EFTA00157004.pdf
PDF Source (No Download)
Extracted Text (OCR)
q
Routledge
Journal of Child Sexual Abuse
ISSN: (Print) (Online) Journal homepage: https://www.tandfonline.comiloirwcsa20
Validation of the Sexual Grooming Model of Child
Sexual Abusers
Georgia M. Winters , Elizabeth L. Jeglic & Leah E. Kaylor
To cite this article: Georgia M. Winters , Elizabeth L. Jeglic & Leah E. Kaylor (2020): Validation
of the Sexual Grooming Model of Child Sexual Abusers, Journal of Child Sexual Abuse, DOI:
10.1080/10538712.2020.1801935
To link to this article: httos://doLorg/10.1080/10538712.2020.1801935
IN
Published online: 02 Oct 2020.
7
Submit your article to this journal Gr
Ithe Article views: 33
View related articles I?
View Crossmark data
Full Terms & Conditions of access and use can be found at
https://www.tandfonline.comiaction/journalInformation?journalCode=wcsa20
3502-033
Page I of 22
EFIA_00001663
EFTA00157004
JOURNAL OF CHILD SEXUAL ABUSE
Mips://dolorg/10.1080/10518712.2020.1801935
14
Routledge
Taylor & (randS Group
Crad,...updatti
Validation of the Sexual Grooming Model of Child Sexual
Abusers
Georgia M. Winter?, Elizabeth L Jeglie', and Leah E. Kaylorb
'School of Psychology, Fairleigh Dickinson University, Teaneck, NJ, USA; °Psychology Department, John
Jay College of Criminal Justice, New York, NY, USA
ABSTRACT
Sexual grooming has been deemed an integral part of the child
sexual abuse process. However, there has yet to be a universally
accepted model for this process and, as a consequence, there is
no clear understanding of which behaviors constitute sexual
grooming. One proposed model of in•person sexual grooming
outlined five stages of the process: 1) victim selection, 2) gaining
access and isolating a child, 3) trust development. 4) desensiti-
zation to sexual content and physical contact, and 5) mainte-
nance following the abuse. The present study sought to validate
this Sexual Grooming Model (SGM) and identify behaviors that
may be employed during each stage of the process. First,
a thorough review of the literature was conducted to generate
a comprehensive list of sexual grooming behaviors (ri = 77).
Second, 18 experts in the field completed a survey which
asked them to rate the extent to which each of the five stages
and potential grooming behaviors were relevant to the sexual
grooming process. Results provided support for the SGM and
produced 42 behaviors that were considered to be grooming
tactics within these stages. From this, the first validated, com-
prehensive model of in•person sexual grooming is proposed.
The ankle concludes with a discussion of the implications and
future directions in the field.
ARTICLE HISTORY
Received 10 January 2020
Revised 25 March 2020
Accepted 19 May 2020
KEYWORDS
Sexual grooming; child
sexual abuser; child sexual
abuse; sex offenses
Child sexual abuse (CSA) is a serious public health issue with an estimated
lifetime prevalence ranging between 12-27% for girls and 4-5% for boys in the
United States and Canada (Briere & Eliott, 2003; Canadian Centre for Justice
Statistics, 2017; Finkelhor et al., 2015; Letourneau et al., 2018). In the United
States, individuals incarcerated for sexual offenses comprise 12% of state
inmate populations (Department of Justice, 2014). Notably, however, preva-
lence rates published by criminal justice agencies often underestimate the
severity of this problem due to low rates of victim disclosure and formal
reporting of cases (Leclerc & Wortley, 2015; Sethi et al., 2013). While there
are numerous reasons CSA may go undetected or unreported, it has been
suggested that a perpetrators' manipulation of the victims before and after the
CONTACT Georgia M. Winters
georgiawinters82@gmailcom 0 School of Psychology, faldeigh Colddnson
University, Teanedc NJ 07666
0 2020 bier & Francs
3502-033
Page 2 of 22
EFTA_00001664
EFTA00157005
2 ® G. M. WINTERS ET AL.
abuse, known as "sexual grooming," may decrease the likelihood of its detec
lion and disclosure (Van Dam, 2001).
It is estimated that almost half of the cases of CSA involve some element of
sexual grooming (Canter et al., 1998). While there has yet to be a universally
agreed upon definition in the literature, the term sexual grooming typically
refers to the process by which an offender skillfully manipulates a potential
victim into situations in which sexual abuse can be more readily committed,
while simultaneously preventing disclosure (Van Dam, 2001; Wyre, 2000).
Importantly, it is unclear what specific behaviors constitute sexual grooming,
given that the behaviors may not be unlike normal adult/child interactions
(Craven et al., 2006), and there has yet to be a validated model of the sexual
grooming process. The lack of a comprehensive understanding of sexual
grooming produces confusion amongst clinicians, law enforcement, attorneys,
researchers, and community members alike. As such, the present study sought
to establish content validity of a sexual grooming model, including both the
stages and specific behaviors that are involved in the process.
Sexual grooming
Sexual grooming has become synonymous with CSA in the past several
decades (McAlinden, 2013). The goals of grooming are to gain initial coopera-
tion of the victim, decrease the likelihood of discovery, and increase the
likelihood of future sexual contact (Lanning & Dietz, 2014). These pre-
offense behaviors are thought to be a deliberate process that is highly complex
and nuanced, with behaviors often mirroring normal adult/child interactions
(Knoll, 2010; McAlinden, 2013). Therefore, it is difficult to establish represen-
tative prevalence rates of the number of child sexual abusers who employ
sexual grooming tactics in the offense process. Of the few studies that have
tackled this question, it is estimated between 30 to 45% of child sexual abusers
groom their victims (Canter et al., 1998; Groth & Birnbaum, 1978).
Grooming can encompass varying behaviors which may differ based on the
characteristics of the offender (e.g., age of the offender) and the victim (e.g.,
age or gender of the victim), as well as contextual factors (e.g., "effectiveness"
of the grooming tactics, the offender's relationship to the victim, cultural
factors; Kaufman et al., 2006). Notably, sexual grooming can occur both in-
person or online. Online and off-line grooming processes may differ in
important ways, as there are some behaviors that are not possible online
(e.g., providing the victim with alcohol; Elliott, 2017) and thus, the present
study will focus solely on in-person grooming behaviors.
It should also be noted that individuals who sexually abuse children may
groom themselves (personal grooming) and other people (familial and institu-
tional/community grooming), in addition to the child. Personal grooming
involves the process whereby the offender grooms themselves in order to
3502-033
Page 3 of 22
EFIA_00001665
EFTA00157006
JOURNAL OF CHILD SEXUAL ABUSE 0
3
Table 1. Sexual grooming model.
