skip to main content
research-article
Public Access

"So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums

Published:05 January 2021Publication History
Skip Abstract Section

Abstract

A growing body of research suggests that intimate partner abusers use digital technologies to surveil their partners, including by installing spyware apps, compromising devices and online accounts, and employing social engineering tactics. However, to date, this form of privacy violation, called intimate partner surveillance (IPS), has primarily been studied from the perspective of victim-survivors. We present a qualitative study of how potential perpetrators of IPS harness the emotive power of sharing personal narratives to validate and legitimise their abusive behaviours. We analysed 556 stories of IPS posted on publicly accessible online forums dedicated to the discussion of sexual infidelity. We found that many users share narrative posts describing IPS as they boast about their actions, advise others on how to perform IPS without detection, and seek suggestions for next steps to take. We identify a set of common thematic story structures, justifications for abuse, and outcomes within the stories that provide a window into how these individuals believe their behaviour to be justified. Using these stories, we develop a four-stage framework that captures the change in a potential perpetrator's approach to IPS. We use our findings and framework to guide a discussion of efforts to combat abuse, including how we can identify crucial moments where interventions might be safely applied to prevent or deescalate IPS.

References

  1. H. Porter Abbott. 2008. The Cambridge Introduction to Narrative (2nd edition ed.). Cambridge University Press, Cambridge; New York.Google ScholarGoogle Scholar
  2. John Louis Achterbosch and Celeste Michelle Condit. 1985. Homo Narrans Re-constructing Narrative Theory: A Functional Perspective Journal of Communication (pre-1986); Fall 1985; 35, 4; ABI/INFORM Global pg. 90. Journal of Communication (pre-1986); 35, 4 (1985), 90. https://olympictest.bc.edu/res/gsswresearch-home/funding/proposal-development/_jcr_content/content/download_44/file.res/Lucaites,%20?Reconstructing% 20Narrative%20Theory%20a%20Functional%20Perspective?.pdfGoogle ScholarGoogle Scholar
  3. Alessandro Acquisti and Ralph Gross. 2006. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In International Workshop on Privacy Enhancing Technologies. Springer Berlin Heidelberg, Cambridge, UK, 36--58. https://doi.org/10.1007/11957454_3Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Alexa. 2020. Alexa: Top 500 websites. https://www.alexa.com/topsitesGoogle ScholarGoogle Scholar
  5. Cassandra Alexopoulos, Elisabeth Timmermans, and Jenna McNallie. 2020. Swiping more, committing less: Unraveling the links among dating app use, dating app success, and intention to commit infidelity. Computers in Human Behavior 102 (Jan. 2020), 172--180. https://doi.org/10.1016/j.chb.2019.08.009Google ScholarGoogle Scholar
  6. Mike Allen. 2017. Narrative Analysis. In The SAGE Encyclopedia of Communication Research Methods (2nd edition ed.), Mike Allen (Ed.). SAGE Publications, Inc, California. https://doi.org/10.4135/9781483381411.n368Google ScholarGoogle Scholar
  7. Steven Arnocky, Shafik Sunderani, Wendy Gomes, and Tracy Vaillancourt. 2015. Anticipated partner infidelity and men?s intimate partner violence: The mediating role of anxiety. Evolutionary Behavioral Sciences 9, 3 (2015), 186--196. https://doi.org/10.1037/ebs0000021Google ScholarGoogle ScholarCross RefCross Ref
