Abstract
The technology-facilitated behaviors that are considered intimate partner cyberstalking (IPC) remain unclear due to inconsistencies in the literature, and there is a lack of research examining IPC severity. This study aimed to (1) understand young adults’ perceptions of IPC behaviors and severity, and (2) assess associations among IPC perceived severity, victimization frequency, depressive symptoms, and social isolation. Two phases were conducted. During Phase 1, 104 university students (ages 18–25) rated the inclusion and perceived severity of a list of potential IPC behaviors via an online survey. Qualitative responses supported their severity ratings. During Phase 2, 181 Amazon Mechanical Turk (MTurk) workers (ages 18–25) who were victims of IPC completed a second online survey. The perceived severity ratings from Phase 1 were used to operationalize the victims’ severity experienced in Phase 2. Most students in Phase 1 believed multiple technology-facilitated behaviors were IPC. The most severe behavior was monitoring a partner’s activities using a hidden camera. From students’ qualitative responses, seven themes emerged that described the mildest behaviors, which were considered harmless and consensual. Seven themes emerged for the most severe behaviors, which were considered harmful and not consensual. As students’ perceived severity of behaviors increased (Phase 1), reported victimization frequency among MTurk workers decreased (Phase 2). Phase 2 participants were more likely to experience depressive symptoms and greater social isolation when the perceived severity of IPC victimization increased. Findings provide insight into young adults’ perceptions of IPC behaviors and severity. Additional research about IPC severity is encouraged to develop effective prevention strategies.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
Introduction
Romantic partners often rely on technology to initiate and maintain their intimate relationship (Boyle & O’Sullivan, 2016; Papp et al., 2012; Pew Research Center, 2016), but using technology can open opportunities for intimate partner cyberstalking (IPC; Marcum et al., 2017; Smoker & March, 2017). Many young adults experience instability in romantic partnerships (Arnett, 2015) and engage in computer-mediated communication in their intimate relationships (Boyle & O’Sullivan, 2016), which could increase their risk for IPC. College-student studies have found estimates up to 36% for victimization and 67% for perpetration of various IPC behaviors (Lyndon et al., 2011; Shorey et al., 2015).
IPC is not well-understood. Definitions and measurement vary (Finn, 2004; Maple et al., 2012; Marcum et al., 2017; Reyns et al., 2012; Shorey et al., 2015; Smoker & March, 2017; United States Department of Justice, 2000), and the behaviors that are considered to be IPC are unclear because the technologies used to cyberstalk are debated (Bahm, 2003). IPC generally involves the use of the Internet and other information and communication technologies to repeatedly monitor, threaten, and/or harass a current, former, or potential romantic partner, causing them fear or concern for their safety (Bocij & McFarlane, 2002; Finn, 2004; Maple et al., 2012; Smoker & March, 2017; United States Department of Justice, 2000). Distress and alarm are also included as responses in some cyberstalking definitions (Maple et al., 2012; Worsley et al., 2017). Some college-student studies have only focused on Internet-based IPC behaviors (Acquadro Maran & Begotti, 2019; Marcum et al., 2017), and it is argued that stalking with technology beyond the Internet should not be termed “cyberstalking” (Bahm, 2003). According to Bahm (2003), the term “cyber” typically pertains to the Internet and may be expanded to include computer technology, but it does not encompass all forms of technology that may be used to stalk. Conversely, others have been more lenient with the term “cyber,” and when defining cyberstalking, they have considered a wide variety of electronics that are used to stalk, such as text messaging, cameras, and location devices (e.g., Shorey et al., 2015; Smoker & March, 2017). Studies among college students and social media users have included various technologies, such as phones, texting, and tracking applications, when assessing IPC behaviors (Shorey et al., 2015; Smoker & March, 2017), thus accepting a broader definition of IPC. Similarly in a small qualitative study, college students described multiple technologies, including the Internet and other electronics, that have been used to perpetrate psychological aggression and to harass a romantic partner (Melander, 2010). However, young adults’ understanding of the technology-facilitated behaviors involved in IPC remain unclear due to a lack of research investigating their perspectives of which behaviors should and should not be considered IPC.
Severity of Intimate Partner Cyberstalking
There is a lack of literature about IPC severity and its measurement. Among studies including community and college-based samples, severe forms of general cyberstalking and other unwanted pursuits have involved media platforms for verbal communication (e.g., video, phone; Barnes & Biros, 2007); monitoring and threatening acts using a cell phone, cameras, spyware, social media, email, and GPS (Dardis & Gidycz, 2017); and violation behaviors (e.g., done without consent; Cupach & Spitzberg, 2000). Severe pursuits and intrusions have occurred less frequently among college students than minor behaviors (Cupach & Spitzberg, 2000; Dardis & Gidycz, 2017), as they have been perceived as more threatening, violating, annoying, and upsetting (Cupach & Spitzberg, 2000). There is no consensus regarding the measurement of severity, but methods have included an assessment of the stalker’s actions and threats and an analysis of victim advocates’ case notes (Barnes & Biros, 2007); a factor analysis of pursuit behaviors that resulted in severe and minor factors (Dardis & Gidycz, 2017); the extent participants felt or would feel annoyed, upset, threatened, and their privacy violated by the behaviors (Cupach & Spitzberg, 2000); duration (Purcell et al., 2004); and experiencing multiple forms of stalking each at a high frequency (Mechanic et al., 2000). More research is necessary to clarify IPC severity and its measurement.
