Abstract
A growing body of research suggests that intimate partner abusers use digital technologies to surveil their partners, including by installing spyware apps, compromising devices and online accounts, and employing social engineering tactics. However, to date, this form of privacy violation, called intimate partner surveillance (IPS), has primarily been studied from the perspective of victim-survivors. We present a qualitative study of how potential perpetrators of IPS harness the emotive power of sharing personal narratives to validate and legitimise their abusive behaviours. We analysed 556 stories of IPS posted on publicly accessible online forums dedicated to the discussion of sexual infidelity. We found that many users share narrative posts describing IPS as they boast about their actions, advise others on how to perform IPS without detection, and seek suggestions for next steps to take. We identify a set of common thematic story structures, justifications for abuse, and outcomes within the stories that provide a window into how these individuals believe their behaviour to be justified. Using these stories, we develop a four-stage framework that captures the change in a potential perpetrator's approach to IPS. We use our findings and framework to guide a discussion of efforts to combat abuse, including how we can identify crucial moments where interventions might be safely applied to prevent or deescalate IPS.
- H. Porter Abbott. 2008. The Cambridge Introduction to Narrative (2nd edition ed.). Cambridge University Press, Cambridge; New York.Google Scholar
- John Louis Achterbosch and Celeste Michelle Condit. 1985. Homo Narrans Re-constructing Narrative Theory: A Functional Perspective Journal of Communication (pre-1986); Fall 1985; 35, 4; ABI/INFORM Global pg. 90. Journal of Communication (pre-1986); 35, 4 (1985), 90. https://olympictest.bc.edu/res/gsswresearch-home/funding/proposal-development/_jcr_content/content/download_44/file.res/Lucaites,%20?Reconstructing% 20Narrative%20Theory%20a%20Functional%20Perspective?.pdfGoogle Scholar
- Alessandro Acquisti and Ralph Gross. 2006. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In International Workshop on Privacy Enhancing Technologies. Springer Berlin Heidelberg, Cambridge, UK, 36--58. https://doi.org/10.1007/11957454_3Google Scholar
Digital Library
- Alexa. 2020. Alexa: Top 500 websites. https://www.alexa.com/topsitesGoogle Scholar
- Cassandra Alexopoulos, Elisabeth Timmermans, and Jenna McNallie. 2020. Swiping more, committing less: Unraveling the links among dating app use, dating app success, and intention to commit infidelity. Computers in Human Behavior 102 (Jan. 2020), 172--180. https://doi.org/10.1016/j.chb.2019.08.009Google Scholar
- Mike Allen. 2017. Narrative Analysis. In The SAGE Encyclopedia of Communication Research Methods (2nd edition ed.), Mike Allen (Ed.). SAGE Publications, Inc, California. https://doi.org/10.4135/9781483381411.n368Google Scholar
- Steven Arnocky, Shafik Sunderani, Wendy Gomes, and Tracy Vaillancourt. 2015. Anticipated partner infidelity and men?s intimate partner violence: The mediating role of anxiety. Evolutionary Behavioral Sciences 9, 3 (2015), 186--196. https://doi.org/10.1037/ebs0000021Google Scholar
Cross Ref
- Julia C. Babcock, Daniela M. Costa, Charles E. Green, and Christopher I. Eckhardt. 2004. What situations induce intimate partner violence? A reliability and validity study of the Proximal Antecedents to Violent Episodes (PAVE) scale. Journal of family psychology: JFP: journal of the Division of Family Psychology of the American Psychological Association (Division 43) 18, 3 (Sept. 2004), 433--442. https://doi.org/10.1037/0893--3200.18.3.433Google Scholar
Cross Ref
- Mieke Bal. 2009. Narratology: Introduction to the Theory of Narrative (3rd revised edition edition ed.). University of Toronto Press, Toronto.Google Scholar
- Albert Bandura. 1978. Social Learning Theory of Aggression. Journal of Communication 28, 3 (1978), 12--29. https://doi.org/10.1111/j.1460--2466.1978.tb01621.x _eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1111/j.1460--2466.1978.tb01621.x.Google Scholar
