Profile
International Journal of Psychology & Behavior Analysis Volume 7 (2021), Article ID 7:IJPBA-179, 6 pages
https://doi.org/10.15344/2455-3867/2021/179
Mini Review
Risk Factors & Investigative Strategies for Sexual and Violent Predators

Scott Allen Johnson

Licensed Psychologist, USA
Scott A. Johnson, Licensed Psychologist, USA; E-mail: scott@forensicconsultation.org
19 May 2021; 13 July 2021; 15 July 2021
Johnson SA (2021) Risk Factors & Investigative Strategies for Sexual and Violent Predators. Int J Psychol Behav Anal 7: 179. doi: https://doi.org/10.15344/2455-3867/2021/179

References

  1. Wolak J, Finkelhor D (2013) Are crimes by online predators different from crimes by sex offenders who know youth in-person? J Adolesc Health 53: 736-741. [CrossRef] [Google Scholar] [PubMed]
  2. Broome LJ, Izura C, Lorenzo-Dus N (2018) A systematic review of fantasy driven vs. contact driven internet initiated sexual offences: Discrete or overlapping typologies? Child Abuse & Negl 79: 434-444. [CrossRef] [Google Scholar] [PubMed]
  3. Long, M. L., Alison, L. A., & McManus, M. A. (2013). Child pornography and likelihood of contact abuse: A comparison between contact child sexual offenders and non-contact offenders. Sex Abuse 25: 370-395. [CrossRef] [Google Scholar] [PubMed]
  4. Briggs P, Simon WT, Simonsen S (2011) An exploratory study of Internet initiated sexual offenses and the chat room sex offender: Has the Internet enabled a new typology of sex offender? Sexual Abuse 23: 72-91. [CrossRef] [Google Scholar]
  5. Craven S, Brown S, Gilchrist E (2006) Sexual grooming of children: Review of literature and theoretical considerations. Journal of Sexual Aggression 12: 287-299. [CrossRef] [Google Scholar]
  6. McCarthy JA (2010) Internet sexual activity: A comparison between contact and non-contact child pornography offenders. Journal of Sexual Aggression 16: 181-195. [CrossRef] [Google Scholar]
  7. McManus MA, Long ML, Alison L, Almond L (2015) Factors associated with contact child sexual abuse in a sample of indecent image offenders. Journal of Sexual Aggression 21: 368-384. [CrossRef] [Google Scholar]
  8. Seto MC, Wood MJ, Babchishin KM, Flynn S (2012) Online solicitation offenders are different from child pornography and lower risk contact sexual offenders. Law and Human Behavior 36: 320-330. [CrossRef] [Google Scholar]
  9. Webb L, Craissati J, Keen S (2007) Characteristics of Internet child pornography offenders: A comparison with child molesters. Sexual Abuse 19: 449-465. [CrossRef] [Google Scholar]
  10. Laulik S, Allam J, Sheridan L (2007) An investigation into maladaptive personality functioning in internet sex offenders. Psychology, Crime and Law 13: 523-535. [CrossRef] [Google Scholar]
  11. Winters GM, Jeglic EL (2017) Stages of grooming: Recognizing potentially predatory behaviors of child molesters. Deviant Behavior 38: 724-733. [CrossRef] [Google Scholar]
  12. Kloess JA, Seymour-Smith S, Hamilton-Giachritsis CE, Long ML, Shipley D, et al. (2015) A qualitative analysis of offenders’ modus operandi in sexually exploitative interactions with children online. Sex Abuse 29: 563-591. [CrossRef] [Google Scholar] [PubMed]
  13. Marcum C (2007) Interpreting the intentions of internet predators: An examination of online predatory behavior. Journal of Child Sexual Abuse 16: 99-114. [CrossRef] [Google Scholar]
  14. Mitchell KJ, Finkelhor D, Wolak J (2005) The internet and family and acquaintance sexual abuse. Child Maltreat 10: 49-60. [CrossRef] [Google Scholar] [PubMed]
  15. XXXX
  16. Black PJ, Wollis M, Woodworth M, Hancock JT (2015) A linguistic analysis of grooming strategies of online child sex offenders: Implications for our understanding of predatory sexual behavior in an increasingly computer-mediated world. Child Abuse Negl 44: 140-149. [CrossRef] [Google Scholar] [PubMed]
  17. van Dam C (2001) Identifying Child Molesters: Preventing Child Sexual Abuse by Recognizing the Patterns of Offenders. Binghamton, NY: The Haworth Press.
