Literature DB >> 29904690

Data on fantasy vs contact driven internet-initiated sexual offences: Study selection, appraisal and characteristics.

L J Broome1, C Izura1, N Lorenzo-Dus1.   

Abstract

Data presented within this article supports the findings of the manuscript "A systematic review of fantasy driven vs contact driven internet-initiated sexual offences: Discrete or overlapping typologies?" (Broome et al., in press) [1]. Inclusion and Exclusion criteria of study selection, PICO Formulation of Study Appraisal, as well as the Study Characteristics and Methodology of included studies are presented.

Entities:  

Year:  2018        PMID: 29904690      PMCID: PMC5998217          DOI: 10.1016/j.dib.2018.04.076

Source DB:  PubMed          Journal:  Data Brief        ISSN: 2352-3409


Specifications Table Value of the data The data allows for interpretation and assessment of studies examining the behavior of internet-initiated sexual crimes against minors, including study characteristics and methodology. The data enables comparison of two distinct classification of internet-initiated offences commonly referred to in the literature: fantasy vs contact driven crimes. Studies within this field primarily rely on the use of decoy victims, i.e. adults posing as children/young people who engage in proactive investigations. This data enables researchers to identify those studies that use decoy and real child victims.

Data

The data set contains information on the Inclusion and Exclusion Criteria for Study Selection (Table 1), and PICO Formulation of Study Appraisal (Table 2) for studies reviewed by Broome et al. [1]. Additionally, Study Characteristics (Table 3) and Methodology (Table 4) for included studies are described.
Table 1

Inclusion and Exclusion Criteria for Study Selection.

InclusionExclusion

Studies that investigate the strategies of individuals who use the internet to sexually abuse minors.

Studies that investigate:

offline sexual offending only

child pornography use as a definition of ‘fantasy’ offending

the sexual abuse of victims over 18 years of age

offenders under 18 years of age

and

Studies in which contact and fantasy driven behaviour were identifiable

and

Studies exploring crime characteristics or grooming strategies of individuals who use the internet to sexually abuse minors

Review articles and reports
and

Primary studies to include cohort, case-control, cross-sectional or case series studies

Non-English articles
Table 2

PICO Formulation of Study Appraisal [2].

PICOCharacteristics
PopulationTotal number of participants (differentiating between fantasy and contact behaviour where appropriate), length of grooming/offending process, use of decoy victim.
InterestCrime characteristics, behavioural tactics, communicative approaches and risk assessment strategies of adult online child sexual offenders. Consideration of typology (fantasy and contact groomers)
ComparisonsEvaluation of fantasy driven and contact driven individuals to assess whether an empirical distinction exists between the groups. Consideration of statistical analysis and study methodology.
OutcomesCrime characteristics, analysis of tactics, communicative approaches and risk assessment strategies.
Table 3

Study Characteristics of Included Studies.

StudyTypologyOffender AgeOffender GenderDecoy VictimPerceived Age of VictimVictim GenderCountry of Data SourceN. FantasyN. ContactOutcomes
Barber [4]ContactMean 35#YesMean 13#America90Relationships, risk assessment, sexualisation, threatening behaviour, trade-off
Bergen [5]Mixed15a-60MYes10–18#Sweden/Finland##Trade-off
Bergen [6]MixedMean 25M = 98No−13–17M = 50Sweden/Finland/Germany66a68bDeception, trade-off
F = 38F = 80
Black [7]Contact25–54MYes12–15M = 6America44Relationships, risk assessment, sexualisation, trade-off
F = 38
Briggs [8]Mixed19–54MNo12–16M = 1America2130Deception, relationships, sexualisation, trade-off
F = 50
DeHart [9]Mixed18–74MYes9–14M = 6America48 / 64c44Relationships, risk assessment, sexualisation, trade-off
F = 194
Grosskopf [10]Mixed#MYes13–14MAustralia5d10eRelationships, risk assessment, sexualisation, threatening behaviour, trade-off

Note. Mixed typology refers to studies that report results for both contact and fantasy driven individuals. # Data not identifiable.

Refers to those individuals who received a sexual picture (N=38) and engaged in cybersex (N = 28),

Refers to those who met offline (N = 45) and engaged in offline sexual contact (N = 23).

