The prevalence and overlap of technology-assisted and offline adolescent dating violence
- 104 Downloads
Research has established the nature and prevalence of offline Adolescent Dating Violence (ADV) and the role of Technology-Assisted Adolescent Dating Violence (TAADV) has been recently but slowly acknowledged, albeit primarily in the United States. Less research however, has examined such types of violence among British adolescences and the extent of overlap between the two forms of abuse. This paper examines the nature, prevalence and overlap of TAADV and offline ADV victimisation/instigation among a sample of adolescents in England. Four-hundred-and-sixty-nine adolescents (aged 12–18) completed questionnaires regarding their experience of TAADV and ADV. Findings revealed that TAADV involvement was prevalent and was generally characterised by both victimisation and instigation, except for sexual TAADV in which females were more likely to be identified as victims only. Technology appears to have provided new opportunities for victimisation and/or instigation of TAADV exclusively that may not have been possible before the development of such communication tools; however, some adolescents reported experiencing both TAADV and ADV. Implications of the findings are discussed and recommendations are made for future policy, practice and research.
KeywordsAdolescent(ce) Technology-assisted dating violence Offline dating violence Prevalence Overlap
This work was supported by a PhD studentship in the Faculty of Health and Life Sciences at Coventry University, Priory Street, Coventry, CV1 5FB. I would like to thank my PhD supervisory team, Professor Erica Bowen, Dr. Shelley Price, and Dr. Kate Walker for their support with the research reported in this paper and for reading and providing critical feedback on the original thesis chapter.
Compliance with Ethical Standards
Disclosure of Potential Conflicts of Interest
All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and/or national research committee and with the 1964 Helsinki declaration and its later amendments or comparable ethical standards.
Informed consent was obtained from all individual participants included in the study.
- Agustina, J. R. (2015). Understanding cyber victimization: Digital architectures and the disinhibition effect. International Journal of Cyber Criminology, 9(1), 35–54.Google Scholar
- Associated Press and MTV. (2009) A Thin Line: 2009 AP-MTV Digital Abuse Study. Available at: http://www.athinline.org/MTV-AP_Digital_Abuse_Study_Executive_Summary.pdf [accessed 1 June 2014].
- Associated Press and MTV. (2011). Associated Press-MTV Digital Abuse Survey August 2011. Available from http://www.athinline.org/pdfs/MTV-AP_2011_Research_Study-Exec_Summary.pdf [Accessed 1 June 2014].
- Bandura, A. (1977). Social learning theory. Englewood Cliffs: Prentice-Hall.Google Scholar
- Barter, C., McCarry, M., Berridge, D. and Evans, K. (2009) Partner Exploitation and Violence in Teenage Intimate Relationships. London: NSPCC. Available at: http://www.nspcc.org.uk/globalassets/documents/research-reports/partner-exploitation-violence-teenage-intimate-relationships-report.pdf [accessed 6 June 2015].
- Barter, C., Wood, M., Aghtaie, N., Larkins, C., Stanley, N., Apostolov, G. et al. (2015) Briefing Paper 2: Incidence Rates and Impact of Experiencing Interpersonal Violence and Abuse in Young People’s Relationships. Safeguarding Teenage Intimate Relationships: Connecting Online and Offline Contexts and Risks. Funded by DAPHNE III European Commission. Available at: http://stiritup.eu/wp-content/uploads/2015/02/STIR-Briefing-Paper-21.pdf [accessed 25 March 2015].
- Bryman, A. (2004). Social Research Methods. 2nd ed. Oxford: Oxford University Press.Google Scholar
- Burman, M., & Cartmel, F. (2005). Young peoples attitudes towards gendered violence. Edinburgh: NHS Health Scotland.Google Scholar
- Centers for Disease Control and Prevention. (2012) Understanding Teen Dating Violence. Available at: http://www.cdc.gov/violenceprevention/pdf/teen-dating-violence-factsheet-a.pdf [accessed 6 June 2015].
- Cornish, D. B., & Clarke, R. V. (Eds.). (1986). The reasoning criminal: Rational choice perspectives on offending. New York: Springer-Verlag.Google Scholar
- Council of Europe. (2011) Convention on Preventing and Combating Violence Against Women and Domestic Violence. Istanbul 11.05.1022. Council of Europe Treaty Series No. 210. Available at: http://www.conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?CL=ENG&NT=210 [accessed 8 December 2014].
- Cutbush, S., Ashley, O. S., Kan, M. L., Hampton, J. and Hall, D. M. (2010) Electronic Aggression Among Adolescent Dating Partners: Demographic Correlates and Associations with Other Types of Violence. Poster presented at the American Public Health Association annual meeting, November 6–10. Denver, CO. Available at: http://www.rti.org/pubs/apha10_cutbush_poster.pdf [accessed 7 April 2015].
