SlideShare a Scribd company logo
1 of 49
1003
Violence Against Women
Volume 12 Number 11
November 2006 1003-1018
© 2006 Sage Publications
10.1177/1077801206293328
http://vaw.sagepub.com
hosted at
http://online.sagepub.com
Conflict and Control
Gender Symmetry and Asymmetry
in Domestic Violence
Michael P. Johnson
The Pennsylvania State University, University Park
Four types of individual partner violence are identified based on
the dyadic control
context of the violence. In intimate terrorism, the individual is
violent and controlling,
the partner is not. In violent resistance, the individual is violent
but not controlling; the
partner is the violent and controlling one. In situational couple
violence, although the
individual is violent, neither the individual nor the partner is
violent and controlling.
In mutual violent control, the individual and the partner are
violent and controlling.
Evidence is presented that situational couple violence dominates
in general surveys,
intimate terrorism and violent resistance dominate in agency
samples, and this is the
source of differences across studies with respect to the gender
symmetry of partner vio-
lence. An argument is made that if we want to understand
partner violence, intervene
effectively in individual cases, or make useful policy
recommendations, we must make
these distinctions in our research.
Keywords: gender symmetry; intimate terrorism; mutual violent
control; situational
couple violence; violent resistance
The central argument of this article is that there are four major
types of intimatepartner violence and that the failure to
distinguish among them has left us with
a domestic violence literature that, to a large extent, may be
uninterpretable. The
types of domestic violence (situational couple violence,
intimate terrorism, violent
resistance, and mutual violent control) are defined conceptually
in terms of the con-
trol motives of the violent member(s) of the couple, motives
that are identified oper-
ationally by patterns of controlling behavior that indicate an
attempt to exercise
general control over one’s partner. With respect to implications
for the question of
gender symmetry, these types of domestic violence differ
dramatically. In hetero-
sexual relationships, intimate terrorism is perpetrated almost
exclusively by men,
whereas violent resistance is found almost exclusively among
women. The other two
types are gender symmetric. With respect to the general
importance of distinguish-
ing among types of violence, I believe that they have different
causes, different pat-
terns of development, different consequences, and that they
require different forms
of intervention.
1004 Violence Against Women
Resolving the Gender Symmetry Debate
The long-standing argument in the family literature regarding
the gender symmetry
of intimate partner violence takes the form of a disagreement
about the nature of het-
erosexual intimate partner violence, as if heterosexual partner
violence were a single
phenomenon. One side of the debate, generally referred to as
the feminist perspective
(Kurz, 1989), presents compelling empirical evidence that
heterosexual intimate part-
ner violence is largely a problem of men assaulting female
partners (Dobash, Dobash,
Wilson, & Daly, 1992). The other side, generally taken in the
family violence per-
spective, presents equally compelling empirical evidence that
women are at least as
violent as men in such relationships (Straus, 1999). How can
they both be right?
In 1995, I published an article that argued that the answer to
this question is that:
(a) partner violence is not a unitary phenomenon, (b) the two
groups of researchers gen-
erally use different sampling strategies, (c) the different
sampling strategies tap different
types of partner violence, and (d) these types differ in their
relationship to gender
(Johnson, 1995). I argued further that the types probably also
differ with respect to their
causes, the nature of the violence itself, the development of the
violence during the course
of a relationship, its consequences, and the type of intervention
required. If these argu-
ments are correct, then it follows that we cannot draw any
conclusions about the nature
of partner violence from studies that do not distinguish among
types of partner violence
(Johnson & Ferraro, 2000). Nevertheless, studies continue to be
published regularly that
treat partner violence as a unitary phenomenon, many of them
claiming to provide fur-
ther evidence on the gender symmetry issue. For example,
Archer’s (2000) influential
meta-analysis of the evidence regarding gender symmetry, in
spite of citing my 1995 arti-
cle, essentially ignored the proposed distinctions among types
of violence and concluded
that women are slightly more violent than men in heterosexual
partnerships.
Here is the basic argument of the 1995 article. With regard to
sampling, I argued
that general differences in sampling strategies were the major
source of the ostensible
inconsistencies between the feminist and family violence data.
In general, the studies
that demonstrated the predominance of male violence used
agency data (courts, police
agencies, hospitals, and shelters), whereas the studies that
showed gender symmetry
involved so-called representative samples. I argued that both of
these sampling strate-
gies are heavily biased: the former through its use of biased
sampling frames (agen-
cies), the latter through refusals. Although the biases of agency
sampling frames have
generally been taken to be obvious (Straus, 1990b),
representative sample surveys have
mistakenly been assumed to be unbiased. The final samples of
so-called random sam-
ple surveys are, of course, not random, due to refusals. I
estimated, for example, that
the refusal rate in the National Family Violence Surveys was
approximately 40% rather
than the 18% usually reported (Johnson, 1995). Could there be
two qualitatively dif-
ferent forms of partner violence, one gender symmetric and
overselected in general
surveys, the other committed primarily by men and overselected
in agency samples?
To address this question, I identified a number of agency-based
studies that used the
Conflict Tactics Scales (CTS; Johnson, 1995) to assess the
nature of partner violence
in agency samples and compared them with general surveys that
used the same instru-
ment.1 My conclusion from this comparison was that the two
sampling strategies iden-
tified partner violence that differed not only in gender
symmetry but also in frequency
of per-couple incidents, escalation, severity of injuries, and
mutuality. Agency samples
identified partner violence that was more frequent, more likely
to escalate, more
severe, less likely to be mutual, and perpetrated almost entirely
by men. This gender-
asymmetric pattern resonated for me with feminist analyses of
partner violence as one
tactic in a general pattern of controlling behaviors used by some
men to exercise gen-
eral control over “their” women (Dobash & Dobash, 1979;
Pence & Paymar, 1993;
Stark & Flitcraft, 1996).
The asymmetry of such control contrasted dramatically, it
seemed to me, with the
family violence perspective’s predominantly symmetric image
of partner violence as a
matter of conflict. I hypothesized that there were two
qualitatively different forms
and/or patterns of intimate partner violence—one that was part
of a general strategy of
power and control (intimate terrorism), the other involving
violence that was not part
of a general pattern of control, probably a product of the
escalation of couple conflict
into violence (situational couple violence).2 Furthermore, I
argued that, on one hand,
couples involved in situational couple violence would be
unlikely to become agency
clients because such situationally provoked violence would not
in most cases call for
police intervention, emergency room visits, protection from
abuse orders, or divorce.
On the other hand, couples involved in intimate terrorism would
be unlikely to agree
to participate in general surveys because victims fear reprisals
from the batterer, and
batterers fear exposing themselves to intervention by the police
or other agencies.
Although these arguments seemed reasonable enough, my 1995
literature review pro-
vided no direct evidence of their validity because none of the
studies reviewed made
such distinctions among types of violence.3
Distinguishing Among Types of Heterosexual
Intimate Partner Violence
First, I want to discuss one approach to assessing differences in
the extent to which
an individual’s violence toward his or her partner is embedded
in a general context of
control, then I will move on to the implications of taking into
account the behavior of
the partner. The basic idea is to look at a variety of nonviolent,
controlling behaviors
to identify individuals who behave in a manner that indicates a
general motive to con-
trol. Note that (a) this moves the focus from the nature of any
one encounter between
the partners to a search for patterns of behavior in the
relationship as a whole, and (b)
it most certainly is not based in the nature of the violent acts
themselves. Some critics
Johnson / Conflict, Control, and Domestic Violence 1005
have argued that I am simply making the old distinction
between more serious and less
serious violence. I disagree. The distinction lies in the degree of
control present. I
assume that there is considerable variability in the nature of the
violent acts involved
in controlling and noncontrolling violence, a variability that
would lead to consider-
able overlap between them in terms of the “seriousness” of the
violence. Although I do
have some hypotheses about average differences among types of
violence in terms of
the nature of the violent acts involved, the types themselves are
defined by the degree
of control, not by characteristics of the violence. Thus, if we
want to make these dis-
tinctions, surveys need to ask questions not just about violence
but also about the use
of a variety of other control tactics in the relationship.
Before I proceed to illustrate this general measurement strategy
with data from
Frieze’s 1970s Pittsburgh study, however, I need to move the
1995 discussion from the
individual to the dyadic level. The initial distinction between
intimate terrorism and
situational couple violence was focused too narrowly on the
behavior of one violent
partner. If one considers the behavior of both people in the
relationship, one can iden-
tify four basic types of individual violence.4 First, an individual
can be violent and non-
controlling and in a relationship with a partner who is either
nonviolent or who is also
violent and noncontrolling. This is what I called situational
couple violence. Second,
one can be violent and noncontrolling but in a relationship with
a violent and control-
ling partner. Given that the behavior of the partner suggests an
attempt to exert general
control, I labeled this type of violence violent resistance. Third,
one can be violent and
controlling and in a relationship with a partner who is either
nonviolent or violent and
noncontrolling. This is the pattern I have called intimate
terrorism. Finally, a violent
and controlling individual may be paired up with another
violent and controlling part-
ner. I have labeled this mutual violent control. To make these
distinctions, one would
have to ask questions regarding a variety of control tactics in
addition to violence, ask
them with regard to both partners, and do so in a data set that
was likely to include rep-
resentatives of each of the four types.
I was able to find one such data set, Irene Frieze’s data from
interviews with 274
married and formerly-married women living in southwestern
Pennsylvania in the
late 1970s (Frieze, 1983; Frieze & Browne, 1989; Frieze &
McHugh, 1992). Her
mixed sampling design seemed likely to represent the major
types of violence—it
included women selected from shelters and courts (an agency
sample) and a matched
sample of women who lived in the same neighborhoods (a
general survey sample).
It might be useful to know some of the general characteristics of
the sample,
keeping in mind that these will be determined to a large extent
by the biases of the
initial court and shelter populations because the “general”
sample was matched by
neighborhood and is, therefore, likely to be similar in general
demographics. The
sample was predominantly White (86% White, 14% Black) and
working class (56%
had a high school education or less; only 21% had finished
college). About one third
of the women worked full-time, one sixth part-time, and about
one half were full-
time homemakers. Median age at the time of the interview was
32 years; however,
1006 Violence Against Women
ages ranged from 18 to 83 years. Median age at marriage was 21
years but ranged
from 15 to 59 years. As this is clearly not a representative
sample, it would not be
useful to make any general statements about the prevalence of
violence; of course,
all of the women in the court and shelter samples had
experienced violence from
their partners, as had 34% of the general sample. Only one third
of the women in the
court and shelter samples were still with their husband,
compared with about three
fourths of those in the general sample.
From the lengthy interview protocols, I identified a number of
items tapping con-
trol tactics that did not involve violence toward one’s partner.
Seven measures were
created to tap control tactics analogous to those identified by
Pence and Paymar
(1993): threats, economic control, use of privilege and
punishment, using children,
isolation, emotional abuse, and sexual control.
Threats
Each measure of threats (one for husbands, the other for wives)
is the mean of two
items with 5-point response formats ranging from no, never (1)
to often (5). The first
item is: “Has your husband (Have you) ever gotten angry and
threatened [emphasis
in survey instrument] to use physical force with you (him)?”
The second item was:
“Is he (Are you) ever violent in other ways (such as throwing
objects)?” For wives’
reports of their husband’s behavior, the mean of this variable is
2.72 (between
“once” and “two or three times”), the standard deviation 1.51,
and the range from
1.00 to 5.00. Cronbach’s alpha for the two-item scale is .74. For
wives’ reports of
their own behavior, the mean is 1.99 (“once”), the standard
deviation 1.05, the range
is from 1.00 to 5.00, and alpha is .46.
Economic Control
Economic control is the average of two dichotomized items. The
first asks, “Who
decides how the family money will be spent in terms of major
expenses?” It was
dichotomized with a high score indicating that either “husband
(wife) makes entire
decision” or “husband (wife) has deciding vote.” The second
item asked for an open-
ended response to, “How much money do you (does your
husband) have to spend
during an average week without accounting to anyone?” The
dichotomization cut-
point was chosen to make this second item more an indicator of
control than of dis-
posable income: A response of US$10 or less indicated high
control, one of more
than $10 indicated low control. For husbands’ economic control,
the two-item scale
has a mean of 1.36, a standard deviation of .39, ranges from
1.00 to 2.00, and has an
alpha of .46. For wives, the mean is 1.20, the standard deviation
.27, the range from
1.00 to 2.00, and alpha is .12.
Johnson / Conflict, Control, and Domestic Violence 1007
Use of Privilege and Punishment
This scale is the mean of six items, each of which indicates that
the target person
uses one of the following tactics to get his or her spouse to do
what he or she wants.5
The six items were: (a) “suggests that you should do something
because he knows
best or because he feels he is an expert at a particular thing,”
(b) “stops having sex
with you,” (c) “threatens to leave you,” (d) “emotionally
withdraws,” (e) “suggest[s]
that you should do something because other people do,” and (f)
“restricts your free-
dom.” The response format for all items addresses frequency,
ranging from never
(1) to rarely (3) to always (5). For husbands, the scale has a
mean of 2.03 (“rarely”),
a standard deviation of .81, ranges from 1.00 to 4.83, and has an
alpha of .76. For
wives, the mean is 1.92 (“rarely”), the standard deviation .62,
the range is from 1.00
to 4.19, and alpha is .65.
Using Children
There are three items in this data set that get at a spouse’s use
of the children to
get his or her way with his or her partner. Two of them involve
responses to the ques-
tion, “When your husband is angry with you, how does he show
it?” The two relevant
response options were “Directs his anger to the children or
pets” and “Uses physical
violence with the children.” The third item is, “Does he ever try
to get what he wants
by doing any of the following to you? How often?” One of the
actions listed is, “uses
physical force against the kids to get what he wants from you,”
with the five response
options ranging from never to always. This item was
dichotomized between never
and rarely, and the three items were averaged. For wives’
reports of their husband’s
behavior, the mean was 1.19, the standard deviation .30, the
range from 1.00 to 2.00,
and alpha equal to .68. For wives’ reports of their own
behavior, the mean was 1.12,
standard deviation .21, the range from 1.00 to 2.00, and alpha
equal to .41.
Isolation
The measure of isolation is the mean of two items with 5-point
response formats
ranging from never to always. The items are: “Does your
husband know where you
are when you are not together?” and “Are there places you
might like to go but don’t
because you feel your husband wouldn’t want you to—How
often does this hap-
pen?” For wives’ reports of their husband’s behavior, the mean
of this measure is
3.32 (between sometimes and usually), the standard deviation is
.77, the observed
range is from 1.00 to 5.00, and alpha is equal to .09. For wives’
reports of their own
behavior, the mean is 2.64 (between rarely and sometimes), the
standard deviation is
.84, the range from 1.00 to 5.00, and alpha equals .06.
1008 Violence Against Women
Emotional Abuse
The three-item emotional abuse scale includes one item that
gets at active abuse
(sex is sometimes unpleasant because “He compares you
unfavorably to other
women”), and two “passive abuse” items that indicate that he
never or rarely praises,
and never or rarely is “nice to you in other ways (smiling,
concerned with how you
are feeling, calling you affectionate names, etc.).” All three
items are dichotomies.
For husbands, the mean is 1.25, the standard deviation is .33,
the scale ranges from
1.00 to 2.00, and alpha is .57. For wives, the mean is 1.08, the
standard deviation is
.21, the range is from 1.00 to 2.00, and alpha is .48.
Sexual Control
There are two items in the sexual control scale, tapping whether
sex is ever unpleas-
ant because “he forces me to have sex when I don’t want to,” or
“he makes you do
things you don’t want to do.” Both items are dichotomies. For
husbands, the mean is
1.22, the standard deviation .36, the range is 1.00 to 2.00, and
alpha is .70. For wives,
the mean is 1.02, the standard deviation .01, the range is 1.00 to
2.00, and alpha is .35.
Types of Intimate Partner Violence
Each of these measures was standardized and entered into a
cluster analysis. The clus-
tering algorithm was Ward’s method, an agglomerative
approach that selects each new
case to add to a cluster based on its effect on the overall
homogeneity of the cluster, and
which therefore tends to produce tightly defined clusters, rather
than strings (Aldenderfer
& Blashfield, 1984, pp. 43-45). Euclidean distance was the
measure of dissimilarity. The
index of dissimilarity for one cluster through 15-cluster
solutions was examined.
The results indicated a two-cluster solution as optimal, and the
pattern was quite
simple, with one cluster exhibiting a high average on all seven
of the control tactics,
the other being relatively low on all seven. The results of the
cluster analysis were
then used to distinguish controlling from noncontrolling
violence at the individual
level, that is, for each husband and wife. Finally, data regarding
both partners were
used to distinguish among types of individual violence, as
defined above.
Table 1 presents data only on violent individuals, that is, those
who had been violent
in their relationship at least once (67% of the husbands and 54%
of the wives). The
question tapping violence was: “Has he (Have you) ever
actually slapped or pushed you
(him) or used other physical force with you (him)?” The table
places individual violence
within its dyadic control context, distinguishing among four
types of individual violent
behavior.6 The first row, “intimate terrorism,” refers to
relationships in which only one
of the spouses is violent and controlling. The other spouse is
either nonviolent or has
used violence but is not controlling. In this data set, that violent
and controlling spouse
Johnson / Conflict, Control, and Domestic Violence 1009
is the husband in 94 of the 97 cases. The second row refers to
cases in which the focal
spouse is violent but not controlling, and his or her partner is
violent and controlling.
I call it violent resistance, and it is almost entirely a woman’s
type of violence in this
sample of heterosexual relationships. Of course, that is because
in these marriages
almost all of the intimate terrorism is perpetrated by men, and
in some cases the wives
do respond with violence, although rarely are they also
controlling (see mutual violent
control below). In the third row, we have “situational couple
