Abstract
Intimate partner violence (IPV) is an issue that many individuals face globally. Cyber IPV is a new frontier in which abusers can access and harm their victims in new ways. Technology has made it possible for a perpetrator of IPV to monitor a victim’s actions online and/or on their mobile device, have instant ability to threaten and harass them, monitor their movements online, as well as stalk them without needing to be in the same physical space. This chapter will provide an overview of the ways in which abusers use technology within an intimate partner relationship to abuse their victims, as well as the prevalence of such acts. A summary of the relevant research will be presented. Finally, current best practices programs and services will be discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alexy, E. M., Burgess, A. W., Baker, T., & Smoyak, S. A. (2005). Perceptions of cyberstalking among college students. Brief Treatment and Crisis Intervention, 5(3), 279.
Alvarez, A. R. (2012). “IH8U”: Confronting cyberbullying and exploring the use of Cybertools in teen dating relationships. Journal of Clinical Psychology, 68(11), 1205–1215.
Baum, K., Catalano, S., Rand, M., & Rose, K. (2009). Stalking victimization in the United States. Bureau of justice statistics special report, U.S. Department of Justice.
Belknap, J., Chu, A. T., & DePrince, A. P. (2011). The roles of phones and computers in threatening and abusing women victims of male intimate partner abuse. Duke J. Gender L. & Pol'y, 19, 373.
Bocij, P., & McFarlane, L. (2003). Cyberstalking: The technology of hate. The Police Journal, 76, 204–221
Borrajo, E., Gámez-Guadix, M., Pereda, N., & Calvete, E. (2015). The development and validation of the cyber dating abuse questionnaire among young couples. Computers in Human Behavior, 48, 358–365. https://doi.org/10.1016/j.chb.2015.01.063.
Brem, M. J., Spiller, L. C., & Vandehey, M. A. (2015). Online mate-retention tactics on Facebook are associated with relationship aggression. Journal of Interpersonal Violence, 30, 2831–2859. https://doi.org/10.1177/0886260514554286.
Brem, M. J., Florimbio, A. R., Grigorian, H., Wolford-Clevenger, C., Elmquist, J., Shorey, R. C., Rothman, E. F., Temple, J. R., & Stuart, G. L. (2017). Cyber abuse among men arrested for domestic violence: Cyber monitoring moderates the relationship between alcohol problems and intimate partner violence. Psychology of Violence . Advance online publication. https://doi.org/10.1037/vio0000130.
Burke, S. C., Wallen, M., Vail-Smith, K., & Knox, D. (2011). Using technology to control intimate partners: An exploratory study of college undergraduates. Computers in Human Behavior, 27(3), 1162–1167.
Cattaneo, L. B., Cho, S., & Botuck, S. (2011). Describing intimate partner stalking over time: An effort to inform victim-centered service provision. Journal of Interpersonal Violence, 26, 3428–3454.
Cavezza, C., & McEwan, T. E. (2014). Cyberstalking versus off-line stalking in a forensic sample. Psychology, Crime & Law. (ahead-of-print), 10, 1–16.
Centers for Disease Control and Prevention. (2019). Intimate Partner Violence. https://www.cdc.gov/violenceprevention/intimatepartnerviolence/
Chatterjee R. et al., “The Spyware Used in Intimate Partner Violence,” 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, 2018, pp. 441–458. https://doi.org/10.1109/SP.2018.00061
Chaudhuri, P., Chatterjee, A., & Verma, V. (2014). Guardians of the Internet. The Telegraph. http://www.telegraphindia.com/1141207/jsp/7days/story_2412.jsp.
Citron, D. K., Franks, M. A., & Criminalizing Revenge Porn. (2014). Wake forest law review, Vol. 49, 2014, p. 345+; U of Maryland Legal Studies Research Paper No. 2014–1. Available at SSRN: https://ssrn.com/abstract=2368946
Clevenger, S. L., Navarro, J. N., & Gilliam, M. (2018). Technology and the endless “cat and mouse” game: A review of the interpersonal cybervictimization literature. Sociology Compass . Online first. https://doi.org/10.1111/soc4.12639.
