Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Public Access

"So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums

Published: 05 January 2021 Publication History
  • Get Citation Alerts
  • Abstract

    A growing body of research suggests that intimate partner abusers use digital technologies to surveil their partners, including by installing spyware apps, compromising devices and online accounts, and employing social engineering tactics. However, to date, this form of privacy violation, called intimate partner surveillance (IPS), has primarily been studied from the perspective of victim-survivors. We present a qualitative study of how potential perpetrators of IPS harness the emotive power of sharing personal narratives to validate and legitimise their abusive behaviours. We analysed 556 stories of IPS posted on publicly accessible online forums dedicated to the discussion of sexual infidelity. We found that many users share narrative posts describing IPS as they boast about their actions, advise others on how to perform IPS without detection, and seek suggestions for next steps to take. We identify a set of common thematic story structures, justifications for abuse, and outcomes within the stories that provide a window into how these individuals believe their behaviour to be justified. Using these stories, we develop a four-stage framework that captures the change in a potential perpetrator's approach to IPS. We use our findings and framework to guide a discussion of efforts to combat abuse, including how we can identify crucial moments where interventions might be safely applied to prevent or deescalate IPS.

    References

    [1]
    H. Porter Abbott. 2008. The Cambridge Introduction to Narrative (2nd edition ed.). Cambridge University Press, Cambridge; New York.
    [2]
    John Louis Achterbosch and Celeste Michelle Condit. 1985. Homo Narrans Re-constructing Narrative Theory: A Functional Perspective Journal of Communication (pre-1986); Fall 1985; 35, 4; ABI/INFORM Global pg. 90. Journal of Communication (pre-1986); 35, 4 (1985), 90. https://olympictest.bc.edu/res/gsswresearch-home/funding/proposal-development/_jcr_content/content/download_44/file.res/Lucaites,%20?Reconstructing% 20Narrative%20Theory%20a%20Functional%20Perspective?.pdf
    [3]
    Alessandro Acquisti and Ralph Gross. 2006. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In International Workshop on Privacy Enhancing Technologies. Springer Berlin Heidelberg, Cambridge, UK, 36--58. https://doi.org/10.1007/11957454_3
    [4]
    Alexa. 2020. Alexa: Top 500 websites. https://www.alexa.com/topsites
    [5]
    Cassandra Alexopoulos, Elisabeth Timmermans, and Jenna McNallie. 2020. Swiping more, committing less: Unraveling the links among dating app use, dating app success, and intention to commit infidelity. Computers in Human Behavior 102 (Jan. 2020), 172--180. https://doi.org/10.1016/j.chb.2019.08.009
    [6]
    Mike Allen. 2017. Narrative Analysis. In The SAGE Encyclopedia of Communication Research Methods (2nd edition ed.), Mike Allen (Ed.). SAGE Publications, Inc, California. https://doi.org/10.4135/9781483381411.n368
    [7]
    Steven Arnocky, Shafik Sunderani, Wendy Gomes, and Tracy Vaillancourt. 2015. Anticipated partner infidelity and men?s intimate partner violence: The mediating role of anxiety. Evolutionary Behavioral Sciences 9, 3 (2015), 186--196. https://doi.org/10.1037/ebs0000021
    [8]
    Julia C. Babcock, Daniela M. Costa, Charles E. Green, and Christopher I. Eckhardt. 2004. What situations induce intimate partner violence? A reliability and validity study of the Proximal Antecedents to Violent Episodes (PAVE) scale. Journal of family psychology: JFP: journal of the Division of Family Psychology of the American Psychological Association (Division 43) 18, 3 (Sept. 2004), 433--442. https://doi.org/10.1037/0893--3200.18.3.433