Includes cybersex and cybersex/schedulers.

Represents individuals who engaged in cautious, more restrained exchanges (3) and educational exchanges (2).

Refers to those who aim to reach short term sexual gratification (8) and long-term procurement (2).

Signifies those individuals charged for exposing a child to indecent materials.

Refers to individuals who procured a child online for sexual purposes.

Represents traveling cases, including individuals who met victims online and travelled for intent of sexual contact.

Includes individuals who committed a no contact offence.

Includes contact offences (fondling, inappropriate touching (6), oral sex (10), intercourse (57) and sexual violence (2)).

Table 4

Methodology of included studies.

StudyMethodologyStatistical Analysis
Barber et al.[4]Content analysis from grounded theory and frequency word counts were carried out on online transcripts to assess for pervasiveness of communicative strategies.
Bergen et al.[5]Predictor variables of behaviour were coded based on expression of sexual interest from online transcriptsContrast estimations and rank correlations were conducted to assess the level and direction of the effect of perceived age and behaviour. Inter-rater reliability was assessed with a median value of agreement being .69 (Cohen's K).
Bergen et al.[6]The prevalence and related outcomes of identity deception and keeping the online interaction a secret was assessed via online self-report surveysLogistic regression analysis to examine the affect each item of deception and secrecy may have on outcomes. One-sample and independent t-tests were carried out on significant results. OR was reported for differences between the groups for each outcome. Bonferroni adjusted and non-adjusted p-values are reported.
Black et al.[7]Content analysis of grooming strategies, manually coded against the stages of O’Connell's (2013) proposed online grooming theory, was carried out on chat room transcripts. The Linquistic Inquiry Word Count (LIWC) was used to analyse several language categories representing different stages of grooming.Mixed model analysis was carried out with language terms (friendship, relationship, risk assessment, exclusivity and sexual contact related terms) as the dependent variables and the grooming process stage as the independent variable. Chi-square analysis assessed specific manipulation techniques. Inter-rater reliability correlation of coding ranged from .34–.96 for frequency of use in strategies. Kappa values ranged from .72–.95 for presence of strategy.
Briggs et al.[8]Chat log transcripts were reviewed to identify communicative and behavioural patterns. Behavioural, social and clinical information was collected from archival data of individuals referred to a forensic mental health centre.Cross-tabulation statistics were calculated to compare and contrast findings between contact and fantasy drive individuals.
DeHart et al.[9]Mixed method analysis of chat log transcripts were carried out to identify key elements of internet crimes against minors, proposing a typology of offenders. Qualitative coded was carried out using MaxQDA to sort commentaries into hierarchical categories.Classification of offender type was based upon exploratory quantitative cluster analyses. Groups were compared using ANOVA for continuous variables and chi-square analysis for categorical variables.
Grosskopf[10]Semi-structures interviews were carried out with police officers involved in online sting operations to qualitatively compare findings to Krone [13]. For those unable to be interviewed, self-report questionnaires were distributed mirroring the questions asked in the interview
Gupta et al.[11]Word frequencies for each stage of O’Connell's [18] online grooming theory were calculated using LIWC and recorded in a 6 × 6 conditional probability matrix to calculate the probability of moving through each stage.Z-scores for LIWC categories were calculated to normalise the data. Logistic regression analysis was carried out to calculate the linguistic predictor of each grooming stage. The variance inflation factor was calculated to assess multi-collinearity in the data and removing LIWC categories with an overlap of more than 80%.
Kloess et al.[12]Thematic analysis, employing a discursive content-driven approach was carried out on chat log transcripts to identify key information, trends and themes. A hierarchical grouping approach enabled assessment of similarity and differences across the categories
Krone[13]Police officers were interviewed and prosecution files were made available with access to demographics, previous criminal history and details about the arresting crime. Data was coded into a database. Both real victim and decoy victim data were included.
Lorenzo-Dus et al.[14]Using a Computer-Mediated Discourse Analysis approach, language –focused content analysis was carried out on chat logs. Focusing on speech acts and relational work, a new online grooming communicative model is proposed.Welch's t-test was conducted to explore differences in the frequency of identified grooming processes. Pearson correlations examined relationships between grooming processes.
Lorenzo-Dus and Izura[15]A Computer-Mediated Discourse Analysis approach was undertaken. Praise was examined using Speech Act Theory (SAT – complimenting behaviour). The relational and procedural goals of groomers’ use of compliments were explored by the Interactional Sociolinguistics notion of relational work.
Malesky[16]Qualitative analysis was carried out on a questionnaire response to the question: “what initially attracted you to a particular child/adolescent online that you wanted to establish a relationship with for sexual purposes?” Participant responses were categorised into themes and evaluated by 3 independent reviewers.
Marcum[17]Qualitative latent coding on chat logs were carried out to explore the underlying meaning of the communication.
O’Connell[18]Sociolinguistic analytical techniques were undertaken on grooming chat logs to develop a typology of child cybersexploitation
Prantono et al.[19]The term frequency-inverse document frequency (tf-idf) matrix was established from chat logs to identify grooming characteristics.Paired t-tests were carried out to examine the relationship between words used and grooming characteristics. A logistic model was then developed using step-wise regression.
Quayle et al.[20]Using a constructivist grounded theory approach interview transcripts of convicted groomers where analysed to explore ways in which online groomers identified victims. Active language was analysed to explore categories within the data, inter-relationships between categories was assessed and theoretical sampling and sensitivity was incorporated into the analysis.
Shelton et al.[21]Investigative reports, offender interviews, sentencing information and criminal record information were accessed from FBI Crimes Against Children case reviews. Data extraction, to include offender background, investigation details and legal outcomes were recorded into an FBI developed protocol. The protocol was reviewed by the FBI's Behavioural Research Working Group.Chi-square and t-tests were conducted to explore differences between cases that occurred between 1996 and 2002 (n = 198) and from 2010 (n = 53). No significant differences existed between the cases, the sample was therefore combined. A descriptive analysis of data extraction is provided.
van Gijn-Grosvenor[22]Qualitative coding of chat log transcripts was carried out by one researcher, identifying 4 categories describing groomer behaviour; offence characteristics, rapport building, sexual matters and concealment. Inter-rater reliability was measured on a sample of cases (n = 13), completed by a second coded. Coders agreed 93% of the time.Chi square analysis and t-tests were carried out to examine differences between groomers targeting male and female victims.
Williams et al.[23]Chat logs transcripts were analysed thematically, in an inductive way, with no existing framework to code the data to identify grooming themes. One researcher carried out the initial coding, with a 2nd reviewed coding a sample (10%) of chat logs to evaluate consistency
Winters et al.[24]Inductive and deductive coding was carried out on chat log transcripts to investigate offender, decoy victim and conversation characteristics.
Wolak et al.[25]2574 Law enforcement agencies were surveyed and telephone interviews carried out to collect information about the case to include the type of crime, levels of deception, dynamics of the crime and type of sexual behaviour carried out
Wolak et al.[26]Law enforcement officers were interviewed using a computer-assisted telephone system following completion of a mail survey. Officers also provided a crime narrative. The overall aim of the study was to examine whether online groomers are a distinct offender group.Chi-square cross-tabulation analysis was carried out to compare online-meeting and known-in-person cases. STATA SE11 survey data analysis procedures were employed to consider selection probability variations.