Congress. (2019). ENOUGH Act. https://www.congress.gov/bill/115th-congress/senate-bill/2162/text
Cyber Civil Rights Initiative. (2018). Revenge pornography. https://www.cybercivilrights.org/
DCMA Defender. (2018). http://dmcadefender.com
DeKeseredy, W. S., & Schwartz, M. D. (2016). Thinking sociologically about image-based sexual abuse: The contribution of male peer support theory. Sexualization, Media, & Society, 2(4). doi:237462381668469.
DeKeseredy, W. S., Hall-Sanchez, A., Nolan, J., & Schwartz, M. D. (2017). A cam- pus LGBTQ community’s sexual violence and stalking experiences: The contribution of pro-abuse peer support. Journal of Gender-Based Violence, 1, 169–185.
Dimond, J. P., Fiesler, C., & Bruckman, A. S. (2011). Domestic violence and information communication technologies. Interacting with Computers, 23(5), 413–421.
Dodge, R. C., Carver, C., & Ferguson, A. J. (2007). Phishing for user security awareness. Computers & Security, 26, 73–80.
Dreßing, H., Bailer, J., Anders, A., Wagner, H., & Gallas, C. (2014). Cyberstalking in a large sample of social network users: Prevalence, characteristics, and impact upon victims. Cyberpsychology, Behavior and Social Networking, 17(2), 61–67.
Eaton, A. A., Jacobs, H., & Ruvalcaba, Y. (2017). 2017 nationwide online study of nonconsensual porn victimization and perpetration: A summary report. Florida International University, Department of Psychology: Cyber Civil Rights Initiative, Inc.
FBI. (2019). Cyberstalking stories. “Woman sentenced for stalking woman on social media.” https://www.fbi.gov/news/stories/woman-sentenced-for-cyberstalking
Finn, J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal Violence, 19(4), 468–483.
Fisher, B. S., Cullen, F. T., & Turner, M. G. (2002). Being pursued: Stalking victimization in a national study of college women. Criminology & Public Policy, 1, 257–308
FlexiSpy. (2018). https://www.flexispy.com
Franks, M. A. (2016). ‘Revenge porn’ reform: A view from the front lines (October 17, 2016). Florida Law Review. University of Miami Legal Studies Research Paper no. 16–43. Available at SSRN: https://ssrn.com/abstract=2853789
Fraser, C., Olsen, E., Lee, K., Southworth, C., & Tucker, S. (2010). The new age of stalking: Technological implications for stalking. Juvenile and Family Court Journal, 61(4), 39–55.
Freed, D., Palmer, J., Minchala, D., Levy, K., Ristenpart, T., & Dell, N. (2017). Digital technologies and intimate partner violence: A qualitative analysis with multiple stakeholders. PACM: Human-Computer Interaction: Computer-Supported Cooperative Work and Social Computing (CSCW), 1(2). Article 46.
Fremouw, W. J., Westrup, D., & Pennypacker, J. (1997). Stalking on campus: The prevalence and strategies for coping with stalking. Journal of Forensic Sciences, 42(4), 666–669.
Gámez-Guadix, M., Almendros, C., Borrajo, E., & Calvete, E. (2015). Prevalence and association of sexting and online sexual victimization among Spanish adults. Sexuality Research and Social Policy, 12(2), 145–154.
Goodson, P., McCormick, D., & Evans, A. (2001). Searching for sexually explicit materials on the Internet: an exploratory study of college students’ behavior and attitudes. Archives of Sexual Behavior, 30, 101–118.
Gregorie, T. M. (2001). Cyberstalking: Dangers on the information superhighway. National Center for Victims of Crime.
Hand, T., Chung, D., & Peters, M. (2009). The use of information and communication technologies to coerce and control in domestic violence and following separation. Sydney: Australian Domestic and Family Violence Clearinghouse, UNSW.