    [9]
    Mieke Bal. 2009. Narratology: Introduction to the Theory of Narrative (3rd revised edition edition ed.). University of Toronto Press, Toronto.
    [10]
    Albert Bandura. 1978. Social Learning Theory of Aggression. Journal of Communication 28, 3 (1978), 12--29. https://doi.org/10.1111/j.1460--2466.1978.tb01621.x _eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1111/j.1460--2466.1978.tb01621.x.
    [11]
    Monica J. Barratt. 2011. Discussing illicit drugs in public internet forums: visibility, stigma, and pseudonymity. In Proceedings of the 5th International Conference on Communities and Technologies (C&T '11). Association for Computing Machinery, Brisbane, Australia, 159--168. https://doi.org/10.1145/2103354.2103376
    [12]
    Michael Barthel, Galen Stocking, Jess Holcomb, and Amy Mitchell. 2016. Reddit news users more likely to be male, young and digital in their news preferences. https://www.journalism.org/2016/02/25/reddit-news-users-more-likelyto- be-male-young-and-digital-in-their-news-preferences/ Library Catalog: www.journalism.org Section: Publications.
    [13]
    Rosanna Bellini, Jay Rainey, Andrew Garbett, and Pamela Briggs. 2019. Vocalising Violence: Using Violent Mens? Voices for Service Delivery and Feedback. In Proceedings of the 9th International Conference on Communities & Technologies - Transforming Communities (C&T '19). ACM, New York, NY, USA, 210--217. https://doi.org/10.1145/3328320.3328405 event-place: Vienna, Austria.
    [14]
    Amy Bruckman. 1996. Gender swapping on the Internet. In High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace (2nd edition ed.), Peter Ludlow (Ed.). A Bradford Book, Cambridge, Mass.
    [15]
    Tara Capel, Jennyfer Lawrence Taylor, and Dhaval Vyas. 2016. Using Self-reported Experiences to Explore the Issues of Women in Crisis Situations. In Proceedings of the 28th Australian Conference on Computer-Human Interaction (OzCHI'16). ACM, New York, NY, USA, 483--488. https://doi.org/10.1145/3010915.3010962
    [16]
    Stevie Chancellor, Andrea Hu, and Munmun De Choudhury. 2018. Norms Matter: Contrasting Social Support Around Behavior Change in Online Weight Loss Communities. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). Association for Computing Machinery, Montreal QC, Canada, 1--14. https://doi.org/10.1145/3173574.3174240
    [17]
    Eshwar Chandrasekharan, Umashanthi Pavalanathan, Anirudh Srinivasan, Adam Glynn, Jacob Eisenstein, and Eric Gilbert. 2017. You Can't Stay Here: The Efficacy of Reddit's 2015 Ban Examined Through Hate Speech. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (Dec. 2017), 31:1--31:22. https://doi.org/10.1145/3134666
    [18]
    Seymour Benjamin Chatman. 1980. Story and Discourse: Narrative Structure in Fiction and Film (new edition ed.). Cornell University Press, Cornell, New York. Google-Books-ID: ewrOp9uPjYUC.
    [19]
    Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, and Thomas Ristenpart. 2018. The Spyware Used in Intimate Partner Violence. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, San Francisco, CA, 441--458. https://doi.org/10.1109/ SP.2018.00061 ISSN: 2375--1207.
    [20]
    Chayn. 2020. Do It Yourself Online Safety Guide - you don't have to be offline to stay safe. https://chayn.co/safety/ Library Catalog: chayn.co.
    [21]
    Rachel Clarke. 2015. Artful Social Engagement: Long-term Interaction Design within an InternationalWomen's Community. Ph.D. Dissertation. Newcastle University.
    [22]
    Rachel Clarke, Peter Wright, and John McCarthy. 2012. Sharing Narrative and Experience: Digital Stories and Portraits at a Women's Centre. In CHI '12 Extended Abstracts on Human Factors in Computing Systems (CHI EA '12). ACM, New York, NY, USA, 1505--1510. https://doi.org/10.1145/2212776.2223663
