children A, B, C, D, E, and F [Internet]. 142015. Available from: [Accessed 2017-09-04]
8 - Myers J, Carmi E. The Brooke Serious Case Review into Child Sexual Exploitation Identifying the Strengths and Gaps in the Multi-Agency Responses to Child Sexual Exploitation in Order to Learn and Improve. Final Report
9 - Carmi E, Gianfrancesco A. Serious Case Review: Siblings X and Y. Identifying the Strengths and Gaps in Multi-Agency Responses to Vulnerable Adolescents at Risk of Exploitation through Radicalisation. Brighton & Hove Local Safeguarding Children Board [Internet]. 2017. Available from [Accessed 2017-09-04]
10 - NSPCC. Grooming- What it Is, Signs and how to Protect Children. Available at: [Accessed 04 Sep, 2017]
11 - Ofsted. Guidance - Common Inspection Framework: Education, Skills and Early Years [Internet]. 2015. p. 14. Available from: [Accessed 2017-09-04]
12 - Reeves J, Sheriyar A. Addressing radicalisation into the classroom - a new approach to teacher and pupil learning. Journal of Education and Training. 2015;2(2):20-38
13 - Department for Education. Child Sexual Exploitation - Annexes to ‘Definition and a Guide for Practitioners, Local Leaders and Decision Makers Working to Protect Children from Child Sexual Exploitation’ [Internet]. 2017. Available from: [Accessed 2017-09-04]
14 - Smith J. Breck Bednar Murder: How Lewis Daynes Manipulated his Victim. BBC News 2015 Available at: [Accessed: 10 Sep, 2017]
15 - BBC News. Kayleigh Haywood: How Murdered Schoolgirl Was Groomed Online [Internet]. Available at: [Accessed 24 Aug, 2017]
16 - Pitts J. Drifting into trouble: Sexual exploitation and gang affiliation. In: Melrose M, Pearce J, editors. Critical Perspectives on Child Sexual Exploitation and Related Trafficking. London: Palgrave Macmillan; 2013. p. 23-37. DOI: 10.1057/9781137294104
17 - de Sousa E, O’Kane M, Koehli L, Walker J, Beckett H. Child Sexual Exploitation: How Public Health can Support Prevention and Intervention [Internet]. 2017. Available from: [Accessed 2017-09-04]
18 - Department of Education. Keeping Children Safe in Education. Statutory Guidance for Schools and Colleges. 2016. Available at:
19 - Department of Education. Protecting Children from Radicalisation: The Prevent Duty. 2017. Available at:
20 - HM Government. Channel: Vulnerability Assessment Framework. 2012. Available at:
21 - Rights Watch UK. Preventing Education? Human Rights and UK Counter-Terrorism Policy in Schools. 2016. Available at:
22 - Saltman EM, Smith M. ‘Till Martyrdom Do us Part’ Gender and the ISIS Phenomenon. Institute for Strategic Dialogue 2015. Available at:
23 - Women against Radicalisation Network. 2017; Available at: [Accessed 09 Sep, 2017]
24 - von Behr I, Reding A, Edwards C, Gribbon L. Radicalisation in the Digital Era: The Use of the Internet in 15 Cases of Terrorism and Extremism. Brussels and Cambridge: Rand Europe; 2013
25 - Beckett H. Looked after young people and CSE: A view from Northern Ireland. In: Melrose M, Pearce J, editors. Critical Perspectives on Child Sexual Exploitation and Related Trafficking. London: Palgrave Macmillan; 2013. p. 69-82. DOI:10.1057/9781137294104
26 - Reeves J, Sheriyar A. Addressing Radicalisation into the Classroom - A New Approach to Teacher and Pupil Learning. Journal of Education and Training. 2015;2(2):20-39.
27 - Coy M. Young Women, Local Authority Care and Selling Sex: Findings from Research. The British Journal of Social Work. 2008;38(7):1408-1424. DOI: 10.1093/bjsw/bcm049
28 - Home Office. Prevent. Strategy. 2011 Available at:
29 - Burke J. The Story of a Radicalisation: ‘I Was Not Thinking my Thoughts. I Was Not myself’. 2015; Available at: [Accessed Sep, 2017]
30 - Swimelar S. Visualizing international relations: Assessing student learning through film. International Studies Perspectives. 2013;14(1):14-38
31 - Ofcom. Children and Parents: Media Use and Attitudes Report. 2016. Available at:
32 - Felton A, Holliday L, Ritchie D, Langmack G, Conquer A. Simulation: A shared learning experience for child and mental health pre-registration nursing students. Nurse Education in Practice. 2013;13(6):536-540
33 - Schools in Second Life– Back to School (Role Play). 2012; Available at:
34 - Reeves J, Green T. “myCourtroom”: Rosie’s Family Go to Court; the use of simulations in preparing social workers for court Social Work Education Forthcoming 2017
35 - Minocha S, Reeves A. Design of learning spaces in 3D virtual worlds: An empirical investigation of second life. Learning, Media and Technology. 2010;35(2):111-137
36 - Hornik S, Thornburg S. Really engaging accounting: Second life™ as a learning platform. Issues in Accounting Education. 2010;25(3):361-378
37 - De Noyelles A, Hornik R, Johnson RD. Exploring the dimensions of self-efficacy in virtual world learning: Environment, task, and content: MERLOT. Journal of Online Learning and Teaching. 2014;10(2)
38 - Kolb DA. Experiential Learning: Experience as the Source of Learning and Development. Vol 1 Edition. Prentice-Hall: Englewood Cliffs, NJ; 1984
39 - Francis R. Revolution: Experiential learning through virtual role play. In: de Freitas S, Maharg P, editors. Digital Games and Learning: London, Oxford: Bloomsbury Contin-uum; 2011. p. 83-106. ISBN:9781441198709
40 - Barnet R. Higher Education: A Critical Business. Buckingham: Open University Press/SRHE; 1997
41 - Wass R, Golding C. Sharpening a tool for teaching:The zone of proximal development. Teaching in Higher Education. 2014;19(6)
42 - Vygotsky L. Interaction between learning and development. Readings on the development of children 1978. In: Readings on the Development of Children. New York: Scientific American Books. p. 34-40 Available at:
43 - de Freitas S, Maharg P. Digital Games and Learning. London, Oxford: Bloomsbury Continuum; 2011. ISBN: 9781441198709