Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders

Objective This research uses crime scripts to understand adult retribution-style image-based sexual abuse (RS-IBSA) offender decision-making and offending in offline and online environments. We explain the crime-commission process of adult RS-IBSA and identify crime intervention points at eight crime script stages. Methods Publicly released court transcripts of adult RS-IBSA prosecution cases (n = 18) in New Zealand from 2015 to 2018 were utilised to examine the crime-commission process of adult RS-IBSA. We analysed the court transcripts thematically at offence-level prior to constructing the crime scripts. Findings The study identified four types of adult RS-IBSA acts including the non-consensual dissemination of a victim’s intimate images, violent cyber sextortion, covert intimate photography, and unauthorised access of a victim’s phone/media. From our analysis, we identified three script tracks and constructed three distinct crime scripts: (1) threats, sextortion and dissemination; (2) unauthorised access of a victim’s mobile device and dissemination; and (3) covert intimate filming. We highlight areas for potential intervention for law enforcement agencies and policy makers to increase deterrence and personal security in online and offline spaces. Conclusion Adult RS-IBSA occurs in a range of dating and domestic contexts. This study develops crime scripts for adult RS-IBSA and advances our understanding of how the Internet/smartphones/digital media translates into virtual crime scenes with opportunities for maximum harm infliction. We offer several policy implications including revising current RS-IBSA legislation and supporting law enforcement agencies with policing online and offline intimate relationship spaces through situational prevention.

[1]  K. J. Craik,et al.  The nature of explanation , 1944 .

[2]  R. Abelson Script processing in attitude formation and decision making. , 1976 .

[3]  Roger C. Schank,et al.  Scripts, plans, goals and understanding: an inquiry into human knowledge structures , 1978 .

[4]  D. Walsh Shoplifting: Controlling a Major Crime , 1978 .

[5]  Patricia L. Brantingham,et al.  A Topological Technique for Regionalization , 1978 .

[6]  R. Abelson Psychological status of the script concept. , 1981 .

[7]  Crime control in Britain : a review of policy research , 1985 .

[8]  R. Clarke,et al.  Modeling Offenders' Decisions: A Framework for Research and Policy , 1985, Crime and Justice.

[9]  R. Clarke,et al.  UNDERSTANDING CRIME DISPLACEMENT: AN APPLICATION OF RATIONAL CHOICE THEORY , 1987 .

[10]  G. Gudjonsson The reasoning criminal. Rational choice perspectives on offending : D.B. Cornish and R.V. Clarke (eds): Springer Verlag, Berlin (1986). Pages xiv-246. DM 98 , 1988 .

[11]  D. Cornish THE PROCEDURAL ANALYSIS OF OFFENDING AND ITS RELEVANCE FOR SITUATIONAL PREVENTION , 1994 .

[12]  P. Tremblay,et al.  Body Switching and Related Adaptations in the Resale of Stolen Vehicles. Script Elaborations and Aggregate Crime Learning Curves , 2001 .

[13]  Ronnie Cohen,et al.  Internet Law and Policy , 2002 .

[14]  D. Cornish OPPORTUNITIES, PRECIPITATORS AND CRIMINAL DECISIONS: A REPLY TO WORTLEY'S CRITIQUE OF SITUATIONAL CRIME PREVENTION , 2003 .

[15]  Hilde van der Togt,et al.  Publisher's Note , 2003, J. Netw. Comput. Appl..

[16]  Ronald V. Clarke,et al.  Become a Problem-Solving Crime Analyst , 2003 .

[17]  Zhao Yuxin On Computer Crimes , 2004 .

[18]  T. Flew Internet Law and Policy , 2005 .

[19]  M. Yar The Novelty of ‘Cybercrime’ , 2005 .

[20]  Werner J. Einstadter,et al.  Criminological Theory: An Analysis of its Underlying Assumptions , 2006 .

[21]  C. Nee,et al.  Expert Decision Making in Burglars , 2006 .

[22]  Eric Beauregard,et al.  Script Analysis of the Hunting Process of Serial Sex Offenders , 2007 .

[23]  Michael L. Pittaro Cyber stalking: An Analysis of Online Harassment and Intimidation , 2007 .

[24]  A. Sidebottom,et al.  What Do You Mean, ‘Is It Secure?’ Redesigning Language to be Fit for the Task of Assessing the Security of Domestic and Personal Electronic Goods , 2007 .

[25]  Richard Keith Wortley,et al.  Environmental criminology and crime analysis , 2008 .

[26]  L. Porter,et al.  Using archival data and multidimensional scaling to explore leadership: Examples from group crime , 2008 .

