Caitlin Clemmow, Nicola Fowler, Amber Seaward, Paul Gill
Best practice in violent extremist risk assessment and management recommends adopting a Structured Professional Judgement (SPJ) approach. The SPJ approach identifies relevant, evidence-based risk and protective factors and requires experts to articulate hypotheses about a) what the person might do (risk of what), and b) how they've come to engage in the concerning behaviour (and why) (Logan 2021) to inform who, needs to do what, and when. Whilst the field continues to move towards adopting an SPJ approach, there remains a gap between what is known empirically and what is needed in practice. We apply psychometric network modelling to a sample of 485 individuals entered into Channel, the UK's preventing and countering violent extremism (P/CVE) program. We model the system of interactions from which susceptibility to violent extremism emerges, providing data driven evidence which speaks to risk of what and why. Our research highlights a way to generate evidence which captures the multifactorial nature of susceptibility to violent extremism, to support professional decision making in the context of an SPJ approach.
{"title":"Risk of What and Why? Disaggregating Pathways to Extremist Behaviours in Individuals Susceptible to Violent Extremism.","authors":"Caitlin Clemmow, Nicola Fowler, Amber Seaward, Paul Gill","doi":"10.1002/bsl.2710","DOIUrl":"https://doi.org/10.1002/bsl.2710","url":null,"abstract":"<p><p>Best practice in violent extremist risk assessment and management recommends adopting a Structured Professional Judgement (SPJ) approach. The SPJ approach identifies relevant, evidence-based risk and protective factors and requires experts to articulate hypotheses about a) what the person might do (risk of what), and b) how they've come to engage in the concerning behaviour (and why) (Logan 2021) to inform who, needs to do what, and when. Whilst the field continues to move towards adopting an SPJ approach, there remains a gap between what is known empirically and what is needed in practice. We apply psychometric network modelling to a sample of 485 individuals entered into Channel, the UK's preventing and countering violent extremism (P/CVE) program. We model the system of interactions from which susceptibility to violent extremism emerges, providing data driven evidence which speaks to risk of what and why. Our research highlights a way to generate evidence which captures the multifactorial nature of susceptibility to violent extremism, to support professional decision making in the context of an SPJ approach.</p>","PeriodicalId":47926,"journal":{"name":"Behavioral Sciences & the Law","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142796078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Heng Choon Oliver Chan, Matt DeLisi, Timothy G Edgemon
Research on sexual homicides has primarily focused on male offenders, and thus little is known about female offenders who perpetrated sexual homicides. This study aimed to develop the first statistical classification of female single-victim (SV) sexual homicide offenders (SHOs) using the U.S. FBI's Supplementary Homicide Reports database that spanned over a 47-year period (1976-2022). A latent class analysis (LCA) was computed to detect subtypes of female SHOs in a sample of 158 offenders. Findings of the LCA identified two unique classes of female SHOs exist within the data: White intra-familial offenders and Black extra-familial offenders. The distinguishing features of these two classes were the offender's racial group, the victim's age and racial groups, the offender-victim relationship, the geographical urbanness level of crime location, and weapon use. This empirically-derived offender classification can be informative to law enforcement agents and security professionals in their investigative strategies.
