3 resultados para Child sexual abuse - Psychological aspects

em Aston University Research Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis is organised into four parts. In Part 1 relevant literature is reviewed and presented in three chapters. Chapter 1 examines legal and cultural factors in identifying the. boundaries of rape. Chapter 2 discusses idiographic features· and causal characteristics of rape suspects and victims. Chapter 3 reviews the evidence relating to attitudes toward rape,. attribution of responsibility to victims and the routine management of rape cases by the police. Part II comprises an experimental investigation of observer perception of the victims of violent crime. The experiment, examined the processes by which impressions were attributed to victims of personal crime. The results suggested that discrepancies from observers' stereotypes were an important factor in their polarisation of victim ratings. The relevance of. examining . both the structure and process of' impression, formation was highlighted. Part III describes an extensive field study in which the West. Midlands police files on rape for an eight year period (1071-1978) were analysed. The study revealed a large number of interesting findings related to a wide range of relevant features of the crime. Further, the impact .of common misconceptions and "myths" of rape were investigated across the legal and judicial processing of rape cases. The evidence suggests that these "myths" lead·to differential biasing effects at different stages in the process. In the final part of this thesis,. salient issues raised by the experiment and field study .are discussed·within the framework outlined in Part 1. Potential implications for future developments and research: are presented.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Internet poses a number of threats to the safety of young people. Using numerous examples, this article discusses a wide range of such threats, including: cyberstalking; the 'grooming' of potential victims of sexual abuse; a new 'wish list' scene (where teenagers encourage contact with potential abusers); the creation and distribution of child pornography; and the emergence of services that create child pornography to order. It is suggested that the latter has provided individuals with the ability to inflict sexual abuse on young people from a distance, an act the authors have termed virtual sex tourism. The final section of the article suggests that paedophiles and pornographers have been quick to adopt new technology as a means of concealing their activities. The article concludes by warning of the danger of overestimating or underestimating the threats described.