The Use of Tools and Checklists to Assess the Risk of Child Sexual Exploitation: Lessons From UK Practice

Anita Franklin, Sarah Brown, Geraldine Brady

    Research output: Contribution to journalArticlepeer-review

    10 Citations (Scopus)
    238 Downloads (Pure)


    Tools to assess the risk of becoming a victim of child sexual exploitation (CSE) have been developed by UK CSE practitioners based on their professional experiences, with little evidence underpinning their development, and no evaluation/validation. Little is known about how they are used in practice. This paper summarises two studies. The first study consisted of a rapid review to identify factors associated with increased, or decreased risk of vulnerability to becoming a victim of CSE and the assessment of ten tools being used in the UK. The second study undertook interviews and on-line survey with professionals across multi-agencies to establish the use of tools. Results illustrate the context and processes in which the tools are being used and identify concerns regarding their ability to identify and protect children.
    Original languageEnglish
    Pages (from-to)978-997
    Number of pages20
    JournalJournal of Child Sexual Abuse
    Issue number8
    Early online date27 Nov 2018
    Publication statusPublished - 2018

    Bibliographical note

    Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders.


    • Children and young people
    • Abuse
    • vulnerabilities


    Dive into the research topics of 'The Use of Tools and Checklists to Assess the Risk of Child Sexual Exploitation: Lessons From UK Practice'. Together they form a unique fingerprint.

    Cite this