violence,” individual non-
controlling violence in a dyadic context in which neither of the
spouses is violent and
controlling. It is close to gender symmetric, at least by the
crude criterion of prevalence.
(Data on the frequency and consequences of men’s and women’s
situational couple vio-
lence, not shown, indicate that by other criteria men are more
violent than women even
within situational couple violence.) The last row, “mutual
violent control,” refers to con-
trolling violence in a relationship in which both spouses are
violent and controlling.
There were only five such couples (10 individuals) in this data
set, and among hetero-
sexual couples such violence is by definition gender symmetric.
Now, let’s take a quick look at the characteristics of the violent
acts involved in men’s
intimate terrorism and situational couple violence, to see if they
fall in line with what I
found in my 1995 literature review. The violence in men’s
intimate terrorism was quite
frequent; the median number of incidents in these marriages is
18.7 Violence was much
less frequent in men’s situational couple violence with a median
of three violent events.
Intimate terrorism was reported to escalate in 76% of the cases,
situational couple vio-
lence in only 28%.8 In terms of injuries, the violence of
intimate terrorism was some-
times severe in 76% of the cases, compared with 28% of the
cases of situational couple
violence.9 In men’s intimate terrorism, wives rarely respond
with violence; the median
of the ratio of number of times the wife had been violent to the
number of times the
husband had been violent is .17. In men’s situational couple
violence, the median ratio
was .40. These data do not leave much doubt that intimate
terrorism and situational cou-
ple violence are not the same phenomenon.10
Finally, let me nail down my sampling argument, that general
survey samples tap pri-
marily situational couple violence, whereas agency samples give
access primarily to
intimate terrorism. Again, looking only at male violence, Table
2 shows that the general
1010 Violence Against Women
Table 1
Individual Violent Behavior by Gender (Violent
Individuals Only, as Reported by Wives, Percentages)
Husbands Wives n
Intimate terrorism 97 3 97
Violent resistance 4 96 77
Situational couple violence 56 44 146
Mutual violent control 50 50 10
sample typical of family violence research includes almost
nothing but situational cou-
ple violence, with only 11% of the violence being intimate
terrorism. In stark contrast,
the court and shelter samples that are typical of feminist
research get at violence that is
predominantly intimate terrorism.
What kind of mistakes can this generate? The article on the
“battered husband syn-
drome” that initiated the gender symmetry debate (Steinmetz,
1977) is an excellent
example of the danger of thinking that a general sample
provides information about what
we conventionally mean by “domestic violence,” that is,
intimate terrorism. Steinmetz
told anecdotes about true husband battering, involving violent
women who are intimate
terrorists in the sense described above. However, she then cited
general survey data, which
we now know represent primarily situational couple violence, to
make her case that such
battering is as frequent a problem as is wife battering. The data
she presented, in fact, have
nothing to do with husband battering. Serious as husband
battering may be in each par-
ticular case, as a general phenomenon it is dramatically less
frequent than wife battering.
Similarly, one can err by assuming that the patterns observed in
agency samples
describe all partner violence. It is common for shelter workers
to argue in educa-
tional programs that violence always escalates, that if he hit you
once he’ll do it
again, and that it will get worse. Such a pattern is, as shown
above, much more true
of intimate terrorism than of situational couple violence, and of
course intimate ter-
rorism is what we generally see in our shelter work. However,
most couples who
experience violence, including those in our audiences, are
involved in situational
couple violence.11 For those audience members, we are
providing an inaccurate pic-
ture of the likely course of their relationships.
Dramatic as these sampling biases are, Table 2 also shows that
neither type of male
violence is found exclusively in one type of sample, implying
that it is possible to study
the differences between these two types of violence in a variety
of research settings.
First, the 11% of men’s violence that is intimate terrorism in the
general sample indi-
cates that, with large enough samples, it may be possible to
study situational couple
Johnson / Conflict, Control, and Domestic Violence 1011
Table 2
Who is Finding Whom? (Violent Husbands Only,
as Reported by Wives, Percentages)
Survey Sample Court Sample Shelter Sample
(n = 37) (n = 34) (n = 43)
Mutual violent control 0 3 0
Intimate terrorism 11 68 79
Violent resistance 0 0 2
Situational couple violence 89 29 19
Note: For simplicity, Table 2 presents data only on husbands.
For wives, the general survey sample is dom-
inated by situational couple violence, and the court and shelter
samples are dominated by violent resistance.
violence and intimate terrorism with survey data. To do that, of
course, we need to
include questions that will allow us to distinguish one from the
other. Second, because
women do bring cases of situational couple violence to the
courts (29%) and to shel-
ters (19%), researchers in those contexts would be able to study
the effects of various
intervention strategies on the two types of violence. Again,
however, it won’t happen
unless we gather information that will allow us to make these
distinctions.
Implications for Measurement
The evidence I have just presented regarding the dramatic
differences between inti-
mate terrorism and situational couple violence (in terms of
gender, per-couple frequency
of incidents, escalation, severity of injury, and reciprocity)
should serve as a warning that
until further notice we have to assume that the answers to all of
our important questions
about domestic violence may be different for the different forms
of violence. How do we
collect and analyze data to allow us to make the necessary
distinctions?
The general strategy for making such distinctions involves two
steps. First, and
most critically, we must gather information on a variety of
control tactics for both
members of the couple. Not all surveys do this. It was fortunate
that Irene Frieze had
the foresight to collect such data in the 1970s. I have been using
a number of other
data sets to try to operationalize these distinctions and have had
to dance around
major shortcomings. The recent National Violence Against
Women Survey (Johnson
& Leone, 2000; Tjaden & Thoennes, 2000) asks a number of
control tactics ques-
tions about the attacker but gathers no information about the
behavior of the respon-
dent. Susan Lloyd’s (Leone, Johnson, Cohan, & Lloyd, 2001;
Lloyd & Taluc, 1999)
data from a poor neighborhood in Chicago have the same
shortcoming. The National
Family Violence surveys (Straus & Gelles, 1990) ask about the
behavior of both
partners but do not assess a variety of control tactics. We need
to insist that every
study of partner violence asks questions about the control
tactics and the violence
used by both partners.
However, what questions to ask? Whatever the drawbacks of the
Conflict Tactics
Scales (CTS) may be (Dobash et al., 1992), they have made the
considerable contribu-
tion of having provided a standard approach to assessing
violence. As yet, there appears
to be no standard approach to the assessment of control,
although a number of scholars
have developed scales that are reasonable candidates, including
Marshall (1996) on
psychological abuse, Stets (1993) on control, Tolman (1989) on
psychological mal-
treatment, Pence and Paymar (1993) on power and control,
Straus and his colleagues’
(Straus, Hamby, Boney-McCoy, & Sugarman, 1996; Straus,
Hamby, Boney-McCoy, &
Sugarman, 1999; Straus & Mouradian, 1999) revised Conflict
Tactics Scales and
Personal and Relationships Profile, and, most recently, Cook
and Goodman (this issue)
in their Coercion and Conflict in Abuse Experiences Scale. It
would be very helpful if
some consensus could be developed on a standard set of control
measures.12
1012 Violence Against Women
When we have the data, we face the task of using it to create a
typology of con-
trolling and noncontrolling violence. In my early work, I
approached this problem
through the use of cluster analysis; one could similarly use
latent class analysis
for dichotomous items. Cluster analysis and latent class analysis
identify clusters of
individuals who have similar profiles of responses to a set of
items, and they provide
statistical criteria for choosing the optimal number of groups
(clusters or classes) for
describing a particular data set. The problem is that they do not
provide clear-cut cri-
teria for distinguishing the members of one group from those in
others, and there is
therefore no straightforward way of comparing the results of
cluster analyses from
different samples. Thus, in more recent work, I have simply
created a control scale
and dichotomized it to identify high- and low-control
individuals. I have found that
in the three secondary data sets with which I have been working
there are fairly
strong relationships between the cluster solutions and a simple
scale score created
out of the same control items. This approach has the advantage
of providing clear
criteria for placement into the four types of violence, so that
comparisons can be
made across studies. In a series of analyses of available data
sets, my colleagues and
I have shown that the violence types are related as expected to
characteristics of the
actual violence (frequency, escalation, severity, and mutuality)
and to various phys-
ical and psychological effects on the victim (posttraumatic
stress symptoms, general
health, injury, interference with work) and on the relationship
(Johnson, 1999;
Johnson, Conklin, & Menon, 2002; Johnson & Leone, 2005;
Leone, Johnson, &
Cohan, 2003; Leone, Johnson, Cohan, & Lloyd, 2004).
Whatever specific approach we choose, I believe it is critical
that we reassess con-
clusions that have been drawn from a literature that has failed to
make these critical
distinctions. We have to be wary of findings that treat
situational couple violence,
intimate terrorism, violent resistance, and mutual violent
control as a single phe-
nomenon. Situational couple violence, intimate terrorism,
violent resistance, and
mutual violent control simply cannot have the same causes,
developmental trajec-
tory, consequences, or prognosis for effective intervention. If
we want to understand
partner violence, to intervene effectively in individual cases, or
to make useful pol-
icy recommendations, we must make these distinctions in our
research.
Postscript
Since the original version of this article was presented in 2000
(Johnson, 2000) at
a National Institute of Justice workshop, considerable progress
has been made in
research on different types of intimate partner violence. Janel
Leone and I, using the
National Violence Against Women data, have shown that
victims of intimate terror-
ism are attacked more frequently and experience violence that is
less likely to stop.
They are more likely to be injured, to exhibit more of the
symptoms of posttraumatic
stress syndrome, to use painkillers (perhaps also tranquilizers),
and to miss work.
Johnson / Conflict, Control, and Domestic Violence 1013
They have left their husbands more often and, when they do
leave, are more likely to
acquire their own residence (Johnson & Leone, 2005). Using
data from a study of a
poor neighborhood in Chicago, my colleagues and I found that
victims of intimate
terrorism reported poorer general health, a greater likelihood of
visiting a doctor,
more psychological distress, and a greater likelihood of
receiving government assis-
tance (Leone et al., 2004). Leone’s dissertation (Leone et al.,
2003), using data from
the Chicago Women’s Health Risk Study, demonstrated that
victims of intimate ter-
rorism were more likely than victims of situational couple
violence to seek formal
help (e.g., police, medical, counseling), and that this association
was mediated by
other factors, including violence severity, injuries, and
perceived social support. They
were not more likely to seek help from family or friends. Alison
Cares and I (Johnson
& Cares, 2004), using Frieze’s Pittsburgh data, have shown that
childhood experi-
ences of family violence are strongly related to adult
perpetration of intimate terror-
ism, but not to situational couple violence.
Amy Holtzworth-Munroe and her colleagues (Holtzworth-
Munroe, 2000, 2002;
Holtzworth-Munroe, Meehan, Herron, Rehman, & Stuart, 2003;
Holtzworth-Munroe,
Rehman, & Herron, 2000) have continued their line of research
that uses cluster analy-
sis to distinguish among types of perpetrators. They generally
found three clusters, one
corresponding to situational couple violence (which they label
family only), and two
others that appear to correspond to two types of intimate
terrorists (borderline/dysphoric
and generally violent/antisocial). The clusters differ, among
other things, in terms of the
personality of the perpetrators, the pattern of violence, the
perpetrators’ attitudes toward
women, and the general level of control exercised in their
relationships (with the high
control scores of borderline/dysphoric and generally
violent/antisocial perpetrators sup-
porting my assumption that these men are involved in intimate
terrorism, whereas the
family-only perpetrators are more likely involved in situational
couple violence).
Graham-Kevan and Archer (2003a, 2003b) collected data on
violence and control
from British samples of women residing at Women’s Aid
refuges and their partners,
male and female students, men attending male treatment
programs for domestic
violence and their partners, and male prisoners and their
partners. Their cluster
analyses confirm the distinction between intimate terrorism and
situational couple
violence and show support for my findings regarding
differences in the frequency
and severity of violence.
In spite of this progress, the gender symmetry debate continues,
ignoring these
demonstrations that there are different types of intimate partner
violence and that
data that do not distinguish among them are problematic at best.
Papers continue to
be published using general survey data to demonstrate that men
and women are
equally violent, and implying through their generalizations
about violence or domes-
tic violence or intimate partner violence that men and women
are equally likely to be
involved in intimate terrorism (e.g., Capaldi & Owen, 2001;
Moffitt, Robins, & Caspi,
2001; Straus & Ramirez, 2002). Even recent reviews of the
literature that debunk
the myth of gender symmetry continue to focus on measurement
issues as the major
1014 Violence Against Women
source of contradictory findings (Kimmel, 2002; Saunders,
2002). Frustrating as this
is to me, all I can do is assume that we are in the midst of a
gradual recognition that
domestic violence is not a unitary phenomenon, and that we are
close to a tipping
point at which we will see a dramatic decline in the number of
published studies that
simply compare violent with nonviolent relationships without
making distinctions
among types of violence. The evidence is accumulating that I
was right when I argued
in the early 1990s that “If we want to understand partner
violence, to intervene effec-
tively in individual cases, or to make useful policy
recommendations, we must make
these distinctions in our research” (Johnson, 1993, n.p.).
Notes
1. Much of the gender debate in the literature has centered on
the inadequacies of the Conflict Tactics
Scales (CTS) as a means to assess intimate partner violence
(Dobash, Dobash, Wilson, & Daly, 1992;
Straus, 1990a). Comparing studies that all used the CTS
eliminated this potential source of bias.
2. The terminology I have used has changed somewhat over the
years, although the definitions have
remained the same. The 1995 article referred to patriarchal
terrorism and common couple violence. I soon
abandoned the former term because it begged the question of
men’s and women’s relative involvement in
this form of controlling violence. It also implied that all such
intimate terrorism was somehow rooted in
patriarchal structures, traditions, or attitudes. I still believe that
most intimate terrorism is perpetrated by
men in heterosexual relationships and that in such cases the
violence is indeed rooted in patriarchal tra-
ditions. However, it is clear that there are women intimate
terrorists in heterosexual and same-sex rela-
tionships (for descriptions of intimate terrorism in lesbian
relationships, see Renzetti, 1992). Furthermore,
it is not clear that all intimate terrorism, even men’s, is rooted
in patriarchal ideas or structures. I later
abandoned common couple violence in favor of situational
couple violence because the former terminol-
ogy implied to some readers that I felt that such violence was
acceptable. I also prefer the new terminol-
ogy because it more clearly identifies the roots of this violence
in the situated escalation of conflict.
3. Although change has been slow to come, there are now a
number of studies published or in progress
that do make such distinctions (Graham-Kevan & Archer,
2003a, 2003b; Johnson, Conklin, & Menon,
2002; Johnson & Leone, 2005; Leone, Johnson, & Cohan, 2003;
Leone, Johnson, Cohan, & Lloyd, 2004).
I will comment further on these at the end of this article.
4. This typology is somewhat unusual in that it uses dyadic
information to create a typology of indi-
vidual behavior.
5. At this point I will stop reporting alternative forms of the
question, unless it seems necessary for
clarity.
6. There has been some confusion regarding the role of
frequency or severity of violence in the con-
struction of this typology. Because this is a typology of violent
behavior, all members of the four types
have been violent toward their partner. However, the
distinctions among the types are based entirely on
control context, not frequency or severity of violence.
7. The interview question was, “Can you estimate how many
times, in total, he was violent with you?”
8. The question was, “Did he become more violent over time?”
9. Severity of violence was assessed in a section of the
interview dealing with “the time your husband
was the most violent with you (him).” The question was, “How
badly were you hurt?” It was an open-
ended question with probes, coded into the following
categories: (a) force, no hurt; (b) no physical injury;
(c) simple injury; (d) severe, no trauma; (e) severe, some
trauma; and (f) permanent injury.
10. Once again, I want to be clear that there is no tautology
involved here. The types are defined in
terms of control context, not the frequency or nature of the
violence. The hypothesized differences in
characteristics of the violence are derived from theory. It is
assumed that attempts by husbands to exert
Johnson / Conflict, Control, and Domestic Violence 1015
general control over their wives will be met by considerable
resistance in the United States, a cultural con-
text in which marriage is seen by most women as an egalitarian
partnership. Thus, the intimate terrorist
will in some cases turn to violence repeatedly and escalate its
severity to gain control. Furthermore, given
the size and strength differences between men and women, a
woman faced with a partner who is deter-
mined to gain the upper hand by whatever means will not in the
long run be likely to continue to resist
physically but will turn to other tactics to gain control of her
life (Campbell, Rose, Kub, & Nedd, 1998).
11. If my arguments regarding the biases of various types of
sampling strategies are correct, it is
almost impossible to develop precise estimates of the incidence
of the various types of violence. I come
to the conclusion that most partner violence is situational
couple violence in the following way, based on
figures in my 1995 article. First, accepting my evidence that
almost all of the partner violence in general
surveys is situational couple violence, we can use the figures
from the National Family Violence Surveys
to estimate the incidence of situational couple violence. Second,
extrapolating from agency data in two
states that keep excellent shelter statistics, we can develop an
estimate of the incidence of intimate ter-
rorism. Those figures, which may be found in the 1995 article,
suggest that there is probably 3 times as
much situational couple violence as intimate terrorism, which
would mean that 75% of women experi-
encing violence from their male partners are experiencing
situational couple violence.
12. Mary Ann Dutton and Lisa Goodman are currently involved
in a very promising attempt to do just
that. Their scale development tactics are rooted in a theory of
coercive control (personal communication,
May, 2002).
References
Aldenderfer, M. S., & Blashfield, R. K. (1984). Cluster
analysis. Newbury Park, CA: Sage.
Archer, J. (2000). Sex differences in aggression between
heterosexual partners: A meta-analytic review.
Psychological Bulletin, 126, 651-680.
Campbell, J. C., Rose, L., Kub, J., & Nedd, D. (1998). Voices
of strength and resistance: A contextual and
longitudinal analysis of women’s responses to battering. Journal
of Interpersonal Violence, 13, 743-762.
