SlideShare a Scribd company logo
1 of 10
The Partner Cyberabuse
Questionnaire: Preliminary
Psychometrics of TechnologyBased Intimate Partner
Violence
Sherry Hamby
Sewanee, the University of the South
Presented at the Southeastern Psychological Association Annual
Meeting, Atlanta, GA, March, 2013.
sherry.hamby@sewanee.edu
The Reality of Battering






Battering is not just about physical assault. Our
questionnaires are supposed to adequately
capture the complexities of abusive
relationships.
Questionnaires that focus on shouting and hitting
miss complexities of battering. Often absent:
sexual violence, economic abuse and other key
aspects of battering.
Technology-based harassment has long been a
part of battering—such as getting utilities turned
off. Even easier in the modern era.
Study 1: Qualitative Focus Groups






In the first stage of the study, 4 focus groups were
held with college students that discussed peer-topeer cyberbullying and intimate partner
cyberabuse.
These focus groups clearly indicated that
behaviors by partners and ex-partners were
clearly seen as distinct from other peerperpetrated technological harassment.
Also, intimate partner cyber-abuse often appeared
to involve more severe incidents and was
3
considered less socially normative.
Example of Serious IPV Cyber-abuse


I have a friend that went abroad and got a boyfriend
and like it went sour …they broke up and so he
started harassing her on Facebook and then when she
defriended him he harassed everyone that he was
mutual friends with that she was friends with, so like
all their mutual friends here…she had to find like
everyone that they were mutual friends with and make
them defriend them. And then he had her parents’ email and was like harassing her parents and saying all
this vulgar sexual stuff like to her parents. …the
parents had to call the ___ embassy,…he was texting
them too. It was just bad, like it’s still not over.
4
Study 2: Quantitative Study









98 women with histories of intimate partner victimization were
recruited from domestic violence programs (support group, others
from shelter, guardian ad litem, law enforcement) in 2 Southern states.
Wide age range: 28% 18-25, 25% 26-30, 27% 31-40, 20% 41+
Ethnically and racially diverse: 29% African-American, 29% Latina/o,
26% European American, 14% American Indian, 1% Asian and 1%
Other.
Low-income sample, with most women (84%) reporting income
below $18,000 per year.
In addition to structured items, they provided their perceptions of
their risks and resources in a semi-structured format. Responses were
coded using a boot-strapping method and analyzed. Participants were
given a $25 gift card to thank them for their participation. DV
agencies were paid $25 per interview to compensate them for staff
5
time.
The Partner Cyber-abuse Questionnaire
















1) My partner sent messages from my Facebook profile without my
permission.
2) My partner wrote something negative about me on social media such as
Facebook or Twitter when he was angry.
3) My partner sent angry or insulting text messages to me.
4) My partner forwarded embarrassing online or text messages or pictures
about me.
5) My partner changed my password so I couldn’t access my (or our)
accounts, such as bank or credit card accounts.
6) My partner checked or read my emails or texts without my permission.
7) My partner monitored my profile or used phone applications as a way to
keep tabs on me.
8) My partner sent me frequent emails or texts when he knew I didn’t want
them.
9) My partner checked up on my location by getting me to send cell phone
pictures of where I was.
6
Cyber-abuse is Common
70
60

65
58.8

57.7

56.7
%

50
40

47.4
43.3

40.2

37.1

36.1

35.4

30

20
10
0

7
Further Results






A single factor accounted for
74% of the variance and
included all 9 items.
Cyber-abuse more repeated
than physical or sexual
violence.
No differences in frequency
of cyberabuse between
women who were still with
their partner or who had
ended the relationship. Not
just post-breakup pursuits.

Correlations with…

Injury

0.27

Psychological

0.27

Physical

0.28

0.37

Sexual

0

0.1 0.2 0.3 0.4
8
Correlated with Other Partner
Problems
Correlated with…

0.24

Partner Infidelity

0.29

P Alcohol problem

0

0.05

0.1

0.15

0.2

0.25

0.3
9
Conclusions


Limitations & Next steps:






This is a low-income sample. Would a sample with
better access to computers report even higher rates or
different patterns?
This is a highly victimized sample. Would these be as
common or closely related in a community sample?

Important to:





#1 Fully capture all elements of abusive relationships
#2 Stay current as the types of acts that abusive and
controlling partners can do changes
#3 Science is about progress. Do not limit to 40-year
10
old questionnaires—keep moving forward.

