Professional Documents
Culture Documents
Wuolah Free 06forensic Victimology
Wuolah Free 06forensic Victimology
marvg_27
Angles Criminologic
1º Grado en Criminología
Facultad de Derecho
Universidad de Barcelona
DEFINITION OF VICTIM
The term victim is used in the modern criminal justice system to describe any person who has experienced loss,
injury, or hardships due to illegal action of another individual, group or organization.
The term victima is a Latin word used to refer to those who were sacrificed to please God.
GENERAL VICTIMOLOGY
General victimology is the study of victimity in the broadest sense, including those that have been harmed by
accidents, natural disasters, war, and so on.
FORENSIC VICTIMOLOGY
Is the study of violent crime victims for the purposes of addressing investigative and forensic questions. It
involves the accurate, critical, and objective outlining of a victim's lifestyles and circumstances, the events
leading up to an injury, and the precise nature of any harm or loss suffered.
(Objectively and impartially): Studies victims, describing all aspects of their life and lifestyle in order to gain
a better understanding of how they came to be victimised, how the crime took place, and their relationship
with the offender.
Forensic victimology is an applied discipline as opposed to a theorical one. The forensic vicitmologist seeks
to examine, consider, and interpret particular victim evidence in a scientific fashion in order to answer
investigative and forensic questions.
In the investigative realm, forensic victimology provides for the consistent recognition, collection,
preservation, and documentation of victim evidence. Questions are asked, context is established, and history
is documented. Helps deciding whether and how criminal charges and civil liabilities may be appropriate.
HISTORY OF VICTIMOLOGY
• The golden age
In victimology, the era thought to have occurred before written, where victims played a direct role in
determining the punishment for actions of another committed against them or their property.
- Retribution as a resolution for criminal matters.
- Blood feuds impact in other individuals (women and children) or following generations.
- Abuse of the power of accusation.
a64b0469ff35958ef4ab887a898bd50bdfbbe91a-8106909
Reservados todos los derechos. No se permite la explotación económica ni la transformación de esta obra. Queda permitida la impresión en su totalidad.
• The dark age
In victimology, the era after the emergence of written laws and structured governments, where all offenses
were viewed as perpetrated against the king or state, not against the victims or their family.
- Separate criminals from society.
- Deter others from acting criminally via ever-harsher punishment.
- Prevent future victimizations separate criminals.
- Victim as a witness → seek remedy for the harms they suffer in civil court.
Reservados todos los derechos. No se permite la explotación económica ni la transformación de esta obra. Queda permitida la impresión en su totalidad.
• Re-emerge of the victim
The era in the middle of the twentieth century, when a small number of people began to recognize that those
who were most affected by criminal acts were rarely involved in the criminal justice process. This led to
the realization that victims were also being overlooked as a source of information about crime and criminals.
Understanding victims.
GENERAL TYPES OF VICTIMS
- Primary victims (those who are directly harmed by the crime).
- Secondary victims (those who are affected by the crime but are not the primary targets).
- Tertiary victims (those who are indirectly affected by the crime, such as family members or witnesses).
VICTIMIZATION THEORIES
• Routine activities theory
a64b0469ff35958ef4ab887a898bd50bdfbbe91a-8106909
A victim's lifestyle exposure to violence and victimisation is related to the frequency of exposure to
potentially harmful elements in his/her usual environment, his/her personal traits, as well as his/her past
choices.
Reservados todos los derechos. No se permite la explotación económica ni la transformación de esta obra. Queda permitida la impresión en su totalidad.
Assessing lifestyle exposure to different forms of victimisation requires an investigation and assessment of
the victim's personality, and his/her environment:
1. Profession.
2. Psychological problems.
3. Personality traits.
The concept of ideal victim is a stereotype, and therefore it might influence social perception on victims and
affect the way they are treated in the media and in the justice system. The personal characteristics of the victim
and the offender and the circumstances surrounding the crime, have strong influences and gives them
legitimate status as victims.
a64b0469ff35958ef4ab887a898bd50bdfbbe91a-8106909
Cybercrimes.
Cybercrime refers to all the activities done with criminal intent in cyberspace. It refers to any crime that
involves a computer/ mobile and a network. The computer may be used in the commission of the crime, or it
might be the target.
