International Journal of Psychology & Behavior Analysis Volume 7 (2021), Article ID 7:IJPBA-179, 6 pages
https://doi.org/10.15344/2455-3867/2021/179
https://doi.org/10.15344/2455-3867/2021/179
Mini Review
Risk Factors & Investigative Strategies for Sexual and Violent Predators
References
- Wolak J, Finkelhor D (2013) Are crimes by online predators different from crimes by sex offenders who know youth in-person? J Adolesc Health 53: 736-741. [CrossRef] [Google Scholar] [PubMed]
- Broome LJ, Izura C, Lorenzo-Dus N (2018) A systematic review of fantasy driven vs. contact driven internet initiated sexual offences: Discrete or overlapping typologies? Child Abuse & Negl 79: 434-444. [CrossRef] [Google Scholar] [PubMed]
- Long, M. L., Alison, L. A., & McManus, M. A. (2013). Child pornography and likelihood of contact abuse: A comparison between contact child sexual offenders and non-contact offenders. Sex Abuse 25: 370-395. [CrossRef] [Google Scholar] [PubMed]
- Briggs P, Simon WT, Simonsen S (2011) An exploratory study of Internet initiated sexual offenses and the chat room sex offender: Has the Internet enabled a new typology of sex offender? Sexual Abuse 23: 72-91. [CrossRef] [Google Scholar]
- Craven S, Brown S, Gilchrist E (2006) Sexual grooming of children: Review of literature and theoretical considerations. Journal of Sexual Aggression 12: 287-299. [CrossRef] [Google Scholar]
- McCarthy JA (2010) Internet sexual activity: A comparison between contact and non-contact child pornography offenders. Journal of Sexual Aggression 16: 181-195. [CrossRef] [Google Scholar]
- McManus MA, Long ML, Alison L, Almond L (2015) Factors associated with contact child sexual abuse in a sample of indecent image offenders. Journal of Sexual Aggression 21: 368-384. [CrossRef] [Google Scholar]
- Seto MC, Wood MJ, Babchishin KM, Flynn S (2012) Online solicitation offenders are different from child pornography and lower risk contact sexual offenders. Law and Human Behavior 36: 320-330. [CrossRef] [Google Scholar]
- Webb L, Craissati J, Keen S (2007) Characteristics of Internet child pornography offenders: A comparison with child molesters. Sexual Abuse 19: 449-465. [CrossRef] [Google Scholar]
- Laulik S, Allam J, Sheridan L (2007) An investigation into maladaptive personality functioning in internet sex offenders. Psychology, Crime and Law 13: 523-535. [CrossRef] [Google Scholar]
- Winters GM, Jeglic EL (2017) Stages of grooming: Recognizing potentially predatory behaviors of child molesters. Deviant Behavior 38: 724-733. [CrossRef] [Google Scholar]
- Kloess JA, Seymour-Smith S, Hamilton-Giachritsis CE, Long ML, Shipley D, et al. (2015) A qualitative analysis of offenders’ modus operandi in sexually exploitative interactions with children online. Sex Abuse 29: 563-591. [CrossRef] [Google Scholar] [PubMed]
- Marcum C (2007) Interpreting the intentions of internet predators: An examination of online predatory behavior. Journal of Child Sexual Abuse 16: 99-114. [CrossRef] [Google Scholar]
- Mitchell KJ, Finkelhor D, Wolak J (2005) The internet and family and acquaintance sexual abuse. Child Maltreat 10: 49-60. [CrossRef] [Google Scholar] [PubMed]
- XXXX
- Black PJ, Wollis M, Woodworth M, Hancock JT (2015) A linguistic analysis of grooming strategies of online child sex offenders: Implications for our understanding of predatory sexual behavior in an increasingly computer-mediated world. Child Abuse Negl 44: 140-149. [CrossRef] [Google Scholar] [PubMed]
- van Dam C (2001) Identifying Child Molesters: Preventing Child Sexual Abuse by Recognizing the Patterns of Offenders. Binghamton, NY: The Haworth Press.
- McAlinden AM (2006) ‘Setting 'Em Up': Personal, familial and institutional grooming in the sexual abuse of children. Social & Legal Studies 15: 339-362. [CrossRef] [Google Scholar]
- Sullivan J (2002) The spiral of sexual abuse: A conceptual framework for understanding and illustrating the evolution of sexually abusive behaviour. NOTA News 41: 17-21.
- Sullivan J, Beech AR (2004) Assessing internet sex offenders. In M. Calder (Ed.), Child sexual abuse and the internet: Tackling the new frontier. Dorset: Russell House.
