SlideShare una empresa de Scribd logo
1 de 45
The Promise of the
Positive in the
Study of Resilience
Sherry Hamby
University of the South

Collaborators: Victoria Banyard & John Grych
Presented August 2, 2013 at the American Psychological Association Annual Convention, Honolulu, HI.
Research supported by The John Templeton Foundation.
sherry.hamby@sewanee.edu or lifepaths@sewanee.edu
The Way Things Were…
and were and were and were
Vincent Van
Gogh—
No relief for
mental illness

Cain & Abel in
Titian’s rendition
Rape of the Sabine Women, event 750BC
depicted by Nicolas Poussin about 1635
Henry
VIII, problematic
partner

2
Centuries Go By…
• …and slowly many mental health problems
and many adversities are seen less as an
inherent part of existence, and more as health
and social problem that can be addressed. In
1824, the first modern humane organization is
founded….

3
• …to protect cats, dogs, and
other animals!
• It is the Royal Society for
the Prevention of Cruelty to
Animals, founded 1824
(www.rspca.org.uk)
• Followed in 1866 by U.S.
version (www.aspca.org).

4
The Beginnings of a Social Movement
• Shortly afterwards, it occurred to
some to organize the first Societies for
the Prevention of Cruelty to Children
too.
• “It is not alone the lower animals that
are subject to ill-treatment and
cruelty.” (The Northern
Budget, Troy, N.Y., 1867, cited by
NYSPCC, 2000)
• 1st society est. in New York, 1875

Mary Ellen, who, in
1873, became the
first child to
receive a child
protection
intervention.

5
The Modern Discovery of Psychology
• Late 1800s, early 1900s: The invention of
the “talking cure” & the discipline of
psychology
• 1800s, early 1900s: 1st laws limiting or
abolishing right to beat one’s wife passed in
England, France, some U.S. states.
• Post WWII—Psychotherapy goes
mainstream.
• 1962—The medical establishment
“discovers” child abuse as a cause of
traumatic injury (Kempe, 1962).
• Early 1970s—1st refuges/shelters
• Late 20th century: Huge social movements
emerged to address all kinds of
psychological issues.
• Healthcare, schools, criminal justice, social
services, policymakers—all major social
institutions become involved.

6
A Surprising Amount of Disclosure
• Important innovations in social science
research, such as the U.S. National
Crime Survey and Kinsey’s surveys on
sexual behavior.
• Research established that people would
disclose
– Violent behavior
– Intimate behavior

1948: An early scientific bestseller

• Straus, Gelles, & Steinmetz established
that people would also disclose
violence by intimates to researchers.
• Mary Koss first presented on Hidden
Rape in 1980.
The 1975 National Family Violence Survey
Despite Strides, Limitations

8
The Field of Violence

Dating violence

Child abuse
IPV

Community
Violence

Sexual assault

Family violence
Bullying
9
More Silos of Psychology

Adversity

Coping
IPV

Psychology of Religion
& Spirituality

Resilience

Positive psychology
Community psychology
10
Grant reviewers
like low-risk
(=repetitive)
methods

Journal
reviewers like
familiar
methods too
Journal reviewers
often seem to prefer
results that confirm
their preconceptions

Grant reviewers
like familiar
questionnaires

Tenure based on #
more than quality

Drags
on
Science

Authors do lit reviews
when they write their
papers, not when
they plan their
studies

From The Web of Violence, Hamby & Grych, 2013

11
12
Too Much Focus on Problems,
Not Strengths

13
Much of Violence Research
Technology is Stalled in the
1970s

14
Looking For Communication Across
Silos & Further Progress Promoting
Well-Being

15
TWO NEW STRENGTHS-BASED
PROJECTS ON COPING AND
RESILIENCE:
1) BATTERED WOMEN’S
PROTECTIVE STRATEGIES
2) LIFE PATHS RESEARCH
PROJECT
16
BATTERED WOMEN’S
PROTECTIVE STRATEGIES:
STRONGER THAN YOU KNOW
17
A Deficit-Focused Paradigm & A
Limited Research Base
• We ask women over and over about
trauma symptoms, substance use, and
their own perpetration, but almost never
ask about resources & strengths.
• We teach the cycle of violence even
though it is based on a single qualitative
study more than 30 years old.
• Safety planning is an almost universal
service, but almost no safety planningbased research exists, either to map
typical safety planning steps or the
effectiveness of formal safety plans.

The photo
accompanying my
blog on “The Many
Strengths of
Battered Women”
at OUP
18
Recognizing Strengths Requires
Recognizing All the Risks
• Danger to self, yes, but also:
• Danger to others
• Other risks created by batterer (custody battles,
threats to ruin credit, kidnapping children, etc)
• Financial risks and obstacles
• Institutional risks and obstacles
• Social risks (family rejection, stigma, etc)
• Personal values that influence coping
19
Battered Women’s Protective
Strategies
Immediate
situational
strategies

Formal helpseeking
to
police, shelters, and
other services

Protecting
children, family, and
pets

Protective
Strategies
Invisible strategies
(under-recognized
actions women
take)

Turning to religious
and spiritual
resources

Reaching out for
social support

20
Immediate Situational Strategies
• Escaping the scene: Leave the house, Run to another room, Lock
oneself in a room, Get into (or out of) a car, Walk away calmly
• Luring away from dangerous parts of the house: Keep
perpetrator away from gun cabinets, kitchens, etc.
• Calling for help: Signal a neighbor or child, Teach children who
to get help, Get a pay-as-you-go phone, Keep a landline telephone,
Scream, Pass a note or leave a message in a public place
• Defusing strategies: Distract with other activities such as making
tea, Hold hand/cuddle with perpetrator, even if do not feel
affectionate, Keep things quiet, Talk batterer out of abuse
• Protecting children or others from the attacker
• Self-defensive actions: Use force to stop perpetrator’s assault,
Protect one’s body, Stop perpetrator from destroying objects
around house
21
•

Protecting Children, Family &
Pets on children and loved
Immediate protective strategies focused

ones: Physically insert themselves between batterer and
others, Try to get batterer to focus on them, Create code words and
safety plans with children or others, Send children to their rooms
or other safer location, Turn up stereo so children cannot hear
violence
• Longer term strategies for protecting children: Send children to
stay with relatives, Seek full legal custody, Help children process
experience, Volunteer at school, Delay leaving to protect children
• Protecting pets: Delay leaving to protect pets from batterer’s
threats, Enroll pets in “doggy day care” or place in kennel
• Protecting other family members, friends, and co-workers:
Quit job, Stay away from family and friends, Create separate
email account that batterer does not know
22
Reaching Out for Social Support
•
•
•
•
•
•
•
•
•

Obtain emotional support
Stay with family or friends
Get financial or practical help with moving
Ask family or friend to accompany women to court or agencies
Ask for help filling out legal forms and other paperwork
Get help with child care
Get help with transportation
Ask family or friends to store belongings or extra keys
Ask family or friends to hold bank accounts or other assets in their
name
• Ask family to help negotiate a plan for reconciliation
• Ask boss or co-workers to re-arrange schedules
23
• Ask for security plan at the workplace
Turning to Religious & Spiritual
Resources
•
•
•
•
•
•
•
•
•
•
•
•

Strength and perseverance from prayer & faith in God/higher power
Comfort from inspirational stories in religious texts
Hope for the future
Social support from clergy, other members of the congregation
Pastoral counseling from clergy
Free social activities
Help paying utility bills, home repair, transportation
Support during illness or following birth of child
Donations of food, clothing, furniture, and other necessities
Help with immigration status
Literacy and English as a second language classes
School supplies, winter coats, and free activities for children
24
Formal Helpseeking
• Contrary to stereotypes of passivity:
• Helpseeking for DV is similar to helpseeking for
psychological problems:
– 28% in Canadian survey (Bland et al, 1997)
– 26% in Europe (ESEMeD MHEDEA, 2004)
– 41% in U.S. (Wang et al, 2005), but most of this not
specialized help
• Psychiatrists 12%
• Other mental health providers 16%

• 66% of DV victims had sought formal services in
one Canadian survey (Barrett & Lapierre, 2010)
25
Types of Formal Helpseeking
•
•
•
•
•
•
•
•
•
•
•

Going to a Domestic Violence Shelter
Other Domestic Violence Program Services
Info, referral, transportation, court accompaniment, etc
Calling the Police
Seeking Help from Victim Assistance Programs
Obtaining a Restraining Order/Order of Protection
Mental Health Services
Health Care
12-step programs such as Al-Anon
Other Social Services
Support groups
26
Invisible Strategies
•
•
•
•

Money, money, money
Arranging affairs
Wellness
Returning to batterer-yes, sometimes this is
safest, best option from a range of really rotten
choices
• Activism

27
LIFE PATHS RESEARCH
PROJECT
28
The Web of Violence
Child
Physical
Abuse
Intimate
Partner
Violence

Dating
Violence

Child
Neglect

Child
Sexual
Abuse

Community
physical
assault

Sexual
Assault &
Rape

Bullying
Elder
Abuse

Gang
violence

Robbery

Exposure to
community
violence
Interconnections in Representative Community Samples
Interconnection

Strength of association (OR)

Well-known, well-established connections
Exposure to IPV & child physical abuse

5.0 (NatSCEV; Hamby et al 2010)

Exposure to IPV & teen dating victimization

3.8 (NatSCEV; Hamby et al 2010)

Physical IPV & Stalking by intimate partner

7.0 (CDC, Krebs et al, 2011)

Physical IPV & sexual violence by intimate partner

2.4 (CDC, Krebs et al, 2011)

Strong but under-recognized connections
Exposure to IPV & neglect

6.2 (NatSCEV; Hamby et al 2010)

Exposure to IPV and sexual abuse by known adult

5.2 (NatSCEV; Hamby et al 2010)

Any physical assault & any sexual victimization

6.2 (NatSCEV, Finkelhor et al, 2009)

Any witnessed violence and any sexual victimization

4.5 (NatSCEV, Finkelhor et al, 2009)

Teen dating victimization and peer sexual harassment

5.3 (NatSCEV; Hamby et al 2012)

Weaker but still positive connections
Exposure to IPV and peer relational aggression

1.7 (NatSCEV; Hamby et al 2010)

Any property crime and any sexual victimization

3.2 (NatSCEV, Finkelhor et al, 2009)
What We Act Like We are
Comparing

IPV
victims

Nonvictim
What We are Comparing

IPV victim
Bullying victim
Maltreatment victim

Sexual assault victim

Bullying victim
Maltreatment victim
Sexual assault victim
Etiological Process Relevant to Most
Forms of Violence
Situation
• Environmental
Conditions

Person
• Cognitive Processes
– Beliefs about aggression
– Schemas
– Automatic cognitions

• Affective Processes
• Self-Regulation
• Personality
– Impulsivity
– Narcissism

– Heat
– Overcrowding

VIOLENCE

• Use of drugs/alcohol
• Social Integration
• Behavior of Others
– Hostility
– Rejection

• Relationship Context
• Considering multiple forms of
violence offers a more
comprehensive and integrated
approach to understanding
how these experiences can
lead to maladaptive outcomes
(including more violence).
• See Hamby & Grych (2013)

34
Towards even greater integration…
• The Web of Violence framework does not account for
adaptive outcomes seen in some children and adults
exposed to violence.

35
Towards even greater integration…
• The Web of Violence framework does not account for
adaptive outcomes seen in some children and adults
exposed to violence.
• Work on resilience shows that many individuals maintain
or regain healthy functioning following stressful and
traumatic events.

