1,607
Views
8
CrossRef citations to date
0
Altmetric
Understanding and Treating Child Sexual Abuse Offenders

Demographic and Motivation Differences Among Online Sex Offenders by Type of Offense: An Exploration of Routine Activities Theories

&
Pages 753-771 | Received 17 Oct 2013, Accepted 26 Jun 2015, Published online: 19 Oct 2015

REFERENCES

  • Alexy, E. M., Burgess, A. W., & Baker, T. (2005). Internet offenders: Traders, travelers, and combination trader-travelers. Journal of Interpersonal Violence, 20(7), 804–811. doi:10.1177/0886260505276091
  • Babchishin, K. M., Hanson, R. K., & Hermann, C. A. (2011). The characteristics of online sex offenders: A meta-analysis. Sexual Abuse: A Journal of Research and Treatment, 23(1), 92–123.
  • Barak, A. (2005). Sexual harassment on the Internet. Social Science Computer Review, 23(1), 77–92. doi:10.1177/0894439304271540
  • Bourke, M. L., & Hernandez, A. E. (2009). The “Butner Study” redux: A report of the incidence of hands-on child victimization by child pornography offenders. Journal of Family Violence, 24(3), 183–191. doi:10.1007/s10896-008-9219-y
  • Burke, A., Sowerbutts, S., Blundell, B., & Sherry, M. (2002). Child pornography and the Internet: Policing and treatment issues. Psychiatry, Psychology and Law, 9(1), 79–84. doi:10.1375/pplt.2002.9.1.79
  • Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588–608. doi:10.2307/2094589
  • Finkelhor, D., Wolak, J., & Mitchell, K. (2012). Second National Juvenile Online Victimization Study (NJOV-2) User Guide: National data archive on child abuse and neglect. Available from National Data Archive on Child Abuse and Neglect web site: http://www.ndacan.cornell.edu
  • Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Palo Alto, CA: Stanford University Press.
  • Hanson, R. K., & Bussière, M. T. (1998). Predicting relapse: A meta-analysis of sexual offender recidivism studies. Journal of Consulting and Clinical Psychology, 66(2), 348–362. doi:10.1037/0022-006X.66.2.348
  • Lauritsen, J. L., Sampson, R. J., & Laub, J. H. (1991). The link between offending and victimization among adolescents. Criminology, 29(2), 265–292. doi:10.1111/crim.1991.29.issue-2
  • Marcum, C. D. (2008). Identifying potential factors of adolescent online victimization for high school seniors. International Journal of Cyber Criminology, 2(2), 346–367.
  • Mesch, G. S. (2009). Parental mediation, online activities, and cyberbullying. CyberPsychology & Behavior, 12(4), 387–393. doi:10.1089/cpb.2009.0068
  • Mitchell, K. J., Wolak, J., & Finkelhor, D. (2005). Police posing as juveniles online to catch sex offenders: Is it working? Sexual Abuse: A Journal of Research and Treatment, 17(3), 241–267. doi:10.1177/107906320501700302
  • Mitchell, K. J., Wolak, J., & Finkelhor, D. (2009). The national juvenile online victimization study: Methodology report. Durham, NH: Crimes Against Children Research Center.
  • Mitchell, K. J., Wolak, J., Finkelhor, D., & Jones, L. (2011). Investigators using the Internet to apprehend sex offenders: Findings from the Second National Juvenile Online Victimization Study. Police Practice and Research, 13(3), 267–281. doi:10.1080/15614263.2011.627746
  • Mustaine, E. E., & Tewksbury, R. (2009). Transforming potential offenders into motivated ones: Are sex offenders tempted by alcohol and pornography? Deviant Behavior, 30(7), 561–588. doi:10.1080/01639620802467821
  • Navarro, J. N., & Jasinski, J. L. (2012). Going cyber: Using routine activities theory to predict cyberbullying experiences. Sociological Spectrum, 32(1), 81–94. doi:10.1080/02732173.2012.628560
  • Navarro, J. N., & Jasinski, J. L. (2013). Why girls? Using routine activities theory to predict cyberbullying experiences between girls and boys. Women & Criminal Justice, 23(4), 286–303. doi:10.1080/08974454.2013.784225
  • Quayle, E., & Taylor, M. (2002). Child pornography and the Internet: Perpetuating a cycle of abuse. Deviant Behavior, 23(4), 331–361. doi:10.1080/01639620290086413
  • Sasse, S. (2005). “Motivation” and routine activities theory. Deviant Behavior, 26(6), 547–570. doi:10.1080/01639620500218260
  • Seto, M. C., Cantor, J. M., & Blanchard, R. (2006). Child pornography offenses are a valid diagnostic indicator of pedophilia. Journal of Abnormal Psychology, 115, 610–615. doi:10.1037/0021-843X.115.3.610
  • Seto, M. C., Wood, J. M., Babchishin, K. M., & Flynn, S. (2012). Online solicitation offenders are different from child pornography offenders and lower risk contact sexual offenders. Law and Human Behavior, 36(4), 320–330. doi:10.1037/h0093925
  • Webb, L., Craissati, J., & Keen, S. (2007). Characteristics of Internet child pornography offenders: A comparison with child molesters. Sexual Abuse: A Journal of Research and Treatment, 19(4), 449–465.
  • Wolak, J., Finkelhor, D., & Mitchell, K. J. (2004). Internet-initiated sex crimes against minors: Implications for prevention based on findings from a national study. Journal of Adolescent Health, 35(5), 424.e11–424.e20. doi:10.1016/j.jadohealth.2004.05.006
  • Wolak, J., Finkelhor, D., & Mitchell, K. J. (2005). Child-pornography possessors arrested in Internet-related crimes: Findings from the National Juvenile Online Victimization Study. Alexandria, VA: National Center for Missing and Exploited Children.
  • Wolak, J., Finkelhor, D., & Mitchell, K. J. (2009). Trends in arrests of “online predators.” Durham, NH: Crimes Against Children Research Center, University of New Hampshire.
  • Wolak, J., Finkelhor, D., & Mitchell, K. J. (2011). Child pornography possessors: Trends in offender and case characteristics. Sexual Abuse: A Journal of Research and Treatment, 23(1), 22–42. doi:10.1177/1079063210372143
  • Wolak, J., Finkelhor, D., & Mitchell, K. J. (2012). Trends in arrests for child pornography production: The Third National Juvenile Online Victimization Study (NJOV-3). Durham, NH: Crimes Against Children Research Center, University of New Hampshire.
  • Wolak, J., Finkelhor, D., Mitchell, K. J., & Ybarra, M. L. (2010). Online “predators” and their victims: Myths, realities, and implications for prevention and treatment. Psychology of Violence, 1, 13–35. doi:10.1037/2152-0828.1.S.13
  • Wolak, J., Mitchell, K. J., & Finkelhor, D. (2003). Internet sex crimes against minors: The response of law enforcement. Alexandria, VA: National Center for Missing and Exploited Children.
  • Yar, M. (2005). The novelty of “cybercrime”: An assessment in light of routine activity theory. European Journal of Criminology, 2, 407–427. doi:10.1177/147737080556056

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.