    [23]
    Amy A. Conroy. 2014. Marital Infidelity and Intimate Partner Violence in Rural Malawi: A Dyadic Investigation. Archives of sexual behavior 43, 7 (Oct. 2014), 1303--1314. https://doi.org/10.1007/s10508-014-0306--2
    [24]
    Jaclyn D. Cravens, Kaitlin R. Leckie, and Jason B. Whiting. 2013. Facebook Infidelity: When Poking Becomes Problematic. Contemporary Family Therapy 35, 1 (March 2013), 74--90. https://doi.org/10.1007/s10591-012--9231--5
    [25]
    Jill P. Dimond, Michaelanne Dye, Daphne Larose, and Amy S. Bruckman. 2013. Hollaback!: The Role of Storytelling Online in a Social Movement Organization. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work (CSCW '13). ACM, New York, NY, USA, 477--490. https://doi.org/10.1145/2441776.2441831
    [26]
    Jill P. Dimond, Casey Fiesler, and Amy S. Bruckman. 2011. Domestic violence and information communication technologies. Interacting with Computers 23, 5 (Sept. 2011), 413--421. https://doi.org/10.1016/j.intcom.2011.04.006 Conference Name: Interacting with Computers.
    [27]
    Rebecca Emerson Dobash, Russell P. Dobash, Kate Cavanagh, and Ruth Lewis. 1999. Changing Violent Men. SAGE Publications, London, UK. Google-Books-ID: JTzEr2OXgFQC.
    [28]
    Julia Downes, Liz Kelly, and Nicole Westmarland. 2019. 'It's a work in progress': men's accounts of gender and change in their use of coercive control. Journal of Gender-Based Violence 3, 3 (Oct. 2019), 267--282(16). https://doi.org/10.1332/239868019X15627570242850
    [29]
    Claire Burke Draucker and Donna S. Martsolf. 2010. The Role of Electronic Communication Technology in Adolescent Dating Violence. Journal of Child and Adolescent Psychiatric Nursing 23, 3 (2010), 133--142. https://doi.org/10.1111/j.1744--6171.2010.00235.x
    [30]
    Julia Ebner. 2020. Going Dark: The Secret Social Lives of Extremists. Bloomsbury Publishing, London.
    [31]
    Naomi Ellemers, Russell Spears, and Bertjan Doosje. 2002. Self and Social Identity. Annual Review of Psychology 53, 1 (2002), 161--186. https://doi.org/10.1146/annurev.psych.53.100901.135228
    [32]
    Thomas Erickson. 1995. Notes on design practice: stories and prototypes as catalysts for communication. In Scenariobased design: envisioning work and technology in system development. John Wiley & Sons, Inc., USA, 37--58.
    [33]
    Thomas Erickson. 1996. Design as storytelling. https://doi.org/10.1145/234813.234817
    [34]
    Syd Field. 2005. Screenplay: Foundations Of Screenwriting. Delta, New York, N.Y.
    [35]
    Cynthia Fraser, Erica Olsen, Kaofeng Lee, Cindy Southworth, and Sarah Tucker. 2010. The New Age of Stalking: Technological Implications for Stalking. Juvenile and Family Court Journal 61, 4 (2010), 39--55. https://doi.org/10.1111/j.1755--6988.2010.01051.x _eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1111/j.1755--6988.2010.01051.x.
    [36]
    Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, and Nicola Dell. 2019. "Is My Phone Hacked?" Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence. Proc. ACM Hum.-Comput. Interact. 3, CSCW (Nov. 2019), 202:1--202:24. https://doi.org/10.1145/3359304
    [37]
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2018. 'A Stalker's Paradise?: How Intimate Partner Abusers Exploit Technology. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, New York, NY, USA, 667:1--667:13. https://doi.org/10.1145/3173574.3174241
    [38]
    Claudia Garcia-Moreno. 2013. Global and regional estimates of violence against women: Prevalence and health effects of intimate partner violence and non-partner sexual violence. Technical Report. World Health Organization, Department of Reproductive Health and Research. 51 pages. https://www.who.int/reproductivehealth/publications/violence/9789241564625/en/
