Skip to main content
Social Sci LibreTexts

3.4: Who Would Sexually Abuse a Child?

  • Page ID
    215428
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)

    ( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\id}{\mathrm{id}}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\kernel}{\mathrm{null}\,}\)

    \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\)

    \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\)

    \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    \( \newcommand{\vectorA}[1]{\vec{#1}}      % arrow\)

    \( \newcommand{\vectorAt}[1]{\vec{\text{#1}}}      % arrow\)

    \( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vectorC}[1]{\textbf{#1}} \)

    \( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)

    \( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)

    \( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)

    Who Would Sexually Abuse a Child?

    Children are sexually abused by either:

    • A relative who is assumed to be part of the child’s nuclear or close extended family (intrafamilial abuse, or incest).
    • Someone outside of the child’s family (pedophiles).

    The closer the relation between the perpetrator and the victim, the more harm will be done to the victim emotionally and psychologically. These perpetrators will be examined more closely later in this chapter.

    creepy man giving candy to a little boy .png

    Image generated with Open AI and under no copyright.

    Both males and females have been known to sexually abuse children, although more than 95% of reported cases involve male perpetrators. More than half of these offenders were abused in one way or another themselves. Researchers have found that child sexual abusers are poorly attached individuals who are manipulative and have low self-esteem. They also have poor social skills and strive to overcome the feeling of lacking power.

    man yelling at kid .png

    Image created in Canva and under no copyright

    Studies have found that:

    1. The perpetrator must be motivated to abuse, and sexually aroused by the child. The perpetrators’ normal sexual outlets, as endorsed by society, are generally blocked.
    1. The perpetrator lacks internal inhibitors, or an inner voice, that prohibits him from acting in the desire for abuse.
    1. External inhibitors, that would normally prevent the abuse, are not in place (this may include absent parents, socially isolated families, or other things that make the child more vulnerable).
    1. The perpetrator must overcome the child’s resistance to abuse, playing upon the powerlessness that makes children vulnerable.

    Multiple studies of abusers have found that they generally had no one to confide in while they were growing up. The abusers typically used sex to make themselves feel important and balanced, masturbating repetitively to sexual fantasies prior to the age of 12. Most of the families of sexual offenders, while growing up, were filled with domestic violence and mistreatment. Most child sexual abusers have indicated that masculinity was equated with sexual conquest. This research largely centers around male perpetrators, as there aren’t enough women perpetrators who have been researched to make adequate generalized statements. One commonality that is obvious for men and women is that these perpetrators often suffered significant psychological and physical abuse during their childhoods and that a majority had been sexually abused as children.

    Juveniles can also be sexual abuse perpetrators. Histories of victimization often lead to juveniles who seek to offend against others. When juveniles sexually offend, that is not in itself their primary goal. Some may resort to aggression and violence, while others use experimentation or exploration as their goal. As with adult offenders, a few juvenile offenders may be mentally ill or otherwise cognitively impaired. Early intervention for juvenile offenders is essential in helping them prevent further abuse.

    shadow of man .png

    "Shadow figure, Exploring" by alexbcthompson is licensed under CC BY-NC-SA 2.0.

    Research with child molesters has shown: (The Oprah Winfrey Show)

    • Most child molesters (90%) are known to the child (family members, friends, neighbors, people they are used to seeing… NOT strangers).
    • Molesters seek out and seduce needy, vulnerable children, then they gain their trust. Child molestation is very calculated and deliberate. Molesters NEED the trust of the child for the ongoing molestation to be possible.
    • Molesters confuse the child to believe that the molestation feels good. The child often blames themselves out of this confusion.
    • If the child starts to become resistant, molesters use guilt and threats of harm to others to keep the secret and ongoing molestation.
    • Many child molesters have stated that they were bringing pleasure to the child and the child was giving them pleasure, so the molester didn’t think they were doing anything wrong or harmful at the time.

    Image created in Canva and under no copyright


    3.4: Who Would Sexually Abuse a Child? is shared under a CC BY-NC 4.0 license and was authored, remixed, and/or curated by LibreTexts.