Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts in Prevention
Superhighway Robbery

By Graeme R. Newman and Ronald V. Clarke

In Superhighway Robbery, Graeme Newman and Ronald Clarke provide a grounded, pragmatic analysis of how the digital revolution didn't necessarily create new types of criminals, but rather provided them with a much more efficient set of tools. They move away from the sensationalized "hacker" myths of the early 2000s to focus on the cold reality of Situational Crime Prevention. The book's central thesis is that the internet acts as a vast infrastructure—a superhighway—that significantly reduces the effort required to commit traditional crimes like theft, fraud, and piracy while increasing the potential rewards and lowering the risk of being caught.

By applying their famous CRAVED model to the digital world, the authors explain that data and software are the ultimate targets because they are easily concealable, removable, and available. They argue that the most effective way to stop cybercrime is not to wait for a change in human nature, but to change the digital environment itself. This involves "designing out" crime by making digital targets harder to reach and less profitable to exploit. Ultimately, Newman and Clarke strip away the mystery of the "Information Age" to reveal that cybercrime is essentially a matter of opportunity, and by closing those digital windows of opportunity, we can make the superhighway a significantly safer place.

In the digital realm, the CRAVED model explains why certain data or media becomes a prime target for "superhighway robbery." Concealability is at an all-time high because digital files take up no physical space and can be hidden in encrypted folders or behind innocuous filenames, making them easy to possess without detection. These files are incredibly Removable because they can be copied or moved across the globe in milliseconds, allowing a thief to "steal" an item while the original remains in place. The Availability of these targets is virtually limitless; once a movie or piece of software is uploaded to a server, it is accessible to anyone with a connection, twenty-four hours a day.

The Value of digital goods remains high because they often represent thousands of hours of professional labor or sensitive personal information that can be sold on the dark web. These items are also highly Enjoyable, as they often consist of popular entertainment, games, or high-end tools that people naturally want to use. Finally, they are perfectly Disposablebecause there is a massive, ready-made market of willing buyers or downloaders, ensuring that a criminal can quickly offload their "loot" for profit or social capital without the logistical headaches of physical fencing.

Cullompton, Devon. UK. Willan. 2003.

download
Numismatic Forgery

By Charles M. Larson

In "Numismatic Forgery," author Charles M. Larson pulls back the curtain on one of the most secretive and sophisticated threats to the world of coin collecting.1 Far from a simple historical overview, this book serves as a definitive guide to the dark art of the "super-forger," detailing the methods used to deceive even the most seasoned experts.

Larson provides a deep dive into the technical evolution of counterfeiting—from the crude cast copies of the past to the modern, high-precision struck forgeries that haunt the current marketplace. By meticulously explaining the tools of the trade, including centrifugal casting, pressure casting, and the creation of deceptive dies, Larson equips collectors, dealers, and historians with the knowledge necessary to spot the subtle "tells" of a fake.

Key features of this essential numismatic reference include:

  • The Forger's Toolkit: A step-by-step examination of the physical processes used to create counterfeit currency.

  • Detection Techniques: Practical advice on identifying "transfer marks," edge filing, and suspicious luster.

  • Case Studies: Real-world examples of famous forgeries that have infiltrated major collections.

  • The Ethics of the Hobby: A sobering look at how forgery undermines the historical integrity of numismatics.

Whether you are a casual hobbyist or a professional dealer protecting a million-dollar inventory, "Numismatic Forgery"is an indispensable resource for anyone who wants to ensure that the history they hold in their hands is the real deal.

read
Policy Thoughts on Bounded Rationality of Identity Thieves

By Graeme R. Newman

This essay critiques a study by Copes and Vieraitis regarding the "bounded rationality" of identity thieves, arguing that a focus on offender psychology and rationalizations is insufficient for developing effective crime reduction policies[cite: ]Newman contends that current criminal justice approaches rely too heavily on punishment and victim vindication, which, while politically satisfying, fail to reduce the prevalence of identity theft.

The author advances the following arguments regarding the development of effective policy:

* Policies based on the "deep psychology" of offenders or their denial of victims are largely fruitless because these rationalizations are often unconscious defense mechanisms. Instead of asking “why” offenders commit crimes, policy should focus on “how” they are accomplished.