{"title":"Classifying Female Sexual Homicide Offenders: A Latent Class Analysis of Murder Arrestees in the U.S.","authors":"Heng Choon Oliver Chan, Matt DeLisi, Timothy G Edgemon","doi":"10.1002/bsl.2709","DOIUrl":"https://doi.org/10.1002/bsl.2709","url":null,"abstract":"<p><p>Research on sexual homicides has primarily focused on male offenders, and thus little is known about female offenders who perpetrated sexual homicides. This study aimed to develop the first statistical classification of female single-victim (SV) sexual homicide offenders (SHOs) using the U.S. FBI's Supplementary Homicide Reports database that spanned over a 47-year period (1976-2022). A latent class analysis (LCA) was computed to detect subtypes of female SHOs in a sample of 158 offenders. Findings of the LCA identified two unique classes of female SHOs exist within the data: White intra-familial offenders and Black extra-familial offenders. The distinguishing features of these two classes were the offender's racial group, the victim's age and racial groups, the offender-victim relationship, the geographical urbanness level of crime location, and weapon use. This empirically-derived offender classification can be informative to law enforcement agents and security professionals in their investigative strategies.</p>","PeriodicalId":47926,"journal":{"name":"Behavioral Sciences & the Law","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142795973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Victims of sexual homicide may be deceived by perpetrators who use a friendly approach to gain access to them, making it difficult for the victim to assess the danger posed by the stranger. When investigating sexual homicides committed by strangers, investigators often lack direct information, including how the perpetrator gained access to the victim. To identify potential predictors of the approach method used in sexual homicides, this study analyzed the preferences and behaviors of sexual murderers who target strangers based on their approach method. The results of the logistic regression analysis showed that in comparison to offenders using "blitz" or "surprise" attacks, those using a deceptive "con" approach tended to have more male victims, exploit vulnerability, and exhibit post-crime organization by relocating the victim's body and successfully disposing of the weapon used in the crime. Their crimes also more frequently involved oral sex and had lower rates of victim beating. This study discusses the investigative implications of these findings.
{"title":"Stranger Danger: Analyzing Offender Behaviors Based on Victim Approach Tactics in Sexual Homicide.","authors":"Zena Rossouw, Eric Beauregard, Julien Chopin","doi":"10.1002/bsl.2708","DOIUrl":"https://doi.org/10.1002/bsl.2708","url":null,"abstract":"<p><p>Victims of sexual homicide may be deceived by perpetrators who use a friendly approach to gain access to them, making it difficult for the victim to assess the danger posed by the stranger. When investigating sexual homicides committed by strangers, investigators often lack direct information, including how the perpetrator gained access to the victim. To identify potential predictors of the approach method used in sexual homicides, this study analyzed the preferences and behaviors of sexual murderers who target strangers based on their approach method. The results of the logistic regression analysis showed that in comparison to offenders using \"blitz\" or \"surprise\" attacks, those using a deceptive \"con\" approach tended to have more male victims, exploit vulnerability, and exhibit post-crime organization by relocating the victim's body and successfully disposing of the weapon used in the crime. Their crimes also more frequently involved oral sex and had lower rates of victim beating. This study discusses the investigative implications of these findings.</p>","PeriodicalId":47926,"journal":{"name":"Behavioral Sciences & the Law","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142792555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Confessions are an important evidentiary part of the legal process, and false confessions have been notable contributors to wrongful convictions. However, academic research in the psychology and law field primarily relies on student or volunteer samples in staged exercises, methodological features that lack ecological validity for replicating police interrogation or the pressures distinctive to high stakes crime investigations. Here, we provide an integrative review of research and data on false confessions during police interrogations with distinctions of key concepts, relevant case law pertaining to confessions including several U.S. Supreme Court decisions, updating the typology of false confessions, the quantification of false confessions, risk factors for false confessions, interrogation risk factors for false confessions, validity threats to false confessions research, and recommended directions for informing courts and the law.
