i Routledge Taylor & Francis Group CHILD . meen! Journal of Child Sexual Abuse ISSN: (Print) (Online) Journal homepage: https://www.tandfonline.com/loi/wesa20 Validation of the Sexual Grooming Model of Child Sexual Abusers Georgia M. Winters , Elizabeth L. Jeglic & Leah E. Kaylor To cite this article: Georgia M. Winters , Elizabeth L. Jeglic & Leah E. Kaylor (2020): Validation of the Sexual Grooming Model of Child Sexual Abusers, Journal of Child Sexual Abuse, DOI: 10.1080/10538712.2020.1801935 To link to this article: https://doi.org/10.1080/10538712.2020.1801935 & Published online: 02 Oct 2020. (Fe Submit your article to this journal @ dtl Articte views: 33 m a] View related articles 7 ® View Crossmark data? Full Terms & Conditions of access and use can be found at https://www.tandfonline.com/action/journallnformation?journalCode=wcsa20 3502-033 Page | of 22 EFTA_00001663 EFTA00157004

--=PAGE_BREAK=--

JOURNAL OF CHILD SEXUAL ABUSE i Routledge https/ol.org/10.1080/10538712.2020.1801935 Taylor & Francis Group DD Cock tor updaton | Validation of the Sexual Grooming Model of Child Sexual Abusers Georgia M. Winters*, Elizabeth L. Jeglic®, and Leah E. Kaylor? “School of Psychology, Fairleigh Dickinson University, Teaneck, NJ, USA; “Psychology Department, John Jay College of Criminal Justice, New York, NY, USA ABSTRACT ARTICLE HISTORY Sexual grooming has been deemed an integral part of the child —_—Received 10 January 2020 sexual abuse process. However, there has yet to be a universally “Revised 25 March 2020 accepted model for this process and, as a consequence, there is "cepted 19 May 2020 no clear understanding of which behaviors constitute sexual KEYWORDS grooming. One proposed model of in-person sexual grooming Sexual grooming; child outlined five stages of the process: 1) victim selection, 2) gaining sexual abuser; child sexual access and isolating a child, 3) trust development, 4) desensiti- abuse; sex offenses zation to sexual content and physical contact, and 5) mainte- nance following the abuse. The present study sought to validate this Sexual Grooming Model (SGM) and identify behaviors that may be employed during each stage of the process. First, a thorough review of the literature was conducted to generate a comprehensive list of sexual grooming behaviors (mn = 77). Second, 18 experts in the field completed a survey which asked them to rate the extent to which each of the five stages and potential grooming behaviors were relevant to the sexual grooming process. Results provided support for the SGM and produced 42 behaviors that were considered to be grooming tactics within these stages. From this, the first validated, com- prehensive model of in-person sexual grooming is proposed. The article concludes with a discussion of the implications and future directions in the field. Child sexual abuse (CSA) is a serious public health issue with an estimated lifetime prevalence ranging between 12-27% for girls and 4-5% for boys in the United States and Canada (Briere & Eliott, 2003; Canadian Centre for Justice Statistics, 2017; Finkelhor et al., 2015; Letourneau et al., 2018). In the United States, individuals incarcerated for sexual offenses comprise 12% of state inmate populations (Department of Justice, 2014). Notably, however, preva- lence rates published by criminal justice agencies often underestimate the severity of this problem due to low rates of victim disclosure and formal reporting of cases (Leclerc & Wortley, 2015; Sethi et al., 2013). While there are numerous reasons CSA may go undetected or unreported, it has been suggested that a perpetrators’ manipulation of the victims before and after the CONTACT Georgia M. Winters ° georgiawinters82@gmail.com [os] School of Psychology, Fairleigh Dickinson University, Teaneck, NJ 07666 © 2020 Taylor & Francs 3502-033 Page 2 of 22 EFTA_00001664 EFTA00157005

--=PAGE_BREAK=--

2 @& GM. WINTERS ET AL. abuse, known as “sexual grooming,” may decrease the likelihood of its detec- tion and disclosure (Van Dam, 2001). It is estimated that almost half of the cases of CSA involve some element of sexual grooming (Canter et al., 1998). While there has yet to be a universally agreed upon definition in the literature, the term sexual grooming typically refers to the process by which an offender skillfully manipulates a potential victim into situations in which sexual abuse can be more readily committed, while simultaneously preventing disclosure (Van Dam, 2001; Wyre, 2000). Importantly, it is unclear what specific behaviors constitute sexual grooming, given that the behaviors may not be unlike normal adult/child interactions (Craven et al., 2006), and there has yet to be a validated model of the sexual grooming process. The lack of a comprehensive understanding of sexual grooming produces confusion amongst clinicians, law enforcement, attorneys, researchers, and community members alike. As such, the present study sought to establish content validity of a sexual grooming model, including both the stages and specific behaviors that are involved in the process. Sexual grooming Sexual grooming has become synonymous with CSA in the past several decades (McAlinden, 2013). The goals of grooming are to gain initial coopera- tion of the victim, decrease the likelihood of discovery, and increase the likelihood of future sexual contact (Lanning & Dietz, 2014). These pre- offense behaviors are thought to be a deliberate process that is highly complex and nuanced, with behaviors often mirroring normal adult/child interactions (Knoll, 2010; McAlinden, 2013). Therefore, it is difficult to establish represen- tative prevalence rates of the number of child sexual abusers who employ sexual grooming tactics in the offense process. Of the few studies that have tackled this question, it is estimated between 30 to 45% of child sexual abusers groom their victims (Canter et al., 1998; Groth & Birnbaum, 1978). Grooming can encompass varying behaviors which may differ based on the characteristics of the offender (e.g., age of the offender) and the victim (e.g., age or gender of the victim), as well as contextual factors (e.g., “effectiveness” of the grooming tactics, the offender's relationship to the victim, cultural factors; Kaufman et al., 2006). Notably, sexual grooming can occur both in- person or online. Online and off-line grooming processes may differ in important ways, as there are some behaviors that are not possible online (e.g., providing the victim with alcohol; Elliott, 2017) and thus, the present study will focus solely on in-person grooming behaviors. It should also be noted that individuals who sexually abuse children may groom themselves (personal grooming) and other people (familial and institu- tional/community grooming), in addition to the child. Personal grooming involves the process whereby the offender grooms themselves in order to 3502-033 Page 3 of 22 EFTA_00001665 EFTA00157006