Harrell, E., & Langton, L. (2013). Victims of identity theft, 2012 (NCJ 243779). Washington, DC: Bureau of Justice Statistics.
Hauser, C. (2017). Dani Mathers, former playboy model, gets community service for snapchat of woman in gym. New York Times. https://www.nytimes.com/2017/05/25/us/dani-mathers-body-shaming.html?module=inline
Hauser, C. (2018). $6.4 million judgment in revenge porn case is among largest ever. New York Times. https://www.nytimes.com/2018/04/11/us/revenge-porn-california.html
Hinduja, S., & Patchin, J. (2011). Electronic dating violence: A brief guide for educators and parents. Cyberbullying Research Center. Retrieved March, 1, 2011.
King-Ries, A. (2010). Teens, technology, and cyberstalking: The domestic violence wave of the future. Texas Journal of Women & Law, 20, 131–164.
Kraft, E., & Wang, J. (2010). An exploratory study of the cyberbullying and cyberstalking experiences and factors related to victimization of students at a public liberal arts college. International Journal of Technologies, 1, 74–91. https://doi.org/10.4018/jte.2010100106
Lamphere, R. D., & Pikciunas, K. T. (2016). Sexting, sextortion, and other internet sexual offenses. In J. N. Navarro, S. Clevenger, & C. D. Marcum (Eds.), The intersection between intimate partner abuse, technology, and cybercrime: Examining the virtual enemy (pp. 141–165). Durham: Carolina University Press.
Langton, L. (2011). Identity theft reported by households, 2005–2010 (NCJ 236245). Washington, DC: Bureau of Justice Statistics.
Lee, R. K. (1998). Romantic and electronic stalking in a college context. William & Mary Journal of Women and the Law, 4(2), 373–409.
Leisring, P. A., & Giumetti, G. W. (2014). Sticks and stones may break my bones, but abusive text messages can also hurt: Development and validation of the cyber psychological abuse (CPA) scale. Partner Abuse, 5, 323–341. https://doi.org/10.1891/1946-6560.5.3.323.
Levy, K. E. (2014). Intimate surveillance. Idaho Law Review, 51, 679–696.
Matthews, T., O’Leary, K., Turner, A., Sleeper, M., Woelfer, J. P., Shelton, M., Manthorne, C., Churchill, E. F., & Consolvo, S. (2017). Stories from survivors: Privacy & security practices when coping with intimate partner abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 2189–2201).
McAfee. (2013). Love, relationships, and technology survey. Retrieved from http://www.mcafee.com/us/about/news/2013/q1/20130204-01.aspx
McGlynn, C., & Rackley, E. (2016). Not “revenge porn,” but abuse: Let’s call it image-based sexual abuse. Inherently Human: Critical Perspectives on Law, Gender & Sexuality, 41. Retrieved from https://inherentlyhuman.wordpress.com/2016/02/15/not-revenge-porn-but-abuse-lets-call-it-image-based-sexual-abuse.
Melander, L. A. (2010). College students’ perceptions of intimate partner cyber harassment. Cyberpsychology, Behavior and Social Networking, 13(3), 263–268.
mSpy. (2018). https://www.mspy.com
Najdowski, C. J., & Hildebrand, M. M. (2014). The criminalization of “revenge porn”: How psychological research can guide policy. Monitor on Psychology, 45(1), 26.
National Center for Victims of Crime. (2018). Stalking Resource Center. http://victimsofcrime.org/our-programs/stalking-resource-center
National Coalition Against Domestic Violence. (2019). http://www.ncadv.org/
Navarro, J. N. (2016). Cyberabuse and cyberstalking. In J. N. Navarro, S. Clevenger, & C. D. Marcum (Eds.), The intersection between intimate partner abuse, technology, and cybercrime (pp. 125–139). Durham: Carolina Academic Press.
Navarro, J. N., Clevenger, S., & Marcum, C. D. (Eds.). (2016). The intersection between intimate partner abuse, technology, and cybercrime: Examining the virtual enemy. Durham: Carolina Academic Press.