More Related Content

What's hot

We Are Men, Not Pigs Portfolio
We Are Men, Not Pigs PortfolioWe Are Men, Not Pigs Portfolio
We Are Men, Not Pigs Portfolio
Tam Nguyen
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
hmfowler
 
Bystander Poster - Infographic
Bystander Poster - InfographicBystander Poster - Infographic
Bystander Poster - Infographic
Rachel Arnold
 
Melissa Dittrich – Thesis
Melissa Dittrich – Thesis Melissa Dittrich – Thesis
Melissa Dittrich – Thesis
Melissa Dittrich
 
Buddy Howell on Gangs
Buddy Howell on GangsBuddy Howell on Gangs
Buddy Howell on Gangs
UCLA School of Public Affairs
 
Gang Crimes And Violence
Gang Crimes And ViolenceGang Crimes And Violence
Gang Crimes And Violence
jvonschilling
 
Mass trans issue brief for Sept 17 2015 FINAL
Mass trans issue brief for Sept 17 2015 FINALMass trans issue brief for Sept 17 2015 FINAL
Mass trans issue brief for Sept 17 2015 FINAL
Leah Shaw
 

What's hot (20)

We Are Men, Not Pigs Portfolio
We Are Men, Not Pigs PortfolioWe Are Men, Not Pigs Portfolio
We Are Men, Not Pigs Portfolio
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Know the main causes of crimes
Know the main causes of crimesKnow the main causes of crimes
Know the main causes of crimes
 
Bystander Poster - Infographic
Bystander Poster - InfographicBystander Poster - Infographic
Bystander Poster - Infographic
 
1.5.5 Liz Mulder
1.5.5 Liz Mulder1.5.5 Liz Mulder
1.5.5 Liz Mulder
 
Voter Apathy
Voter ApathyVoter Apathy
Voter Apathy
 
Stalking Awareness
Stalking AwarenessStalking Awareness
Stalking Awareness
 
Ethical Case study
Ethical Case studyEthical Case study
Ethical Case study
 
Melissa Dittrich – Thesis
Melissa Dittrich – Thesis Melissa Dittrich – Thesis
Melissa Dittrich – Thesis
 
242225
242225242225
242225
 
Controlling or Coercive Behaviour in Relationships: Making Legislation Work M...
Controlling or Coercive Behaviour in Relationships: Making Legislation Work M...Controlling or Coercive Behaviour in Relationships: Making Legislation Work M...
Controlling or Coercive Behaviour in Relationships: Making Legislation Work M...
 
Alcohol and Crime
Alcohol and CrimeAlcohol and Crime
Alcohol and Crime
 
Buddy Howell on Gangs
Buddy Howell on GangsBuddy Howell on Gangs
Buddy Howell on Gangs
 
Cyberbullying Renee
Cyberbullying   ReneeCyberbullying   Renee
Cyberbullying Renee
 
Wepdd104
Wepdd104Wepdd104
Wepdd104
 
Student repliesstudent reply 1# mirrett benta theory in the
Student repliesstudent reply 1# mirrett benta theory in the Student repliesstudent reply 1# mirrett benta theory in the
Student repliesstudent reply 1# mirrett benta theory in the
 
Elizabeth lockley partner_abuse_and_date_rape
Elizabeth lockley partner_abuse_and_date_rapeElizabeth lockley partner_abuse_and_date_rape
Elizabeth lockley partner_abuse_and_date_rape
 
Gang Crimes And Violence
Gang Crimes And ViolenceGang Crimes And Violence
Gang Crimes And Violence
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Mass trans issue brief for Sept 17 2015 FINAL
Mass trans issue brief for Sept 17 2015 FINALMass trans issue brief for Sept 17 2015 FINAL
Mass trans issue brief for Sept 17 2015 FINAL
 

Viewers also liked

Los cabezudos de Zaragoza (Biella Nuei)
Los cabezudos de Zaragoza (Biella Nuei)Los cabezudos de Zaragoza (Biella Nuei)
Los cabezudos de Zaragoza (Biella Nuei)
luisangelgalvez
 
Master en Gestión de Empresas de Moda Retail
Master en Gestión de Empresas de Moda RetailMaster en Gestión de Empresas de Moda Retail
Master en Gestión de Empresas de Moda Retail
ainhoachamorro
 