General Stalking Severity and Psychological and Social Health States
Given the dearth of literature about IPC severity, the associations between IPC severity and adverse health states are unclear. Among studies that combined both in-person and electronic stalking and included community-based samples of adults, victims of stalking for longer than two weeks have been more likely to relocate their residence, change their phone number, reduce social outings, and experience greater psychological morbidity compared to those who reported stalking for two weeks or less (Purcell et al., 2004). Battered women who were relentlessly stalked by an intimate partner have reported greater depression and post-traumatic stress compared to women who were infrequently stalked (Mechanic et al., 2000). Victims of severe IPC may experience similar adverse psychological and social health states.
The Present Study
It is important to understand young adults’ perceptions of and experiences with IPC to effectively address this problem among the population. We defined IPC as the use of the Internet and other information and communication technologies to repeatedly monitor, threaten, and/or harass a current or former romantic partner, causing them to feel afraid, threatened, harassed, and/or distressed (Bocij & McFarlane, 2002; Finn, 2004; Maple et al., 2012; Smoker & March, 2017; Worsley et al., 2017). We defined intimate partner according to the Centers for Disease Control and Prevention’s uniform definition:
An intimate partner is a person with whom one has a close personal relationship that may be characterized by the partners’ emotional connectedness, regular contact, ongoing physical contact and sexual behavior, identity as a couple, and familiarity and knowledge about each other’s lives. The relationship need not involve all of these dimensions. Intimate partner relationships include current or former: spouses (married spouses, common-law spouses, civil union spouses, domestic partners), boyfriends/girlfriends, dating partners, ongoing sexual partners. (Breiding et al., 2015, p. 11)
The study was conducted in two phases. In Phase 1, we examined young adults’ perceptions of which technology-facilitated behaviors they considered to be IPC and the severity of these behaviors. To our knowledge, there is no validated tool to assess IPC experiences in a hierarchy of increasing severity. Therefore, the severity perceptions from Phase 1 were used to operationalize severity experienced in the next phase. In Phase 2, we investigated the association between perceived severity of behaviors and victimization frequency among young adults. Also, we examined perceived severity of IPC victimization experienced and its association with depressive symptoms and social isolation. Associations between demographics and perceived severity of IPC experienced were explored. We hypothesized:
H1
As the perceived severity of IPC behaviors increases, the frequency of victimization decreases.
H2
When the perceived severity of IPC victimization experienced increases, young adults are more likely to report depressive symptoms and greater social isolation.
Methods
Sampling and Recruitment
Phase 1 included a convenience sample of 104 undergraduate and graduate students at a mid-Atlantic university. Eligible participants were ages 18–25, currently and/or previously had an intimate partner (examples that were provided to participants include spouses, boyfriends/girlfriends, dating partners, and ongoing sexual partners), and were proficient in English. We recruited participants through classroom visits to four public health courses and a recruitment email. Because fewer students ages 23–25 volunteered to participate when using this strategy, we sent a recruitment email to the public health graduate student listserv to increase recruitment of these ages.
Phase 2 included a convenience sample of 181 Amazon Mechanical Turk (MTurk) workers (Amazon Mechanical Turk, 2018). MTurk is a useful and reliable tool for data collection (Buhrmester et al., 2011; Goodman et al., 2013; Mason & Suri, 2012). Previous researchers have found similar results and psychometrics between MTurk and college-student samples in areas such as health literacy, decision-making, and personality (Buhrmester et al., 2011; Goodman et al., 2013; Nguyen et al., 2016; Paolacci et al., 2010). Eligible participants in this study were ages 18–25, located in the United States, currently and/or previously had an intimate partner, had high-quality performance statistics on MTurk (i.e., requestors approved ≥ 98% of their tasks; they completed and were approved for ≥ 500 tasks; Nguyen et al., 2016), and were victims of IPC. These victims were a subset of individuals who responded to a larger, broader survey (N = 469) that was advertised as a study examining the use of computer-based technology among intimate partners and associated health states. Therefore, they were deemed eligible for this study based on their responses to cyberstalking victimization questions that were included in the broader survey (see Methods for the cyberstalking victimization measure). Information about the study and the survey link were posted on the MTurk website. Interested participants were asked to take the survey alone in a quiet, private area. To ensure the quality of our MTurk data, we checked the dataset for suspicious and discordant responses, and none were found.
Compared to the Phase 1 sample, more participants in Phase 2 were ages 23–25, male, employed (p < 0.025 after Bonferroni adjustment), Non-Hispanic White, not attending school, earning $20,000 or more, and married (p < 0.017 after Bonferroni adjustment; see Table 1 in Results for sample characteristics).