Palanisamy, B., Sensenig, S., Joshi, J., & Constantino, R. (2014). LEAF: A privacy-conscious social network-based intervention tool for IPV survivors. In Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014) Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference (pp. 138–146).
Paraben. (2018). Paraben Recovery Sticks. https://www.paraben-sticks.com/index.html
Reyns, B. W., Henson, B., & Fisher, B. S. (2012). Stalking in the twilight zone: Extent of cyberstalking victimization and offending among college students. Deviant Behavior, 33(1), 1–25.
Rogers, L. E., Castleton, A., & Lloyd, S. A. (1996). Relational control and physical aggression in satisfying marital relationships. In D. D. Cahn & S. A. Lloyd (Eds.), Family violence from a communication perspective (pp. 218–239). Thousand Oaks: Sage.
Sheridan, L. P., & Grant, T. (2007). Is cyberstalking different? Psychology, Crime & Law, 13(6), 627–640.
Smith, S. G., Basile, K. C., Gilbert, L. K., Merrick, M. T., Patel, N.,Walling, M., & Jain, A. (2017). The national intimate partner and sexual violence survey (NISVS): 2010–2012 state report.
Southworth, C., Dawson, S., Fraser, C., & Tucker, S. (2005). A high-tech twist on abuse: Technology, intimate partner stalking, and advocacy. St. Paul: Violence Against Women Online Resources.
Southworth, C., Finn, J., Dawson, S., Fraser, C., & Tucker, S. (2007). Intimate partner violence, technology, and stalking. Violence Against Women, 13(8), 842–856.
Spence-Diehl, E. (2003). Stalking and technology: The double-edged sword. Journal of Technology in Human Services, 22(1), 5–18.
Spitzberg, B., & Cupach, W. (2001). Paradoxes of pursuit: Toward a relational model of stalking-related phenomena. In J. Davis (Ed.), Stalk- ing, stalkers and their victims: Prevention, intervention, and threat assessment (pp. 97–136). Boca Raton: CRC Press. https://doi.org/10.1201/9781420041743.ch6.
Spitzberg, B. H., & Hoobler, G. (2002). Cyberstalking and the technologies of interpersonal terrorism. New Media & Society, 4(1), 71–92. https://doi.org/10.1177/14614440222226271.
Stark, E. (2007). Interpersonal violence. Coercive control: How men entrap women in personal life. Oxford University Press.
Temple, J. R., Choi, H. J., Brem, M., Wolford-Clevenger, C., Stuart, G. L., Peskin, M. F., & Elmquist, J. (2016). The temporal association between traditional and cyber dating abuse among adolescents. Journal of Youth and Adolescence, 45, 340–349. https://doi.org/10.1007/s10964-015-0380-3.
The National Network to End Domestic Violence. (2018). Project Safety Net. https://nnedv.org/content/safety-net/
Tor. (2018). https://www.torproject.org/
Walker, L. E. A. (1984). The battered woman syndrome. New York: Springer.
Woodlock, D. (2016). The abuse of technology in domestic violence and stalking. Violence Against Women, 23(5), 584–602.
Working to Halt Abuse Online. (2018). https://www.haltabuse.org/
Working to Halt Online Abuse. (2013). Online harassment statistics. Retrieved October 18, 2018, from http://www.haltabuse.org/resources/stats/index.shtml
Zweig, J. M., Dank, M., Yahner, J., & Lachman, P. (2013). The rate of cyber dating abuse among teens and how it relates to other forms of teen dating violence. Journal of Youth and Adolescence, 42(7), 1063–1077.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Author(s)
About this entry
Cite this entry
Clevenger, S., Gilliam, M. (2020). Intimate Partner Violence and the Internet: Perspectives. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_58
Download citation
DOI: https://doi.org/10.1007/978-3-319-78440-3_58
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-78439-7
Online ISBN: 978-3-319-78440-3
eBook Packages: Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences