Skip to main content

Intimate Partner Violence and the Internet: Perspectives

  • Reference work entry
  • First Online:
The Palgrave Handbook of International Cybercrime and Cyberdeviance

Abstract

Intimate partner violence (IPV) is an issue that many individuals face globally. Cyber IPV is a new frontier in which abusers can access and harm their victims in new ways. Technology has made it possible for a perpetrator of IPV to monitor a victim’s actions online and/or on their mobile device, have instant ability to threaten and harass them, monitor their movements online, as well as stalk them without needing to be in the same physical space. This chapter will provide an overview of the ways in which abusers use technology within an intimate partner relationship to abuse their victims, as well as the prevalence of such acts. A summary of the relevant research will be presented. Finally, current best practices programs and services will be discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 649.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Alexy, E. M., Burgess, A. W., Baker, T., & Smoyak, S. A. (2005). Perceptions of cyberstalking among college students. Brief Treatment and Crisis Intervention, 5(3), 279.

    Google Scholar 

  • Alvarez, A. R. (2012). “IH8U”: Confronting cyberbullying and exploring the use of Cybertools in teen dating relationships. Journal of Clinical Psychology, 68(11), 1205–1215.

    Article  Google Scholar 

  • Baum, K., Catalano, S., Rand, M., & Rose, K. (2009). Stalking victimization in the United States. Bureau of justice statistics special report, U.S. Department of Justice.

    Google Scholar 

  • Belknap, J., Chu, A. T., & DePrince, A. P. (2011). The roles of phones and computers in threatening and abusing women victims of male intimate partner abuse. Duke J. Gender L. & Pol'y, 19, 373.

    Google Scholar 

  • Bocij, P., & McFarlane, L. (2003). Cyberstalking: The technology of hate. The Police Journal, 76, 204–221

    Google Scholar 

  • Borrajo, E., Gámez-Guadix, M., Pereda, N., & Calvete, E. (2015). The development and validation of the cyber dating abuse questionnaire among young couples. Computers in Human Behavior, 48, 358–365. https://doi.org/10.1016/j.chb.2015.01.063.

    Article  Google Scholar 

  • Brem, M. J., Spiller, L. C., & Vandehey, M. A. (2015). Online mate-retention tactics on Facebook are associated with relationship aggression. Journal of Interpersonal Violence, 30, 2831–2859. https://doi.org/10.1177/0886260514554286.

    Article  Google Scholar 

  • Brem, M. J., Florimbio, A. R., Grigorian, H., Wolford-Clevenger, C., Elmquist, J., Shorey, R. C., Rothman, E. F., Temple, J. R., & Stuart, G. L. (2017). Cyber abuse among men arrested for domestic violence: Cyber monitoring moderates the relationship between alcohol problems and intimate partner violence. Psychology of Violence . Advance online publication. https://doi.org/10.1037/vio0000130.

  • Burke, S. C., Wallen, M., Vail-Smith, K., & Knox, D. (2011). Using technology to control intimate partners: An exploratory study of college undergraduates. Computers in Human Behavior, 27(3), 1162–1167.

    Article  Google Scholar 

  • Cattaneo, L. B., Cho, S., & Botuck, S. (2011). Describing intimate partner stalking over time: An effort to inform victim-centered service provision. Journal of Interpersonal Violence, 26, 3428–3454.

    Article  Google Scholar 

  • Cavezza, C., & McEwan, T. E. (2014). Cyberstalking versus off-line stalking in a forensic sample. Psychology, Crime & Law. (ahead-of-print), 10, 1–16.

    Google Scholar 

  • Centers for Disease Control and Prevention. (2019). Intimate Partner Violence. https://www.cdc.gov/violenceprevention/intimatepartnerviolence/

  • Chatterjee R. et al., “The Spyware Used in Intimate Partner Violence,” 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, 2018, pp. 441–458. https://doi.org/10.1109/SP.2018.00061

  • Chaudhuri, P., Chatterjee, A., & Verma, V. (2014). Guardians of the Internet. The Telegraph. http://www.telegraphindia.com/1141207/jsp/7days/story_2412.jsp.

  • Citron, D. K., Franks, M. A., & Criminalizing Revenge Porn. (2014). Wake forest law review, Vol. 49, 2014, p. 345+; U of Maryland Legal Studies Research Paper No. 2014–1. Available at SSRN: https://ssrn.com/abstract=2368946

  • Clevenger, S. L., Navarro, J. N., & Gilliam, M. (2018). Technology and the endless “cat and mouse” game: A review of the interpersonal cybervictimization literature. Sociology Compass . Online first. https://doi.org/10.1111/soc4.12639.