* Newman distinguishes between crime mitigation (reducing damage to victims) and crime prevention (reducing the number of crimes)[cite:. While legislation and credit reporting agencies have improved mitigation efforts for victims, these measures do not address the root causes of the crime.

* Effective prevention must target the technological and business arrangements that create opportunities for theft. This involves shifting focus from the offender to the "significant players" (businesses) who can implement standard security procedures, such as the use of PINs for credit cards, to harden targets.

* The essay concludes that businesses often view fraud merely as a cost of doing business rather than a crime to be prevented[cite:. Therefore, the government must establish policies that compel businesses to accept responsibility for crime reduction and eliminate the opportunities they create through their products and services[cite.

Criminology and Public Policy Vol. 8. Issue 2.

download
Classical Deception: Counterfeits, Forgeries and Reproductions of Ancient Coins

Wayne G. Sayles:


Classical Deception is a detailed and accessible exploration of the long history of counterfeit ancient coins and the methods by which they are produced, detected, and sometimes unwittingly circulated within the numismatic world. Designed for collectors, students of antiquity, and museum professionals alike, the book traces forgery practices from antiquity to the modern era, showing that imitations have accompanied genuine coinage for as long as coins have existed. Sayles examines a spectrum of deceptions — from ancient contemporary counterfeits meant to pass in daily commerce, to the sophisticated modern forgeries that challenge even seasoned experts.

A substantial portion of the book profiles well-known forgers, documenting their techniques, motives, and the specific pieces they produced. Sayles pays particular attention to the prolific work of modern reproduction artists, including Peter Rosa, whose replicas are widely encountered and often misunderstood by beginning collectors. More than 200 photographs allow readers to visually compare authentic coins with their deceptive counterparts, highlighting telltale markers in style, fabric, metallurgy, and die workmanship.

Sayles also introduces the scientific and observational tools available to detect fakes — from simple weight measurement and magnified study of surfaces to metallurgical testing, microscopy, and imaging technologies. Throughout, he emphasizes practical guidance: what warning signs to look for, how to assess provenance, and how to avoid costly errors in the marketplace.

Ultimately, Classical Deception serves both as a cautionary manual and as a historical study of ingenuity, fraud, and craftsmanship. It equips the reader to navigate the hazards of collecting while deepening appreciation for the authentic artistry of ancient coinage.

Read
Perspectives on Identity Theft

By Megan M. McNally and Graeme R. Newman

From the cover: There has been a glaring lack of scholarly attention to the crime of identity theft, according to the editors. The chapters in this volume attempt to fill some of this gap by exploring theory and research on identity theft, as well as situational measures to prevent its occurrence.

The editors' introduction outlines several key issues related to the definition, extent and commission of identity theft. The chapter by Graeme Newman applies the opportunity perspective to the study of identity theft. Megan

McNally uses the "script" approach to examine the meaning and mechanics of identity theft in all of its forms. Henry Pontell, Gregory Brown and Anastasia Tosouni present new findings on how identity theft affects victims, based on data collected by the Identity Theft Resource Center. Heith Copes and Lynne Vieraitis describe how a sample of identity theft offenders viewed their crimes. Michael Levi recounts the evolution of identity fraud and its control in the U.K. Russell Smith presents a framework for evaluating preventive measures, particularly document-based systems, biometric technologies and identity cards. Sara Berg considers how information technology can be used within a situational crime prevention framework to fight identity theft. Robert Willison examines the use of situational crime prevention to protect sensitive personal information in the context of information systems security.

Crime Prevention Studies, volume 23. Willan Publishing. Culmcott House, Uffculme, Cullompton Devon EX 15 3AT, U.K. 2008. 195p.

Read
Abnormal Man : Volume 2 - Bibliography

By Arthur MacDonald.

The narrative in Volume 1 asks many pointed questions: What does it mean to be “abnormal”? Who decides? And how have these judgments shaped modern science, education, and criminal justice?

First published in 1893, Arthur MacDonald’s Abnormal Man is one of the earliest American attempts to systematically study human difference through the emerging tools of psychology, anthropology, and criminology. Drawing on international research—from European criminal anthropology to American child-study movements—MacDonald sought to classify the physical, mental, and moral traits considered “aberrant” in his era. His work reflects the hopes and anxieties of a society confronting rapid industrialization, immigration, social change, and new scientific approaches to crime and mental health.

