The prevalence and overlap of technology-assisted and offline adolescent dating violence

  • Karlie E. StonardEmail author


Research has established the nature and prevalence of offline Adolescent Dating Violence (ADV) and the role of Technology-Assisted Adolescent Dating Violence (TAADV) has been recently but slowly acknowledged, albeit primarily in the United States. Less research however, has examined such types of violence among British adolescences and the extent of overlap between the two forms of abuse. This paper examines the nature, prevalence and overlap of TAADV and offline ADV victimisation/instigation among a sample of adolescents in England. Four-hundred-and-sixty-nine adolescents (aged 12–18) completed questionnaires regarding their experience of TAADV and ADV. Findings revealed that TAADV involvement was prevalent and was generally characterised by both victimisation and instigation, except for sexual TAADV in which females were more likely to be identified as victims only. Technology appears to have provided new opportunities for victimisation and/or instigation of TAADV exclusively that may not have been possible before the development of such communication tools; however, some adolescents reported experiencing both TAADV and ADV. Implications of the findings are discussed and recommendations are made for future policy, practice and research.


Adolescent(ce) Technology-assisted dating violence Offline dating violence Prevalence Overlap 



This work was supported by a PhD studentship in the Faculty of Health and Life Sciences at Coventry University, Priory Street, Coventry, CV1 5FB. I would like to thank my PhD supervisory team, Professor Erica Bowen, Dr. Shelley Price, and Dr. Kate Walker for their support with the research reported in this paper and for reading and providing critical feedback on the original thesis chapter.

Compliance with Ethical Standards

Disclosure of Potential Conflicts of Interest


Ethical Approval

All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and/or national research committee and with the 1964 Helsinki declaration and its later amendments or comparable ethical standards.

Informed Consent

Informed consent was obtained from all individual participants included in the study.