Cybercrime can take many forms, including hacking, phishing, and identity theft. These crimes an cause
significant financial losses and emotional distress for victims.
AGAINST PERSONS
• Transmission of child pornography
The transmission of child pornography refers to the distribution, sale, or sharing of images or videos
depicting minors engaged in sexual activity or posing in a sexual manner. It is considered a serious crime
and violation of child protection laws.
Main vocabulary
1. Child pornography: Images or videos that depict minors engaged in sexual activity or posing in a sexual
manner.
a64b0469ff35958ef4ab887a898bd50bdfbbe91a-8106909
Reservados todos los derechos. No se permite la explotación económica ni la transformación de esta obra. Queda permitida la impresión en su totalidad.
2. Exploitation: Taking advantage of someone for personal gain, often in a sexual or financial context.
3. Distribution: Sharing or disseminating something, such as child pornography, to others.
4. Possessions: Having images or videos of child pornography on one's computer.
5. Sexual abuse: Any sexual activity with a minor that is illegal or non-consensual.
• Cyberstalking
Cyberstalking is a type of harassment or threatening behaviour that occurs online, typically through social
Reservados todos los derechos. No se permite la explotación económica ni la transformación de esta obra. Queda permitida la impresión en su totalidad.
media, email, or other forms of digital communication. The term combines "cyber", referring to the internet
or digital technology, and "stalking", which means to pursue persistently and obsessively someone.
Main vocabulary
1. Harassment: Unwanted or threatening behaviour directed towards someone.
2. Obsession: An intense and persistent preoccupation with someone or something.
3. Cyberbullying: The use of digital technology to harass or intimidate someone.
4. Online identity: The persona or image that someone presents online.
5. Personal information: Sensitive details about someone, such as their full name, address, phone number,
or other identifying information.
• Grooming
Grooming is the process by which a person builds relationship with a child, often online, with the intention
of sexually abusing them. Groomers may use various tactics to gain a child's trust, such as pretending to be
someone else, sending gifts or compliments, or offering emotional support.
Main vocabulary
1. Manipulation: The use of deception or coercion to control someone's behaviour or feelings.
2. Trust: The belief that someone is reliable, honest, and has good intentions.
3. Predation: The act of preying on or exploiting someone, often sexual purposes.
4. Child sexual abuse: Any sexual activity with a minor that is illegal or non-consensual.
5. Online grooming: Grooming that takes place through social media or other online platforms.
• Sexting
Sexting refers to sending or receiving of sexually explicit messages, images, or videos through electronic
devices. It can be consensual or non-consensual and can sometimes lead to sextortion.
Main vocabulary
1. Sexual consent: Explicit messages, images, or videos that have sexual themes or content.
2. Consent: Willing agreement to engage in sexual activity or communication.
3. Privacy: The right to keep personal information or images confidential.
4. Revenge porn: Sharing sexually explicit images or videos of someone without their consent, often in
retaliation for a perceived wrong.
• Sextortion
Sextortion is the use of sexual images or videos to blackmail or extort someone. The perpetrator may
threaten to release the images or videos unless the victim provides money, more sexual content, or other
favours.
Main vocabulary
1. Blackmail: Making threats or demands in exchange for not revealing embarrassing or damaging
information.
2. Extortion: Using threats or coercion to obtain something from someone, often money or other resources.
a64b0469ff35958ef4ab887a898bd50bdfbbe91a-8106909
Main vocabulary
Reservados todos los derechos. No se permite la explotación económica ni la transformación de esta obra. Queda permitida la impresión en su totalidad.
1. Black hat hacker: A hacker who uses its skills for malicious purposes, such as stealing information or
causing damage to computer systems.
2. White hat hacker: A hacker who uses its skills for ethical purposes, such as identifying vulnerabilities
in computer systems and helping to fix them.
3. Malware: A type of software that is designed to harm computer systems or steal information.
4. Exploit: A vulnerability in a computer system that can be used by hackers to gain unauthorized access.
• Phishing
Phishing is a type of cybercrime that involves using fake emails, messages, or websites to trick individuals
into providing sensitive information, such as passwords or credit card numbers.
Main vocabulary
1. Spoofing: The act of making an email or website appear to be from a trusted source, when in fact it is
not.