Cross Ref
- Monica J. Barratt. 2011. Discussing illicit drugs in public internet forums: visibility, stigma, and pseudonymity. In Proceedings of the 5th International Conference on Communities and Technologies (C&T '11). Association for Computing Machinery, Brisbane, Australia, 159--168. https://doi.org/10.1145/2103354.2103376Google Scholar
Digital Library
- Michael Barthel, Galen Stocking, Jess Holcomb, and Amy Mitchell. 2016. Reddit news users more likely to be male, young and digital in their news preferences. https://www.journalism.org/2016/02/25/reddit-news-users-more-likelyto- be-male-young-and-digital-in-their-news-preferences/ Library Catalog: www.journalism.org Section: Publications.Google Scholar
- Rosanna Bellini, Jay Rainey, Andrew Garbett, and Pamela Briggs. 2019. Vocalising Violence: Using Violent Mens? Voices for Service Delivery and Feedback. In Proceedings of the 9th International Conference on Communities & Technologies - Transforming Communities (C&T '19). ACM, New York, NY, USA, 210--217. https://doi.org/10.1145/3328320.3328405 event-place: Vienna, Austria.Google Scholar
Digital Library
- Amy Bruckman. 1996. Gender swapping on the Internet. In High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace (2nd edition ed.), Peter Ludlow (Ed.). A Bradford Book, Cambridge, Mass.Google Scholar
- Tara Capel, Jennyfer Lawrence Taylor, and Dhaval Vyas. 2016. Using Self-reported Experiences to Explore the Issues of Women in Crisis Situations. In Proceedings of the 28th Australian Conference on Computer-Human Interaction (OzCHI'16). ACM, New York, NY, USA, 483--488. https://doi.org/10.1145/3010915.3010962Google Scholar
Digital Library
- Stevie Chancellor, Andrea Hu, and Munmun De Choudhury. 2018. Norms Matter: Contrasting Social Support Around Behavior Change in Online Weight Loss Communities. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). Association for Computing Machinery, Montreal QC, Canada, 1--14. https://doi.org/10.1145/3173574.3174240Google Scholar
Digital Library
- Eshwar Chandrasekharan, Umashanthi Pavalanathan, Anirudh Srinivasan, Adam Glynn, Jacob Eisenstein, and Eric Gilbert. 2017. You Can't Stay Here: The Efficacy of Reddit's 2015 Ban Examined Through Hate Speech. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (Dec. 2017), 31:1--31:22. https://doi.org/10.1145/3134666Google Scholar
Digital Library
- Seymour Benjamin Chatman. 1980. Story and Discourse: Narrative Structure in Fiction and Film (new edition ed.). Cornell University Press, Cornell, New York. Google-Books-ID: ewrOp9uPjYUC.Google Scholar
- Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, and Thomas Ristenpart. 2018. The Spyware Used in Intimate Partner Violence. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, San Francisco, CA, 441--458. https://doi.org/10.1109/ SP.2018.00061 ISSN: 2375--1207.Google Scholar
- Chayn. 2020. Do It Yourself Online Safety Guide - you don't have to be offline to stay safe. https://chayn.co/safety/ Library Catalog: chayn.co.Google Scholar
- Rachel Clarke. 2015. Artful Social Engagement: Long-term Interaction Design within an InternationalWomen's Community. Ph.D. Dissertation. Newcastle University.Google Scholar
- Rachel Clarke, Peter Wright, and John McCarthy. 2012. Sharing Narrative and Experience: Digital Stories and Portraits at a Women's Centre. In CHI '12 Extended Abstracts on Human Factors in Computing Systems (CHI EA '12). ACM, New York, NY, USA, 1505--1510. https://doi.org/10.1145/2212776.2223663Google Scholar
Digital Library
- Amy A. Conroy. 2014. Marital Infidelity and Intimate Partner Violence in Rural Malawi: A Dyadic Investigation. Archives of sexual behavior 43, 7 (Oct. 2014), 1303--1314. https://doi.org/10.1007/s10508-014-0306--2Google Scholar
- Jaclyn D. Cravens, Kaitlin R. Leckie, and Jason B. Whiting. 2013. Facebook Infidelity: When Poking Becomes Problematic. Contemporary Family Therapy 35, 1 (March 2013), 74--90. https://doi.org/10.1007/s10591-012--9231--5Google Scholar