  18. McAlinden AM (2006) ‘Setting 'Em Up': Personal, familial and institutional grooming in the sexual abuse of children. Social & Legal Studies 15: 339-362. [CrossRef] [Google Scholar]
  19. Sullivan J (2002) The spiral of sexual abuse: A conceptual framework for understanding and illustrating the evolution of sexually abusive behaviour. NOTA News 41: 17-21.
  20. Sullivan J, Beech AR (2004) Assessing internet sex offenders. In M. Calder (Ed.), Child sexual abuse and the internet: Tackling the new frontier. Dorset: Russell House.
  21. Osborn J, Elliott IA, Middleton D, Beech AR (2010) The use of actuarial risk assessment measures with UK internet child pornography offenders. Journal of Aggression, Conflict and Peace Research 2: 16-24. [CrossRef] [Google Scholar]
  22. Carr J, Hilton Z (2009) Child Protection and self-regulation in the internet industry: The UK experience. Children and Society 23: 303-308. [CrossRef] [Google Scholar]
  23. Seto MC, Cantor JM, Blanchard R (2006) Child pornography offenses are a valid diagnostic indicator of pedophilia. J Abnorm Psychol 115: 610-615. [CrossRef] [Google Scholar] [PubMed]
  24. Lanning KV (2010) Child molesters: A behavioral analysis for Professionals Investigating the Sexual Exploitation of Children. National Center for Missing & Exploited Children. [Google Scholar]
  25. Abel GG, Becker JV, Cunningham-Rathner J (1984) Complications, consent, and cognitions in sex between children and adults. Int J Law Psychiatry 7: 89-103. [CrossRef] [Google Scholar] [PubMed]
  26. XXXX
  27. Burns DD (1989) The feeling good handbook. New York, NY: William Morrow and Co.
  28. Helmus L, Hanson RK, Babchishin KM, Mann RE (2013) Attitudes supportive of sexual offending predict recidivism: A meta-analysis. Trauma Violence Abuse 14: 34-53. [CrossRef] [Google Scholar] [PubMed]
  29. Mann RE, Marshall WL (2009) Advances in the Treatment of Adult Incarcerated Sex Offenders. In Beech AR, Craig LA, Browne KD, Assessment and treatment of sex offenders: A handbook. West Sussex: John Wiley & Sons.