  • Congress. (2019). ENOUGH Act. https://www.congress.gov/bill/115th-congress/senate-bill/2162/text

  • Cyber Civil Rights Initiative. (2018). Revenge pornography. https://www.cybercivilrights.org/

  • DCMA Defender. (2018). http://dmcadefender.com

    Google Scholar 

  • DeKeseredy, W. S., & Schwartz, M. D. (2016). Thinking sociologically about image-based sexual abuse: The contribution of male peer support theory. Sexualization, Media, & Society, 2(4). doi:237462381668469.

    Google Scholar 

  • DeKeseredy, W. S., Hall-Sanchez, A., Nolan, J., & Schwartz, M. D. (2017). A cam- pus LGBTQ community’s sexual violence and stalking experiences: The contribution of pro-abuse peer support. Journal of Gender-Based Violence, 1, 169–185.

    Article  Google Scholar 

  • Dimond, J. P., Fiesler, C., & Bruckman, A. S. (2011). Domestic violence and information communication technologies. Interacting with Computers, 23(5), 413–421.

    Article  Google Scholar 

  • Dodge, R. C., Carver, C., & Ferguson, A. J. (2007). Phishing for user security awareness. Computers & Security, 26, 73–80.

    Article  Google Scholar 

  • Dreßing, H., Bailer, J., Anders, A., Wagner, H., & Gallas, C. (2014). Cyberstalking in a large sample of social network users: Prevalence, characteristics, and impact upon victims. Cyberpsychology, Behavior and Social Networking, 17(2), 61–67.

    Article  Google Scholar 

  • Eaton, A. A., Jacobs, H., & Ruvalcaba, Y. (2017). 2017 nationwide online study of nonconsensual porn victimization and perpetration: A summary report. Florida International University, Department of Psychology: Cyber Civil Rights Initiative, Inc.

    Google Scholar 

  • FBI. (2019). Cyberstalking stories. “Woman sentenced for stalking woman on social media.” https://www.fbi.gov/news/stories/woman-sentenced-for-cyberstalking

  • Finn, J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal Violence, 19(4), 468–483.

    Article  Google Scholar 

  • Fisher, B. S., Cullen, F. T., & Turner, M. G. (2002). Being pursued: Stalking victimization in a national study of college women. Criminology & Public Policy, 1, 257–308

    Google Scholar 

  • FlexiSpy. (2018). https://www.flexispy.com

  • Franks, M. A. (2016). ‘Revenge porn’ reform: A view from the front lines (October 17, 2016). Florida Law Review. University of Miami Legal Studies Research Paper no. 16–43. Available at SSRN: https://ssrn.com/abstract=2853789

  • Fraser, C., Olsen, E., Lee, K., Southworth, C., & Tucker, S. (2010). The new age of stalking: Technological implications for stalking. Juvenile and Family Court Journal, 61(4), 39–55.

    Article  Google Scholar 

  • Freed, D., Palmer, J., Minchala, D., Levy, K., Ristenpart, T., & Dell, N. (2017). Digital technologies and intimate partner violence: A qualitative analysis with multiple stakeholders. PACM: Human-Computer Interaction: Computer-Supported Cooperative Work and Social Computing (CSCW), 1(2). Article 46.

    Google Scholar 

  • Fremouw, W. J., Westrup, D., & Pennypacker, J. (1997). Stalking on campus: The prevalence and strategies for coping with stalking. Journal of Forensic Sciences, 42(4), 666–669.

    Article  Google Scholar 

  • Gámez-Guadix, M., Almendros, C., Borrajo, E., & Calvete, E. (2015). Prevalence and association of sexting and online sexual victimization among Spanish adults. Sexuality Research and Social Policy, 12(2), 145–154.

    Article  Google Scholar 

  • Goodson, P., McCormick, D., & Evans, A. (2001). Searching for sexually explicit materials on the Internet: an exploratory study of college students’ behavior and attitudes. Archives of Sexual Behavior, 30, 101–118.

    Google Scholar 

  • Gregorie, T. M. (2001). Cyberstalking: Dangers on the information superhighway. National Center for Victims of Crime.