36
Towards even greater integration…
• The Web of Violence framework does not account for
adaptive outcomes seen in some children and adults
exposed to violence.
• Work on resilience shows that many individuals maintain
or regain healthy functioning following stressful and
traumatic events.
• A truly comprehensive model of the effects of violence
needs to account for adaptive and maladaptive outcomes

37
Examples of risk factors
• Individual:
– Poor self-regulation
– Low intellectual functioning
• Relational:
– Insecure attachment
– Inconsistent parenting
• Environmental
– Lower SES
– Unsafe neighborhood
38
Examples of protective factors
• Individual:
– Good self-regulation
– High intellectual functioning
• Relational:
– Secure attachment
– Consistent parenting
• Environmental
– Higher SES
– Safe neighborhood

• Identifying “protective” factors that simply
represent the flip side of “risk” factors does not
advance understanding of the processes leading
to adaptive outcomes
39
New Approaches to Resilience
• A new conceptual model for
resilience that focuses on 3 core
sets of individual strengths:
– interpersonal,
– regulatory, and
– spiritual

• We believe these fit into a
broader system of
personal, family, and community
resources to improve well-being
(not just lack of symptoms).
40
Towards a comprehensive model of the
impact of violence on health
Adapted from Sandler (2001)
Adversity
Violence
Other trauma

Resources
Individual
Relational
Environmental

Adaptive
Outcomes
Mediating Processes
-Secure relationships
-Coping Apps & Behs
-Sense of meaning

Maladaptive
Outcomes

41
Tools & Ideas For Moving
Forward

• Questionnaires still emphasize
negative risk factors too.
• Technology is a key step to
changing research practices
• Good to assess the density and
diversity of strengths & adversities
• We have developed numerous brief
measures that are suitable for
community samples, including
adolescents. We are freely
providing these for research &
clinical use.

42
The Broader Conceptual Framework
ROLE: Involvement in Violence
Victim

Perpetrator

Both

Mono-victim
Acute, Isolated, Single
form exposed

Mono-perpetrator
Criminal Specialists

Mono perpetrator-victim
Bully-victim
Mutual IPV

Poly-victim
Complex trauma
High ACES score
Also: Multiple type victim,
Multiple victim, Multiple
crime-type victim, Multiple
form exposed,

Poly-perpetrator
Criminal Generalists
Violent polymorphism

Poly perpetrator-victim
Delinquent-victim
Trauma-informed care
model

Repeat victim
Re-victimized, Chronic
victim, Complex trauma

Repeat perpetrator
Recidivist, Habitual
offender, Reconviction,
Revolving doors

Repeat perpetrator-victim
Cycle of violence,
Intergenerational
transmission
Adapted from Hamby & Grych, 2013
Coordinated Violence Prevention Model:
Hypothetical Common and Specific Elements
Where We Can Go

A technician preparing
penicillin in 1943
WE CAN HONOR THE
ACHIEVEMENTS OF THE
PAST WITHOUT GETTING
STUCK IN THE PAST.

• This point in the story is both sad &
happy.
• Sad: Unlike virtually every other
form of science, our technology is
mired in the 1970s. Our frameworks
focus too much on “half empty”
• Happy: There is information to guide
us and advances are attainable.
• Science is novelty, not convention.
• We need to push back on the
institutional forces that inhibit the best
scientific & clinical practices.
45

Más contenido relacionado

La actualidad más candente

Health and Well-Being: Historical,Present and Future Challenges for Indigenou...
Health and Well-Being: Historical,Present and Future Challenges for Indigenou...Health and Well-Being: Historical,Present and Future Challenges for Indigenou...
Health and Well-Being: Historical,Present and Future Challenges for Indigenou...PASaskatchewan
 
Suicide faculty presentation
Suicide faculty presentationSuicide faculty presentation
Suicide faculty presentationbillbucklew
 
Bullying whats-new-and-what-to-do
Bullying whats-new-and-what-to-doBullying whats-new-and-what-to-do
Bullying whats-new-and-what-to-doaensslin
 
APCRSHR10 Virtual abstract presentation of Melania Hidayat of UNFPA Indonesia
APCRSHR10 Virtual abstract presentation of Melania Hidayat of UNFPA IndonesiaAPCRSHR10 Virtual abstract presentation of Melania Hidayat of UNFPA Indonesia
APCRSHR10 Virtual abstract presentation of Melania Hidayat of UNFPA IndonesiaCNS www.citizen-news.org
 
HEATHER HAYES AND HOLLY RYAN - HIDING IN PLAIN SIGHT: WORKING WITH VICTIMS OF...
HEATHER HAYES AND HOLLY RYAN - HIDING IN PLAIN SIGHT: WORKING WITH VICTIMS OF...HEATHER HAYES AND HOLLY RYAN - HIDING IN PLAIN SIGHT: WORKING WITH VICTIMS OF...
HEATHER HAYES AND HOLLY RYAN - HIDING IN PLAIN SIGHT: WORKING WITH VICTIMS OF...iCAADEvents
 
You Can Prevent Suicide
You Can Prevent SuicideYou Can Prevent Suicide
You Can Prevent Suicidekumar mahi
 
Bullying workshops (Taylor Ibolya - Béres Tünde) 2019
 Bullying workshops (Taylor Ibolya - Béres Tünde) 2019 Bullying workshops (Taylor Ibolya - Béres Tünde) 2019
Bullying workshops (Taylor Ibolya - Béres Tünde) 2019Adygimibp
 
Kathy rinaldihope bullying
Kathy rinaldihope bullyingKathy rinaldihope bullying
Kathy rinaldihope bullyingJohn M. Rinaldi
 
Child Abuse And Neglect
Child Abuse And NeglectChild Abuse And Neglect
Child Abuse And Neglectjoon284
 
Training disclosure 11 29-10
Training disclosure 11 29-10Training disclosure 11 29-10
Training disclosure 11 29-10Karoline Khamis
 
Overcoming Stigma: Mental Health Awareness for International Students & Scholars
Overcoming Stigma: Mental Health Awareness for International Students & ScholarsOvercoming Stigma: Mental Health Awareness for International Students & Scholars
Overcoming Stigma: Mental Health Awareness for International Students & ScholarsInternational Student Insurance
 