  8. Julia C. Babcock, Daniela M. Costa, Charles E. Green, and Christopher I. Eckhardt. 2004. What situations induce intimate partner violence? A reliability and validity study of the Proximal Antecedents to Violent Episodes (PAVE) scale. Journal of family psychology: JFP: journal of the Division of Family Psychology of the American Psychological Association (Division 43) 18, 3 (Sept. 2004), 433--442. https://doi.org/10.1037/0893--3200.18.3.433Google ScholarGoogle ScholarCross RefCross Ref
  9. Mieke Bal. 2009. Narratology: Introduction to the Theory of Narrative (3rd revised edition edition ed.). University of Toronto Press, Toronto.Google ScholarGoogle Scholar
  10. Albert Bandura. 1978. Social Learning Theory of Aggression. Journal of Communication 28, 3 (1978), 12--29. https://doi.org/10.1111/j.1460--2466.1978.tb01621.x _eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1111/j.1460--2466.1978.tb01621.x.Google ScholarGoogle ScholarCross RefCross Ref
  11. Monica J. Barratt. 2011. Discussing illicit drugs in public internet forums: visibility, stigma, and pseudonymity. In Proceedings of the 5th International Conference on Communities and Technologies (C&T '11). Association for Computing Machinery, Brisbane, Australia, 159--168. https://doi.org/10.1145/2103354.2103376Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Michael Barthel, Galen Stocking, Jess Holcomb, and Amy Mitchell. 2016. Reddit news users more likely to be male, young and digital in their news preferences. https://www.journalism.org/2016/02/25/reddit-news-users-more-likelyto- be-male-young-and-digital-in-their-news-preferences/ Library Catalog: www.journalism.org Section: Publications.Google ScholarGoogle Scholar
  13. Rosanna Bellini, Jay Rainey, Andrew Garbett, and Pamela Briggs. 2019. Vocalising Violence: Using Violent Mens? Voices for Service Delivery and Feedback. In Proceedings of the 9th International Conference on Communities & Technologies - Transforming Communities (C&T '19). ACM, New York, NY, USA, 210--217. https://doi.org/10.1145/3328320.3328405 event-place: Vienna, Austria.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Amy Bruckman. 1996. Gender swapping on the Internet. In High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace (2nd edition ed.), Peter Ludlow (Ed.). A Bradford Book, Cambridge, Mass.Google ScholarGoogle Scholar
  15. Tara Capel, Jennyfer Lawrence Taylor, and Dhaval Vyas. 2016. Using Self-reported Experiences to Explore the Issues of Women in Crisis Situations. In Proceedings of the 28th Australian Conference on Computer-Human Interaction (OzCHI'16). ACM, New York, NY, USA, 483--488. https://doi.org/10.1145/3010915.3010962Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Stevie Chancellor, Andrea Hu, and Munmun De Choudhury. 2018. Norms Matter: Contrasting Social Support Around Behavior Change in Online Weight Loss Communities. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). Association for Computing Machinery, Montreal QC, Canada, 1--14. https://doi.org/10.1145/3173574.3174240Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Eshwar Chandrasekharan, Umashanthi Pavalanathan, Anirudh Srinivasan, Adam Glynn, Jacob Eisenstein, and Eric Gilbert. 2017. You Can't Stay Here: The Efficacy of Reddit's 2015 Ban Examined Through Hate Speech. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (Dec. 2017), 31:1--31:22. https://doi.org/10.1145/3134666Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Seymour Benjamin Chatman. 1980. Story and Discourse: Narrative Structure in Fiction and Film (new edition ed.). Cornell University Press, Cornell, New York. Google-Books-ID: ewrOp9uPjYUC.Google ScholarGoogle Scholar