- Osborn J, Elliott IA, Middleton D, Beech AR (2010) The use of actuarial risk assessment measures with UK internet child pornography offenders. Journal of Aggression, Conflict and Peace Research 2: 16-24. [CrossRef] [Google Scholar]
- Carr J, Hilton Z (2009) Child Protection and self-regulation in the internet industry: The UK experience. Children and Society 23: 303-308. [CrossRef] [Google Scholar]
- Seto MC, Cantor JM, Blanchard R (2006) Child pornography offenses are a valid diagnostic indicator of pedophilia. J Abnorm Psychol 115: 610-615. [CrossRef] [Google Scholar] [PubMed]
- Lanning KV (2010) Child molesters: A behavioral analysis for Professionals Investigating the Sexual Exploitation of Children. National Center for Missing & Exploited Children. [Google Scholar]
- Abel GG, Becker JV, Cunningham-Rathner J (1984) Complications, consent, and cognitions in sex between children and adults. Int J Law Psychiatry 7: 89-103. [CrossRef] [Google Scholar] [PubMed]
- XXXX
- Burns DD (1989) The feeling good handbook. New York, NY: William Morrow and Co.
- Helmus L, Hanson RK, Babchishin KM, Mann RE (2013) Attitudes supportive of sexual offending predict recidivism: A meta-analysis. Trauma Violence Abuse 14: 34-53. [CrossRef] [Google Scholar] [PubMed]
- Mann RE, Marshall WL (2009) Advances in the Treatment of Adult Incarcerated Sex Offenders. In Beech AR, Craig LA, Browne KD, Assessment and treatment of sex offenders: A handbook. West Sussex: John Wiley & Sons.
- Neidigh L, Krop H (1992) Cognitive distortions among child sexual offenders. Child Abuse Negl 18: 208-215. [CrossRef] [Google Scholar] [PubMed]
- Ó Ciardha C, Gannon TA (2011) The cognitive distortions of child molesters are in need of treatment. Journal of Sexual Aggression, 17: 130-141. [CrossRef] [Google Scholar]
- Ó Ciardha C, Ward T (2013) Theories of cognitive distortions in sexual offending: What the current research tells us. Trauma Violence Abuse 14: 5-21. [CrossRef] [Google Scholar] [PubMed]
- Pollack NL, Hashmall JM (1991) The excuses of child molesters. Behavioral Sciences & the Law 9: 53-59. [CrossRef] [Google Scholar]
- Kettleborough DG, Meridan HL (2017) Gateway to offending behavior: Permission-giving thoughts of online users of child sexual exploitation material. Journal of Sexual Aggression 23: 19-32. [CrossRef] [Google Scholar]
- Aslan D, Edelmann R (2014) Demographic and offence characteristics: A comparison of sex offenders convicted of possessing indecent images of children, committing contact sex offences or both offences. Journal of Forensic Psychiatry and Psychology 25: 121-134. [CrossRef] [Google Scholar]
- Neutze J, Seto M, Schaefer GA, Mundt IA, Beier KM (2011) Predictors of child pornography offenses and child sexual abuse in a community of pedophiles and hebephiles. Sex Abuse 23: 212-242. [CrossRef] [Google Scholar] [PubMed]
- Lussier P, Cale J (2013) Beyond sexual recidivism: A review of the sexual criminal career parameters of adult sex offenders. Aggression and Violent Behavior 18: 445-457. [CrossRef] [Google Scholar]
- Quayle E, Taylor M (2002) Child pornography and the internet: Perpetuating a cycle of abuse. Deviant Behavior: An Interdisciplinary Journal 23: 331-361. [CrossRef] [Google Scholar]
- Houtepen JABM, Sijtsema JJ, Bogaerts S (2014) From child pornography to child sexual abuse: A review of child pornography offender characteristics and risks for cross-over. Aggression and Violent Behavior 19: 466-473. [CrossRef] [Google Scholar]
- Dandescu A, Wolfe R (2003) Considerations on fantasy use by child molesters and exhibitionists. Sexual Abuse: A Journal of Research and Treatment 15: 297-305. [CrossRef] [Google Scholar]
- Shelton J, Eakin J, Hoffer T, Muirhead Y, Owens J, et al. (2016) Online child sexual exploitation: An investigative analysis of offender characteristics and offending behavior. Aggression and Violent Behavior 30: 15-23. [CrossRef] [Google Scholar]
- Johnson SA (2019) Child porn offenders, solicitation offenders and child sexual abusers: What the literature has to say. Forensic Research Criminology International Journal 7: 202-235. [CrossRef] [Google Scholar]
- Eke AW, Seto MC, Williams J (2011) Examining the criminal history and future offending of child pornography offenders: An extended prospective follow‐up study. Law Hum Behav 35: 466-478. [CrossRef] [Google Scholar] [PubMed]
- Whittle HC, Hamilton-Giachritsis CE, Beech AR (2014) “Under his spell”: Victims’ perspectives of being groomed online. Social Sciences 3: 404-426. [CrossRef] [Google Scholar]
- Grosskopf A (2010) Online interactions involving suspected paedophiles who engage male children. Trends and Issues in Crime and Criminal Justice 403: 1-6. [Google Scholar]
- Owens JN, Eakin JD, Hoffer T, Muirhead Y, Shelton JLE, et al. (2016) Investigative aspects of crossover offending from a sample of FBI online child sexual exploitation cases. Aggression and Violent Behavior 30: 3-14. [CrossRef] [Google Scholar]
- Smith DW, Letourneau EJ, Saunders BE, Kilpatrick DG, Resnick HS, et al. (2000) Delay of disclosure in childhood rape: Results from a national survey. Child Abuse and Neglect 24: 273-287. [CrossRef] [Google Scholar] [PubMed]
- Krone T (2005) Queensland police stings in online chat rooms. Trends & Issues in Crime and Criminal Justice 301: 1-6. [Google Scholar]
- Mitchell KJ, Finkelhor D, Wolak J (2007) Youth internet users at risk for the most serious online sexual solicitations. Am J Prev Med 32: 532-537. [CrossRef] [Google Scholar] [PubMed]
- O’Connell R (2003) A typology of cyber sexploitation and online grooming practices. Cyberspace Research Unit University of Central Lancashire. [View]
- Campbell AM (2009) False faces and broken lives: An exploratory study of the interaction behaviors used by male sex offenders in relating to victims. Journal of Language and Social Psychology 28: 428-440. [CrossRef] [Google Scholar]
- Sullivan J, Quayle E (2012) Manipulation styles of abusers who work with children. In M Erooga Creating safer organisations: Practical steps to prevent the abuse of children by those working with them. Chichester, UK: John Wiley.