    [39]
    Claudia Garcia-Moreno, Henrica AFM Jansen, Mary Ellsberg, Lori Heise, and Charlotte H Watts. 2006. Prevalence of intimate partner violence: findings from the WHO multi-country study on women?s health and domestic violence. The Lancet 368, 9543 (Oct. 2006), 1260--1269. https://doi.org/10.1016/S0140--6736(06)69523--8
    [40]
    Anna Gibson. 2019. Free Speech and Safe Spaces: How Moderation Policies Shape Online Discussion Spaces. Social Media + Society 5, 1 (Jan. 2019), 2056305119832588. https://doi.org/10.1177/2056305119832588 Publisher: SAGE Publications Ltd.
    [41]
    Diana Gil-González, Carmen Vives-Cases, María Teresa Ruiz, Mercedes Carrasco-Portiño, and Carlos Álvarez Dardet. 2008. Childhood experiences of violence in perpetrators as a risk factor of intimate partner violence: a systematic review. Journal of Public Health 30, 1 (March 2008), 14--22. https://doi.org/10.1093/ /fdm071 Publisher: Oxford Academic.
    [42]
    Barney Glaser and Anselm Strauss. 1999. The Discovery of Grounded Theory: Strategies for Qualitative Research. Routledge, New Brunswick.
    [43]
    Barney G. Glaser. 1965. The Constant Comparative Method of Qualitative Analysis. Social Problems 12, 4 (1965), 436--445. https://doi.org/10.2307/798843
    [44]
    Barney G. Glaser. 1978. Theoretical Sensitivity: Advances in the Methodology of Grounded Theory (1st edition ed.). The Sociology Press, California, USA.
    [45]
    Greg Guest, Kathleen MacQueen, and Emily Namey. 2012. Applied Thematic Analysis. SAGE Publications, Inc., 2455 Teller Road, Thousand Oaks California 91320 United States. https://doi.org/10.4135/9781483384436
    [46]
    J. Halverson, S. Corman, and H. L. Goodall. 2011. Master Narratives of Islamist Extremism. Palgrave Macmillan US, New York, N.Y. https://doi.org/10.1007/978-0--230--11723--5
    [47]
    Alina Hang, Emanuel von Zezschwitz, Alexander De Luca, and Heinrich Hussmann. 2012. Too much information! user attitudes towards smartphone sharing. In Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making Sense Through Design (NordiCHI '12). Association for Computing Machinery, Copenhagen, Denmark, 284--287. https://doi.org/10.1145/2399016.2399061
    [48]
    Bridget A. Harris and Delanie Woodlock. 2019. Digital Coercive Control: Insights From Two Landmark Domestic Violence Studies. The British Journal of Criminology 59, 3 (April 2019), 530--550. https://doi.org/10.1093/bjc/azy052 Publisher: Oxford Academic.
    [49]
    Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2019. Clinical Computer Security for Victims of Intimate Partner Violence. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 105--122. https://www.usenix.org/conference/usenixsecurity19/presentation/havron
    [50]
    Jeff Hearn. 1998. The Violences of Men: How Men Talk About and How Agencies Respond to Men's Violence to Women (1st edition ed.). SAGE, London, UK. Google-Books-ID: hjK8VLfOUPoC.
    [51]
    David Herman. 2004. Story Logic: Problems and Possibilities of Narrative. University of Nebraska Press, Lincoln, Neb.
    [52]
    Karri A. Holley and Julia Colyar. 2009. Rethinking Texts: Narrative and the Construction of Qualitative Research. Educational Researcher 9 (Dec. 2009), 0--244. https://doi.org/10.3102/0013189X09351979 Publisher: SAGE PublicationsSage CA: Los Angeles, CA.
    [53]
    Andrea Hu, Stevie Chancellor, and Munmun De Choudhury. 2019. Characterizing Homelessness Discourse on Social Media. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems (CHI EA '19). Association for Computing Machinery, Glasgow, Scotland Uk, 1--6. https://doi.org/10.1145/3290607.3313057
    [54]
    Scott Allen Johnson. 2006. Physical Abusers and Sexual Offenders: Forensic and Clinical Strategies. CRC Press. Google- Books-ID: mmHLBQAAQBAJ.
