| Literature DB >> 29904690 |
L J Broome1, C Izura1, N Lorenzo-Dus1.
Abstract
Data presented within this article supports the findings of the manuscript "A systematic review of fantasy driven vs contact driven internet-initiated sexual offences: Discrete or overlapping typologies?" (Broome et al., in press) [1]. Inclusion and Exclusion criteria of study selection, PICO Formulation of Study Appraisal, as well as the Study Characteristics and Methodology of included studies are presented.Entities:
Year: 2018 PMID: 29904690 PMCID: PMC5998217 DOI: 10.1016/j.dib.2018.04.076
Source DB: PubMed Journal: Data Brief ISSN: 2352-3409
Inclusion and Exclusion Criteria for Study Selection.
Studies that investigate the strategies of individuals who use the internet to sexually abuse minors. | Studies that investigate: |
offline sexual offending only child pornography use as a definition of ‘fantasy’ offending the sexual abuse of victims over 18 years of age offenders under 18 years of age | |
Studies in which contact and fantasy driven behaviour were identifiable | |
Studies exploring crime characteristics or grooming strategies of individuals who use the internet to sexually abuse minors | |
| Review articles and reports | |
Primary studies to include cohort, case-control, cross-sectional or case series studies | Non-English articles |
PICO Formulation of Study Appraisal [2].
| Population | Total number of participants (differentiating between fantasy and contact behaviour where appropriate), length of grooming/offending process, use of decoy victim. |
| Interest | Crime characteristics, behavioural tactics, communicative approaches and risk assessment strategies of adult online child sexual offenders. Consideration of typology (fantasy and contact groomers) |
| Comparisons | Evaluation of fantasy driven and contact driven individuals to assess whether an empirical distinction exists between the groups. Consideration of statistical analysis and study methodology. |
| Outcomes | Crime characteristics, analysis of tactics, communicative approaches and risk assessment strategies. |
Study Characteristics of Included Studies.
| Barber | Contact | Mean 35 | # | Yes | Mean 13 | # | America | – | 90 | Relationships, risk assessment, sexualisation, threatening behaviour, trade-off |
| Bergen | Mixed | 15 | Yes | 10–18 | # | Sweden/Finland | # | # | Trade-off | |
| Bergen | Mixed | Mean 25 | No | −13–17 | Sweden/Finland/Germany | 66 | 68 | Deception, trade-off | ||
| Black | Contact | 25–54 | Yes | 12–15 | America | – | 44 | Relationships, risk assessment, sexualisation, trade-off | ||
| Briggs | Mixed | 19–54 | M | No | 12–16 | America | 21 | 30 | Deception, relationships, sexualisation, trade-off | |
| DeHart | Mixed | 18–74 | M | Yes | 9–14 | America | 48 / 64 | 44 | Relationships, risk assessment, sexualisation, trade-off | |
| Grosskopf | Mixed | # | Yes | 13–14 | Australia | 5 | 10 | Relationships, risk assessment, sexualisation, threatening behaviour, trade-off | ||
Note. Mixed typology refers to studies that report results for both contact and fantasy driven individuals. # Data not identifiable.
Refers to those individuals who received a sexual picture (N=38) and engaged in cybersex (N = 28),
Refers to those who met offline (N = 45) and engaged in offline sexual contact (N = 23).
Includes cybersex and cybersex/schedulers.
Represents individuals who engaged in cautious, more restrained exchanges (3) and educational exchanges (2).
Refers to those who aim to reach short term sexual gratification (8) and long-term procurement (2).
Signifies those individuals charged for exposing a child to indecent materials.
Refers to individuals who procured a child online for sexual purposes.
Represents traveling cases, including individuals who met victims online and travelled for intent of sexual contact.
Includes individuals who committed a no contact offence.
Includes contact offences (fondling, inappropriate touching (6), oral sex (10), intercourse (57) and sexual violence (2)).
Methodology of included studies.