2015-10-19 Teens, Technology, and Suicide: Understanding Causes, Effects, and...
2015-10-19 Teens, Technology, and Suicide: Understanding Causes, Effects, and...2015-10-19 Teens, Technology, and Suicide: Understanding Causes, Effects, and...
2015-10-19 Teens, Technology, and Suicide: Understanding Causes, Effects, and...Frederick Lane
 
Conduct disorder
Conduct disorderConduct disorder
Conduct disorderYanjiaoDeng
 
Understndng no consent,coercion,afsa
Understndng no consent,coercion,afsaUnderstndng no consent,coercion,afsa
Understndng no consent,coercion,afsaKaroline Khamis
 

La actualidad más candente (19)

Health and Well-Being: Historical,Present and Future Challenges for Indigenou...
Health and Well-Being: Historical,Present and Future Challenges for Indigenou...Health and Well-Being: Historical,Present and Future Challenges for Indigenou...
Health and Well-Being: Historical,Present and Future Challenges for Indigenou...
 
Suicide faculty presentation
Suicide faculty presentationSuicide faculty presentation
Suicide faculty presentation
 
Bullying whats-new-and-what-to-do
Bullying whats-new-and-what-to-doBullying whats-new-and-what-to-do
Bullying whats-new-and-what-to-do
 
APCRSHR10 Virtual abstract presentation of Melania Hidayat of UNFPA Indonesia
APCRSHR10 Virtual abstract presentation of Melania Hidayat of UNFPA IndonesiaAPCRSHR10 Virtual abstract presentation of Melania Hidayat of UNFPA Indonesia
APCRSHR10 Virtual abstract presentation of Melania Hidayat of UNFPA Indonesia
 
HEATHER HAYES AND HOLLY RYAN - HIDING IN PLAIN SIGHT: WORKING WITH VICTIMS OF...
HEATHER HAYES AND HOLLY RYAN - HIDING IN PLAIN SIGHT: WORKING WITH VICTIMS OF...HEATHER HAYES AND HOLLY RYAN - HIDING IN PLAIN SIGHT: WORKING WITH VICTIMS OF...
HEATHER HAYES AND HOLLY RYAN - HIDING IN PLAIN SIGHT: WORKING WITH VICTIMS OF...
 
You Can Prevent Suicide
You Can Prevent SuicideYou Can Prevent Suicide
You Can Prevent Suicide
 
Bullying
BullyingBullying
Bullying
 
Bullying workshops (Taylor Ibolya - Béres Tünde) 2019
 Bullying workshops (Taylor Ibolya - Béres Tünde) 2019 Bullying workshops (Taylor Ibolya - Béres Tünde) 2019
Bullying workshops (Taylor Ibolya - Béres Tünde) 2019
 
Violence in homes
Violence in homesViolence in homes
Violence in homes
 
Kathy rinaldihope bullying
Kathy rinaldihope bullyingKathy rinaldihope bullying
Kathy rinaldihope bullying
 
Child Abuse And Neglect
Child Abuse And NeglectChild Abuse And Neglect
Child Abuse And Neglect
 
Suicide Assessment and Intervention in School Settings
Suicide Assessment and Intervention in School SettingsSuicide Assessment and Intervention in School Settings
Suicide Assessment and Intervention in School Settings
 
Training disclosure 11 29-10
Training disclosure 11 29-10Training disclosure 11 29-10
Training disclosure 11 29-10
 
Overcoming Stigma: Mental Health Awareness for International Students & Scholars
Overcoming Stigma: Mental Health Awareness for International Students & ScholarsOvercoming Stigma: Mental Health Awareness for International Students & Scholars
Overcoming Stigma: Mental Health Awareness for International Students & Scholars
 
2015-10-19 Teens, Technology, and Suicide: Understanding Causes, Effects, and...
2015-10-19 Teens, Technology, and Suicide: Understanding Causes, Effects, and...2015-10-19 Teens, Technology, and Suicide: Understanding Causes, Effects, and...
2015-10-19 Teens, Technology, and Suicide: Understanding Causes, Effects, and...
 
Campaign on child abuse
Campaign on child abuseCampaign on child abuse
Campaign on child abuse
 
Conduct disorder
Conduct disorderConduct disorder
Conduct disorder
 
Basic trauma presenatio
Basic trauma presenatioBasic trauma presenatio
Basic trauma presenatio
 
Understndng no consent,coercion,afsa
Understndng no consent,coercion,afsaUnderstndng no consent,coercion,afsa
Understndng no consent,coercion,afsa
 

Destacado

Tncac the vigor nov 13
Tncac the vigor nov 13Tncac the vigor nov 13
Tncac the vigor nov 13thevigor
 
Intimate Partner Violence
Intimate Partner ViolenceIntimate Partner Violence
Intimate Partner Violenceamhall12609
 
Intergen Smarts 13 (2007)
Intergen Smarts 13 (2007)Intergen Smarts 13 (2007)
Intergen Smarts 13 (2007)Intergen
 
Intergen Smarts 12 (2006)
Intergen Smarts 12 (2006)Intergen Smarts 12 (2006)
Intergen Smarts 12 (2006)Intergen
 
Intergen Graduate Presentation 2013
Intergen Graduate Presentation 2013Intergen Graduate Presentation 2013
Intergen Graduate Presentation 2013Intergen
 
Dynamics Day 2016: digital transformation - getting personal
Dynamics Day 2016: digital transformation - getting personalDynamics Day 2016: digital transformation - getting personal
Dynamics Day 2016: digital transformation - getting personalIntergen
 
Dynamics Day 2016: NAV transformation of solutions to cloud
Dynamics Day 2016: NAV transformation of solutions to cloudDynamics Day 2016: NAV transformation of solutions to cloud
Dynamics Day 2016: NAV transformation of solutions to cloudIntergen
 
