458
Views
17
CrossRef citations to date
0
Altmetric
Research Article

Isolation, Gratification, Justification: Offenders' Explanations of Child Molesting

Pages 695-705 | Published online: 09 Jul 2009

  • Christiansen, J. R., & Blake, R. H. (1990). The grooming process in father-daughter incest. In A. L. Horton, B. L. Johnson, L. M. Roundy, & D. Williams (Eds.), The incest perpetrator: A family member no one wants to treat (pp. 88-98). Newbury Park, CA: Sage.
  • Conte, J. R., Wolf, S., & Smith, T. (1989). What sexual offenders tell us about prevention strategies. Child Abuse & Neglect, 13, 293-301.
  • de Young, M. (1982). The sexual victimization of children. Jefferson, NC: McFarland.
  • Gilgun, J. F. (1994). Avengers, conquerors, playmates, and lovers: Roles played by child sexual abuse perpetrators. Families in Society: Journal of Contemporary Human Services, 75,467-479.
  • Gilgun, J. F. (1995). We shared something special: The moral discourse of incest perpetrators. Journal of Marriage & the Family, 57,265-281.
  • Gilgun, J. F, & Connor, T. M. (1989). How perpetrators view child sexual abuse. Social Work, 34,149-251.
  • Gilgun, J. F, & Connor, T. M. (1990). Isolation and the adult male perpetrator of child sexual abuse: Clinical concerns. In A. L. Horton, B. L. Johnson, L. M. Roundy, & D. Williams (Eds.), The incest perpetrator: A family member no one wants to treat (pp. 74-87). Newbury Park: Sage.
  • Hartley, C. C. (1998). How incest offenders overcome internal inhibitions through the use of cognitions and cognitive distortions. Journal of Interpersonal Violence, 13(1), 25-39.
  • Hartley, C. C. (2001). Incest offenders' perceptions of their motives to sexually offend within their past and current life context. Journal of Interpersonal Violence, 16(5), 459-475.
  • Hartman, C. R., & Burgess, A. W. (1988). Information processing of trauma: Case application of a model. Journal of Interpersonal Violence, 3(4), 443457.
  • Hudson, S. M., Ward, T., & McCormack, J. C. (1999). Offense pathways in sexual offenders. Journal of Interpersonal Violence, 14(8), 779-798.
  • Ivey, G., & Simpson, P. (1998). The psychological life of paedophiles: A phenomenological study. South African Journal of Psychology, 28(1), 15-20.
  • McSweeney, J. C., Allan, J. D., & Mayo, K. (1997). Exploring the use of explanatory models in nursing research and practice. Image: Journal of Nursing Scholarship, 29, 243-248.
  • Neidigh, L., & Krop, H. (1992). Cognitive disortions among child sexual offenders. Journal of Sex Education & Therapy, 18, 208-215.
  • Phelan, P. (1995). Incest and its meaning: The perspectives of fathers and daughters. Child Abuse & Neglect, 19(1), 7-24.
  • Pollock, N. L., & Hasmall, J. M. (1991). The excuses of child molesters. Behavioral Sciences & the Law, 9(1), 53-59.
  • Pribyl, D. S. (1998). The child sex offender's perspective on treatment and related factars.Dissertation Abstracts International: Section B:The Sciences & Engineering, 58(10-B), 5653.
  • Rokach, A., Nutbrown, V., & Nexhipi, G. (1988). Content analysis of erotic imagery: Sex offenders and non-sex offenders. International Journal of Offender Therapy and Comparative Criminology, 32(2), 107-122.
  • Russell, D. H. (1986). The secret trauma. New York: Basic.
  • Scheela, R. A. (1995). Remodeling as metaphor: Sex offenders' perceptions of the treatment process. Issues in Mental Health Nursing, 16,493-504.
  • Scheela, R. A. (1996). Use of remodelling in the treatment of sex offenders. Nursing Tunes, 92(4), 34-36.
  • Van Manen, M. (1990). Researching lived experience: Human science for an action sensitive pedagogy. London: State University of New York Press.
  • Waid, T., Fon, C., Hudson, S. M., & McCormack, J. C. (1998). A descriptive model of dysfunctional cognitions in child molesters. Journal of Interpersonal Violence, 13(1), 129-155.
  • Ward, T., Louden, K., Hudson, S. M., & Marshall, W. L. (1995). A descriptive model of the offense chain for child molesters. Journal of Interpersonal Violence, 10,452-472.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.