Cross Ref
- Jill P. Dimond, Michaelanne Dye, Daphne Larose, and Amy S. Bruckman. 2013. Hollaback!: The Role of Storytelling Online in a Social Movement Organization. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work (CSCW '13). ACM, New York, NY, USA, 477--490. https://doi.org/10.1145/2441776.2441831Google Scholar
Digital Library
- Jill P. Dimond, Casey Fiesler, and Amy S. Bruckman. 2011. Domestic violence and information communication technologies. Interacting with Computers 23, 5 (Sept. 2011), 413--421. https://doi.org/10.1016/j.intcom.2011.04.006 Conference Name: Interacting with Computers.Google Scholar
Digital Library
- Rebecca Emerson Dobash, Russell P. Dobash, Kate Cavanagh, and Ruth Lewis. 1999. Changing Violent Men. SAGE Publications, London, UK. Google-Books-ID: JTzEr2OXgFQC.Google Scholar
- Julia Downes, Liz Kelly, and Nicole Westmarland. 2019. 'It's a work in progress': men's accounts of gender and change in their use of coercive control. Journal of Gender-Based Violence 3, 3 (Oct. 2019), 267--282(16). https://doi.org/10.1332/239868019X15627570242850Google Scholar
Cross Ref
- Claire Burke Draucker and Donna S. Martsolf. 2010. The Role of Electronic Communication Technology in Adolescent Dating Violence. Journal of Child and Adolescent Psychiatric Nursing 23, 3 (2010), 133--142. https://doi.org/10.1111/j.1744--6171.2010.00235.xGoogle Scholar
- Julia Ebner. 2020. Going Dark: The Secret Social Lives of Extremists. Bloomsbury Publishing, London.Google Scholar
- Naomi Ellemers, Russell Spears, and Bertjan Doosje. 2002. Self and Social Identity. Annual Review of Psychology 53, 1 (2002), 161--186. https://doi.org/10.1146/annurev.psych.53.100901.135228Google Scholar
Cross Ref
- Thomas Erickson. 1995. Notes on design practice: stories and prototypes as catalysts for communication. In Scenariobased design: envisioning work and technology in system development. John Wiley & Sons, Inc., USA, 37--58.Google Scholar
- Thomas Erickson. 1996. Design as storytelling. https://doi.org/10.1145/234813.234817Google Scholar
- Syd Field. 2005. Screenplay: Foundations Of Screenwriting. Delta, New York, N.Y.Google Scholar
- Cynthia Fraser, Erica Olsen, Kaofeng Lee, Cindy Southworth, and Sarah Tucker. 2010. The New Age of Stalking: Technological Implications for Stalking. Juvenile and Family Court Journal 61, 4 (2010), 39--55. https://doi.org/10.1111/j.1755--6988.2010.01051.x _eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1111/j.1755--6988.2010.01051.x.Google Scholar
- Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, and Nicola Dell. 2019. "Is My Phone Hacked?" Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence. Proc. ACM Hum.-Comput. Interact. 3, CSCW (Nov. 2019), 202:1--202:24. https://doi.org/10.1145/3359304Google Scholar
Digital Library
- Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2018. 'A Stalker's Paradise?: How Intimate Partner Abusers Exploit Technology. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, New York, NY, USA, 667:1--667:13. https://doi.org/10.1145/3173574.3174241Google Scholar
Digital Library
- Claudia Garcia-Moreno. 2013. Global and regional estimates of violence against women: Prevalence and health effects of intimate partner violence and non-partner sexual violence. Technical Report. World Health Organization, Department of Reproductive Health and Research. 51 pages. https://www.who.int/reproductivehealth/publications/violence/9789241564625/en/Google Scholar
- Claudia Garcia-Moreno, Henrica AFM Jansen, Mary Ellsberg, Lori Heise, and Charlotte H Watts. 2006. Prevalence of intimate partner violence: findings from the WHO multi-country study on women?s health and domestic violence. The Lancet 368, 9543 (Oct. 2006), 1260--1269. https://doi.org/10.1016/S0140--6736(06)69523--8Google Scholar
Cross Ref
- Anna Gibson. 2019. Free Speech and Safe Spaces: How Moderation Policies Shape Online Discussion Spaces. Social Media + Society 5, 1 (Jan. 2019), 2056305119832588. https://doi.org/10.1177/2056305119832588 Publisher: SAGE Publications Ltd.Google Scholar