To the modern reader, Abnormal Man reveals both the ambition and the pitfalls of nineteenth-century science. Its pages contain pioneering observations about child development, deviance, and social responsibility, alongside early theories—now discredited—about heredity, physiognomy, and race. What emerges is a vivid and sometimes unsettling portrait of a culture striving to understand human variation without the benefit of modern psychology or ethical safeguards.

The Read-Me.org edition Volume 1 presents Abnormal Man as both a historical artifact and a gateway to critical reflection. It illustrates how scientific thought evolves, how cultural bias can shape research, and how early debates about abnormality laid the groundwork for contemporary approaches to mental health, special education, criminology, and social policy. To make such work, much of it controversial then as it is today, minimally believable, requires extensive documentation. The voluminous Bibliography of Abnormal Man reproduced here in Volume 2, contains all that Macdnald referred to within his detailed exposition. To some, his arguments may seem unsupported, or lacking in evidence. But he left no stone untuned as this amazing bibliographical documentation of all relative contemporary research

A foundational text at the crossroads of science and society, Abnormal Man invites readers to explore the origins of modern debates about deviance, diversity, and the boundaries of the “normal.”

Read-Me.Org Inc. New York-Philadelphia-Australia. 2025. 240p.

download free
Paperback - $8.99
Abnormal Man : Volume 1 --Digest of Literature

By Arthur MacDonald. Introduction by Graeme R. Newman

What does it mean to be “abnormal”? Who decides? And how have these judgments shaped modern science, education, and criminal justice?

First published in 1893, Arthur MacDonald’s Abnormal Man is one of the earliest American attempts to systematically study human difference through the emerging tools of psychology, anthropology, and criminology. Drawing on international research—from European criminal anthropology to American child-study movements—MacDonald sought to classify the physical, mental, and moral traits considered “aberrant” in his era. His work reflects the hopes and anxieties of a society confronting rapid industrialization, immigration, social change, and new scientific approaches to crime and mental health.

To the modern reader, Abnormal Man reveals both the ambition and the pitfalls of nineteenth-century science. Its pages contain pioneering observations about child development, deviance, and social responsibility, alongside early theories—now discredited—about heredity, physiognomy, and race. What emerges is a vivid and sometimes unsettling portrait of a culture striving to understand human variation without the benefit of modern psychology or ethical safeguards.

This new Read-Me.org edition presents Abnormal Man as both a historical artifact and a gateway to critical reflection. It illustrates how scientific thought evolves, how cultural bias can shape research, and how early debates about abnormality laid the groundwork for contemporary approaches to mental health, special education, criminology, and social policy.

A foundational text at the crossroads of science and society, Abnormal Man invites readers to explore the origins of modern debates about deviance, diversity, and the boundaries of the “normal.”

Read-Me.Org Inc. New York-Philadelphia-Australia. 2025. p.193.

download free
Kindle $2.99 -- paperback $9.99
A Primer in Private Security: Revived edition

By Mahesh Nalla and Graeme Newman

When the first edition of A Primer in Private Security was published, its principal purpose was to demonstrate that private policing was not a mere auxiliary to public law enforcement but a robust and rapidly growing institution with its own organizational forms, priorities, and traditions. At that time, the Hallcrest Report had just confirmed that private security personnel outnumbered public police officers in the United States, a landmark finding that set the tone for debates about the privatization of policing .

Nearly four decades later, the central argument remains as relevant as ever, but the field itself has changed dramatically. Private security is now not only a supplement to public policing but a global, technologically sophisticated industry involved in nearly every sector of modern life. While we think that the original book still remains relevant to security today, we suggest in this preface that the reader approach the content from the point of view of four major perspectives that dominate security  (the word “private” seems old fashioned and less appropriate given that what is public and what is private have become incredibly and interwoven largely as a result of media, especially social media). 

The four perspectives are:

1.     the domestic sphere of home and family,

2.     the economic sphere of business,

3.     the public sphere of local and state government, and

4.     the international sphere of global security and climate-related risk.

Read-Me.Org Inc. New York-Philadelphia-Australia. 2025. 183p.

download free
Kindle $2.99 -- Paperback $9.99--Audible 1 credit
THE CRIME Volume 3.

BY Richard Grelling.. Translated By Alexander Gray. Introduction by Colin Heston.