--=PAGE_BREAK=--

JOURNAL OF CHILD SEXUAL ABUSE () 3 Table 1. Sexual grooming model. Victim Selection (n = 9) ICV Compliant/trusting of adults 078° Lacks confidence/low self-esteem oB9* Lonely isolated o78* Troubled oso Needy 039° Unwanted/unloved oso Not close to parents/parents are not 078" resources for them Single mothers/need of “father figure” 089° Lack of supervision 0.94 Gaining Access and Isolation (n = 5) Involvement in youth-serving organizations 0383" Manipulate family to gain access to child 1.00° Activities alone with children/excludes adults os" Overnight stays/outings o94* Separate child from peers and family 089 Trust Development (a = 10) Charming/nice/likable 083° Insider status/‘gaod reputation/"pillar 078" of the community” Affectionate/loving 1.00" Giving the child attention 1.00° Favoritism/"special relationship” os9* Compliments 089° Spending time with child/communicating 0.94 often Engage in childlike activities (e.., stories, 089° games, sports, music) Rewards/privileges (e.g., gifts, toys, treats, 094 money, trips) Provided drugs and/or alcohol oso" Desensitization to Sexual Content and Physical Contact (n = 10) Ask questions about child's sexual oso experience/relationships Talk about sexual things they themselves 0.94 had done Inappropriate sexual language/dirty jokes 083° Teach child sexual education 039° Use of accidental touching/distraction 089° while touching Watch the child undressing 078° Exposing naked body 0.78" Show child pomography magazines/videos 083° Seemingly innocent/non-sexual contact os4* Desensitize to touch/increasing 1.00" sexual touching Post-Abuse Maintenance Behaviors (n = 8) Told nat to tell anyone what happened 089° Encouraging secrets oso | love you/you’re special 1.00° Rewards/bribes/avoid punishment 089° Persuaded the child it was oso acceptable/normal behavior Misstated moral standards regarding touch 083" Victim made to feel responsible 0.78" Threats of abandonment/rejection/famnily 083" breaking up Items Not Included in the Five-Stage Model (n = 35) (Continued) 3502-033 Page 4 of 22 EFTA_00001666 EFTA00157007

--=PAGE_BREAK=--

4 @ GM. wanNTERs ET AL. Table 1. (Continued). Victim Selection (n = 9) ICI Selects a child who has already been victimized 072 Selects a child who Is depressed/unhappy 072 Talks to the child on their level 072 Say things about the child's body/dress 072 Goes into child's bedroom while the child is in there 072 Goes into the bathroom while child is in there 072 After the abuse, threatens victim 072 Gains access after being approached by a child/had a child recruit 067 other children Treats the child like an adult 067 Engages in verbal threats/frighten/intimidate/coercion of the child 067 Violates the child's privacy 067 Has the child observe sexual behavior 067 Selects a child who Is cognitively impaired/special needs/learning 061 disability Selects a child who has drug or alcohol abusing parents 061 Looks at/inspects child’s body for development 061 Selects a child who has economic problems/parents working a lot 056 Gives the child rides home 056 Babysits the child 056 Gains access to children through public places (e.g., malls, arcades) 056 Takes photos/videos of the child 056 Selects a child who Is young or small/slim 0s0 Selects a child who parents are divorced/marital problems 0s50 Selects a child who has a mother who was sexually abused 050 Uses size/authority/strength against the child 050 Selects a child who Is attractive/pretty (e.g, hair type, skin color) 044 Shows helpfulness to others O44 Looks at child in a funny/sexual way 028 After the abuse, the offender assumes the child's silence 028 Selects a child based on his/her clothing 022 Has the child view violence against others 022 After the abuse, the offender punishes the child 022 Punishes the child or withholds privileges O17 Use of physical force/uses weapons against the child (e.g, push, O17 shove, spank} Presents as mean/rude to the child O11 After the abuse, the offender moves on to the next victim O11 * indicates significant results justify, minimize, or deny their behaviors (Craven et al., 2006; McAlinden, 2006). The purpose of familial grooming is to gain the trust of caregivers in order to increase access to the victim and decrease the likelihood of disclosure. An offender may also engage in community or institutional grooming, such as becoming a respected member of society or seeking careers or volunteer positions that allow access to children (e.g., Boy Scouts, schools, foster care; McAlinden, 2006; Sullivan & Beech, 2002; Van Dam, 2001). Given the complicated nature of identifying sexual grooming, it has been proposed that recognizing sexual grooming behaviors following the disclosure of the sexual offense is much easier than prospective identification (Craven et al., 2006). Researchers have found there is a hindsight bias associated with sexual grooming of children, in which individuals tend to overestimate the likelihood that they could have predicted these behaviors were taking place 3502-033 Page 5 of 22 EFTA_00001667 EFTA00157008

--=PAGE_BREAK=--

JOURNAL OF CHILD SEXUAL ABUSE (@) 5 after they learn an individual has committed a sexual offense (Winters & Jeglic, 2016). Importantly, in one study, Winters and Jeglic (2017) found that the general public has trouble identifying potentially predatory sexual grooming behaviors. Given the difficulty in identifying sexually versus non-sexually driven behaviors with children, gaining a better understanding of sexual grooming is integral to improved prevention and treatment efforts. Legal definition of sexual grooming It should be noted that the legal definition of sexual grooming is not necessa- rily synonymous with concept of in-person sexual grooming as outlined in the scientific and theoretical literature. By 2017, 63 countries had enacted legisla- tion related to grooming that focuses solely on the online solicitation of minors (often referred to as online sexual grooming; International Centre for Missing and Exploited Children, 2017). Notably, many of these laws do not account for sexual grooming that can occur in-person. Other countries have developed legislation that could be applied both to online and in-person grooming cases. For example, in the United States, section §2422 of the federal Criminal Code describes a law whereby an individual who “knowingly per- suades, induces, entices, or coerces any individual to travel in interstate or foreign commerce, or in any Territory or Possession of the United States, to engage in prostitution, or in any sexual activity for which any person can be charged with a criminal offense, or attempts to do so” can be fined or imprisoned (Coercion and Enticement, 18 U.S.C. 2422). While the aforemen- tioned law pertains particularly to cases involving sex trafficking, several states have followed suit and enacted similar laws without the requirement of “interstate or foreign commerce” which can then more generally apply to cases of CSA involving grooming. It is important to have a legal definition of sexual grooming for the purposes of prosecution of these crimes; however, legal definitions typically lack specificity (e.g., what behaviors that would be indicative of grooming). Further, and most importantly, in order to prevent grooming-based CSA, it is vital to go beyond the legal definitions to better understand the interaction between the victim, offender, and context of the offense (e.g., Nash & Williams, 2008). Thus, the grooming behaviors analyzed within this paper will be clearly differentiated from that of the already accepted legal definitions. Models of sexual grooming There have been numerous attempts to identify the steps involved in the sexual grooming process and to develop an overarching model of these behaviors (see Appendix A); however, none of these models have been empirically validated. One of the most widely cited models of sexual grooming authored by 3502-033 Page 6 of 22 EFTA_00001668 EFTA00157009