Dynamics Day 2016: enabling your cloud - principles and pitfalls
Dynamics Day 2016: enabling your cloud - principles and pitfallsDynamics Day 2016: enabling your cloud - principles and pitfalls
Dynamics Day 2016: enabling your cloud - principles and pitfallsIntergen
 

Destacado (8)

Tncac the vigor nov 13
Tncac the vigor nov 13Tncac the vigor nov 13
Tncac the vigor nov 13
 
Intimate Partner Violence
Intimate Partner ViolenceIntimate Partner Violence
Intimate Partner Violence
 
Intergen Smarts 13 (2007)
Intergen Smarts 13 (2007)Intergen Smarts 13 (2007)
Intergen Smarts 13 (2007)
 
Intergen Smarts 12 (2006)
Intergen Smarts 12 (2006)Intergen Smarts 12 (2006)
Intergen Smarts 12 (2006)
 
Intergen Graduate Presentation 2013
Intergen Graduate Presentation 2013Intergen Graduate Presentation 2013
Intergen Graduate Presentation 2013
 
Dynamics Day 2016: digital transformation - getting personal
Dynamics Day 2016: digital transformation - getting personalDynamics Day 2016: digital transformation - getting personal
Dynamics Day 2016: digital transformation - getting personal
 
Dynamics Day 2016: NAV transformation of solutions to cloud
Dynamics Day 2016: NAV transformation of solutions to cloudDynamics Day 2016: NAV transformation of solutions to cloud
Dynamics Day 2016: NAV transformation of solutions to cloud
 
Dynamics Day 2016: enabling your cloud - principles and pitfalls
Dynamics Day 2016: enabling your cloud - principles and pitfallsDynamics Day 2016: enabling your cloud - principles and pitfalls
Dynamics Day 2016: enabling your cloud - principles and pitfalls
 

Similar a Promise of the positive uclan 2013

Child Abuse Recognition and Prevention
Child Abuse Recognition and PreventionChild Abuse Recognition and Prevention
Child Abuse Recognition and PreventionBrookeHendrickx
 
fall_2019_thayer_orientation life change.pptx
fall_2019_thayer_orientation life change.pptxfall_2019_thayer_orientation life change.pptx
fall_2019_thayer_orientation life change.pptxchandan100088
 
Best practices sexual assault and domestic violence.1.15.15
Best practices sexual assault and domestic violence.1.15.15Best practices sexual assault and domestic violence.1.15.15
Best practices sexual assault and domestic violence.1.15.15Lydia Diaz
 
Domestic Violence (Research Project)
Domestic Violence (Research Project)Domestic Violence (Research Project)
Domestic Violence (Research Project)Serdar Sönmez
 
Treaty 3 Training Feb 9 2022
Treaty 3 Training Feb 9 2022Treaty 3 Training Feb 9 2022
Treaty 3 Training Feb 9 2022Maureen Trask
 
Presentation (dif font)
Presentation (dif font)Presentation (dif font)
Presentation (dif font)Anmol Bajaj
 
122lecture5TheSuicidalClientonline.ppt
122lecture5TheSuicidalClientonline.ppt122lecture5TheSuicidalClientonline.ppt
122lecture5TheSuicidalClientonline.pptEl Viajero
 
Module 10-Injuries and Violence for.pptx
Module 10-Injuries and Violence for.pptxModule 10-Injuries and Violence for.pptx
Module 10-Injuries and Violence for.pptxShashankPrabalclass1
 
Addiction and Suicide Prevention - December 2012
Addiction and Suicide Prevention - December 2012 Addiction and Suicide Prevention - December 2012
Addiction and Suicide Prevention - December 2012 Dawn Farm
 
YPI Presentation
YPI PresentationYPI Presentation
YPI PresentationAnmol Bajaj
 
Psychological first aid_ final
Psychological first aid_ finalPsychological first aid_ final
Psychological first aid_ finaldrsuhaff
 
Dealing with Fear and Anxiety in the Wake of Traumatic Events - #OttawaStrong
Dealing with Fear and Anxiety in the Wake of Traumatic Events - #OttawaStrongDealing with Fear and Anxiety in the Wake of Traumatic Events - #OttawaStrong
Dealing with Fear and Anxiety in the Wake of Traumatic Events - #OttawaStrongThe Royal Mental Health Centre
 
ABC's of Trauma Informed Care
ABC's of Trauma Informed CareABC's of Trauma Informed Care
ABC's of Trauma Informed Caremswatusc
 
Partner Violence and Children...How Should We Respond?-- Angie Boy, DrPh
Partner Violence and Children...How Should We Respond?-- Angie Boy, DrPhPartner Violence and Children...How Should We Respond?-- Angie Boy, DrPh
Partner Violence and Children...How Should We Respond?-- Angie Boy, DrPhGeorgia State School of Public Health
 
Breaking the Silence - Understanding and Addressing Sexual Assault
Breaking the Silence - Understanding and Addressing Sexual AssaultBreaking the Silence - Understanding and Addressing Sexual Assault
Breaking the Silence - Understanding and Addressing Sexual Assaultysato10
 
Nuturing wellbein ftcollinscolorado
Nuturing wellbein ftcollinscoloradoNuturing wellbein ftcollinscolorado
Nuturing wellbein ftcollinscoloradokatieclawson
 
The way back project: Needs and views of people who have attempted suicide an...
The way back project: Needs and views of people who have attempted suicide an...The way back project: Needs and views of people who have attempted suicide an...
The way back project: Needs and views of people who have attempted suicide an...Hunter Institute of Mental Health
 

Similar a Promise of the positive uclan 2013 (20)

Child Abuse Recognition and Prevention
Child Abuse Recognition and PreventionChild Abuse Recognition and Prevention
Child Abuse Recognition and Prevention
 
fall_2019_thayer_orientation life change.pptx
fall_2019_thayer_orientation life change.pptxfall_2019_thayer_orientation life change.pptx
fall_2019_thayer_orientation life change.pptx
 
