<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1900-6586</journal-id>
<journal-title><![CDATA[Revista Científica General José María Córdova]]></journal-title>
<abbrev-journal-title><![CDATA[Rev. Cient. Gen. José María Córdova]]></abbrev-journal-title>
<issn>1900-6586</issn>
<publisher>
<publisher-name><![CDATA[Escuela Militar de Cadetes "General José María Córdova"]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1900-65862022000200371</article-id>
<article-id pub-id-type="doi">10.21830/19006586.907</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Countering the sexual solicitation of children using computer technology: Ukrainian and foreign experience]]></article-title>
<article-title xml:lang="es"><![CDATA[La tecnología informática contra la captación sexual de menores: La experiencia ucraniana y extranjera]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Semchuk]]></surname>
<given-names><![CDATA[Natalia]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Lykhova]]></surname>
<given-names><![CDATA[Sofiia]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Udalova]]></surname>
<given-names><![CDATA[Neghdana]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Lyseiuk]]></surname>
<given-names><![CDATA[Andrii]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Cheban]]></surname>
<given-names><![CDATA[Olesia]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,National Aviation University  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
</aff>
<aff id="Af2">
<institution><![CDATA[,National Aviation University  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
</aff>
<aff id="Af3">
<institution><![CDATA[,University of Internal Affairs  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
</aff>
<aff id="Af4">
<institution><![CDATA[,University of the State Fiscal Service of Ukraine  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
</aff>
<aff id="Af5">
<institution><![CDATA[,Law of the National Transport University  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>04</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>04</month>
<year>2022</year>
</pub-date>
<volume>20</volume>
<numero>38</numero>
<fpage>371</fpage>
<lpage>385</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S1900-65862022000200371&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S1900-65862022000200371&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S1900-65862022000200371&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT. This article assesses the current state of criminal counteraction to the solicitation of children for sexual purposes using digital technologies in Ukraine and the foreign experience in this area. To this end, it uses the traditional legal research method as a basis for research, partially applying other methods such as comparative, historical, and international law. The article analyzes the composition of a criminal offense under Art. 156-1 of the Criminal Code of Ukraine and compares it to the texts of international acts and foreign legislation. The article concludes that the text of the adopted amendments is generally in line with Ukraine's commitments and foreign experience.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN. Este artículo evalúa el estado actual de la lucha penal contra la captación de niños con fines sexuales mediante el uso de tecnologías digitales en Ucrania y la experiencia extranjera en este ámbito. Para ello, utiliza el método de investigación jurídica tradicional como base de la investigación, aplicando otros métodos como el derecho comparado, histórico e internacional de forma parcial. El artículo analiza la estructura de un delito penal según el Art. 156-1 del Código Penal de Ucrania y lo compara con los textos de los actos internacionales y la legislación extranjera. El artículo concluye que el texto de las enmiendas adoptadas se ajusta en general a los compromisos de Ucrania y a la experiencia extranjera.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[children]]></kwd>
<kwd lng="en"><![CDATA[criminalization]]></kwd>
<kwd lng="en"><![CDATA[digital safety]]></kwd>
<kwd lng="en"><![CDATA[Lanzarote Convention]]></kwd>
<kwd lng="en"><![CDATA[online]]></kwd>
<kwd lng="en"><![CDATA[sexual exploitation]]></kwd>
<kwd lng="en"><![CDATA[solicitation.]]></kwd>
<kwd lng="es"><![CDATA[captación sexual]]></kwd>
<kwd lng="es"><![CDATA[Convenio de Lanzarote]]></kwd>
<kwd lng="es"><![CDATA[criminalización]]></kwd>
<kwd lng="es"><![CDATA[explotación en línea]]></kwd>
<kwd lng="es"><![CDATA[niños]]></kwd>
<kwd lng="es"><![CDATA[seguridad digital]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Akimova]]></surname>
<given-names><![CDATA[L. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Litvinova]]></surname>
<given-names><![CDATA[I. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Ilchenko]]></surname>
<given-names><![CDATA[H.O.]]></given-names>
</name>
<name>
<surname><![CDATA[Pomaza-Ponomarenko]]></surname>
<given-names><![CDATA[A.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Yemets]]></surname>
<given-names><![CDATA[O.I]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The negative impact of corruption on the economic security of states.]]></article-title>
<source><![CDATA[International Journal of Management]]></source>
<year>2020</year>
<volume>11</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>1058-71</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Atabekova]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Filippov]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Legislation response to use of minors&#8217; self-generated sexual content for their ICT-facilitated sexual coercion]]></article-title>
<source><![CDATA[European Research Studies Journal]]></source>
<year>2018</year>
<volume>21</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>763-72</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chorniy]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Problem issues of objectives and motives in composition of crimes against the basis of national security of Ukraine]]></article-title>
<source><![CDATA[Herald of Criminal Justice]]></source>
<year>2019</year>
<numero>4</numero>
<issue>4</issue>
<page-range>89-103</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="">
<collab>Council of Europe</collab>
<source><![CDATA[Convention du Conseil de l&#8217;Europe sur la protection des enfants contre l&#8217;exploitation et les abus sexuels. Série des Traités du Conseil de l&#8217;Europe - No. 201Conseil de l&#8217;Europe. October 25, 2007]]></source>