Capaldi, D. M., & Owen, L. D. (2001). Physical aggression in a
community sample of at-risk young couples:
Gender comparisons for high frequency, injury, and fear.
Journal of Family Psychology, 15, 425-440.
Cook, S. L., & Goodman, L. A. (2006). Beyond frequency and
severity: Development and validation of
the Brief Coercion and Conflict Scales. Violence Against
Women, 12, 1050-1072.
Dobash, R. E., & Dobash, R. P. (1979). Violence against wives:
A case against patriarchy. New York: Free
Press.
Dobash, R. P., Dobash, R. E., Wilson, M., & Daly, M. (1992).
The myth of sexual symmetry in marital
violence. Social Problems, 39, 71-91.
Frieze, I. H. (1983). Investigating the causes and consequences
of marital rape. Signs, 8, 532-553.
Frieze, I. H., & Browne, A. (1989). Violence in marriage. In L.
Ohlin & M. Tonry (Eds.), Family violence
(pp. 163-218). Chicago: University of Chicago Press.
Frieze, I. H., & McHugh, M. C. (1992). Power and influence
strategies in violent and nonviolent mar-
riages. Psychology of Women Quarterly, 16, 449-465.
Graham-Kevan, N., & Archer, J. (2003a). Intimate terrorism and
common couple violence: A test of
Johnson’s predictions in four British samples. Journal of
Interpersonal Violence, 18, 1247-1270.
Graham-Kevan, N., & Archer, J. (2003b). Physical aggression
and control in heterosexual relationships:
The effect of sampling. Violence and Victims, 18, 181-196.
Holtzworth-Munroe, A. (2000). A typology of men who are
violent toward their female partners: Making sense
of the heterogeneity in husband violence. Current Directions in
Psychological Science, 9(4), 140-143.
Holtzworth-Munroe, A. (2002). Standards for batterer treatment
programs: How can research inform our
decisions? Journal of Aggression, Maltreatment and Trauma, 5,
165-180.
1016 Violence Against Women
Holtzworth-Munroe, A., Meehan, J. C., Herron, K., Rehman, U.,
& Stuart, G. L. (2003). Do subtypes of
maritally violent men continue to differ over time? Journal of
Consulting and Clinical Psychology,
71, 728-740.
Holtzworth-Munroe, A., Rehman, U., & Herron, K. (2000).
General and spouse-specific anger and hos-
tility in subtypes of maritally violent men and nonviolent men.
Behavior Therapy, 31, 603-630.
Johnson, M. P. (1993, November). Violence against women in
the American family: Are there two forms?
Paper presented at the Pre-Conference Theory Construction and
Research Methodology Workshop,
annual meeting of the National Council on Family Relations,
Baltimore, MD.
Johnson, M. P. (1995). Patriarchal terrorism and common
couple violence: Two forms of violence against
women. Journal of Marriage and the Family, 57, 283-294.
Johnson, M. P. (1999, November). Two types of violence
against women in the American family:
Identifying patriarchal terrorism and common couple violence.
Paper presented at the annual meeting
of the National Council on Family Relations, Irvine, CA.
Johnson, M. P. (2000, November). Conflict and control:
Symmetry and asymmetry in domestic violence.
Paper presented at the National Institute of Justice Gender
Symmetry Workshop, Arlington,VA.
Johnson, M. P., & Cares, A. (2004, November). Effects and
noneffects of childhood experiences of family
violence on adult partner violence. Paper presented at the
annual meeting of the National Council on
Family Relations, Orlando, FL.
Johnson, M. P., Conklin, V., & Menon, N. (2002, November).
The effects of different types of domestic
violence on women: Intimate terrorism vs. situational couple
violence. Paper presented at the annual
meeting of the National Council on Family Relations, Houston,
TX.
Johnson, M. P., & Ferraro, K. J. (2000). Research on domestic
violence in the 1990s: Making distinctions.
Journal of Marriage and the Family, 62, 948-963.
Johnson, M. P., & Leone, J. M. (2000, July). The differential
effects of patriarchal terrorism and common
couple violence: Findings from the National Violence Against
Women survey. Paper presented at the
Tenth International Conference on Personal Relationships,
Brisbane, Australia.
Johnson, M. P., & Leone, J. M. (2005). The differential effects
of intimate terrorism and situational cou-
ple violence: Findings from the National Violence Against
Women Survey. Journal of Family Issues,
26(3), 322-349.
Kimmel, M. S. (2002). “Gender symmetry” in domestic
violence: A substantive and methodological
research review. Violence Against Women, 8, 1332-1363.
Kurz, D. (1989). Social science perspectives on wife abuse:
Current debates and future directions. Gender
& Society, 3, 489-505.
Leone, J. M., Johnson, M. P., & Cohan, C. L. (2003,
November). Help-seeking among women in violent
relationships: Factors associated with formal and informal help
utilization. Paper presented at the
annual meeting of the National Council on Family Relations,
Vancouver, Canada.
Leone, J. M., Johnson, M. P., Cohan, C. M., & Lloyd, S. (2001,
June). Consequences of different types of
domestic violence for low-income, ethnic women: A control-
based typology of male-partner violence.
Paper presented at the International Network on Personal
Relationships, Prescott, AZ.
Leone, J. M., Johnson, M. P., Cohan, C. M., & Lloyd, S. (2004).
Consequences of male partner violence
for low-income, ethnic women. Journal of Marriage and Family,
66, 471-489.
Lloyd, S., & Taluc, N. (1999). The effects of male violence on
female employment. Violence Against
Women, 5, 370-392.
Marshall, L. L. (1996). Psychological abuse of women: Six
distinct clusters. Journal of Family Violence,
11(4), 379-409.
Moffitt, T. E., Robins, R. W., & Caspi, A. (2001). A couples
analysis of partner abuse with implications
for abuse-prevention policy. Criminology and Public Policy, 1,
5-26.
Pence, E., & Paymar, M. (1993). Education groups for men who
batter: The Duluth model. New York:
Springer.
Renzetti, C. M. (1992). Violent betrayal: Partner abuse in
lesbian relationships. Thousand Oaks, CA: Sage.
Johnson / Conflict, Control, and Domestic Violence 1017
Saunders, D. G. (2002). Are physical assaults by wives and
girlfriends a major social problem? A review
of the literature. Violence Against Women, 8, 1424-1448.
Stark, E., & Flitcraft, A. (1996). Women at risk: Domestic
violence and women’s health. Thousand Oaks,
CA: Sage.
Steinmetz, S. K. (1977). The battered husband syndrome.
Victimology, 2, 499-509.
Stets, J. E. (1993). Control in dating relationships. Journal of
Marriage and Family, 55(3), 673-685.
Straus, M. A. (1990a). The Conflict Tactics Scales and its
critics: An evaluation and new data on validity
and reliability. In M. A. Straus & R. J. Gelles (Eds.), Physical
violence in American families: Risk
factors and adaptations to violence in 8,145 families (pp. 49-
73). New Brunswick, NJ: Transaction
Publishers.
Straus, M. A. (1990b). Injury and frequency of assault and the
“representative sample fallacy” in mea-
suring wife beating and child abuse. In M. A. Straus & R. J.
Gelles (Eds.), Physical violence in
American families: Risk factors and adaptations to violence in
8,145 families (pp. 75-91). New
Brunswick, NJ: Transaction Publishers.
Straus, M. A. (1999). The controversy over domestic violence
by women: A methodological, theoretical,
and sociology of science analysis. In X. B. Arriaga & S.
Oskamp (Eds.), Violence in intimate rela-
tionships (pp. 17-44). Thousand Oaks, CA: Sage.
Straus, M. A., & Gelles, R. J. (Eds.). (1990). Physical violence
in American families: Risk factors and
adaptations to violence in 8,145 families. New Brunswick, NJ:
Transaction Publishers.
Straus, M. A., Hamby, S. L., Boney-McCoy, S., & Sugarman, D.
B. (1996). The revised Conflict Tactics
Scales (CTS2): Development and preliminary psychometric
data. Journal of Family Issues, 17(3),
283-316.
Straus, M. A., Hamby, S. L., Boney-McCoy, S., & Sugarman, D.
B. (1999). The personal and relation-
ships profile (PRP). Durham: University of New Hampshire,
Family Research Laboratory.
Straus, M. A., & Mouradian, V. E. (1999, November).
Preliminary psychometric data for the Personal and
Relationship Profile (PRP): A multi-scale tool for clinical
screening and research on partner violence.
Paper presented at the annual meeting of the American Society
of Criminology, Toronto, Canada.
Straus, M. A., & Ramirez, I. L. (2002, July). Gender symmetry
in prevalence, severity, and chronicity of
physical aggression against dating partners by university
students in Mexico and the USA. Paper pre-
sented at the annual meeting of the International Society for
Research on Aggression, Montreal,
Canada.
Tjaden, P., & Thoennes, N. (2000). Prevalence and
consequences of male-to-female and female-to-male
intimate partner violence as measured by the National Violence
Against Women Survey. Violence
Against Women, 6, 142-161.
Tolman, R. M. (1989). The development of a measure of
psychological maltreatment of women by their
male partners. Violence and Victims, 4(3), 159-177.
Michael P. Johnson is associate professor of sociology,
women’s studies, and African and African
American studies at the Pennsylvania State University. His
major areas of research are intimate partner
violence and commitment to personal relationships. His recent
papers are available at his Web site:
www.personal.psu.edu/mpj.
1018 Violence Against Women
<<
/ASCII85EncodePages false
/AllowTransparency false
/AutoPositionEPSFiles true
/AutoRotatePages /None
/Binding /Left
/CalGrayProfile (Dot Gain 20%)
/CalRGBProfile (sRGB IEC61966-2.1)
/CalCMYKProfile (U.S. Web Coated 050SWOP051 v2)
/sRGBProfile (sRGB IEC61966-2.1)
/CannotEmbedFontPolicy /Error
/CompatibilityLevel 1.3
/CompressObjects /Off
/CompressPages true
/ConvertImagesToIndexed true
/PassThroughJPEGImages true
/CreateJDFFile false
/CreateJobTicket false
/DefaultRenderingIntent /Default
/DetectBlends true
/ColorConversionStrategy /LeaveColorUnchanged
/DoThumbnails false
/EmbedAllFonts true
/EmbedJobOptions true
/DSCReportingLevel 0
/EmitDSCWarnings false
/EndPage -1
/ImageMemory 1048576
/LockDistillerParams false
/MaxSubsetPct 100
/Optimize false
/OPM 1
/ParseDSCComments true
/ParseDSCCommentsForDocInfo true
/PreserveCopyPage true
/PreserveEPSInfo true
/PreserveHalftoneInfo false
/PreserveOPIComments false
/PreserveOverprintSettings true
/StartPage 1
/SubsetFonts true
/TransferFunctionInfo /Apply
/UCRandBGInfo /Remove
/UsePrologue false
/ColorSettingsFile ()
/AlwaysEmbed [ true
]
/NeverEmbed [ true
]
/AntiAliasColorImages false
/DownsampleColorImages true
/ColorImageDownsampleType /Bicubic
/ColorImageResolution 300
/ColorImageDepth -1
/ColorImageDownsampleThreshold 1.50000
/EncodeColorImages true
/ColorImageFilter /DCTEncode
/AutoFilterColorImages true
/ColorImageAutoFilterStrategy /JPEG
/ColorACSImageDict <<
/QFactor 0.15
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/ColorImageDict <<
/QFactor 0.15
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/JPEG2000ColorACSImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 30
>>
/JPEG2000ColorImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 30
>>
/AntiAliasGrayImages false
/DownsampleGrayImages true
/GrayImageDownsampleType /Bicubic
/GrayImageResolution 300
/GrayImageDepth -1
/GrayImageDownsampleThreshold 1.50000
/EncodeGrayImages true
/GrayImageFilter /DCTEncode
/AutoFilterGrayImages true
/GrayImageAutoFilterStrategy /JPEG
/GrayACSImageDict <<
/QFactor 0.15
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/GrayImageDict <<
/QFactor 0.15
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/JPEG2000GrayACSImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 30
>>
/JPEG2000GrayImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 30
>>
/AntiAliasMonoImages false
/DownsampleMonoImages true
/MonoImageDownsampleType /Bicubic
/MonoImageResolution 1200
/MonoImageDepth -1
/MonoImageDownsampleThreshold 1.50000
/EncodeMonoImages true
/MonoImageFilter /CCITTFaxEncode
/MonoImageDict <<
/K -1
>>
/AllowPSXObjects false
/PDFX1aCheck false
/PDFX3Check false
/PDFXCompliantPDFOnly false
/PDFXNoTrimBoxError true
/PDFXTrimBoxToMediaBoxOffset [
0.00000
0.00000
0.00000
0.00000
]
/PDFXSetBleedBoxToMediaBox false
/PDFXBleedBoxToTrimBoxOffset [
0.00000
0.00000
0.00000
0.00000
]
/PDFXOutputIntentProfile (U.S. Web Coated 050SWOP051
v2)
/PDFXOutputCondition ()
/PDFXRegistryName (http://www.color.org)
/PDFXTrapped /Unknown
/SyntheticBoldness 1.000000
/Description <<
/FRA
<FEFF004f007000740069006f006e00730020007000650072006d
0065007400740061006e007400200064006500200063007200e90
0650072002000640065007300200064006f00630075006d006500
6e00740073002000500044004600200064006f007400e90073002
0006400270075006e00650020007200e90073006f006c00750074
0069006f006e002000e9006c0065007600e9006500200070006f00
75007200200075006e00650020007100750061006c0069007400e
90020006400270069006d007000720065007300730069006f006e
00200061006d00e9006c0069006f007200e90065002e002000490
06c002000650073007400200070006f0073007300690062006c00
65002000640027006f00750076007200690072002000630065007
300200064006f00630075006d0065006e00740073002000500044
0046002000640061006e00730020004100630072006f006200610
0740020006500740020005200650061006400650072002c002000
760065007200730069006f006e002000200035002e00300020006
f007500200075006c007400e9007200690065007500720065002e
>
/JPN
<FEFF3053306e8a2d5b9a306f30019ad889e350cf5ea6753b50cf3
092542b308000200050004400460020658766f830924f5c621030
59308b3068304d306b4f7f75283057307e3059300253705237664
2306e753b8cea3092670059279650306b4fdd306430533068304c
3067304d307e305930023053306e8a2d5b9a30674f5c621030573
05f00200050004400460020658766f8306f002000410063007200
6f0062006100740020304a3088307300200052006500610064006
5007200200035002e003000204ee5964d30678868793a3067304d
307e30593002>
/DEU
<FEFF00560065007200770065006e00640065006e00200053006
90065002000640069006500730065002000450069006e00730074
0065006c006c0075006e00670065006e0020007a0075006d00200
0450072007300740065006c006c0065006e00200076006f006e00
20005000440046002d0044006f006b0075006d0065006e0074006
5006e0020006d00690074002000650069006e0065007200200068
00f60068006500720065006e002000420069006c0064006100750
066006c00f600730075006e0067002c00200075006d0020006500
69006e00650020007600650072006200650073007300650072007
40065002000420069006c0064007100750061006c0069007400e4
00740020007a0075002000650072007a00690065006c0065006e0
02e00200044006900650020005000440046002d0044006f006b00
75006d0065006e007400650020006b00f6006e006e0065006e002
0006d006900740020004100630072006f0062006100740020006f
0064006500720020006d00690074002000640065006d002000520
065006100640065007200200035002e003000200075006e006400
20006800f600680065007200200067006500f600660066006e006
50074002000770065007200640065006e002e>
/PTB
<FEFF005500740069006c0069007a00650020006500730074006
1007300200063006f006e00660069006700750072006100e700f5
00650073002000700061007200610020006300720069006100720
0200064006f00630075006d0065006e0074006f00730020005000
44004600200063006f006d00200075006d0061002000720065007
3006f006c007500e700e3006f00200064006500200069006d0061
00670065006d0020007300750070006500720069006f007200200
0700061007200610020006f006200740065007200200075006d00
610020007100750061006c0069006400610064006500200064006
500200069006d0070007200650073007300e3006f0020006d0065
006c0068006f0072002e0020004f007300200064006f0063007500
6d0065006e0074006f0073002000500044004600200070006f006
40065006d0020007300650072002000610062006500720074006f
007300200063006f006d0020006f0020004100630072006f00620
0610074002c002000520065006100640065007200200035002e00
30002000650020007300750070006500720069006f0072002e>
/DAN
<FEFF00420072007500670020006400690073007300650020006
9006e0064007300740069006c006c0069006e0067006500720020
00740069006c0020006100740020006f007000720065007400740
0650020005000440046002d0064006f006b0075006d0065006e00
74006500720020006d006500640020006800f8006a00650072006
5002000620069006c006c00650064006f0070006c00f80073006e0
069006e006700200066006f00720020006100740020006600e500
20006200650064007200650020007500640073006b00720069006
600740073006b00760061006c0069007400650074002e00200050
00440046002d0064006f006b0075006d0065006e0074006500720
020006b0061006e002000e50062006e006500730020006d006500
640020004100630072006f0062006100740020006f00670020005
20065006100640065007200200035002e00300020006f00670020
006e0079006500720065002e>
/NLD
<FEFF004700650062007200750069006b002000640065007a006
500200069006e007300740065006c006c0069006e00670065006e
0020006f006d0020005000440046002d0064006f00630075006d0
065006e00740065006e0020007400650020006d0061006b006500
6e0020006d00650074002000650065006e00200068006f0067006
500720065002000610066006200650065006c00640069006e0067
0073007200650073006f006c007500740069006500200076006f0
06f0072002000650065006e002000620065007400650072006500
2000610066006400720075006b006b00770061006c00690074006
500690074002e0020004400650020005000440046002d0064006f
00630075006d0065006e00740065006e0020006b0075006e006e0
065006e00200077006f007200640065006e002000670065006f00
700065006e00640020006d006500740020004100630072006f006
20061007400200065006e00200052006500610064006500720020
0035002e003000200065006e00200068006f006700650072002e>
/ESP
<FEFF0055007300650020006500730074006100730020006f007
000630069006f006e006500730020007000610072006100200063
007200650061007200200064006f00630075006d0065006e00740
06f0073002000500044004600200063006f006e0020006d006100
79006f00720020007200650073006f006c00750063006900f3006e
00200064006500200069006d006100670065006e0020007000610
0720061002000610075006d0065006e0074006100720020006c00
61002000630061006c006900640061006400200061006c0020006
9006d007000720069006d00690072002e0020004c006f00730020
0064006f00630075006d0065006e0074006f00730020005000440
046002000730065002000700075006500640065006e0020006100
6200720069007200200063006f006e0020004100630072006f006
20061007400200079002000520065006100640065007200200035
002e003000200079002000760065007200730069006f006e00650
07300200070006f00730074006500720069006f00720065007300
2e>
/SUO
<FEFF004e00e4006900640065006e00200061007300650074007
5007300740065006e0020006100760075006c006c006100200076
006f0069006400610061006e0020006c0075006f0064006100200
05000440046002d0061007300690061006b00690072006a006f00
6a0061002c0020006a006f006900640065006e002000740075006
c006f0073007400750073006c00610061007400750020006f006e
0020006b006f0072006b006500610020006a00610020006b00750
0760061006e0020007400610072006b006b007500750073002000
730075007500720069002e0020005000440046002d00610073006
90061006b00690072006a0061007400200076006f006900640061
0061006e0020006100760061007400610020004100630072006f0
06200610074002d0020006a00610020004100630072006f006200
610074002000520065006100640065007200200035002e0030002
0002d006f0068006a0065006c006d0061006c006c006100200074
0061006900200075007500640065006d006d0061006c006c00610
02000760065007200730069006f006c006c0061002e>
/ITA
<FEFF00550073006100720065002000710075006500730074006
500200069006d0070006f007300740061007a0069006f006e0069
00200070006500720020006300720065006100720065002000640
06f00630075006d0065006e007400690020005000440046002000
63006f006e00200075006e00610020007200690073006f006c007
5007a0069006f006e00650020006d0061006700670069006f0072
0065002000700065007200200075006e006100200071007500610
06c0069007400e00020006400690020007300740061006d007000
610020006d00690067006c0069006f00720065002e00200049002
00064006f00630075006d0065006e007400690020005000440046
00200070006f00730073006f006e006f0020006500730073006500
720065002000610070006500720074006900200063006f006e002
0004100630072006f006200610074002000650020005200650061
00640065007200200035002e00300020006500200076006500720
0730069006f006e00690020007300750063006300650073007300
6900760065002e>
/NOR
<FEFF004200720075006b0020006400690073007300650020006
9006e006e007300740069006c006c0069006e00670065006e0065
002000740069006c002000e50020006f007000700072006500740
07400650020005000440046002d0064006f006b0075006d006500
6e0074006500720020006d006500640020006800f800790065007
20065002000620069006c00640065006f00700070006c00f80073
006e0069006e006700200066006f0072002000620065006400720
0650020007500740073006b00720069006600740073006b007600
61006c0069007400650074002e0020005000440046002d0064006
f006b0075006d0065006e00740065006e00650020006b0061006e
002000e50070006e006500730020006d006500640020004100630
072006f0062006100740020006f00670020005200650061006400
65007200200035002e00300020006f0067002000730065006e006
500720065002e>
/SVE
<FEFF0041006e007600e4006e00640020006400650020006800e
4007200200069006e0073007400e4006c006c006e0069006e0067
00610072006e00610020006e00e40072002000640075002000760
069006c006c00200073006b006100700061002000500044004600
2d0064006f006b0075006d0065006e00740020006d00650064002
0006800f6006700720065002000620069006c0064007500700070
006c00f60073006e0069006e00670020006f00630068002000640
0e40072006d006500640020006600e50020006200e40074007400
7200650020007500740073006b00720069006600740073006b007
60061006c0069007400650074002e0020005000440046002d0064
006f006b0075006d0065006e00740065006e0020006b0061006e0
02000f600700070006e006100730020006d006500640020004100
630072006f0062006100740020006f00630068002000520065006
100640065007200200035002e003000200065006c006c00650072
002000730065006e006100720065002e>
/ENU
<FEFF00550073006500200074006800650073006500200073006
5007400740069006e0067007300200066006f0072002000630072
0065006100740069006e006700200050004400460020006600690
06c0065007300200066006f00720020007300750062006d006900
7300730069006f006e00200074006f00200054006800650020005
3006800650072006900640061006e002000500072006500730073
002e0020005400680065007300650020007300650074007400690
06e0067007300200063006f006e00660069006700750072006500
6400200066006f00720020004100630072006f006200610074002
000760036002e0030002000300038002f00300036002f00300033
002e>
>>
>> setdistillerparams
<<
/HWResolution [2400 2400]
/PageSize [612.000 792.000]
>> setpagedevice