- Bourke ML, Hernandez AE (2009) The “Butner Study” redux: A report of the incidence of hands-on child victimization by child pornography offenders. Journal of Family Violence 24: 183-191. [CrossRef] [Google Scholar]
- Bourke ML, Fragomeli L, Detar PJ, Sullivan MA, Meyle E, et al. (2015) The use of tactical polygraph with sex offenders. Journal of Sexual Aggression 21: 354-367. [CrossRef] [Google Scholar]
- Buschman J, Wilcox D, Krapohl D, Oelrich M, Hackett S, et al. (2010) Cyber sex offender risk assessment. An explorative study. Journal of Sexual Aggression 16: 197-209. [CrossRef] [Google Scholar]
- Heil P, English K (2009) Sex offender polygraph testing in the United States: Trends and controversies. Wiley Online Liberary. [CrossRef] [Google Scholar]
- Gannon TA, Wood JL, Pina A, Tyler N, Barnoux MFL, et al. (2013) An evaluation of mandatory polygraph testing for sexual offenders in the United Kingdom. Sex Abuse 26: 178-203. [CrossRef] [Google Scholar] [PubMed]
- Seto MC, Hanson KR, Babchishin KM (2011) Contact sexual offending by men with online sexual offenses. Sex Abuse 23: 124-145. [CrossRef] [Google Scholar] [PubMed]
- Merdian HL, Moghaddam N, Boer DP, Wilson N, Thakker J, et al. (2018) Fantasy-driven versus contact-driven users of child sexual exploitation material: Offender classification and implications for their risk assessment. Sex Abuse 30: 230-253. [CrossRef] [Google Scholar] [PubMed]
- Malesky LA Jr (2007) Predatory online behavior: Modus operandi of convicted sex offenders in identifying potential victims and contacting minors over the internet. J Child Sex Abus 16: 23-32. [CrossRef] [Google Scholar] [PubMed]
- DeHart D, Dwyer G, Seto MC, Moran R, Letourneau E, et al. (2017) Internet sexual solicitation of children: A proposed typology of offenders based on their chats, e-mails, and social network posts. Journal of Sexual Aggression 23: 77-89. [CrossRef] [Google Scholar]
- Lorenzo-Dus N, Izura C, Pérez-Tattam R (2016). Understanding grooming discourse in computer-mediated environments. Discourse, Context and Media 12: 40-50. [CrossRef] [Google Scholar]
- Lorenzo-Dus N, Izura C (2017) “cause ur special”: Understanding trust and complimenting behaviour in online grooming discourse. Journal of Pragmatics 112: 68-82. [CrossRef] [Google Scholar]
- McAlinden AM (2013) Grooming and the sexual abuse of children: Implications for sex offender assessment, treatment and management. Sexual Offender Treatment. [Google Scholar]
- de Santistebana P, del Hoyo J, Alcázar-Córcoles MA, Gámez-Guadix M (2018) Progression, maintenance, and feedback of online child sexual grooming: A qualitative analysis of online predators. Child Abuse Negl 80: 203-215. [CrossRef] [Google Scholar] [PubMed]
- Drouin M, Boyd RL, Hancock JT, James A (2017) Linguistic analysis of chat transcripts from child predator undercover sex stings. The Journal of Forensic Psychiatry and Psychology 28: 437-457. [CrossRef] [Google Scholar]
- Bergen E, Antfolk J, Jern P, Alanko K, Santtila P (2013) Adults’ sexual interest in children and adolescents online: A quasi-experimental study. International Journal of Cyber Criminology 7: 94-111. [Google Scholar]