{"title":"False Confessions: An Integrative Review of the Phenomenon.","authors":"Michael Welner, Matt DeLisi, Theresa Janusewski","doi":"10.1002/bsl.2707","DOIUrl":"https://doi.org/10.1002/bsl.2707","url":null,"abstract":"<p><p>Confessions are an important evidentiary part of the legal process, and false confessions have been notable contributors to wrongful convictions. However, academic research in the psychology and law field primarily relies on student or volunteer samples in staged exercises, methodological features that lack ecological validity for replicating police interrogation or the pressures distinctive to high stakes crime investigations. Here, we provide an integrative review of research and data on false confessions during police interrogations with distinctions of key concepts, relevant case law pertaining to confessions including several U.S. Supreme Court decisions, updating the typology of false confessions, the quantification of false confessions, risk factors for false confessions, interrogation risk factors for false confessions, validity threats to false confessions research, and recommended directions for informing courts and the law.</p>","PeriodicalId":47926,"journal":{"name":"Behavioral Sciences & the Law","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142781379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Erika Fortunato, Reneta Slikboer, Marie Henshaw, Denny Meyer, James R P Ogloff
Despite increases in online child sexual exploitation (OCSE) internationally, no study has examined risk factors for re-offending among females who perpetrate OCSE, resulting in limited knowledge regarding the idiosyncratic needs of this cohort. This study explored factors predictive of further police contact among 116 females known to police for OCSE offenses in Victoria, Australia. Four binary regressions were run for each of Any, Violent, and Non-Violent re-offending, with one regression each focusing on characteristics related to offending history, index offending, co-offending, and victimization. Predicted probabilities from each model were then input as predictors into a final binary regression for each recidivism type. Offending history emerged as the most robust predictor across re-offending types, even when controlling for other domains. Victimization and index offending also predicted Non-Violent re-offending, while co-offending was not predictive across any analysis. These preliminary findings have implications for the unique management needs of females who perpetrate OCSE.
{"title":"An Exploration of Risk Factors for Further Police Contact Among Females Known for Online Child Sexual Exploitation Offenses.","authors":"Erika Fortunato, Reneta Slikboer, Marie Henshaw, Denny Meyer, James R P Ogloff","doi":"10.1002/bsl.2703","DOIUrl":"https://doi.org/10.1002/bsl.2703","url":null,"abstract":"<p><p>Despite increases in online child sexual exploitation (OCSE) internationally, no study has examined risk factors for re-offending among females who perpetrate OCSE, resulting in limited knowledge regarding the idiosyncratic needs of this cohort. This study explored factors predictive of further police contact among 116 females known to police for OCSE offenses in Victoria, Australia. Four binary regressions were run for each of Any, Violent, and Non-Violent re-offending, with one regression each focusing on characteristics related to offending history, index offending, co-offending, and victimization. Predicted probabilities from each model were then input as predictors into a final binary regression for each recidivism type. Offending history emerged as the most robust predictor across re-offending types, even when controlling for other domains. Victimization and index offending also predicted Non-Violent re-offending, while co-offending was not predictive across any analysis. These preliminary findings have implications for the unique management needs of females who perpetrate OCSE.</p>","PeriodicalId":47926,"journal":{"name":"Behavioral Sciences & the Law","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142773476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
School violence and bullying, cyberbullying, and cyber-deviance have become subject matters of great concern for various disciplines, such as social work, criminology, psychology, education, medicine, public health, and nursing. In the past years, scholars in different countries have adopted the theoretical perspectives developed in their respective disciplines to separately examine issues of school violence and bullying, cyberbullying, and cyber deviance. For example, researchers in the field of social sciences tend to adopt psychosocial theories and perspectives, while public health scholars tend to adopt medical- or health-related theories. There is a call for the international and interdisciplinary perspectives to examine these topics and their potential interconnectedness. There is also an urgent need to systematic strategies, policies, and intervention to tackle school violence and bullying, cyberbullying, and cyber deviance. The purpose of this special issue is to deepen our understanding of issues related to school violence and bullying, cyberbullying, and cyber-deviance, to expand our cross-disciplinary and integrated perspectives on these topics, and to provide potential legal strategies, policy, and intervention to tackle these social problems.