2. Social engineering: The use of psychological manipulation to trick individuals into giving away
sensitive information.
3. Spear phishing: A targeted form of phishing that is aimed at a specific individual or group.
4. Two-factor authentication: A security measure that requires users to provide two forms of
identification, such as password and a code sent to their phone, to access an account.
• Identity theft
Identity theft refers to the act of stealing someone's personal information, such as their name, address, or
social security number, in order to commit fraud or other crimes.
Main vocabulary
1. Phishing scams: Phishing scams are a common way for identity thieves to obtain personal information.
2. Skimming: The act of stealing credit card information by using a device to skim the cards magnetic
strip.
3. Dumpster diving: The act of going through someone's trash to find personal information.
4. Synthetic identity theft: The creation of a new identity using a combination of real and fake information.
AGAINST GOVERNMENT
• Cyberterrorism
The use of computer technology to launch attacks on infrastructure or government or military networks,
with the aim of causing widespread disruption or destruction.
Main vocabulary
1. Cyberwarfare: The use of technology to launch attacks on a country or its infrastructure.
2. Information warfare: The use of information and communication technologies to influence or
undermine an adversary's decision-making processes.
3. Critical infrastructure: Essential systems and services that support the functioning of a society, such as
energy, water, transportation, and finance.
4. Advanced Persistent Threat (APT): A group or actor that uses sophisticated techniques to gain
unauthorized access to computer systems or networks over a prolonged period of time.
5. Hacktivism: The use of hacking or other technological means to promote a political or social agenda.
a64b0469ff35958ef4ab887a898bd50bdfbbe91a-8106909
Keywords
1. Trauma: Second victimization can result in trauma or PTSD for those who are involved in the response to
a crime or traumatic event.
2. Emotional distress: Individuals involved in the response to a crime or traumatic event may experience
emotional distress, including feelings of guilt, anxiety, and depression.
3. Burnout: The stress and emotional toll of responding to traumatic events can lead to burnout for
professionals, including those who work in victim services.
4. Vicarious trauma: Also known a secondary trauma, vicarious trauma occurs when individuals are exposed
to the trauma of others, leading to emotional distress and other negative impacts.
5. Resilience: Building resilience is an important factor mitigating the negative impacts of second
victimization, and may include training, education, and support for those involved in victim services.
Victim’s protection EU
Council Framework Decision of 15 March 2001 on the standing of victims in criminal proceedings
(2001/220/JHA).
EU directive that aims to ensure that victims of crime receive certain minimum rights and protections across
all EU member states. The directive outlines specific measures that member states should take to ensure that
victims are treated with respect, dignity, and sensitivity, and that they have access to the information, support,
and services they need to cope with the impact of the crime.
Key provisions
1. The right to information
Victims have the right to be informed about their rights, the criminal justice process, and the services and
support available to them.
2. The right to access services
Victims have the right to access services such as medical care, psychological support, and legal assistance.
3. The right to protection
Victims have the right to be protected from intimidation, retaliation, and further harm.
4. The right to participation
Victims have the right to participate in criminal proceedings and to have their views and concerns taken
into account.
a64b0469ff35958ef4ab887a898bd50bdfbbe91a-8106909
Reservados todos los derechos. No se permite la explotación económica ni la transformación de esta obra. Queda permitida la impresión en su totalidad.
5. The right to compensation
Victims have the right to seek compensation for the harm they have suffered.
6. The right to be heard
Victims have the right to express their views and concerns, and to have them taken into account by
authorities and the criminal justice system.
7. The right to an interpreter
Victims who do not speak the language of the criminal justice system have the right to an interpreter.
Reservados todos los derechos. No se permite la explotación económica ni la transformación de esta obra. Queda permitida la impresión en su totalidad.
8. The right to privacy
Victims have the right to have their privacy protected, and to have their personal information handled in
accordance with applicable data protection laws.
9. The right to restorative justice
Victims have the right to participate in restorative justice process, where appropriate.
10. The right to appeal
Victims have the right to appeal decisions that affect their rights or interests in criminal proceedings.
11. The right to a speedy trial
Victims have the right to have their case heard without undue delay, and to be informed about the expected
duration of the proceedings.
a64b0469ff35958ef4ab887a898bd50bdfbbe91a-8106909