Best practices sexual assault and domestic violence.1.15.15
Best practices sexual assault and domestic violence.1.15.15Best practices sexual assault and domestic violence.1.15.15
Best practices sexual assault and domestic violence.1.15.15
 
Domestic Violence (Research Project)
Domestic Violence (Research Project)Domestic Violence (Research Project)
Domestic Violence (Research Project)
 
Treaty 3 Training Feb 9 2022
Treaty 3 Training Feb 9 2022Treaty 3 Training Feb 9 2022
Treaty 3 Training Feb 9 2022
 
Presentation (dif font)
Presentation (dif font)Presentation (dif font)
Presentation (dif font)
 
122lecture5TheSuicidalClientonline.ppt
122lecture5TheSuicidalClientonline.ppt122lecture5TheSuicidalClientonline.ppt
122lecture5TheSuicidalClientonline.ppt
 
Corruption in the system
Corruption in the systemCorruption in the system
Corruption in the system
 
Module 10-Injuries and Violence for.pptx
Module 10-Injuries and Violence for.pptxModule 10-Injuries and Violence for.pptx
Module 10-Injuries and Violence for.pptx
 
Addiction and Suicide Prevention - December 2012
Addiction and Suicide Prevention - December 2012 Addiction and Suicide Prevention - December 2012
Addiction and Suicide Prevention - December 2012
 
YPI Presentation
YPI PresentationYPI Presentation
YPI Presentation
 
Associations between violent media and violence behavior over a 24-month peri...
Associations between violent media and violence behavior over a 24-month peri...Associations between violent media and violence behavior over a 24-month peri...
Associations between violent media and violence behavior over a 24-month peri...
 
Psychological first aid_ final
Psychological first aid_ finalPsychological first aid_ final
Psychological first aid_ final
 
Dealing with Fear and Anxiety in the Wake of Traumatic Events - #OttawaStrong
Dealing with Fear and Anxiety in the Wake of Traumatic Events - #OttawaStrongDealing with Fear and Anxiety in the Wake of Traumatic Events - #OttawaStrong
Dealing with Fear and Anxiety in the Wake of Traumatic Events - #OttawaStrong
 
ABC's of Trauma Informed Care
ABC's of Trauma Informed CareABC's of Trauma Informed Care
ABC's of Trauma Informed Care
 
Partner Violence and Children...How Should We Respond?-- Angie Boy, DrPh
Partner Violence and Children...How Should We Respond?-- Angie Boy, DrPhPartner Violence and Children...How Should We Respond?-- Angie Boy, DrPh
Partner Violence and Children...How Should We Respond?-- Angie Boy, DrPh
 
Breaking the Silence - Understanding and Addressing Sexual Assault
Breaking the Silence - Understanding and Addressing Sexual AssaultBreaking the Silence - Understanding and Addressing Sexual Assault
Breaking the Silence - Understanding and Addressing Sexual Assault
 
Nuturing wellbein ftcollinscolorado
Nuturing wellbein ftcollinscoloradoNuturing wellbein ftcollinscolorado
Nuturing wellbein ftcollinscolorado
 
Teen Internet Safety
Teen Internet SafetyTeen Internet Safety
Teen Internet Safety
 
The way back project: Needs and views of people who have attempted suicide an...
The way back project: Needs and views of people who have attempted suicide an...The way back project: Needs and views of people who have attempted suicide an...
The way back project: Needs and views of people who have attempted suicide an...
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Último (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Promise of the positive uclan 2013