Victim Selection
=
I-CVI
Compkant/trusting of adults
0.78'
Lacks confrlencelow self-esteem
089'
Lonely/isolated
0.78'
Troubled
089'
Needy
089'
Umvantedlunloved
089'
Not dose to parents/parents are not
0.78'
resources for them
Single mothers/need of lather figure'
089'
Lack of supervision
0.94'
Gaining Access and Isolation (a = 5)
Involvement in youth-serving organizations
083'
Manipulate family to gain access to child
1.00'
Activities alone with children/excludes adults
089'
Overnight stays/outings
0.94*
Separate child from peers and family
089'
Trust Development la = 10)
Charming/nice/likable
083'
insider status/good reputaucorpillar
0.78'
of the community'
Affectionate/lovig
LOW
Giving the child attention
1.00'
Favoritismrspecal relationship"
089'
Compliments
089'
Spending time with child/communicating
0.94'
often
Engage in oNldlike activities (e.g., stories.
089'
games, sports, music)
Rewards/privdeges (e.g., gifts, toys, treats.
0.94'
money, tics)
Provided drugs and/or akohol
089'
Desensltlntlon to Sexual Content and Physical Contact (a = 10)
Ask questions about child's sexual
089'
experience/relationsNps
Talk about sexual things they themselves
0.94'
had done
Inappropriate sexual language/dirty Jokes
083'
Teach child sexual education
089'
Use of accidental toucNrig/distracnon
089'
wive touching
Watch the child undreuing
0.78'
Exposing naked body
0.78'
Show child pornography magazines/videos
083'
Seemingly innocent/non-sexual contact
0.94'
Desensitize to touchencreasing
1.00'
sexual touching
Post-Abuse Maintenance Behaviors 0 = II)
Told not to tell anyone what happened
0.89'
Encouraging secrets
0.89'
I love you/you're special
100*
Rewards/bribes/avoid punishment
089'
Persuaded the child it was
089'
acceptable/normal behavior
Misstated moral standards regarding touch
083'
Victim made to feel responsible
0.78'
Threats of abandonment/rejection/family
083'
breaking up
Items Not Included in the Five-Stage Model 0 = 35)
(Continued)
3502-033
Page 4 of 22
EFTA_00001666
EFTA00157007
4 ® G. At. WINTERS ET AL.
Table 1. (Continued).
Victim Selection In = 9)
I-CVI
Selects a child who has already been victimized
0.72
Selects a child who is depressed/unhappy
0.72
Talks to the child on their level
0.72
Say things about the child's body/dress
0.72
Goes into child's bedroom while the child is in there
0.72
Goes into the bathroom while child is in there
0.72
After the abuse, threatens victim
0.72
Gains access after being approached by a chlidThad a chid recruit
other children
047
Treats the child like an adult
047
Engages in verbal threatefinghten/intimidate/coercion of the child
047
Violates the child's privacy
047
Has the child observe sexual behavior
047
Selects a child who is cognitively impaired/special needs/learning
disability
041
Selects a child who has drug or alcohol abusing parents
041
Looks
body for development
041
at/inspects child's
Selects a child who has economic problems/parents working a lot
036
Gives the child rides home
036
Babysits the child
036
Gains access to children through public places (e.g., malls, arcades)
036
Takes photos/videos of the did
036
Selects a child who is young or small/slim
030
Selects a child who parents are divorced/marital problems
030
Selects a child who has a mother who was sexually abused
030
Uses stre/authority/streregth against the add
030
Selects a child who is attractive/pretty (e.g. hair type, skin color)
0.44
Shows helpfulneu to others
0.44
Looks at did in a funny/sexual way
018
After the abuse, the offender assumes the child's silence
028
Selects a child based on his/her clothing
032
Has the child view violence against others
032
After the abuse, the offender punishes the child
032
Punishes the child or withholds privileges
0.17
Use of physical force/uses weapons against the child (e.g., push,
shove, spank)
0.17
Presents as mean/rude to the child
0.11
After the abuse, the offender moves on to the next victim
0.11
' indicates significant results
justify, minimize, or deny their behaviors (Craven et al., 2006; McAlinden,
2006). The purpose of familial grooming is to gain the trust of caregivers in
order to increase access to the victim and decrease the likelihood of disclosure.
An offender may also engage in community or institutional grooming, such as
becoming a respected member of society or seeking careers or volunteer
positions that allow access to children (e.g., Boy Scouts, schools, foster care;
McAlinden, 2006; Sullivan & Beech, 2002; Van Dam, 2001).
Given the complicated nature of identifying sexual grooming, it has been
proposed that recognizing sexual grooming behaviors following the disclosure
of the sexual offense is much easier than prospective identification (Craven
et al., 2006). Researchers have found there is a hindsight bias associated with
sexual grooming of children, in which individuals tend to overestimate the
likelihood that they could have predicted these behaviors were taking place
3502-033
Page 5 of 22
EFIA_00001667
EFTA00157008
JOURNAL OF CHILD SEXUAL ABUSE ®
S
after they learn an individual has committed a sexual offense (Winters & Jeglic,
2016). Importantly, in one study, Winters and Jeglic (2017) found that the
general public has trouble identifying potentially predatory sexual grooming
behaviors. Given the difficulty in identifying sexually versus non-sexually
driven behaviors with children, gaining a better understanding of sexual
grooming is integral to improved prevention and treatment efforts.
Legal definition of sexual grooming
It should be noted that the legal definition of sexual grooming is not necessa-
rily synonymous with concept of in-person sexual grooming as outlined in the
scientific and theoretical literature. By 2017, 63 countries had enacted legisla-
tion related to grooming that focuses solely on the online solicitation of
minors (often referred to as online sexual grooming; International Centre
for Missing and Exploited Children, 2017). Notably, many of these laws do
not account for sexual grooming that can occur in-person. Other countries
have developed legislation that could be applied both to online and in-person
grooming cases. For example, in the United States, section §2422 of the federal
Criminal Code describes a law whereby an individual who "knowingly per-
suades, induces, entices, or coerces any individual to travel in interstate or
foreign commerce, or in any Territory or Possession of the United States, to
engage in prostitution, or in any sexual activity for which any person can be
charged with a criminal offense, or attempts to do so" can be fined or
imprisoned (Coercion and Enticement, 18 U.S.C. 2422). While the aforemen-
tioned law pertains particularly to cases involving sex trafficking, several states
have followed suit and enacted similar laws without the requirement of
"interstate or foreign commerce" which can then more generally apply to
cases of CSA involving grooming. It is important to have a legal definition
of sexual grooming for the purposes of prosecution of these crimes; however,
legal definitions typically lack specificity (e.g., what behaviors that would be
indicative of grooming). Further, and most importantly, in order to prevent
grooming-based CSA, it is vital to go beyond the legal definitions to better
understand the interaction between the victim, offender, and context of the
offense (e.g., Nash & Williams, 2008). Thus, the grooming behaviors analyzed
within this paper will be clearly differentiated from that of the already accepted
legal definitions.
Models of sexual grooming
There have been numerous attempts to identify the steps involved in the sexual
grooming process and to develop an overarching model of these behaviors (see
Appendix A); however, none of these models have been empirically validated.
One of the most widely cited models of sexual grooming authored by
3502-033
Page 6 of 22
EFTA_00001668
EFTA00157009
6
G.M. VANTERS ET AL.