  30. Neidigh L, Krop H (1992) Cognitive distortions among child sexual offenders. Child Abuse Negl 18: 208-215. [CrossRef] [Google Scholar] [PubMed]
  31. Ó Ciardha C, Gannon TA (2011) The cognitive distortions of child molesters are in need of treatment. Journal of Sexual Aggression, 17: 130-141. [CrossRef] [Google Scholar]
  32. Ó Ciardha C, Ward T (2013) Theories of cognitive distortions in sexual offending: What the current research tells us. Trauma Violence Abuse 14: 5-21. [CrossRef] [Google Scholar] [PubMed]
  33. Pollack NL, Hashmall JM (1991) The excuses of child molesters. Behavioral Sciences & the Law 9: 53-59. [CrossRef] [Google Scholar]
  34. Kettleborough DG, Meridan HL (2017) Gateway to offending behavior: Permission-giving thoughts of online users of child sexual exploitation material. Journal of Sexual Aggression 23: 19-32. [CrossRef] [Google Scholar]
  35. Aslan D, Edelmann R (2014) Demographic and offence characteristics: A comparison of sex offenders convicted of possessing indecent images of children, committing contact sex offences or both offences. Journal of Forensic Psychiatry and Psychology 25: 121-134. [CrossRef] [Google Scholar]
  36. Neutze J, Seto M, Schaefer GA, Mundt IA, Beier KM (2011) Predictors of child pornography offenses and child sexual abuse in a community of pedophiles and hebephiles. Sex Abuse 23: 212-242. [CrossRef] [Google Scholar] [PubMed]
  37. Lussier P, Cale J (2013) Beyond sexual recidivism: A review of the sexual criminal career parameters of adult sex offenders. Aggression and Violent Behavior 18: 445-457. [CrossRef] [Google Scholar]
  38. Quayle E, Taylor M (2002) Child pornography and the internet: Perpetuating a cycle of abuse. Deviant Behavior: An Interdisciplinary Journal 23: 331-361. [CrossRef] [Google Scholar]
  39. Houtepen JABM, Sijtsema JJ, Bogaerts S (2014) From child pornography to child sexual abuse: A review of child pornography offender characteristics and risks for cross-over. Aggression and Violent Behavior 19: 466-473. [CrossRef] [Google Scholar]
  40. Dandescu A, Wolfe R (2003) Considerations on fantasy use by child molesters and exhibitionists. Sexual Abuse: A Journal of Research and Treatment 15: 297-305. [CrossRef] [Google Scholar]
  41. Shelton J, Eakin J, Hoffer T, Muirhead Y, Owens J, et al. (2016) Online child sexual exploitation: An investigative analysis of offender characteristics and offending behavior. Aggression and Violent Behavior 30: 15-23. [CrossRef] [Google Scholar]
  42. Johnson SA (2019) Child porn offenders, solicitation offenders and child sexual abusers: What the literature has to say. Forensic Research Criminology International Journal 7: 202-235. [CrossRef] [Google Scholar]
  43. Eke AW, Seto MC, Williams J (2011) Examining the criminal history and future offending of child pornography offenders: An extended prospective follow‐up study. Law Hum Behav 35: 466-478. [CrossRef] [Google Scholar] [PubMed]
  44. Whittle HC, Hamilton-Giachritsis CE, Beech AR (2014) “Under his spell”: Victims’ perspectives of being groomed online. Social Sciences 3: 404-426. [CrossRef] [Google Scholar]
  45. Grosskopf A (2010) Online interactions involving suspected paedophiles who engage male children. Trends and Issues in Crime and Criminal Justice 403: 1-6. [Google Scholar]
  46. Owens JN, Eakin JD, Hoffer T, Muirhead Y, Shelton JLE, et al. (2016) Investigative aspects of crossover offending from a sample of FBI online child sexual exploitation cases. Aggression and Violent Behavior 30: 3-14. [CrossRef] [Google Scholar]
  47. Smith DW, Letourneau EJ, Saunders BE, Kilpatrick DG, Resnick HS, et al. (2000) Delay of disclosure in childhood rape: Results from a national survey. Child Abuse and Neglect 24: 273-287. [CrossRef] [Google Scholar] [PubMed]
  48. Krone T (2005) Queensland police stings in online chat rooms. Trends & Issues in Crime and Criminal Justice 301: 1-6. [Google Scholar]
  49. Mitchell KJ, Finkelhor D, Wolak J (2007) Youth internet users at risk for the most serious online sexual solicitations. Am J Prev Med 32: 532-537. [CrossRef] [Google Scholar] [PubMed]
  50. O’Connell R (2003) A typology of cyber sexploitation and online grooming practices. Cyberspace Research Unit University of Central Lancashire. [View]
  51. Campbell AM (2009) False faces and broken lives: An exploratory study of the interaction behaviors used by male sex offenders in relating to victims. Journal of Language and Social Psychology 28: 428-440. [CrossRef] [Google Scholar]
  52. Sullivan J, Quayle E (2012) Manipulation styles of abusers who work with children. In M Erooga Creating safer organisations: Practical steps to prevent the abuse of children by those working with them. Chichester, UK: John Wiley.