  • 1. The Promise of the Positive in the Study of Resilience Sherry Hamby University of the South Collaborators: Victoria Banyard & John Grych Presented August 2, 2013 at the American Psychological Association Annual Convention, Honolulu, HI. Research supported by The John Templeton Foundation. sherry.hamby@sewanee.edu or lifepaths@sewanee.edu
  • 2. The Way Things Were… and were and were and were Vincent Van Gogh— No relief for mental illness Cain & Abel in Titian’s rendition Rape of the Sabine Women, event 750BC depicted by Nicolas Poussin about 1635 Henry VIII, problematic partner 2
  • 3. Centuries Go By… • …and slowly many mental health problems and many adversities are seen less as an inherent part of existence, and more as health and social problem that can be addressed. In 1824, the first modern humane organization is founded…. 3
  • 4. • …to protect cats, dogs, and other animals! • It is the Royal Society for the Prevention of Cruelty to Animals, founded 1824 (www.rspca.org.uk) • Followed in 1866 by U.S. version (www.aspca.org). 4
  • 5. The Beginnings of a Social Movement • Shortly afterwards, it occurred to some to organize the first Societies for the Prevention of Cruelty to Children too. • “It is not alone the lower animals that are subject to ill-treatment and cruelty.” (The Northern Budget, Troy, N.Y., 1867, cited by NYSPCC, 2000) • 1st society est. in New York, 1875 Mary Ellen, who, in 1873, became the first child to receive a child protection intervention. 5
  • 6. The Modern Discovery of Psychology • Late 1800s, early 1900s: The invention of the “talking cure” & the discipline of psychology • 1800s, early 1900s: 1st laws limiting or abolishing right to beat one’s wife passed in England, France, some U.S. states. • Post WWII—Psychotherapy goes mainstream. • 1962—The medical establishment “discovers” child abuse as a cause of traumatic injury (Kempe, 1962). • Early 1970s—1st refuges/shelters • Late 20th century: Huge social movements emerged to address all kinds of psychological issues. • Healthcare, schools, criminal justice, social services, policymakers—all major social institutions become involved. 6
  • 7. A Surprising Amount of Disclosure • Important innovations in social science research, such as the U.S. National Crime Survey and Kinsey’s surveys on sexual behavior. • Research established that people would disclose – Violent behavior – Intimate behavior 1948: An early scientific bestseller • Straus, Gelles, & Steinmetz established that people would also disclose violence by intimates to researchers. • Mary Koss first presented on Hidden Rape in 1980. The 1975 National Family Violence Survey
  • 9. The Field of Violence Dating violence Child abuse IPV Community Violence Sexual assault Family violence Bullying 9
  • 10. More Silos of Psychology Adversity Coping IPV Psychology of Religion & Spirituality Resilience Positive psychology Community psychology 10
  • 11. Grant reviewers like low-risk (=repetitive) methods Journal reviewers like familiar methods too Journal reviewers often seem to prefer results that confirm their preconceptions Grant reviewers like familiar questionnaires Tenure based on # more than quality Drags on Science Authors do lit reviews when they write their papers, not when they plan their studies From The Web of Violence, Hamby & Grych, 2013 11
  • 12. 12
  • 13. Too Much Focus on Problems, Not Strengths 13
  • 14. Much of Violence Research Technology is Stalled in the 1970s 14
  • 15. Looking For Communication Across Silos & Further Progress Promoting Well-Being 15
  • 16. TWO NEW STRENGTHS-BASED PROJECTS ON COPING AND RESILIENCE: 1) BATTERED WOMEN’S PROTECTIVE STRATEGIES 2) LIFE PATHS RESEARCH PROJECT 16
  • 18. A Deficit-Focused Paradigm & A Limited Research Base • We ask women over and over about trauma symptoms, substance use, and their own perpetration, but almost never ask about resources & strengths. • We teach the cycle of violence even though it is based on a single qualitative study more than 30 years old. • Safety planning is an almost universal service, but almost no safety planningbased research exists, either to map typical safety planning steps or the effectiveness of formal safety plans. The photo accompanying my blog on “The Many Strengths of Battered Women” at OUP 18
  • 19. Recognizing Strengths Requires Recognizing All the Risks • Danger to self, yes, but also: • Danger to others • Other risks created by batterer (custody battles, threats to ruin credit, kidnapping children, etc) • Financial risks and obstacles • Institutional risks and obstacles • Social risks (family rejection, stigma, etc) • Personal values that influence coping 19
  • 20. Battered Women’s Protective Strategies Immediate situational strategies Formal helpseeking to police, shelters, and other services Protecting children, family, and pets Protective Strategies Invisible strategies (under-recognized actions women take) Turning to religious and spiritual resources Reaching out for social support 20
  • 21. Immediate Situational Strategies • Escaping the scene: Leave the house, Run to another room, Lock oneself in a room, Get into (or out of) a car, Walk away calmly • Luring away from dangerous parts of the house: Keep perpetrator away from gun cabinets, kitchens, etc. • Calling for help: Signal a neighbor or child, Teach children who to get help, Get a pay-as-you-go phone, Keep a landline telephone, Scream, Pass a note or leave a message in a public place • Defusing strategies: Distract with other activities such as making tea, Hold hand/cuddle with perpetrator, even if do not feel affectionate, Keep things quiet, Talk batterer out of abuse • Protecting children or others from the attacker • Self-defensive actions: Use force to stop perpetrator’s assault, Protect one’s body, Stop perpetrator from destroying objects around house 21
  • 22. • Protecting Children, Family & Pets on children and loved Immediate protective strategies focused ones: Physically insert themselves between batterer and others, Try to get batterer to focus on them, Create code words and safety plans with children or others, Send children to their rooms or other safer location, Turn up stereo so children cannot hear violence • Longer term strategies for protecting children: Send children to stay with relatives, Seek full legal custody, Help children process experience, Volunteer at school, Delay leaving to protect children • Protecting pets: Delay leaving to protect pets from batterer’s threats, Enroll pets in “doggy day care” or place in kennel • Protecting other family members, friends, and co-workers: Quit job, Stay away from family and friends, Create separate email account that batterer does not know 22
  • 23. Reaching Out for Social Support • • • • • • • • • Obtain emotional support Stay with family or friends Get financial or practical help with moving Ask family or friend to accompany women to court or agencies Ask for help filling out legal forms and other paperwork Get help with child care Get help with transportation Ask family or friends to store belongings or extra keys Ask family or friends to hold bank accounts or other assets in their name • Ask family to help negotiate a plan for reconciliation • Ask boss or co-workers to re-arrange schedules 23 • Ask for security plan at the workplace
  • 24. Turning to Religious & Spiritual Resources • • • • • • • • • • • • Strength and perseverance from prayer & faith in God/higher power Comfort from inspirational stories in religious texts Hope for the future Social support from clergy, other members of the congregation Pastoral counseling from clergy Free social activities Help paying utility bills, home repair, transportation Support during illness or following birth of child Donations of food, clothing, furniture, and other necessities Help with immigration status Literacy and English as a second language classes School supplies, winter coats, and free activities for children 24