Procedure
Phase 1 participants completed a 25-min survey online and received a $10 electronic gift card for Target. Phase 2 participants completed a 15-min survey online and were paid $3.50. After both surveys, we provided links to information about technology-facilitated stalking (National Network to End Domestic Violence, 2017; The National Center for Victims of Crime, 2011) and to resources that assist victims. These resources were offered by the university (Phase 1 only) and the National Center for Victims of Crime (The National Center for Victims of Crime, 2011). Participants provided informed consent online immediately before beginning both surveys. The university’s Institutional Review Board approved both phases.
Measures
Perceptions of IPC Behaviors
We asked Phase 1 participants, “Intimate partner cyberstalking involves the use of the Internet and other information and communication technologies to repeatedly monitor, threaten, and/or harass a current, former, or potential romantic partner. Do you think any of the following behaviors are cyberstalking?” Twenty technology-facilitated behaviors were provided, including 18 items from the Controlling Partners Inventory (CPI, α = 0.90 among college students; content and face validity were established by field experts; Burke et al., 2011; α = 0.84 in Phase 1) and two items that we added to increase the scope of IPC behaviors measured (i.e., checking text message and Internet search histories). We depersonalized the items from the CPI (e.g., “Using a webcam to monitor a partner’s activities”). Items that addressed Facebook were generalized to any social networking site (see Table 2). Responses included 0 = “No” and 1 = “Yes.” The cyberstalking definition provided to participants did not include the victim’s reactions to the behaviors because we wanted to focus purely on the occurrence and minimize any bias from the participants’ emotions.
IPC Perceived Severity Weights
Using a Q-sort (Barbosa et al., 1998; Stephenson, 1935, 1953), Phase 1 participants categorized these same 20 behaviors into boxes according to their beliefs about the severity of the behaviors. Seven boxes were provided, ranging from “1-Most Mild” to “7-Most Severe.” Weights for each behavior were calculated by averaging the Q-sort scores. Participants also provided open-ended responses regarding why they sorted particular behaviors as “1-Most Mild” and “7-Most Severe.”
IPC Victimization
In Phase 2, the same 20 behaviors were utilized, but they were personalized and included the CPI-Partner subscale (α = 0.86 in Phase 2; e.g., “Partner used a webcam to monitor my activities;” Burke et al., 2011). Participants answered if they ever experienced the behaviors in their current or most recent (if single) intimate relationship. Seven options were provided, including the CPI’s original five categories from 0 = “Never” to 4 = “4 or more times” (shortened to “4 + times”). We added 5 = “I do not use this technology” and 6 = “My partner does not use this technology.” The “5 s” and “6 s” were recoded as “not applicable” (< 4% for all behaviors). Valid responses were 0–4.
Participants who answered at least “1 time” to any behavior were asked if the behavior made them feel afraid, threatened, harassed, and/or distressed. Five responses were provided, from 0 = “Not at all” to 4 = “Extremely.” The data were recoded as, 0 = “No” (“Not at all”) and 1 = “Yes” (“A little bit” to “Extremely”). Following studies that defined or measured cyberstalking as more than one incident (Acquadro Maran & Begotti, 2019; Maple et al., 2012; Reyns et al., 2012) that threatened and/or harassed victims and evoked fear and/or distress (Bocij & McFarlane, 2002; Finn, 2004; Maple et al., 2012; Worsley et al., 2017), participants were categorized as victims if they experienced any of the 20 behaviors repeatedly (i.e., one behavior at least twice or multiple behaviors at least one time each), which made them feel afraid, threatened, harassed, and/or distressed.
IPC Perceived Severity Experienced
The perceived severity weights from Phase 1 were applied to the IPC victimization data collected in Phase 2. A severity score was calculated by averaging the weighted items that each participant experienced. The score ranged from 1 to 7, with higher scores indicating greater perceived severity experienced.
Depressive Symptoms
We used a short form of the Center for Epidemiologic Studies Depression Scale (CESD-10; Andresen et al., 1994) to measure depressive symptoms, which included 10 items with established convergent validity among older adults (Andresen et al., 1994) and α = 0.72 among college students (Oppong Asante & Andoh-Arthur, 2015; α = 0.89 in Phase 2; e.g., “During the past week…I felt depressed.”). The four response options ranged from 0 = “Rarely or none of the time (less than 1 day)” to 3 = “Most or all of the time (5–7 days).” Positively worded items were reverse coded so that higher scores for all items represented greater depressive symptoms. A total scale score was calculated by adding the items (range 0–30). Using the recommended reliable and validated cut-off score for depressive symptoms (Andresen et al., 1994), the variable was coded as 0 = “No depressive symptoms” (score of 0–9) and 1 = “Depressive symptoms” (score ≥ 10). We used a binary variable because we wanted to distinguish between the presence of depressive symptoms and normal “downs” that may not be indicative of depressive symptoms.
Social Isolation
We used the Friendship Scale (Hawthorne, 2006) to measure social isolation, which included six items with established concurrent validity and α = 0.83 among older adults (Hawthorne, 2006; α = 0.90 in Phase 2; e.g., “During the past four weeks…I felt isolated from other people.”). The five response options ranged from 0 = “Not at all” to 4 = “Almost always.” Positively worded items were reverse coded so that higher scores for all items signified greater social isolation. A total scale score was calculated by adding the items (range 0–24). To our knowledge, there is no validated cut-off score for social isolation, so it was used as a continuous variable.