More Related Content

Similar to 1003Violence Against WomenVolume 12 Number 11Novembe.docx

Assessing Gender Role of Partner-Violent Men Using the Minneso.docx
Assessing Gender Role of Partner-Violent Men Using the Minneso.docxAssessing Gender Role of Partner-Violent Men Using the Minneso.docx
Assessing Gender Role of Partner-Violent Men Using the Minneso.docxgalerussel59292
 
M3A2by Jennif er Augustus.docx
M3A2by Jennif er Augustus.docxM3A2by Jennif er Augustus.docx
M3A2by Jennif er Augustus.docxsmile790243
 
Running head EVOLUTIONARY PSYCHOLOGY VIEW ON VIOLENCE .docx
Running head EVOLUTIONARY PSYCHOLOGY VIEW ON VIOLENCE            .docxRunning head EVOLUTIONARY PSYCHOLOGY VIEW ON VIOLENCE            .docx
Running head EVOLUTIONARY PSYCHOLOGY VIEW ON VIOLENCE .docxcowinhelen
 
2017.04.06 Dynamics of Public and Private Violence
2017.04.06 Dynamics of Public and Private Violence2017.04.06 Dynamics of Public and Private Violence
2017.04.06 Dynamics of Public and Private ViolenceNUI Galway
 
Running head ASSIGNMENT 3-ANNOTATED BIBLIOGRAPHY .docx
Running head ASSIGNMENT 3-ANNOTATED BIBLIOGRAPHY               .docxRunning head ASSIGNMENT 3-ANNOTATED BIBLIOGRAPHY               .docx
Running head ASSIGNMENT 3-ANNOTATED BIBLIOGRAPHY .docxtoddr4
 
Attributions And Assignment Of Responsibility In Sexual Harassment
Attributions And Assignment Of Responsibility In Sexual HarassmentAttributions And Assignment Of Responsibility In Sexual Harassment
Attributions And Assignment Of Responsibility In Sexual HarassmentSean Flores
 
Assignment E abuse and the family
Assignment E abuse and the familyAssignment E abuse and the family
Assignment E abuse and the familyEmily Bushey
 
Sex of an Act of Power and Effects of Gender Roles
Sex of an Act of Power and Effects of Gender RolesSex of an Act of Power and Effects of Gender Roles
Sex of an Act of Power and Effects of Gender RolesSara Manning
 
Narcissism, bullying, and social dominance in youth a longit
Narcissism, bullying, and social dominance in youth a longitNarcissism, bullying, and social dominance in youth a longit
Narcissism, bullying, and social dominance in youth a longitamit657720
 
Contents lists available atScienceDirectAggression and Vio.docx
Contents lists available atScienceDirectAggression and Vio.docxContents lists available atScienceDirectAggression and Vio.docx
Contents lists available atScienceDirectAggression and Vio.docxdickonsondorris
 
Contents lists available atScienceDirectAggression and Vio.docx
Contents lists available atScienceDirectAggression and Vio.docxContents lists available atScienceDirectAggression and Vio.docx
Contents lists available atScienceDirectAggression and Vio.docxbobbywlane695641
 
FP6540_M5_A2_Larouche_Susan
FP6540_M5_A2_Larouche_SusanFP6540_M5_A2_Larouche_Susan
FP6540_M5_A2_Larouche_SusanSusan Larouche
 
Literature Review
Literature ReviewLiterature Review
Literature ReviewMegan White
 
Marital Conflict Correlates, Structure, and ContextFrank D. F.docx
Marital Conflict Correlates, Structure, and ContextFrank D. F.docxMarital Conflict Correlates, Structure, and ContextFrank D. F.docx
Marital Conflict Correlates, Structure, and ContextFrank D. F.docxinfantsuk
 
Senior Research Project
Senior Research ProjectSenior Research Project
Senior Research Projectcees3
 
AGGRESSIVE BEHAVIORVolume 29, pages 366—380 (2003)Perpet.docx
AGGRESSIVE BEHAVIORVolume 29, pages 366—380 (2003)Perpet.docxAGGRESSIVE BEHAVIORVolume 29, pages 366—380 (2003)Perpet.docx
AGGRESSIVE BEHAVIORVolume 29, pages 366—380 (2003)Perpet.docxnettletondevon
 
16 Days 2013: Presentation based on UN Study, December 6, 2013
16 Days 2013: Presentation based on UN Study, December 6, 201316 Days 2013: Presentation based on UN Study, December 6, 2013
16 Days 2013: Presentation based on UN Study, December 6, 2013The Prajnya Trust
 

Similar to 1003Violence Against WomenVolume 12 Number 11Novembe.docx (20)

ferrellj_final
ferrellj_finalferrellj_final
ferrellj_final
 
Assessing Gender Role of Partner-Violent Men Using the Minneso.docx
Assessing Gender Role of Partner-Violent Men Using the Minneso.docxAssessing Gender Role of Partner-Violent Men Using the Minneso.docx
Assessing Gender Role of Partner-Violent Men Using the Minneso.docx
 
M3A2by Jennif er Augustus.docx
M3A2by Jennif er Augustus.docxM3A2by Jennif er Augustus.docx
M3A2by Jennif er Augustus.docx
 
Running head EVOLUTIONARY PSYCHOLOGY VIEW ON VIOLENCE .docx
Running head EVOLUTIONARY PSYCHOLOGY VIEW ON VIOLENCE            .docxRunning head EVOLUTIONARY PSYCHOLOGY VIEW ON VIOLENCE            .docx
Running head EVOLUTIONARY PSYCHOLOGY VIEW ON VIOLENCE .docx
 
2017.04.06 Dynamics of Public and Private Violence
2017.04.06 Dynamics of Public and Private Violence2017.04.06 Dynamics of Public and Private Violence
2017.04.06 Dynamics of Public and Private Violence
 
Running head ASSIGNMENT 3-ANNOTATED BIBLIOGRAPHY .docx
Running head ASSIGNMENT 3-ANNOTATED BIBLIOGRAPHY               .docxRunning head ASSIGNMENT 3-ANNOTATED BIBLIOGRAPHY               .docx
Running head ASSIGNMENT 3-ANNOTATED BIBLIOGRAPHY .docx
 
Domestic violence against men
Domestic violence against menDomestic violence against men
Domestic violence against men
 
Attributions And Assignment Of Responsibility In Sexual Harassment
Attributions And Assignment Of Responsibility In Sexual HarassmentAttributions And Assignment Of Responsibility In Sexual Harassment
Attributions And Assignment Of Responsibility In Sexual Harassment
 
Assignment E abuse and the family
Assignment E abuse and the familyAssignment E abuse and the family
Assignment E abuse and the family
 
Sex of an Act of Power and Effects of Gender Roles
Sex of an Act of Power and Effects of Gender RolesSex of an Act of Power and Effects of Gender Roles
Sex of an Act of Power and Effects of Gender Roles
 
Narcissism, bullying, and social dominance in youth a longit
Narcissism, bullying, and social dominance in youth a longitNarcissism, bullying, and social dominance in youth a longit
Narcissism, bullying, and social dominance in youth a longit
 
Contents lists available atScienceDirectAggression and Vio.docx
Contents lists available atScienceDirectAggression and Vio.docxContents lists available atScienceDirectAggression and Vio.docx
Contents lists available atScienceDirectAggression and Vio.docx
 
Contents lists available atScienceDirectAggression and Vio.docx
Contents lists available atScienceDirectAggression and Vio.docxContents lists available atScienceDirectAggression and Vio.docx
Contents lists available atScienceDirectAggression and Vio.docx
 
FP6540_M5_A2_Larouche_Susan
FP6540_M5_A2_Larouche_SusanFP6540_M5_A2_Larouche_Susan
FP6540_M5_A2_Larouche_Susan
 
Literature Review
Literature ReviewLiterature Review
Literature Review
 
Marital Conflict Correlates, Structure, and ContextFrank D. F.docx
Marital Conflict Correlates, Structure, and ContextFrank D. F.docxMarital Conflict Correlates, Structure, and ContextFrank D. F.docx
Marital Conflict Correlates, Structure, and ContextFrank D. F.docx
 
Senior Research Project
Senior Research ProjectSenior Research Project
Senior Research Project
 
AGGRESSIVE BEHAVIORVolume 29, pages 366—380 (2003)Perpet.docx
AGGRESSIVE BEHAVIORVolume 29, pages 366—380 (2003)Perpet.docxAGGRESSIVE BEHAVIORVolume 29, pages 366—380 (2003)Perpet.docx
AGGRESSIVE BEHAVIORVolume 29, pages 366—380 (2003)Perpet.docx
 
16 Days 2013: Presentation based on UN Study, December 6, 2013
16 Days 2013: Presentation based on UN Study, December 6, 201316 Days 2013: Presentation based on UN Study, December 6, 2013
16 Days 2013: Presentation based on UN Study, December 6, 2013
 