- Diana Gil-González, Carmen Vives-Cases, María Teresa Ruiz, Mercedes Carrasco-Portiño, and Carlos Álvarez Dardet. 2008. Childhood experiences of violence in perpetrators as a risk factor of intimate partner violence: a systematic review. Journal of Public Health 30, 1 (March 2008), 14--22. https://doi.org/10.1093/pubmed/fdm071 Publisher: Oxford Academic.Google Scholar
Cross Ref
- Barney Glaser and Anselm Strauss. 1999. The Discovery of Grounded Theory: Strategies for Qualitative Research. Routledge, New Brunswick.Google Scholar
- Barney G. Glaser. 1965. The Constant Comparative Method of Qualitative Analysis. Social Problems 12, 4 (1965), 436--445. https://doi.org/10.2307/798843Google Scholar
Cross Ref
- Barney G. Glaser. 1978. Theoretical Sensitivity: Advances in the Methodology of Grounded Theory (1st edition ed.). The Sociology Press, California, USA.Google Scholar
- Greg Guest, Kathleen MacQueen, and Emily Namey. 2012. Applied Thematic Analysis. SAGE Publications, Inc., 2455 Teller Road, Thousand Oaks California 91320 United States. https://doi.org/10.4135/9781483384436Google Scholar
- J. Halverson, S. Corman, and H. L. Goodall. 2011. Master Narratives of Islamist Extremism. Palgrave Macmillan US, New York, N.Y. https://doi.org/10.1007/978-0--230--11723--5Google Scholar
- Alina Hang, Emanuel von Zezschwitz, Alexander De Luca, and Heinrich Hussmann. 2012. Too much information! user attitudes towards smartphone sharing. In Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making Sense Through Design (NordiCHI '12). Association for Computing Machinery, Copenhagen, Denmark, 284--287. https://doi.org/10.1145/2399016.2399061Google Scholar
Digital Library
- Bridget A. Harris and Delanie Woodlock. 2019. Digital Coercive Control: Insights From Two Landmark Domestic Violence Studies. The British Journal of Criminology 59, 3 (April 2019), 530--550. https://doi.org/10.1093/bjc/azy052 Publisher: Oxford Academic.Google Scholar
Cross Ref
- Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2019. Clinical Computer Security for Victims of Intimate Partner Violence. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 105--122. https://www.usenix.org/conference/usenixsecurity19/presentation/havronGoogle Scholar
- Jeff Hearn. 1998. The Violences of Men: How Men Talk About and How Agencies Respond to Men's Violence to Women (1st edition ed.). SAGE, London, UK. Google-Books-ID: hjK8VLfOUPoC.Google Scholar
- David Herman. 2004. Story Logic: Problems and Possibilities of Narrative. University of Nebraska Press, Lincoln, Neb.Google Scholar
- Karri A. Holley and Julia Colyar. 2009. Rethinking Texts: Narrative and the Construction of Qualitative Research. Educational Researcher 9 (Dec. 2009), 0--244. https://doi.org/10.3102/0013189X09351979 Publisher: SAGE PublicationsSage CA: Los Angeles, CA.Google Scholar
- Andrea Hu, Stevie Chancellor, and Munmun De Choudhury. 2019. Characterizing Homelessness Discourse on Social Media. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems (CHI EA '19). Association for Computing Machinery, Glasgow, Scotland Uk, 1--6. https://doi.org/10.1145/3290607.3313057Google Scholar
- Scott Allen Johnson. 2006. Physical Abusers and Sexual Offenders: Forensic and Clinical Strategies. CRC Press. Google- Books-ID: mmHLBQAAQBAJ.Google Scholar
- Farnaz Kaighobadi, Todd K. Shackelford, Danielle Popp, Ryan M. Moyer, Vincent M. Bates, and James R. Liddle. 2009. Perceived risk of female infidelity moderates the relationship between men's personality and partner-directed violence. Journal of Research in Personality 43, 6 (Dec. 2009), 1033--1039. https://doi.org/10.1016/j.jrp.2009.08.001Google Scholar
Cross Ref
- Liz Kelly. 2003. The Wrong Debate: Reflections on Why Force Is Not the Key Issue with Respect to Trafficking in Women for Sexual Exploitation. Feminist Review 1, 73 (2003), 139--144. https://www.jstor.org/stable/1396003 Publisher: Sage Publications, Ltd.Google Scholar
Cross Ref