  • 25. Formal Helpseeking • Contrary to stereotypes of passivity: • Helpseeking for DV is similar to helpseeking for psychological problems: – 28% in Canadian survey (Bland et al, 1997) – 26% in Europe (ESEMeD MHEDEA, 2004) – 41% in U.S. (Wang et al, 2005), but most of this not specialized help • Psychiatrists 12% • Other mental health providers 16% • 66% of DV victims had sought formal services in one Canadian survey (Barrett & Lapierre, 2010) 25
  • 26. Types of Formal Helpseeking • • • • • • • • • • • Going to a Domestic Violence Shelter Other Domestic Violence Program Services Info, referral, transportation, court accompaniment, etc Calling the Police Seeking Help from Victim Assistance Programs Obtaining a Restraining Order/Order of Protection Mental Health Services Health Care 12-step programs such as Al-Anon Other Social Services Support groups 26
  • 27. Invisible Strategies • • • • Money, money, money Arranging affairs Wellness Returning to batterer-yes, sometimes this is safest, best option from a range of really rotten choices • Activism 27
  • 29. The Web of Violence Child Physical Abuse Intimate Partner Violence Dating Violence Child Neglect Child Sexual Abuse Community physical assault Sexual Assault & Rape Bullying Elder Abuse Gang violence Robbery Exposure to community violence
  • 30. Interconnections in Representative Community Samples Interconnection Strength of association (OR) Well-known, well-established connections Exposure to IPV & child physical abuse 5.0 (NatSCEV; Hamby et al 2010) Exposure to IPV & teen dating victimization 3.8 (NatSCEV; Hamby et al 2010) Physical IPV & Stalking by intimate partner 7.0 (CDC, Krebs et al, 2011) Physical IPV & sexual violence by intimate partner 2.4 (CDC, Krebs et al, 2011) Strong but under-recognized connections Exposure to IPV & neglect 6.2 (NatSCEV; Hamby et al 2010) Exposure to IPV and sexual abuse by known adult 5.2 (NatSCEV; Hamby et al 2010) Any physical assault & any sexual victimization 6.2 (NatSCEV, Finkelhor et al, 2009) Any witnessed violence and any sexual victimization 4.5 (NatSCEV, Finkelhor et al, 2009) Teen dating victimization and peer sexual harassment 5.3 (NatSCEV; Hamby et al 2012) Weaker but still positive connections Exposure to IPV and peer relational aggression 1.7 (NatSCEV; Hamby et al 2010) Any property crime and any sexual victimization 3.2 (NatSCEV, Finkelhor et al, 2009)
  • 31. What We Act Like We are Comparing IPV victims Nonvictim
  • 32. What We are Comparing IPV victim Bullying victim Maltreatment victim Sexual assault victim Bullying victim Maltreatment victim Sexual assault victim
  • 33. Etiological Process Relevant to Most Forms of Violence Situation • Environmental Conditions Person • Cognitive Processes – Beliefs about aggression – Schemas – Automatic cognitions • Affective Processes • Self-Regulation • Personality – Impulsivity – Narcissism – Heat – Overcrowding VIOLENCE • Use of drugs/alcohol • Social Integration • Behavior of Others – Hostility – Rejection • Relationship Context
  • 34. • Considering multiple forms of violence offers a more comprehensive and integrated approach to understanding how these experiences can lead to maladaptive outcomes (including more violence). • See Hamby & Grych (2013) 34
  • 35. Towards even greater integration… • The Web of Violence framework does not account for adaptive outcomes seen in some children and adults exposed to violence. 35
  • 36. Towards even greater integration… • The Web of Violence framework does not account for adaptive outcomes seen in some children and adults exposed to violence. • Work on resilience shows that many individuals maintain or regain healthy functioning following stressful and traumatic events. 36
  • 37. Towards even greater integration… • The Web of Violence framework does not account for adaptive outcomes seen in some children and adults exposed to violence. • Work on resilience shows that many individuals maintain or regain healthy functioning following stressful and traumatic events. • A truly comprehensive model of the effects of violence needs to account for adaptive and maladaptive outcomes 37
  • 38. Examples of risk factors • Individual: – Poor self-regulation – Low intellectual functioning • Relational: – Insecure attachment – Inconsistent parenting • Environmental – Lower SES – Unsafe neighborhood 38
  • 39. Examples of protective factors • Individual: – Good self-regulation – High intellectual functioning • Relational: – Secure attachment – Consistent parenting • Environmental – Higher SES – Safe neighborhood • Identifying “protective” factors that simply represent the flip side of “risk” factors does not advance understanding of the processes leading to adaptive outcomes 39
  • 40. New Approaches to Resilience • A new conceptual model for resilience that focuses on 3 core sets of individual strengths: – interpersonal, – regulatory, and – spiritual • We believe these fit into a broader system of personal, family, and community resources to improve well-being (not just lack of symptoms). 40
  • 41. Towards a comprehensive model of the impact of violence on health Adapted from Sandler (2001) Adversity Violence Other trauma Resources Individual Relational Environmental Adaptive Outcomes Mediating Processes -Secure relationships -Coping Apps & Behs -Sense of meaning Maladaptive Outcomes 41
  • 42. Tools & Ideas For Moving Forward • Questionnaires still emphasize negative risk factors too. • Technology is a key step to changing research practices • Good to assess the density and diversity of strengths & adversities • We have developed numerous brief measures that are suitable for community samples, including adolescents. We are freely providing these for research & clinical use. 42
  • 43. The Broader Conceptual Framework ROLE: Involvement in Violence Victim Perpetrator Both Mono-victim Acute, Isolated, Single form exposed Mono-perpetrator Criminal Specialists Mono perpetrator-victim Bully-victim Mutual IPV Poly-victim Complex trauma High ACES score Also: Multiple type victim, Multiple victim, Multiple crime-type victim, Multiple form exposed, Poly-perpetrator Criminal Generalists Violent polymorphism Poly perpetrator-victim Delinquent-victim Trauma-informed care model Repeat victim Re-victimized, Chronic victim, Complex trauma Repeat perpetrator Recidivist, Habitual offender, Reconviction, Revolving doors Repeat perpetrator-victim Cycle of violence, Intergenerational transmission Adapted from Hamby & Grych, 2013
  • 44. Coordinated Violence Prevention Model: Hypothetical Common and Specific Elements
  • 45. Where We Can Go A technician preparing penicillin in 1943 WE CAN HONOR THE ACHIEVEMENTS OF THE PAST WITHOUT GETTING STUCK IN THE PAST. • This point in the story is both sad & happy. • Sad: Unlike virtually every other form of science, our technology is mired in the 1970s. Our frameworks focus too much on “half empty” • Happy: There is information to guide us and advances are attainable. • Science is novelty, not convention. • We need to push back on the institutional forces that inhibit the best scientific & clinical practices. 45

Notas del editor

  1. What we know now, from national surveys such as NATSCEV, is that different forms of violence are interconnected. People who experience one are likely to have experienced others, as perpetrators, victims, or both.
  2. To give you a few examples, here are some numbers indicating the strength of the covariation between particular types of violence. Some are well-known (eg from top group), but there are others that are just as strong that are below the field’s radar.
  3. The interconnections among different forms of violence suggest that there may be common mechanisms underlying diverse types of violence perpetration and victimization. And, across different areas of study, the same basic processes keep coming up. Further, some of the effects of victimization involve these same processes.