  19. Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, and Thomas Ristenpart. 2018. The Spyware Used in Intimate Partner Violence. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, San Francisco, CA, 441--458. https://doi.org/10.1109/ SP.2018.00061 ISSN: 2375--1207.Google ScholarGoogle Scholar
  20. Chayn. 2020. Do It Yourself Online Safety Guide - you don't have to be offline to stay safe. https://chayn.co/safety/ Library Catalog: chayn.co.Google ScholarGoogle Scholar
  21. Rachel Clarke. 2015. Artful Social Engagement: Long-term Interaction Design within an InternationalWomen's Community. Ph.D. Dissertation. Newcastle University.Google ScholarGoogle Scholar
  22. Rachel Clarke, Peter Wright, and John McCarthy. 2012. Sharing Narrative and Experience: Digital Stories and Portraits at a Women's Centre. In CHI '12 Extended Abstracts on Human Factors in Computing Systems (CHI EA '12). ACM, New York, NY, USA, 1505--1510. https://doi.org/10.1145/2212776.2223663Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Amy A. Conroy. 2014. Marital Infidelity and Intimate Partner Violence in Rural Malawi: A Dyadic Investigation. Archives of sexual behavior 43, 7 (Oct. 2014), 1303--1314. https://doi.org/10.1007/s10508-014-0306--2Google ScholarGoogle Scholar
  24. Jaclyn D. Cravens, Kaitlin R. Leckie, and Jason B. Whiting. 2013. Facebook Infidelity: When Poking Becomes Problematic. Contemporary Family Therapy 35, 1 (March 2013), 74--90. https://doi.org/10.1007/s10591-012--9231--5Google ScholarGoogle ScholarCross RefCross Ref
  25. Jill P. Dimond, Michaelanne Dye, Daphne Larose, and Amy S. Bruckman. 2013. Hollaback!: The Role of Storytelling Online in a Social Movement Organization. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work (CSCW '13). ACM, New York, NY, USA, 477--490. https://doi.org/10.1145/2441776.2441831Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Jill P. Dimond, Casey Fiesler, and Amy S. Bruckman. 2011. Domestic violence and information communication technologies. Interacting with Computers 23, 5 (Sept. 2011), 413--421. https://doi.org/10.1016/j.intcom.2011.04.006 Conference Name: Interacting with Computers.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Rebecca Emerson Dobash, Russell P. Dobash, Kate Cavanagh, and Ruth Lewis. 1999. Changing Violent Men. SAGE Publications, London, UK. Google-Books-ID: JTzEr2OXgFQC.Google ScholarGoogle Scholar
  28. Julia Downes, Liz Kelly, and Nicole Westmarland. 2019. 'It's a work in progress': men's accounts of gender and change in their use of coercive control. Journal of Gender-Based Violence 3, 3 (Oct. 2019), 267--282(16). https://doi.org/10.1332/239868019X15627570242850Google ScholarGoogle ScholarCross RefCross Ref
  29. Claire Burke Draucker and Donna S. Martsolf. 2010. The Role of Electronic Communication Technology in Adolescent Dating Violence. Journal of Child and Adolescent Psychiatric Nursing 23, 3 (2010), 133--142. https://doi.org/10.1111/j.1744--6171.2010.00235.xGoogle ScholarGoogle Scholar
  30. Julia Ebner. 2020. Going Dark: The Secret Social Lives of Extremists. Bloomsbury Publishing, London.Google ScholarGoogle Scholar
  31. Naomi Ellemers, Russell Spears, and Bertjan Doosje. 2002. Self and Social Identity. Annual Review of Psychology 53, 1 (2002), 161--186. https://doi.org/10.1146/annurev.psych.53.100901.135228Google ScholarGoogle ScholarCross RefCross Ref
  32. Thomas Erickson. 1995. Notes on design practice: stories and prototypes as catalysts for communication. In Scenariobased design: envisioning work and technology in system development. John Wiley & Sons, Inc., USA, 37--58.Google ScholarGoogle Scholar
  33. Thomas Erickson. 1996. Design as storytelling. https://doi.org/10.1145/234813.234817Google ScholarGoogle Scholar