Zyncro redes sociales corporativas
Zyncro redes sociales corporativasZyncro redes sociales corporativas
Zyncro redes sociales corporativas
Inside_Marketing
 
Glov Presentation - FEB2016
Glov Presentation - FEB2016Glov Presentation - FEB2016
Glov Presentation - FEB2016
Louis Farkas
 
How Your Nonprofit Can Win Online With Network for Good
How Your Nonprofit Can Win Online With Network for GoodHow Your Nonprofit Can Win Online With Network for Good
How Your Nonprofit Can Win Online With Network for Good
HubSpot
 
Dolor biceps largo_diagnostico_diferencial_para_tto
Dolor biceps largo_diagnostico_diferencial_para_ttoDolor biceps largo_diagnostico_diferencial_para_tto
Dolor biceps largo_diagnostico_diferencial_para_tto
Israel Kine Cortes
 

Viewers also liked (20)

Peak Oil by Bruce Robinson
Peak Oil by Bruce RobinsonPeak Oil by Bruce Robinson
Peak Oil by Bruce Robinson
 
Los cabezudos de Zaragoza (Biella Nuei)
Los cabezudos de Zaragoza (Biella Nuei)Los cabezudos de Zaragoza (Biella Nuei)
Los cabezudos de Zaragoza (Biella Nuei)
 
Disciplina (Definitivo)
Disciplina (Definitivo)Disciplina (Definitivo)
Disciplina (Definitivo)
 
Hora do Sul
Hora do SulHora do Sul
Hora do Sul
 
Master en Gestión de Empresas de Moda Retail
Master en Gestión de Empresas de Moda RetailMaster en Gestión de Empresas de Moda Retail
Master en Gestión de Empresas de Moda Retail
 
Online PR
Online PROnline PR
Online PR
 
Mda framework for sig bg 20130202
Mda framework for sig bg 20130202Mda framework for sig bg 20130202
Mda framework for sig bg 20130202
 
El buen vivir
El buen vivirEl buen vivir
El buen vivir
 
Senior Experts Group of the Global Alliance for Resilience (SEG-AGIR), presen...
Senior Experts Group of the Global Alliance for Resilience (SEG-AGIR), presen...Senior Experts Group of the Global Alliance for Resilience (SEG-AGIR), presen...
Senior Experts Group of the Global Alliance for Resilience (SEG-AGIR), presen...
 
Zyncro redes sociales corporativas
Zyncro redes sociales corporativasZyncro redes sociales corporativas
Zyncro redes sociales corporativas
 
Jstor
JstorJstor
Jstor
 
Glov Presentation - FEB2016
Glov Presentation - FEB2016Glov Presentation - FEB2016
Glov Presentation - FEB2016
 
the next generation of marketing technology platform
the next generation of marketing technology platformthe next generation of marketing technology platform
the next generation of marketing technology platform
 
How Your Nonprofit Can Win Online With Network for Good
How Your Nonprofit Can Win Online With Network for GoodHow Your Nonprofit Can Win Online With Network for Good
How Your Nonprofit Can Win Online With Network for Good
 
2013-06-21 - Office Excellence Kongress - arnd layer - e mail is dead
2013-06-21 - Office Excellence Kongress - arnd layer - e mail is dead2013-06-21 - Office Excellence Kongress - arnd layer - e mail is dead
2013-06-21 - Office Excellence Kongress - arnd layer - e mail is dead
 
SPE-178786-MS
SPE-178786-MSSPE-178786-MS
SPE-178786-MS
 
Dolor biceps largo_diagnostico_diferencial_para_tto
Dolor biceps largo_diagnostico_diferencial_para_ttoDolor biceps largo_diagnostico_diferencial_para_tto
Dolor biceps largo_diagnostico_diferencial_para_tto
 
27 Hechos 27-28 El evangelio llega a Roma
27 Hechos 27-28 El evangelio llega a Roma27 Hechos 27-28 El evangelio llega a Roma
27 Hechos 27-28 El evangelio llega a Roma
 
Bioseguridad Agroalimentaria
Bioseguridad AgroalimentariaBioseguridad Agroalimentaria
Bioseguridad Agroalimentaria
 
betterplace lab around the world 2014 - eine coole Reise in 15 digital-sozial...
betterplace lab around the world 2014 - eine coole Reise in 15 digital-sozial...betterplace lab around the world 2014 - eine coole Reise in 15 digital-sozial...
betterplace lab around the world 2014 - eine coole Reise in 15 digital-sozial...
 