[27]  J. B. Kelly,et al.  DIFFERENTIATION AMONG TYPES OF INTIMATE PARTNER VIOLENCE: RESEARCH UPDATE AND IMPLICATIONS FOR INTERVENTIONS , 2008 .

[28]  Mikko T. Siponen,et al.  Overcoming the insider: reducing employee computer crime through Situational Crime Prevention , 2009, CACM.

[29]  Nadine Deslauriers-Varin,et al.  Victims’ Routine Activities and Sex Offenders’ Target Selection Scripts: A Latent Class Analysis , 2010, Sexual abuse : a journal of research and treatment.

[30]  R. Wortley,et al.  Investigating mobility patterns for repetitive sexual contact in adult child sex offending , 2010 .

[31]  C. Draucker,et al.  The role of electronic communication technology in adolescent dating violence. , 2010, Journal of child and adolescent psychiatric nursing : official publication of the Association of Child and Adolescent Psychiatric Nurses, Inc.

[32]  Lisa A. Melander College Students' Perceptions of Intimate Partner Cyber Harassment , 2010, Cyberpsychology Behav. Soc. Netw..

[33]  A. Powell Configuring Consent: Emerging Technologies, Unauthorized Sexual Images and Sexual Assault , 2010 .

[34]  G. Laycock,et al.  The Value of Crime Scripting: Deconstructing Internal Child Sex Trafficking , 2011 .

[35]  S. Chainey,et al.  Profiling Illegal Waste Activity: Using Crime Scripts as a Data Collection and Analytical Strategy , 2011 .

[36]  Richard Keith Wortley,et al.  Getting into the Script of Adult Child Sex Offenders and Mapping out Situational Prevention Measures , 2011 .

[37]  M. Townsley,et al.  Crime Script Analysis of Drug Manufacturing In Clandestine Laboratories Implications for Prevention , 2011 .

[38]  K. Crawford,et al.  Sexting, consent and young people's ethics: Beyond Megan's Story , 2012 .

[39]  M. Felson Routine activity approach , 2013 .

[40]  R Wortley,et al.  Rational choice and offender decision making: lessons from the cognitive sciences , 2013 .

[41]  Michelle Drouin,et al.  Let's talk about sexting, baby: Computer-mediated sexual behaviors among young adults , 2013, Comput. Hum. Behav..

[42]  A. Slane Sexting and the law in Canada , 2013 .

[43]  Hervé Borrion Quality assurance in crime scripting , 2013 .

[44]  R. Wortley,et al.  Cognition and crime: Offender decision-making and script analyses. , 2013 .

[45]  P. Ornstein,et al.  When Does Intimate Partner Violence Continue After Separation? , 2013, Violence against women.

[46]  M. D. Vries From the Instrument of Delivery to the Actual Agent of Harm: Fighting the Criminal Purchase of Ammunition , 2013 .

[47]  R. Wortley,et al.  The Reasoning Criminal: twenty-five years on , 2013 .

[48]  R. Clarke,et al.  The Rational Choice Perspective 1 , 2013 .

[49]  B. Fileborn,et al.  The role of emerging communication technologies in experiences of sexual violence: A new legal frontier? , 2013 .

[50]  Benoit Leclerc New developments in script analysis for situational crime prevention: Moving beyond offender scripts , 2013 .

[51]  A. Lavorgna Transit crimes in the Internet age: How new online criminal opportunities affect the organization of offline transit crimes , 2013 .

[52]  Gisela Bichler,et al.  Bad actors and faulty props: unlocking legal and illicit art trade , 2013 .

[53]  Eric Beauregard,et al.  Where and when? Examining spatiotemporal aspects of sexual assault events , 2013 .

[54]  Kim-Kwang Raymond Choo,et al.  Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users , 2014, Behav. Inf. Technol..

[55]  R. Clarke,et al.  The Reasoning Criminal , 2014 .

[56]  Scott R. Stroud The Dark Side of the Online Self: A Pragmatist Critique of the Growing Plague of Revenge Porn , 2014 .

[57]  S. Jore,et al.  Troublesome trade-offs: balancing urban activities and values when securing a city-centre governmental quarter , 2015, City, Territory and Architecture.

[58]  A. Myhill Measuring Coercive Control , 2015, Violence against women.

[59]  E. Savona,et al.  Human trafficking for sexual exploitation in Italy , 2015 .

[60]  M. Salter,et al.  Responding to revenge porn : challenges to online legal impunity , 2015 .

[61]  N. Baym Social Media and the Struggle for Society , 2015 .

