Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

The Effect Of Early Maltreatment, Victimization, And Partner Violence On Hiv Risk Behavior Among Homeless Young Adults, Lisa A. Melander, Kimberly A. Tyler Dec 2010

The Effect Of Early Maltreatment, Victimization, And Partner Violence On Hiv Risk Behavior Among Homeless Young Adults, Lisa A. Melander, Kimberly A. Tyler

Department of Sociology: Faculty Publications

Purpose: The purpose of our study was to examine the relationship between child maltreatment, physical and sexual victimization, and partner violence victimization with human immunodeficiency virus (HIV) risk behaviors among a sample of homeless young adults from the midwestern United States.
Methods: Data are from the Homeless Young Adult Project. A total of 199 young adults aged 19–26 years were interviewed over 14 months using a systematic sampling strategy. The final sample included 172 young adults who were homeless or had a history of running away and being homeless.
Results: Results from the path analysis revealed that sexual abuse is …


Explaining College Partner Violence In The Digital Age: An Instrumental Design Mixed Methods Study, Lisa Melander Apr 2010

Explaining College Partner Violence In The Digital Age: An Instrumental Design Mixed Methods Study, Lisa Melander

Department of Sociology: Dissertations, Theses, and Student Research

Intimate partner violence is prevalent in contemporary society and certain groups of individuals such as college students are particularly at high risk for becoming involved in aggressive relationships. Despite the detailed body of literature that examines the risk factors for in-person partner violence, researchers have been criticized for their lack of attention to other behaviors that may be considered abusive. One new area of research is cyber aggression, which refers to the use of newer forms of technology (e.g., cell phones and computers) to facilitate repeated harassing behavior with the intention of harming others. Few scholars, however, examine these behaviors …