TYPICAL METHODS AND TRACES OF SEXUAL HARASSMENT OF A CHILD
DOI:
https://doi.org/10.32631/vca.2024.3.82Keywords:
criminalistic methodology, sexual exploitation, sexual abuse, investigation methodology, child grooming for sexual purposes, criminalistic characteristics, typical methods, typical tracesAbstract
The article provides a comprehensive study of the typical methods and
traces of child grooming for sexual purposes, which represent one of the most
complex and sensitive categories of criminal offenses in modern criminalistics. It
is emphasized that the methods of committing a crime and its traces are
inextricably linked elements of criminalistic characteristics. It is clarified that the
method determines what changes will occur in the surrounding environment, and
the traces, in turn, are a material or ideal reflection of this method. It is proven
that such an integrated approach allows for the formation of a complete and
objective picture of the crime event, which is a necessary prerequisite for
successful investigation. It is established that the methods of committing child
grooming for sexual purposes are a key element of the relevant criminalistic
characteristics, represented by a system of offender actions for the preparation,
direct commission, and concealment of this type of offense. Typical methods of
child grooming for sexual purposes are identified and characterized in detail. In
parallel with the analysis of methods, the article examines the typical traces of
these crimes. It is emphasized that typical traces of child grooming for sexual
purposes encompass not only traditional material traces but also a vast array of
digital, psychological, and documentary reflections. It is underlined that an
effective investigation of child grooming for sexual purposes requires
investigators to have a deep understanding of the inseparable link between
typical methods and traces, which allows not just for the discovery of individual pieces of evidence, but for the reconstruction of a holistic picture of the criminal
event, the identification of the perpetrator, and the ensuring of an appropriate
legal response.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Ю.Г. ЯЦИК

This work is licensed under a Creative Commons Attribution 4.0 International License.