Demographics
The demographic variables are summarized in Table 1. Originally, gender included a “transgender” response and sexual orientation included an “unsure” response. These responses were recoded as missing and not included in the analyses because the frequencies were small (transgender, n = 2, 1.9% for Phase 1 and n = 1, 0.6% for Phase 2; unsure, n = 4, 3.8% for Phase 1 and n = 0, 0.0% for Phase 2).
Statistical Analyses
All quantitative analyses were conducted with SPSS v25. Descriptive statistics were calculated for all variables. A z-test with Bonferroni adjustment was used to explore differences in demographic proportions between our two samples. Independent t-tests and ANOVA with Bonferroni post-hoc tests were used to explore bivariate associations between demographics (categorical independent variables, IV) and IPC perceived severity experienced (continuous dependent variable, DV). The association between IPC perceived severity weights (continuous IV) and IPC victimization frequency (continuous DV) was assessed with Pearson correlation and linear regression. Cases consisted of the IPC behaviors, and victimization frequency included the number of participants who experienced the behaviors at least twice. Because heteroskedasticity was present, a heteroskedasticity-consistent standard error estimator was applied to the regression (Hayes & Cai, 2007). The association between IPC perceived severity experienced (continuous IV) and depressive symptoms (binary DV) was examined with point-biserial correlation and logistic regression that controlled for age, gender, highest level of education, income, sexual orientation, relationship status, and hours/day in the virtual presence of others (i.e., in a social setting via technology, such as a cell phone call, video chat, or online messaging). The association between IPC perceived severity experienced (continuous IV) and social isolation (continuous DV) was assessed with Pearson correlation and linear regression with the same control variables. Significance for analyses with Bonferroni adjustment was p < 0.025 for two pairwise comparisons and p < 0.017 for three pairwise comparisons. Otherwise, significance was p < 0.05 and 95% confidence intervals for odds ratios not including one. Assumptions for analyses were satisfied except when noted.
Thematic analysis was conducted using NVivo 12 to identify themes from Phase 1 participants’ open-ended responses regarding why they rated IPC behaviors as the mildest or the most severe. Themes were determined for the mildest and most severe behaviors separately. We followed qualitative analytic steps provided by Braun and Clarke (Braun & Clarke, 2006). Driven by the data, codes were generated across all IPC behaviors and grouped into emergent themes. Themes were reviewed, refined, and defined. Two coders were used, and the inter-rater reliability was 92% agreement. Differences in coding were discussed until consensus was reached. Furthermore, we determined the percentage of participants that provided responses for each theme.
Missing Data
Nonresponse missing data in Phase 1 included age (3.8%), race/ethnicity (1.0%), annual income (1.9%), parental income (1.0%), and perceptions of IPC behaviors (1.0% for two behaviors). Nonresponse missing data in Phase 2 included race/ethnicity (2.2%), relationship length (0.6%), virtual presence (0.6%), depressive symptoms (3.3%), and social isolation (5.0%). Using chi-square tests, nonresponse missing data for social isolation and virtual presence were associated with gender and relationship status, respectively (p < 0.05). No other associations were found for unanswered missing data. Because missing data for some variables may be explained by observed data, as noted, we assumed missing at random and used multiple imputation to handle nonresponse missing data for Phase 2. Age, gender, race/ethnicity, highest level of education, income, sexual orientation, relationship status, relationship length, and virtual presence were used as predictors to impute social isolation, depressive symptoms, and demographic variables with missing data. Forty imputations were generated (Graham et al., 2007) and averaged to create the final imputed value. Data that were provided and recoded as missing or not applicable, as noted above (i.e., responses for transgender, unsure of sexual orientation, and not using the technology included in the IPC victimization items), were not imputed. Unanswered missing data for Phase 1 were not imputed because these data were only used for descriptive analyses.
Results
Descriptive Statistics and Demographic Differences with IPC Perceived Severity Experienced
Table 1 includes descriptive statistics for Phase 1 and Phase 2. Among Phase 2 participants, the mean scores for IPC perceived severity experienced and social isolation were 3.46 (SD = 0.61) and 9.90 (SD = 5.99), respectively. Over half of these MTurk workers indicated depressive symptoms (n = 106, 58.6%). Male MTurk workers experienced greater perceived severity of IPC victimization compared to females (p < 0.05, Cohen’s d = 0.33; see Table 1). However, Levene’s test for equality of variances was significant (p < 0.05), so these results were based on equal variances not assumed. No other demographics were significantly associated with IPC perceived severity experienced.
Perceived Severity Weights, Perceptions of IPC Behaviors, and Prevalence of Victimization
Monitoring a partner with a hidden camera received the most severe weight in Phase 1 and was the least common behavior experienced at least twice in Phase 2 (see Table 2). The majority of Phase 1 participants thought each technology-facilitated behavior was cyberstalking (see Table 2).