Criminology Paper
Criminology PaperCriminology Paper
Criminology Paper
 

More from tamicawaysmith

(No Plagiarism) Explain the statement Although many leading organi.docx
(No Plagiarism) Explain the statement Although many leading organi.docx(No Plagiarism) Explain the statement Although many leading organi.docx
(No Plagiarism) Explain the statement Although many leading organi.docxtamicawaysmith
 
 What made you choose this career path What advice do you hav.docx
 What made you choose this career path What advice do you hav.docx What made you choose this career path What advice do you hav.docx
 What made you choose this career path What advice do you hav.docxtamicawaysmith
 
 Patient Population The student will describe the patient populati.docx
 Patient Population The student will describe the patient populati.docx Patient Population The student will describe the patient populati.docx
 Patient Population The student will describe the patient populati.docxtamicawaysmith
 
 Dr. Paul Murray  Bessie Coleman  Jean-Bapiste Bell.docx
 Dr. Paul Murray  Bessie Coleman  Jean-Bapiste Bell.docx Dr. Paul Murray  Bessie Coleman  Jean-Bapiste Bell.docx
 Dr. Paul Murray  Bessie Coleman  Jean-Bapiste Bell.docxtamicawaysmith
 
 In depth analysis of your physical fitness progress  Term p.docx
 In depth analysis of your physical fitness progress  Term p.docx In depth analysis of your physical fitness progress  Term p.docx
 In depth analysis of your physical fitness progress  Term p.docxtamicawaysmith
 
 Information systems infrastructure evolution and trends  Str.docx
 Information systems infrastructure evolution and trends  Str.docx Information systems infrastructure evolution and trends  Str.docx
 Information systems infrastructure evolution and trends  Str.docxtamicawaysmith
 
⦁One to two paragraph brief summary of the book. ⦁Who is the.docx
⦁One to two paragraph brief summary of the book. ⦁Who is the.docx⦁One to two paragraph brief summary of the book. ⦁Who is the.docx
⦁One to two paragraph brief summary of the book. ⦁Who is the.docxtamicawaysmith
 
101018, 6(27 PMPage 1 of 65httpsjigsaw.vitalsource.co.docx
101018, 6(27 PMPage 1 of 65httpsjigsaw.vitalsource.co.docx101018, 6(27 PMPage 1 of 65httpsjigsaw.vitalsource.co.docx
101018, 6(27 PMPage 1 of 65httpsjigsaw.vitalsource.co.docxtamicawaysmith
 
100.0 Criteria10.0 Part 1 PLAAFP The PLAAFP thoroughly an.docx
100.0 Criteria10.0 Part 1 PLAAFP The PLAAFP thoroughly an.docx100.0 Criteria10.0 Part 1 PLAAFP The PLAAFP thoroughly an.docx
100.0 Criteria10.0 Part 1 PLAAFP The PLAAFP thoroughly an.docxtamicawaysmith
 
100635307FLORIDABUILDINGCODE Sixth Edition(2017).docx
100635307FLORIDABUILDINGCODE Sixth Edition(2017).docx100635307FLORIDABUILDINGCODE Sixth Edition(2017).docx
100635307FLORIDABUILDINGCODE Sixth Edition(2017).docxtamicawaysmith
 
102120151De-Myth-tifying Grading in Sp.docx
102120151De-Myth-tifying Grading             in Sp.docx102120151De-Myth-tifying Grading             in Sp.docx
102120151De-Myth-tifying Grading in Sp.docxtamicawaysmith
 
100.0 Criteria30.0 Flowchart ContentThe flowchart skillful.docx
100.0 Criteria30.0 Flowchart ContentThe flowchart skillful.docx100.0 Criteria30.0 Flowchart ContentThe flowchart skillful.docx
100.0 Criteria30.0 Flowchart ContentThe flowchart skillful.docxtamicawaysmith
 
100 words agree or disagree to eac questions Q 1.As her .docx
100 words agree or disagree to eac questions Q 1.As her .docx100 words agree or disagree to eac questions Q 1.As her .docx
100 words agree or disagree to eac questions Q 1.As her .docxtamicawaysmith
 
101118, 4(36 PMCollection – MSA 603 Strategic Planning for t.docx
101118, 4(36 PMCollection – MSA 603 Strategic Planning for t.docx101118, 4(36 PMCollection – MSA 603 Strategic Planning for t.docx
101118, 4(36 PMCollection – MSA 603 Strategic Planning for t.docxtamicawaysmith
 
100 words per question, no references needed or quotations. Only a g.docx
100 words per question, no references needed or quotations. Only a g.docx100 words per question, no references needed or quotations. Only a g.docx
100 words per question, no references needed or quotations. Only a g.docxtamicawaysmith
 
100A 22 4 451A 1034 51B 1000 101C 1100 11D 112.docx
100A 22 4 451A 1034  51B 1000 101C 1100  11D 112.docx100A 22 4 451A 1034  51B 1000 101C 1100  11D 112.docx
100A 22 4 451A 1034 51B 1000 101C 1100 11D 112.docxtamicawaysmith
 
10122018Week 5 Required Reading and Supplementary Materials - .docx
10122018Week 5 Required Reading and Supplementary Materials - .docx10122018Week 5 Required Reading and Supplementary Materials - .docx
10122018Week 5 Required Reading and Supplementary Materials - .docxtamicawaysmith
 
101416 526 PMAfter September 11 Our State of Exception by .docx
101416 526 PMAfter September 11 Our State of Exception by .docx101416 526 PMAfter September 11 Our State of Exception by .docx
101416 526 PMAfter September 11 Our State of Exception by .docxtamicawaysmith
 
100 words per question, no references needed or quotations. Only.docx
100 words per question, no references needed or quotations. Only.docx100 words per question, no references needed or quotations. Only.docx
100 words per question, no references needed or quotations. Only.docxtamicawaysmith
 
4 America on the World StageSuperStockEverett Collection.docx
4 America on the World StageSuperStockEverett Collection.docx4 America on the World StageSuperStockEverett Collection.docx
4 America on the World StageSuperStockEverett Collection.docxtamicawaysmith
 

More from tamicawaysmith (20)

(No Plagiarism) Explain the statement Although many leading organi.docx
(No Plagiarism) Explain the statement Although many leading organi.docx(No Plagiarism) Explain the statement Although many leading organi.docx
(No Plagiarism) Explain the statement Although many leading organi.docx
 
 What made you choose this career path What advice do you hav.docx
 What made you choose this career path What advice do you hav.docx What made you choose this career path What advice do you hav.docx
 What made you choose this career path What advice do you hav.docx
 
 Patient Population The student will describe the patient populati.docx
 Patient Population The student will describe the patient populati.docx Patient Population The student will describe the patient populati.docx
 Patient Population The student will describe the patient populati.docx
 
 Dr. Paul Murray  Bessie Coleman  Jean-Bapiste Bell.docx
 Dr. Paul Murray  Bessie Coleman  Jean-Bapiste Bell.docx Dr. Paul Murray  Bessie Coleman  Jean-Bapiste Bell.docx
 Dr. Paul Murray  Bessie Coleman  Jean-Bapiste Bell.docx
 
 In depth analysis of your physical fitness progress  Term p.docx
 In depth analysis of your physical fitness progress  Term p.docx In depth analysis of your physical fitness progress  Term p.docx
 In depth analysis of your physical fitness progress  Term p.docx
 
 Information systems infrastructure evolution and trends  Str.docx
 Information systems infrastructure evolution and trends  Str.docx Information systems infrastructure evolution and trends  Str.docx
 Information systems infrastructure evolution and trends  Str.docx
 
⦁One to two paragraph brief summary of the book. ⦁Who is the.docx
⦁One to two paragraph brief summary of the book. ⦁Who is the.docx⦁One to two paragraph brief summary of the book. ⦁Who is the.docx
⦁One to two paragraph brief summary of the book. ⦁Who is the.docx
 
101018, 6(27 PMPage 1 of 65httpsjigsaw.vitalsource.co.docx
101018, 6(27 PMPage 1 of 65httpsjigsaw.vitalsource.co.docx101018, 6(27 PMPage 1 of 65httpsjigsaw.vitalsource.co.docx
101018, 6(27 PMPage 1 of 65httpsjigsaw.vitalsource.co.docx
 
100.0 Criteria10.0 Part 1 PLAAFP The PLAAFP thoroughly an.docx
100.0 Criteria10.0 Part 1 PLAAFP The PLAAFP thoroughly an.docx100.0 Criteria10.0 Part 1 PLAAFP The PLAAFP thoroughly an.docx
100.0 Criteria10.0 Part 1 PLAAFP The PLAAFP thoroughly an.docx
 
100635307FLORIDABUILDINGCODE Sixth Edition(2017).docx
100635307FLORIDABUILDINGCODE Sixth Edition(2017).docx100635307FLORIDABUILDINGCODE Sixth Edition(2017).docx
100635307FLORIDABUILDINGCODE Sixth Edition(2017).docx
 
102120151De-Myth-tifying Grading in Sp.docx
102120151De-Myth-tifying Grading             in Sp.docx102120151De-Myth-tifying Grading             in Sp.docx
102120151De-Myth-tifying Grading in Sp.docx
 
100.0 Criteria30.0 Flowchart ContentThe flowchart skillful.docx
100.0 Criteria30.0 Flowchart ContentThe flowchart skillful.docx100.0 Criteria30.0 Flowchart ContentThe flowchart skillful.docx
100.0 Criteria30.0 Flowchart ContentThe flowchart skillful.docx
 
100 words agree or disagree to eac questions Q 1.As her .docx
100 words agree or disagree to eac questions Q 1.As her .docx100 words agree or disagree to eac questions Q 1.As her .docx
100 words agree or disagree to eac questions Q 1.As her .docx
 
101118, 4(36 PMCollection – MSA 603 Strategic Planning for t.docx
101118, 4(36 PMCollection – MSA 603 Strategic Planning for t.docx101118, 4(36 PMCollection – MSA 603 Strategic Planning for t.docx
101118, 4(36 PMCollection – MSA 603 Strategic Planning for t.docx
 
100 words per question, no references needed or quotations. Only a g.docx
100 words per question, no references needed or quotations. Only a g.docx100 words per question, no references needed or quotations. Only a g.docx
100 words per question, no references needed or quotations. Only a g.docx
 
100A 22 4 451A 1034 51B 1000 101C 1100 11D 112.docx
100A 22 4 451A 1034  51B 1000 101C 1100  11D 112.docx100A 22 4 451A 1034  51B 1000 101C 1100  11D 112.docx
100A 22 4 451A 1034 51B 1000 101C 1100 11D 112.docx
 
10122018Week 5 Required Reading and Supplementary Materials - .docx
10122018Week 5 Required Reading and Supplementary Materials - .docx10122018Week 5 Required Reading and Supplementary Materials - .docx
10122018Week 5 Required Reading and Supplementary Materials - .docx
 
101416 526 PMAfter September 11 Our State of Exception by .docx
101416 526 PMAfter September 11 Our State of Exception by .docx101416 526 PMAfter September 11 Our State of Exception by .docx
101416 526 PMAfter September 11 Our State of Exception by .docx
 
100 words per question, no references needed or quotations. Only.docx
100 words per question, no references needed or quotations. Only.docx100 words per question, no references needed or quotations. Only.docx
100 words per question, no references needed or quotations. Only.docx
 
4 America on the World StageSuperStockEverett Collection.docx
4 America on the World StageSuperStockEverett Collection.docx4 America on the World StageSuperStockEverett Collection.docx
4 America on the World StageSuperStockEverett Collection.docx
 