  34. Syd Field. 2005. Screenplay: Foundations Of Screenwriting. Delta, New York, N.Y.Google ScholarGoogle Scholar
  35. Cynthia Fraser, Erica Olsen, Kaofeng Lee, Cindy Southworth, and Sarah Tucker. 2010. The New Age of Stalking: Technological Implications for Stalking. Juvenile and Family Court Journal 61, 4 (2010), 39--55. https://doi.org/10.1111/j.1755--6988.2010.01051.x _eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1111/j.1755--6988.2010.01051.x.Google ScholarGoogle Scholar
  36. Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, and Nicola Dell. 2019. "Is My Phone Hacked?" Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence. Proc. ACM Hum.-Comput. Interact. 3, CSCW (Nov. 2019), 202:1--202:24. https://doi.org/10.1145/3359304Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2018. 'A Stalker's Paradise?: How Intimate Partner Abusers Exploit Technology. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, New York, NY, USA, 667:1--667:13. https://doi.org/10.1145/3173574.3174241Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Claudia Garcia-Moreno. 2013. Global and regional estimates of violence against women: Prevalence and health effects of intimate partner violence and non-partner sexual violence. Technical Report. World Health Organization, Department of Reproductive Health and Research. 51 pages. https://www.who.int/reproductivehealth/publications/violence/9789241564625/en/Google ScholarGoogle Scholar
  39. Claudia Garcia-Moreno, Henrica AFM Jansen, Mary Ellsberg, Lori Heise, and Charlotte H Watts. 2006. Prevalence of intimate partner violence: findings from the WHO multi-country study on women?s health and domestic violence. The Lancet 368, 9543 (Oct. 2006), 1260--1269. https://doi.org/10.1016/S0140--6736(06)69523--8Google ScholarGoogle ScholarCross RefCross Ref
  40. Anna Gibson. 2019. Free Speech and Safe Spaces: How Moderation Policies Shape Online Discussion Spaces. Social Media + Society 5, 1 (Jan. 2019), 2056305119832588. https://doi.org/10.1177/2056305119832588 Publisher: SAGE Publications Ltd.Google ScholarGoogle Scholar
  41. Diana Gil-González, Carmen Vives-Cases, María Teresa Ruiz, Mercedes Carrasco-Portiño, and Carlos Álvarez Dardet. 2008. Childhood experiences of violence in perpetrators as a risk factor of intimate partner violence: a systematic review. Journal of Public Health 30, 1 (March 2008), 14--22. https://doi.org/10.1093/pubmed/fdm071 Publisher: Oxford Academic.Google ScholarGoogle ScholarCross RefCross Ref
  42. Barney Glaser and Anselm Strauss. 1999. The Discovery of Grounded Theory: Strategies for Qualitative Research. Routledge, New Brunswick.Google ScholarGoogle Scholar
  43. Barney G. Glaser. 1965. The Constant Comparative Method of Qualitative Analysis. Social Problems 12, 4 (1965), 436--445. https://doi.org/10.2307/798843Google ScholarGoogle ScholarCross RefCross Ref
  44. Barney G. Glaser. 1978. Theoretical Sensitivity: Advances in the Methodology of Grounded Theory (1st edition ed.). The Sociology Press, California, USA.Google ScholarGoogle Scholar
  45. Greg Guest, Kathleen MacQueen, and Emily Namey. 2012. Applied Thematic Analysis. SAGE Publications, Inc., 2455 Teller Road, Thousand Oaks California 91320 United States. https://doi.org/10.4135/9781483384436Google ScholarGoogle Scholar
  46. J. Halverson, S. Corman, and H. L. Goodall. 2011. Master Narratives of Islamist Extremism. Palgrave Macmillan US, New York, N.Y. https://doi.org/10.1007/978-0--230--11723--5Google ScholarGoogle Scholar