Themes Describing the Mildest and Most Severe Behaviors
In general, the majority of themes that emerged for the mildest and most severe behaviors related to the dynamics of the romantic relationship, the harm done to the victim, and perceived social norms among young adults. We identified seven themes from Phase 1 participants’ qualitative responses that described the mildest behaviors (see Table 3). Students believed that checking behaviors, monitoring location, and excessive/threatening communication were the mildest forms of cyberstalking because (1) they were considered harmless but unhealthy (i.e., they do not directly hurt the partner but may be inappropriate behavior in the relationship); (2) they may be justified by positive intentions (e.g., young adults may check on their partner to ensure they are safe or they may excessively call them because they are more attentive); (3) respondents indicated a distinction between public and private information (e.g., a partner may choose to make certain information public on social media or partners may share a computer); (4) these behaviors were considered common/normal among young adults in untrusting (i.e., does not trust partner to be faithful) and serious/committed relationships and in this social media era; (5) partners may consent to these behaviors; (6) excessive and threatening texts/calls/emails can be ignored or blocked on phones and computers; and (7) the actions were not considered serious to those who have perpetrated the behaviors.
We identified seven themes from Phase 1 participants’ qualitative responses that described the most severe behaviors (see Table 4). Students considered checking, location monitoring, surveillance, threatening, and inappropriate behaviors as the most severe forms of cyberstalking because (1) they invade the partner’s privacy; (2) they can impact the partner’s physical, mental, social, academic, and economic health; (3) they are conducted to intentionally harm the partner; (4) partners may not consent to these behaviors; (5) they involve illegal activity; (6) they may be a precursor to other forms of abuse, such as physical or sexual abuse; (7) and they may involve technology, particularly email, that is not commonly used among young adults other than for work or school. For both mild and severe behaviors, some participants commented that the victim’s perceptions of the behaviors are subjective.
Hypothesis 1
Supporting Hypothesis 1 (as the perceived severity of IPC behaviors increases, the frequency of victimization decreases), the perceived severity weights from Phase 1 were negatively correlated with victimization frequency in Phase 2 (r = − 0.72, p < 0.001). As the perceived severity weights increased by one unit, victimization frequency decreased by approximately 11 participants (p < 0.001; see Table 5).
Hypothesis 2
The results support Hypothesis 2 (when the perceived severity of IPC victimization experienced increases, young adults are more likely to report depressive symptoms and greater social isolation). The perceived severity of IPC victimization experienced among Phase 2 participants was positively correlated with depressive symptoms (rpb = 0.26, p < 0.001) and social isolation (r = 0.36, p < 0.001). After controlling for demographics (i.e., age, gender, highest level of education, income, sexual orientation, relationship status, and hours/day in the virtual presence of others), Phase 2 participants were more likely to indicate depressive symptoms and greater social isolation when the perceived severity of IPC victimization experienced increased by one unit (p < 0.001, see Tables 5 and 6).
Discussion
The young adults in this study thought IPC involved various technology-facilitated behaviors. Their perceptions support a broad definition of IPC and are consistent with studies that assessed IPC with technologies besides the Internet (Shorey et al., 2015; Smoker & March, 2017). These results suggest that IPC is perceived to be a complex issue that cannot be measured with one technology or behavior. Their perceptions may be influenced by advancements in technology, which enable individuals to quickly and easily monitor and harass their partners via multiple devices and applications (Melander, 2010). Young adults’ perceptions of IPC may continue to evolve as new technologies are developed.
Consistent with the cyberstalking literature (Barnes & Biros, 2007), threatening cell phone calls (i.e., verbal communication) received a slightly higher perceived severity weight than threatening texts and emails (i.e., text communication). Threatening behaviors and monitoring partners via cameras and spyware received the highest perceived severity weights, which were similar to severe cyber pursuit behaviors (Dardis & Gidycz, 2017). Additionally, our results support literature indicating that violation-related intrusion behaviors (e.g., done without consent) are the most severe (Cupach & Spitzberg, 2000). Based on the themes that were generated, behaviors are perceived to be more severe when the perpetrator’s intentions are harmful, the victim’s health is negatively impacted, and their privacy is violated. These results are consistent with literature assessing severity based on the extent participants felt or would feel annoyed, upset, threatened, and their privacy violated by the behaviors (Cupach & Spitzberg, 2000).
According to a previous study, female college students were more likely to be victims of technological dating abuse compared to males (Burke et al., 2011). However, when severity is taken into account, we found that males experienced greater perceived severity of IPC than females. Our results are consistent with another study examining severe cyber psychological abuse among college students in romantic relationships (Leisring & Giumetti, 2014). Given the limited literature investigating IPC severity, this gender-severity relationship deserves further exploration in order to clarify high-risk groups that need attention when developing and implementing IPC prevention strategies. Research that has consistently identified a particular gender or genders (e.g., female, male, transgender, non-binary, etc.) that has/have experienced greater IPC severity compared to other genders could provide insight into which gender groups require targeted prevention programs.
