Comprehensive Study Notes on Coercive Control and Victimization Strategies

Observing Coercive Control Beyond Intimate Partner Violence

Authors and Affiliations

  • Jacquelynn F. Duron - Rutgers, The State University of New Jersey

  • Laura Johnson - Temple University

  • Gretchen L. Hoge - Lewis University

  • Judy L. Postmus - University of Maryland

Objectives

  • Definition of coercive control traditionally focuses on intimate partner violence (IPV).

  • This concept also applies to various forms of victimization:

  • Child abuse

  • Trafficking

  • Sexual violence

  • Elder abuse

  • The study aims to explore the common strategies of coercive control as observed by professionals in multiple victimization contexts.

  • Professionals are uniquely positioned to describe experiences with tactics used for victimization.

Methodology

  • Participants: 22 key stakeholders experienced in working with victims and perpetrators of coercive control.
      - Types of abuse experienced:
      * Child abuse
      * Elder abuse
      * IPV
      * Human trafficking
      * Gang or cult recruitment

  • Data Collection: Semi-structured interviews.

  • Analysis: Directed content analysis identified common emergent themes.

Results

  • Four emergent themes were identified:
      1. Identifying potential victims
      2. Infiltrating lives through grooming
      3. Isolating to gain control
      4. Maintaining control through any means necessary

  • These tactics revealed a pattern across diverse victim types.

Conclusions

  • The study highlighted common strategies perpetrated across different forms of victimization.

  • Applying coercive control language broadens recognition of how personal freedoms are limited.

Keywords

  • Coercive control, predatory tactics, victimization, professionals, interviews

Background on Coercive Control Theory

  • Coercive Control (Stark, 2007): Descriptive of perpetrator strategies in IPV.
      - Foundation on gender inequality and devaluation of women.
      - Techniques create a loss of agency and personal freedom for victims.

  • Recent applications suggest coercive control is relevant in criminal law contexts beyond IPV (Stark & Hester, 2019).

Key Tactics Used by Perpetrators

  • Physical/Sexual Violence and Intimidation: Used to suppress individual’s freedom.

  • Grooming Tactics: Include promising to end abuse, seeking help, or offering gifts.

  • Isolation: To limit access to support networks.

  • Creating a Sense of Fear: Resulting in victim entrapment comparable to being in an “invisible cage.”

Grooming Tactics

Establishing Trust

  • Trust begins through relationship cultivation; involves the family sometimes.

  • Applies to online relationships where victims may be exposed to abusive dialogues.

Desensitization

  • Gradual exposure to abuse, reducing distress responses through incremental intensity.

  • Use of previous acts as leverage for continued engagement.

Creating Familial Bonds

  • Perpetrators substitute missing family connections, thus deepening victim reliance.

Gift Giving and Love Bombing

  • Extreme affection and attention are used to engage victims, also effective in scams involving older adults.

High-Pressure Tactics

  • Immediate financial demands in scams divert attention from underlying concerns.

Isolation Techniques

Physical Isolation

  • Control over victim's communication and information flow prevents social support.

  • May involve geographical relocation to disrupt access to friends and family.

Mental Isolation

  • Fostering psychological separation from support systems through disparagement and manipulation.

Study Goals

  1. Examine professional perceptions on coercive control across different victim experiences.

  2. Identify common strategies needed to facilitate coercive control in various settings.

Methodology - Participants

Data Collection & Background

  • Purposeful sampling and snowball sampling techniques were used to recruit respondents.

  • Participants mainly worked with victims of child abuse, human trafficking, IPV, and elder abuse.

  • Majority were professionals over 40 years, mostly white, and held advanced degrees.

  • Interviews lasted between 21 to 118 minutes, with averages calculated to 56 minutes.

Findings

Primary Strategies Identified by Professionals

  1. Identifying Potential Victims: Understanding vulnerabilities exploited by perpetrators.

  2. Infiltrating Lives Through Grooming: Establishing relationships creating dependency.

  3. Isolating to Gain Control: Drawing victims away from their support systems.

  4. Maintaining Control: Achieving dominance through various forms of interaction.

Perpetrator Dynamics

Vulnerability Identification

  • Factors include family involvement, loneliness, limited resources, and cultural elements.

  • Both older adults and adolescents are common targets due to trust and health issues.

Grooming Process

  • Building trust through assistance with needs (physical, relational, aspirational).

  • Exploiting emotional connections as mechanisms of control.

Isolation Process

  • Strategy of monopolizing time and space to eliminate external supports.

  • Gradual removal of resources and information to facilitate coercive dynamics.

Maintaining Control

  • Use of psychological and physical threats escalating over time to ensure submission.

  • Dominance over victims’ choices and the creation of dependency by instilling fear.

Clinical and Policy Implications

  • The coercive control framework will enhance identification strategies in various victimization arenas.

  • Cross-systems collaboration is necessary for more effective interventions.

Limitations and Future Research

  • Research should explore victim experiences and cultural implications more deeply.

  • The need for validation and development of a universal screening tool for early detection of predation is highlighted.