Attachment and Vulnerability to Online Solicitation and Sexual Victimization in Adolescence
Kirsten Byrnes, PsyD | September 21 | 9:45-10:45 am
Topic: Conceptual, Direct Service | Knowledge Level: Advanced
Children and young people voraciously consume technology and social media, expanding social connections and relationships far beyond previous generations. With such advances, it has been argued, young people are at greater risk of exposure to unwanted sexual material and advances via these media (Andrie, et al., 2021; Lebedíková et al.; Madigan, et al., 2018; Rice et al., 2015; Wolak, et al., 2006). Some youth appear to be particularly vulnerable to internet solicitation, placing them at significant risk of subsequent sexual victimization. This presentation explores the argument that disruptions in early attachment may be a key risk factor for vulnerability to internet solicitation and sexual exploitation and trafficking (e.g., Alexander, 2012; Mikulciner et al., 2010), which offenders often exploit (Lorenzo-Dus, et al., 2016; Lorenzo-Dus & Izura, 2017; McAlinden, 2006). The discussion highlights the importance of an understanding of attachment theory when considering youth’s vulnerability to online solicitation/exploitation and subsequent victimization drawing on a synthesis of research and theory from the fields of developmental psychology, attachment theory, victimology, and offender studies. Such a conceptualization could enhance practitioners’ abilities to recognize at-risk youth and understand the underlying dynamics and developmental factors that contribute to vulnerability. This understanding will in turn inform both the development of specific preventive interventions to mitigate risk and enhance self-protective capacity prior to victimization as well as informing assessment and treatment interventions for youth who present for evaluation or treatment after victimization.
Presentation Objectives:
· Describe attachment theory and vulnerabilities developed through insecure attachment
· Explore how attachment patterns may contribute to specific vulnerabilities to online grooming and solicitation
· Discuss how such an orientation informs prevention and intervention regarding exploitation and abuse related to online platforms