[62]  Graham Farrell,et al.  Police performance measurement: an annotated bibliography , 2015 .

[63]  A. Lavorgna The online trade in counterfeit pharmaceuticals: New criminal opportunities, trends and challenges , 2015 .

[64]  Xingan Li PHENOMENAL EXPLORATION INTO IMPACT OF ANONYMITY ON LAW AND ORDER IN CYBERSPACE , 2015 .

[65]  J. Li Adolescent Compensated Dating in Hong Kong , 2015, International journal of offender therapy and comparative criminology.

[66]  C. Barmore Criminalization in Context: Involuntariness, Obscenity, and the First Amendment , 2015 .

[67]  An application of CRAVED to the choice of victim in sexual homicide: a routine activity approach , 2015 .

[68]  M. Levi,et al.  Organizing the finances for and the finances from transnational corporate bribery , 2017 .

[69]  M. Berg,et al.  Cognition and Crime: Offender Decision Making and Script Analyses , 2016 .

[70]  J. Hardesty,et al.  “He Could Scare Me Without Laying a Hand on Me” , 2016, Violence against women.

[71]  M. Gill,et al.  Rewriting the Script: Cross-Disciplinary Exploration and Conceptual Consolidation of the Procedural Analysis of Crime , 2016 .

[72]  M. Townsley,et al.  SITUATING THE THEORY , ANALYTIC APPROACH AND APPLICATION , 2016 .

[73]  A. Velonis “He Never Did Anything You Typically Think of as Abuse” , 2016, Violence against women.

[74]  Harald Haelterman,et al.  Crime Script Analysis: Preventing Crimes Against Business , 2016 .

[75]  Lauren A. Reed,et al.  Snooping and Sexting , 2016, Violence against women.

[76]  Torna Pitman Living with Coercive Control: Trapped within a Complex Web of Double Standards, Double Binds and Boundary Violations , 2016 .

[77]  S. Bloom No Vengeance for 'Revenge Porn' Victims: Unraveling Why this Latest Female-Centric, Intimate-Partner Offense is Still Legal, and Why We Should Criminalize It , 2016 .

[78]  Taylor E. Gissell Felony Count 1: Indecent Disclosure , 2016 .

[79]  Walter S. DeKeseredy,et al.  Thinking Sociologically About Image-Based Sexual Abuse , 2016 .

[80]  David M. Douglas,et al.  Doxing: a conceptual analysis , 2016, Ethics and Information Technology.

[81]  D. Woodlock The Abuse of Technology in Domestic Violence and Stalking , 2017, Violence against women.

[82]  C. McGlynn,et al.  Image-based sexual abuse. , 2017 .

[83]  Benoit Leclerc,et al.  An Examination of Sexual Offenses Against Women by Acquaintances: The Utility of a Script Framework for Prevention Purposes , 2017 .

[84]  N. Henry,et al.  Beyond ‘Revenge Pornography’ , 2017 .

[85]  C. McGlynn,et al.  Beyond ‘Revenge Porn’: The Continuum of Image-Based Sexual Abuse , 2017 .

[86]  S. Bates Revenge Porn and Mental Health , 2017 .

[87]  Ganaele Langlois,et al.  Economies of reputation: the case of revenge porn , 2017 .

[88]  D. Woodlock,et al.  Technology facilitated coercive control: domestic violence and the competing roles of digital media platforms , 2018 .

[89]  R. Wortley,et al.  Learning About Situational Crime Prevention From Offenders: Using a Script Framework to Compare the Commission of Completed and Disrupted Sexual Offenses , 2018, Criminal Justice Review.

[90]  Katlin J. Rhyner,et al.  An examination of nonconsensual pornography websites , 2018 .

[91]  H. Borrion,et al.  Crime scripting: A systematic review , 2019, European Journal of Criminology.

[92]  L. Vitis Private, Hidden and Obscured: Image-Based Sexual Abuse in Singapore , 2020, Asian Journal of Criminology.

[93]  Asher Flynn,et al.  Image-based sexual abuse: The extent, nature, and predictors of perpetration in a community sample of Australian residents , 2019, Comput. Hum. Behav..

[94]  J. Hearn,et al.  Revenge pornography and manhood acts: a discourse analysis of perpetrators’ accounts , 2019 .

[95]  A. Eaton,et al.  Nonconsensual pornography among U.S. adults: A sexual scripts framework on victimization, perpetration, and health correlates for women and men. , 2020, Psychology of Violence.

[96]  CYBER CRIME AND INFORMATION WARFARE , .