Skip to main content Accessibility help
×
Hostname: page-component-cd9895bd7-8ctnn Total loading time: 0 Render date: 2024-12-22T19:17:26.306Z Has data issue: false hasContentIssue false

7 - Cyber Partner Abuse

from Part I - Users in Cyber Behavior

Published online by Cambridge University Press:  06 December 2024

Zheng Yan
Affiliation:
University at Albany, State University of New York
Get access

Summary

1 Introduction

2 Defining Cyber Partner Abuse

 2.1 Behaviors

 2.2 Terminology Used in the Research

3 Initial Conceptualization of Cyber Partner Abuse Research

4 Cyber Partner Abuse Today

 4.1 Relationship Context of Perpetration

 4.2 Measurement

 4.3 Prevalence Rates

 4.4 Experiences by Age

 4.5 Gender Dynamics

 4.6 Sexual Orientation

 4.7 Quantitative and Qualitative Research

 4.8 Relationship between Cyber Partner Abuse and Offline IPV

 4.9 Links to Other Risk Behaviors

5 Future Directions

 5.1 Clearly Conceptualize Behaviors and Measurements

 5.2 Diversify Study Participants

 5.3 Diversify Data Collection and Analysis Methods

 5.4 Further Explore Relationship between Cyber Partner Abuse and Other Human Behaviors

 5.5 Develop and Evaluate Cyber Partner Abuse Prevention and Intervention

6 Conclusion

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2023

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Ard, K. L., & Makadon, H. J. (2011). Addressing intimate partner violence in lesbian, gay, bisexual, and transgender patientsJournal of General Internal Medicine26(8), 930933.CrossRefGoogle ScholarPubMed
Baker, C. K., & Carreño, P. K. (2016). Understanding the role of technology in adolescent dating and dating violence. Journal of Child and Family Studies, 25(1), 308320. http://dx.doi.org/10.1007/s10826-015-0196-5CrossRefGoogle Scholar
Bennett, D. C., Guran, E. L., Ramos, M. C., & Margolin, G. (2011). College students’ electronic victimization in friendships and dating relationships: Anticipated distress and associations with risky behaviors. Violence and Victims, 26(4), 410429. http://dx.doi.org/10.1891/0886-6708.26.4.410Google ScholarPubMed
Borrajo, E., Gámez-Guadix, M., Pereda, N., & Calvete, E. (2015a). The development and validation of the cyber dating abuse questionnaire among young couples. Computers in Human Behavior, 48, 358365. http://dx.doi.org/10.1016/j.chb.2015.01.063CrossRefGoogle Scholar
Borrajo, E., Gámez-Guadix, M., & Calvete, E. (2015b). Cyber dating abuse: Prevalence, context, and relationship with offline dating aggression. Psychological Reports, 116(2), 565585. http://dx.%20doi.org/10.2466/21.16.PR0.116k22w4CrossRefGoogle ScholarPubMed
Borrajo, E., Gámez-Guadix, M., & Calvete, E. (2015c). Justification beliefs of violence, myths about love and cyber dating abuse. Psicothema, 27(4), 327333. http://dx.doi.org/10.7334/psicothema2015.59CrossRefGoogle ScholarPubMed
Burke, S. C., Wallen, M., Vail-Smith, K., & Knox, D. (2011). Using technology to control intimate partners: An exploratory study of college undergraduates. Computers in Human Behavior, 27(3), 11621167. http://dx.doi.org/10.1016/j.chb.2010.12.010CrossRefGoogle Scholar
Caridade, S., Braga, T., & Borrajo, E. (2019). Cyber dating abuse (CDA): Evidence from a systematic reviewAggression and Violent Behavior48, 152168.CrossRefGoogle Scholar
Centers for Disease Control and Prevention (2019). Preventing intimate partner violence. Retrieved from www.cdc.gov/violenceprevention/intimatepartnerviolence/fastfact.htmlGoogle Scholar
Chatterjee, R., Doerfler, P., Orgad, H., Havron, S., Palmer, J., Freed, D., … & Ristenpart, T. (2018, May). The spyware used in intimate partner violence. In 2018 IEEE Symposium on Security and Privacy (SP) (pp. 441458). IEEE.CrossRefGoogle Scholar
Dainton, M., & Aylor, B. (2002). Patterns of communication channel use in the maintenance of long‐distance relationships. Communication Research Reports, 19(2), 118129. http://dx.doi.org/10.1080/08824090209384839CrossRefGoogle Scholar
Darvell, M. J., Walsh, S. P., & White, K. M. (2011). Facebook tells me so: Applying the theory of planned behavior to understand partner-monitoring behavior on Facebook. Cyberpsychology, Behavior, and Social Networking, 14(12), 717722. http://dx.doi.org/10.1089/cyber.2011.0035CrossRefGoogle ScholarPubMed
