- Christiansen, J. R., & Blake, R. H. (1990). The grooming process in father-daughter incest. In A. L. Horton, B. L. Johnson, L. M. Roundy, & D. Williams (Eds.), The incest perpetrator: A family member no one wants to treat (pp. 88-98). Newbury Park, CA: Sage.
- Conte, J. R., Wolf, S., & Smith, T. (1989). What sexual offenders tell us about prevention strategies. Child Abuse & Neglect, 13, 293-301.
- de Young, M. (1982). The sexual victimization of children. Jefferson, NC: McFarland.
- Gilgun, J. F. (1994). Avengers, conquerors, playmates, and lovers: Roles played by child sexual abuse perpetrators. Families in Society: Journal of Contemporary Human Services, 75,467-479.
- Gilgun, J. F. (1995). We shared something special: The moral discourse of incest perpetrators. Journal of Marriage & the Family, 57,265-281.
- Gilgun, J. F, & Connor, T. M. (1989). How perpetrators view child sexual abuse. Social Work, 34,149-251.
- Gilgun, J. F, & Connor, T. M. (1990). Isolation and the adult male perpetrator of child sexual abuse: Clinical concerns. In A. L. Horton, B. L. Johnson, L. M. Roundy, & D. Williams (Eds.), The incest perpetrator: A family member no one wants to treat (pp. 74-87). Newbury Park: Sage.
- Hartley, C. C. (1998). How incest offenders overcome internal inhibitions through the use of cognitions and cognitive distortions. Journal of Interpersonal Violence, 13(1), 25-39.
- Hartley, C. C. (2001). Incest offenders' perceptions of their motives to sexually offend within their past and current life context. Journal of Interpersonal Violence, 16(5), 459-475.
- Hartman, C. R., & Burgess, A. W. (1988). Information processing of trauma: Case application of a model. Journal of Interpersonal Violence, 3(4), 443457.
- Hudson, S. M., Ward, T., & McCormack, J. C. (1999). Offense pathways in sexual offenders. Journal of Interpersonal Violence, 14(8), 779-798.
- Ivey, G., & Simpson, P. (1998). The psychological life of paedophiles: A phenomenological study. South African Journal of Psychology, 28(1), 15-20.
- McSweeney, J. C., Allan, J. D., & Mayo, K. (1997). Exploring the use of explanatory models in nursing research and practice. Image: Journal of Nursing Scholarship, 29, 243-248.
- Neidigh, L., & Krop, H. (1992). Cognitive disortions among child sexual offenders. Journal of Sex Education & Therapy, 18, 208-215.
- Phelan, P. (1995). Incest and its meaning: The perspectives of fathers and daughters. Child Abuse & Neglect, 19(1), 7-24.
- Pollock, N. L., & Hasmall, J. M. (1991). The excuses of child molesters. Behavioral Sciences & the Law, 9(1), 53-59.
- Pribyl, D. S. (1998). The child sex offender's perspective on treatment and related factars.Dissertation Abstracts International: Section B:The Sciences & Engineering, 58(10-B), 5653.
- Rokach, A., Nutbrown, V., & Nexhipi, G. (1988). Content analysis of erotic imagery: Sex offenders and non-sex offenders. International Journal of Offender Therapy and Comparative Criminology, 32(2), 107-122.
- Russell, D. H. (1986). The secret trauma. New York: Basic.
- Scheela, R. A. (1995). Remodeling as metaphor: Sex offenders' perceptions of the treatment process. Issues in Mental Health Nursing, 16,493-504.
- Scheela, R. A. (1996). Use of remodelling in the treatment of sex offenders. Nursing Tunes, 92(4), 34-36.
- Van Manen, M. (1990). Researching lived experience: Human science for an action sensitive pedagogy. London: State University of New York Press.
- Waid, T., Fon, C., Hudson, S. M., & McCormack, J. C. (1998). A descriptive model of dysfunctional cognitions in child molesters. Journal of Interpersonal Violence, 13(1), 129-155.
- Ward, T., Louden, K., Hudson, S. M., & Marshall, W. L. (1995). A descriptive model of the offense chain for child molesters. Journal of Interpersonal Violence, 10,452-472.
Isolation, Gratification, Justification: Offenders' Explanations of Child Molesting
Reprints and Corporate Permissions
Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?
To request a reprint or corporate permissions for this article, please click on the relevant link below:
Academic Permissions
Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?
Obtain permissions instantly via Rightslink by clicking on the button below:
If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.
Related research
People also read lists articles that other readers of this article have read.
Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.
Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.