    [55]
    Farnaz Kaighobadi, Todd K. Shackelford, Danielle Popp, Ryan M. Moyer, Vincent M. Bates, and James R. Liddle. 2009. Perceived risk of female infidelity moderates the relationship between men's personality and partner-directed violence. Journal of Research in Personality 43, 6 (Dec. 2009), 1033--1039. https://doi.org/10.1016/j.jrp.2009.08.001
    [56]
    Liz Kelly. 2003. The Wrong Debate: Reflections on Why Force Is Not the Key Issue with Respect to Trafficking in Women for Sexual Exploitation. Feminist Review 1, 73 (2003), 139--144. https://www.jstor.org/stable/1396003 Publisher: Sage Publications, Ltd.
    [57]
    Joy Kim and Andres Monroy-Hernandez. 2016. Storia: Summarizing Social Media Content based on Narrative Theory using Crowdsourcing. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '16). Association for Computing Machinery, San Francisco, California, USA, 1018--1027. https://doi.org/10.1145/2818048.2820072
    [58]
    Arie W. Kruglanski, Michele J. Gelfand, Jocelyn J. Bélanger, Anna Sheveland, Malkanthi Hetiarachchi, and Rohan Gunaratna. 2014. The Psychology of Radicalization and Deradicalization: How Significance Quest Impacts Violent Extremism. Political Psychology 35 (2014), 69--93. https://www.jstor.org/stable/43783789 Publisher: [International Society of Political Psychology, Wiley].
    [59]
    William Labov. 1972. Sociolinguistic Patterns (1st edition ed.). University of Pennsylvania Press, Pennsylvania. https://books.google.co.uk/books/about/Sociolinguistic_Patterns.html?id=hD0PNMu8CfQC Google-Books-ID: hD0PNMu8CfQC.
    [60]
    Shalini Lal, Melinda Suto, and Michael Ungar. 2012. Examining the Potential of Combining the Methods of Grounded Theory and Narrative Inquiry: A Comparative Analysis. The Qualitative Report 17, 21 (May 2012), 1--22. https://nsuworks.nova.edu/tqr/vol17/iss21/1
    [61]
    Amy Lehrner and Nicole E. Allen. 2008. Social Change Movements and the Struggle Over Meaning-Making: A Case Study of Domestic Violence Narratives. American Journal of Community Psychology 42, 3 (Dec. 2008), 220--234. https://doi.org/10.1007/s10464-008--9199--3
    [62]
    Roxanne Leitão. 2019. Technology-Facilitated Intimate Partner Abuse: a qualitative analysis of data from online domestic abuse forums. Human--Computer Interaction 0, 0 (Dec. 2019), 1--40. https://doi.org/10.1080/07370024.2019.1685883
    [63]
    Eva Lungren. 1998. The hand that strikes and comforts: gender construction and the tension between body and symbol. In Rethinking Violence Against Women (r. emerson dobash & russell p. dobash ed.). Sage, London, 169--198. http://sk.sagepub.com/books/rethinking-violence-against-women/n7.xml
    [64]
    Jill C. Manning. 2006. The Impact of Internet Pornography on Marriage and the Family: A Review of the Research. Sexual Addiction & Compulsivity 13, 2--3 (Sept. 2006), 131--165. https://doi.org/10.1080/10720160600870711
    [65]
    Diogo Marques, Tiago Guerreiro, Luis Carriço, Ivan Beschastnikh, and Konstantin Beznosov. 2omputing Systems (CHI '19). ACM, New York, NY, USA, 589:1--589:13. https://doi.org/10.1145/3290605. 3300819 event-place: Glasgow, Scotland UK.
    [66]
    Tara Matthews, Kerwell Liao, Anna Turner, Marianne Berkovich, Robert Reeder, and Sunny Consolvo. 2016. "She'll just grab any device that's closer": A Study of Everyday Device & Account Sharing in Households. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). Association for Computing Machinery, San Jose, California, USA, 5921--5932. https://doi.org/10.1145/2858036.2858051
    [67]
    Tara Matthews, Kathleen O'Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, and Sunny Consolvo. 2017. Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner Abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, USA, 2189--2201. https://doi.org/10.1145/3025453.3025875