Dick, R. N., McCauley, H. L., Jones, K. A., Tancredi, D. J., Goldstein, S., Blackburn, S., … & Miller, E. (2014). Cyber dating abuse among teens using school-based health centers. Pediatrics, 134(6), e1560e1567. http://dx.doi.org/10.1542/peds.2014-0537CrossRefGoogle ScholarPubMed
Dimond, J. P., Fiesler, C., & Bruckman, A. S. (2011). Domestic violence and information communication technologies. Interacting with Computers, 23(5), 413421. http://dx.doi.org/10.1016/j.intcom.2011.04.006CrossRefGoogle Scholar
Draucker, C. B., & Martsolf, D. S. (2010). The role of electronic communication technology in adolescent dating violence. Journal of Child and Adolescent Psychiatric Nursing, 23(3), 133142. http://dx.doi.org/10.1111/j.1744-6171.2010.00235.xCrossRefGoogle ScholarPubMed
Finn, J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal Violence, 19(4), 468483. http://dx.doi.org/10.1177/0886260503262083CrossRefGoogle ScholarPubMed
Fox, J., Osborn, J. L., & Warber, K. M. (2014). Relational dialectics and social networking sites: The role of Facebook in romantic relationship escalation, maintenance, conflict, and dissolution. Computers in Human Behavior, 35, 527534. http://dx.doi.org/10.1016/j.chb.2014.02.031CrossRefGoogle Scholar
Jerin, R., & Dolinsky, B. (2001). You’ve got mail! You don’t want it: Cyber-victimization and on-line dating. Journal of Criminal Justice and Popular Culture, 9(1), 1521.Google Scholar
Jin, B., & Peña, J. F. (2010). Mobile communication in romantic relationships: Mobile phone use, relational uncertainty, love, commitment, and attachment styles. Communication Reports, 23(1), 3951. http://dx.doi.org/10.1080/08934211003598742CrossRefGoogle Scholar
Johnson, M. P. (2008). A typology of domestic violence: Intimate terrorism, violent resistance, and situational couple violence. Northeastern University Press.Google Scholar
Kellerman, I., Margolin, G., Borofsky, L. A., Baucom, B. R., & Iturralde, E. (2013). Electronic aggression among emerging adults: Motivations and contextual factors. Emerging Adulthood, 1(4), 293304.CrossRefGoogle ScholarPubMed
Korchmaros, J. D., Ybarra, M. L., Langhinrichsen-Rohling, J., Boyd, D., & Lenhart, A. (2013). Perpetration of teen dating violence in a networked society. Cyberpsychology, Behavior, and Social Networking, 16(8), 561567. http://dx.doi.org/10.1089/cyber.2012.0627CrossRefGoogle Scholar
Labaree, R. (2017). Organizing your social sciences research paper: Theoretical framework. USC Libraries, University of Southern California. Retrieved from http://libguides.usc.edu/contentGoogle Scholar
Lee, B. H., & O’Sullivan, L. F. (2014). The ex-factor: Characteristics of online and offline post-relationship contact and tracking among Canadian emerging adults. The Canadian Journal of Human Sexuality, 23(2), 96105. http://dx.doi.org/10.3138/cjhs.2415CrossRefGoogle Scholar
Lyndon, A., Bonds-Raacke, J., & Cratty, A. D. (2011). College students’ Facebook stalking of ex-partners. Cyberpsychology, Behavior, and Social Networking, 14(12), 711716. http://dx.doi.org/10.1089/cyber.2010.0588CrossRefGoogle ScholarPubMed
Melander, L. A. (2010). College students’ perceptions of intimate partner cyber harassment. Cyberpsychology, Behavior, and Social Networking, 13(3), 263268. http://dx.doi.org/10.1089/cyber.2009.0221CrossRefGoogle ScholarPubMed
Muise, A., Christofides, E., & Desmarais, S. (2009). More information than you ever wanted: Does Facebook bring out the green-eyed monster of jealousy? CyberPsychology & Behavior, 12(4), 441444. http://dx.doi.org/10.1089/cpb.2008.0263CrossRefGoogle ScholarPubMed
Peek-Asa, C., Wallis, A., Harland, K., Beyer, K., Dickey, P., & Saftlas, A. (2011). Rural disparity in IPV prevalence and access to resources. Journal of Women’s Health, 20(11), 17431749.CrossRefGoogle ScholarPubMed
Reed, L. A., Tolman, R. M., & Safyer, P. (2015). Too close for comfort: Attachment insecurity and electronic intrusion in college students’ dating relationships. Computers in Human Behavior, 50, 431438. http://dx.doi.org/10.1016/j.chb.2015.03.050CrossRefGoogle Scholar