McAlinden (2006) indicates, as described above, that offenders groom not
only children, but also themselves (i.e., personal grooming) and family and
community members who act as gatekeepers to the children. Another widely
cited grooming framework by Elliott (2017) - the Self-Regulation Model -
draws upon the strengths and limitations of previous models of grooming. The
model is comprised of two phases: 1) the potentiality phase includes rapport
building, incentivization, disinhibition, and security management; and 2) the
disclosure phase which describes how gains made in the first phase enable the
perpetrator to desensitize the victim to sexual abuse. Although the self-
regulation model of sexual grooming advanced the field, this model is not
easily understood or applied, and thus, a more simplified model is greatly
needed to enhance communication across fields.
In an effort to address some of the limitations of previous models of
grooming behavior, Winters and Jeglic (2017) reviewed the extant grooming
literature and developed a model of grooming comprised of behaviors that
could be observable to others and measurable, and thus informative in pre-
vention and detection of sexual abuse. This five-stage model, hereafter referred
to as the Sexual Grooming Modal (SGM), draws upon the commonalities
identified in several of the previously proposed models (see Appendix A), as
well as identifying gaps of missing information. For example, some previously
proposed models did not address important components of grooming, such as
victim selection or post-abuse maintenance (e.g., Brackenridge, 2001; Sheldon
& Howitt, 2007). Additionally, other models have limited utility for public
prevention initiatives as they are theoretically complex and thus difficult to
apply in real-world settings (e.g., Elliott, 2017; Olson et al., 2007). Winters and
Jeglic (2017) model of grooming behavior proposes five overarching stages
that may be involved in the complex process of sexual grooming, including: 1)
selecting a victim; 2) gaining access and isolating the victim; 3) developing
trust with the child and others (e.g., caretakers, community members); 4)
desensitizing the child to sexual content and physical touch; and 5) main-
tenance behaviors following the commission of the abuse. Below, each stage is
described with support from the theoretical literature.
Victim selection
First, several models of grooming propose that selecting a vulnerable victim is
the initial step in the grooming process (e.g., Harms & van Dam, 1992;
Lanning, 2010). It has been proposed that a vulnerable child may be identified
based on physical characteristics (e.g., child who is perceived as attractive,
young, or small; Conte et al., 1989; Elliott et al., 1995), or emotional or
psychological needs (e.g., child who is perceived as trusting, lacking self-
esteem, isolative, neglected, troubled, or in need of affection; Elliott et al.,
1995; Kaufman et al., 2006; Knoll, 2010; Shakeshaft, 2004). Additionally, an
3502-033
Page 7 of 22
EFTA_00001669
EFTA00157010
JOURNAL OF CHILD SEXUAL ABUSE 0
7
offender may look to the child's family circumstances in the victim selection
process (e.g., lack parental supervision, parental discord, parental mental
health/substance use issues; Craven et al., 2006; Jackson et al., 2015;
Kaufman et al., 2006).
Gaining access and isolation
Second, many of the prior models identify that an offender seeks to gain access to
the targeted child and isolate him/her from others. Indeed, Lanning (2010),
Craven et al. (2006), Olson et al. (2007), and Leclerc et al. (2009) all proposed
models that include a stage whereby an offender gains access to the victim.
Gaining access to a potential victim may include becoming involved in youth-
serving organizations (e.g., Lanning & Dietz, 2014), frequenting public places with
children (e.g., Kaufman et al., 2006), or manipulating the family in order to gain
access to the child (e.g., Knoll, 2010; Lanning & Dietz, 2014). Once an offender has
gained access to a child, they often work to isolate the child physically and
emotionally from their family and peers (e.g., Craven et aL, 2006; Lawson,
2003). For example, an offender may seek to organize activities that physically
isolate the child all the while excluding adult involvement, such as overnight stays,
giving the child a ride home, or babysitting the child (e.g, Kaufman et al., 2006).
Trust development
Third, after selecting and gaining access to a victim, prior models describe a stage
in which the offender works toward deceptively developing trust and cooperation
with the child (Craven et aL, 2006; Leclerc et at, 2009; Olson et al., 2007). While
some models incorporate a broad stage that refers to the overarching goal of trust
development, others have outlined specific behaviors that may be used to gain the
trust. An offender may try to present as likable and charming, eventually earning
insider status and a good reputation in the community (e.g., Lanning & Dietz,
2014). The offender may make the child feel loved, use bribes or inducements,
exploit his/her vulnerabilities, engage in peer-like activities, and befriend the child
(Berliner & Conte, 1990; Harms & van Dam, 1992; Lederc et al., 2009; Marshall
et al., 2015). Additionally, literature has identified that some offenders may
provide the child with drugs or alcohol (e.g., Bennett & O'Donohue, 2014),
which would be most commonly used with older victims.
Desensitizing the child to sexual content and physical contact
Fourth, there appears to be a stage that involves the introduction of sexual
conversation and touch, with the aim of desensitizing the child to these
behaviors (Berliner & Conte, 1990; Harms & van Dam, 1992; McAlinden,
2006; Olson et al., 2007). An offender may introduce sexualized topics into
3502-033
Page 8 of 22
EFTA_00001670
EFTA00157011
8
G. M. VANTERS ET AL.
discussions, such as telling inappropriate jokes, providing sexual education, or
engaging in sexual conversations (Knoll, 2010; McAlinden, 2006; Olson et al.,
2007; Wyre, 2000). The offender may violate the child's privacy (e.g., spying,
sneaking views of the child; Bennett & O'Donohue, 2014) or engage accidental
touching (Harms & van Dam, 1992; Olson et al., 2007). Moreover, literature
commonly refers to a process by which an offender desensitizes the child to
touch by gradually increasing physical contact (Berliner & Conte, 1990; Harms
& van Dam, 1992; McAlinden, 2006). For example, the individual may begin
using tactics such as hugging or tickling, then gradually increasing contact
over time to wrestling or massages.
Post-abuse maintenance
Finally, an offender may engage in maintenance behaviors which are used to
continue ongoing abuse with the victim and/or prevent disclosure (e.g.,
Craven et al., 2006; Harms & van Dam, 1992). It has been suggested that
this stage involves the offender encouraging the child to maintain secrets and
not disclose the abuse (Craven et al., 2006; Harms & van Dam, 1992). An
offender may try to persuade the child that the sexually abusive behavior is
acceptable (e.g., Jackson et al., 2015), misrepresent standards for appropriate
touching (e.g., Bennett & O'Donohue, 2014), or make the child feel respon-
sible for the abuse (e.g., Harms & van Dam, 1992). Affection may also be
employed by telling the child they love them or the child is special (Lang &
Frenzel, 1988), giving the child bribes or rewards (e.g., Lang & Frenzel, 1988;
Lawson, 2003; Salter, 1995; Shakeshaft, 2004), or enforcing or withholding
punishment (Lawson, 2003).
While Winters and Jeglic (2017) SGM addresses the limitations of previous
models, similar to all the other past models of sexual grooming, this model has
not yet to be validated. Given that isolated grooming-like behaviors in and of
themselves may not be indicative of sexual abuse, it is necessary to establish
a model of the stages of grooming to understand the larger process in order to
inform detection and prevention efforts. Thus, the present study aimed to be
the first to empirically validate a model of sexual grooming and identify what
specific behaviors constitute grooming.