  1. Agustina, J. R. (2015). Understanding cyber victimization: Digital architectures and the disinhibition effect. International Journal of Cyber Criminology, 9(1), 35–54.Google Scholar
  2. Associated Press and MTV. (2009) A Thin Line: 2009 AP-MTV Digital Abuse Study. Available at: [accessed 1 June 2014].
  3. Associated Press and MTV. (2011). Associated Press-MTV Digital Abuse Survey August 2011. Available from [Accessed 1 June 2014].
  4. Bandura, A. (1977). Social learning theory. Englewood Cliffs: Prentice-Hall.Google Scholar
  5. Barter, C., McCarry, M., Berridge, D. and Evans, K. (2009) Partner Exploitation and Violence in Teenage Intimate Relationships. London: NSPCC. Available at: [accessed 6 June 2015].
  6. Barter, C., Wood, M., Aghtaie, N., Larkins, C., Stanley, N., Apostolov, G. et al. (2015) Briefing Paper 2: Incidence Rates and Impact of Experiencing Interpersonal Violence and Abuse in Young People’s Relationships. Safeguarding Teenage Intimate Relationships: Connecting Online and Offline Contexts and Risks. Funded by DAPHNE III European Commission. Available at: [accessed 25 March 2015].
  7. Bryant, J. A., Sanders-Jackson, A., & Smallwood, A. M. K. (2006). IMing, text messaging, and adolescent social networks. Journal of Computer-Mediated Communication, 11(2), 577–592.CrossRefGoogle Scholar
  8. Bryman, A. (2004). Social Research Methods. 2nd ed. Oxford: Oxford University Press.Google Scholar
  9. Burman, M., & Cartmel, F. (2005). Young peoples attitudes towards gendered violence. Edinburgh: NHS Health Scotland.Google Scholar
  10. Centers for Disease Control and Prevention. (2012) Understanding Teen Dating Violence. Available at: [accessed 6 June 2015].
  11. Cohen, L. D., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588–608.CrossRefGoogle Scholar
  12. Cooper, K., Quayle, E., Jonsson, L. S., & Svedin, C. G. (2016). Adolescents and self-taken sexual images: A review of the literature. Computers in Human Behavior, 55, 706–716.CrossRefGoogle Scholar
  13. Cornish, D. B., & Clarke, R. V. (Eds.). (1986). The reasoning criminal: Rational choice perspectives on offending. New York: Springer-Verlag.Google Scholar
  14. Council of Europe. (2011) Convention on Preventing and Combating Violence Against Women and Domestic Violence. Istanbul 11.05.1022. Council of Europe Treaty Series No. 210. Available at: [accessed 8 December 2014].
  15. Cutbush, S., Ashley, O. S., Kan, M. L., Hampton, J. and Hall, D. M. (2010) Electronic Aggression Among Adolescent Dating Partners: Demographic Correlates and Associations with Other Types of Violence. Poster presented at the American Public Health Association annual meeting, November 6–10. Denver, CO. Available at: [accessed 7 April 2015].
  16. Cutbush, S., Williams, J., Miller, S., Gibbs, D. and Clinton-Sherrod, M. (2012) Electronic Dating Aggression Among Middle School Students: Demographic Correlates and Associations with Other Types of Violence. Poster presented at the American Public Health Association annual meeting, October 27–31. San Francisco, CA. Available at: [accessed 7 April 2015].
  17. Dick, R. N., McCauley, H. L., Jones, K. A., Tancredi, D. J., Goldstein, S., Blackburn, S., et al. (2014). Cyber dating abuse among teens using school-based health centers. Pediatrics, 134(6), 1560–1567.CrossRefGoogle Scholar
  18. Draucker, C. B., & Martsolf, D. S. (2010). The role of electronic communication Technology in Adolescent Dating Violence. Journal of Child and Adolescent Psychiatric Nursing, 23(3), 133–142.CrossRefGoogle Scholar
  19. Draucker, C. B., Martsolf, D. S., Stephenson, P., Heckman, T., Ferguson, C. P., Perkins, S., et al. (2012). Types of aggressive relationships in adolescent dating violence. Journal of Aggression, Maltreatment & Trauma, 21(5), 516–539.CrossRefGoogle Scholar
  20. Epstein-Ngo, Q. M., Roche, J. S., Walton, M. A., Zimmerman, M. A., Chermack, S. T., & Cunningham, R. M. (2014). Technology-delivered dating aggression: Risk and promotive factors and patterns of associations across violence types among high-risk youth. Violence and Gender, 1(3), 131–133.CrossRefGoogle Scholar
  21. Fernandez-Gozalez, L., O’Leary, K. D., & Munoz-Rivas, M. J. (2013). We are not joking: Need for controls in reports of dating violence. Journal of Interpersonal Violence, 28(3), 602–620.CrossRefGoogle Scholar
  22. Field, A. (2009). Discovering statistics using SPSS (3rd ed.). London: SAGE.Google Scholar
  23. Foshee, V. A. (1996). Gender differences in adolescent dating abuse prevalence, types and injuries. Health Education Research, 11, 275–286.CrossRefGoogle Scholar