<year>2007</year>
<publisher-loc><![CDATA[Lanzarote ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="">
<collab>Criminal Code of Ukraine</collab>
<source><![CDATA[Law No. 2341-III. Verkhovna Rada of Ukraine]]></source>
<year>2001</year>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="">
<collab>Criminal Code of Ukraine</collab>
<source><![CDATA[Article 156-1 Harassment of a child for sexual purposes]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De Hart]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Dwyer]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Seto]]></surname>
<given-names><![CDATA[M. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Moran]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Letourneau]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Schwarz-Watts]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Internet sexual solicitation of children: a proposed typology of offenders based on their chats, e-mails, and social network posts]]></article-title>
<source><![CDATA[Journal of Sexual Aggression]]></source>
<year>2016</year>
<volume>23</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>77-89</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De Santisteban]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[del Hoyo]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Alcazar-Corcoles]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gamez-Guadix]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Progression, maintenance, and feedback of online child sexual grooming: a qualitative analysis of online predators]]></article-title>
<source><![CDATA[Child Abuse &amp; Neglect]]></source>
<year>2018</year>
<numero>80</numero>
<issue>80</issue>
<page-range>203-15</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<collab>EU Child Online Safety Project</collab>
<source><![CDATA[Enhancing police and industry practice]]></source>
<year>2020</year>
<publisher-name><![CDATA[Mdx]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Iasechko]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Skomorovskyi]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Andronov]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Oleksii Zaitsev]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Bortnik]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The investigation of peculiarities of the occurrence of subjective civil rights in registration of a patent]]></article-title>
<source><![CDATA[Journal of Advanced Research in Law and Economics]]></source>
<year>2020</year>
<volume>11</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>844-9</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<collab>International Telecommunications Union. [ITU]</collab>
<source><![CDATA[Child protection in digital environment: recommendations for industries]]></source>
<year>2020</year>
<publisher-name><![CDATA[Mediacenter]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Karthi]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Ramu]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A study on cyber child pornography.]]></article-title>
<source><![CDATA[Psychology and Education Journal]]></source>
<year>2020</year>
<volume>58</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>6519-28</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Klimek]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Solicitation of children for sexual purposes: The new offence in the EU Under the directive 2011/92/EU)]]></article-title>
<source><![CDATA[International and Comparative Law Review]]></source>
<year>2012</year>
<volume>12</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>141-51</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Langbroek]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Van den Bos]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Simon Thomas]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Milo]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Van Rossum]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Editorial methodology of legal research: challenges and opportunities]]></article-title>
<source><![CDATA[Utrecht Law Review]]></source>
<year>2017</year>
<volume>13</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>1-8</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Leonov]]></surname>
<given-names><![CDATA[B.D.]]></given-names>
</name>
<name>
<surname><![CDATA[Chumak]]></surname>
<given-names><![CDATA[L.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hrynenko]]></surname>
<given-names><![CDATA[S.V]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The problems of combating the sexual exploitation of children on the internet: analysis of the EU Experience]]></article-title>
<source><![CDATA[Information and Law]]></source>
<year>2020</year>
<volume>2</volume>
<numero>33</numero>
<issue>33</issue>
<page-range>32-9</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lykhova]]></surname>
<given-names><![CDATA[S. Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Leonov]]></surname>
<given-names><![CDATA[B. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Lysko]]></surname>
<given-names><![CDATA[T. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Shaptala]]></surname>
<given-names><![CDATA[N. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Maksymov]]></surname>
<given-names><![CDATA[S. I]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Criminal-legal ensuring of freedom of religion in modern conditions: a comparative analysis]]></article-title>
<source><![CDATA[Cuestiones Políticas]]></source>
<year>2021</year>
<volume>39</volume>
<numero>68</numero>
<issue>68</issue>
<page-range>620-49</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nebytov]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Legislative support to combat sexual exploitation in Ukraine]]></article-title>
<source><![CDATA[Scientific Bulletin of the National Academy of Internal Affairs]]></source>
<year>2015</year>
<numero>2</numero>
<issue>2</issue>
<page-range>52-60</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nolasco]]></surname>
<given-names><![CDATA[C. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Vaughn]]></surname>
<given-names><![CDATA[M. S.]]></given-names>
</name>
<name>
<surname><![CDATA[del Carmen]]></surname>
<given-names><![CDATA[R. V]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Toward a new methodology for legal research in criminal justice]]></article-title>