    Google Scholar 

  • Hand, T., Chung, D., & Peters, M. (2009). The use of information and communication technologies to coerce and control in domestic violence and following separation. Sydney: Australian Domestic and Family Violence Clearinghouse, UNSW.

    Google Scholar 

  • Harrell, E., & Langton, L. (2013). Victims of identity theft, 2012 (NCJ 243779). Washington, DC: Bureau of Justice Statistics.

    Google Scholar 

  • Hauser, C. (2017). Dani Mathers, former playboy model, gets community service for snapchat of woman in gym. New York Times. https://www.nytimes.com/2017/05/25/us/dani-mathers-body-shaming.html?module=inline

  • Hauser, C. (2018). $6.4 million judgment in revenge porn case is among largest ever. New York Times. https://www.nytimes.com/2018/04/11/us/revenge-porn-california.html

  • Hinduja, S., & Patchin, J. (2011). Electronic dating violence: A brief guide for educators and parents. Cyberbullying Research Center. Retrieved March, 1, 2011.

    Google Scholar 

  • King-Ries, A. (2010). Teens, technology, and cyberstalking: The domestic violence wave of the future. Texas Journal of Women & Law, 20, 131–164.

    Google Scholar 

  • Kraft, E., & Wang, J. (2010). An exploratory study of the cyberbullying and cyberstalking experiences and factors related to victimization of students at a public liberal arts college. International Journal of Technologies, 1, 74–91. https://doi.org/10.4018/jte.2010100106

  • Lamphere, R. D., & Pikciunas, K. T. (2016). Sexting, sextortion, and other internet sexual offenses. In J. N. Navarro, S. Clevenger, & C. D. Marcum (Eds.), The intersection between intimate partner abuse, technology, and cybercrime: Examining the virtual enemy (pp. 141–165). Durham: Carolina University Press.

    Google Scholar 

  • Langton, L. (2011). Identity theft reported by households, 2005–2010 (NCJ 236245). Washington, DC: Bureau of Justice Statistics.

    Google Scholar 

  • Lee, R. K. (1998). Romantic and electronic stalking in a college context. William & Mary Journal of Women and the Law, 4(2), 373–409.

    Google Scholar 

  • Leisring, P. A., & Giumetti, G. W. (2014). Sticks and stones may break my bones, but abusive text messages can also hurt: Development and validation of the cyber psychological abuse (CPA) scale. Partner Abuse, 5, 323–341. https://doi.org/10.1891/1946-6560.5.3.323.

    Article  Google Scholar 

  • Levy, K. E. (2014). Intimate surveillance. Idaho Law Review, 51, 679–696.

    Google Scholar 

  • Matthews, T., O’Leary, K., Turner, A., Sleeper, M., Woelfer, J. P., Shelton, M., Manthorne, C., Churchill, E. F., & Consolvo, S. (2017). Stories from survivors: Privacy & security practices when coping with intimate partner abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 2189–2201).

    Google Scholar 

  • McAfee. (2013). Love, relationships, and technology survey. Retrieved from http://www.mcafee.com/us/about/news/2013/q1/20130204-01.aspx

  • McGlynn, C., & Rackley, E. (2016). Not “revenge porn,” but abuse: Let’s call it image-based sexual abuse. Inherently Human: Critical Perspectives on Law, Gender & Sexuality, 41. Retrieved from https://inherentlyhuman.wordpress.com/2016/02/15/not-revenge-porn-but-abuse-lets-call-it-image-based-sexual-abuse.

  • Melander, L. A. (2010). College students’ perceptions of intimate partner cyber harassment. Cyberpsychology, Behavior and Social Networking, 13(3), 263–268.

    Article  Google Scholar 

  • mSpy. (2018). https://www.mspy.com

  • Najdowski, C. J., & Hildebrand, M. M. (2014). The criminalization of “revenge porn”: How psychological research can guide policy. Monitor on Psychology, 45(1), 26.

    Google Scholar 

  • National Center for Victims of Crime. (2018). Stalking Resource Center. http://victimsofcrime.org/our-programs/stalking-resource-center

  • National Coalition Against Domestic Violence. (2019). http://www.ncadv.org/

  • Navarro, J. N. (2016). Cyberabuse and cyberstalking. In J. N. Navarro, S. Clevenger, & C. D. Marcum (Eds.), The intersection between intimate partner abuse, technology, and cybercrime (pp. 125–139). Durham: Carolina Academic Press.