- Joy Kim and Andres Monroy-Hernandez. 2016. Storia: Summarizing Social Media Content based on Narrative Theory using Crowdsourcing. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '16). Association for Computing Machinery, San Francisco, California, USA, 1018--1027. https://doi.org/10.1145/2818048.2820072Google Scholar
Digital Library
- Arie W. Kruglanski, Michele J. Gelfand, Jocelyn J. Bélanger, Anna Sheveland, Malkanthi Hetiarachchi, and Rohan Gunaratna. 2014. The Psychology of Radicalization and Deradicalization: How Significance Quest Impacts Violent Extremism. Political Psychology 35 (2014), 69--93. https://www.jstor.org/stable/43783789 Publisher: [International Society of Political Psychology, Wiley].Google Scholar
Cross Ref
- William Labov. 1972. Sociolinguistic Patterns (1st edition ed.). University of Pennsylvania Press, Pennsylvania. https://books.google.co.uk/books/about/Sociolinguistic_Patterns.html?id=hD0PNMu8CfQC Google-Books-ID: hD0PNMu8CfQC.Google Scholar
- Shalini Lal, Melinda Suto, and Michael Ungar. 2012. Examining the Potential of Combining the Methods of Grounded Theory and Narrative Inquiry: A Comparative Analysis. The Qualitative Report 17, 21 (May 2012), 1--22. https://nsuworks.nova.edu/tqr/vol17/iss21/1Google Scholar
- Amy Lehrner and Nicole E. Allen. 2008. Social Change Movements and the Struggle Over Meaning-Making: A Case Study of Domestic Violence Narratives. American Journal of Community Psychology 42, 3 (Dec. 2008), 220--234. https://doi.org/10.1007/s10464-008--9199--3Google Scholar
Cross Ref
- Roxanne Leitão. 2019. Technology-Facilitated Intimate Partner Abuse: a qualitative analysis of data from online domestic abuse forums. Human--Computer Interaction 0, 0 (Dec. 2019), 1--40. https://doi.org/10.1080/07370024.2019.1685883Google Scholar
- Eva Lungren. 1998. The hand that strikes and comforts: gender construction and the tension between body and symbol. In Rethinking Violence Against Women (r. emerson dobash & russell p. dobash ed.). Sage, London, 169--198. http://sk.sagepub.com/books/rethinking-violence-against-women/n7.xmlGoogle Scholar
- Jill C. Manning. 2006. The Impact of Internet Pornography on Marriage and the Family: A Review of the Research. Sexual Addiction & Compulsivity 13, 2--3 (Sept. 2006), 131--165. https://doi.org/10.1080/10720160600870711Google Scholar
Cross Ref
- Diogo Marques, Tiago Guerreiro, Luis Carriço, Ivan Beschastnikh, and Konstantin Beznosov. 2omputing Systems (CHI '19). ACM, New York, NY, USA, 589:1--589:13. https://doi.org/10.1145/3290605. 3300819 event-place: Glasgow, Scotland UK.Google Scholar
- Tara Matthews, Kerwell Liao, Anna Turner, Marianne Berkovich, Robert Reeder, and Sunny Consolvo. 2016. "She'll just grab any device that's closer": A Study of Everyday Device & Account Sharing in Households. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). Association for Computing Machinery, San Jose, California, USA, 5921--5932. https://doi.org/10.1145/2858036.2858051Google Scholar
Digital Library
- Tara Matthews, Kathleen O'Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, and Sunny Consolvo. 2017. Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner Abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, USA, 2189--2201. https://doi.org/10.1145/3025453.3025875Google Scholar
Digital Library
- Lynn McAlpine. 2016. Why might you use narrative methodology? A story about narrative. Eesti Haridusteaduste Ajakiri. Estonian Journal of Education 4, 1 (April 2016), 32--57. https://doi.org/10.12697/eha.2016.4.1.02b Number: 1.Google Scholar
- Jennifer McCleary-Sills, Sophie Namy, Joyce Nyoni, Datius Rweyemamu, Adrophina Salvatory, and Ester Steven. 2016. Stigma, shame and women's limited agency in help-seeking for intimate partner violence. Global Public Health 11, 1--2 (Feb. 2016), 224--235. https://doi.org/10.1080/17441692.2015.1047391 Publisher: Taylor & Francis _eprint: https://doi.org/10.1080/17441692.2015.1047391.Google Scholar
