Sexual Victimization Involving Solo Female Offenders: A Crime Script Approach

2021 ◽  
pp. 001112872110617
Author(s):  
Julien Chopin ◽  
Eric Beauregard ◽  
Sarah Paquette

This study aims to provide a theoretically grounded analysis of the crime-commission process of solo females involved in sexual offending, using crime scripts. The sample includes 93 cases of sexual assaults perpetrated by female offenders in an extrafamilial context. Latent class analysis was used to identify the scripts involved in female sexual offending as well as to explore the relationship between each step of the crime-commission process. Also, additional variables related to victim, offender, and location characteristics were used to test the external validity of the model. Results suggest four different scripts used by females: Daytime Indoor, Coercive Outdoor, Coercive Indoor, and Nighttime Indoor. Theoretical and practical implications are discussed.

Author(s):  
Julien Chopin ◽  
Eric Beauregard

The purpose of this study is to explore the crime-commission process involved in the sexual victimization of children perpetrated by juveniles. Specifically, this study aims to explore the interconnectedness of pre-crime, crime, and post-crime phases with victimological characteristics using a criminal event perspective. The sample used in this study consists of 185 cases of child sexual abuses perpetrated by juveniles. The first step of this study uses latent class analysis to explore the relationship between each step of the crime-commission process. As a second step, additional variables were used to test the external validity of our model. Results suggest that there are three different criminal event patterns: familiar sexually non-intrusive, familiar sexually intrusive, and stranger sexually non-intrusive. Moreover, we found that specific victimological characteristics were associated with each of the patterns. Practical implications in terms of situational crime prevention and victim assistance are discussed.


2019 ◽  
Vol 22 (4) ◽  
pp. 770-781
Author(s):  
Michael Donegan

Purpose The purpose of this paper is to critically analyse research surrounding mandate fraud and to devise a crime script identifying the crime commission process. It is hoped this will assist in standardising investigation of mandate fraud by law enforcement. Design/methodology/approach The design of this paper follows on from the approach taken by van Hardeveld et al. (2017) in identifying a cybercrime script for carding activity. The current environment surrounding the investigation of digital fraud in the UK is examined through a review of the existing literature. Analysis of the crime commission process for mandate fraud is then outlined in a potential crime script identifying possible intervention points for law enforcement. Findings UK law enforcement’s current response to digital fraud is struggling to provide positive outcomes for victims. There is inconsistency in the investigative approach and practical issues surrounding how the digital fraud problem is tackled. Changing the emphasis of digital fraud investigation to focus on the money laundering networks based in the UK also needs to be considered. Standardising investigation into digital fraud by mapping out digital criminality using crime scripts and routine activity theory could be beneficial for law enforcement. The results of this process could also assist in effectively identifying where law enforcement resources may be best deployed to solve some of the practical issues highlighted. Originality/value There is little literature directly focused on a crime script for mandate fraud. This is despite it being a significant contributor to fraud losses in the UK. For law enforcement, both digital and financial investigation skill sets are required to investigate such offences. Therefore, mapping the crime commission process has significant value for clearly identifying investigative intervention points.


Crime Science ◽  
2020 ◽  
Vol 9 (1) ◽  
Author(s):  
Abigail C. O’Hara ◽  
Ryan K. L. Ko ◽  
Lorraine Mazerolle ◽  
Jonah R. Rimer

Abstract Objective This research uses crime scripts to understand adult retribution-style image-based sexual abuse (RS-IBSA) offender decision-making and offending in offline and online environments. We explain the crime-commission process of adult RS-IBSA and identify crime intervention points at eight crime script stages. Methods Publicly released court transcripts of adult RS-IBSA prosecution cases (n = 18) in New Zealand from 2015 to 2018 were utilised to examine the crime-commission process of adult RS-IBSA. We analysed the court transcripts thematically at offence-level prior to constructing the crime scripts. Findings The study identified four types of adult RS-IBSA acts including the non-consensual dissemination of a victim’s intimate images, violent cyber sextortion, covert intimate photography, and unauthorised access of a victim’s phone/media. From our analysis, we identified three script tracks and constructed three distinct crime scripts: (1) threats, sextortion and dissemination; (2) unauthorised access of a victim’s mobile device and dissemination; and (3) covert intimate filming. We highlight areas for potential intervention for law enforcement agencies and policy makers to increase deterrence and personal security in online and offline spaces. Conclusion Adult RS-IBSA occurs in a range of dating and domestic contexts. This study develops crime scripts for adult RS-IBSA and advances our understanding of how the Internet/smartphones/digital media translates into virtual crime scenes with opportunities for maximum harm infliction. We offer several policy implications including revising current RS-IBSA legislation and supporting law enforcement agencies with policing online and offline intimate relationship spaces through situational prevention.