<source><![CDATA[Journal of Criminal Justice Education]]></source>
<year>2010</year>
<volume>21</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-23</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Orlovskyi]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Shapoval]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Demenko]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Possibilities of adapting the typologies of the international standards for establishing criminal liability for corruption-related crimes in Ukraine]]></article-title>
<source><![CDATA[Journal of Eastern European and Central Asian Research]]></source>
<year>2018</year>
<volume>5</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>12</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Petrov]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Serdyuk]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ukraine: The quest for democratization between Europe and Russia.]]></article-title>
<source><![CDATA[International Actors, Democratization and the Rule of Law: Anchoring Democracy?]]></source>
<year>2008</year>
<page-range>189-223</page-range><publisher-loc><![CDATA[London ]]></publisher-loc>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pollack]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[MacIver]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Understanding sexual grooming in child abuse cases]]></article-title>
<source><![CDATA[CLP ABA Child Law Practice]]></source>
<year>2015</year>
<volume>34</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>165-8</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Radzivill]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Pyvovar]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Sopilko]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Pyvovar]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Coordination of fragmentation within the international air law]]></article-title>
<source><![CDATA[International Journal of Engineering and Technology(UAE)]]></source>
<year>2018</year>
<volume>7</volume>
<numero>3^s30</numero>
<issue>3^s30</issue>
<supplement>30</supplement>
<page-range>30</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rutai]]></surname>
<given-names><![CDATA[Z]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Lanzarote Committee: Protecting children from sexual violence in Europe and beyond]]></article-title>
<source><![CDATA[Pécs Journal of International and European Law]]></source>
<year>2020</year>
<numero>1</numero>
<issue>1</issue>
<page-range>24-42</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Semchuk]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Lykhova]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Demianenko]]></surname>
<given-names><![CDATA[U]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Using English as a foreign language when teaching subjects of the criminal law cycle]]></article-title>
<source><![CDATA[Life Sciences: The Asian International Journal of Life Science]]></source>
<year>2019</year>
<volume>21</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>517-34</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sopilko]]></surname>
<given-names><![CDATA[I. N]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Formation of cybersafety policy (Ukrainian experience)]]></article-title>
<source><![CDATA[World Applied Sciences Journal]]></source>
<year>2013</year>
<volume>27</volume>
<numero>13</numero>
<issue>13</issue>
<page-range>371-4</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="">
<collab>The Council has implemented the provisions of the Council of Europe Convention on the Protection of Children against Sexual Abuse</collab>
<source><![CDATA[Radiosvoboda]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Trifu]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Dragoi]]></surname>
<given-names><![CDATA[A. M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[From sexting to child pornography]]></article-title>
<source><![CDATA[Journal of Health and Medical Sciences]]></source>
<year>2019</year>
<volume>2</volume>
<numero>4</numero>
<issue>4</issue>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tyler]]></surname>
<given-names><![CDATA[T.R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Methodology in legal research]]></article-title>
<source><![CDATA[Utrecht Law Review]]></source>
<year>2017</year>
<volume>13</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>130</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vakulyk]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Petrenko]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Kuzmenko]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Pochtovyi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Orlovskyi]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybersecurity as a component of the national security of the state]]></article-title>
<source><![CDATA[Journal of Security and Sustainability Issues]]></source>
<year>2020</year>
<volume>9</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>775-84</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="">
<collab>WHO</collab>
<source><![CDATA[INSPIRE Handbook: Action for implementing the seven strategies for ending violence against children. (Translation Shliakh do domu)]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Winters]]></surname>
<given-names><![CDATA[G.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Jeglic]]></surname>
<given-names><![CDATA[E.L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Stages of sexual grooming: Recognizing potentially predatory behaviors of child molesters]]></article-title>
<source><![CDATA[Deviant Behavior]]></source>
<year>2016</year>
<volume>38</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>724-33</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yaroshenko]]></surname>
<given-names><![CDATA[O. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Moskalenko]]></surname>
<given-names><![CDATA[O. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Sliusar]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Vapnyarchuk]]></surname>
<given-names><![CDATA[N. M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Commercial secret as an object of labour relations: Foreign and international experience]]></article-title>
<source><![CDATA[Journal of Legal, Ethical and Regulatory Issues]]></source>
<year>2018</year>
<volume>1</volume>
<numero>21</numero>
<issue>21</issue>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