  47. Alina Hang, Emanuel von Zezschwitz, Alexander De Luca, and Heinrich Hussmann. 2012. Too much information! user attitudes towards smartphone sharing. In Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making Sense Through Design (NordiCHI '12). Association for Computing Machinery, Copenhagen, Denmark, 284--287. https://doi.org/10.1145/2399016.2399061Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Bridget A. Harris and Delanie Woodlock. 2019. Digital Coercive Control: Insights From Two Landmark Domestic Violence Studies. The British Journal of Criminology 59, 3 (April 2019), 530--550. https://doi.org/10.1093/bjc/azy052 Publisher: Oxford Academic.Google ScholarGoogle ScholarCross RefCross Ref
  49. Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2019. Clinical Computer Security for Victims of Intimate Partner Violence. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 105--122. https://www.usenix.org/conference/usenixsecurity19/presentation/havronGoogle ScholarGoogle Scholar
  50. Jeff Hearn. 1998. The Violences of Men: How Men Talk About and How Agencies Respond to Men's Violence to Women (1st edition ed.). SAGE, London, UK. Google-Books-ID: hjK8VLfOUPoC.Google ScholarGoogle Scholar
  51. David Herman. 2004. Story Logic: Problems and Possibilities of Narrative. University of Nebraska Press, Lincoln, Neb.Google ScholarGoogle Scholar
  52. Karri A. Holley and Julia Colyar. 2009. Rethinking Texts: Narrative and the Construction of Qualitative Research. Educational Researcher 9 (Dec. 2009), 0--244. https://doi.org/10.3102/0013189X09351979 Publisher: SAGE PublicationsSage CA: Los Angeles, CA.Google ScholarGoogle Scholar
  53. Andrea Hu, Stevie Chancellor, and Munmun De Choudhury. 2019. Characterizing Homelessness Discourse on Social Media. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems (CHI EA '19). Association for Computing Machinery, Glasgow, Scotland Uk, 1--6. https://doi.org/10.1145/3290607.3313057Google ScholarGoogle Scholar
  54. Scott Allen Johnson. 2006. Physical Abusers and Sexual Offenders: Forensic and Clinical Strategies. CRC Press. Google- Books-ID: mmHLBQAAQBAJ.Google ScholarGoogle Scholar
  55. Farnaz Kaighobadi, Todd K. Shackelford, Danielle Popp, Ryan M. Moyer, Vincent M. Bates, and James R. Liddle. 2009. Perceived risk of female infidelity moderates the relationship between men's personality and partner-directed violence. Journal of Research in Personality 43, 6 (Dec. 2009), 1033--1039. https://doi.org/10.1016/j.jrp.2009.08.001Google ScholarGoogle ScholarCross RefCross Ref
  56. Liz Kelly. 2003. The Wrong Debate: Reflections on Why Force Is Not the Key Issue with Respect to Trafficking in Women for Sexual Exploitation. Feminist Review 1, 73 (2003), 139--144. https://www.jstor.org/stable/1396003 Publisher: Sage Publications, Ltd.Google ScholarGoogle ScholarCross RefCross Ref
  57. Joy Kim and Andres Monroy-Hernandez. 2016. Storia: Summarizing Social Media Content based on Narrative Theory using Crowdsourcing. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '16). Association for Computing Machinery, San Francisco, California, USA, 1018--1027. https://doi.org/10.1145/2818048.2820072Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Arie W. Kruglanski, Michele J. Gelfand, Jocelyn J. Bélanger, Anna Sheveland, Malkanthi Hetiarachchi, and Rohan Gunaratna. 2014. The Psychology of Radicalization and Deradicalization: How Significance Quest Impacts Violent Extremism. Political Psychology 35 (2014), 69--93. https://www.jstor.org/stable/43783789 Publisher: [International Society of Political Psychology, Wiley].Google ScholarGoogle ScholarCross RefCross Ref
  59. William Labov. 1972. Sociolinguistic Patterns (1st edition ed.). University of Pennsylvania Press, Pennsylvania. https://books.google.co.uk/books/about/Sociolinguistic_Patterns.html?id=hD0PNMu8CfQC Google-Books-ID: hD0PNMu8CfQC.Google ScholarGoogle Scholar