  24. Foshee, V. A., Linder, G. F., Bauman, K. E., Langwick, S. A., Arriaga, X. B., Heath, J. L., et al. (1996). The safe dates project: Theoretical basis, evaluation design, and selected baseline findings. American Journal of Preventative Medicine, 12(5), 39–47.CrossRefGoogle Scholar
  25. Foshee, V. A., McNaughton Reyes, H. L., Gottfredson, N. C., Chang, L. Y., & Ennett, S. T. (2013). A longitudinal examination of psychological, behavioral, academic, and relationship consequences of dating abuse victimization among a primarily rural sample of adolescents. Journal of Adolescent Health, 53(6), 723–739.CrossRefGoogle Scholar
  26. Fox, C. L., Corr, M. L., Gadd, D., & Butler, I. (2014). Young Teenagers' experiences of domestic abuse. Journal of Youth Studies, 17(4), 510–526.CrossRefGoogle Scholar
  27. Giordano, P. C., Soto, D. A., Manning, W. D., & Longmore, M. A. (2010). The characteristics of romantic relationships associated with teen dating violence. Social Science Research, 39(6), 863–874.CrossRefGoogle Scholar
  28. Gov UK. (1978) The Protection of Children Act 1978: Chapter 37. Available at: [accessed 12 June 2016].
  29. Graham-Kevan, N., & Archer, J. (2003). Physical aggression and control in heterosexual relationships: The effect of sampling. Violence and Victims, 18(2), 181–196.CrossRefGoogle Scholar
  30. Hinduja, S. & Patchin, J. W. (2011). Electronic Dating Violence: A Brief Guide for Educators and Parents. Cyberbullying Research Center. Available from [Accessed 6 June 2015].
  31. Home Office. (2012). Cross-government definition of domestic violence: A consultation summary of responses. London: Home Office.Google Scholar
  32. Jaishankar, K. (2011). Space transition theory of cyber crimes. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the internet (pp. 283–301). Prentice Hall: Upper Saddle River.Google Scholar
  33. Johnson, M. P. (2006). Conflict and control: Gender symmetry and asymmetry in domestic violence. Violence Against Women, 12(11), 1003–1018.CrossRefGoogle Scholar
  34. Kirwan, G., & Power, G. (2013). Cyber crime: The psychology of online offenders. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
  35. Korchmaros, J. D., Ybarra, M. L., Langhinrichsen-Rohling, J., Boyd, D., & Lenhart, A. (2013). Perpetration of teen dating violence in a networked society. Cyberpsychology, Behavior, and Social Networking, 16(8), 561–567.CrossRefGoogle Scholar
  36. Lucero, J. L., Weisz, A. N., Smith-Darden, J., & Lucero, S. M. (2014). Exploring gender differences: Socially interactive technology use/abuse among dating teens. Affilia, 29(4), 478–491.CrossRefGoogle Scholar
  37. Marcum, C. D. (2011) Adolescent Online Victimisation and Constructs of Routine Activities Theory. In Jaishankar K (ed) (2011) Cyber Criminology: Exploring Internet Crimes and Criminal Behavior. Boca Raton: CRC Press, pp. 253–276.CrossRefGoogle Scholar
  38. Messinger, A., Frye, D. A., Rickert, V. I., Catallozi, M., & Davidson, L. L. (2014). Extending Johnson's intimate partner violence typology: Lessons from an adolescent sample. Violence Against Women, 20(8), 948–971.CrossRefGoogle Scholar
  39. Miró Llinares, F. (2011). La oportunidad criminal en el ciberespacio. Aplicación y desarrollo de la teoría de las actividades cotidianas para la prevención del cibercrimen. Revista Electrónica de Ciencia Penal y Criminología, 13-07.Google Scholar
  40. Mishna, F., McLuckie, A., & Saini, M. (2009). Real-world dangers in an online reality: A qualitative study examining online relationships and cyber abuse. Social Work Research, 33(2), 107–118.CrossRefGoogle Scholar
  41. National Centre on Domestic and Sexual Violence. (n.d.) Teen Power and Control Wheel. [online] available from [3 July 2018].
  42. Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5(1), 773–793.Google Scholar
  43. Office for National Statistics. (2011) Census 2011: Ethnic group by sex and age. [online] available from_<> [September 2016].
  44. Ouytsel, J. V., Ponnet, K. and Walrave, M. (2016) Cyber Dating Abuse Victimization Among Secondary School Students From a Lifestyle-Routine Activities Theory Perspective. Journal of Interpersonal Violence. Google Scholar
  45. O'Leary, K. D., Smith Slep, A. M., Avery-Leaf, S., & Cascardi, M. (2008). Gender differences in dating aggression among multiethnic high school students. Journal of Adolescent Health, 42(5), 473–479.CrossRefGoogle Scholar
  46. Pence, E., & Paymar, M. (1993). Education groups for men who batter: The Duluth model. New York: Springer.CrossRefGoogle Scholar