--=PAGE_BREAK=--

6 © G.M.wanNTERs ETAL. McAlinden (2006) indicates, as described above, that offenders groom not only children, but also themselves (ie., personal grooming) and family and community members who act as gatekeepers to the children. Another widely cited grooming framework by Elliott (2017) - the Self-Regulation Model - draws upon the strengths and limitations of previous models of grooming. The model is comprised of two phases: 1) the potentiality phase includes rapport building, incentivization, disinhibition, and security management; and 2) the disclosure phase which describes how gains made in the first phase enable the perpetrator to desensitize the victim to sexual abuse. Although the self- regulation model of sexual grooming advanced the field, this model is not easily understood or applied, and thus, a more simplified model is greatly needed to enhance communication across fields. In an effort to address some of the limitations of previous models of grooming behavior, Winters and Jeglic (2017) reviewed the extant grooming literature and developed a model of grooming comprised of behaviors that could be observable to others and measurable, and thus informative in pre- vention and detection of sexual abuse. This five-stage model, hereafter referred to as the Sexual Grooming Modal (SGM), draws upon the commonalities identified in several of the previously proposed models (see Appendix A), as well as identifying gaps of missing information. For example, some previously proposed models did not address important components of grooming, such as victim selection or post-abuse maintenance (e.g., Brackenridge, 2001; Sheldon & Howitt, 2007). Additionally, other models have limited utility for public prevention initiatives as they are theoretically complex and thus difficult to apply in real-world settings (e.g., Elliott, 2017; Olson et al., 2007). Winters and Jeglic (2017) model of grooming behavior proposes five overarching stages that may be involved in the complex process of sexual grooming, including: 1) selecting a victim; 2) gaining access and isolating the victim; 3) developing trust with the child and others (e.g., caretakers, community members); 4) desensitizing the child to sexual content and physical touch; and 5) main- tenance behaviors following the commission of the abuse. Below, each stage is described with support from the theoretical literature. Victim selection First, several models of grooming propose that selecting a vulnerable victim is the initial step in the grooming process (e.g., Harms & van Dam, 1992; Lanning, 2010). It has been proposed that a vulnerable child may be identified based on physical characteristics (e.g., child who is perceived as attractive, young, or small; Conte et al., 1989; Elliott et al, 1995), or emotional or psychological needs (e.g., child who is perceived as trusting, lacking self- esteem, isolative, neglected, troubled, or in need of affection; Elliott et al., 1995; Kaufman et al., 2006; Knoll, 2010; Shakeshaft, 2004). Additionally, an 3502-033 Page 7 of 22 EFTA_00001669 EFTA00157010

--=PAGE_BREAK=--

JOURNAL OF CHILD SEXUAL ABUSE @) 7 offender may look to the child’s family circumstances in the victim selection process (e.g., lack parental supervision, parental discord, parental mental health/substance use issues; Craven et al., 2006; Jackson et al., 2015; Kaufman et al., 2006). Gaining access and isolation Second, many of the prior models identify that an offender seeks to gain access to the targeted child and isolate him/her from others. Indeed, Lanning (2010), Craven et al. (2006), Olson et al. (2007), and Leclerc et al. (2009) all proposed models that include a stage whereby an offender gains access to the victim. Gaining access to a potential victim may include becoming involved in youth- serving organizations (e.g., Lanning & Dietz, 2014), frequenting public places with children (e.g., Kaufman et al., 2006), or manipulating the family in order to gain access to the child (e.g., Knoll, 2010; Lanning & Dietz, 2014). Once an offender has gained access to a child, they often work to isolate the child physically and emotionally from their family and peers (e.g. Craven et al., 2006; Lawson, 2003). For example, an offender may seek to organize activities that physically isolate the child all the while excluding adult involvement, such as overnight stays, giving the child a ride home, or babysitting the child (e.g., Kaufman et al., 2006). Trust development Third, after selecting and gaining access to a victim, prior models describe a stage in which the offender works toward deceptively developing trust and cooperation with the child (Craven et al., 2006; Leclere et al., 2009; Olson et al., 2007). While some models incorporate a broad stage that refers to the overarching goal of trust development, others have outlined specific behaviors that may be used to gain the trust. An offender may try to present as likable and charming, eventually earning insider status and a good reputation in the community (e.g., Lanning & Dietz, 2014). The offender may make the child feel loved, use bribes or inducements, exploit his/her vulnerabilities, engage in peer-like activities, and befriend the child (Berliner & Conte, 1990; Harms & van Dam, 1992; Leclerc et al., 2009; Marshall et al., 2015). Additionally, literature has identified that some offenders may provide the child with drugs or alcohol (e.g., Bennett & O’Donohue, 2014), which would be most commonly used with older victims. Desensitizing the child to sexual content and physical contact Fourth, there appears to be a stage that involves the introduction of sexual conversation and touch, with the aim of desensitizing the child to these behaviors (Berliner & Conte, 1990; Harms & van Dam, 1992; McAlinden, 2006; Olson et al., 2007). An offender may introduce sexualized topics into 3502-033 Page 8 of 22 EFTA_00001670 EFTA00157011

--=PAGE_BREAK=--

8 @& GM. WaNTERS ETAL. discussions, such as telling inappropriate jokes, providing sexual education, or engaging in sexual conversations (Knoll, 2010; McAlinden, 2006; Olson et al., 2007; Wyre, 2000). The offender may violate the child’s privacy (e.g., spying, sneaking views of the child; Bennett & O’Donohue, 2014) or engage accidental touching (Harms & van Dam, 1992; Olson et al., 2007). Moreover, literature commonly refers to a process by which an offender desensitizes the child to touch by gradually increasing physical contact (Berliner & Conte, 1990; Harms & van Dam, 1992; McAlinden, 2006). For example, the individual may begin using tactics such as hugging or tickling, then gradually increasing contact over time to wrestling or massages. Post-abuse maintenance Finally, an offender may engage in maintenance behaviors which are used to continue ongoing abuse with the victim and/or prevent disclosure (e.g., Craven et al., 2006; Harms & van Dam, 1992). It has been suggested that this stage involves the offender encouraging the child to maintain secrets and not disclose the abuse (Craven et al., 2006; Harms & van Dam, 1992). An offender may try to persuade the child that the sexually abusive behavior is acceptable (e.g., Jackson et al., 2015), misrepresent standards for appropriate touching (e.g., Bennett & O’Donohue, 2014), or make the child feel respon- sible for the abuse (e.g., Harms & van Dam, 1992). Affection may also be employed by telling the child they love them or the child is special (Lang & Frenzel, 1988), giving the child bribes or rewards (e.g., Lang & Frenzel, 1988; Lawson, 2003; Salter, 1995; Shakeshaft, 2004), or enforcing or withholding punishment (Lawson, 2003). While Winters and Jeglic (2017) SGM addresses the limitations of previous models, similar to all the other past models of sexual grooming, this model has not yet to be validated. Given that isolated grooming-like behaviors in and of themselves may not be indicative of sexual abuse, it is necessary to establish a model of the stages of grooming to understand the larger process in order to inform detection and prevention efforts. Thus, the present study aimed to be the first to empirically validate a model of sexual grooming and identify what specific behaviors constitute grooming. The present study The present study aimed to establish the content validity of the proposed SGM (Winters & Jeglic, 2017) and identify what behaviors may be indicative of sexual grooming. To this end, experts in the field were asked to identify whether they believed the five stages of the SGM are part of the grooming process and what specific behaviors (identified from a thorough literature review) might fall under each of these proposed stages. Given the lack of 3502-033 Page 9 of 22 EFTA_00001671 EFTA00157012