- Lydia Michie, Madeline Balaam, John McCarthy, Timur Osadchiy, and Kellie Morrissey. 2018. From Her Story, to Our Story: Digital Storytelling as Public Engagement around Abortion Rights Advocacy in Ireland. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). Association for Computing Machinery, Montreal QC, Canada, 1--15. https://doi.org/10.1145/3173574.3173931Google Scholar
Digital Library
- Julianna M. Nemeth, Amy E. Bonomi, Meghan A. Lee, and Jennifer M. Ludwin. 2012. Sexual Infidelity as Trigger for Intimate Partner Violence. Journal ofWomen's Health 21, 9 (June 2012), 942--949. https://doi.org/10.1089/jwh.2011.3328Google Scholar
- Simon Parkin, Trupti Patel, Isabel Lopez-Neira, and Leonie Tanczer. 2019. Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse. In Proceedings of the New Security Paradigms Workshop (NSPW '19). Association for Computing Machinery, San Carlos, Costa Rica, 1--15. https://doi.org/10.1145/3368860.3368861Google Scholar
Digital Library
- Jessica Pater and Elizabeth Mynatt. 2017. Defining Digital Self-Harm. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). Association for Computing Machinery, Portland, Oregon, USA, 1501--1513. https://doi.org/10.1145/2998181.2998224Google Scholar
Digital Library
- Ellen Pence and Michael Paymar. 1993. Education Groups for Men Who Batter: The Duluth Model. Springer Publishing Company, New York, N.Y. Google-Books-ID: tJ189FTdO38C.Google Scholar
- Louise F. Pendry and Jessica Salvatore. 2015. Individual and social benefits of online discussion forums. Computers in Human Behavior 50 (Sept. 2015), 211--220. https://doi.org/10.1016/j.chb.2015.03.067Google Scholar
Digital Library
- Olivia Petter. 2017. These are the hidden signs your partner is cheating. http://www.independent.co.uk/lifestyle/ love-sex/cheating-signs-partner-boyfriend-girlfriend-relationship-infidelity-a8072006.html Library Catalog: www.independent.co.uk Section: Love & Sex.Google Scholar
- Stephen A. Rains, Emily B. Peterson, and Kevin B.Wright. 2015. Communicating Social Support in Computer-mediated Contexts: A Meta-analytic Review of Content Analyses Examining Support Messages Shared Online among Individuals Coping with Illness. Communication Monographs 82, 4 (Oct. 2015), 403--430. https://doi.org/10.1080/03637751.2015.1019530Google Scholar
Cross Ref
- Harry T. Reis and Charles M. Judd (Eds.). 2000. Handbook of Research Methods in Social and Personality Psychology (1 edition ed.). Cambridge University Press, Cambridge.Google Scholar
- Catherine Kohler Riessman. 1993. Narrative Analysis. SAGE, London, UK. Google-Books-ID: 9ffAwoYi7E0C.Google Scholar
- Catherine Kohler Riessman. 2007. Narrative Methods for the Human Sciences (first edition ed.). SAGE Publications, Inc, LA.Google Scholar
- David S. Riggs, Marie B. Caulfield, and Amy E. Street. 2000. Risk for domestic violence: Factors associated with perpetration and victimization. Journal of Clinical Psychology 56, 10 (2000), 1289--1316. https://doi.org/10.1002/ 1097--4679(200010)56:101289::AID-JCLP43.0.CO;2-Z _eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1002/1097--4679%28200010%2956%3A10%3C1289%3A%3AAID-JCLP4%3E3.0.CO%3B2-Z.Google Scholar
Cross Ref
- Alan Rosenbaum and Tracii S. Kunkel. 2009. Group interventions for intimate partner violence. In Psychological and physical aggression in couples: Causes and interventions. American Psychological Association, Washington, DC, US, 191--210. https://doi.org/10.1037/11880-009Google Scholar
- Sanjeev P. Sahni and Swarnim Swasti. 2018. Myths Associated with Internet Infidelity: Is It a Real Problem? In Internet Infidelity: An Interdisciplinary Insight in a Global Context, Sanjeev P. Sahni and Garima Jain (Eds.). Springer, Singapore, 175--184. https://doi.org/10.1007/978--981--10--5412--9_11Google Scholar
- Barbara Herrnstein Smith. 1980. Narrative Versions, Narrative Theories. Critical Inquiry 7, 1 (1980), 213--236. www.jstor.org/stable/1343185Google Scholar
Cross Ref
- Andrew Stickley, Olga Kislitsyna, Irina Timofeeva, and Denny Vågerö. 2008. Attitudes Toward Intimate Partner Violence Against Women in Moscow, Russia. Journal of Family Violence 23, 6 (Aug. 2008), 447--456. https://doi.org/10.1007/s10896-008--9170-yGoogle Scholar