As hypothesized (H1), the perceived severity weights increased as victimization frequency decreased. Therefore, behaviors that were perceived to be more severe were less common. Similarly, severe in-person and cyber pursuits and intrusions among college students have occurred less frequently than minor behaviors (Cupach & Spitzberg, 2000; Dardis & Gidycz, 2017). According to the themes that emerged, mild behaviors may be more frequent because they can be justified by positive intentions and are considered harmless, consensual, and normal among partners. Severe behaviors may be less frequent because they are damaging, illegal, not consensual, and may include uncommonly used technology.
As hypothesized (H2), participants were more likely to experience depressive symptoms and greater social isolation when the perceived severity of IPC victimization increased. These results support findings from stalking studies (Mechanic et al., 2000; Purcell et al., 2004). Victims of greater severity may experience lower mood, increased helplessness, and less control over the situation, which could be associated with their depressive symptoms (Worsley et al., 2017). They may also be more likely to experience social isolation due to a lack of interest in socializing when feeling disheartened and anxious about the situation and distrusting others after the incident (Worsley et al., 2017). Additionally, they may curtail their use of social media and other technology (Worsley et al., 2017), or their partner may control their network of friends (Melander, 2010).
Strengths and Limitations
This study was the first, to our knowledge, to (1) have young adults identify IPC from a list of potential behaviors; (2) measure perceived IPC severity via a Q-sort; and (3) apply severity perceptions to understand the relationships between IPC severity experienced and health states. Also, we included a larger sample size than traditional Q-sorts (Brown, 1980; Dziopa & Ahern, 2011). However, the study utilized two different samples, which were demographically disparate. Both phases were cross-sectional, and the results can only suggest associations, not causality. The questions assessing depressive symptoms and social isolation were not asked as direct outcomes of IPC, so it is uncertain whether they resulted from IPC. Furthermore, it is unclear if the victims experienced in-person stalking or other forms of intimate partner abuse in addition to IPC. Although a next step for our analysis could be to explore social isolation as a mediator in the pathway between IPC perceived severity experienced and depressive symptoms or to investigate depressive symptoms as a mediator in the pathway between IPC perceived severity experienced and social isolation, the overlapping timeframes of the depressive symptoms and social isolation measures, their bidirectional relationship (Cacioppo & Hawkley, 2009; Elmer & Stadtfeld, 2020), and a lack of theoretically-sound instrumental variables limited the opportunity to appropriately explore these mediation relationships. Because data were self-reported, there may be social desirability bias present. The resulting odds ratio from the logistic regression analysis with depressive symptoms had a rather large confidence interval, indicating increased uncertainty of this estimate. A larger sample may be needed. The low sample sizes for some demographic groups limited the power to detect significant differences when exploring associations between these demographic variables and IPC perceived severity experienced, further supporting the need for a larger sample. Both phases included convenience samples and cannot be generalized to all young adults ages 18–25 who have ever had an intimate partner. Because students in Phase 1 were recruited from public health classes, they may be more health-conscious than other young adults. Additionally, the MTurk workers in Phase 2 may be more susceptible to IPC because they work virtually and may be more tech-savvy.
Implications and Future Direction
The results from this study enhance our understanding of young adults’ perceptions of IPC behaviors and the severity of these behaviors. We captured their thoughts about severity quantitatively and qualitatively, which enabled us to contextualize IPC perceived severity. Future research should utilize mixed-method approaches to further explain the dynamics surrounding IPC risk and prevention. Based on young adults’ perceptions of IPC behaviors, future research should include a variety of technology-facilitated behaviors in their measurement of IPC and utilize a standardized definition of IPC that incorporates multiple technologies. Furthermore, their perceptions of severity inform potential methods for assessing severity in future studies. Young adults’ thoughts about IPC behaviors and severity can inform prevention strategies to address IPC among this population.
The results from this study increase our knowledge of psychological and social health states associated with IPC perceived severity. Future research should continue to investigate the epidemiology surrounding IPC severity, such as further exploration of prevalence estimates, risk factors, and high-risk groups. Additionally, more research is necessary to comprehend mediators and moderators in the relationships between IPC severity and adverse health states. Once we gain a better understanding of the epidemiology of severity and associated mechanisms, the results can be used to develop effective policies and programs to prevent IPC among young adults.
References
Acquadro Maran, D., & Begotti, T. (2019). Prevalence of cyberstalking and previous offline victimization in a sample of Italian university students. Social Sciences, 8, 1–10. https://doi.org/10.3390/socsci8010030
Amazon Mechanical Turk. (2018). FAQs. https://www.mturk.com/worker/help.
Andresen, E. M., Malmgren, J. A., Carter, W. B., & Patrick, D. L. (1994). Screening for depression in well older adults: Evaluation of a short form of the CES-D. American Journal of Preventive Medicine, 10(2), 77–84. https://doi.org/10.1016/S0749-3797(18)30622-6
Arnett, J. J. (2015). A longer road to adulthood. In J. J. Arnett (Ed.), Emerging adulthood: The winding road from the late teens through the twenties (2nd ed., pp. 1–29). Oxford University Press.
Bahm, T. (2003). Eliminating “cyber-confusion". The Source, 3(2). https://victimsofcrime.org/docs/src/eliminating-cyber-confusion.pdf?sfvrsn=2.