  60. Shalini Lal, Melinda Suto, and Michael Ungar. 2012. Examining the Potential of Combining the Methods of Grounded Theory and Narrative Inquiry: A Comparative Analysis. The Qualitative Report 17, 21 (May 2012), 1--22. https://nsuworks.nova.edu/tqr/vol17/iss21/1Google ScholarGoogle Scholar
  61. Amy Lehrner and Nicole E. Allen. 2008. Social Change Movements and the Struggle Over Meaning-Making: A Case Study of Domestic Violence Narratives. American Journal of Community Psychology 42, 3 (Dec. 2008), 220--234. https://doi.org/10.1007/s10464-008--9199--3Google ScholarGoogle ScholarCross RefCross Ref
  62. Roxanne Leitão. 2019. Technology-Facilitated Intimate Partner Abuse: a qualitative analysis of data from online domestic abuse forums. Human--Computer Interaction 0, 0 (Dec. 2019), 1--40. https://doi.org/10.1080/07370024.2019.1685883Google ScholarGoogle Scholar
  63. Eva Lungren. 1998. The hand that strikes and comforts: gender construction and the tension between body and symbol. In Rethinking Violence Against Women (r. emerson dobash & russell p. dobash ed.). Sage, London, 169--198. http://sk.sagepub.com/books/rethinking-violence-against-women/n7.xmlGoogle ScholarGoogle Scholar
  64. Jill C. Manning. 2006. The Impact of Internet Pornography on Marriage and the Family: A Review of the Research. Sexual Addiction & Compulsivity 13, 2--3 (Sept. 2006), 131--165. https://doi.org/10.1080/10720160600870711Google ScholarGoogle ScholarCross RefCross Ref
  65. Diogo Marques, Tiago Guerreiro, Luis Carriço, Ivan Beschastnikh, and Konstantin Beznosov. 2omputing Systems (CHI '19). ACM, New York, NY, USA, 589:1--589:13. https://doi.org/10.1145/3290605. 3300819 event-place: Glasgow, Scotland UK.Google ScholarGoogle Scholar
  66. Tara Matthews, Kerwell Liao, Anna Turner, Marianne Berkovich, Robert Reeder, and Sunny Consolvo. 2016. "She'll just grab any device that's closer": A Study of Everyday Device & Account Sharing in Households. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). Association for Computing Machinery, San Jose, California, USA, 5921--5932. https://doi.org/10.1145/2858036.2858051Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Tara Matthews, Kathleen O'Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, and Sunny Consolvo. 2017. Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner Abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, USA, 2189--2201. https://doi.org/10.1145/3025453.3025875Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Lynn McAlpine. 2016. Why might you use narrative methodology? A story about narrative. Eesti Haridusteaduste Ajakiri. Estonian Journal of Education 4, 1 (April 2016), 32--57. https://doi.org/10.12697/eha.2016.4.1.02b Number: 1.Google ScholarGoogle Scholar
  69. Jennifer McCleary-Sills, Sophie Namy, Joyce Nyoni, Datius Rweyemamu, Adrophina Salvatory, and Ester Steven. 2016. Stigma, shame and women's limited agency in help-seeking for intimate partner violence. Global Public Health 11, 1--2 (Feb. 2016), 224--235. https://doi.org/10.1080/17441692.2015.1047391 Publisher: Taylor & Francis _eprint: https://doi.org/10.1080/17441692.2015.1047391.Google ScholarGoogle Scholar
  70. Lydia Michie, Madeline Balaam, John McCarthy, Timur Osadchiy, and Kellie Morrissey. 2018. From Her Story, to Our Story: Digital Storytelling as Public Engagement around Abortion Rights Advocacy in Ireland. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). Association for Computing Machinery, Montreal QC, Canada, 1--15. https://doi.org/10.1145/3173574.3173931Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Julianna M. Nemeth, Amy E. Bonomi, Meghan A. Lee, and Jennifer M. Ludwin. 2012. Sexual Infidelity as Trigger for Intimate Partner Violence. Journal ofWomen's Health 21, 9 (June 2012), 942--949. https://doi.org/10.1089/jwh.2011.3328Google ScholarGoogle Scholar