    Google Scholar 

  • Navarro, J. N., Clevenger, S., & Marcum, C. D. (Eds.). (2016). The intersection between intimate partner abuse, technology, and cybercrime: Examining the virtual enemy. Durham: Carolina Academic Press.

    Google Scholar 

  • Palanisamy, B., Sensenig, S., Joshi, J., & Constantino, R. (2014). LEAF: A privacy-conscious social network-based intervention tool for IPV survivors. In Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014) Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference (pp. 138–146).

    Google Scholar 

  • Paraben. (2018). Paraben Recovery Sticks. https://www.paraben-sticks.com/index.html

  • Reyns, B. W., Henson, B., & Fisher, B. S. (2012). Stalking in the twilight zone: Extent of cyberstalking victimization and offending among college students. Deviant Behavior, 33(1), 1–25.

    Article  Google Scholar 

  • Rogers, L. E., Castleton, A., & Lloyd, S. A. (1996). Relational control and physical aggression in satisfying marital relationships. In D. D. Cahn & S. A. Lloyd (Eds.), Family violence from a communication perspective (pp. 218–239). Thousand Oaks: Sage.

    Chapter  Google Scholar 

  • Sheridan, L. P., & Grant, T. (2007). Is cyberstalking different? Psychology, Crime & Law, 13(6), 627–640.

    Article  Google Scholar 

  • Smith, S. G., Basile, K. C., Gilbert, L. K., Merrick, M. T., Patel, N.,Walling, M., & Jain, A. (2017). The national intimate partner and sexual violence survey (NISVS): 2010–2012 state report.

    Google Scholar 

  • Southworth, C., Dawson, S., Fraser, C., & Tucker, S. (2005). A high-tech twist on abuse: Technology, intimate partner stalking, and advocacy. St. Paul: Violence Against Women Online Resources.

    Google Scholar 

  • Southworth, C., Finn, J., Dawson, S., Fraser, C., & Tucker, S. (2007). Intimate partner violence, technology, and stalking. Violence Against Women, 13(8), 842–856.

    Article  Google Scholar 

  • Spence-Diehl, E. (2003). Stalking and technology: The double-edged sword. Journal of Technology in Human Services, 22(1), 5–18.

    Article  Google Scholar 

  • Spitzberg, B., & Cupach, W. (2001). Paradoxes of pursuit: Toward a relational model of stalking-related phenomena. In J. Davis (Ed.), Stalk- ing, stalkers and their victims: Prevention, intervention, and threat assessment (pp. 97–136). Boca Raton: CRC Press. https://doi.org/10.1201/9781420041743.ch6.

    Chapter  Google Scholar 

  • Spitzberg, B. H., & Hoobler, G. (2002). Cyberstalking and the technologies of interpersonal terrorism. New Media & Society, 4(1), 71–92. https://doi.org/10.1177/14614440222226271.

    Article  Google Scholar 

  • Stark, E. (2007). Interpersonal violence. Coercive control: How men entrap women in personal life. Oxford University Press.

    Google Scholar 

  • Temple, J. R., Choi, H. J., Brem, M., Wolford-Clevenger, C., Stuart, G. L., Peskin, M. F., & Elmquist, J. (2016). The temporal association between traditional and cyber dating abuse among adolescents. Journal of Youth and Adolescence, 45, 340–349. https://doi.org/10.1007/s10964-015-0380-3.

    Article  Google Scholar 

  • The National Network to End Domestic Violence. (2018). Project Safety Net. https://nnedv.org/content/safety-net/

  • Tor. (2018). https://www.torproject.org/

  • Walker, L. E. A. (1984). The battered woman syndrome. New York: Springer.

    Google Scholar 

  • Woodlock, D. (2016). The abuse of technology in domestic violence and stalking. Violence Against Women, 23(5), 584–602.

    Article  Google Scholar 

  • Working to Halt Abuse Online. (2018). https://www.haltabuse.org/

  • Working to Halt Online Abuse. (2013). Online harassment statistics. Retrieved October 18, 2018, from http://www.haltabuse.org/resources/stats/index.shtml

  • Zweig, J. M., Dank, M., Yahner, J., & Lachman, P. (2013). The rate of cyber dating abuse among teens and how it relates to other forms of teen dating violence. Journal of Youth and Adolescence, 42(7), 1063–1077.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shelly Clevenger .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s)

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Clevenger, S., Gilliam, M. (2020). Intimate Partner Violence and the Internet: Perspectives. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_58

Download citation

Publish with us

Policies and ethics