    [68]
    Lynn McAlpine. 2016. Why might you use narrative methodology? A story about narrative. Eesti Haridusteaduste Ajakiri. Estonian Journal of Education 4, 1 (April 2016), 32--57. https://doi.org/10.12697/eha.2016.4.1.02b Number: 1.
    [69]
    Jennifer McCleary-Sills, Sophie Namy, Joyce Nyoni, Datius Rweyemamu, Adrophina Salvatory, and Ester Steven. 2016. Stigma, shame and women's limited agency in help-seeking for intimate partner violence. Global Public Health 11, 1--2 (Feb. 2016), 224--235. https://doi.org/10.1080/17441692.2015.1047391 Publisher: Taylor & Francis _eprint: https://doi.org/10.1080/17441692.2015.1047391.
    [70]
    Lydia Michie, Madeline Balaam, John McCarthy, Timur Osadchiy, and Kellie Morrissey. 2018. From Her Story, to Our Story: Digital Storytelling as Public Engagement around Abortion Rights Advocacy in Ireland. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). Association for Computing Machinery, Montreal QC, Canada, 1--15. https://doi.org/10.1145/3173574.3173931
    [71]
    Julianna M. Nemeth, Amy E. Bonomi, Meghan A. Lee, and Jennifer M. Ludwin. 2012. Sexual Infidelity as Trigger for Intimate Partner Violence. Journal ofWomen's Health 21, 9 (June 2012), 942--949. https://doi.org/10.1089/jwh.2011.3328
    [72]
    Simon Parkin, Trupti Patel, Isabel Lopez-Neira, and Leonie Tanczer. 2019. Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse. In Proceedings of the New Security Paradigms Workshop (NSPW '19). Association for Computing Machinery, San Carlos, Costa Rica, 1--15. https://doi.org/10.1145/3368860.3368861
    [73]
    Jessica Pater and Elizabeth Mynatt. 2017. Defining Digital Self-Harm. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). Association for Computing Machinery, Portland, Oregon, USA, 1501--1513. https://doi.org/10.1145/2998181.2998224
    [74]
    Ellen Pence and Michael Paymar. 1993. Education Groups for Men Who Batter: The Duluth Model. Springer Publishing Company, New York, N.Y. Google-Books-ID: tJ189FTdO38C.
    [75]
    Louise F. Pendry and Jessica Salvatore. 2015. Individual and social benefits of online discussion forums. Computers in Human Behavior 50 (Sept. 2015), 211--220. https://doi.org/10.1016/j.chb.2015.03.067
    [76]
    Olivia Petter. 2017. These are the hidden signs your partner is cheating. http://www.independent.co.uk/lifestyle/ love-sex/cheating-signs-partner-boyfriend-girlfriend-relationship-infidelity-a8072006.html Library Catalog: www.independent.co.uk Section: Love & Sex.
    [77]
    Stephen A. Rains, Emily B. Peterson, and Kevin B.Wright. 2015. Communicating Social Support in Computer-mediated Contexts: A Meta-analytic Review of Content Analyses Examining Support Messages Shared Online among Individuals Coping with Illness. Communication Monographs 82, 4 (Oct. 2015), 403--430. https://doi.org/10.1080/03637751.2015.1019530
    [78]
    Harry T. Reis and Charles M. Judd (Eds.). 2000. Handbook of Research Methods in Social and Personality Psychology (1 edition ed.). Cambridge University Press, Cambridge.
    [79]
    Catherine Kohler Riessman. 1993. Narrative Analysis. SAGE, London, UK. Google-Books-ID: 9ffAwoYi7E0C.
    [80]
    Catherine Kohler Riessman. 2007. Narrative Methods for the Human Sciences (first edition ed.). SAGE Publications, Inc, LA.
    [81]
    David S. Riggs, Marie B. Caulfield, and Amy E. Street. 2000. Risk for domestic violence: Factors associated with perpetration and victimization. Journal of Clinical Psychology 56, 10 (2000), 1289--1316. https://doi.org/10.1002/ 1097--4679(200010)56:101289::AID-JCLP43.0.CO;2-Z _eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1002/1097--4679%28200010%2956%3A10%3C1289%3A%3AAID-JCLP4%3E3.0.CO%3B2-Z.