The present study
The present study aimed to establish the content validity of the proposed SGM
(Winters & Jeglic, 2017) and identify what behaviors may be indicative of
sexual grooming. To this end, experts in the field were asked to identify
whether they believed the five stages of the SGM are part of the grooming
process and what specific behaviors (identified from a thorough literature
review) might fall under each of these proposed stages. Given the lack of
3502-033
Page 9 of 22
EFTA_00001671
EFTA00157012
JOURNAL OF CHILD SEXUAL ABUSE 0
9
previous empirical research in this area, the study was exploratory in nature
and thus, no specific hypotheses were made.
Method
Part 1
Literature review
A comprehensive literature review was conducted to identify potential groom-
ing tactics that have been identified in previous publications. Online searches
for articles were conducted through Psycl NFO, Criminal Justice abstracts with
Full Text, Web of Science, and Medline Complete. The search terms utilized
included: I) Set' groom* and 2) Child* groom*. Sources were also found by
reviewing the reference lists of sources obtained through these online database
searches. Searches were limited to articles in English language and peer-
reviewed sources. A total of 1,363 sources resulted from literature search of
the four search engines and reference lists. These sources were screened using
a review of titles and abstracts, which resulted in the collection of 69 initial
sources. Following a full-text review of the sources, 51 articles and books were
identified as relevant. These sources all contained information regarding
sexual grooming behaviors enacted by in-person child sexual abusers (i.e.,
online sexual grooming literature was excluded). The 51 articles and books
were thoroughly reviewed, and each unique grooming behaviors was recorded
in order to produce a comprehensive list of possible grooming behaviors.
Through this process, a total of 77 potential grooming behaviors were
identified.'
Part 2
Participants and procedures
Content validity of the five-stage SGM and 77 grooming behaviors was
examined by having a list of "experts" in the field complete an online survey.
The list of experts was developed by compiling a list of authors (ii = 99) on the
articles and books that were published in the area of sexual grooming
(described above). Extensive research was conducted through the use of
Internet search engines and contact information listed within the literature
to identify the e-mail addresses of the authors. A total of 56 e-mail addresses
were obtained. Following sending e-mail invitation to participate in the study,
12 e-mail addresses were inactive which resulted in a total of 44 potential
participants. Three rounds of e-mails were sent to each e-mail address
'n should be noted that the authors also seated an a piton model which identified which of five stages each
behavior fell under, lit was later utikzed in making final determinations regarding what stage of the grooming
process each relevant (as identified by experts in the field) grooming behavior would likely be utilized.
3502-033
Page 10 of 22
EFTA_00001672
EFTA00157013
ICI 0
G. M. WINTERS ET AL
requesting participation in the expert review which involved participation in
a 30-minute survey. If the individual agreed to participate, they were asked to
complete the Expert Review Survey (see below).
A total of 18 participants completed the survey (12 males; 6 females), which
represented a 40.9% response rate. In regard to participant age, four indivi-
duals were between the ages of 41-50, six between the ages of 51-60, and eight
over the age of 60. The majority of experts obtained a Ph.D. (ii = 15), two had
a Master's degree, and one was a current Ph.D. student. There was a range of
fields in which these degrees were earned: psychology (n = 8), criminal justice
(n = 2), and one individual each from the fields of education, sociology, public
health, social work, communication, theology, criminology, and psychology/
sociology. Experts reported the area, or areas (respondents could select more
than one), that best described their experience working with child sexual
abusers, which included empirical research (n = 16), clinical practice
(ii = 10), publishing theoretical articles/chapters on the topic (n = 14), and
other (n = 3; i.e., employee of state correctional system, consultation on
investigations, investigative journalist). The experts reported a mean number
of years of experience with empirical research (ii = 18), publishing theoretical
pieces (n = 17), and clinical experience (n = 10) related to grooming as
24.67 years (range = 2-48), 15.50 years (range = 3-48), and 22.71 years
(range = 2-45) years, respectively. All participants (n = 18) had published an
empirical research article related to grooming, with 12 individuals reporting
between 1-10 publications, two reporting 11-20 publications, three with more
than 20 publications, and one participant indicated that they were not certain
how many publications they had. For the 17 people who had experience
publishing theoretical articles/chapters on sexual grooming, the mean number
of publications was 7.00 (range = 1-20). Of the 10 participants who had
clinical experience with sex offenders, six had 50 or more clients, two had
15-50 clients, one had 5-15 clients, and one had 0-5 clients.
Expert review survey
First, participants were presented with 4-point Likert scale items inquiring
about the relevance (1 = not relevant, 2 = somewhat relevant, 3 = relevant,
4 = very relevant) of the five proposed stages of grooming. Second, the
participants rated the relevance of each item from the pool of 77 grooming
behaviors identified by the literature review using a 4-point Likert scale
(1 = not relevant, 2 = somewhat relevant, 3 = relevant, 4 = very relevant).
Participants were also asked for each item to select one or more stages of the
grooming process the behavior fell under (i.e., Victim Selection, Gaining
Access, Trust Development, Desensitization, and Post-Abuse Maintenance,
other, or none). Lastly, participants completed a series of demographic ques-
tions (e.g., age, gender, degree, field of study, clinical, publication, and research
experiences).
3502-033
Page!! of 22
EFTA_00001673
EFTA00157014
JOURNAL OF CHILD SEXUAL ABUSE 0
11
Results
Analytic strategy
The Content Validity Index (CVI) is a method originally proposed by Lynn
(1986), which utilizes feedback from experts in the field to determine what
content is relevant to a construct; this is a commonly used method in social
science research (Research Methods Knowledge Base, n.d.). In this case, CVI
calculations were used to determine what stages and behaviors are relevant to
the process of sexual grooming. First, as noted above, the relevance of the five
stages and potential grooming behaviors were rated by experts using a 4-point
Likert scale (1 = not relevant, 2 = somewhat relevant, 3 = relevant, 4 = very
relevant). Second, these ratings were used to determine which stages/behaviors
should be retained (i.e., they were deemed related to the construct of grooming
by the experts) and which should be rejected (i.e., they were deemed not
related to the construct of grooming by the experts) through the utilization
of CVls, which are calculations that examine the proportion of experts who
rated the item as relevant. The CVI for each item (I-CVI) is calculated by
dividing the number of experts who believed the item was relevant (either a 3
or 4 on the Likert scale) by the total number of content experts (in this case,
n = 18). It has been suggested that the I-CVI for an item should be greater or
equal to 0.78 in order to be included (Shi et al., 2012).
Stages of sexual grooming
Experts were asked to rate the relevance for each of the five stages of the sexual
grooming process as proposed by Winters and Jeglic (2017). Results revealed
an I-CVI index of.94 (17/18 experts) for the stages of Gaining Access (M = 3.78,
SD = .55), Trust Development (M = 3.72, SD = .58), and Desensitization
(M = 3.50, SD = £2). Similarly, an I-CVI index of .89 (16/18 experts) was
found for the stages of Victim Selection (M = 3.56, SD = .70) and Post-Abuse
Maintenance (M = 3.39, SD = .70). Overall, the I-CVls for each of the proposed
stages exceeded the cutoff score of 0.78, suggesting that all five stages are
believed to be relevant to the sexual grooming process.
