Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2016 Feb;45(2):340-9.
doi: 10.1007/s10964-015-0380-3. Epub 2015 Nov 2.

The Temporal Association Between Traditional and Cyber Dating Abuse Among Adolescents

Affiliations

The Temporal Association Between Traditional and Cyber Dating Abuse Among Adolescents

Jeff R Temple et al. J Youth Adolesc. 2016 Feb.

Abstract

While research has explored adolescents' use of technology to perpetrate dating violence, little is known about how traditional in-person and cyber abuse are linked, and no studies have examined their relationship over time. Using our sample of 780 diverse adolescents (58 % female), we found that traditional and cyber abuse were positively associated, and cyber abuse perpetration and victimization were correlated at each time point. Cyber abuse perpetration in the previous year (spring 2013) predicted cyber abuse perpetration 1 year later (spring 2014), while controlling for traditional abuse and demographic variables. In addition, physical violence victimization and cyber abuse perpetration and victimization predicted cyber abuse victimization the following year. These findings highlight the reciprocal nature of cyber abuse and suggest that victims may experience abuse in multiple contexts.

Keywords: Adolescents; Cyber abuse; Dating violence; Longitudinal.

PubMed Disclaimer

Conflict of interest statement

Conflicts of Interests. The authors report no conflicts of interest.

Similar articles

Cited by

References

    1. Bandura A. Social learning theory. New York: General Learning Press; 1977.
    1. Barter C, McCarry M, Berridge D, Evans K. Partner exploitation and violence in teenage intimate relationships. London: NSPCC; 2009. (Retrieved from http://www.nspcc.org.uk/clobalassets/documents/research-reorts/partner-e...).
    1. Brener ND, Kann L, Shanklin S, Kinchen S, Eaton DK, Hawkins J, Flint KH. Methodology of the Youth Risk Behavior Surveillance System – 2013. MMWR. 2013;62(1) - PubMed
    1. Collins LM, Schafer JL, Kam C-m. A comparison of inclusive and restrictive strategies in modern missing data procedures. Psychological Methods. 2001;6(4):330–351. - PubMed
    1. Cutbush S, Ashley OS, Kan ML, Hamptom J, Hall DM. Electronic aggression among adolescent dating partners: Demographic correlates and associations with other types of violence. Poster presented at the American Public Health Association, annual meeting; November 6–10; Denver, CO. 2010. http://www.rti.org/pubs/apha10_cutbush_poster.pdf.

Publication types

LinkOut - more resources