Author(s):  
Julien Chopin ◽  
Eric Beauregard

This study aims to empirically explore the patterns of necrophilic behaviors in sexual homicide. More specifically, the study investigates offender, victim, and crime characteristics of sexual homicides where necrophilic acts were perpetrated, to determine whether the primary motivation to kill is associated with the attainment of corpses or whether the post-mortem sexual acts were secondary deviant behaviors. The sample used in this study consists of 109 cases of extrafamilial sexual homicides where post-mortem sexual acts were committed by offenders. Latent class analysis was used to examine each step of the crime-commission process of sexual homicide offenders involved in necrophilic behaviors. Our findings suggest that there are four different patterns of necrophilia in sexual homicide: Opportunistic, experimental, preferential, and sadistic. Preferential offenders are the only ones who specifically kill their victims in order to have sex with their corpses, while for sadistic, experimental, and opportunistic offenders post-mortem sexual acts were part of a secondary deviant process. Practical implications in terms of criminal investigations and offenders’ treatment are discussed.


Author(s):  
Evan C. McCuish ◽  
Jesse Cale ◽  
Raymond R. Corrado

Child sexual abuse is considered a risk factor for the development of sexual offending in adolescence. Beyond this, comparisons of the risk factor profiles between adolescent sex offenders (ASOs) and adolescent non-sex offenders (ANSOs) have uncovered minimal differences. However, differences between ASOs and ANSOs in terms of patterns in the abuse histories of their family members have rarely been studied. The aim in the current study was to retrospectively examine histories of abuse among family members of ASOs compared with ANSOs to determine whether and how these were related to youth abuse experiences and sexual offending in adolescence. The current study is based on a sample of 482 incarcerated male adolescents (ASOs = 67, ANSOs = 415). Latent class analysis was conducted to determine multidimensional familial abuse profiles, and a series of logistic regression models were used to examine the relationship between family abuse profiles, youth abuse experiences, and adolescent sexual offending. Overall, familial abuse profiles were related to subsequent youth abuse experiences and sexual offending, and these abuse profiles differentiated ASOs and ANSOs.


2019 ◽  
Vol 18 (2) ◽  
pp. 106-111
Author(s):  
Fong-Yi Lai ◽  
Szu-Chi Lu ◽  
Cheng-Chen Lin ◽  
Yu-Chin Lee

Abstract. The present study proposed that, unlike prior leader–member exchange (LMX) research which often implicitly assumed that each leader develops equal-quality relationships with their supervisors (leader’s LMX; LLX), every leader develops different relationships with their supervisors and, in turn, receive different amounts of resources. Moreover, these differentiated relationships with superiors will influence how leader–member relationship quality affects team members’ voice and creativity. We adopted a multi-temporal (three wave) and multi-source (leaders and employees) research design. Hypotheses were tested on a sample of 227 bank employees working in 52 departments. Results of the hierarchical linear modeling (HLM) analysis showed that LLX moderates the relationship between LMX and team members’ voice behavior and creative performance. Strengths, limitations, practical implications, and directions for future research are discussed.


2018 ◽  
Vol 3 (3) ◽  
pp. 431-440
Author(s):  
Santi Retno Sari

The purpose of this paper is to examine the relationships to which leadership style (task and relations oriented leadership) moderate the impact of conflict on employee performance. Data were collected from 92 employees in different job levels. Partial least squares variance-based structural equation modeling (PLS-SEM) was used to test the relationship in the models. The results showed that task and relation conflict was associated with employee performance. The research findings also showed that leadership styles moderated the relationship between conflict and employee performance. This study offers implications for managerial practices. Practical implications and suggestions described in the paper Keywords: leadership style, conflict, performance.


2019 ◽  
Vol 31 (2) ◽  
pp. 17-30 ◽  
Author(s):  
Craig Emby ◽  
Bin Zhao ◽  
Jost Sieweke

ABSTRACT This paper examines the relationship between audit seniors discussing their own experiences with committing and correcting errors (modeling fallibility), and audit juniors' thinking about errors and error communication (openly discussing their own self-discovered errors). The paper investigates the direct relationship between senior modeling fallibility and juniors' responses, and whether the relationship is mediated through error strain and error-related self-efficacy. Survey data from 266 audit juniors from two Big 4 Canadian accounting firms showed a direct positive association between audit senior modeling fallibility and audit juniors' thinking about errors, and error communication. This relationship is positively mediated through error-related self-efficacy. We also found that the relationship is mediated by error strain. However, although audit senior modeling fallibility was associated with reduced error strain, error strain was positively related to both thinking about errors and error communication, contrary to our hypothesis. The paper discusses the theoretical and practical implications of these results.


Sign in / Sign up

Export Citation Format

Share Document