    [82]
    Alan Rosenbaum and Tracii S. Kunkel. 2009. Group interventions for intimate partner violence. In Psychological and physical aggression in couples: Causes and interventions. American Psychological Association, Washington, DC, US, 191--210. https://doi.org/10.1037/11880-009
    [83]
    Sanjeev P. Sahni and Swarnim Swasti. 2018. Myths Associated with Internet Infidelity: Is It a Real Problem? In Internet Infidelity: An Interdisciplinary Insight in a Global Context, Sanjeev P. Sahni and Garima Jain (Eds.). Springer, Singapore, 175--184. https://doi.org/10.1007/978--981--10--5412--9_11
    [84]
    Barbara Herrnstein Smith. 1980. Narrative Versions, Narrative Theories. Critical Inquiry 7, 1 (1980), 213--236. www.jstor.org/stable/1343185
    [85]
    Andrew Stickley, Olga Kislitsyna, Irina Timofeeva, and Denny Vågerö. 2008. Attitudes Toward Intimate Partner Violence Against Women in Moscow, Russia. Journal of Family Violence 23, 6 (Aug. 2008), 447--456. https://doi.org/10.1007/s10896-008--9170-y
    [86]
    Lisa Sugiura, Rosemary Wiles, and Catherine Pope. 2017. Ethical challenges in online research: Public/private perceptions. Research Ethics 13, 3--4 (July 2017), 184--199. https://doi.org/10.1177/1747016116650720 Publisher: SAGE Publications Ltd.
    [87]
    Jessica Taylor. 2020. Why Women Are Blamed For Everything: Exploring the Victim Blaming of Women Subjected to Violence and Trauma. Lulu.com, S.l.
    [88]
    Jenna Torluemke and Christine Kim. 2020. Nearly Half of Americans Admit to 'Stalking' an Ex or Current Partner Online. https://investor.nortonlifelock.com/About/Investors/press-releases/press-release-details/2020/Nearly-Half-of-Americans-Admit-to-Stalking-an-Ex-or-Current-Partner-Online/default.aspx Library Catalog: investor.nortonlifelock.com.
    [89]
    Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2020. The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 1893--1909.
    [90]
    Maike Vollstedt and Sebastian Rezat. 2019. An Introduction to Grounded Theory with a Special Focus on Axial Coding and the Coding Paradigm. In Compendium for Early Career Researchers in Mathematics Education, Gabriele Kaiser and Norma Presmeg (Eds.). Springer International Publishing, Cham, 81--100. https://doi.org/10.1007/978--3-030--15636--7_4
    [91]
    Lenore E. Walker. 1980. The Battered Woman (reprint edition ed.). HarperPerennial, New York u.a.
    [92]
    Nicole Westmarland and Hannah Bows. 2018. Researching Gender, Violence and Abuse: Theory, Methods, Action (1 edition ed.). Routledge, Abingdon, Oxon; New York, NY.
    [93]
    Monica Therese Whitty. 2003. Pushing the Wrong Buttons: Men's and Women's Attitudes toward Online and Offline Infidelity. CyberPsychology & Behavior 6, 6 (Dec. 2003), 569--579. https://doi.org/10.1089/109493103322725342
    [94]
    Holly Skodol Wilson and Sally A. Hutchinson. 1991. Triangulation of Qualitative Methods: Heideggerian Hermeneutics and Grounded Theory. Qualitative Health Research 1, 2 (May 1991), 263--276. https://doi.org/10.1177/104973239100100206
    [95]
    Delanie Woodlock. 2017. The Abuse of Technology in Domestic Violence and Stalking. Violence Against Women 23, 5 (April 2017), 584--602. https://doi.org/10.1177/1077801216646277
    [96]
    Delanie Woodlock, Mandy McKenzie, Deborah Western, and Bridget Harris. 2019. Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control. Australian Social Work 0, 0 (July 2019), 1--13. https://doi.org/10.1080/0312407X.2019.1607510
    [97]
    Kevin B. Wright and Stephen A. Rains. 2013. Weak-Tie Support Network Preference, Health-Related Stigma, and Health Outcomes in Computer-Mediated Support Groups. Journal of Applied Communication Research 41, 3 (Aug. 2013), 309--324. https://doi.org/10.1080/00909882.2013.792435