Recently uploaded

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

1003Violence Against WomenVolume 12 Number 11Novembe.docx

  • 1. 1003 Violence Against Women Volume 12 Number 11 November 2006 1003-1018 © 2006 Sage Publications 10.1177/1077801206293328 http://vaw.sagepub.com hosted at http://online.sagepub.com Conflict and Control Gender Symmetry and Asymmetry in Domestic Violence Michael P. Johnson The Pennsylvania State University, University Park Four types of individual partner violence are identified based on the dyadic control context of the violence. In intimate terrorism, the individual is violent and controlling, the partner is not. In violent resistance, the individual is violent but not controlling; the partner is the violent and controlling one. In situational couple violence, although the individual is violent, neither the individual nor the partner is violent and controlling. In mutual violent control, the individual and the partner are violent and controlling.
  • 2. Evidence is presented that situational couple violence dominates in general surveys, intimate terrorism and violent resistance dominate in agency samples, and this is the source of differences across studies with respect to the gender symmetry of partner vio- lence. An argument is made that if we want to understand partner violence, intervene effectively in individual cases, or make useful policy recommendations, we must make these distinctions in our research. Keywords: gender symmetry; intimate terrorism; mutual violent control; situational couple violence; violent resistance The central argument of this article is that there are four major types of intimatepartner violence and that the failure to distinguish among them has left us with a domestic violence literature that, to a large extent, may be uninterpretable. The types of domestic violence (situational couple violence, intimate terrorism, violent resistance, and mutual violent control) are defined conceptually in terms of the con- trol motives of the violent member(s) of the couple, motives that are identified oper- ationally by patterns of controlling behavior that indicate an attempt to exercise general control over one’s partner. With respect to implications for the question of gender symmetry, these types of domestic violence differ dramatically. In hetero- sexual relationships, intimate terrorism is perpetrated almost exclusively by men, whereas violent resistance is found almost exclusively among
  • 3. women. The other two types are gender symmetric. With respect to the general importance of distinguish- ing among types of violence, I believe that they have different causes, different pat- terns of development, different consequences, and that they require different forms of intervention. 1004 Violence Against Women Resolving the Gender Symmetry Debate The long-standing argument in the family literature regarding the gender symmetry of intimate partner violence takes the form of a disagreement about the nature of het- erosexual intimate partner violence, as if heterosexual partner violence were a single phenomenon. One side of the debate, generally referred to as the feminist perspective (Kurz, 1989), presents compelling empirical evidence that heterosexual intimate part- ner violence is largely a problem of men assaulting female partners (Dobash, Dobash, Wilson, & Daly, 1992). The other side, generally taken in the family violence per- spective, presents equally compelling empirical evidence that women are at least as violent as men in such relationships (Straus, 1999). How can they both be right? In 1995, I published an article that argued that the answer to this question is that:
  • 4. (a) partner violence is not a unitary phenomenon, (b) the two groups of researchers gen- erally use different sampling strategies, (c) the different sampling strategies tap different types of partner violence, and (d) these types differ in their relationship to gender (Johnson, 1995). I argued further that the types probably also differ with respect to their causes, the nature of the violence itself, the development of the violence during the course of a relationship, its consequences, and the type of intervention required. If these argu- ments are correct, then it follows that we cannot draw any conclusions about the nature of partner violence from studies that do not distinguish among types of partner violence (Johnson & Ferraro, 2000). Nevertheless, studies continue to be published regularly that treat partner violence as a unitary phenomenon, many of them claiming to provide fur- ther evidence on the gender symmetry issue. For example, Archer’s (2000) influential meta-analysis of the evidence regarding gender symmetry, in spite of citing my 1995 arti- cle, essentially ignored the proposed distinctions among types of violence and concluded that women are slightly more violent than men in heterosexual partnerships. Here is the basic argument of the 1995 article. With regard to sampling, I argued that general differences in sampling strategies were the major source of the ostensible inconsistencies between the feminist and family violence data. In general, the studies that demonstrated the predominance of male violence used
  • 5. agency data (courts, police agencies, hospitals, and shelters), whereas the studies that showed gender symmetry involved so-called representative samples. I argued that both of these sampling strate- gies are heavily biased: the former through its use of biased sampling frames (agen- cies), the latter through refusals. Although the biases of agency sampling frames have generally been taken to be obvious (Straus, 1990b), representative sample surveys have mistakenly been assumed to be unbiased. The final samples of so-called random sam- ple surveys are, of course, not random, due to refusals. I estimated, for example, that the refusal rate in the National Family Violence Surveys was approximately 40% rather than the 18% usually reported (Johnson, 1995). Could there be two qualitatively dif- ferent forms of partner violence, one gender symmetric and overselected in general surveys, the other committed primarily by men and overselected in agency samples? To address this question, I identified a number of agency-based studies that used the Conflict Tactics Scales (CTS; Johnson, 1995) to assess the nature of partner violence in agency samples and compared them with general surveys that used the same instru- ment.1 My conclusion from this comparison was that the two sampling strategies iden- tified partner violence that differed not only in gender symmetry but also in frequency
  • 6. of per-couple incidents, escalation, severity of injuries, and mutuality. Agency samples identified partner violence that was more frequent, more likely to escalate, more severe, less likely to be mutual, and perpetrated almost entirely by men. This gender- asymmetric pattern resonated for me with feminist analyses of partner violence as one tactic in a general pattern of controlling behaviors used by some men to exercise gen- eral control over “their” women (Dobash & Dobash, 1979; Pence & Paymar, 1993; Stark & Flitcraft, 1996). The asymmetry of such control contrasted dramatically, it seemed to me, with the family violence perspective’s predominantly symmetric image of partner violence as a matter of conflict. I hypothesized that there were two qualitatively different forms and/or patterns of intimate partner violence—one that was part of a general strategy of power and control (intimate terrorism), the other involving violence that was not part of a general pattern of control, probably a product of the escalation of couple conflict into violence (situational couple violence).2 Furthermore, I argued that, on one hand, couples involved in situational couple violence would be unlikely to become agency clients because such situationally provoked violence would not in most cases call for police intervention, emergency room visits, protection from abuse orders, or divorce. On the other hand, couples involved in intimate terrorism would be unlikely to agree
  • 7. to participate in general surveys because victims fear reprisals from the batterer, and batterers fear exposing themselves to intervention by the police or other agencies. Although these arguments seemed reasonable enough, my 1995 literature review pro- vided no direct evidence of their validity because none of the studies reviewed made such distinctions among types of violence.3 Distinguishing Among Types of Heterosexual Intimate Partner Violence First, I want to discuss one approach to assessing differences in the extent to which an individual’s violence toward his or her partner is embedded in a general context of control, then I will move on to the implications of taking into account the behavior of the partner. The basic idea is to look at a variety of nonviolent, controlling behaviors to identify individuals who behave in a manner that indicates a general motive to con- trol. Note that (a) this moves the focus from the nature of any one encounter between the partners to a search for patterns of behavior in the relationship as a whole, and (b) it most certainly is not based in the nature of the violent acts themselves. Some critics Johnson / Conflict, Control, and Domestic Violence 1005 have argued that I am simply making the old distinction between more serious and less
  • 8. serious violence. I disagree. The distinction lies in the degree of control present. I assume that there is considerable variability in the nature of the violent acts involved in controlling and noncontrolling violence, a variability that would lead to consider- able overlap between them in terms of the “seriousness” of the violence. Although I do have some hypotheses about average differences among types of violence in terms of the nature of the violent acts involved, the types themselves are defined by the degree of control, not by characteristics of the violence. Thus, if we want to make these dis- tinctions, surveys need to ask questions not just about violence but also about the use of a variety of other control tactics in the relationship. Before I proceed to illustrate this general measurement strategy with data from Frieze’s 1970s Pittsburgh study, however, I need to move the 1995 discussion from the individual to the dyadic level. The initial distinction between intimate terrorism and situational couple violence was focused too narrowly on the behavior of one violent partner. If one considers the behavior of both people in the relationship, one can iden- tify four basic types of individual violence.4 First, an individual can be violent and non- controlling and in a relationship with a partner who is either nonviolent or who is also violent and noncontrolling. This is what I called situational couple violence. Second, one can be violent and noncontrolling but in a relationship with a violent and control-
  • 9. ling partner. Given that the behavior of the partner suggests an attempt to exert general control, I labeled this type of violence violent resistance. Third, one can be violent and controlling and in a relationship with a partner who is either nonviolent or violent and noncontrolling. This is the pattern I have called intimate terrorism. Finally, a violent and controlling individual may be paired up with another violent and controlling part- ner. I have labeled this mutual violent control. To make these distinctions, one would have to ask questions regarding a variety of control tactics in addition to violence, ask them with regard to both partners, and do so in a data set that was likely to include rep- resentatives of each of the four types. I was able to find one such data set, Irene Frieze’s data from interviews with 274 married and formerly-married women living in southwestern Pennsylvania in the late 1970s (Frieze, 1983; Frieze & Browne, 1989; Frieze & McHugh, 1992). Her mixed sampling design seemed likely to represent the major types of violence—it included women selected from shelters and courts (an agency sample) and a matched sample of women who lived in the same neighborhoods (a general survey sample). It might be useful to know some of the general characteristics of the sample, keeping in mind that these will be determined to a large extent by the biases of the initial court and shelter populations because the “general”
  • 10. sample was matched by neighborhood and is, therefore, likely to be similar in general demographics. The sample was predominantly White (86% White, 14% Black) and working class (56% had a high school education or less; only 21% had finished college). About one third of the women worked full-time, one sixth part-time, and about one half were full- time homemakers. Median age at the time of the interview was 32 years; however, 1006 Violence Against Women ages ranged from 18 to 83 years. Median age at marriage was 21 years but ranged from 15 to 59 years. As this is clearly not a representative sample, it would not be useful to make any general statements about the prevalence of violence; of course, all of the women in the court and shelter samples had experienced violence from their partners, as had 34% of the general sample. Only one third of the women in the court and shelter samples were still with their husband, compared with about three fourths of those in the general sample. From the lengthy interview protocols, I identified a number of items tapping con- trol tactics that did not involve violence toward one’s partner. Seven measures were created to tap control tactics analogous to those identified by Pence and Paymar
  • 11. (1993): threats, economic control, use of privilege and punishment, using children, isolation, emotional abuse, and sexual control. Threats Each measure of threats (one for husbands, the other for wives) is the mean of two items with 5-point response formats ranging from no, never (1) to often (5). The first item is: “Has your husband (Have you) ever gotten angry and threatened [emphasis in survey instrument] to use physical force with you (him)?” The second item was: “Is he (Are you) ever violent in other ways (such as throwing objects)?” For wives’ reports of their husband’s behavior, the mean of this variable is 2.72 (between “once” and “two or three times”), the standard deviation 1.51, and the range from 1.00 to 5.00. Cronbach’s alpha for the two-item scale is .74. For wives’ reports of their own behavior, the mean is 1.99 (“once”), the standard deviation 1.05, the range is from 1.00 to 5.00, and alpha is .46. Economic Control Economic control is the average of two dichotomized items. The first asks, “Who decides how the family money will be spent in terms of major expenses?” It was dichotomized with a high score indicating that either “husband (wife) makes entire decision” or “husband (wife) has deciding vote.” The second item asked for an open-
  • 12. ended response to, “How much money do you (does your husband) have to spend during an average week without accounting to anyone?” The dichotomization cut- point was chosen to make this second item more an indicator of control than of dis- posable income: A response of US$10 or less indicated high control, one of more than $10 indicated low control. For husbands’ economic control, the two-item scale has a mean of 1.36, a standard deviation of .39, ranges from 1.00 to 2.00, and has an alpha of .46. For wives, the mean is 1.20, the standard deviation .27, the range from 1.00 to 2.00, and alpha is .12. Johnson / Conflict, Control, and Domestic Violence 1007 Use of Privilege and Punishment This scale is the mean of six items, each of which indicates that the target person uses one of the following tactics to get his or her spouse to do what he or she wants.5 The six items were: (a) “suggests that you should do something because he knows best or because he feels he is an expert at a particular thing,” (b) “stops having sex with you,” (c) “threatens to leave you,” (d) “emotionally withdraws,” (e) “suggest[s] that you should do something because other people do,” and (f) “restricts your free- dom.” The response format for all items addresses frequency,
  • 13. ranging from never (1) to rarely (3) to always (5). For husbands, the scale has a mean of 2.03 (“rarely”), a standard deviation of .81, ranges from 1.00 to 4.83, and has an alpha of .76. For wives, the mean is 1.92 (“rarely”), the standard deviation .62, the range is from 1.00 to 4.19, and alpha is .65. Using Children There are three items in this data set that get at a spouse’s use of the children to get his or her way with his or her partner. Two of them involve responses to the ques- tion, “When your husband is angry with you, how does he show it?” The two relevant response options were “Directs his anger to the children or pets” and “Uses physical violence with the children.” The third item is, “Does he ever try to get what he wants by doing any of the following to you? How often?” One of the actions listed is, “uses physical force against the kids to get what he wants from you,” with the five response options ranging from never to always. This item was dichotomized between never and rarely, and the three items were averaged. For wives’ reports of their husband’s behavior, the mean was 1.19, the standard deviation .30, the range from 1.00 to 2.00, and alpha equal to .68. For wives’ reports of their own behavior, the mean was 1.12, standard deviation .21, the range from 1.00 to 2.00, and alpha equal to .41.
  • 14. Isolation The measure of isolation is the mean of two items with 5-point response formats ranging from never to always. The items are: “Does your husband know where you are when you are not together?” and “Are there places you might like to go but don’t because you feel your husband wouldn’t want you to—How often does this hap- pen?” For wives’ reports of their husband’s behavior, the mean of this measure is 3.32 (between sometimes and usually), the standard deviation is .77, the observed range is from 1.00 to 5.00, and alpha is equal to .09. For wives’ reports of their own behavior, the mean is 2.64 (between rarely and sometimes), the standard deviation is .84, the range from 1.00 to 5.00, and alpha equals .06. 1008 Violence Against Women Emotional Abuse The three-item emotional abuse scale includes one item that gets at active abuse (sex is sometimes unpleasant because “He compares you unfavorably to other women”), and two “passive abuse” items that indicate that he never or rarely praises, and never or rarely is “nice to you in other ways (smiling, concerned with how you are feeling, calling you affectionate names, etc.).” All three items are dichotomies.
  • 15. For husbands, the mean is 1.25, the standard deviation is .33, the scale ranges from 1.00 to 2.00, and alpha is .57. For wives, the mean is 1.08, the standard deviation is .21, the range is from 1.00 to 2.00, and alpha is .48. Sexual Control There are two items in the sexual control scale, tapping whether sex is ever unpleas- ant because “he forces me to have sex when I don’t want to,” or “he makes you do things you don’t want to do.” Both items are dichotomies. For husbands, the mean is 1.22, the standard deviation .36, the range is 1.00 to 2.00, and alpha is .70. For wives, the mean is 1.02, the standard deviation .01, the range is 1.00 to 2.00, and alpha is .35. Types of Intimate Partner Violence Each of these measures was standardized and entered into a cluster analysis. The clus- tering algorithm was Ward’s method, an agglomerative approach that selects each new case to add to a cluster based on its effect on the overall homogeneity of the cluster, and which therefore tends to produce tightly defined clusters, rather than strings (Aldenderfer & Blashfield, 1984, pp. 43-45). Euclidean distance was the measure of dissimilarity. The index of dissimilarity for one cluster through 15-cluster solutions was examined. The results indicated a two-cluster solution as optimal, and the pattern was quite
  • 16. simple, with one cluster exhibiting a high average on all seven of the control tactics, the other being relatively low on all seven. The results of the cluster analysis were then used to distinguish controlling from noncontrolling violence at the individual level, that is, for each husband and wife. Finally, data regarding both partners were used to distinguish among types of individual violence, as defined above. Table 1 presents data only on violent individuals, that is, those who had been violent in their relationship at least once (67% of the husbands and 54% of the wives). The question tapping violence was: “Has he (Have you) ever actually slapped or pushed you (him) or used other physical force with you (him)?” The table places individual violence within its dyadic control context, distinguishing among four types of individual violent behavior.6 The first row, “intimate terrorism,” refers to relationships in which only one of the spouses is violent and controlling. The other spouse is either nonviolent or has used violence but is not controlling. In this data set, that violent and controlling spouse Johnson / Conflict, Control, and Domestic Violence 1009 is the husband in 94 of the 97 cases. The second row refers to cases in which the focal spouse is violent but not controlling, and his or her partner is violent and controlling.