Sexual grooming behaviors
An examination of the I-CVls for the 77 potential grooming behaviors
revealed that 42 items were considered by the expert panel as relevant to the
construct of sexual grooming (I-CVIs ranged between .78-1.0; see Table 1).
This represents a retention rate of 54.5% from the original items.
An examination of which stage of the grooming process the experts believed
the behavior belonged in was conducted. For each item that was deemed
relevant (n = 42), the stage that the most experts (i.e., over 50%) believed the
3502-033
Page 12 of 22
EFIA_00001674
EFTA00157015
12 0
G. M. WINTERS ET AL
behaviors to fall under was recorded. These expert-rated categorizations were
compared to the theoretical categorization identified by the researchers (see
footnote on page 11). Results suggested that 39 of the 42 relevant items were
deemed by the majority of the experts to fall into the original a priori model
developed by the authors. One item ("Threatens the child with abandonment/
rejection/family breaking up") was rated by the majority of participants
= 14) to fall under the Post-Abuse Maintenance stage, not the theoretically
suggested Trust Development stage. Given the agreement among the vast
majority of experts, this item was relocated to the Post-Abuse Maintenance
stage. Two items ("Becomes involved in activities alone with children/excludes
adults" and "Presents as charming/nice/likable to others") were rated by the
experts as equally belonging to the Gaining Access and Trust Development
stages. Consistent with the theoretical literature and a priori model, these
items were deemed to fall under the Gaining Access and Trust Development
stages, respectively. See Table 1 for the final grooming behaviors organized
into the five-stages of the SGM.
Discussion
The present study aimed to establish content validity for the SGM proposed
by Winters and Jeglic (2017) and identify which behaviors are involved in
each stage of the grooming process. The results, as determined experts in
the field, revealed consensus that the five stages proposed by Winters and
Jeglic (i.e., Victim Selection, Gaining Access,
Trust Development,
Desensitization, and Post-Abuse Maintenance) are all essential components
of the sexual grooming process. Moreover, findings from the study suggest
there are 42 grooming tactics/behaviors that experts identified as belonging
to these stages. Overall, the results of the present study resulted in the
content validation of a comprehensive and parsimonious model of sexual
grooming.
Stages of sexual grooming
A major benefit of the SGM's framework is that it is intuitive, easily under-
stood, and backed by a foundation of literature. Having a comprehensive, yet
easily understood, framework is vital, as information about grooming must be
distributed to various consumers (e.g., law makers, researchers, parents, clin-
icians, criminal justice professionals). For example, parents could utilize this
model to be vigilant in monitoring for potentially predatory behaviors of those
around their child, while clinicians can use the model to assist in assessment
and treatment of victims or offenders of CSA. As such, it is important to have
a model of grooming that allows for education across fields and different types
of consumers.
3502-033
Page 13 of 22
EFTA_00001675
EFTA00157016
JOURNAL Of CHILD SEXUAL ABUSE 0
13
While establishing the content validity of the SGM is a major advance in
understanding grooming behaviors, it remains but a first step. With the
foundation provided by the findings of the current study, it is necessary to
continue to establish empirical support for the model and begin to assess other
facets of grooming behavior. For example, it is unknown whether every
offender progresses through each of the five stages, or whether there is always
a linear progression through the stages. For instance, if an offender already has
preexisting access to the potential victim (e.g., a parent), then they are less
likely to employ behaviors in the Victim Selection or Gaining Access stages.
Moreover, it may be that the offender moves fluidly between stages or skips
stages if not deemed necessary. As an example, if an offender utilizes behaviors
in the Desensitization stage and then notices the child resisting, they may
revert back to engaging in more behaviors in the Trust Development stage.
Similarly, the proposed model does not assume that an offender may only
utilize behavior within one stage at a given time; that is, an offender may
simultaneously employ behaviors found in the Trust Development (e.g., show-
ing the child affection) and Desensitization (e.g., using seemingly innocent
touch) stages. Taken together, future research should aim to examine the
types, and most common, progression of the stages during the offense process.
Sexual grooming behaviors
Overall, the study was the first to obtain data related to relevance of various
behaviors to the grooming process. This is an important addition to the litera-
ture given that it has previously been unclear what behaviors constitute groom-
ing, especially given that many grooming behaviors in and of themselves are not
unlike normal adult/child interactions. Identifying the 42 behaviors that were
deemed relevant to the sexual grooming process by experts in the field is an
important advance. While the data has yet to be empirically validated using cases
of CSA, an expert-review validation study is the first step in better understanding
what behaviors are indicative of grooming. It should be noted, however, that we
did not ask experts to provide items that they believed to be indicative of the
stages of sexual grooming. Rather, the items were provided to them to endorse.
This could lead to a reification effect in that that the experts may have endorsed
items as relevant to the stages of grooming given the items were derived from
existing theoretical grooming literature, yet the items they endorsed may not in
fact represent concrete behaviors actually utilized by perpetrators in CSA cases.
However, if that were the case, then the majority of items would have been
retained as relevant in the study as they were extracted from the grooming
literature, when in the study we found that only about half of the theoretically-
linked items were deemed not to be indicative of grooming. Thus, it is likely that
the experts were critically evaluating the items to determine which were applic-
able to real-world cases.
3502-033
Page 14 of 22
EFTA_00001676
EFTA00157017
14 0
a M. WINTERS ET AL
Taken together, a major strength of the SGM is that the behaviors that are
observable and measurable, although it remains unclear how to differentiate
these behaviors from innocent contact with children. Nonetheless, we have
garnered a greater understanding, using expert consensus, of actions that may
be employed by a would-be child sexual abuser. That is, a validated model will
assist in identifying constellations of behaviors that are considered grooming,
which is a necessary component of preventing CSA. Moreover, the SGM
provides a framework for the development of an instrument that can be
used to measure sexual grooming, which can help identify and quantitatively
measure the likelihood that a constellation of behaviors constitutes grooming.
Implications of the sexual grooming model
Overall, the results of the study have implications for prevention, intervention,
and prosecution. First, and most importantly, improved understanding of
sexual grooming can contribute to efforts to identify the abuse before it has
occurred (Craven et al., 2007). Having a comprehensive and understandable
model of sexual grooming comprised of specific observable behaviors can be
used to educate parents and individuals who work with children on how to
recognize potential sexual grooming behaviors prior to the abuse. For exam-
ple, parents would benefit from learning more about grooming tactics so that
suspicion may be raised if clusters, high frequency use, or the most severe of
these potentially worrisome behaviors are present in a person spending time
with children. Similarly, individuals working closely with children (e.g., tea-
chers, coaches) can better monitor for grooming behaviors and notify guar-
dians or proper authorities should any concerning behaviors arise. The
information gleaned from the study could also be used to educate children
regarding appropriate versus inappropriate behaviors with adults in their life.