Cross Ref
- Lisa Sugiura, Rosemary Wiles, and Catherine Pope. 2017. Ethical challenges in online research: Public/private perceptions. Research Ethics 13, 3--4 (July 2017), 184--199. https://doi.org/10.1177/1747016116650720 Publisher: SAGE Publications Ltd.Google Scholar
- Jessica Taylor. 2020. Why Women Are Blamed For Everything: Exploring the Victim Blaming of Women Subjected to Violence and Trauma. Lulu.com, S.l.Google Scholar
- Jenna Torluemke and Christine Kim. 2020. Nearly Half of Americans Admit to 'Stalking' an Ex or Current Partner Online. https://investor.nortonlifelock.com/About/Investors/press-releases/press-release-details/2020/Nearly-Half-of-Americans-Admit-to-Stalking-an-Ex-or-Current-Partner-Online/default.aspx Library Catalog: investor.nortonlifelock.com.Google Scholar
- Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2020. The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 1893--1909.Google Scholar
- Maike Vollstedt and Sebastian Rezat. 2019. An Introduction to Grounded Theory with a Special Focus on Axial Coding and the Coding Paradigm. In Compendium for Early Career Researchers in Mathematics Education, Gabriele Kaiser and Norma Presmeg (Eds.). Springer International Publishing, Cham, 81--100. https://doi.org/10.1007/978--3-030--15636--7_4Google Scholar
- Lenore E. Walker. 1980. The Battered Woman (reprint edition ed.). HarperPerennial, New York u.a.Google Scholar
- Nicole Westmarland and Hannah Bows. 2018. Researching Gender, Violence and Abuse: Theory, Methods, Action (1 edition ed.). Routledge, Abingdon, Oxon; New York, NY.Google Scholar
- Monica Therese Whitty. 2003. Pushing the Wrong Buttons: Men's and Women's Attitudes toward Online and Offline Infidelity. CyberPsychology & Behavior 6, 6 (Dec. 2003), 569--579. https://doi.org/10.1089/109493103322725342Google Scholar
Cross Ref
- Holly Skodol Wilson and Sally A. Hutchinson. 1991. Triangulation of Qualitative Methods: Heideggerian Hermeneutics and Grounded Theory. Qualitative Health Research 1, 2 (May 1991), 263--276. https://doi.org/10.1177/104973239100100206Google Scholar
Cross Ref
- Delanie Woodlock. 2017. The Abuse of Technology in Domestic Violence and Stalking. Violence Against Women 23, 5 (April 2017), 584--602. https://doi.org/10.1177/1077801216646277Google Scholar
Cross Ref
- Delanie Woodlock, Mandy McKenzie, Deborah Western, and Bridget Harris. 2019. Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control. Australian Social Work 0, 0 (July 2019), 1--13. https://doi.org/10.1080/0312407X.2019.1607510Google Scholar
- Kevin B. Wright and Stephen A. Rains. 2013. Weak-Tie Support Network Preference, Health-Related Stigma, and Health Outcomes in Computer-Mediated Support Groups. Journal of Applied Communication Research 41, 3 (Aug. 2013), 309--324. https://doi.org/10.1080/00909882.2013.792435Google Scholar
Cross Ref
Index Terms
"So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums
Recommendations
Care Infrastructures for Digital Security in Intimate Partner Violence
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsSurvivors of intimate partner violence (IPV) face complex threats to their digital privacy and security. Prior work has established protocols for directly helping them mitigate these harms; however, there remains a need for flexible and pluralistic ...
"Is my phone hacked?" Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence
Intimate partner abusers use technology to track, monitor, harass, and otherwise harm their victims, and prior work reports that victims have few resources for obtaining help with such attacks. This paper presents a qualitative analysis of data from a ...
Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders
Digital technologies, including mobile devices, cloud computing services, and social networks, play a nuanced role in intimate partner violence (IPV) settings, including domestic abuse, stalking, and surveillance of victims by abusive partners. However, ...






Comments