4,559
Views
44
CrossRef citations to date
0
Altmetric
Articles

Efficacy of the Circle of Security Intervention: A Meta-Analysis

References

  • Ainsworth, M. D., Blehar, M. C., Waters, E., & Wall, S. (1978). Patterns of attachment. Hillsdale, NJ: Erlbaum.
  • Belsky, J., & Fearon, R. M. P. (2002). Infant-mother attachment security, contextual risk, and early development: A moderational analysis. Development and Psychopathology, 14(2), 293–310. doi:10.1017/S0954579402002067
  • Borenstein, M., Hedges, L., Higgins, J., & Rothstein, H. (2009). Introduction to meta-analysis. West Sussex, England: Wiley & Sons.
  • Borenstein, M., Hedges, L., Higgins, J., & Rothstein, H. (2010). A basic introduction to the fixed-effect and random-effects models for meta-analysis. Research Synthesis Methods, 1(2), 97–111. doi:10.1002/jrsm.12
  • Borenstein, M., Hedges, L., Higgins, J., & Rothstein, H. (2014). Comprehensive meta analysis version 3.0 [Computer software]. Englewood, NJ: Biostat.
  • Bowlby, J. (1958). The nature of the child’s tie to his mother. International Journal of Psycho-analysis, 39, 350–373.
  • Bowlby, J. (1979). The making and breaking of affectionate bonds. London, England: Tavistock.
  • Carlson, V., Cicchetti, D., Barnett, D., & Braunwald, K. G. (1989). Finding order in disorganization: Lessons from research on maltreated infants’ attachments to their caregivers. In D. Cicchetti & V. Carlson (Eds.), Child maltreatment: Theory and research on the causes and consequences of child abuse and neglect (pp. 494–528). New York, NY: Cambridge University Press.
  • *Cassidy, J., Woodhouse, S. S., Sherman, L. J., Stupica, B., & Lejuez, C. W. (2011). Enhancing infant attachment security: An examination of treatment efficacy and differential susceptibility. Development and Psychopathology, 23(1), 131–148. doi:10.1017/S0954579410000696
  • *Cassidy, J., Ziv, Y., Stupica, B., Sherman, L. J., Butler, H., Karfgin, A., & Powell, B. (2010). Enhancing attachment security in the infants of women in a jail-diversion program. Attachment and Human Development, 12(4), 333–353. doi:10.1080/14616730903416955
  • Cohen, J. (1969). Statistic power analysis in the behavioral sciences. New York, NY: Academic Press.
  • Cooper, G., Hoffman, K. T., & Powell, B. (2000). Marycliff perinatal circle of security protocol. Unpublished manuscript, The Marycliff Institute, Spokane, WA.
  • Cooper, G., Hoffman, K. T., & Powell, B. (2003). The circle of security perinatal protocol. Unpublished manuscript, Marycliff Institute, Spokane, WA.
  • Cooper, G., Hoffman, K., Powell, B., & Marvin, R. (2005). The circle of security intervention: Differential diagnosis and differential treatment. In L. J. Berlin, Y. Ziv, L. Amaya-Jackson, & M. T. Greenberg (Eds.), Enhancing early attachments: Theory, research, intervention, and policy (pp. 127–151). New York, NY: The Guilford Press.
  • *Dehghani, A., Malekpour, M., Abedi, A., & Amiri, S. (2014). The efficacy of circle of security on attachment and well-being in preschool children. Management Science Letters, 4(3), 607–612. doi:10.5267/j.msl.2013.12.031
  • Fearon, R. P., Bakermans-Kranenburg, M. J., van IJzendoorn, M. H., Lapsey, A., & Roisman, G. I. (2010). The significance of insecure attachment and disorganization in the development of children’s externalizing behavior: A meta-analytic study. Child Development, 81(2), 435–456. doi:10.1111/j.1467-8624.2009.01405.x
  • *Freedman, W. A. (2003). Patterns of behaviour in delta caregiving and intervention-related changes (Doctoral dissertation). Retrieved from Dissertations and Theses database. (UMI No. 3079176).
  • *Gray, S. (2013). [Circle of Security project evaluation]. Unpublished raw data.
  • *Hoffman, K. T., Marvin, R. S., Cooper, G., & Powell, B. (2006). Changing toddlers’ and preschoolers’ attachment classifications: The circle of security intervention. Journal of Consulting and Clinical Psychology, 74(6), 1017–1026. doi:10.1037/0022-006X.74.6.1017
  • *Horton, G. E. (2013). The impact of the circle of security-parenting© program on mothers in residential substance abuse treatment: An action research study (Doctoral dissertation). Retrieved from Dissertations and Theses database. (UMI No. 3609574).
  • Lyons-Ruth, K., Zeanah, C. H., & Benoit, D. (2003). Disorder and risk for disorder during infancy and toddlerhood. In E. J. Mash & R. A. Barkley (Eds.), Child psychopathology (pp. 457–491). New York, NY: The Guilford Press.
  • Main, M., & Solomon, J. (1986). Discovery of an insecure-disorganized/disoriented attachment pattern. In T. B. Brazelton & M. W. Yogman (Eds.), Affective development in infancy (pp. 95–124). Westport, CT: Ablex.
  • Marvin, R., Cooper, G., Hoffman, K., & Powell, B. (2002). The circle of security project: Attachment-based intervention with caregiver-pre-school child dyads. Attachment & Human Development, 4(1), 107–124. doi:10.1080/14616730252982491
  • Moher, D., Liberati, A., Tetzlaff, J., & Altman, D. G. (2009). Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement. PLoS Med 6(7): e1000097. doi:10.1371/journal.pmed.1000097
  • *Page, T., & Cain, D. (2010, January). A pilot application of the Circle of Security parenting intervention to child welfare-involved mothers. Poster presentation at the Society for Social Work and Research Fourteenth Annual Conference, San Francisco, CA.
  • Priddis, L., & Howieson, N. (2012). Insecure attachment patterns at five years. What do they tell us? Early Child Development and Care, 182(1), 45–58. doi:10.1080/03004430.2010.537334
  • *Rennie, K. D. (n.d.). The effects of the “Circle of Security Parenting” group intervention on a community sample of parents of 1 to 3-year-olds (Unpublished master’s thesis). New South Wales Institute of Psychiatry, New South Wales, Australia.
  • *Rostad, W. L. (2014). Examining the effectiveness of the circle of security parenting DVD program (Master’s thesis). Retrieved from Dissertations and Theses database. (UMI No. 3624654).
  • Rothstein, H. R., Sutton, A. J., & Borenstein, M. (2005). Publication bias in meta-analysis. In H. R. Rothstein, A. J. Sutton, & M. Borenstein (Eds.), Publication bias in meta-analysis: Prevention, assessment and adjustments (pp. 1–10). West Sussex, England: Wiley & Sons.
  • Seminars. (n.d.). In Circle of Security International. Retrieved from http://circleofsecurity.net/seminars/
  • Spieker, S. J. (1986). Patterns of very insecure attachment found in samples of high-risk infants and toddlers. Topics in Early Childhood Special Education, 6(3), 37–53. doi:10.1177/027112148600600304
  • Zeanah, C. H., Berlin, L. J., & Boris, N. W. (2011). Practitioner review: Clinical applications of attachment theory and research for infants and young children. Journal of Child Psychology and Psychiatry, 52(8), 819–833. doi:10.1111/j.1469-7610.2011.02399.x

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.