    Cited By

    View all
    • (2024)Abusive Partner Perspectives on Technology Abuse: Implications for Community-based Violence PreventionProceedings of the ACM on Human-Computer Interaction10.1145/36372928:CSCW1(1-25)Online publication date: 26-Apr-2024
    • (2024)Shortchanged: Uncovering and Analyzing Intimate Partner Financial Abuse in Consumer ComplaintsProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642033(1-20)Online publication date: 11-May-2024
    • (2023)The digital-safety risks of financial technologies for survivors of intimate partner violenceProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620243(87-104)Online publication date: 9-Aug-2023
    • Show More Cited By

    Index Terms

    1. "So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Proceedings of the ACM on Human-Computer Interaction
      Proceedings of the ACM on Human-Computer Interaction  Volume 4, Issue CSCW3
      CSCW
      December 2020
      1825 pages
      EISSN:2573-0142
      DOI:10.1145/3446568
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 05 January 2021
      Published in PACMHCI Volume 4, Issue CSCW3

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. intimate partner surveillance
      2. intimate partner violence
      3. online forums

      Qualifiers

      • Research-article

      Funding Sources

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)333
      • Downloads (Last 6 weeks)38
      Reflects downloads up to 09 Aug 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Abusive Partner Perspectives on Technology Abuse: Implications for Community-based Violence PreventionProceedings of the ACM on Human-Computer Interaction10.1145/36372928:CSCW1(1-25)Online publication date: 26-Apr-2024
      • (2024)Shortchanged: Uncovering and Analyzing Intimate Partner Financial Abuse in Consumer ComplaintsProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642033(1-20)Online publication date: 11-May-2024
      • (2023)The digital-safety risks of financial technologies for survivors of intimate partner violenceProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620243(87-104)Online publication date: 9-Aug-2023
      • (2023)Paying the Price: When Intimate Partners Use Technology for Financial HarmProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581101(1-17)Online publication date: 19-Apr-2023
      • (2023)"In Eighty Percent of the Cases, I Select the Password for Them": Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179410(570-587)Online publication date: May-2023
      • (2023)“It’s up to the Consumer to be Smart”: Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179344(2850-2866)Online publication date: May-2023
      • (2022)Libel Inc: An Analysis of the Libel Site Ecosystem2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW55150.2022.00019(01-10)Online publication date: Jun-2022
      • (2021)Troubling Care: Four Orientations for Wickedness in DesignProceedings of the 2021 ACM Designing Interactive Systems Conference10.1145/3461778.3462025(789-801)Online publication date: 28-Jun-2021

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Full Access

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media