  47. Picard, P. (2007) Tech Abuse in Teen Relationships. Chicago: Teen Research Unlimited. Available at: [accessed 6 June 2015].
  48. Pittaro, M. L. (2007). Cyber stalking: An analysis of online harassment and intimidation. International Journal of Cyber Criminology, 1(2), 180–197.Google Scholar
  49. Redfield, R. R., Schuchat, A., Dauphin, L., Cono, J., Richards, C. L. and Iademarco, M. F. (2018) Youth Risk Behaviour Surveillance - United States, 2017. MMWR Surveillance Summaries, vol 67, no. 8. US Department of Health and Human Services: Centers for Disease Control and Prevention.Google Scholar
  50. Richards, T. N., Branch, K. A., & Ray, K. (2014). The impact of parental and peer social support on dating violence perpetration and victimization among female adolescents: A longitudinal study. Violence and Victims, 29(2), 317–331.CrossRefGoogle Scholar
  51. Ringrose, J., Harvey, L., Gill, R., & Livingstone, S. (2013). Teen girls, sexual double standards and ‘sexting’: Gendered value in digital image exchange. Feminist Theory, 14(3), 305–323.CrossRefGoogle Scholar
  52. Ringrose, J., Gill, R., Livingstone, S., & Harvey, L. (2012). A qualitative study of children, young people and ‘sexting’: A report prepared for the NSPCC. London: NSPCC.Google Scholar
  53. Simon, T. R., Miller, S., Gorman-Smith, D., Orpinas, P., & Sullivan, T. (2010). Physical dating violence norms and behavior among sixth-grade students from four U.S. sites. Journal of Early Adolescence, 30(3), 395–409.CrossRefGoogle Scholar
  54. Stark, E. (2007). Coercive control: How men entrap women in personal life. New York: Oxford University Press.Google Scholar
  55. Stonard, K. E., Bowen, E., Lawrence, T. R., & Price, S. A. (2014). The relevance of technology to the nature, prevalence and impact of adolescent dating violence and abuse: A research synthesis. Aggression and Violent Behavior, 19(4), 390–417.CrossRefGoogle Scholar
  56. Stonard, K. E., Bowen, E., Walker, K., & Price, S. A. (2017). “They’ll always find a way to get to you”: Technology use in adolescent romantic relationships and its role in dating violence and abuse. Journal of Interpersonal Violence, 32(14), 2083–2117.CrossRefGoogle Scholar
  57. Stonard, K. (2018). Technology-assisted adolescent dating violence and abuse: A factor analysis of the nature of electronic communication technology used across 12 types of abusive and controlling behaviour. Journal of Child and Family Studies.
  58. Swahn, M. H., Bossarte, R. M., & Sullivent, E. E. (2008a). Age of alcohol use initiation, suicidal behavior, and peer and dating violence victimization and perpetration among high-risk, seventh-grade adolescents. Pediatrics, 121(2), 297–305.CrossRefGoogle Scholar
  59. Swahn, M. H., Simon, T. R., Hertz, M. F., Arias, I., Bossarte, R. M., Ross, J. G., Gross, L. A., Iachan, R., & Hamburger, M. E. (2008b). Linking dating violence, peer violence, and suicidal behaviors among high-risk youth. American Journal Preventative Medicine, 34(1), 30–38.CrossRefGoogle Scholar
  60. Tompson, T., Benz, J. and Agiesta, J. (2013) The Digital Abuse Study: Experiences of Teens and Young Adults. AP-NORC Centre for Public Affairs Research. Available at: [accessed 6 June 2015].
  61. Walker, L. E. A. (1989). Psychology and violence against women. American Psychologist, 44(4), 695–702.CrossRefGoogle Scholar
  62. Williams, T. S., Connolly, J., Pepler, D., Craig, W., & Laporte, L. (2008). Risk models of dating aggression across different adolescent relationships: A developmental psychopathology approach. Journal of Consulting and Clinical Psychology, 76(4), 622–632.CrossRefGoogle Scholar
  63. Windle, M., & Mrug, S. (2009). Cross-gender violence perpetration and victimization among early adolescents and associations with attitudes toward dating conflict. Journal of Youth Adolescence, 38(3), 429–439.CrossRefGoogle Scholar
  64. Wood, M., Barter, C., Stanley, N., Aghtaie, N., & Larkins, C. (2015). Images across Europe: The sending and receiving of sexual images and associations with interpersonal violence in young People's relationships. Children and Youth Services Review, 59, 149–160.CrossRefGoogle Scholar
  65. Yllö, K., & Bograd, M. (Eds.). (1990). Feminist perspectives on wife abuse. London: SAGE.Google Scholar
  66. Zweig, J. M., Dank, M., Yahner, J., & Lachman, P. (2013). The rate of cyber dating abuse among teens and how it relates to other forms of teen dating violence. Journal of Youth and Adolescence, 42(7), 1063–1077.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Faculty of Social SciencesUniversity of WolverhamptonWolverhamptonUK

Personalised recommendations