Importantly, we are not suggesting that every individual who engages in any of
these behaviors individually is engaging in grooming. The intention of the SGM is
not to label or pathologize innocent, caring interactions between children and
adults, but to encourage increased vigilance and awareness in warranted instances
where several of these behaviors are observed together. As noted previously,
grooming differs from normal interactions due to the underlying, deviant inten-
tion, which may be understandably difficult to identify. While researchers are still
working to understand, distinguish, and clarify this distinction, these early find-
ings can nonetheless assist in broadly understanding grooming strategies and
behaviors, and raising reasonable concerns in the face of potentially worrisome
behaviors occurring at high frequency or severity.
The SGM can also be helpful to clinicians working with individuals who
have committed sexual abuse of a child. Given there is evidence that offenders
plan their offenses (Laws, 1989) and engage in consistent patterns of offense-
related behaviors with multiple victims (Abel et al., 1987), it is necessary to
3502-033
Page 15 of 22
EFTA_00001677
EFTA00157018
JOURNAL Of CHILD SEXUAL ABUSE 0
15
target these pre-offense grooming behaviors in treatment. If an offender
groomed their victims, a therapist could integrate this framework to help the
individual established a better understanding of their offense cycle, which
would be helpful in informing relapse prevention strategies. Further, it should
be noted that CSA cases are not homogenous (Lanning, 2010; Salter, 1995),
suggesting that motivations and strategies related to grooming will vary by
offender. There may be numerous psychological factors at play that influence
an offender's intentions and actions throughout the grooming process; these
elements are an area ripe for further research. Should an offender demonstrate
changes in the beliefs, thoughts, and behaviors in treatment, they may be
equipped to not engage in those types of behaviors (Salter, 1995). This model
can also be used in treating victims of CSA, as a means of providing psychoe-
ducation about sexual abuse. It is not uncommon for victims to experience
guilt and blame following sexual abuse, which would be expected to be
particularly heightened in instances where the victim was groomed by the
offender. Thus, educating victims about these manipulative behaviors using
the SGM could possibly reduce the self-blame a victim may experience.
Understanding sexual grooming using the SGM may also be of utility to
criminal justice professionals Knowledge of the stages and behaviors associated
with grooming could assist in law enforcement investigations of child sexual
abusers, as police should be aware of these behaviors in investigations of CSA.
For example, if a child disdoses abuse and is unwilling to provide the offender's
name, law enforcement could investigate whether there are any individuals in the
child's life who have employed possible grooming tactics in order to identify
potential suspects Additionally, a framework for grooming can also be utilized by
attorneys working on CSA cases involving sexual grooming. While this study
represents one of the first attempts to validate the construct of grooming, attorneys
should nonetheless be aware of these types of intentional behaviors in their cases,
as they may help inform the arguments of the case (e.g., the offender had frequent
and close contact with the victim before the alleged abuse). In the future, should
the empirical grooming literature evolve, the information can be used in the
prosecution of cases or decisions post-conviction, such as post-release guidelines
(i.e., types of probation stipulations based on the offender's history of pre-offense
behaviors). As noted above, it is important to gather a larger empirical basis for the
construct of grooming behavior to enhance the use of the concept in the court-
room and judicial decision-making.
Conclusion and future directions
This study is the first to validate a model of grooming and behaviors involved in
the process, which is a major step toward developing a more universally
accepted framework for these pre-offense behaviors. The results of the present
study provided a thorough, yet also concise and parsimonious, content
3502-033
Page 16 of 22
EFTA_00001678
EFTA00157019
16 0
G. M. WINTERS ET AL
validation of the SCM that conceptualizes the process of sexual grooming
which can be useful across multiple settings. Indeed, the present study sheds
light on valuable information for researchers, criminal justice professionals,
clinicians, and community members alike. This study has established the
content validity of a model of sexual grooming therein laying the ground
work for further validation of an evidence-based model of sexual grooming.
The next step is to empirically validate the SCM using the pre-offense behaviors
of a sample of victims or offenders of CSA. The model should undergo rigorous
testing to ensure the stages accurately represent the complex process of sexual
grooming. Further, a standardized measure of grooming behaviors should be
developed based upon the behaviors and stages delineated in the SGM.
A reliable and valid measure of sexual grooming would allow researchers and
clinicians a means of quantifying these behaviors and could be invaluable in
prevention and risk assessment efforts with the goal of understanding when
certain behaviors constitute sexual grooming and how to prevent CSA from
occurring.
Declaration of interests
There are no conflicts of interest with respect to the research, authorship, and/or publication of
this article.
Notes on contributors
Georgia Al. Winters. Ph.D., is an assistant professor in the Forensic Psychology M.A. Program,
School of Psychology, at Fairleigh Dickinson University. Her research interests include sexual
grooming behaviors of child sexual abusers and paraphilic interests.
Elizabeth L. Jeglic, Ph.D is a professor of psychology at the John Jay College of Criminal Justice
in New York Her research focuses on sexual violence prevention.
Leah Kaylor, Ph.D. graduated from John Jay College of Criminal Justice with a Master's degree
in Forensic Mental Health Counseling. She earned her PhD in Clinical Psychology from Saint
Louis University. Her research interests include forensic issues and deviant sexual behavior.
References
Abel, G. G., Becker, J. V., Mittelman, M., Cunningham-Rathner, J., Rouleau, J. L. &
Murphy. W. D. (1987). Self-reported sex crimes of nonincarcerated paraphiliacs. Journal
Of Interpersonal Violence, 2(1), 3-25. https://doLorg/10.1177/088626087002001001
Bennett, N., & O'Donohue, W. (2014). The construct of grooming in child sexual abuse:
Conceptual and measurement issues. Journal of Child Sexual Abuse: Research, Treatment,
& Program Innovations for Victims, Survivors, do Offenders, 23(8), 957-976. https•J/doi.org/
10.1080/10538712.2014.960632
Berliner, L., & Conte, J. R. (1990). The process of victimization: The victims perspective. Child
Abuse & Neglect, 14(1), 29-40. https•1/doLorg/10.1016/0145-2134(90)90078-8
3502-033
Page 17 of 22
EFTA_00001679
EFTA00157020
JOURNAL Of CHILD SEXUAL ABUSE 0
17
Brakenridge, C. H. (2001). Spoilsports: Understanding and preventing sexual exploitation in
sport. Routledge.
Briere, J., & Elliott, D. M. (2003). Prevalence and psychological sequelae of self-reported
childhood physical and sexual abuse in a general population sample of men and women.