--=PAGE_BREAK=--

JOURNAL OF CHILD SEXUAL ABUSE () 9 previous empirical research in this area, the study was exploratory in nature and thus, no specific hypotheses were made. Method Part 1 Literature review A comprehensive literature review was conducted to identify potential groom- ing tactics that have been identified in previous publications. Online searches for articles were conducted through PsycINFO, Criminal Justice abstracts with Full Text, Web of Science, and Medline Complete. The search terms utilized included: 1) Sex* groom* and 2) Child* groom’. Sources were also found by reviewing the reference lists of sources obtained through these online database searches. Searches were limited to articles in English language and peer- reviewed sources. A total of 1,363 sources resulted from literature search of the four search engines and reference lists. These sources were screened using a review of titles and abstracts, which resulted in the collection of 69 initial sources. Following a full-text review of the sources, 51 articles and books were identified as relevant. These sources all contained information regarding sexual grooming behaviors enacted by in-person child sexual abusers (i.e., online sexual grooming literature was excluded). The 51 articles and books were thoroughly reviewed, and each unique grooming behaviors was recorded in order to produce a comprehensive list of possible grooming behaviors. Through this process, a total of 77 potential grooming behaviors were identified.’ Part 2 Participants and procedures Content validity of the five-stage SGM and 77 grooming behaviors was examined by having a list of “experts” in the field complete an online survey. The list of experts was developed by compiling a list of authors ( = 99) on the articles and books that were published in the area of sexual grooming (described above). Extensive research was conducted through the use of Internet search engines and contact information listed within the literature to identify the e-mail addresses of the authors. A total of 56 e-mail addresses were obtained. Following sending e-mail invitation to participate in the study, 12 e-mail addresses were inactive which resulted in a total of 44 potential participants. Three rounds of e-mails were sent to each e-mail address “it should be noted that the authors also created an a priori model which identified which of five stages each behavior fell under, this was later utilized in making final determinations regarding what stage of the grooming process each relevant (as identified by experts in the field) grooming behavior would likely be utilized. 3502-033 Page 10 of 22 EFTA_00001672 EFTA00157013

--=PAGE_BREAK=--

10 @&) GM.WINTERS ET AL requesting participation in the expert review which involved participation in a 30-minute survey. If the individual agreed to participate, they were asked to complete the Expert Review Survey (see below). A total of 18 participants completed the survey (12 males; 6 females), which represented a 40.9% response rate. In regard to participant age, four indivi- duals were between the ages of 41-50, six between the ages of 51-60, and eight over the age of 60. The majority of experts obtained a Ph.D. (m = 15), two had a Master’s degree, and one was a current Ph.D. student. There was a range of fields in which these degrees were earned: psychology (n = 8), criminal justice (n = 2), and one individual each from the fields of education, sociology, public health, social work, communication, theology, criminology, and psychology/ sociology. Experts reported the area, or areas (respondents could select more than one), that best described their experience working with child sexual abusers, which included empirical research (n = 16), clinical practice (n = 10), publishing theoretical articles/chapters on the topic (n = 14), and other (n = 3; ie., employee of state correctional system, consultation on investigations, investigative journalist). The experts reported a mean number of years of experience with empirical research (n = 18), publishing theoretical pieces (n = 17), and clinical experience (n = 10) related to grooming as 24.67 years (range = 2-48), 15.50 years (range = 3-48), and 22.71 years (range = 2-45) years, respectively. All participants (n = 18) had published an empirical research article related to grooming, with 12 individuals reporting between 1-10 publications, two reporting 11-20 publications, three with more than 20 publications, and one participant indicated that they were not certain how many publications they had. For the 17 people who had experience publishing theoretical articles/chapters on sexual grooming, the mean number of publications was 7.00 (range = 1-20). Of the 10 participants who had clinical experience with sex offenders, six had 50 or more clients, two had 15-50 clients, one had 5-15 clients, and one had 0-5 clients. Expert review survey First, participants were presented with 4-point Likert scale items inquiring about the relevance (1 = not relevant, 2 = somewhat relevant, 3 = relevant, 4 = very relevant) of the five proposed stages of grooming. Second, the participants rated the relevance of each item from the pool of 77 grooming behaviors identified by the literature review using a 4-point Likert scale (1 = not relevant, 2 = somewhat relevant, 3 = relevant, 4 = very relevant). Participants were also asked for each item to select one or more stages of the grooming process the behavior fell under (ie, Victim Selection, Gaining Access, Trust Development, Desensitization, and Post-Abuse Maintenance, other, or none). Lastly, participants completed a series of demographic ques- tions (e.g., age, gender, degree, field of study, clinical, publication, and research experiences). 3502-033 Page 11 of 22 EFTA_00001673 EFTA00157014

--=PAGE_BREAK=--

JOURNAL OF CHILD SEXUAL ABUSE () 11 Results Analytic strategy The Content Validity Index (CVI) is a method originally proposed by Lynn (1986), which utilizes feedback from experts in the field to determine what content is relevant to a construct; this is a commonly used method in social science research (Research Methods Knowledge Base, n.d.). In this case, CVI calculations were used to determine what stages and behaviors are relevant to the process of sexual grooming. First, as noted above, the relevance of the five stages and potential grooming behaviors were rated by experts using a 4-point Likert scale (1 = not relevant, 2 = somewhat relevant, 3 = relevant, 4 = very relevant). Second, these ratings were used to determine which stages/behaviors should be retained (i.e., they were deemed related to the construct of grooming by the experts) and which should be rejected (i.e., they were deemed not related to the construct of grooming by the experts) through the utilization of CVIs, which are calculations that examine the proportion of experts who rated the item as relevant. The CVI for each item (I-CVI) is calculated by dividing the number of experts who believed the item was relevant (either a 3 or 4 on the Likert scale) by the total number of content experts (in this case, n = 18). It has been suggested that the I-CVI for an item should be greater or equal to 0.78 in order to be included (Shi et al., 2012). Stages of sexual grooming Experts were asked to rate the relevance for each of the five stages of the sexual grooming process as proposed by Winters and Jeglic (2017). Results revealed an I-CVI index of.94 (17/18 experts) for the stages of Gaining Access (M = 3.78, SD = .55), Trust Development (M = 3.72, SD = .58), and Desensitization (M = 3.50, SD = .62). Similarly, an I-CVI index of .89 (16/18 experts) was found for the stages of Victim Selection (M = 3.56, SD = .70) and Post-Abuse Maintenance (M = 3.39, SD = .70). Overall, the I-CVIs for each of the proposed stages exceeded the cutoff score of 0.78, suggesting that all five stages are believed to be relevant to the sexual grooming process. Sexual grooming behaviors An examination of the I-CVIs for the 77 potential grooming behaviors revealed that 42 items were considered by the expert panel as relevant to the construct of sexual grooming (I-CVIs ranged between .78-1.0; see Table 1). This represents a retention rate of 54.5% from the original items. An examination of which stage of the grooming process the experts believed the behavior belonged in was conducted. For each item that was deemed relevant (n = 42), the stage that the most experts (i.e., over 50%) believed the 3502-033 Page 12 of 22 EFTA_00001674 EFTA00157015