Reed, L. A., Tolman, R. M., & Ward, L. M. (2016). Snooping and sexting: Digital media as a context for dating aggression and abuse among college students. Violence against Women, 22(13), 15561576. http://dx.doi.org/10.1177/1077801216630143CrossRefGoogle Scholar
Sargent, K. S., Krauss, A., Jouriles, E. N., & McDonald, R. (2016). Cyber victimization, psychological intimate partner violence, and problematic mental health outcomes among first-year college students. Cyberpsychology, Behavior, and Social Networking, 19(9), 545550. http://dx.doi.org/10.1089/cyber.2016.0115CrossRefGoogle ScholarPubMed
Schnurr, M. P., Mahatmya, D., & Basche, R. A. (2013). The role of dominance, cyber aggression perpetration, and gender on emerging adults’ perpetration of intimate partner violence. Psychology of Violence, 3(1), 7083. http://dx.doi.org/10.1037/a0030601Google Scholar
Sheridan, L., & Boon, J. (2002). Stalker typologies: Implications for law enforcement. In Boon, J. C. W. & Sheridan, L. (Eds.), Stalking and psychosexual obsession: Psychological perspectives for prevention, policing and treatment (pp. 6382). Wiley.CrossRefGoogle Scholar
Short, E., & McMurray, I. (2009). Mobile phone harassment: An exploration of students’ perceptions of intrusive texting behavior. Human Technology: An Interdisciplinary Journal on Humans in ICT Environments, 5(2), 163180. http://dx.doi.org/10.17011/ht/urn.200911234469CrossRefGoogle Scholar
Sneeringer, G. (2015). Contact that can kill: Orders of protection, caller ID spoofing and domestic violenceChi.-Kent L. Rev.90, 1157.Google Scholar
Spitzberg, B. H., & Hoobler, G. (2002). Cyberstalking and the technologies of interpersonal terrorism. New Media & Society, 4(1), 7192. http://dx.doi.org/10.1177/14614440222226271CrossRefGoogle Scholar
Taylor, S., & Xia, Y. (2018). Cyber partner abuse: A systematic reviewViolence and Victims33(6), 9831011.CrossRefGoogle ScholarPubMed
Tokunaga, R. S. (2011). Social networking site or social surveillance site? Understanding the use of interpersonal electronic surveillance in romantic relationships. Computers in Human Behavior, 27(2), 705713. http://dx.doi.org/10.1016/j.chb.2010.08.014CrossRefGoogle Scholar
Van Ouytsel, J., Ponnet, K., Walrave, M., & Temple, J. R. (2016). Adolescent cyber dating abuse victimization and its associations with substance use, and sexual behaviors. Public Health, 135, 147151. http://dx.doi.org/10.1016/j.puhe.2016.02.011CrossRefGoogle ScholarPubMed
Weathers, M. R., & Hopson, M. C. (2015). “I define what hurts me”: A co-cultural theoretical analysis of communication factors related to digital dating abuse. Howard Journal of Communications, 26(1), 95113. http://dx.doi.org/10.1080/10646175.2015.988475CrossRefGoogle Scholar
Zweig, J. M., Dank, M., Yahner, J., & Lachman, P. (2013). The rate of cyber dating abuse among teens and how it relates to other forms of teen dating violence. Journal of Youth and Adolescence, 42(7), 10631077. http://dx.doi.org/10.1007/s10964-013-9922-8CrossRefGoogle ScholarPubMed
Zweig, J. M., Lachman, P., Yahner, J., & Dank, M. (2014). Correlates of cyber dating abuse among teens. Journal of Youth and Adolescence, 43(8), 13061321. http://dx.doi.org/10.1007/s10964-013-0047-xCrossRefGoogle ScholarPubMed

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Cyber Partner Abuse
  • Edited by Zheng Yan, University at Albany, State University of New York
  • Book: The Cambridge Handbook of Cyber Behavior
  • Online publication: 06 December 2024
  • Chapter DOI: https://doi.org/10.1017/9781107165250.009
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Cyber Partner Abuse
  • Edited by Zheng Yan, University at Albany, State University of New York
  • Book: The Cambridge Handbook of Cyber Behavior
  • Online publication: 06 December 2024
  • Chapter DOI: https://doi.org/10.1017/9781107165250.009
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Cyber Partner Abuse
  • Edited by Zheng Yan, University at Albany, State University of New York
  • Book: The Cambridge Handbook of Cyber Behavior
  • Online publication: 06 December 2024
  • Chapter DOI: https://doi.org/10.1017/9781107165250.009
Available formats
×