Child Abuse 6* Neglect, 27, 1205-1222. https://doLorg/10.1016/j.chiabu.2003.09.008
Budin, L. E., & Johnson, C. F. (1989). Sex abuse prevention programs: Offenders' attitudes about
their efficacy. Child Abuse d Neglect, B(1), 77-87. https://doiorg/10.1016/0145-2134(89)
90031-8
Canadian Centre for Justice Statistics (2017). Family violence in Canada: A statistical profile,
2015. Retrieved from: https://www150.statcan.gc.ca/nl/daily- quotidien/170216/
dq170216b-eng.pdf
Canter, D., Hughes, D., & Kirby, S. (1998). Paedophilia: Pathology, criminality, or both? The
development of a multivariate model of offence behaviour in child sexual abuse. Journal of
Forensic Psychiatry, 9(3),532-555. https://doi.org/10.1080/09585189808405372
Christiansen, J. R., & Blake, R. H. (1990). The grooming process in father-daughter incest. In
A. L Horton, B. L Johnson, L M. Roundy, D. Williams, A. L. Horton, B. L Johnson, &
D. Williams (Eds.), The incest perpetrator: A family member no one wants to treat (pp.
88-98). Sage Publications, Inc.
Coercion and Enticement. (2422). 18 U.S.C.
Conte, J. IL, Wolf, S., & Smith, T. (1989). What sexual offenders tell us about prevention strategics.
Child Abuse do Neglect, 13(2). 293-301. https://doLorg/10.1016/0145-2134(89)90016-1
Craven, S., Brown, S., & Gilchrist, E. (2006). Sexual grooming of children: Review of literature
and theoretical considerations. Journal of Sexual Aggression, 12(3), 287-299. https://doLorgi
10.1080/13552600601069414
Craven, S., Brown, S., & Gikhrist, E. (2007). Current Responses to Sexual Grooming:
Implication for Prevention. Howard Journal of Criminal Justice. 46(1), 60-71. https://doi.
org/http://doi.10.1111/j.1468-2311.2007.00454.x
Department of Justice (2014). Crime in the United States, 2013. Retrieved from: https://ucr.fbi.
gov/crime-in-the-u.s/2013/crime-in-the-us:2013
Elliott, I. A. (2017). A self-regulation model of sexual grooming. Trauma, Violence, 8-Abuse, 18
(I), 83-97. https://dolorg/10.1177/1524838015591573
Elliott, M., Browne, K., & Kilcoyne, J. (1995). Child Sexual Abuse Prevention - What Offenders
Tell Us. Child Abuse 6. Neglect, 19(5), 579-594. https://doLorg/http://doi.10.1016/0145-
2134(95)00017-3
Finkelhor, D., Turner, H. A., Shattuck, A., & Hamby, S. L (2015). Prevalence of childhood
exposure to violence, crime, and abuse: Results from the national survey of children's
exposure to violence. JAMA Pediatrics, 169(8), 746-754. https://doLorg/10.1001/jamapedia
trics.2015.0676
Grath, A. N., & Birnbaum, H. J. (1978). Adult sexual orientation and attraction to underage
persons. Archives of Sexual Behavior, 7(3), 175-181. https://doLorg/175-181.10.1007/
BF01542377
Harms, IL, & van Dam, C. (1992). Child abuse prevention: What the educator needs to know.
Office of the Superintendent of Public Instruction.
International Centre for Missing and Exploited Children (2017). Online Grooming of Children
for Sexual Purposes: Model Legislation d Global Review. Retrieved from https://www.icmec.
org/wp-content/uploads/2017/09/Online-Grooming-of- Children_FINAL_9-18-17.pdf
Jackson, S., Newall, E., & Backett-Milburn, K. (2015). Children's narratives of sexual abuse.
Child 8- Family Social Work, 20(3), 322-332. https://doLorg/http://doi.10.1111/cfs.12080
Kaufman, K. L, Mosher, H., Carter, M., & Estes, L (2006). An empirically based situational
prevention model for child sexual abuse. In R. Wortley & S. Smallbone (Eds.), Crime
3502-033
Page 18 of 22
EFTA_00001680
EFTA00157021
18 0
GM. WINTERS ET AL
prevention studies: Vol. 19. Situational prevention of child sexual abuse (pp. 101-144).
Criminal Justice Press.
Knoll, J. (2010). Teacher sexual misconduct Grooming patterns and female offenders. Journal
of Child Sexual Abuse: Research, Treatment, & Program Innovations for Victims, Survivors, &
Offenders, 19(4), 371-386. https://doi.org/10.1080/10538712.2010.495047
Lang, It A., & Frenzel, It. R. (1988). How sex offenders lure children. Annals of Sex Research, 1
(2), 303-317. https://doLorg/10.1007/BF00852/302
Lanning, K. V. (2010). Child molesters: A behavioral analysis (Sth ed.). National Center for
Missing & Exploited Children.
Lanning, K. V., & Dietz, P. (2014). Acquaintance molestation and youth-serving organizations.
Journal of Interpersonal Violence, 29(15), 2815-2838. https://cloi.org/10.1177/
0886260514532360
Laws, D. It. (1989). Relapse prevention with sex offenders. Guilford Press.
Lawson, L (2003). Isolation, gratification, justification: Offenders' explanations of child
molesting. Issues in Mental Health Nursing, 24(6-7), 695-705. https://doi.org/10.1080/
01612840305328
Leclerc, B., Proulx, J., & Beauregard, E. (2009). Examining the modus operandi of sexual
offenders against children and its practical implications. Aggression And Violent Behavior, 14
(1), 5-12. https://doi.org/10.1016/j.avb.2008.08.001
Leclerc, B., Proulx, J., & McKibben, A. (2005). Modus operandi of sexual offenders working or
doing voluntary work with children and adolescents. Journal of Sexual Aggression, 11(2),
187-195. https://doi.org/10.1080/13552600412331321314
Leclerc, B., & Wortley, It. (2015). Predictors of victim disclosure in child sexual abuse:
Additional evidence from a sample of incarcerated adult sex offenders. Child Abuse &
Neglect, 43, 104-Ill. https://doi.org/10.1016/j.chiabu.2015.03.003
Letoumeau, E. J., Brown, D. S., Fang, X., Hassan, A., & Mercy, I. A. (2018). The economic
burden of child sexual abuse in the United States. Child Abuse d• Neglect, 79, 413-422.
https://doi.org/10.1016/j.chiabu.2018.02.020
Lynn, M. R. (1986). Determination and quantification of content validity. Nursing Research, 35
(6), 382-385. https://doLorg/10.1097/00006199-198611000-00017
Marshall, W. L, Smallbone, S., & Marshall, L E. (2015). A critique of current child molester
subcategories: A proposal for an alternative approach. Psychology, Crime & Law, 21(3),
205-218. https://doi.org/http://doi.10.1080/1068316K2014.925724
McAlinden, A. M. (2006). Setting 'em up: Personal, familial and institutional grooming in the
sexual abuse of children. Social el. Legal Studies, 15(3), 339-362. https://doi.org/10.1177/
0964663906066613
McAlinden, A. M. (2013). 'Grooming' and the sexual abuse of children. Retrieved from http://
blog.oup.com/2013/01/grooming-child-abuse/
Nash, M., & Williams, A. (2008). The anatomy of serious further offending. Oxford University
Press.
