2.4: Victim Patterns
- Page ID
- 66343
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)
( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\id}{\mathrm{id}}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\kernel}{\mathrm{null}\,}\)
\( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\)
\( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\)
\( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)
\( \newcommand{\vectorA}[1]{\vec{#1}} % arrow\)
\( \newcommand{\vectorAt}[1]{\vec{\text{#1}}} % arrow\)
\( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vectorC}[1]{\textbf{#1}} \)
\( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)
\( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)
\( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)Victim Patterns [42]
It was not until 1660 that the word victim was first used to in the sense of a person who is hurt, tortured or killed by another. A victim of crime did not exist until well into the 17th century. Why were victims ignored for so long? [1] A victim is an integral part of the system, in fact, some say without a victim there would be no need for the CJ system. Victims are the people or communities that suffer physical, emotional, or financial harm as a result of a crime. Over the years different typologies of victims have been created to demonstrate the unique role or position of victims in relation to crime. Typically, when people hear someone has been a victim of a crime, we often think of them as completely innocent. In fact, a lot of new legislation and policy changes created to provide the victim with a greater role in the CJ offers the stereotypical view of the victim as completely innocent. [2]
Typologies of Crime Victims
Theorists have developed victim typologies that are concerned primarily with the situational and personal characteristics of victims and the relationship between victims and offenders. Benjamin Mendelsohn was one of the first criminologists to create a victim typology, in the 1950s, but was not without controversy. Below is a table of Mendelsohn’s typology of crime victims; as you can see he placed a lot of emphasis on victim attitudes that lead to their victimization.
Mendelsohn’s Typology of Crime Victims
Table 2.2 Types of Victims
Victim Type |
Definition |
Innocent victim |
Someone who did not contribute to the victimization and is in the wrong place at the wrong time. This is the victim we most often envision when thinking about enhancing victim rights. |
The victim with minor guilt |
Does not actively participate in their victimization but contributes to it in some minor degree, such as frequenting high-crime areas. This would be a person that continues to go to a bar that is known for nightly assault. |
The guilty victim, guilty offender |
Victim and offender may have engaged in criminal activity together. This would be two people attempting to steal a car, rob a store, sell drugs, etc. |
The guilty offender, guiltier victim |
The victim may have been the primary attacker, but the offender won the fight. |
Guilty victim |
The victim instigated a conflict but is killed in self-defense. An example would be an abused woman killing her partner while he is abusing her. |
Imaginary victim |
Some people pretend to be victims and are not. This would be someone falsifying reports. |
Other criminologists developed similar typologies but included other elements. For example, Hans Von Hentig expanded his typology from situational factors that Mendelsohn looked at and considered the role of biological, sociological and psychological factors. For example, Von Henting said the young, elderly, and women are more susceptible to victimization because of things such as physical vulnerabilities. It is important to recognize that some crimes, and ultimately crime victims, are excluded in these typologies such as white-collar and corporate crime.
Von Hentig’s Typology
Table 2.3 Von Hentig’s Typology
Type |
Definition |
Young people |
Immature, under adult supervision, lack physical strength and lack the mental and emotional maturity to recognize victimization |
Females/elderly |
Lack of physical strength |
Mentally ill/intellectually disabled |
Can be taken advantage of easily |
Immigrants |
Cannot understand language or threat of deportation makes them vulnerable |
Minorities |
Marginalized in society, so vulnerable to victimization. |
Dull normals |
Reasonably intelligent people who are naive or vulnerable in some way. These people are easily deceived. |
The depressed The acquisitive |
Gullible, easily swayed, and not vigilant. Greedy and can be targeted for scammers who would take advantage of their desire for financial gain. |
The lonesome and broken-hearted |
Often prone to victimization by intimate partners. They desire to be with someone at any cost. They are susceptible to manipulation. |
Tormentors |
Primary abusers in relationships and become victims when the one being abused turns on them. |
Blocked, exempted, and fighting victims |
Enter situations in which they are taken advantage such as blackmail. |
Von Hentig’s work was the basis for later theories of victim precipitation . Victim precipitation suggests many victims play a role in their victimization. First, the victim acted first during the course of the offense, and second that the victim instigated the commission of the offense. [6] It is important to note that criminologists were attempting to demonstrate that victims may have some role in the victimization and are not truly innocent. Today we often recognize the role in victimization without blaming the individual because ultimately the person who offended is the person who offended.