Richard Grelling’s The Crime (Das Verbrechen), translated into English by Alexander Gray and published in London and New York between 1917 and 1919, is conceived as both a moral successor and completion to his earlier pacifist landmark, J’Accuse!, written between August 1915 and November 1916. In creating this extended work, Grelling sought to underscore the causes of World War I and dissect the self-justifying rhetoric that sustained the conflict long after its outbreak. Volumes I and II lay foundational groundwork, tracing the immediate antecedents of the war: imperialist tendencies within Germany and, on the part of the opposing Entente powers, ostensibly defensive motives followed by trait protectionism.

Never before in the annals of humankind has a crime of such sweeping magnitude been committed—and seldom has its perpetration been met with denial so unashamed. Within the very citadels of reason and culture, a proud civilization unleashed catastrophe under the guise of necessity—only to scramble afterward in self-exculpation. It is in this spirit of moral defiance—standing firm against voices of dissent, even from one’s own kin—that The Crime is offered to you. In the trilogy’s third volume, Grelling moves beyond the origins of war into the heart of wartime rationalization, exposing the “war-aims” that enabled aggression to persist under the cloak of purpose. May this work cast a clear light upon the structures of self-deception that allowed the world’s descent, and may it stir an unyielding clarity in us to recognize—and reject—such patterns again.

Read-Me.Org Inc. New York-Philadelphia-Australia. 2025. 261p.

download
kindle $2.99 -- paperback $9.99
Drugs of Abuse: A DEA Resource Guide, 2024 Edition

UNITED STATES. DRUG ENFORCEMENT ADMINISTRATION

From the document: "Education plays a critical role in preventing substance use and misuse. 'Drugs of Abuse, A DEA Resource Guide,' is designed to be a reliable resource on the most commonly used and misused drugs in the United States. This comprehensive guide provides important information about the harms and consequences of drug use by describing a drug's effects on the body and mind, overdose potential, origin, legal status, and other key facts. 'Drugs of Abuse' also offers a list of additional drug education and prevention resources, including the DEA websites: www.DEA.gov[;] www.JustThinkTwice.com, aimed at teenagers[;] www.GetSmartAboutDrugs.com, designed for parents, educators, and caregivers[;] www.CampusDrugPrevention.gov, for higher education[; and] www.OperationPrevention.com, for opioid curricula[.]"

UNITED STATES. DRUG ENFORCEMENT ADMINISTRATION. 2024. 117p.

download
Voting System Security Measures

By: US Election Assistance Commission

The security of voting systems is essential to a trustworthy election. Every state and local jurisdiction utilizes common-sense procedures and tools to safeguard the voting process. Common best practices include using locks, tamper-evident seals, security cameras, system testing before and after elections, audits, and physical and cybersecurity access controls. This guide outlines some of the many best practices local election officials follow to secure voting systems through an election cycle. It's important to note this is a broad list of common security measures and procedures to protect the integrity of an election. The types of security measures may vary based on the voting systems in use in state and local jurisdictions.

United States. Election Assistance Commission, Oct 2024

Download
Adolescent Substance Use: Risk and Protection

By Economic and Social Commission for Asia and the Pacific United Nations Office on Drugs and Crime

References: This section lists numerous studies and reports related to adolescent substance use, risk factors, and protective measures. It includes works by Jessor, the National Institute on Drug Abuse (NIDA), the World Health Organization (WHO), and others.

Focus Areas: The references cover various topics such as community psychiatry, correctional boot camps, life skills approaches, and traditional therapies.

Research and Guidelines: Many references are linked to guidelines and evaluations from international organizations like WHO and the United Nations, focusing on treatment and prevention strategies for substance use disorders.

United Nations, 2003, 57

read
Shattered Lives: Sexual Violence during the Rwandan Genocide and its Aftermath

By Human Rights Watch

During the 1994 Rwandan genocide, sexual violence was rampant, with thousands of women being raped, mutilated, or forced into sexual slavery by militia, soldiers, and civilians[. The violence was primarily directed at Tutsi women due to their ethnicity and gender, often following the torture and killing of their relatives. Survivors face severe social stigma, health issues, and poverty. Many women are now heads of households, dealing with the aftermath of the genocide. International Response Efforts include support for judicial training, victim protection, and financial aid, but challenges remain in effectively addressing gender-based crimes and supporting survivors.