  53. Bourke ML, Hernandez AE (2009) The “Butner Study” redux: A report of the incidence of hands-on child victimization by child pornography offenders. Journal of Family Violence 24: 183-191. [CrossRef] [Google Scholar]
  54. Bourke ML, Fragomeli L, Detar PJ, Sullivan MA, Meyle E, et al. (2015) The use of tactical polygraph with sex offenders. Journal of Sexual Aggression 21: 354-367. [CrossRef] [Google Scholar]
  55. Buschman J, Wilcox D, Krapohl D, Oelrich M, Hackett S, et al. (2010) Cyber sex offender risk assessment. An explorative study. Journal of Sexual Aggression 16: 197-209. [CrossRef] [Google Scholar]
  56. Heil P, English K (2009) Sex offender polygraph testing in the United States: Trends and controversies. Wiley Online Liberary. [CrossRef] [Google Scholar]
  57. Gannon TA, Wood JL, Pina A, Tyler N, Barnoux MFL, et al. (2013) An evaluation of mandatory polygraph testing for sexual offenders in the United Kingdom. Sex Abuse 26: 178-203. [CrossRef] [Google Scholar] [PubMed]
  58. Seto MC, Hanson KR, Babchishin KM (2011) Contact sexual offending by men with online sexual offenses. Sex Abuse 23: 124-145. [CrossRef] [Google Scholar] [PubMed]
  59. Merdian HL, Moghaddam N, Boer DP, Wilson N, Thakker J, et al. (2018) Fantasy-driven versus contact-driven users of child sexual exploitation material: Offender classification and implications for their risk assessment. Sex Abuse 30: 230-253. [CrossRef] [Google Scholar] [PubMed]
  60. Malesky LA Jr (2007) Predatory online behavior: Modus operandi of convicted sex offenders in identifying potential victims and contacting minors over the internet. J Child Sex Abus 16: 23-32. [CrossRef] [Google Scholar] [PubMed]
  61. DeHart D, Dwyer G, Seto MC, Moran R, Letourneau E, et al. (2017) Internet sexual solicitation of children: A proposed typology of offenders based on their chats, e-mails, and social network posts. Journal of Sexual Aggression 23: 77-89. [CrossRef] [Google Scholar]
  62. Lorenzo-Dus N, Izura C, Pérez-Tattam R (2016). Understanding grooming discourse in computer-mediated environments. Discourse, Context and Media 12: 40-50. [CrossRef] [Google Scholar]
  63. Lorenzo-Dus N, Izura C (2017) “cause ur special”: Understanding trust and complimenting behaviour in online grooming discourse. Journal of Pragmatics 112: 68-82. [CrossRef] [Google Scholar]
  64. McAlinden AM (2013) Grooming and the sexual abuse of children: Implications for sex offender assessment, treatment and management. Sexual Offender Treatment. [Google Scholar]
  65. de Santistebana P, del Hoyo J, Alcázar-Córcoles MA, Gámez-Guadix M (2018) Progression, maintenance, and feedback of online child sexual grooming: A qualitative analysis of online predators. Child Abuse Negl 80: 203-215. [CrossRef] [Google Scholar] [PubMed]
  66. Drouin M, Boyd RL, Hancock JT, James A (2017) Linguistic analysis of chat transcripts from child predator undercover sex stings. The Journal of Forensic Psychiatry and Psychology 28: 437-457. [CrossRef] [Google Scholar]
  67. Bergen E, Antfolk J, Jern P, Alanko K, Santtila P (2013) Adults’ sexual interest in children and adolescents online: A quasi-experimental study. International Journal of Cyber Criminology 7: 94-111. [Google Scholar]