  72. Simon Parkin, Trupti Patel, Isabel Lopez-Neira, and Leonie Tanczer. 2019. Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse. In Proceedings of the New Security Paradigms Workshop (NSPW '19). Association for Computing Machinery, San Carlos, Costa Rica, 1--15. https://doi.org/10.1145/3368860.3368861Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Jessica Pater and Elizabeth Mynatt. 2017. Defining Digital Self-Harm. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). Association for Computing Machinery, Portland, Oregon, USA, 1501--1513. https://doi.org/10.1145/2998181.2998224Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Ellen Pence and Michael Paymar. 1993. Education Groups for Men Who Batter: The Duluth Model. Springer Publishing Company, New York, N.Y. Google-Books-ID: tJ189FTdO38C.Google ScholarGoogle Scholar
  75. Louise F. Pendry and Jessica Salvatore. 2015. Individual and social benefits of online discussion forums. Computers in Human Behavior 50 (Sept. 2015), 211--220. https://doi.org/10.1016/j.chb.2015.03.067Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Olivia Petter. 2017. These are the hidden signs your partner is cheating. http://www.independent.co.uk/lifestyle/ love-sex/cheating-signs-partner-boyfriend-girlfriend-relationship-infidelity-a8072006.html Library Catalog: www.independent.co.uk Section: Love & Sex.Google ScholarGoogle Scholar
  77. Stephen A. Rains, Emily B. Peterson, and Kevin B.Wright. 2015. Communicating Social Support in Computer-mediated Contexts: A Meta-analytic Review of Content Analyses Examining Support Messages Shared Online among Individuals Coping with Illness. Communication Monographs 82, 4 (Oct. 2015), 403--430. https://doi.org/10.1080/03637751.2015.1019530Google ScholarGoogle ScholarCross RefCross Ref
  78. Harry T. Reis and Charles M. Judd (Eds.). 2000. Handbook of Research Methods in Social and Personality Psychology (1 edition ed.). Cambridge University Press, Cambridge.Google ScholarGoogle Scholar
  79. Catherine Kohler Riessman. 1993. Narrative Analysis. SAGE, London, UK. Google-Books-ID: 9ffAwoYi7E0C.Google ScholarGoogle Scholar
  80. Catherine Kohler Riessman. 2007. Narrative Methods for the Human Sciences (first edition ed.). SAGE Publications, Inc, LA.Google ScholarGoogle Scholar
  81. David S. Riggs, Marie B. Caulfield, and Amy E. Street. 2000. Risk for domestic violence: Factors associated with perpetration and victimization. Journal of Clinical Psychology 56, 10 (2000), 1289--1316. https://doi.org/10.1002/ 1097--4679(200010)56:101289::AID-JCLP43.0.CO;2-Z _eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1002/1097--4679%28200010%2956%3A10%3C1289%3A%3AAID-JCLP4%3E3.0.CO%3B2-Z.Google ScholarGoogle ScholarCross RefCross Ref
  82. Alan Rosenbaum and Tracii S. Kunkel. 2009. Group interventions for intimate partner violence. In Psychological and physical aggression in couples: Causes and interventions. American Psychological Association, Washington, DC, US, 191--210. https://doi.org/10.1037/11880-009Google ScholarGoogle Scholar
  83. Sanjeev P. Sahni and Swarnim Swasti. 2018. Myths Associated with Internet Infidelity: Is It a Real Problem? In Internet Infidelity: An Interdisciplinary Insight in a Global Context, Sanjeev P. Sahni and Garima Jain (Eds.). Springer, Singapore, 175--184. https://doi.org/10.1007/978--981--10--5412--9_11Google ScholarGoogle Scholar