Human Rights Watch New York· Washington· London· Brussels. 1996. 109p.

download
Sisters in Pain : Battered Women Fight Back

Linda Elisabeth LaPinta and Mary Angela Shaughnessy

Focus on Battered Women: The book, "Sisters in Pain," highlights the stories of battered women in Kentucky who fought back against their abusers, emphasizing their struggles and resilience.

Legal and Social Challenges: It discusses the legal and social challenges these women faced, including the lack of enforcement of domestic violence laws and the societal norms that perpetuate abuse.

Personal Narratives: The book includes personal narratives and interviews with the women, providing a deep, personal look into their experiences and the impact of abuse on their lives.

Call for Change: The authors aim to raise awareness and inspire action to improve the legal and social systems that fail to protect victims of domestic violence.

University Press of Kentucky, 2014, 214 pages

read
Men and Rape: Theory, Research, and Prevention Programs in Higher Education

Edited by Alan D. Berkowitz

Focus on Men: The document emphasizes the responsibility of men in preventing rape and provides resources for professionals in higher education to work with college men on this issue.

Research and Theory: It reviews empirical research on college men as perpetrators of sexual assault and proposes an integrative theoretical model for rape prevention programs.

Prevention Programs: It describes a model acquaintance rape prevention program for men, including program philosophy, facilitator selection and training, content, and evaluation.

Student Perspectives: Insights from student facilitators who participated in rape prevention programs, highlighting their experiences and the impact of these programs.

Jossey-Bass, 1994, 91 pages

Read
National Burden of Injury and Deaths From Shootings by Police in the United States, 2015–2020

By Julie A. Ward, Javier Cepeda, Dylan B. Jackson, Odis Johnson, Daniel W. Webster and Cassandra K. Crifas

Objectives.To describe all-outcome injurious shootings by police and compare characteristics of fatalversus nonfatal injurious shootings nationally.Methods.From July 2021 to April 2023, we manually reviewed publicly available records on all2015–2020 injurious shootings by US police, identified from Gun Violence Archive. We estimated injury frequency, case fatality rates, and relative odds of death by incident and victim characteristics.Results.A total of 1769 people were injured annually in shootings by police, 55% fatally. When a shooting injury occurred, odds of fatality were 46% higher following dispatched responses than police-initiated responses. Injuries associated with physically threatening or threat-making behaviors,behavioral health needs, and well-being checks were most frequently fatal. Relative to White victims,Black victims were overrepresented but had 35% lower odds of fatal injury when shot.Conclusions.This First multi-year, nationwide analysis of injurious shootings by US police suggests that injury disparities are underestimated by fatal shootings alone. Non-policing responses to social needs may prevent future injuries.Public Health Implications.We call for enhanced reporting systems, comprehensive evaluation of emerging reforms, and targeted investment in social services for equitable injury prevention.

American Journal of Public Health, 2024. 11p.

download
Harassment and Violence Against Health Professionals Who Provide Reproductive Care Proceedings of a Workshop–in Brief

By The National Academies of Sciences, Engineering, and Medicine. 

In December 2023, the National Academies hosted a public webinar in which medical and human rights experts explored concerns related to harassment, threats, and physical attacks against health care professionals working to provide essential reproductive health care. The event was the fourth in a webinar series designed to consider society-wide effects of limits to reproductive health care access in the U.S. following the 2022 Supreme Court Decision in Dobbs v. Jackson Women's Health Organization. This Proceedings of a Workshop-in Brief highlights the presentations and discussions that occurred at the webinar.

Washington, DC: The National Academies Press. 2024. 9p.

download
Olympic Violence: Memory, colonialism, and the politics of place

By Simon Springer

This paper proceeds as a brief intervention in response to Andrew Foxall's article "Geopolitics, genocide and the Olympic Games: Sochi 2014". I address the violence that is associated with the Olympic Games and the politics of place that are involved in site selection. In offering some reflections on how the Olympics are irrevocably tied to colonial processes, my primary contention is that it is necessary to ask critical geographical questions about the Games. Such interrogation opens up a dialogue wherein greater awareness for the legacies of violence may be established, which has the potential to interrupt its ongoing unfoldings.

