245
Views
0
CrossRef citations to date
0
Altmetric
Sexual Offending

A Content Analysis of Posts to an Online Support Forum for “Girl Lovers”

, , &
Pages 522-537 | Received 30 Jan 2022, Accepted 11 Jul 2022, Published online: 12 Aug 2022

References

  • American Psychiatric Association. (2013). Diagnostic and statistical manual of mental disorders (5th ed.).
  • Beier, K., Neutze, J., Mundt, I. A., & Ahlers, C. J. (2009). Encouraging self-identified pedophiles and hebephiles to seek professional help: First results of the Prevention Project Dunkelfeld (PPD). Child Abuse & Neglect, 33(8), 545–549. https://doi.org/10.1016/j.chiabu.2009.04.002
  • Delong, R. L., Durkin, K. F., & Hundersmarck, S. F. (2010). An exploratory analysis of the cognitive distortions of a sample of men arrested in internet sex stings. Journal of Sexual Aggression, 16(1), 59–70. https://doi.org/10.1080/13552600903428235
  • Durkin, K. F. (1997). Misuse of the Internet by pedophiles: Implications for law enforcement and probation practice. Federal Probation, 61(3), 14–18.
  • Durkin, K. F., & Bryant, C. D. (1999). Propagandizing pederasty: A thematic analysis of the on-line exculpatory accounts of unrepentant pedophiles. Deviant Behavior, 20(2), 103–127. https://doi.org/10.1080/016396299266524
  • Grayston, A. D., & De Luca, R. V. (1999). Female perpetrators of child sexual abuse. Aggression and Violent Behavior, 4(1), 93–106. https://doi.org/10.1016/S1359-1789(98)00014-7
  • Hays, P. A. (2008). Addressing cultural complexities in practice: Assessment, diagnosis, and therapy (2nd ed.). American Psychological Association.
  • Holt, T. J., Blevins, K. R., & Burkert, N. (2010). Considering the pedophile subculture online. Sexual Abuse: A Journal of Research and Treatment, 22(1), 3–24. https://doi.org/10.1177/1079063209344979
  • Holt, T. J., Lee, J. R., Liggett, R., Holt, K. M., & Bossler, A. (2019). Examining perceptions of online harassment among constables in England and Wales. International Journal of Cybersecurity Intelligence & Cybercrime, 2(1), 24–39. https://doi.org/10.52306/02010319LFQZ1592
  • Howitt, D., & Sheldon, K. (2007). The role of cognitive distortions in paedophilic offending: Internet and contact offenders compared. Psychology, Crime & Law, 13(5), 469–486. https://doi.org/10.1080/10683160601060564
  • Hsieh, H.-F., & Shannon, S. E. (2005). Three approaches to qualitative content analysis. Qualitative Health Research, 15(9), 1277–1288. https://doi.org/10.1177/1049732305276687
  • Hundersmarck, S. F., Durkin, K. F., & Delong, R. L. (2007). Designing a classification system for internet offenders: Doing cognitive distortions. Journal of Offender Rehabilitation, 45(1–2), 257–273. https://doi.org/10.1300/J076v45n01_17
  • Lombard, M., Snyder-Dutch, J., & Bracken, C. (2002). Content analysis in mass communication: Assessment and reporting of intercoder reliability. Human Communication Research, 28(4), 587–604. https://doi.org/10.1111/j.1468-2958.2002.tb00826.x
  • Marziano, V., Ward, T., Beech, A. R., & Pattison, P. (2006). Identification of five fundamental implicit theory underlying cognitive distortions in child abusers: A preliminary study. Psychology, Crime & Law, 12(1), 97–105. https://doi.org/10.1080/10683160500056887
  • Neunendorf, K. (2002). The content analysis guidebook. SAGE.
  • O’Halloran, E., & Quayle, E. (2010). A content analysis of a “boy love” support forum: revisiting Durkin and Bryant. Journal of Sexual Aggression, 16(1), 71–85. https://doi.org/10.1080/13552600903395319
  • Quinn, J. F., & Forsyth, C. J. (2013). Red light districts on blue screens: A typology for understanding the evolution of deviant communities on the internet. Deviant Behavior, 34(7), 579–585. https://doi.org/10.1080/01639625.2012.748629
  • Seto, M. C. (2004). Pedophilia and sexual offenses against children. Annual Review of Sex Research, 15(1), 321–361.
  • Snyder, H., & Sickmund, M. (2006). Juvenile offenders and victims: 2006 national report. Office of Juvenile Justice and Delinquency Prevention.
  • Ward, T., & Keenan, T. (1999). Child molesters’ implicit theories. Journal of Interpersonal Violence, 14(8), 821–838. https://doi.org/10.1177/088626099014008003

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.