The profiles of parent–child attachment network and its influence on longitudinal adolescent problematic mobile phone use: Based on random intercept latent transition analysis

  • Zhaoyang Xie
  • , Ningning Feng*
  • , Jieqi Wang
  • , Cheng Xu
  • , Yuqi Li
  • , Can Yang
  • , Wenjun Chen
  • , Lijuan Cui*
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Given the lack of evidence, we cannot definitively determine the relationship between attachment networks and problematic mobile phone use, hindering effective intervention strategies. Therefore, a three-wave longitudinal study was designed to explore the heterogeneity of parent–child attachment networks using latent profile analysis (LPA) and random intercept latent transition analysis (RI-LTA). Participants included 2116 adolescents (ages 14–21; 53.8% girls). Results identified five stable parent–child attachment network profiles, each showing moderate but decreasing stability. Notably, adolescents who were grouped into an attachment network characterized by secure maternal attachment but insecure paternal attachment, similar to those in attachment networks with both insecure maternal and paternal attachment, scored higher levels of problematic mobile phone use than those who were grouped into attachment networks with both secure maternal and paternal attachment. Our findings fill empirical gaps and provide strong evidence supporting attachment-based interventions to reduce problematic mobile phone use.

Original languageEnglish
JournalBritish Journal of Developmental Psychology
DOIs
StateAccepted/In press - 2025

Keywords

  • adolescent
  • latent profile analysis
  • parent–child attachment network
  • problematic mobile phone use
  • random intercept latent transition analysis

Fingerprint

Dive into the research topics of 'The profiles of parent–child attachment network and its influence on longitudinal adolescent problematic mobile phone use: Based on random intercept latent transition analysis'. Together they form a unique fingerprint.

Cite this