ACME. 2014. 9p.

download
ONLINE ABUSE IN ATHLETICS: A Research Study: World Athletics Championships Budapest 23

By World Athletics

World Athletics today (22 December 2023) published findings of a study conducted during the World Athletics Championships Budapest 23 focused towards identifying and addressing abusive and threatening behaviour aimed at athletes on the X and Instagram social media platforms.

Building on the past two years of implementing greater safeguarding measures in athletics, 449,209 posts and comments were analysed between 18-28 August for abusive content in 16 different languages and additional dialects, protecting 1344 athletes with 1666 active accounts across both platforms.

This included text analysis, through searches for slurs and other phrases (including emojis) that could indicate abuse. Image recognition tools were also deployed to flag potentially offensive images. These findings were then compared to results from the previous study, conducted a year earlier at the World Athletics Championships Oregon22 (15-24 July 2022).

The research once again identified clear instances of online abuse and threats, targeting athletes competing at the World Athletics Championships Budapest 23. It detected notable examples of racist and sexualised abuse, with a selection of posts extending into potential action from law enforcement.

The study revealed:

X (formerly Twitter) was the preferred channel for abusers, accounting for almost 90% of detected abuse, a 500% relative increase compared to 2022

Racist abuse made up over one third of all abuse, an increase of 14% from 2022

Male athletes faced an increase in abuse, with the gender split of abuse being 51% targeting men and 49% targeting women

Two athletes out of 1344 monitored received 44% of all accounted abuse between them\

The levels of abuse detected during Budapest were noticeably higher when compared with the previous year’s study conducted during the World Athletics Championships Oregon22. Of the instances of racist abuse detected, the vast majority came on X. The abuse was overwhelmingly targeted at black athletes, with invocations of monkey imagery and deployment of the N-word in several spellings.

This is the third study of its kind in athletics and forms part of a research project World Athletics is conducting stretching over four years to fully understand the size, scale and gravity of online abuse athletes face during major sporting events. It is the third deployment of Threat Matrix, an initiative by data science company Signify Group, supported by sports investigations company Quest.

With a fourth study due to be carried out at the Olympic Games in Paris next year, the combined research will then encompass data from two Olympic Games as well as two World Athletics Championships, with events staged across Asia, Europe and North America.

World Athletics, 2023. 12p.

download
Successful child sexual violence prevention efforts start with data: how the Violence Against Children and Youth Survey helped curb the tide of child sexual violence in 20 countries

By Laura Chiang, Stephanie Miedema, Janet Saul, James Mercy, Andrew Brooks, Alexander Butchart, Gretchen Bachman, Jennifer Hegle, Daniela Ligiero, Joseph Logan, Greta Massetti

Violence against children is a pervasive global public health and human rights issue, with 1 billion children experiencing at least one form of violence annually. Extensive scientific literature shows childhood adversity, including sexual violence, to be directly and indirectly associated with a host of health and social consequences with a dose–response effect, consequential intergenerational impacts, and sizeable economic ramifications. There is a dearth of population data on the prevalence of childhood sexual violence as well as its antecedents and health and social outcomes, which has hampered violence prevention and child protection efforts globally and locally. Population data are critical, alongside administrative data systems and statistical definitions and classification schemes, for governments to adequately begin addressing violence against children. The absence of national prevalence data has resulted in limited information to guide national policies and prevention strategies, monitor trends, and evaluate prevention efforts. Globally, lack of data on the epidemiological patterns of violence against children has resulted in deficient prioritisation for preventing and responding to this critical problem. Violence Against Children and Youth Surveys (VACS) collect comprehensive data on violence and have been implemented in over 23 countries in Africa, Asia, the Caribbean, Europe and Latin America since 2007. VACS have also been repeated in three countries: Zimbabwe (2011; 2017), Kenya (2010; 2019) and Eswatini (2007; 2022). VACS provide extensive data on the prevalence and contexts of all forms of violence, including sexual violence, therefore allowing for targeted prevention and response efforts. VACS further provide the global research community with data to examine the epidemiological patterns of childhood sexual violence across countries and regions. VACS data have raised awareness and improved understanding of childhood sexual violence in many countries worldwide, and thereby catalysed action. This article draws on VACS reports and empirical publications, to summarise and describe patterns in childhood sexual violence across countries that have completed VACS and shed light on the global prevalence of childhood sexual violence.

BMJ Paediatr Open, 2024. 3p.

download