- Cutbush, S., Williams, J., Miller, S., Gibbs, D. and Clinton-Sherrod, M. (2012) Electronic Dating Aggression Among Middle School Students: Demographic Correlates and Associations with Other Types of Violence. Poster presented at the American Public Health Association annual meeting, October 27–31. San Francisco, CA. Available at: http://www.rti.org/pubs/apha12_cutbush_poster.pdf [accessed 7 April 2015].
- Epstein-Ngo, Q. M., Roche, J. S., Walton, M. A., Zimmerman, M. A., Chermack, S. T., & Cunningham, R. M. (2014). Technology-delivered dating aggression: Risk and promotive factors and patterns of associations across violence types among high-risk youth. Violence and Gender, 1(3), 131–133.CrossRefGoogle Scholar
- Field, A. (2009). Discovering statistics using SPSS (3rd ed.). London: SAGE.Google Scholar
- Foshee, V. A., McNaughton Reyes, H. L., Gottfredson, N. C., Chang, L. Y., & Ennett, S. T. (2013). A longitudinal examination of psychological, behavioral, academic, and relationship consequences of dating abuse victimization among a primarily rural sample of adolescents. Journal of Adolescent Health, 53(6), 723–739.CrossRefGoogle Scholar
- Gov UK. (1978) The Protection of Children Act 1978: Chapter 37. Available at: http://www.legislation.gov.uk/ukpga/1978/37/pdfs/ukpga_19780037_en.pdf [accessed 12 June 2016].
- Hinduja, S. & Patchin, J. W. (2011). Electronic Dating Violence: A Brief Guide for Educators and Parents. Cyberbullying Research Center. Available from https://cyberbullying.org/electronic_dating_violence_fact_sheet.pdf [Accessed 6 June 2015].
- Home Office. (2012). Cross-government definition of domestic violence: A consultation summary of responses. London: Home Office.Google Scholar
- Jaishankar, K. (2011). Space transition theory of cyber crimes. In F. Schmalleger & M. Pittaro (Eds.), Crimes of the internet (pp. 283–301). Prentice Hall: Upper Saddle River.Google Scholar
- Miró Llinares, F. (2011). La oportunidad criminal en el ciberespacio. Aplicación y desarrollo de la teoría de las actividades cotidianas para la prevención del cibercrimen. Revista Electrónica de Ciencia Penal y Criminología, 13-07.Google Scholar
- National Centre on Domestic and Sexual Violence. (n.d.) Teen Power and Control Wheel. [online] available from http://www.ncdsv.org/images/teen%20p&c%20wheel%20no%20shading.pdf [3 July 2018].
- Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5(1), 773–793.Google Scholar
- Office for National Statistics. (2011) Census 2011: Ethnic group by sex and age. [online] available from_<https://www.nomisweb.co.uk/census/2011/DC2101EW/view/2092957699?rows=c_age&cols=c_sex> [September 2016].
- Ouytsel, J. V., Ponnet, K. and Walrave, M. (2016) Cyber Dating Abuse Victimization Among Secondary School Students From a Lifestyle-Routine Activities Theory Perspective. Journal of Interpersonal Violence. Google Scholar
- Picard, P. (2007) Tech Abuse in Teen Relationships. Chicago: Teen Research Unlimited. Available at: http://www.loveisrespect.org/wp-content/uploads/2009/03/liz-claiborne-2007-tech-relationship-abuse.pdf [accessed 6 June 2015].
- Pittaro, M. L. (2007). Cyber stalking: An analysis of online harassment and intimidation. International Journal of Cyber Criminology, 1(2), 180–197.Google Scholar
- Redfield, R. R., Schuchat, A., Dauphin, L., Cono, J., Richards, C. L. and Iademarco, M. F. (2018) Youth Risk Behaviour Surveillance - United States, 2017. MMWR Surveillance Summaries, vol 67, no. 8. US Department of Health and Human Services: Centers for Disease Control and Prevention.Google Scholar
- Ringrose, J., Gill, R., Livingstone, S., & Harvey, L. (2012). A qualitative study of children, young people and ‘sexting’: A report prepared for the NSPCC. London: NSPCC.Google Scholar
- Stark, E. (2007). Coercive control: How men entrap women in personal life. New York: Oxford University Press.Google Scholar
- Stonard, K. (2018). Technology-assisted adolescent dating violence and abuse: A factor analysis of the nature of electronic communication technology used across 12 types of abusive and controlling behaviour. Journal of Child and Family Studies. https://doi.org/10.1007/s10826-018-1255-5.
- Tompson, T., Benz, J. and Agiesta, J. (2013) The Digital Abuse Study: Experiences of Teens and Young Adults. AP-NORC Centre for Public Affairs Research. Available at: http://www.apnorc.org/PDFs/Digital%20Abuse/AP-NORC%20Center%20and%20MTV_Digital%20Abuse%20Study_FINAL.pdf [accessed 6 June 2015].
- Yllö, K., & Bograd, M. (Eds.). (1990). Feminist perspectives on wife abuse. London: SAGE.Google Scholar