--=PAGE_BREAK=--

12, @ GM.WINTeRs ET AL behaviors to fall under was recorded. These expert-rated categorizations were compared to the theoretical categorization identified by the researchers (see footnote on page 11). Results suggested that 39 of the 42 relevant items were deemed by the majority of the experts to fall into the original a priori model developed by the authors. One item (“Threatens the child with abandonment/ rejection/family breaking up”) was rated by the majority of participants (n = 14) to fall under the Post-Abuse Maintenance stage, not the theoretically suggested Trust Development stage. Given the agreement among the vast majority of experts, this item was relocated to the Post-Abuse Maintenance stage. Two items (“Becomes involved in activities alone with children/excludes adults” and “Presents as charming/nice/likable to others”) were rated by the experts as equally belonging to the Gaining Access and Trust Development stages. Consistent with the theoretical literature and a priori model, these items were deemed to fall under the Gaining Access and Trust Development stages, respectively. See Table 1 for the final grooming behaviors organized into the five-stages of the SGM. Discussion The present study aimed to establish content validity for the SGM proposed by Winters and Jeglic (2017) and identify which behaviors are involved in each stage of the grooming process. The results, as determined experts in the field, revealed consensus that the five stages proposed by Winters and Jeglic (ie. Victim Selection, Gaining Access, Trust Development, Desensitization, and Post-Abuse Maintenance) are all essential components of the sexual grooming process. Moreover, findings from the study suggest there are 42 grooming tactics/behaviors that experts identified as belonging to these stages. Overall, the results of the present study resulted in the content validation of a comprehensive and parsimonious model of sexual grooming. Stages of sexual grooming A major benefit of the SGM’s framework is that it is intuitive, easily under- stood, and backed by a foundation of literature. Having a comprehensive, yet easily understood, framework is vital, as information about grooming must be distributed to various consumers (e.g., law makers, researchers, parents, clin- icians, criminal justice professionals). For example, parents could utilize this model to be vigilant in monitoring for potentially predatory behaviors of those around their child, while clinicians can use the model to assist in assessment and treatment of victims or offenders of CSA. As such, it is important to have a model of grooming that allows for education across fields and different types of consumers. 3502-033 Page 13 of 22 EFTA_00001675 EFTA00157016

--=PAGE_BREAK=--

JOURNAL OF CHILD SEXUAL ABUSE () 13 While establishing the content validity of the SGM is a major advance in understanding grooming behaviors, it remains but a first step. With the foundation provided by the findings of the current study, it is necessary to continue to establish empirical support for the model and begin to assess other facets of grooming behavior. For example, it is unknown whether every offender progresses through each of the five stages, or whether there is always a linear progression through the stages. For instance, if an offender already has preexisting access to the potential victim (e.g., a parent), then they are less likely to employ behaviors in the Victim Selection or Gaining Access stages. Moreover, it may be that the offender moves fluidly between stages or skips stages if not deemed necessary. As an example, if an offender utilizes behaviors in the Desensitization stage and then notices the child resisting, they may revert back to engaging in more behaviors in the Trust Development stage. Similarly, the proposed model does not assume that an offender may only utilize behavior within one stage at a given time; that is, an offender may simultaneously employ behaviors found in the Trust Development (e.g., show- ing the child affection) and Desensitization (e.g., using seemingly innocent touch) stages. Taken together, future research should aim to examine the types, and most common, progression of the stages during the offense process. Sexual grooming behaviors Overall, the study was the first to obtain data related to relevance of various behaviors to the grooming process. This is an important addition to the litera- ture given that it has previously been unclear what behaviors constitute groom- ing, especially given that many grooming behaviors in and of themselves are not unlike normal adult/child interactions. Identifying the 42 behaviors that were deemed relevant to the sexual grooming process by experts in the field is an important advance. While the data has yet to be empirically validated using cases of CSA, an expert-review validation study is the first step in better understanding what behaviors are indicative of grooming. It should be noted, however, that we did not ask experts to provide items that they believed to be indicative of the stages of sexual grooming. Rather, the items were provided to them to endorse. This could lead to a reification effect in that that the experts may have endorsed items as relevant to the stages of grooming given the items were derived from existing theoretical grooming literature, yet the items they endorsed may not in fact represent concrete behaviors actually utilized by perpetrators in CSA cases. However, if that were the case, then the majority of items would have been retained as relevant in the study as they were extracted from the grooming literature, when in the study we found that only about half of the theoretically- linked items were deemed not to be indicative of grooming. Thus, it is likely that the experts were critically evaluating the items to determine which were applic- able to real-world cases. 3502-033 Page 14 of 22 EFTA_00001676 EFTA00157017

--=PAGE_BREAK=--

14 @& GM.WINTERs ET AL Taken together, a major strength of the SGM is that the behaviors that are observable and measurable, although it remains unclear how to differentiate these behaviors from innocent contact with children. Nonetheless, we have garnered a greater understanding, using expert consensus, of actions that may be employed by a would-be child sexual abuser. That is, a validated model will assist in identifying constellations of behaviors that are considered grooming, which is a necessary component of preventing CSA. Moreover, the SGM provides a framework for the development of an instrument that can be used to measure sexual grooming, which can help identify and quantitatively measure the likelihood that a constellation of behaviors constitutes grooming. Implications of the sexual grooming model Overall, the results of the study have implications for prevention, intervention, and prosecution. First, and most importantly, improved understanding of sexual grooming can contribute to efforts to identify the abuse before it has occurred (Craven et al., 2007). Having a comprehensive and understandable model of sexual grooming comprised of specific observable behaviors can be used to educate parents and individuals who work with children on how to recognize potential sexual grooming behaviors prior to the abuse. For exam- ple, parents would benefit from learning more about grooming tactics so that suspicion may be raised if clusters, high frequency use, or the most severe of these potentially worrisome behaviors are present in a person spending time with children. Similarly, individuals working closely with children (e.g., tea~ chers, coaches) can better monitor for grooming behaviors and notify guar- dians or proper authorities should any concerning behaviors arise. The information gleaned from the study could also be used to educate children regarding appropriate versus inappropriate behaviors with adults in their life. Importantly, we are not suggesting that every individual who engages in any of these behaviors individually is engaging in grooming. The intention of the SGM is not to label or pathologize innocent, caring interactions between children and adults, but to encourage increased vigilance and awareness in warranted instances where several of these behaviors are observed together. As noted previously, grooming differs from normal interactions due to the underlying, deviant inten- tion, which may be understandably difficult to identify. While researchers are still working to understand, distinguish, and clarify this distinction, these early find- ings can nonetheless assist in broadly understanding grooming strategies and behaviors, and raising reasonable concerns in the face of potentially worrisome behaviors occurring at high frequency or severity. The SGM can also be helpful to clinicians working with individuals who have committed sexual abuse of a child. Given there is evidence that offenders plan their offenses (Laws, 1989) and engage in consistent patterns of offense- related behaviors with multiple victims (Abel et al., 1987), it is necessary to 3502-033 Page 15 of 22 EFTA_00001677 EFTA00157018