Barbosa, J. C., Willoughby, P., Rosenberg, C. A., & Mrtek, R. G. (1998). Statistical methodology: VII. Q-methodology, a structural analytic approach to medical subjectivity. Academic Emergency Medicine, 5(10), 1032–1040. https://doi.org/10.1111/j.1553-2712.1998.tb02786.x
Barnes, S., & Biros, D. (2007). An exploratory analysis of computer mediated communications on cyberstalking severity. Journal of Digital Forensics Security and Law, 2(3), 7–27. https://doi.org/10.15394/jdfsl.2007.1025
Bocij, P., & McFarlane, L. (2002). Online harassment: Towards a definition of cyberstalking. Prison Service Journal, 139, 31–38.
Boyle, A. M., & O’Sullivan, L. F. (2016). Staying connected: Computer-mediated and face-to-face communication in college students’ dating relationships. Cyberpsychology, Behavior, and Social Networking, 19(5), 299–307. https://doi.org/10.1089/cyber.2015.0293
Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3, 77–101. https://doi.org/10.1191/1478088706qp063oa
Breiding, M. J., Basile, K. C., Smith, S. G., Black, M. C., & Mahendra, R. (2015). Intimate partner violence surveillance: Uniform definitions and recommended data elements, Version 2.0. Centers for Disease Control and Prevention, National Center for Injury Prevention and Control, Division of Violence Prevention. https://www.cdc.gov/violenceprevention/pdf/intimatepartnerviolence.pdf.
Brown, S. R. (1980). Political subjectivity: Applications of Q methodology in political science. Yale University Press.
Buhrmester, M., Kwang, T., & Gosling, S. D. (2011). Amazon’s mechanical turk: A new source of inexpensive, yet high-quality, data? Perspectives on Psychological Science, 6(1), 3–5. https://doi.org/10.1177/1745691610393980
Burke, S. C., Wallen, M., Vail-Smith, K., & Knox, D. (2011). Using technology to control intimate partners: An exploratory study of college undergraduates. Computers in Human Behavior, 27(3), 1162–1167. https://doi.org/10.1016/j.chb.2010.12.010
Cacioppo, J. T., & Hawkley, L. C. (2009). Perceived social isolation and cognition. Trends in Cognitive Sciences, 13(10), 447–454. https://doi.org/10.1016/j.tics.2009.06.005
Cupach, W. R., & Spitzberg, B. H. (2000). Obsessive relational intrusion: Incidence, perceived severity, and coping. Violence and Victims, 15(4), 357–372. https://doi.org/10.1891/0886-6708.15.4.357
Dardis, C. M., & Gidycz, C. A. (2017). The frequency and perceived impact of engaging in in-person and cyber unwanted pursuit after relationship break-up among college men and women. Sex Roles, 76(1–2), 56–72. https://doi.org/10.1007/s11199-016-0667-1
Dziopa, F., & Ahern, K. (2011). A systematic literature review of the applications of Q-technique and its methodology. Methodology, 7(2), 39–55.
Elmer, T., & Stadtfeld, C. (2020). Depressive symptoms are associated with social isolation in face-to-face interaction networks. Scientific Reports, 10(1), 1444. https://doi.org/10.1038/s41598-020-58297-9
Finn, J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal Violence, 19(4), 468–483. https://doi.org/10.1177/0886260503262083
Goodman, J. K., Cryder, C. E., & Cheema, A. (2013). Data collection in a flat world: The strengths and weaknesses of mechanical turk samples. Journal of Behavioral Decision Making, 26(3), 213–224. https://doi.org/10.1002/bdm.1753
Graham, J. W., Olchowski, A. E., & Gilreath, T. D. (2007). How many imputations are really needed? Some practical clarifications of multiple imputation theory. Prevention Science, 8, 206–213. https://doi.org/10.1007/s11121-007-0070-9
Hawthorne, G. (2006). Measuring social isolation in older adults: Development and initial validation of the friendship scale. Social Indicators Research, 77(3), 521–548. https://doi.org/10.1007/s11205-005-7746-y
Hayes, A. F., & Cai, L. (2007). Using heteroskedasticity-consistent standard error estimators in OLS regression: An introduction and software implementation. Behavior Research Methods, 39(4), 709–722. https://doi.org/10.3758/BF03192961
Leisring, P. A., & Giumetti, G. W. (2014). Sticks and stones may break my bones, but abusive text messages also hurt: Development and validation of the cyber psychological abuse scale. Partner Abuse, 5(3), 323–341. https://doi.org/10.1891/1946-6560.5.3.323
Lyndon, A., Bonds-Raacke, J., & Cratty, A. D. (2011). College students’ facebook stalking of ex-partners. Cyberpsychology, Behavior, and Social Networking, 14(12), 711–716. https://doi.org/10.1089/cyber.2010.0588
Maple, C., Short, E., Brown, A., Bryden, C., & Salter, M. (2012). Cyberstalking in the UK: Analysis and recommendations. International Journal of Distributed Systems and Technologies, 3(4), 34–51. https://doi.org/10.4018/jdst.2012100104
Marcum, C. D., Higgins, G. E., & Nicholson, J. (2017). I’m watching you: Cyberstalking behaviors of university students in romantic relationships. American Journal of Criminal Justice, 42(2), 373–388. https://doi.org/10.1007/s12103-016-9358-2
