438
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Can a Technology-Amplified Bystander Effect Impede the Prevention of Campus Sexual Assault? Findings from an Experimental Vignette Study

&
Pages 138-151 | Received 10 Apr 2022, Accepted 14 Nov 2022, Published online: 19 Dec 2022

References

  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211. https://doi.org/10.1016/0749-5978(91)90020-T
  • Ajzen, I. (2020). The theory of planned behavior: Frequently asked questions. Human Behavior and Emerging Technologies, 2(4), 313–324. https://doi.org/10.1002/hbe2.195
  • Banyard, V. L. (2008). Measurement and correlates of prosocial bystander behavior: The case of interpersonal violence. Violence and Victims, 23(1), 83–97. https://doi.org/10.1891/0886-6708.23.1.83
  • Banyard, V., & Moynihan, M. (2011). Variation in bystander behavior related to sexual and intimate partner violence prevention: Correlates in a sample of college students. Psychology of Violence, 1(4), 287–301. https://doi.org/10.1037/a0023544
  • Banyard, V. L., Moynihan, M. M., Cares, A. C., & Warner, R. (2014). How do we know if it works? Measuring outcomes in bystander-focused abuse prevention on campuses. Psychology of Violence, 4(1), 101–115. https://doi.org/10.1037/a0033470
  • Bennett, S., Banyard, V. L., & Edwards, K. M. (2017). The impact of the bystander’s relationship with the victim and the perpetrator on intent to help in situations involving sexual violence. Journal of Interpersonal Violence, 32(5), 682–702. https://doi.org/10.1177/0886260515586373
  • Bennett, S., Banyard, V. L., & Garnhart, L. (2014). To act or not to act, that is the question? Barriers and facilitators of bystander intervention. Journal of Interpersonal Violence, 29(3), 476–496. https://doi.org/10.1177/0886260513505210
  • Bivens, R., & Hasinoff, A. A. (2018). Rape: Is there an app for that? An empirical analysis of the features of anti-rape apps. Information, Communication, & Society, 21(8), 1050–1067. https://doi.org/10.1080/1369118X.2017.1309444
  • Blayney, J. A., Jenzer, T., Read, J. P., Livingston, J. A., & Testa, M. (2018). Enlisting friends to reduce sexual victimization risk: There’s an app for that … but nobody uses it. Journal of American College Health, 66(8), 767–773. https://doi.org/10.1080/07448481.2018.1446439
  • boyd, D. (2014). It’s complicated: The social lives of networked teens. Yale University Press.
  • Brignone, L., & Edleson, J. L. (2019). The dating and domestic violence app rubric: Synthesizing clinical best practices and digital health app standards for relationship violence prevention smartphone apps. International Journal of Human-Computer Interaction, 35(19), 1859–1869. https://doi.org/10.1080/10447318.2019.1574100
  • Brown, A. L., Banyard, V. L., & Moynihan, M. M. (2014). College students as helpful bystanders against sexual violence: Gender, race, and year in college moderate the impact of perceived peer norms. Psychology of Women Quarterly, 38(3), 350–362. https://doi.org/10.1177/0361684314526855
  • Burn, S. M. (2009). A situational model of sexual assault prevention through bystander intervention. Sex Roles, 60(11–12), 779–792. https://doi.org/10.1007/s11199-008-9581-5
  • Cardoso, L. F., Sorenson, S. B., Webb, O., & Landers, S. (2019). Recent and emerging technologies: Implications for women’s safety. Technology in Society, 58, 101108. https://doi.org/10.1016/j.techsoc.2019.01.001
  • Casey, E. A., & Ohler, K. (2012). Being a positive bystander: Male antiviolence allies’ experiences of ‘Stepping Up.’ Journal of Interpersonal Violence, 27(1), 62–83. https://doi.org/10.1177/0886260511416479
  • Crowne, D. P., & Marlowe, D. (1960). A new scale of social desirability independent of psychopathology. Journal of Consulting Psychology, 24(4), 349–354. https://doi.org/10.1037/h0047358
  • Cumiskey, K. M., & Brewster, K. (2012). Mobile phones or pepper spray? Imagined mobile intimacy as a weapon of self-defense for women. Feminist Media Studies, 12(4), 590–599. https://doi.org/10.1080/14680777.2012.741893
