Paper

Resource Year Topic Type
A Behaviorally Specific, Empirical Alternative to Bullying: Aggravated Peer Victimization
Finkelhor, D., Shattuck, A., Turner, H.A., & Hamby, S. (2016). Journal of Adolescent Health, http://dx.doi.org/10.1016/j.jadohealth.2016.05.021…
2016 Bullying, Peer and Sibling Paper
Poly-Victimization and Peer Harassment Involvement in a Technological World
Mitchell, K.J., Segura, A., Jones, L.M., & Turner, H.A. (2018). Journal of Interpersonal Violence, 33(5), 762-788, DOI: 10.1177/0886260517744846…
2018 Bullying, Peer and Sibling, Technology/Internet Victimization Paper
Evaluating children's advocacy centers' response to child sexual abuse.
Cross, T.P., Jones, L.M., Walsh, W.A., Simone, M., Kolko, D.J., Szczepanski, J., Lippert, T., Davison, K., Cryns, A., Sosnowski, P., Shadoin, A., and…
2008 Child Advocacy Centers, Multi-Site Evaluation of Children's Advocacy Centers (CACs), Sexual Abuse Paper
Do Parents Blame or Doubt their Child More When Sexually Abused by Adolescents Versus Adults?
Walsh, W.A., Cross, T.P., & Jones, L.M. (2012). Journal of Interpersonal Violence, 27(3), 453-470. (CV230)
2012 Child Advocacy Centers, Multi-Site Evaluation of Children's Advocacy Centers (CACs) Paper
Victim reports of bystander reactions to in-person and online peer harassment: a national survey of adolescents
Jones, L. M., Mitchell, K. J., & Turner, H. A. (2015). Journal of Youth and Adolescence, 44, 2308-2320. doi:10.1007/s10964-015-0342-9
2015 Bullying, Peer and Sibling, Bystander Behavior Paper
The Role of Technology in Peer Harassment: Does it Amplify Harm for Youth?
Mitchell, K. J., Jones, L. M., Turner, H. A., Shattuck, A., & Wolak, J. (2016). Psychology of violence, 6(2), 193-204. doi:10.1037/a0039317
2016 Bullying, Peer and Sibling, Technology/Internet Victimization Paper
The Role of technology in youth harassment victimization
Mitchell, K. J., Jones, L. M., Turner, H., Blachman-Demner, D., & Kracke, K. (2016). Washington, DC: Justice Research, National Institute of…
2016 Bullying, Peer and Sibling, Technology/Internet Victimization Paper