The personal social networks of personality disordered forensic psychiatric patients
Ter Haar-Pomp,Lydia ; Spreen,Marinus ; Bogaerts,Stefan ; Volker,Beate
Ter Haar-Pomp,Lydia
Spreen,Marinus
Bogaerts,Stefan
Volker,Beate
Abstract
Summary There has hardly been any examination of the personal social networks of personality disordered forensic psychiatric patients leading up to, and at the time of their offence. To shed light on this question, 36 male inpatients were interviewed by forensic social workers about their social contacts in the period in which they committed their crime. Network size, roles, social support, investment, structure and potential risks were investigated. Findings At the time of their offence, patients were in contact with a variety of social network members, especially family members, who also happened to be the most likely victims of the patients’ offences. Patients received social support; almost half of the social supporters had potential risk factors (criminal record, psychiatric problems, drug use, etc.). Applications This study shows the complexity of the social factors involved with criminal behavior. Theoretically, good network conditions do not necessarily imply a low risk for each individual case. Forensic social workers should frequently check if there are significant changes in the patient's network, such as access to victims, instability of relationships, a lack of personal support and the influence of high-risk network members.
Description
Date
2015
Journal Title
Journal ISSN
Volume Title
Publisher
Research Projects
Organizational Units
Journal Issue
Keywords
Social work, personal social network, risk assessment, management, mental health, law, social support, SDG 16 - Peace, Justice and Strong Institutions
Citation
Ter Haar-Pomp, L, Spreen, M, Bogaerts, S & Volker, B 2015, 'The personal social networks of personality disordered forensic psychiatric patients', Journal of Social Work, vol. 15, no. 3, pp. 254-276. https://doi.org/10.1177/1468017314537425
License
info:eu-repo/semantics/closedAccess