  • Darley, J. M., & Latane, B. (1968). Bystander intervention in emergencies: Diffusion of responsibility. Journal of Personality and Social Psychology, 4(4, Pt.1), 377–383. https://doi.org/10.1037/h0025589
  • Exner, D., & Cummings, N. (2011). Implications for sexual assault prevention: College students as prosocial bystanders. Journal of American College Health, 59(7), 655–657. https://doi.org/10.1080/07448481.2010.515633
  • Kettrey, H. H., Marx, R. A., & Tanner-Smith, E. E. (2019). Effects of bystander programs on the prevention of sexual assault among adolescents and college students. Campbell Systematic Reviews, 15(1–2). https://doi.org/10.4073/csr.2019.1
  • Krebs, C., Lindquist, C., Berzofsky, M., Shook-Sa, B., Peterson, K., Planty, M., Langton, L., & Stroop, S. (2016). Campus climate survey validation study: Final technical report. BJS, Office of Justice Programs.
  • Latane, B., & Darley, J. N. (1969). Bystander ‘apathy. American Scientist, 57(2), 244–268. https://www.jstor.org/stable/27828530
  • McCauley, H. L., Tancredi, D. J., Silverman, J. G., Decker, M. R., Austin, S. B., McCormick, M. C., Virata, M. C., & Miller, E. (2013). Gender-equitable attitudes, bystander behavior, and recent abuse perpetration against heterosexual dating partners of male high school athletes. American Journal of Public Health, 103(10), 1882–1887. https://doi.org/10.2105/AJPH.2013.301443
  • McMahon, S. (2010). Rape myth beliefs and bystander attitudes among incoming college students. Journal of American College Health, 59(1), 3–11. https://doi.org/10.1080/07448481.2010.483715
  • Nasar, J., Hecht, P., & Wener, R. (2007). “Call if you have trouble”: Mobile phones and safety among college students. International Journal of Urban and Regional Research, 31(4), 863–873. https://doi.org/10.1111/j.1468-2427.2007.00759.x
  • Noonan, R. K., & Charles, D. (2009). Developing teen dating violence prevention strategies: Formative research with middle school youth. Violence Against Women, 15(9), 1087–1105. https://doi.org/10.1177/1077801209340761
  • Payne, D. L., Lonsway, K. A., & Fitzgerald, L. F. (1999). Rape myth acceptance: Exploration of its structure and its measurement using the Illinois Rape Myth Acceptance Scale. Journal of Research in Personality, 33(1), 27–68. https://doi.org/10.1006/jrpe.1998.2238
  • Pew Research Center. (2019a, June 12). Social media fact sheet. https://pewresearch-org-preprod.go-vip.co/pewinternet/fact-sheet/social-media/
  • Pew Research Center. (2019b, June 12). Mobile fact sheet. https://www.pewinternet.org/fact-sheet/mobile/
  • Potter, S. J., Moschella, E. A., Smith, D., & Draper, N. (2020). Exploring the usage of a violence prevention and response app among community college students. Health Education & Behavior, 47(1_suppl), 44S–53S. https://doi.org/10.1177/1090198120910995
  • Prevention Innovations Research Center. (2015). Evidence-based measures of bystander action to prevent sexual abuse and intimate partner violence: Resources for practitioners. [ Unpublished manuscript]. University of New Hampshire.
  • Prevention Innovations Research Center. (2021). uSafeUS. Retrieved January 8, 2021 from https://www.unh.edu/research/prevention-innovations-research-center/usafeus
  • R Core Team. (2018). R: A language and environment for statistical computing. R Foundation for Statistical Computing.
  • Reynolds, W. M. (1982). Development of reliable and valid short forms of the Marlowe-Crowne Social Desirability Scale. Journal of Clinical Psychology, 38(1), 119–125. https://doi.org/10.1002/1097-4679(198201)38:1<119::AID-JCLP2270380118>3.0.CO;2-I
  • Sebelius, K. (2011, November 1). Announcing the winners of the Apps Against Abuse technology challenge. Obama White House. https://obamawhitehouse.archives.gov/blog/2011/11/01/announcing-winners-apps-against-abuse-technology-challenge
  • Violence Against Women Reauthorization Act of. (2013). Campus sexual violence elimination [SaVE] provisions. Pub. L. No. 113-4, §4, 127 Stat. 54, 64

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.