Similar to Cyber abuse sepa 2013 presentation

Nathalie Noret & Gemma Linfoot-King at the 2019 re:shape #PreventSexualHarm c...
Nathalie Noret & Gemma Linfoot-King at the 2019 re:shape #PreventSexualHarm c...Nathalie Noret & Gemma Linfoot-King at the 2019 re:shape #PreventSexualHarm c...
Nathalie Noret & Gemma Linfoot-King at the 2019 re:shape #PreventSexualHarm c...
re:shape
 
Running Head CRITICAL ANALYSIS 1 C.docx
Running Head CRITICAL ANALYSIS                      1 C.docxRunning Head CRITICAL ANALYSIS                      1 C.docx
Running Head CRITICAL ANALYSIS 1 C.docx
todd271
 
Glass RM Spring 2016 Final
Glass RM Spring 2016 FinalGlass RM Spring 2016 Final
Glass RM Spring 2016 Final
Elizabeth Glass
 
Hs.peers and moral
Hs.peers and moralHs.peers and moral
Hs.peers and moral
KAMudd
 
Running head FINAL PAPER .docx
 Running head FINAL PAPER                                      .docx Running head FINAL PAPER                                      .docx
Running head FINAL PAPER .docx
MARRY7
 
ChangeHappensFourthEditionMaster
ChangeHappensFourthEditionMasterChangeHappensFourthEditionMaster
ChangeHappensFourthEditionMaster
Erin Burrows
 
What Sex Workers Have to Say
What Sex Workers Have to SayWhat Sex Workers Have to Say
What Sex Workers Have to Say
Laura LeMoon
 

Similar to Cyber abuse sepa 2013 presentation (15)

Nathalie Noret & Gemma Linfoot-King at the 2019 re:shape #PreventSexualHarm c...
Nathalie Noret & Gemma Linfoot-King at the 2019 re:shape #PreventSexualHarm c...Nathalie Noret & Gemma Linfoot-King at the 2019 re:shape #PreventSexualHarm c...
Nathalie Noret & Gemma Linfoot-King at the 2019 re:shape #PreventSexualHarm c...
 
Running Head CRITICAL ANALYSIS 1 C.docx
Running Head CRITICAL ANALYSIS                      1 C.docxRunning Head CRITICAL ANALYSIS                      1 C.docx
Running Head CRITICAL ANALYSIS 1 C.docx
 
Social studies sba about domestic violence
Social studies sba about domestic violenceSocial studies sba about domestic violence
Social studies sba about domestic violence
 
Glass RM Spring 2016 Final
Glass RM Spring 2016 FinalGlass RM Spring 2016 Final
Glass RM Spring 2016 Final
 
Growing up with Media pilot study: Examining exposures to violence
Growing up with Media pilot study: Examining exposures to violenceGrowing up with Media pilot study: Examining exposures to violence
Growing up with Media pilot study: Examining exposures to violence
 
Hs.peers and moral
Hs.peers and moralHs.peers and moral
Hs.peers and moral
 
Running head FINAL PAPER .docx
 Running head FINAL PAPER                                      .docx Running head FINAL PAPER                                      .docx
Running head FINAL PAPER .docx
 
ChangeHappensFourthEditionMaster
ChangeHappensFourthEditionMasterChangeHappensFourthEditionMaster
ChangeHappensFourthEditionMaster
 
Safer change happensguide_2007
Safer change happensguide_2007Safer change happensguide_2007
Safer change happensguide_2007
 
Youth perpetration of online sexual solicitation: Internet use and psychosoci...
Youth perpetration of online sexual solicitation: Internet use and psychosoci...Youth perpetration of online sexual solicitation: Internet use and psychosoci...
Youth perpetration of online sexual solicitation: Internet use and psychosoci...
 
Bullying in the digital age
Bullying in the digital ageBullying in the digital age
Bullying in the digital age
 
Dv Awareness
Dv AwarenessDv Awareness
Dv Awareness
 
Violence Report Final2_AP Alliance
Violence Report Final2_AP AllianceViolence Report Final2_AP Alliance
Violence Report Final2_AP Alliance
 
Issues of language and frequency in measuring cyberbullying: Data from the Gr...
Issues of language and frequency in measuring cyberbullying: Data from the Gr...Issues of language and frequency in measuring cyberbullying: Data from the Gr...
Issues of language and frequency in measuring cyberbullying: Data from the Gr...
 
