Verified Document

The Five Victim Typologies Essay

The five victim typologies are: primary victimization, secondary victimization, tertiary victimization, mutual victimization, and no victimization. Primary victimization is defined as victimization that is personal—i.e., the individual is the victim of a crime. A common example of primary victimization would be a targeted attack (such as an assault on the individual, with a motive being hatred or revenge); the individual is physically assaulted. Secondary victimization is when an individual is indirectly victimized (Meadows, 2007). An example of this would be if a person’s loved one is murdered: the murdered person is the primary victim and the loved one is the secondary victim. Tertiary victimization would be crimes against society as a whole: crimes that are felt by the whole of the community. An example of this might be when a government unjustly spies on its citizens. Mutual victimization occurs when the criminal is retaliated against. In this case, the criminal has a victim and then becomes a victim later as well. No victimization occurs in the case of victimless crimes, such as prostitution in which sex between consenting adults is paid for: there is no victim, but in many states this exchange is considered a crime. The difference between criminology and victimology is that criminology is the study of crime and the criminal’s role in criminal activity while victimology is the study of the victim and the victim’s role in crime (Siegel, 2008). Criminology...

Victimology focuses on how victims experience crime, how they respond, and how their response plays a role in the spread or control of crime.
A current news article that describes the crimes of Harvey Weinstein examines the 84 accusers of the Hollywood producer and takes an approach to the subject that is closer to victimology than to criminology, as its focus is mainly on the victims in the crimes and their role in the crimes (Moniuszko & Kelly, 2017). In the story, one can identify each of the five victim typologies.

First, there is the primary victimization typology, which can be found among each of the 84 accusers, who accused Weinstein of sexual abuse or misconduct. They were the personal recipients of a sexual attack and thus were the direct victims in the crime. Their experience was personally felt by them as they themselves were the primary targets of the criminal.

Second, there is the secondary victimization typology, which can be found among the friends and loved ones both the Weinstein and the victims. They can be found in Weinstein’s own firm, for instance, which has been forced to close because of the negative publicity that Harvey has attracted. Then there are the families and friends of the victims who have been forced to cope with the suffering.

Third, there is the tertiary victimization…

Sources used in this document:

References

Meadows, R.J. (2007) Understanding violence and victimization, 4th ed. Upper Saddle, NJ: Pearson Prentice Hall.

Moniuszko, S. & Kelly, C. (2017). Harvey Weinstein scandal: A complete list of the 84 accusers. Retrieved from https://www.usatoday.com/story/life/people/2017/10/27/weinstein-scandal-complete-list-accusers/804663001/

Siegel, L. J. (2008). Criminology: The Core, 3rd Ed. Belmont, CA: Cengage.


Cite this Document:
Copy Bibliography Citation

Related Documents

Holistic Victim Restitution Plan
Words: 3442 Length: 9 Document Type: Essay

The knowledge of the evolution and starting point of the field of Victimology is of utmost worth. Three different ancient epochs describing the Victims' position inside methods of justice were reviewed by some foremost Researchers including Moriarty and Jerin. The Epochs are the Golden Age, the Reemergence of the Victim and the Dark Age. There is a proposition that the Golden Age has been before the time when laws were

Cyber Bullying and Social Work
Words: 6683 Length: 20 Document Type: Research Paper

Cyber Bullying and Its Impact Over the past decade, attention has been drawn to cyber-bullying by the media and researchers. Research on cyber-bullying has covered the various behavior aspects; focusing mainly on demographic and personal factors of the involved individuals. Particularly, the research has been targeted at factors among adolescents; who account for a majority of cyber-bullying cases. Nonetheless, it is important that other populations are studied too -- even adults

Bullying and Strategies for Prevention
Words: 5315 Length: 16 Document Type: Research Paper

More and more children are becoming victims of cyberbullying with an estimated range of between 19% and 42% being bullied online at least one time (Wolak, Mitchell & Finkelhor, 2006). Reports also indicate that children who participated in traditional bullying are becoming increasingly more involved in cyberbullying; reflecting very high percentages of those children acting as cyber bullies (Kowalski & Limber, 2007). In a recent study of 177 seventh grade

Why Are White People Called Caucasian
Words: 716 Length: 2 Document Type: Essay

White People Are Called Caucasian Caucasus is a word from Greek kaukasos (Mt.Caucasus) which gives the region its name, therefore Caucasus refers to the mountains of East Europe and the people that are native to this region, it is one of the main ethnic divisions of the human race so called white or European race. Mountains cross the region running all through East and West. The Northern Caucasian range forms

How Incentives Effect the Performance of Managers
Words: 1749 Length: 4 Document Type: Research Paper

Incentives and Performance Kopelman, R., et al. (2012); Further Development of a Measure of Theory X and Y Managerial Assumptions. Journal of Managerial Issues. 24 (4): 450-62. Certainly, there is no one best way to ensure that either employees or managers are properly motivated. Most scholarship, in fact, indicates that motivation is a balance between the task-relevant behavior and the maturity and acumen of the group in which the individual manages

Information Systems and Strategy Finding
Words: 1243 Length: 4 Document Type: Research Paper

The use of it systems and technologies is then secondary to the supporting of key business processes that unify an organization. A solid organizational framework can save a company literally millions of dollars in bad it and technical systems by making sure every information asset and initiatives aligns to strategic plans and initiatives. Big Data, Cloud Computing and Social Networks -- the Data Explosion The last five years have seen the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now