  84. Barbara Herrnstein Smith. 1980. Narrative Versions, Narrative Theories. Critical Inquiry 7, 1 (1980), 213--236. www.jstor.org/stable/1343185Google ScholarGoogle ScholarCross RefCross Ref
  85. Andrew Stickley, Olga Kislitsyna, Irina Timofeeva, and Denny Vågerö. 2008. Attitudes Toward Intimate Partner Violence Against Women in Moscow, Russia. Journal of Family Violence 23, 6 (Aug. 2008), 447--456. https://doi.org/10.1007/s10896-008--9170-yGoogle ScholarGoogle ScholarCross RefCross Ref
  86. Lisa Sugiura, Rosemary Wiles, and Catherine Pope. 2017. Ethical challenges in online research: Public/private perceptions. Research Ethics 13, 3--4 (July 2017), 184--199. https://doi.org/10.1177/1747016116650720 Publisher: SAGE Publications Ltd.Google ScholarGoogle Scholar
  87. Jessica Taylor. 2020. Why Women Are Blamed For Everything: Exploring the Victim Blaming of Women Subjected to Violence and Trauma. Lulu.com, S.l.Google ScholarGoogle Scholar
  88. Jenna Torluemke and Christine Kim. 2020. Nearly Half of Americans Admit to 'Stalking' an Ex or Current Partner Online. https://investor.nortonlifelock.com/About/Investors/press-releases/press-release-details/2020/Nearly-Half-of-Americans-Admit-to-Stalking-an-Ex-or-Current-Partner-Online/default.aspx Library Catalog: investor.nortonlifelock.com.Google ScholarGoogle Scholar
  89. Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2020. The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 1893--1909.Google ScholarGoogle Scholar
  90. Maike Vollstedt and Sebastian Rezat. 2019. An Introduction to Grounded Theory with a Special Focus on Axial Coding and the Coding Paradigm. In Compendium for Early Career Researchers in Mathematics Education, Gabriele Kaiser and Norma Presmeg (Eds.). Springer International Publishing, Cham, 81--100. https://doi.org/10.1007/978--3-030--15636--7_4Google ScholarGoogle Scholar
  91. Lenore E. Walker. 1980. The Battered Woman (reprint edition ed.). HarperPerennial, New York u.a.Google ScholarGoogle Scholar
  92. Nicole Westmarland and Hannah Bows. 2018. Researching Gender, Violence and Abuse: Theory, Methods, Action (1 edition ed.). Routledge, Abingdon, Oxon; New York, NY.Google ScholarGoogle Scholar
  93. Monica Therese Whitty. 2003. Pushing the Wrong Buttons: Men's and Women's Attitudes toward Online and Offline Infidelity. CyberPsychology & Behavior 6, 6 (Dec. 2003), 569--579. https://doi.org/10.1089/109493103322725342Google ScholarGoogle ScholarCross RefCross Ref
  94. Holly Skodol Wilson and Sally A. Hutchinson. 1991. Triangulation of Qualitative Methods: Heideggerian Hermeneutics and Grounded Theory. Qualitative Health Research 1, 2 (May 1991), 263--276. https://doi.org/10.1177/104973239100100206Google ScholarGoogle ScholarCross RefCross Ref
  95. Delanie Woodlock. 2017. The Abuse of Technology in Domestic Violence and Stalking. Violence Against Women 23, 5 (April 2017), 584--602. https://doi.org/10.1177/1077801216646277Google ScholarGoogle ScholarCross RefCross Ref
  96. Delanie Woodlock, Mandy McKenzie, Deborah Western, and Bridget Harris. 2019. Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control. Australian Social Work 0, 0 (July 2019), 1--13. https://doi.org/10.1080/0312407X.2019.1607510Google ScholarGoogle Scholar
  97. Kevin B. Wright and Stephen A. Rains. 2013. Weak-Tie Support Network Preference, Health-Related Stigma, and Health Outcomes in Computer-Mediated Support Groups. Journal of Applied Communication Research 41, 3 (Aug. 2013), 309--324. https://doi.org/10.1080/00909882.2013.792435Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. "So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!