What Sex Workers Have to Say
What Sex Workers Have to SayWhat Sex Workers Have to Say
What Sex Workers Have to Say
 

Cyber abuse sepa 2013 presentation

  • 1. The Partner Cyberabuse Questionnaire: Preliminary Psychometrics of TechnologyBased Intimate Partner Violence Sherry Hamby Sewanee, the University of the South Presented at the Southeastern Psychological Association Annual Meeting, Atlanta, GA, March, 2013. sherry.hamby@sewanee.edu
  • 2. The Reality of Battering    Battering is not just about physical assault. Our questionnaires are supposed to adequately capture the complexities of abusive relationships. Questionnaires that focus on shouting and hitting miss complexities of battering. Often absent: sexual violence, economic abuse and other key aspects of battering. Technology-based harassment has long been a part of battering—such as getting utilities turned off. Even easier in the modern era.
  • 3. Study 1: Qualitative Focus Groups    In the first stage of the study, 4 focus groups were held with college students that discussed peer-topeer cyberbullying and intimate partner cyberabuse. These focus groups clearly indicated that behaviors by partners and ex-partners were clearly seen as distinct from other peerperpetrated technological harassment. Also, intimate partner cyber-abuse often appeared to involve more severe incidents and was 3 considered less socially normative.
  • 4. Example of Serious IPV Cyber-abuse  I have a friend that went abroad and got a boyfriend and like it went sour …they broke up and so he started harassing her on Facebook and then when she defriended him he harassed everyone that he was mutual friends with that she was friends with, so like all their mutual friends here…she had to find like everyone that they were mutual friends with and make them defriend them. And then he had her parents’ email and was like harassing her parents and saying all this vulgar sexual stuff like to her parents. …the parents had to call the ___ embassy,…he was texting them too. It was just bad, like it’s still not over. 4
  • 5. Study 2: Quantitative Study      98 women with histories of intimate partner victimization were recruited from domestic violence programs (support group, others from shelter, guardian ad litem, law enforcement) in 2 Southern states. Wide age range: 28% 18-25, 25% 26-30, 27% 31-40, 20% 41+ Ethnically and racially diverse: 29% African-American, 29% Latina/o, 26% European American, 14% American Indian, 1% Asian and 1% Other. Low-income sample, with most women (84%) reporting income below $18,000 per year. In addition to structured items, they provided their perceptions of their risks and resources in a semi-structured format. Responses were coded using a boot-strapping method and analyzed. Participants were given a $25 gift card to thank them for their participation. DV agencies were paid $25 per interview to compensate them for staff 5 time.
  • 6. The Partner Cyber-abuse Questionnaire          1) My partner sent messages from my Facebook profile without my permission. 2) My partner wrote something negative about me on social media such as Facebook or Twitter when he was angry. 3) My partner sent angry or insulting text messages to me. 4) My partner forwarded embarrassing online or text messages or pictures about me. 5) My partner changed my password so I couldn’t access my (or our) accounts, such as bank or credit card accounts. 6) My partner checked or read my emails or texts without my permission. 7) My partner monitored my profile or used phone applications as a way to keep tabs on me. 8) My partner sent me frequent emails or texts when he knew I didn’t want them. 9) My partner checked up on my location by getting me to send cell phone pictures of where I was. 6
  • 8. Further Results    A single factor accounted for 74% of the variance and included all 9 items. Cyber-abuse more repeated than physical or sexual violence. No differences in frequency of cyberabuse between women who were still with their partner or who had ended the relationship. Not just post-breakup pursuits. Correlations with… Injury 0.27 Psychological 0.27 Physical 0.28 0.37 Sexual 0 0.1 0.2 0.3 0.4 8
  • 9. Correlated with Other Partner Problems Correlated with… 0.24 Partner Infidelity 0.29 P Alcohol problem 0 0.05 0.1 0.15 0.2 0.25 0.3 9
  • 10. Conclusions  Limitations & Next steps:    This is a low-income sample. Would a sample with better access to computers report even higher rates or different patterns? This is a highly victimized sample. Would these be as common or closely related in a community sample? Important to:    #1 Fully capture all elements of abusive relationships #2 Stay current as the types of acts that abusive and controlling partners can do changes #3 Science is about progress. Do not limit to 40-year 10 old questionnaires—keep moving forward.