Igor Areh (Author)

Abstract

Protokoli preiskovalnih intervjujev za ugotavljanje spolne zlorabe otrok

Keywords

spolne zlorabe;otroci;preiskovalni intervju;NICHD;

Data

Language: Slovenian
Year of publishing:
Typology: 1.04 - Professional Article
Organization: UM FVV - Faculty of Criminal Justice
UDC: 159.9:340.6
COBISS: 2354410 Link will open in a new window
ISSN: 1580-0253
Parent publication: Varstvoslovje
Views: 1210
Downloads: 93
Average score: 0 (0 votes)
Metadata: JSON JSON-RDF JSON-LD TURTLE N-TRIPLES XML RDFA MICRODATA DC-XML DC-RDF RDF

Other data

Secondary language: English
Secondary title: Investigative interview protocols with children as alleged victims of sexual abuse
Secondary abstract: Purpose: The paper represents short and critical introduction of several investigation protocols which are used in cases of alleged child sexual abuse. Most commonly used protocols are briefly and critically presented. NICHD interview protocol is described more in detail. Design/Methods/Approach: Data is gathered from several professional and scientific sources. Findings: There are many different investigative protocols and they all include the use of an interview which is more or less similar to cognitive interview. In comparison to standard investigative interview used by criminal investigators, modern protocols facilitate memory recall with higher accuracy of data gathered. Protocols presented in the paper are not used in Slovenia. Research Limitations/Implications: Investigative interview protocols are only briefly presented, the paper is useful for refreshing and expanding the knowledge and not for the training. Practical Implications: Author tried to briefly demonstrate several forms of investigative protocols. Following the logic implemented in today’s interview protocols like NICHD could lead us to a higher accuracy and efficiency in criminal investigation and it also reduces the possibility of false accusations. Originality/Value: There is lack of knowledge about investigative interview protocols in Slovenia. With this paper author tried to fill the gap and he also put’s stress on today’s important research findings and practice.
Type (COBISS): Professional work
Pages: str. 97-112
Volume: ǂLetn. ǂ14
Issue: ǂšt. ǂ1
Chronology: 2012
ID: 11605368
Recommended works:
, diplomsko delo univerzitetnega študija
, diplomsko delo visokošolskega študijskega programa Informacijska varnost