--=PAGE_BREAK=--

JOURNAL OF CHILD SEXUAL ABUSE () 15 target these pre-offense grooming behaviors in treatment. If an offender groomed their victims, a therapist could integrate this framework to help the individual established a better understanding of their offense cycle, which would be helpful in informing relapse prevention strategies. Further, it should be noted that CSA cases are not homogenous (Lanning, 2010; Salter, 1995), suggesting that motivations and strategies related to grooming will vary by offender. There may be numerous psychological factors at play that influence an offender's intentions and actions throughout the grooming process; these elements are an area ripe for further research. Should an offender demonstrate changes in the beliefs, thoughts, and behaviors in treatment, they may be equipped to not engage in those types of behaviors (Salter, 1995). This model can also be used in treating victims of CSA, as a means of providing psychoe- ducation about sexual abuse. It is not uncommon for victims to experience guilt and blame following sexual abuse, which would be expected to be particularly heightened in instances where the victim was groomed by the offender. Thus, educating victims about these manipulative behaviors using the SGM could possibly reduce the self-blame a victim may experience. Understanding sexual grooming using the SGM may also be of utility to criminal justice professionals. Knowledge of the stages and behaviors associated with grooming could assist in law enforcement investigations of child sexual abusers, as police should be aware of these behaviors in investigations of CSA. For example, if a child discloses abuse and is unwilling to provide the offender's name, law enforcement could investigate whether there are any individuals in the child's life who have employed possible grooming tactics in order to identify potential suspects. Additionally, a framework for grooming can also be utilized by attorneys working on CSA cases involving sexual grooming. While this study represents one of the first attempts to validate the construct of grooming, attorneys should nonetheless be aware of these types of intentional behaviors in their cases, as they may help inform the arguments of the case (e.g., the offender had frequent and close contact with the victim before the alleged abuse). In the future, should the empirical grooming literature evolve, the information can be used in the prosecution of cases or decisions post-conviction, such as post-release guidelines (ie., types of probation stipulations based on the offender's history of pre-offense behaviors). As noted above, it is important to gather a larger empirical basis for the construct of grooming behavior to enhance the use of the concept in the court- room and judicial decision-making. Conclusion and future directions This study is the first to validate a model of grooming and behaviors involved in the process, which is a major step toward developing a more universally accepted framework for these pre-offense behaviors. The results of the present study provided a thorough, yet also concise and parsimonious, content 3502-033 Page 16 of 22 EFTA_00001678 EFTA00157019

--=PAGE_BREAK=--

16 @&) GM.WINTERS ET AL validation of the SGM that conceptualizes the process of sexual grooming which can be useful across multiple settings. Indeed, the present study sheds light on valuable information for researchers, criminal justice professionals, clinicians, and community members alike. This study has established the content validity of a model of sexual grooming therein laying the ground work for further validation of an evidence-based model of sexual grooming. The next step is to empirically validate the SGM using the pre-offense behaviors of a sample of victims or offenders of CSA. The model should undergo rigorous testing to ensure the stages accurately represent the complex process of sexual grooming. Further, a standardized measure of grooming behaviors should be developed based upon the behaviors and stages delineated in the SGM. A reliable and valid measure of sexual grooming would allow researchers and clinicians a means of quantifying these behaviors and could be invaluable in prevention and risk assessment efforts with the goal of understanding when certain behaviors constitute sexual grooming and how to prevent CSA from occurring. Declaration of interests There are no conflicts of interest with respect to the research, authorship, and/or publication of this article. Notes on contributors Georgia M. Winters, Ph_D., is an assistant professor in the Forensic Psychology M.A. Program, School of Psychology, at Fairleigh Dickinson University. Her research interests include sexual grooming behaviors of child sexual abusers and paraphilic interests. Elizabeth L. Jeglic, Ph.D is a professor of psychology at the John Jay College of Criminal Justice in New York. Her research focuses on sexual violence prevention. Leah Kaylor, Ph.D. graduated from John Jay College of Criminal Justice with a Master's degree in Forensic Mental Health Counseling. She earned her PhD in Clinical Psychology from Saint Louis University. Her research interests include forensic issues and deviant sexual behavior. References Abel, G. G., Becker, J. V., Mittelman, M., Cunningham-Rathner, J., Rouleau, J. L., & Murphy, W. D. (1987). Self-reported sex crimes of nonincarcerated paraphiliacs. Journal Of Interpersonal Violence, 2(1), 3-25. https://doi.org/10.1177/088626087002001001 Bennett, N., & O’Donohue, W. (2014). The construct of grooming in child sexual abuse: Conceptual and measurement issues. Journal of Child Sexual Abuse: Research, Treatment, & Program Innovations for Victims, Survivors, & Offenders, 23(8), 957-976. https://doi.org/ 10.1080/10538712.2014.960632 Berliner, L., & Conte, J. R. (1990). The process of victimization: The victims’ perspective. Child Abuse & Neglect, 14(1), 29-40. https://doi.org/10.1016/0145-2134(90)90078-8 3502-033 Page 17 of 22 EFTA_00001679 EFTA00157020