Note. – denotes data not applicable.

Inclusion and Exclusion Criteria for Study Selection. Studies that investigate the strategies of individuals who use the internet to sexually abuse minors. offline sexual offending only child pornography use as a definition of ‘fantasy’ offending the sexual abuse of victims over 18 years of age offenders under 18 years of age Studies in which contact and fantasy driven behaviour were identifiable Studies exploring crime characteristics or grooming strategies of individuals who use the internet to sexually abuse minors Primary studies to include cohort, case-control, cross-sectional or case series studies PICO Formulation of Study Appraisal [2]. Study Characteristics of Included Studies. Note. Mixed typology refers to studies that report results for both contact and fantasy driven individuals. # Data not identifiable. Refers to those individuals who received a sexual picture (N=38) and engaged in cybersex (N = 28), Refers to those who met offline (N = 45) and engaged in offline sexual contact (N = 23). Includes cybersex and cybersex/schedulers. Represents individuals who engaged in cautious, more restrained exchanges (3) and educational exchanges (2). Refers to those who aim to reach short term sexual gratification (8) and long-term procurement (2). Signifies those individuals charged for exposing a child to indecent materials. Refers to individuals who procured a child online for sexual purposes. Represents traveling cases, including individuals who met victims online and travelled for intent of sexual contact. Includes individuals who committed a no contact offence. Includes contact offences (fondling, inappropriate touching (6), oral sex (10), intercourse (57) and sexual violence (2)). Methodology of included studies. Note. – denotes data not applicable.