  • 17. I call it violent resistance, and it is almost entirely a woman’s type of violence in this sample of heterosexual relationships. Of course, that is because in these marriages almost all of the intimate terrorism is perpetrated by men, and in some cases the wives do respond with violence, although rarely are they also controlling (see mutual violent control below). In the third row, we have “situational couple violence,” individual non- controlling violence in a dyadic context in which neither of the spouses is violent and controlling. It is close to gender symmetric, at least by the crude criterion of prevalence. (Data on the frequency and consequences of men’s and women’s situational couple vio- lence, not shown, indicate that by other criteria men are more violent than women even within situational couple violence.) The last row, “mutual violent control,” refers to con- trolling violence in a relationship in which both spouses are violent and controlling. There were only five such couples (10 individuals) in this data set, and among hetero- sexual couples such violence is by definition gender symmetric. Now, let’s take a quick look at the characteristics of the violent acts involved in men’s intimate terrorism and situational couple violence, to see if they fall in line with what I found in my 1995 literature review. The violence in men’s intimate terrorism was quite frequent; the median number of incidents in these marriages is 18.7 Violence was much less frequent in men’s situational couple violence with a median of three violent events.
  • 18. Intimate terrorism was reported to escalate in 76% of the cases, situational couple vio- lence in only 28%.8 In terms of injuries, the violence of intimate terrorism was some- times severe in 76% of the cases, compared with 28% of the cases of situational couple violence.9 In men’s intimate terrorism, wives rarely respond with violence; the median of the ratio of number of times the wife had been violent to the number of times the husband had been violent is .17. In men’s situational couple violence, the median ratio was .40. These data do not leave much doubt that intimate terrorism and situational cou- ple violence are not the same phenomenon.10 Finally, let me nail down my sampling argument, that general survey samples tap pri- marily situational couple violence, whereas agency samples give access primarily to intimate terrorism. Again, looking only at male violence, Table 2 shows that the general 1010 Violence Against Women Table 1 Individual Violent Behavior by Gender (Violent Individuals Only, as Reported by Wives, Percentages) Husbands Wives n Intimate terrorism 97 3 97 Violent resistance 4 96 77 Situational couple violence 56 44 146 Mutual violent control 50 50 10
  • 19. sample typical of family violence research includes almost nothing but situational cou- ple violence, with only 11% of the violence being intimate terrorism. In stark contrast, the court and shelter samples that are typical of feminist research get at violence that is predominantly intimate terrorism. What kind of mistakes can this generate? The article on the “battered husband syn- drome” that initiated the gender symmetry debate (Steinmetz, 1977) is an excellent example of the danger of thinking that a general sample provides information about what we conventionally mean by “domestic violence,” that is, intimate terrorism. Steinmetz told anecdotes about true husband battering, involving violent women who are intimate terrorists in the sense described above. However, she then cited general survey data, which we now know represent primarily situational couple violence, to make her case that such battering is as frequent a problem as is wife battering. The data she presented, in fact, have nothing to do with husband battering. Serious as husband battering may be in each par- ticular case, as a general phenomenon it is dramatically less frequent than wife battering. Similarly, one can err by assuming that the patterns observed in agency samples describe all partner violence. It is common for shelter workers to argue in educa-
  • 20. tional programs that violence always escalates, that if he hit you once he’ll do it again, and that it will get worse. Such a pattern is, as shown above, much more true of intimate terrorism than of situational couple violence, and of course intimate ter- rorism is what we generally see in our shelter work. However, most couples who experience violence, including those in our audiences, are involved in situational couple violence.11 For those audience members, we are providing an inaccurate pic- ture of the likely course of their relationships. Dramatic as these sampling biases are, Table 2 also shows that neither type of male violence is found exclusively in one type of sample, implying that it is possible to study the differences between these two types of violence in a variety of research settings. First, the 11% of men’s violence that is intimate terrorism in the general sample indi- cates that, with large enough samples, it may be possible to study situational couple Johnson / Conflict, Control, and Domestic Violence 1011 Table 2 Who is Finding Whom? (Violent Husbands Only, as Reported by Wives, Percentages) Survey Sample Court Sample Shelter Sample (n = 37) (n = 34) (n = 43) Mutual violent control 0 3 0
  • 21. Intimate terrorism 11 68 79 Violent resistance 0 0 2 Situational couple violence 89 29 19 Note: For simplicity, Table 2 presents data only on husbands. For wives, the general survey sample is dom- inated by situational couple violence, and the court and shelter samples are dominated by violent resistance. violence and intimate terrorism with survey data. To do that, of course, we need to include questions that will allow us to distinguish one from the other. Second, because women do bring cases of situational couple violence to the courts (29%) and to shel- ters (19%), researchers in those contexts would be able to study the effects of various intervention strategies on the two types of violence. Again, however, it won’t happen unless we gather information that will allow us to make these distinctions. Implications for Measurement The evidence I have just presented regarding the dramatic differences between inti- mate terrorism and situational couple violence (in terms of gender, per-couple frequency of incidents, escalation, severity of injury, and reciprocity) should serve as a warning that until further notice we have to assume that the answers to all of our important questions about domestic violence may be different for the different forms of violence. How do we
  • 22. collect and analyze data to allow us to make the necessary distinctions? The general strategy for making such distinctions involves two steps. First, and most critically, we must gather information on a variety of control tactics for both members of the couple. Not all surveys do this. It was fortunate that Irene Frieze had the foresight to collect such data in the 1970s. I have been using a number of other data sets to try to operationalize these distinctions and have had to dance around major shortcomings. The recent National Violence Against Women Survey (Johnson & Leone, 2000; Tjaden & Thoennes, 2000) asks a number of control tactics ques- tions about the attacker but gathers no information about the behavior of the respon- dent. Susan Lloyd’s (Leone, Johnson, Cohan, & Lloyd, 2001; Lloyd & Taluc, 1999) data from a poor neighborhood in Chicago have the same shortcoming. The National Family Violence surveys (Straus & Gelles, 1990) ask about the behavior of both partners but do not assess a variety of control tactics. We need to insist that every study of partner violence asks questions about the control tactics and the violence used by both partners. However, what questions to ask? Whatever the drawbacks of the Conflict Tactics Scales (CTS) may be (Dobash et al., 1992), they have made the considerable contribu- tion of having provided a standard approach to assessing
  • 23. violence. As yet, there appears to be no standard approach to the assessment of control, although a number of scholars have developed scales that are reasonable candidates, including Marshall (1996) on psychological abuse, Stets (1993) on control, Tolman (1989) on psychological mal- treatment, Pence and Paymar (1993) on power and control, Straus and his colleagues’ (Straus, Hamby, Boney-McCoy, & Sugarman, 1996; Straus, Hamby, Boney-McCoy, & Sugarman, 1999; Straus & Mouradian, 1999) revised Conflict Tactics Scales and Personal and Relationships Profile, and, most recently, Cook and Goodman (this issue) in their Coercion and Conflict in Abuse Experiences Scale. It would be very helpful if some consensus could be developed on a standard set of control measures.12 1012 Violence Against Women When we have the data, we face the task of using it to create a typology of con- trolling and noncontrolling violence. In my early work, I approached this problem through the use of cluster analysis; one could similarly use latent class analysis for dichotomous items. Cluster analysis and latent class analysis identify clusters of individuals who have similar profiles of responses to a set of items, and they provide statistical criteria for choosing the optimal number of groups (clusters or classes) for
  • 24. describing a particular data set. The problem is that they do not provide clear-cut cri- teria for distinguishing the members of one group from those in others, and there is therefore no straightforward way of comparing the results of cluster analyses from different samples. Thus, in more recent work, I have simply created a control scale and dichotomized it to identify high- and low-control individuals. I have found that in the three secondary data sets with which I have been working there are fairly strong relationships between the cluster solutions and a simple scale score created out of the same control items. This approach has the advantage of providing clear criteria for placement into the four types of violence, so that comparisons can be made across studies. In a series of analyses of available data sets, my colleagues and I have shown that the violence types are related as expected to characteristics of the actual violence (frequency, escalation, severity, and mutuality) and to various phys- ical and psychological effects on the victim (posttraumatic stress symptoms, general health, injury, interference with work) and on the relationship (Johnson, 1999; Johnson, Conklin, & Menon, 2002; Johnson & Leone, 2005; Leone, Johnson, & Cohan, 2003; Leone, Johnson, Cohan, & Lloyd, 2004). Whatever specific approach we choose, I believe it is critical that we reassess con- clusions that have been drawn from a literature that has failed to make these critical
  • 25. distinctions. We have to be wary of findings that treat situational couple violence, intimate terrorism, violent resistance, and mutual violent control as a single phe- nomenon. Situational couple violence, intimate terrorism, violent resistance, and mutual violent control simply cannot have the same causes, developmental trajec- tory, consequences, or prognosis for effective intervention. If we want to understand partner violence, to intervene effectively in individual cases, or to make useful pol- icy recommendations, we must make these distinctions in our research. Postscript Since the original version of this article was presented in 2000 (Johnson, 2000) at a National Institute of Justice workshop, considerable progress has been made in research on different types of intimate partner violence. Janel Leone and I, using the National Violence Against Women data, have shown that victims of intimate terror- ism are attacked more frequently and experience violence that is less likely to stop. They are more likely to be injured, to exhibit more of the symptoms of posttraumatic stress syndrome, to use painkillers (perhaps also tranquilizers), and to miss work. Johnson / Conflict, Control, and Domestic Violence 1013
  • 26. They have left their husbands more often and, when they do leave, are more likely to acquire their own residence (Johnson & Leone, 2005). Using data from a study of a poor neighborhood in Chicago, my colleagues and I found that victims of intimate terrorism reported poorer general health, a greater likelihood of visiting a doctor, more psychological distress, and a greater likelihood of receiving government assis- tance (Leone et al., 2004). Leone’s dissertation (Leone et al., 2003), using data from the Chicago Women’s Health Risk Study, demonstrated that victims of intimate ter- rorism were more likely than victims of situational couple violence to seek formal help (e.g., police, medical, counseling), and that this association was mediated by other factors, including violence severity, injuries, and perceived social support. They were not more likely to seek help from family or friends. Alison Cares and I (Johnson & Cares, 2004), using Frieze’s Pittsburgh data, have shown that childhood experi- ences of family violence are strongly related to adult perpetration of intimate terror- ism, but not to situational couple violence. Amy Holtzworth-Munroe and her colleagues (Holtzworth- Munroe, 2000, 2002; Holtzworth-Munroe, Meehan, Herron, Rehman, & Stuart, 2003; Holtzworth-Munroe, Rehman, & Herron, 2000) have continued their line of research that uses cluster analy- sis to distinguish among types of perpetrators. They generally found three clusters, one
  • 27. corresponding to situational couple violence (which they label family only), and two others that appear to correspond to two types of intimate terrorists (borderline/dysphoric and generally violent/antisocial). The clusters differ, among other things, in terms of the personality of the perpetrators, the pattern of violence, the perpetrators’ attitudes toward women, and the general level of control exercised in their relationships (with the high control scores of borderline/dysphoric and generally violent/antisocial perpetrators sup- porting my assumption that these men are involved in intimate terrorism, whereas the family-only perpetrators are more likely involved in situational couple violence). Graham-Kevan and Archer (2003a, 2003b) collected data on violence and control from British samples of women residing at Women’s Aid refuges and their partners, male and female students, men attending male treatment programs for domestic violence and their partners, and male prisoners and their partners. Their cluster analyses confirm the distinction between intimate terrorism and situational couple violence and show support for my findings regarding differences in the frequency and severity of violence. In spite of this progress, the gender symmetry debate continues, ignoring these demonstrations that there are different types of intimate partner violence and that data that do not distinguish among them are problematic at best.
  • 28. Papers continue to be published using general survey data to demonstrate that men and women are equally violent, and implying through their generalizations about violence or domes- tic violence or intimate partner violence that men and women are equally likely to be involved in intimate terrorism (e.g., Capaldi & Owen, 2001; Moffitt, Robins, & Caspi, 2001; Straus & Ramirez, 2002). Even recent reviews of the literature that debunk the myth of gender symmetry continue to focus on measurement issues as the major 1014 Violence Against Women source of contradictory findings (Kimmel, 2002; Saunders, 2002). Frustrating as this is to me, all I can do is assume that we are in the midst of a gradual recognition that domestic violence is not a unitary phenomenon, and that we are close to a tipping point at which we will see a dramatic decline in the number of published studies that simply compare violent with nonviolent relationships without making distinctions among types of violence. The evidence is accumulating that I was right when I argued in the early 1990s that “If we want to understand partner violence, to intervene effec- tively in individual cases, or to make useful policy recommendations, we must make these distinctions in our research” (Johnson, 1993, n.p.).
  • 29. Notes 1. Much of the gender debate in the literature has centered on the inadequacies of the Conflict Tactics Scales (CTS) as a means to assess intimate partner violence (Dobash, Dobash, Wilson, & Daly, 1992; Straus, 1990a). Comparing studies that all used the CTS eliminated this potential source of bias. 2. The terminology I have used has changed somewhat over the years, although the definitions have remained the same. The 1995 article referred to patriarchal terrorism and common couple violence. I soon abandoned the former term because it begged the question of men’s and women’s relative involvement in this form of controlling violence. It also implied that all such intimate terrorism was somehow rooted in patriarchal structures, traditions, or attitudes. I still believe that most intimate terrorism is perpetrated by men in heterosexual relationships and that in such cases the violence is indeed rooted in patriarchal tra- ditions. However, it is clear that there are women intimate terrorists in heterosexual and same-sex rela- tionships (for descriptions of intimate terrorism in lesbian relationships, see Renzetti, 1992). Furthermore, it is not clear that all intimate terrorism, even men’s, is rooted in patriarchal ideas or structures. I later abandoned common couple violence in favor of situational couple violence because the former terminol- ogy implied to some readers that I felt that such violence was acceptable. I also prefer the new terminol- ogy because it more clearly identifies the roots of this violence in the situated escalation of conflict. 3. Although change has been slow to come, there are now a number of studies published or in progress
  • 30. that do make such distinctions (Graham-Kevan & Archer, 2003a, 2003b; Johnson, Conklin, & Menon, 2002; Johnson & Leone, 2005; Leone, Johnson, & Cohan, 2003; Leone, Johnson, Cohan, & Lloyd, 2004). I will comment further on these at the end of this article. 4. This typology is somewhat unusual in that it uses dyadic information to create a typology of indi- vidual behavior. 5. At this point I will stop reporting alternative forms of the question, unless it seems necessary for clarity. 6. There has been some confusion regarding the role of frequency or severity of violence in the con- struction of this typology. Because this is a typology of violent behavior, all members of the four types have been violent toward their partner. However, the distinctions among the types are based entirely on control context, not frequency or severity of violence. 7. The interview question was, “Can you estimate how many times, in total, he was violent with you?” 8. The question was, “Did he become more violent over time?” 9. Severity of violence was assessed in a section of the interview dealing with “the time your husband was the most violent with you (him).” The question was, “How badly were you hurt?” It was an open- ended question with probes, coded into the following categories: (a) force, no hurt; (b) no physical injury; (c) simple injury; (d) severe, no trauma; (e) severe, some trauma; and (f) permanent injury. 10. Once again, I want to be clear that there is no tautology
  • 31. involved here. The types are defined in terms of control context, not the frequency or nature of the violence. The hypothesized differences in characteristics of the violence are derived from theory. It is assumed that attempts by husbands to exert Johnson / Conflict, Control, and Domestic Violence 1015 general control over their wives will be met by considerable resistance in the United States, a cultural con- text in which marriage is seen by most women as an egalitarian partnership. Thus, the intimate terrorist will in some cases turn to violence repeatedly and escalate its severity to gain control. Furthermore, given the size and strength differences between men and women, a woman faced with a partner who is deter- mined to gain the upper hand by whatever means will not in the long run be likely to continue to resist physically but will turn to other tactics to gain control of her life (Campbell, Rose, Kub, & Nedd, 1998). 11. If my arguments regarding the biases of various types of sampling strategies are correct, it is almost impossible to develop precise estimates of the incidence of the various types of violence. I come to the conclusion that most partner violence is situational couple violence in the following way, based on figures in my 1995 article. First, accepting my evidence that almost all of the partner violence in general surveys is situational couple violence, we can use the figures from the National Family Violence Surveys to estimate the incidence of situational couple violence. Second, extrapolating from agency data in two states that keep excellent shelter statistics, we can develop an
  • 32. estimate of the incidence of intimate ter- rorism. Those figures, which may be found in the 1995 article, suggest that there is probably 3 times as much situational couple violence as intimate terrorism, which would mean that 75% of women experi- encing violence from their male partners are experiencing situational couple violence. 12. Mary Ann Dutton and Lisa Goodman are currently involved in a very promising attempt to do just that. Their scale development tactics are rooted in a theory of coercive control (personal communication, May, 2002). References Aldenderfer, M. S., & Blashfield, R. K. (1984). Cluster analysis. Newbury Park, CA: Sage. Archer, J. (2000). Sex differences in aggression between heterosexual partners: A meta-analytic review. Psychological Bulletin, 126, 651-680. Campbell, J. C., Rose, L., Kub, J., & Nedd, D. (1998). Voices of strength and resistance: A contextual and longitudinal analysis of women’s responses to battering. Journal of Interpersonal Violence, 13, 743-762. Capaldi, D. M., & Owen, L. D. (2001). Physical aggression in a community sample of at-risk young couples: Gender comparisons for high frequency, injury, and fear. Journal of Family Psychology, 15, 425-440. Cook, S. L., & Goodman, L. A. (2006). Beyond frequency and severity: Development and validation of the Brief Coercion and Conflict Scales. Violence Against