{"title":"International and Interdisciplinary Perspectives on School Violence and Bullying, Cyberbullying, and Cyber Deviance: An Introductory Essay.","authors":"Ji-Kang Chen, Heng Choon Oliver Chan","doi":"10.1002/bsl.2704","DOIUrl":"https://doi.org/10.1002/bsl.2704","url":null,"abstract":"<p><p>School violence and bullying, cyberbullying, and cyber-deviance have become subject matters of great concern for various disciplines, such as social work, criminology, psychology, education, medicine, public health, and nursing. In the past years, scholars in different countries have adopted the theoretical perspectives developed in their respective disciplines to separately examine issues of school violence and bullying, cyberbullying, and cyber deviance. For example, researchers in the field of social sciences tend to adopt psychosocial theories and perspectives, while public health scholars tend to adopt medical- or health-related theories. There is a call for the international and interdisciplinary perspectives to examine these topics and their potential interconnectedness. There is also an urgent need to systematic strategies, policies, and intervention to tackle school violence and bullying, cyberbullying, and cyber deviance. The purpose of this special issue is to deepen our understanding of issues related to school violence and bullying, cyberbullying, and cyber-deviance, to expand our cross-disciplinary and integrated perspectives on these topics, and to provide potential legal strategies, policy, and intervention to tackle these social problems.</p>","PeriodicalId":47926,"journal":{"name":"Behavioral Sciences & the Law","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142773477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The purpose of this study was to develop and validate a new measurement tool designed to capture endorsement of myths surrounding female perpetrated sexual violence against men, specifically in ‘forced-to-penetrate’ cases. Data were collected among a sample of 4152 UK adults aged 18–55+ (52% female). Dimensionality and construct validity of the Forced-to-Penetrate Myth Acceptance Scale (FTP-MAS) was investigated using traditional Confirmatory Factor Analysis (CFA) techniques separately for the complete sample, males only, and females only. CFA results indicated that FTP-MAS scores are best captured by a three-factor model (1. Distorted Sex and Gender Roles; 2. Harm Minimisation; 3. Offence Denial) across all samples tested. Excellent composite reliability and differential predictive validity were observed for all three subscales. The validated 22-item FTP-MAS constitutes the first measurement tool which allows for the assessment and evaluation of public attitudes towards female perpetrators who force men to penetrate them without consent. As such, this tool enables researchers to better understand the multi-faceted nature of these myths, assess prevalence in different contexts, and can also be used as an outcome measure in research seeking to evaluate the effectiveness of interventions that aim to debunk endorsement of such myths and stereotypes.
{"title":"The Forced-To-Penetrate Myth Acceptance Scale (FTP-MAS): A New Attitudinal Tool for Assessing Myths That Surround Female Perpetrated Sexual Violence Against Men","authors":"Siobhan Weare, Dominic Willmott","doi":"10.1002/bsl.2706","DOIUrl":"10.1002/bsl.2706","url":null,"abstract":"<p>The purpose of this study was to develop and validate a new measurement tool designed to capture endorsement of myths surrounding female perpetrated sexual violence against men, specifically in ‘forced-to-penetrate’ cases. Data were collected among a sample of 4152 UK adults aged 18–55+ (52% female). Dimensionality and construct validity of the Forced-to-Penetrate Myth Acceptance Scale (FTP-MAS) was investigated using traditional Confirmatory Factor Analysis (CFA) techniques separately for the complete sample, males only, and females only. CFA results indicated that FTP-MAS scores are best captured by a three-factor model (1. Distorted Sex and Gender Roles; 2. Harm Minimisation; 3. Offence Denial) across all samples tested. Excellent composite reliability and differential predictive validity were observed for all three subscales. The validated 22-item FTP-MAS constitutes the first measurement tool which allows for the assessment and evaluation of public attitudes towards female perpetrators who force men to penetrate them without consent. As such, this tool enables researchers to better understand the multi-faceted nature of these myths, assess prevalence in different contexts, and can also be used as an outcome measure in research seeking to evaluate the effectiveness of interventions that aim to debunk endorsement of such myths and stereotypes.</p>","PeriodicalId":47926,"journal":{"name":"Behavioral Sciences & the Law","volume":"43 1","pages":"158-168"},"PeriodicalIF":1.0,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11771554/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142773482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}