Experimental design, materials and methods

The process of study selection is defined in Table 1. The criteria were used to assess articles captured by the systematic search strategy in Broome et al. [1]. Studies included in Broome et al. [1] were appraised in consideration of the Population, Interest, Comparisons and Outcomes (PICO) formulation [2], and against an order of hierarchy regarding study methodology (Table 2). Data extraction was founded upon PRISMA guidelines [3] and piloted on a small sample of studies (n = 5). Table 3 presents the Study Characteristics of included studies, to include Typology (contact, fantasy or mixed (i.e. both fantasy and contact behaviour)), Offender Age, Offender Gender, Decoy Victim, Perceived age of Victim, Victim Gender, Country of Data Source, Number of Fantasy Individuals, Number of Contact Individuals and Outcomes. Quantitative and Qualitative Methodological approaches for reviewed studies are presented in Table 4. Study Quality and Methodological appraisal is considered in Broome et al. [1].
Subject areaPsychology
More specific subject areaForensic Behaviour
Type of dataDescriptive Tables
How data was acquiredData extraction from studies included in Broome et al.[1]
Data formatDescriptive
Experimental factors
Experimental featuresData represents findings from a narrative review
Data source locationReviewed studies collect data primarily from America, UK and Australia. It is not possible to determine specific states
Data accessibilityWithin this article
  11 in total

1.  A linguistic analysis of grooming strategies of online child sex offenders: Implications for our understanding of predatory sexual behavior in an increasingly computer-mediated world.

Authors:  Pamela J Black; Melissa Wollis; Michael Woodworth; Jeffrey T Hancock
Journal:  Child Abuse Negl       Date:  2015-01-19

2.  Behavioural Differences Between Online Sexual Groomers Approaching Boys and Girls.

Authors:  Evianne L van Gijn-Grosvenor; Michael E Lamb
Journal:  J Child Sex Abus       Date:  2016-07

3.  A systematic review of fantasy driven vs. contact driven internet-initiated sexual offences: Discrete or overlapping typologies?

Authors:  Laura Jayne Broome; Cristina Izura; Nuria Lorenzo-Dus
Journal:  Child Abuse Negl       Date:  2018-03-20

4.  Evidence Searching for Evidence-based Psychology Practice.

Authors:  Louise Falzon; Karina W Davidson; Daniel Bruns
Journal:  Prof Psychol Res Pr       Date:  2010-12

5.  An exploratory study of Internet-initiated sexual offenses and the chat room sex offender: has the Internet enabled a new typology of sex offender?

Authors:  Peter Briggs; Walter T Simon; Stacy Simonsen
Journal:  Sex Abuse       Date:  2010-10-14

6.  Internet-initiated sex crimes against minors: implications for prevention based on findings from a national study.

Authors:  Janis Wolak; David Finkelhor; Kimberly Mitchell
Journal:  J Adolesc Health       Date:  2004-11       Impact factor: 5.012

7.  Predatory online behavior: modus operandi of convicted sex offenders in identifying potential victims and contacting minors over the internet.

Authors:  L Alvin Malesky
Journal:  J Child Sex Abus       Date:  2007

8.  Interpreting the intentions of internet predators:an examination of online predatory behavior.

Authors:  Catherine D Marcum
Journal:  J Child Sex Abus       Date:  2007

9.  Are crimes by online predators different from crimes by sex offenders who know youth in-person?

Authors:  Janis Wolak; David Finkelhor
Journal:  J Adolesc Health       Date:  2013-07-26       Impact factor: 5.012

10.  A Qualitative Analysis of Offenders' Modus Operandi in Sexually Exploitative Interactions With Children Online.

Authors:  Juliane A Kloess; Sarah Seymour-Smith; Catherine E Hamilton-Giachritsis; Matthew L Long; David Shipley; Anthony R Beech
Journal:  Sex Abuse       Date:  2015-11-10
View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.