Mason, W., & Suri, S. (2012). Conducting behavioral research on amazon’s mechanical turk. Behavior Research Methods, 44(1), 1–23. https://doi.org/10.3758/s13428-011-0124-6
Mechanic, M. B., Uhlmansiek, M. H., Weaver, T. L., & Resick, P. A. (2000). The impact of severe stalking experienced by acutely battered women: An examination of violence, psychological symptoms and strategic responding. Violence and Victims, 15(4), 443–458. https://doi.org/10.1891/0886-6708.15.4.443
Melander, L. A. (2010). College students’ perceptions of intimate partner cyber harassment. Cyberpsychology, Behavior, and Social Networking, 13(3), 263–268. https://doi.org/10.1089/cyber.2009.0221
National Network to End Domestic Violence. (2017). Technology-facilitated stalking: What you need to know. https://nnedv.org/latest_update/technology-facilitated-stalking/
Nguyen, J., Moorhouse, M., Curbow, B., Christie, J., Walsh-Childers, K., & Islam, S. (2016). Construct validity of the eHealth literacy scale (eHEALS) among two adult populations: A rasch analysis. JMIR Public Health and Surveillance, 2(1), e24. https://doi.org/10.2196/publichealth.4967
Oppong Asante, K., & Andoh-Arthur, J. (2015). Prevalence and determinants of depressive symptoms among university students in Ghana. Journal of Affective Disorders, 171, 161–166. https://doi.org/10.1016/j.jad.2014.09.025
Paolacci, G., Chandler, J., & Ipeirotis, P. G. (2010). Running experiments on amazon mechanical turk. Judgment and Decision Making, 5(5), 411–419.
Papp, L. M., Danielewicz, J., & Cayemberg, C. (2012). “Are we Facebook official?” Implications of dating partners’ facebook use and profiles for intimate relationship satisfaction. Cyberpsychology, Behavior and Social Networking, 15(2), 85–90. https://doi.org/10.1089/cyber.2011.0291
Pew Research Center. (2016). 15% of American adults use online dating sites or mobile apps. https://www.pewresearch.org/internet/2016/02/11/15-percent-of-american-adults-have-used-online-dating-sites-or-mobile-dating-apps/.
Purcell, R., Pathé, M., & Mullen, P. (2004). Editorial: When do repeated intrusions become stalking? Journal of Forensic Psychiatry & Psychology, 15(4), 571–583. https://doi.org/10.1080/14789940412331313368
Reyns, B. W., Henson, B., & Fisher, B. S. (2012). Stalking in the twilight zone: Extent of cyberstalking victimization and offending among college students. Deviant Behavior, 33(1), 1–25. https://doi.org/10.1080/01639625.2010.538364
Shorey, R. C., Cornelius, T. L., & Strauss, C. (2015). Stalking in college student dating relationships: A descriptive investigation. Journal of Family Violence, 30(7), 935–942. https://doi.org/10.1007/s10896-015-9717-7
Smoker, M., & March, E. (2017). Predicting perpetration of intimate partner cyberstalking: Gender and the dark tetrad. Computers in Human Behavior, 72, 390–396. https://doi.org/10.1016/j.chb.2017.03.012
Stephenson, W. (1935). Technique of factor analysis. Nature, 136, 297. https://doi.org/10.1038/136297b0
Stephenson, W. (1953). The study of behavior: Q-technique and its methodology. University of Chicago Press.
The National Center for Victims of Crime. (2011). Stalking resource center. https://victimsofcrime.org/our-programs/past-programs/stalking-resource-center.
United States Department of Justice. (2000). The electronic frontier: The challenge of unlawful conduct involving use of the internet: A report of the president’s working group on unlawful conduct on the internet. https://www.hsdl.org/?abstract&did=3029.
Worsley, J. D., Wheatcroft, J. M., Short, E., & Corcoran, R. (2017). Victims’ voices: Understanding the emotional impact of cyberstalking and individuals’ coping responses. SAGE Open, 7(2), 1–13. https://doi.org/10.1177/2158244017710292
Acknowledgements
We would like to thank Dr. Robert Gold, Dr. Donna Howard, and Dr. Richard Shin for their edits and valuable suggestions for this manuscript. Additionally, we would like to thank Israel Abebe for her help with analyzing the qualitative data.
Funding
Support for this study was generously provided by Dr. Barbara Curbow and the Department of Behavioral and Community Health in the School of Public Health at the University of Maryland.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
The authors have no relevant financial or non-financial interests to disclose.
Informed consent
Informed consent was obtained from all participants included in both phases of the study.
Ethical Approval
The university’s Institutional Review Board approved Phases 1 and 2 of this study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Reiss, D.M., Curbow, B.A. & Wang, M.Q. Young Adults’ Perceptions of Intimate Partner Cyberstalking: Behaviors, Severity, and Associations with Depressive Symptoms and Social Isolation. Sexuality & Culture 26, 176–203 (2022). https://doi.org/10.1007/s12119-021-09885-y
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12119-021-09885-y