--=PAGE_BREAK=--

JOURNAL OF CHILD SEXUAL ABUSE () 17 Brakenridge, C. H. (2001). Spoilsports: Understanding and preventing sexual exploitation in sport. Routledge. Briere, J., & Elliott, D. M. (2003). Prevalence and psychological sequelae of self-reported childhood physical and sexual abuse in a general population sample of men and women. Child Abuse & Neglect, 27, 1205-1222. https://doiorg/10.1016/j.chiabu.2003.09.008 Budin, L. E., & Johnson, C. F. (1989). Sex abuse prevention programs: Offenders’ attitudes about their efficacy. Child Abuse & Neglect, 13(1), 77-87. https://doiorg/10.1016/0145-2134(89) 90031-8 Canadian Centre for Justice Statistics (2017). Family violence in Canada: A statistical profile, 2015. Retrieved from: https://www150.statcan.ge.ca/n1/daily- quotidien/170216/ dq170216b-eng.pdf Canter, D., Hughes, D., & Kirby, S. (1998). Paedophilia: Pathology, criminality, or both? The development of a multivariate model of offence behaviour in child sexual abuse. Journal of Forensic Psychiatry, 9(3), 532-555. https://doi.org/10.1080/09585189808405372 Christiansen, J. R., & Blake, R. H. (1990). The grooming process in father-daughter incest. In A. L. Horton, B. L. Johnson, L. M. Roundy, D. Williams, A. L. Horton, B. L. Johnson, & D. Williams (Eds.), The incest perpetrator: A family member no one wants to treat (pp. 88-98). Sage Publications, Inc. Coercion and Enticement. (2422). 18 ULS.C. Conte, J. R., Wolf, S., & Smith, T. (1989). What sexual offenders tell us about prevention strategies. Child Abuse & Neglect, 13(2), 293-301. https://doi.org/10.1016/0145-2134(89)90016-1 Craven, S., Brown, S., & Gilchrist, E. (2006). Sexual grooming of children: Review of literature and theoretical considerations. Journal of Sexual Aggression, 12(3), 287-299. https://doi_org/ 10.1080/13552600601069414 Craven, §., Brown, S., & Gilchrist, E. (2007). Current Responses to Sexual Grooming: Implication for Prevention. Howard Journal of Criminal Justice, 46(1), 60-71. https://doi. org/http://doi.10.111 1/j.1468-2311.2007.00454.x Department of Justice (2014). Crime in the United States, 2013. Retrieved from: https://ucr.fbi. gov/crime-in-the-u.s/2013/crime-in-the-u.s.-2013 Elliott, I. A. (2017). A self-regulation model of sexual grooming. Trauma, Violence, & Abuse, 18 (1), 83-97. https://doiorg/10.1177/1524838015591573 Elliott, M., Browne, K., & Kilcoyne, J. (1995). Child Sexual Abuse Prevention - What Offenders Tell Us. Child Abuse & Neglect, 195), 579-594. https://doi.org/http://doi.10.1016/0145- 2134(95)00017-3 Finkelhor, D., Turner, H. A., Shattuck, A., & Hamby, S. L. (2015). Prevalence of childhood exposure to violence, crime, and abuse: Results from the national survey of children’s exposure to violence. JAMA Pediatrics, 1698), 746-754. https://doi.org/10.1001/jamapedia trics.2015.0676 Groth, A. N., & Birnbaum, H. J. (1978). Adult sexual orientation and attraction to underage persons. Archives of Sexual Behavior, 7(3), 175-181. https://doi.org/175-181.10.1007/ BFO1S42377 Harms, R., & van Dam, C. (1992). Child abuse prevention: What the educator needs to know. Office of the Superintendent of Public Instruction. International Centre for Missing and Exploited Children (2017). Online Grooming of Children for Sexual Purposes: Model Legislation & Global Review. Retrieved from https://www.icmec. org/wp-content/uploads/2017/09/Online-Grooming-of- Children_FINAL_9-18-17.pdf Jackson, S., Newall, E., & Backett-Milburn, K. (2015). Children’s narratives of sexual abuse. Child & Family Social Work, 20(3), 322-332. https://doi.org/http://doi.10.1111/cfs.12080 Kaufman, K. L., Mosher, H., Carter, M., & Estes, L. (2006). An empirically based situational prevention model for child sexual abuse. In R. Wortley & S. Smallbone (Eds.), Crime 3502-033 Page 18 of 22 EFTA_00001680 EFTA00157021

--=PAGE_BREAK=--

18 @ GM.WINTERS ET AL prevention studies: Vol. 19. Situational prevention of child sexual abuse (pp. 101-144). Criminal Justice Press. Knoll, J. (2010). Teacher sexual misconduct: Grooming patterns and female offenders. Journal of Child Sexual Abuse: Research, Treatment, & Program Innovations for Victims, Survivors, & Offenders, 1%(4), 371-386. https://doi.org/10.1080/10538712.2010.495047 Lang, R. A., & Frenzel, R. R. (1988). How sex offenders lure children. Annals of Sex Research, 1 (2), 303-317. https://doiorg/10.1007/BF00852802 Lanning, K. V. (2010). Child molesters: A behavioral analysis (Sth ed.). National Center for Missing & Exploited Children. Lanning, K. V., & Dietz, P. (2014). Acquaintance molestation and youth-serving organizations. Journal of Interpersonal Violence, 29(15), 2815-2838. https://doi.org/10.1177/ 0886260514532360 Laws, D. R. (1989). Relapse prevention with sex offenders. Guilford Press. Lawson, L. (2003). Isolation, gratification, justification: Offenders’ explanations of child molesting. Issues in Mental Health Nursing, 24(6-7), 695-705. https://doi.org/10.1080/ 01612840305328 Leclerc, B., Proulx, J., & Beauregard, E. (2009). Examining the modus operandi of sexual offenders against children and its practical implications. Aggression And Violent Behavior, 14 (1), 5-12. https://doi.org/10.1016/j.avb.2008.08.001 Leclerc, B., Proulx, J., & McKibben, A. (2005). Modus operandi of sexual offenders working or doing voluntary work with children and adolescents. Journal of Sexual Aggression, 11(2), 187-195. https://doi.org/10.1080/13552600412331321314 Leclerc, B., & Wortley, R. (2015). Predictors of victim disclosure in child sexual abuse: Additional evidence from a sample of incarcerated adult sex offenders. Child Abuse & Neglect, 43, 104-111. https://doi.org/10.1016/j.chiabu.2015.03.003 Letourneau, E. J., Brown, D. S., Fang, X., Hassan, A., & Mercy, J. A. (2018). The economic burden of child sexual abuse in the United States. Child Abuse & Neglect, 79, 413-422. https://doi.org/10.1016/j.chiabu.2018.02.020 Lynn, M-. R. (1986). Determination and quantification of content validity. Nursing Research, 35 (6), 382-385. https://doiorg/10.1097/00006199-19861 1000-00017 Marshall, W. L., Smallbone, S., & Marshall, L. E. (2015). A critique of current child molester subcategories: A proposal for an alternative approach. Psychology, Crime & Law, 21(3), 205-218. https://doi.org/http://doi.10.1080/1068316X.2014.925724 McAlinden, A. M. (2006). Setting ‘em up’: Personal, familial and institutional grooming in the sexual abuse of children. Social & Legal Studies, 15(3), 339-362. https://doi.org/10.1177/ 0964663906066613 McAlinden, A. M. (2013). ‘Grooming’ and the sexual abuse of children. Retrieved from http:// blog.oup.com/2013/01/grooming-child-abuse/ Nash, M., & Williams, A. (2008). The anatomy of serious further offending. Oxford University Press. Olson, L. N., Daggs, J. L., Ellevold, B. L., & Rogers, T. K. K. (2007). Entrapping the innocent: Toward a theory of child sexual predators’ luring communication. Communication Theory, 17(3), 231-251. https://doi.org/http://doi.10.1111/j.1468-2885.2007.00294.x Research Methods Knowledge Base (n.d.). Idea of construct validity. Retrieved from http:// www.socialresearchmethods.net/kb/considea.php Salter, A. C. (1995). Transforming trauma: A guide to understanding and treating adult survivors of child sexual abuse. Sage Publications, Inc. Sethi, D., Bellis, M., Hughes, K., Gilbert, R., Mitis, F., & Galea, G. (2013). European report on preventing child maltreatment. World Health Organization, Regional Office for Europe. Sgroi, S. M. (1982). Handbook of clinical intervention in child sexual abuse. Lexington Books. 3502-033 Page 19 of 22 EFTA_00001681 EFTA00157022

