深入研究美国童子军 "变态 "档案:与获取和滥用有关的结构性因素。

IF 2.6 3区 心理学 Q1 CRIMINOLOGY & PENOLOGY Journal of Interpersonal Violence Pub Date : 2024-08-01 Epub Date: 2024-02-29 DOI:10.1177/08862605241230091
Mitchell B Mackinem, Deborah Laufersweiler-Dwyer
{"title":"深入研究美国童子军 \"变态 \"档案:与获取和滥用有关的结构性因素。","authors":"Mitchell B Mackinem, Deborah Laufersweiler-Dwyer","doi":"10.1177/08862605241230091","DOIUrl":null,"url":null,"abstract":"<p><p>The Boy Scouts of America's (BSA's) Ineligible Volunteer (IV) files, commonly called the \"perversion files,\" is a unique data set allowing researchers to examine organizational characteristics that allow for child sexual victimization. Despite the uniqueness of this data set, few researchers have examined it. The researchers examined a random sample of cases from the IV files of scout leaders who molested scouts. A situational crime theoretical model was employed as had been used in studies on the Catholic Church sexual abuse scandal, proving effective. The researchers examined randomly selected from 1980 to 1999. Of initially examined 400 randomly selected cases, only 140 held retrievable data. The majority of the 140 cases did not have scouting victims, which resulted in a reduction to 48 cases. Beyond the several scouting forms, many files contained public domain information, including newspaper articles, police reports, criminal justice records, and/or records of civil litigation. Through both the scouting documents and the public domain records, the researchers identified six BSA-specific characteristics that allowed motivated adult leaders to molest their victims. These characteristics included (a) weak or inefficient incident reporting system, (b) failure to collect and review pertinent information, (c) organizationally legitimate reasons for one-on-one contact, (d) volunteer imbalance, (e) legitimate reasons for separation from protective adults, and (f) social status as a prophylactic defense. These structural characteristics are explored through descriptive statistics and specific case studies illustrating the phenomena. When the history of the IV files came to light through litigation, the BSA was forced to reconcile its past actions and develop new preventive measures. The Boy Scouts of America implemented various actions to protect the youth. Many of these protections specifically address structural characteristics.</p>","PeriodicalId":16289,"journal":{"name":"Journal of Interpersonal Violence","volume":null,"pages":null},"PeriodicalIF":2.6000,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Deeper Look at the Boy Scouts of America \\\"Perversion\\\" Files: Structural Factors Related to Access and Abuse.\",\"authors\":\"Mitchell B Mackinem, Deborah Laufersweiler-Dwyer\",\"doi\":\"10.1177/08862605241230091\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p><p>The Boy Scouts of America's (BSA's) Ineligible Volunteer (IV) files, commonly called the \\\"perversion files,\\\" is a unique data set allowing researchers to examine organizational characteristics that allow for child sexual victimization. Despite the uniqueness of this data set, few researchers have examined it. The researchers examined a random sample of cases from the IV files of scout leaders who molested scouts. A situational crime theoretical model was employed as had been used in studies on the Catholic Church sexual abuse scandal, proving effective. The researchers examined randomly selected from 1980 to 1999. Of initially examined 400 randomly selected cases, only 140 held retrievable data. The majority of the 140 cases did not have scouting victims, which resulted in a reduction to 48 cases. Beyond the several scouting forms, many files contained public domain information, including newspaper articles, police reports, criminal justice records, and/or records of civil litigation. Through both the scouting documents and the public domain records, the researchers identified six BSA-specific characteristics that allowed motivated adult leaders to molest their victims. These characteristics included (a) weak or inefficient incident reporting system, (b) failure to collect and review pertinent information, (c) organizationally legitimate reasons for one-on-one contact, (d) volunteer imbalance, (e) legitimate reasons for separation from protective adults, and (f) social status as a prophylactic defense. These structural characteristics are explored through descriptive statistics and specific case studies illustrating the phenomena. When the history of the IV files came to light through litigation, the BSA was forced to reconcile its past actions and develop new preventive measures. The Boy Scouts of America implemented various actions to protect the youth. Many of these protections specifically address structural characteristics.</p>\",\"PeriodicalId\":16289,\"journal\":{\"name\":\"Journal of Interpersonal Violence\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":2.6000,\"publicationDate\":\"2024-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Interpersonal Violence\",\"FirstCategoryId\":\"102\",\"ListUrlMain\":\"https://doi.org/10.1177/08862605241230091\",\"RegionNum\":3,\"RegionCategory\":\"心理学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"2024/2/29 0:00:00\",\"PubModel\":\"Epub\",\"JCR\":\"Q1\",\"JCRName\":\"CRIMINOLOGY & PENOLOGY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Interpersonal Violence","FirstCategoryId":"102","ListUrlMain":"https://doi.org/10.1177/08862605241230091","RegionNum":3,"RegionCategory":"心理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2024/2/29 0:00:00","PubModel":"Epub","JCR":"Q1","JCRName":"CRIMINOLOGY & PENOLOGY","Score":null,"Total":0}
引用次数: 0