Olson, L. N., Daggs, J. L, Ellevold, B. L., & Rogers, T. K. K. (2007). Entrapping the innocent:
Toward a theory of child sexual predators' luring communication. Communication Theory,
17(3), 231-251. https://doi.orgffittp://doi.10.111141468-2885.2007.00294.x
Research Methods Knowledge Base (n.d.). Idea of construct validity. Retrieved from http://
www.socialresearchmethods.net/kb/considea.php
Salter, A. C. (1995). Transforming trauma: A guide to understanding and treating adult
survivors of child sexual abuse. Sage Publications, Inc.
Sethi, D., Bellis, M., Hughes, K., Gilbert, It. Mitis, F., & Gain, G. (2013). European report on
preventing child maltreatment. World Health Organization, Regional Office for Europe.
Sgroi, S. M. (1982). Handbook of clinical intervention in child sexual abuse. Lexington Books.
3502-033
Page 19 of 22
EFTA_00001681
EFTA00157022
JOURNAL Of CHILD SEXUAL ABUSE €
19
Shalccshaft, C. (2004). Educator sexual misconduct: A synthesis of existing literature (U.S.
Department of Education Document No. 2004-09). US. Department of Education.
Sheldon, K., & Howitt, D. (2007). Sex offenders and the Internet. John Wiley & Sons Ltd.
Shi, J., Mo, X., & Sun, Z (2012). Content validity index in scale development. Journal of Central
South University. Medical Sciences, 37(2),I52-155. doi:10.3969/j.issn.1672-7347.2012.02.007
Sullivan, J., & Beech, A. (2002). Professional perpetrators: Sex offenders who use their employ-
ment to target and sexually abuse the children with whom they work Child Abuse Review, II
(3), 153-167. https://doi.org/10.1002/car.737
van Dam, C. (2001). Ident
ng child molesters: Preventing child sexual abuse by recognizing the
patterns of the offenders. Haworth Maltreatment and Trauma Press/The Haworth Press.
Winters, G. M., & Jeglic, E. L. (2016). I knew it all along The sexual grooming behaviors of
child molesters and the hindsight bias. Journal Of Child Sexual Abuse: Research, Treatment,
d• Program Innovations For Victims, Survivors, 6. Offenders, 25(1), 20-36. https://doi.org/10.
1080/10538712.2015.1108945
Winters, G. M., & Jeglic, E. L (2017). Stages of sexual grooming: Recognizing potentially
predatory behaviors of child molesters. Deviant Behavior, 38(6), 724-733. https://doi.org/10.
1080/01639625.2016.1197656
Wyre, R (2000). Paedophile characteristics and patterns of behaviour. In C Main (Ed.), Home
truths about sexual abuse influencing policy and practice: A reader (pp. 49-69). Routledge.
Young, S. (1997). The use of normalization as a strategy in the sexual exploitation of children
by adult offenders. The Canadian Journal of Human Sexuality, 6(4), 285-295.
3502-033
Page 20 of 22
EFTA_00001682
EFTA00157023
20 G G. M. WINTERS ET AL
Appendix A
Models of Sexual Grooming.
Source
Sgrol (1982)
Stages of Sexual Grooming
Corresponding Stage of Current Model of
Grooming
Lang and Frenzel (19881
Budin and Johnson
(19891
Conte et al. (1989)
Christiansen and Blake
(19901
Applies to lathy-daughter
grooming
Berliner and Conte
(1990)
Elliott et al (19951
Young (1997)
Harms and van Dam
(1992)Nan Dam (001)
Brackeneldge 12001)
Applies to grooming In
sport
&Connell (2003)
Applies to online
grooming
Leclerc et al. (2005)
McAlinden (20061
Craven et al. (20071
Engagement phase
Sexual Interaction phase
Secrecy phase
Disclosure phase'
Suppression phase '
Gaining cooperation
Keeping the victim silent
Gaining access to victim
Trust
Keeping the victim silent
Gaining access to victim and
cooperation
Trust
Favoritism
Alienation
Secrecy
Boundary violation
Sexualaation
Justification
Cooperation for secrecy
Gaining access to victim
Trust
Cooperation
Keeping the victim silent
Gaining access to victim
Trust
Cooperation
identifying vulnerable child
Engaging la d in peer-like
environment
Desensitize child to touch
isolate
Make child feel responsible
Targeting a potential victim
Building trust and friendship
Developing isolation and control,
budding loyalty
initiation of sexual abuse and securing
secrecy
Friendship-forming
RelationsNp-forming
Risk assessment
Exclusivity
Sexual
Gaining trust
Cooperation
Keeping the victim silent
Befriend a potential victim
Cultivate a 'special friendship'
Use of 'forbidden fruit'
Desensitization
Gaining access to the child
Ensuring the child's compliance
Maintaining secrecy to avoid
disclosure
Trust Development
Desensitization to Sexual Content and
Physical Contact
Post-Abuse Maintenance
Gaining Access and isolation
Post-Abuse Maintenance
Gaining Access and isolation
Trust Development
Post-Abuse Maintenance
Gaining Access and isolation
Trust Development
Trust Development
Gaining Access and isolation
Post-Abuse Maintenance
Desensitization
Desensitization
Desensitization
Post-Abuse Maintenance
Gainng Access and isolation
Trust Development
Trust Development
Post-Abuse Maintenance
Gaining Access and isolation
Trust Development
Post-Abuse Maintenance
Victim Selection
Trust Development
Desensitization
Gainng Access and isolation
Post-Abuse Maintenance
Victim Selection
Trust Development
Gainng Access and isolation
Desensitizatx•VPost-Abuse Maintenance
Trust Development
Trust Development
Victim Selection
Gaining Access and isolation
Desensitization
Trust Development
Gaining Access and isolation
Post-Abuse Maintenance
Gaining Access and isolation
Trust Development
Desensitization
Desensitization
Gaining Access and isolation
Trust Development
Post-Abuse Maintenance
(Continued)
3502-033
Page 21 of 22
EFIA_00001683
EFTA00157024
JOURNAL Of CHILD SEXUAL ABUSE 0
21
(Continued).
Source
Stages of Sexual Grooming
Corresponding Stage of Current Model of
Grooming
Olson et aL (2007)
Leclerc et al. 12009)
tanning 12010
Gaining access
Cycle of entrapment
Intervening
Outcome
Gaining access to victim
Gaining victim's trust
Gaining cooperation In sexual activity
Maintaining silence following abuse
Identifying a target
Gaining access to the victim
Lowering inhibitions
Gaining and maintaining control
Victim SelectiaVGaining Access and Isolation
Trust Development/Gaining Access and
Isolation
Post-Abuse Maintenance
Cresensiti2anco
Victim Selection
Trust Development
Oesensinzatico
Post-Abuse Maintenance
Victim Selection
Gaming Access and Isolation
Trust Development
Desensitisation
No corresponding stage in the current model
3502-033
Page 22 of 22
EFTA_00001684
EFTA00157025
Document Preview
PDF source document
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
Document Details
| Filename | EFTA00157004.pdf |
| File Size | 1493.2 KB |
| OCR Confidence | 85.0% |
| Has Readable Text | Yes |
| Text Length | 61,303 characters |
| Indexed | 2026-02-11T10:59:20.890719 |