--=PAGE_BREAK=--

JOURNAL OF CHILD SEXUAL ABUSE () 19 Shakeshaft, C. (2004). Educator sexual misconduct: A synthesis of existing literature (U.S. Department of Education Document No. 2004-09). U.S. Department of Education. Sheldon, K., & Howitt, D. (2007). Sex offenders and the Internet. John Wiley & Sons Ltd. Shi, J., Mo, X., & Sun, Z. (2012). Content validity index in scale development. Journal of Central South University. Medical Sciences, 37(2), 152-155. doi:10.3969/j.issn.1672-7347.2012.02.007 Sullivan, J., & Beech, A. (2002). Professional perpetrators: Sex offenders who use their employ- ment to target and sexually abuse the children with whom they work. Child Abuse Review, 11 (3), 153-167. https://doiorg/10.1002/car.737 van Dam, C. (2001). Identifying child molesters: Preventing child sexual abuse by recognizing the patterns of the offenders. Haworth Maltreatment and Trauma Press/The Haworth Press. Winters, G. M., & Jeglic, E. L. (2016). I knew it all along: The sexual grooming behaviors of child molesters and the hindsight bias. Journal Of Child Sexual Abuse: Research, Treatment, & Program Innovations For Victims, Survivors, & Offenders, 25(1), 20-36. https://doi.org/10. 1080/10538712.2015.1108945 Winters, G. M., & Jeglic, E. L. (2017). Stages of sexual grooming: Recognizing potentially predatory behaviors of child molesters. Deviant Behavior, 38(6), 724-733. https://doi.org/10. 1080/01639625.2016.1197656 Wyre, R. (2000). Paedophile characteristics and patterns of behaviour. In C. Itzin (Ed.), Home truths about sexual abuse influencing policy and practice: A reader (pp. 49-69). Routledge. Young, S. (1997). The use of normalization as a strategy in the sexual exploitation of children by adult offenders. The Canadian Journal of Human Sexuality, 6(4), 285-295. 3502-033 Page 20 of 22 EFTA_00001682 EFTA00157023

--=PAGE_BREAK=--

20 @&) GM.WINTERS ET AL Appendix A Models of Sexual Grooming. Corresponding Stage of Current Model of Source Stages of Sexual Grooming Grooming Sgroi {1982} Engagement phase Trust Development Sexual interaction phase Desensitization to Sexual Content and Secrecy phase Physical Contact Disclosure phase * Post-Abuse Maintenance Suppression phase * Lang and Frenzel (1988} Gaining cooperation Gaining Access and Isolation Keeping the victim silent Post-Abuse Maintenance Budin and Johnson Gaining access to victim Gaining Access and Isolation (1989) Trust Trust Development Keeping the victim silent Post-Abuse Maintenance Conte et al. (1989) Gaining access to victim and Gaining Access and Isolation cooperation Christiansen and Blake Trust Trust Development (1990) Favoritism Trust Development Applies to father-doughter Alienation Gaining Access and Isolation grooming Secrecy Post-Abuse Maintenance Boundary violation Desensitization Berliner and Conte Sexualization Desensitization (1990) Justification Desensitization Cooperation for secrecy Post-Abuse Maintenance Elliott et al. (1995) Gaining access to victim Gaining Access and Isolation Trust Trust Development Cooperation Trust Development Keeping the victim silent Post-Abuse Maintenance Young (1997) Gaining access to victim Gaining Access and Isolation Trust Trust Development Cooperation Post-Abuse Maintenance Harms and van Dam Identifying vulnerable child Victim Selection (1992)/Van Dam (2001) Engaging child in peer-like Trust Development environment Desensitization Desensitize child to touch Gaining Access and Isolation Isolate Post-Abuse Maintenance Make child feel responsible Brackenridge (2001) Targeting a potential victim Victim Selection Applies to grooming in Building trust and friendship Trust Development sport Developing isolation and control, Gaining Access and Isolation building loyalty Desensitization/Post-Abuse Maintenance Initiation of sexual abuse and securing secrecy O'Connell (2003) Friend: Trust Development Applies to online Relationship-forming Trust Development grooming Risk assessment Victim Selection Exclusivity Gaining Access and Isolation Sexual Desensitization Leclerc et al. (2005) Gaining trust Trust Development Cooperation Gaining Access and Isolation Keeping the victim silent Post-Abuse Maintenance McAlinden {2006} Befriend a potential victim Gaining Access and Isolation Craven et al. (2007) Cultivate a ‘special friendship’ Use of ‘forbidden fruit’ Desensitization Gaining access to the child Ensuring the child's compliance Maintaining secrecy to avoid disclosure Trust Development Desensitization Desensitization Gaining Access and Isolation Trust Development Post-Abuse Maintenance (Continued) 3502-033 Page 21 of 22 EFTA_00001683 EFTA00157024

--=PAGE_BREAK=--

JOURNAL OF CHILD SEXUAL ABUSE () 21 (Continued). Corresponding Stage of Current Model of Source Stages of Sexual Grooming Grooming Olson et al. (2007) Gaining access Victim Selection/Gaining Access and Isolation Cycle of entrapment Trust Development/Gaining Access and Intervening Isolation Outcome Post-Abuse Maintenance Desensitization Leclerc et al. (2009) Gaining access to victim Victim Selection Gaining victim's trust Trust Development Gaining cooperation in sexual activity Desensitization Maintaining silence following abuse —_ Post-Abuse Maintenance Lanning (2010) Identifying a target Victim Selection Gaining access to the victim Gaining Access and Isolation Lowering inhibitions Trust Development Gaining and maintaining control Desensitization * No corresponding stage in the current model 3502-033 Page 22 of 22 EFTA_00001684 EFTA00157025