摘要

美国童子军(BSA)的不合格志愿者(IV)档案,通常被称为 "变态档案",是一个独特的数据集,允许研究人员研究导致儿童性侵害的组织特征。尽管该数据集独一无二,但很少有研究人员对其进行过研究。研究人员从童子军领袖猥亵童子军的 IV 档案中随机抽取了一些案例进行研究。研究人员采用了情境犯罪理论模型,该模型曾在天主教会性虐待丑闻研究中使用过,并证明行之有效。研究人员随机选取了 1980 年至 1999 年期间的案例进行研究。在最初研究的 400 个随机选取的案例中,只有 140 个拥有可检索的数据。在这 140 个案例中,大部分都没有受害者侦察表,因此被减少到 48 个案例。除了几份侦察表格外,许多档案还包含公共领域的信息,包括报纸文章、警方报告、刑事司法记录和/或民事诉讼记录。通过童子军文件和公共领域的记录,研究人员发现了六种 BSA 特有的特征,这些特征使得有动机的成年领袖得以猥亵受害者。这些特征包括:(a) 薄弱或低效的事件报告系统,(b) 未能收集和审查相关信息,(c) 一对一接触的组织合法理由,(d) 志愿者失衡,(e) 与保护性成人分离的合法理由,以及 (f) 将社会地位作为预防性辩护。我们将通过描述性统计和具体的案例研究来探讨这些结构性特征。当 IV 档案的历史通过诉讼曝光后,美国童子军协会不得不对其过去的行为进行调和,并制定新的预防措施。美国童子军采取了各种行动来保护青少年。其中许多保护措施专门针对结构性特征。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Deeper Look at the Boy Scouts of America "Perversion" Files: Structural Factors Related to Access and Abuse.

The Boy Scouts of America's (BSA's) Ineligible Volunteer (IV) files, commonly called the "perversion files," is a unique data set allowing researchers to examine organizational characteristics that allow for child sexual victimization. Despite the uniqueness of this data set, few researchers have examined it. The researchers examined a random sample of cases from the IV files of scout leaders who molested scouts. A situational crime theoretical model was employed as had been used in studies on the Catholic Church sexual abuse scandal, proving effective. The researchers examined randomly selected from 1980 to 1999. Of initially examined 400 randomly selected cases, only 140 held retrievable data. The majority of the 140 cases did not have scouting victims, which resulted in a reduction to 48 cases. Beyond the several scouting forms, many files contained public domain information, including newspaper articles, police reports, criminal justice records, and/or records of civil litigation. Through both the scouting documents and the public domain records, the researchers identified six BSA-specific characteristics that allowed motivated adult leaders to molest their victims. These characteristics included (a) weak or inefficient incident reporting system, (b) failure to collect and review pertinent information, (c) organizationally legitimate reasons for one-on-one contact, (d) volunteer imbalance, (e) legitimate reasons for separation from protective adults, and (f) social status as a prophylactic defense. These structural characteristics are explored through descriptive statistics and specific case studies illustrating the phenomena. When the history of the IV files came to light through litigation, the BSA was forced to reconcile its past actions and develop new preventive measures. The Boy Scouts of America implemented various actions to protect the youth. Many of these protections specifically address structural characteristics.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
6.20
自引率
12.00%
发文量
375
期刊介绍: The Journal of Interpersonal Violence is devoted to the study and treatment of victims and perpetrators of interpersonal violence. It provides a forum of discussion of the concerns and activities of professionals and researchers working in domestic violence, child sexual abuse, rape and sexual assault, physical child abuse, and violent crime. With its dual focus on victims and victimizers, the journal will publish material that addresses the causes, effects, treatment, and prevention of all types of violence. JIV only publishes reports on individual studies in which the scientific method is applied to the study of some aspect of interpersonal violence. Research may use qualitative or quantitative methods. JIV does not publish reviews of research, individual case studies, or the conceptual analysis of some aspect of interpersonal violence. Outcome data for program or intervention evaluations must include a comparison or control group.
期刊最新文献
Lifetime Abuse: Theoretical and Empirical Research. Interpersonal Violence Against Indigenous Sámi and Non-Sámi Populations in Arctic Sweden and the Mediating Effect of Historical Losses and Discrimination. Rethinking Lifetime Abuse in Old Age. Childhood Maltreatment, Revictimization, and Partner Violence Victimization Through Midlife: A Prospective Longitudinal Investigation. Trauma Theory and Abuse, Neglect and Violence Across the Life Course.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1