  • 33. Women, 12, 1050-1072. Dobash, R. E., & Dobash, R. P. (1979). Violence against wives: A case against patriarchy. New York: Free Press. Dobash, R. P., Dobash, R. E., Wilson, M., & Daly, M. (1992). The myth of sexual symmetry in marital violence. Social Problems, 39, 71-91. Frieze, I. H. (1983). Investigating the causes and consequences of marital rape. Signs, 8, 532-553. Frieze, I. H., & Browne, A. (1989). Violence in marriage. In L. Ohlin & M. Tonry (Eds.), Family violence (pp. 163-218). Chicago: University of Chicago Press. Frieze, I. H., & McHugh, M. C. (1992). Power and influence strategies in violent and nonviolent mar- riages. Psychology of Women Quarterly, 16, 449-465. Graham-Kevan, N., & Archer, J. (2003a). Intimate terrorism and common couple violence: A test of Johnson’s predictions in four British samples. Journal of Interpersonal Violence, 18, 1247-1270. Graham-Kevan, N., & Archer, J. (2003b). Physical aggression and control in heterosexual relationships: The effect of sampling. Violence and Victims, 18, 181-196. Holtzworth-Munroe, A. (2000). A typology of men who are violent toward their female partners: Making sense of the heterogeneity in husband violence. Current Directions in Psychological Science, 9(4), 140-143. Holtzworth-Munroe, A. (2002). Standards for batterer treatment programs: How can research inform our
  • 34. decisions? Journal of Aggression, Maltreatment and Trauma, 5, 165-180. 1016 Violence Against Women Holtzworth-Munroe, A., Meehan, J. C., Herron, K., Rehman, U., & Stuart, G. L. (2003). Do subtypes of maritally violent men continue to differ over time? Journal of Consulting and Clinical Psychology, 71, 728-740. Holtzworth-Munroe, A., Rehman, U., & Herron, K. (2000). General and spouse-specific anger and hos- tility in subtypes of maritally violent men and nonviolent men. Behavior Therapy, 31, 603-630. Johnson, M. P. (1993, November). Violence against women in the American family: Are there two forms? Paper presented at the Pre-Conference Theory Construction and Research Methodology Workshop, annual meeting of the National Council on Family Relations, Baltimore, MD. Johnson, M. P. (1995). Patriarchal terrorism and common couple violence: Two forms of violence against women. Journal of Marriage and the Family, 57, 283-294. Johnson, M. P. (1999, November). Two types of violence against women in the American family: Identifying patriarchal terrorism and common couple violence. Paper presented at the annual meeting of the National Council on Family Relations, Irvine, CA. Johnson, M. P. (2000, November). Conflict and control:
  • 35. Symmetry and asymmetry in domestic violence. Paper presented at the National Institute of Justice Gender Symmetry Workshop, Arlington,VA. Johnson, M. P., & Cares, A. (2004, November). Effects and noneffects of childhood experiences of family violence on adult partner violence. Paper presented at the annual meeting of the National Council on Family Relations, Orlando, FL. Johnson, M. P., Conklin, V., & Menon, N. (2002, November). The effects of different types of domestic violence on women: Intimate terrorism vs. situational couple violence. Paper presented at the annual meeting of the National Council on Family Relations, Houston, TX. Johnson, M. P., & Ferraro, K. J. (2000). Research on domestic violence in the 1990s: Making distinctions. Journal of Marriage and the Family, 62, 948-963. Johnson, M. P., & Leone, J. M. (2000, July). The differential effects of patriarchal terrorism and common couple violence: Findings from the National Violence Against Women survey. Paper presented at the Tenth International Conference on Personal Relationships, Brisbane, Australia. Johnson, M. P., & Leone, J. M. (2005). The differential effects of intimate terrorism and situational cou- ple violence: Findings from the National Violence Against Women Survey. Journal of Family Issues, 26(3), 322-349. Kimmel, M. S. (2002). “Gender symmetry” in domestic violence: A substantive and methodological
  • 36. research review. Violence Against Women, 8, 1332-1363. Kurz, D. (1989). Social science perspectives on wife abuse: Current debates and future directions. Gender & Society, 3, 489-505. Leone, J. M., Johnson, M. P., & Cohan, C. L. (2003, November). Help-seeking among women in violent relationships: Factors associated with formal and informal help utilization. Paper presented at the annual meeting of the National Council on Family Relations, Vancouver, Canada. Leone, J. M., Johnson, M. P., Cohan, C. M., & Lloyd, S. (2001, June). Consequences of different types of domestic violence for low-income, ethnic women: A control- based typology of male-partner violence. Paper presented at the International Network on Personal Relationships, Prescott, AZ. Leone, J. M., Johnson, M. P., Cohan, C. M., & Lloyd, S. (2004). Consequences of male partner violence for low-income, ethnic women. Journal of Marriage and Family, 66, 471-489. Lloyd, S., & Taluc, N. (1999). The effects of male violence on female employment. Violence Against Women, 5, 370-392. Marshall, L. L. (1996). Psychological abuse of women: Six distinct clusters. Journal of Family Violence, 11(4), 379-409. Moffitt, T. E., Robins, R. W., & Caspi, A. (2001). A couples analysis of partner abuse with implications for abuse-prevention policy. Criminology and Public Policy, 1,
  • 37. 5-26. Pence, E., & Paymar, M. (1993). Education groups for men who batter: The Duluth model. New York: Springer. Renzetti, C. M. (1992). Violent betrayal: Partner abuse in lesbian relationships. Thousand Oaks, CA: Sage. Johnson / Conflict, Control, and Domestic Violence 1017 Saunders, D. G. (2002). Are physical assaults by wives and girlfriends a major social problem? A review of the literature. Violence Against Women, 8, 1424-1448. Stark, E., & Flitcraft, A. (1996). Women at risk: Domestic violence and women’s health. Thousand Oaks, CA: Sage. Steinmetz, S. K. (1977). The battered husband syndrome. Victimology, 2, 499-509. Stets, J. E. (1993). Control in dating relationships. Journal of Marriage and Family, 55(3), 673-685. Straus, M. A. (1990a). The Conflict Tactics Scales and its critics: An evaluation and new data on validity and reliability. In M. A. Straus & R. J. Gelles (Eds.), Physical violence in American families: Risk factors and adaptations to violence in 8,145 families (pp. 49- 73). New Brunswick, NJ: Transaction Publishers. Straus, M. A. (1990b). Injury and frequency of assault and the “representative sample fallacy” in mea-
  • 38. suring wife beating and child abuse. In M. A. Straus & R. J. Gelles (Eds.), Physical violence in American families: Risk factors and adaptations to violence in 8,145 families (pp. 75-91). New Brunswick, NJ: Transaction Publishers. Straus, M. A. (1999). The controversy over domestic violence by women: A methodological, theoretical, and sociology of science analysis. In X. B. Arriaga & S. Oskamp (Eds.), Violence in intimate rela- tionships (pp. 17-44). Thousand Oaks, CA: Sage. Straus, M. A., & Gelles, R. J. (Eds.). (1990). Physical violence in American families: Risk factors and adaptations to violence in 8,145 families. New Brunswick, NJ: Transaction Publishers. Straus, M. A., Hamby, S. L., Boney-McCoy, S., & Sugarman, D. B. (1996). The revised Conflict Tactics Scales (CTS2): Development and preliminary psychometric data. Journal of Family Issues, 17(3), 283-316. Straus, M. A., Hamby, S. L., Boney-McCoy, S., & Sugarman, D. B. (1999). The personal and relation- ships profile (PRP). Durham: University of New Hampshire, Family Research Laboratory. Straus, M. A., & Mouradian, V. E. (1999, November). Preliminary psychometric data for the Personal and Relationship Profile (PRP): A multi-scale tool for clinical screening and research on partner violence. Paper presented at the annual meeting of the American Society of Criminology, Toronto, Canada. Straus, M. A., & Ramirez, I. L. (2002, July). Gender symmetry
  • 39. in prevalence, severity, and chronicity of physical aggression against dating partners by university students in Mexico and the USA. Paper pre- sented at the annual meeting of the International Society for Research on Aggression, Montreal, Canada. Tjaden, P., & Thoennes, N. (2000). Prevalence and consequences of male-to-female and female-to-male intimate partner violence as measured by the National Violence Against Women Survey. Violence Against Women, 6, 142-161. Tolman, R. M. (1989). The development of a measure of psychological maltreatment of women by their male partners. Violence and Victims, 4(3), 159-177. Michael P. Johnson is associate professor of sociology, women’s studies, and African and African American studies at the Pennsylvania State University. His major areas of research are intimate partner violence and commitment to personal relationships. His recent papers are available at his Web site: www.personal.psu.edu/mpj. 1018 Violence Against Women << /ASCII85EncodePages false /AllowTransparency false /AutoPositionEPSFiles true /AutoRotatePages /None /Binding /Left /CalGrayProfile (Dot Gain 20%) /CalRGBProfile (sRGB IEC61966-2.1) /CalCMYKProfile (U.S. Web Coated 050SWOP051 v2)
  • 40. /sRGBProfile (sRGB IEC61966-2.1) /CannotEmbedFontPolicy /Error /CompatibilityLevel 1.3 /CompressObjects /Off /CompressPages true /ConvertImagesToIndexed true /PassThroughJPEGImages true /CreateJDFFile false /CreateJobTicket false /DefaultRenderingIntent /Default /DetectBlends true /ColorConversionStrategy /LeaveColorUnchanged /DoThumbnails false /EmbedAllFonts true /EmbedJobOptions true /DSCReportingLevel 0 /EmitDSCWarnings false /EndPage -1 /ImageMemory 1048576 /LockDistillerParams false /MaxSubsetPct 100 /Optimize false /OPM 1 /ParseDSCComments true /ParseDSCCommentsForDocInfo true /PreserveCopyPage true /PreserveEPSInfo true /PreserveHalftoneInfo false /PreserveOPIComments false /PreserveOverprintSettings true /StartPage 1 /SubsetFonts true /TransferFunctionInfo /Apply /UCRandBGInfo /Remove /UsePrologue false /ColorSettingsFile ()
  • 41. /AlwaysEmbed [ true ] /NeverEmbed [ true ] /AntiAliasColorImages false /DownsampleColorImages true /ColorImageDownsampleType /Bicubic /ColorImageResolution 300 /ColorImageDepth -1 /ColorImageDownsampleThreshold 1.50000 /EncodeColorImages true /ColorImageFilter /DCTEncode /AutoFilterColorImages true /ColorImageAutoFilterStrategy /JPEG /ColorACSImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /ColorImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /JPEG2000ColorACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /JPEG2000ColorImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /AntiAliasGrayImages false /DownsampleGrayImages true /GrayImageDownsampleType /Bicubic /GrayImageResolution 300
  • 42. /GrayImageDepth -1 /GrayImageDownsampleThreshold 1.50000 /EncodeGrayImages true /GrayImageFilter /DCTEncode /AutoFilterGrayImages true /GrayImageAutoFilterStrategy /JPEG /GrayACSImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /GrayImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /JPEG2000GrayACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /JPEG2000GrayImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /AntiAliasMonoImages false /DownsampleMonoImages true /MonoImageDownsampleType /Bicubic /MonoImageResolution 1200 /MonoImageDepth -1 /MonoImageDownsampleThreshold 1.50000 /EncodeMonoImages true /MonoImageFilter /CCITTFaxEncode /MonoImageDict << /K -1 >> /AllowPSXObjects false
  • 43. /PDFX1aCheck false /PDFX3Check false /PDFXCompliantPDFOnly false /PDFXNoTrimBoxError true /PDFXTrimBoxToMediaBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXSetBleedBoxToMediaBox false /PDFXBleedBoxToTrimBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXOutputIntentProfile (U.S. Web Coated 050SWOP051 v2) /PDFXOutputCondition () /PDFXRegistryName (http://www.color.org) /PDFXTrapped /Unknown /SyntheticBoldness 1.000000 /Description << /FRA <FEFF004f007000740069006f006e00730020007000650072006d 0065007400740061006e007400200064006500200063007200e90 0650072002000640065007300200064006f00630075006d006500 6e00740073002000500044004600200064006f007400e90073002 0006400270075006e00650020007200e90073006f006c00750074 0069006f006e002000e9006c0065007600e9006500200070006f00 75007200200075006e00650020007100750061006c0069007400e 90020006400270069006d007000720065007300730069006f006e 00200061006d00e9006c0069006f007200e90065002e002000490 06c002000650073007400200070006f0073007300690062006c00
  • 44. 65002000640027006f00750076007200690072002000630065007 300200064006f00630075006d0065006e00740073002000500044 0046002000640061006e00730020004100630072006f006200610 0740020006500740020005200650061006400650072002c002000 760065007200730069006f006e002000200035002e00300020006 f007500200075006c007400e9007200690065007500720065002e > /JPN <FEFF3053306e8a2d5b9a306f30019ad889e350cf5ea6753b50cf3 092542b308000200050004400460020658766f830924f5c621030 59308b3068304d306b4f7f75283057307e3059300253705237664 2306e753b8cea3092670059279650306b4fdd306430533068304c 3067304d307e305930023053306e8a2d5b9a30674f5c621030573 05f00200050004400460020658766f8306f002000410063007200 6f0062006100740020304a3088307300200052006500610064006 5007200200035002e003000204ee5964d30678868793a3067304d 307e30593002> /DEU <FEFF00560065007200770065006e00640065006e00200053006 90065002000640069006500730065002000450069006e00730074 0065006c006c0075006e00670065006e0020007a0075006d00200 0450072007300740065006c006c0065006e00200076006f006e00 20005000440046002d0044006f006b0075006d0065006e0074006 5006e0020006d00690074002000650069006e0065007200200068 00f60068006500720065006e002000420069006c0064006100750 066006c00f600730075006e0067002c00200075006d0020006500 69006e00650020007600650072006200650073007300650072007 40065002000420069006c0064007100750061006c0069007400e4 00740020007a0075002000650072007a00690065006c0065006e0 02e00200044006900650020005000440046002d0044006f006b00 75006d0065006e007400650020006b00f6006e006e0065006e002 0006d006900740020004100630072006f0062006100740020006f 0064006500720020006d00690074002000640065006d002000520 065006100640065007200200035002e003000200075006e006400 20006800f600680065007200200067006500f600660066006e006 50074002000770065007200640065006e002e>
  • 45. /PTB <FEFF005500740069006c0069007a00650020006500730074006 1007300200063006f006e00660069006700750072006100e700f5 00650073002000700061007200610020006300720069006100720 0200064006f00630075006d0065006e0074006f00730020005000 44004600200063006f006d00200075006d0061002000720065007 3006f006c007500e700e3006f00200064006500200069006d0061 00670065006d0020007300750070006500720069006f007200200 0700061007200610020006f006200740065007200200075006d00 610020007100750061006c0069006400610064006500200064006 500200069006d0070007200650073007300e3006f0020006d0065 006c0068006f0072002e0020004f007300200064006f0063007500 6d0065006e0074006f0073002000500044004600200070006f006 40065006d0020007300650072002000610062006500720074006f 007300200063006f006d0020006f0020004100630072006f00620 0610074002c002000520065006100640065007200200035002e00 30002000650020007300750070006500720069006f0072002e> /DAN <FEFF00420072007500670020006400690073007300650020006 9006e0064007300740069006c006c0069006e0067006500720020 00740069006c0020006100740020006f007000720065007400740 0650020005000440046002d0064006f006b0075006d0065006e00 74006500720020006d006500640020006800f8006a00650072006 5002000620069006c006c00650064006f0070006c00f80073006e0 069006e006700200066006f00720020006100740020006600e500 20006200650064007200650020007500640073006b00720069006 600740073006b00760061006c0069007400650074002e00200050 00440046002d0064006f006b0075006d0065006e0074006500720 020006b0061006e002000e50062006e006500730020006d006500 640020004100630072006f0062006100740020006f00670020005 20065006100640065007200200035002e00300020006f00670020 006e0079006500720065002e> /NLD <FEFF004700650062007200750069006b002000640065007a006 500200069006e007300740065006c006c0069006e00670065006e 0020006f006d0020005000440046002d0064006f00630075006d0
  • 46. 065006e00740065006e0020007400650020006d0061006b006500 6e0020006d00650074002000650065006e00200068006f0067006 500720065002000610066006200650065006c00640069006e0067 0073007200650073006f006c007500740069006500200076006f0 06f0072002000650065006e002000620065007400650072006500 2000610066006400720075006b006b00770061006c00690074006 500690074002e0020004400650020005000440046002d0064006f 00630075006d0065006e00740065006e0020006b0075006e006e0 065006e00200077006f007200640065006e002000670065006f00 700065006e00640020006d006500740020004100630072006f006 20061007400200065006e00200052006500610064006500720020 0035002e003000200065006e00200068006f006700650072002e> /ESP <FEFF0055007300650020006500730074006100730020006f007 000630069006f006e006500730020007000610072006100200063 007200650061007200200064006f00630075006d0065006e00740 06f0073002000500044004600200063006f006e0020006d006100 79006f00720020007200650073006f006c00750063006900f3006e 00200064006500200069006d006100670065006e0020007000610 0720061002000610075006d0065006e0074006100720020006c00 61002000630061006c006900640061006400200061006c0020006 9006d007000720069006d00690072002e0020004c006f00730020 0064006f00630075006d0065006e0074006f00730020005000440 046002000730065002000700075006500640065006e0020006100 6200720069007200200063006f006e0020004100630072006f006 20061007400200079002000520065006100640065007200200035 002e003000200079002000760065007200730069006f006e00650 07300200070006f00730074006500720069006f00720065007300 2e> /SUO <FEFF004e00e4006900640065006e00200061007300650074007 5007300740065006e0020006100760075006c006c006100200076 006f0069006400610061006e0020006c0075006f0064006100200 05000440046002d0061007300690061006b00690072006a006f00 6a0061002c0020006a006f006900640065006e002000740075006 c006f0073007400750073006c00610061007400750020006f006e
  • 47. 0020006b006f0072006b006500610020006a00610020006b00750 0760061006e0020007400610072006b006b007500750073002000 730075007500720069002e0020005000440046002d00610073006 90061006b00690072006a0061007400200076006f006900640061 0061006e0020006100760061007400610020004100630072006f0 06200610074002d0020006a00610020004100630072006f006200 610074002000520065006100640065007200200035002e0030002 0002d006f0068006a0065006c006d0061006c006c006100200074 0061006900200075007500640065006d006d0061006c006c00610 02000760065007200730069006f006c006c0061002e> /ITA <FEFF00550073006100720065002000710075006500730074006 500200069006d0070006f007300740061007a0069006f006e0069 00200070006500720020006300720065006100720065002000640 06f00630075006d0065006e007400690020005000440046002000 63006f006e00200075006e00610020007200690073006f006c007 5007a0069006f006e00650020006d0061006700670069006f0072 0065002000700065007200200075006e006100200071007500610 06c0069007400e00020006400690020007300740061006d007000 610020006d00690067006c0069006f00720065002e00200049002 00064006f00630075006d0065006e007400690020005000440046 00200070006f00730073006f006e006f0020006500730073006500 720065002000610070006500720074006900200063006f006e002 0004100630072006f006200610074002000650020005200650061 00640065007200200035002e00300020006500200076006500720 0730069006f006e00690020007300750063006300650073007300 6900760065002e> /NOR <FEFF004200720075006b0020006400690073007300650020006 9006e006e007300740069006c006c0069006e00670065006e0065 002000740069006c002000e50020006f007000700072006500740 07400650020005000440046002d0064006f006b0075006d006500 6e0074006500720020006d006500640020006800f800790065007 20065002000620069006c00640065006f00700070006c00f80073 006e0069006e006700200066006f0072002000620065006400720 0650020007500740073006b00720069006600740073006b007600
  • 48. 61006c0069007400650074002e0020005000440046002d0064006 f006b0075006d0065006e00740065006e00650020006b0061006e 002000e50070006e006500730020006d006500640020004100630 072006f0062006100740020006f00670020005200650061006400 65007200200035002e00300020006f0067002000730065006e006 500720065002e> /SVE <FEFF0041006e007600e4006e00640020006400650020006800e 4007200200069006e0073007400e4006c006c006e0069006e0067 00610072006e00610020006e00e40072002000640075002000760 069006c006c00200073006b006100700061002000500044004600 2d0064006f006b0075006d0065006e00740020006d00650064002 0006800f6006700720065002000620069006c0064007500700070 006c00f60073006e0069006e00670020006f00630068002000640 0e40072006d006500640020006600e50020006200e40074007400 7200650020007500740073006b00720069006600740073006b007 60061006c0069007400650074002e0020005000440046002d0064 006f006b0075006d0065006e00740065006e0020006b0061006e0 02000f600700070006e006100730020006d006500640020004100 630072006f0062006100740020006f00630068002000520065006 100640065007200200035002e003000200065006c006c00650072 002000730065006e006100720065002e> /ENU <FEFF00550073006500200074006800650073006500200073006 5007400740069006e0067007300200066006f0072002000630072 0065006100740069006e006700200050004400460020006600690 06c0065007300200066006f00720020007300750062006d006900 7300730069006f006e00200074006f00200054006800650020005 3006800650072006900640061006e002000500072006500730073 002e0020005400680065007300650020007300650074007400690 06e0067007300200063006f006e00660069006700750072006500 6400200066006f00720020004100630072006f006200610074002 000760036002e0030002000300038002f00300036002f00300033 002e> >> >> setdistillerparams
  • 49. << /HWResolution [2400 2400] /PageSize [612.000 792.000] >> setpagedevice