| Content analysis from grounded theory and frequency word counts were carried out on online transcripts to assess for pervasiveness of communicative strategies. | – | |
| Predictor variables of behaviour were coded based on expression of sexual interest from online transcripts | Contrast estimations and rank correlations were conducted to assess the level and direction of the effect of perceived age and behaviour. Inter-rater reliability was assessed with a median value of agreement being .69 (Cohen's K). | |
| The prevalence and related outcomes of identity deception and keeping the online interaction a secret was assessed via online self-report surveys | Logistic regression analysis to examine the affect each item of deception and secrecy may have on outcomes. One-sample and independent t-tests were carried out on significant results. OR was reported for differences between the groups for each outcome. Bonferroni adjusted and non-adjusted p-values are reported. | |
| Content analysis of grooming strategies, manually coded against the stages of O’Connell's (2013) proposed online grooming theory, was carried out on chat room transcripts. The Linquistic Inquiry Word Count (LIWC) was used to analyse several language categories representing different stages of grooming. | Mixed model analysis was carried out with language terms (friendship, relationship, risk assessment, exclusivity and sexual contact related terms) as the dependent variables and the grooming process stage as the independent variable. Chi-square analysis assessed specific manipulation techniques. Inter-rater reliability correlation of coding ranged from .34–.96 for frequency of use in strategies. Kappa values ranged from .72–.95 for presence of strategy. | |
| Chat log transcripts were reviewed to identify communicative and behavioural patterns. Behavioural, social and clinical information was collected from archival data of individuals referred to a forensic mental health centre. | Cross-tabulation statistics were calculated to compare and contrast findings between contact and fantasy drive individuals. | |
| Mixed method analysis of chat log transcripts were carried out to identify key elements of internet crimes against minors, proposing a typology of offenders. Qualitative coded was carried out using MaxQDA to sort commentaries into hierarchical categories. | Classification of offender type was based upon exploratory quantitative cluster analyses. Groups were compared using ANOVA for continuous variables and chi-square analysis for categorical variables. | |
| Semi-structures interviews were carried out with police officers involved in online sting operations to qualitatively compare findings to Krone [ | – | |
| Word frequencies for each stage of O’Connell's [ | ||
| Thematic analysis, employing a discursive content-driven approach was carried out on chat log transcripts to identify key information, trends and themes. A hierarchical grouping approach enabled assessment of similarity and differences across the categories | – | |
| Police officers were interviewed and prosecution files were made available with access to demographics, previous criminal history and details about the arresting crime. Data was coded into a database. Both real victim and decoy victim data were included. | – | |
| Using a Computer-Mediated Discourse Analysis approach, language –focused content analysis was carried out on chat logs. Focusing on speech acts and relational work, a new online grooming communicative model is proposed. | Welch's | |
| A Computer-Mediated Discourse Analysis approach was undertaken. Praise was examined using Speech Act Theory (SAT – complimenting behaviour). The relational and procedural goals of groomers’ use of compliments were explored by the Interactional Sociolinguistics notion of relational work. | – | |
| Qualitative analysis was carried out on a questionnaire response to the question: “what initially attracted you to a particular child/adolescent online that you wanted to establish a relationship with for sexual purposes?” Participant responses were categorised into themes and evaluated by 3 independent reviewers. | – | |
| Qualitative latent coding on chat logs were carried out to explore the underlying meaning of the communication. | ||
| Sociolinguistic analytical techniques were undertaken on grooming chat logs to develop a typology of child cybersexploitation | – | |
| The term frequency-inverse document frequency (tf-idf) matrix was established from chat logs to identify grooming characteristics. | Paired | |
| Using a constructivist grounded theory approach interview transcripts of convicted groomers where analysed to explore ways in which online groomers identified victims. Active language was analysed to explore categories within the data, inter-relationships between categories was assessed and theoretical sampling and sensitivity was incorporated into the analysis. | – | |
| Investigative reports, offender interviews, sentencing information and criminal record information were accessed from FBI Crimes Against Children case reviews. Data extraction, to include offender background, investigation details and legal outcomes were recorded into an FBI developed protocol. The protocol was reviewed by the FBI's Behavioural Research Working Group. | Chi-square and t-tests were conducted to explore differences between cases that occurred between 1996 and 2002 ( | |
| Qualitative coding of chat log transcripts was carried out by one researcher, identifying 4 categories describing groomer behaviour; offence characteristics, rapport building, sexual matters and concealment. Inter-rater reliability was measured on a sample of cases ( | Chi square analysis and t-tests were carried out to examine differences between groomers targeting male and female victims. | |
| Chat logs transcripts were analysed thematically, in an inductive way, with no existing framework to code the data to identify grooming themes. One researcher carried out the initial coding, with a 2nd reviewed coding a sample (10%) of chat logs to evaluate consistency | – | |
| Inductive and deductive coding was carried out on chat log transcripts to investigate offender, decoy victim and conversation characteristics. | – | |
| 2574 Law enforcement agencies were surveyed and telephone interviews carried out to collect information about the case to include the type of crime, levels of deception, dynamics of the crime and type of sexual behaviour carried out | – | |
| Law enforcement officers were interviewed using a computer-assisted telephone system following completion of a mail survey. Officers also provided a crime narrative. The overall aim of the study was to examine whether online groomers are a distinct offender group. | Chi-square cross-tabulation analysis was carried out to compare online-meeting and known-in-person cases. STATA SE11 survey data analysis procedures were employed to consider selection probability variations. |
Note. – denotes data not applicable.
| Subject area | |
| More specific subject area | |
| Type of data | |
| How data was acquired | |
| Data format | |
| Experimental factors | |
| Experimental features | |
| Data source location | |
| Data accessibility |