Comprehensive Study Notes on Coercive Control and Victimization Strategies
Observing Coercive Control Beyond Intimate Partner Violence
Authors and Affiliations
Jacquelynn F. Duron - Rutgers, The State University of New Jersey
Laura Johnson - Temple University
Gretchen L. Hoge - Lewis University
Judy L. Postmus - University of Maryland
Objectives
Definition of coercive control traditionally focuses on intimate partner violence (IPV).
This concept also applies to various forms of victimization:
Child abuse
Trafficking
Sexual violence
Elder abuse
The study aims to explore the common strategies of coercive control as observed by professionals in multiple victimization contexts.
Professionals are uniquely positioned to describe experiences with tactics used for victimization.
Methodology
Participants: 22 key stakeholders experienced in working with victims and perpetrators of coercive control.
- Types of abuse experienced:
* Child abuse
* Elder abuse
* IPV
* Human trafficking
* Gang or cult recruitmentData Collection: Semi-structured interviews.
Analysis: Directed content analysis identified common emergent themes.
Results
Four emergent themes were identified:
1. Identifying potential victims
2. Infiltrating lives through grooming
3. Isolating to gain control
4. Maintaining control through any means necessaryThese tactics revealed a pattern across diverse victim types.
Conclusions
The study highlighted common strategies perpetrated across different forms of victimization.
Applying coercive control language broadens recognition of how personal freedoms are limited.
Keywords
Coercive control, predatory tactics, victimization, professionals, interviews
Background on Coercive Control Theory
Coercive Control (Stark, 2007): Descriptive of perpetrator strategies in IPV.
- Foundation on gender inequality and devaluation of women.
- Techniques create a loss of agency and personal freedom for victims.Recent applications suggest coercive control is relevant in criminal law contexts beyond IPV (Stark & Hester, 2019).
Key Tactics Used by Perpetrators
Physical/Sexual Violence and Intimidation: Used to suppress individual’s freedom.
Grooming Tactics: Include promising to end abuse, seeking help, or offering gifts.
Isolation: To limit access to support networks.
Creating a Sense of Fear: Resulting in victim entrapment comparable to being in an “invisible cage.”
Grooming Tactics
Establishing Trust
Trust begins through relationship cultivation; involves the family sometimes.
Applies to online relationships where victims may be exposed to abusive dialogues.
Desensitization
Gradual exposure to abuse, reducing distress responses through incremental intensity.
Use of previous acts as leverage for continued engagement.
Creating Familial Bonds
Perpetrators substitute missing family connections, thus deepening victim reliance.
Gift Giving and Love Bombing
Extreme affection and attention are used to engage victims, also effective in scams involving older adults.
High-Pressure Tactics
Immediate financial demands in scams divert attention from underlying concerns.
Isolation Techniques
Physical Isolation
Control over victim's communication and information flow prevents social support.
May involve geographical relocation to disrupt access to friends and family.
Mental Isolation
Fostering psychological separation from support systems through disparagement and manipulation.
Study Goals
Examine professional perceptions on coercive control across different victim experiences.
Identify common strategies needed to facilitate coercive control in various settings.
Methodology - Participants
Data Collection & Background
Purposeful sampling and snowball sampling techniques were used to recruit respondents.
Participants mainly worked with victims of child abuse, human trafficking, IPV, and elder abuse.
Majority were professionals over 40 years, mostly white, and held advanced degrees.
Interviews lasted between 21 to 118 minutes, with averages calculated to 56 minutes.
Findings
Primary Strategies Identified by Professionals
Identifying Potential Victims: Understanding vulnerabilities exploited by perpetrators.
Infiltrating Lives Through Grooming: Establishing relationships creating dependency.
Isolating to Gain Control: Drawing victims away from their support systems.
Maintaining Control: Achieving dominance through various forms of interaction.
Perpetrator Dynamics
Vulnerability Identification
Factors include family involvement, loneliness, limited resources, and cultural elements.
Both older adults and adolescents are common targets due to trust and health issues.
Grooming Process
Building trust through assistance with needs (physical, relational, aspirational).
Exploiting emotional connections as mechanisms of control.
Isolation Process
Strategy of monopolizing time and space to eliminate external supports.
Gradual removal of resources and information to facilitate coercive dynamics.
Maintaining Control
Use of psychological and physical threats escalating over time to ensure submission.
Dominance over victims’ choices and the creation of dependency by instilling fear.
Clinical and Policy Implications
The coercive control framework will enhance identification strategies in various victimization arenas.
Cross-systems collaboration is necessary for more effective interventions.
Limitations and Future Research
Research should explore victim experiences and cultural implications more deeply.
The need for validation and development of a universal screening tool for early detection of predation is highlighted.