Understanding Stalking Tactics

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which characteristic is most indicative of 'hyper-intimacy' in the context of stalking behaviors?

  • Maintaining strict personal boundaries.
  • Reflecting typical courtship activities at an excessive level (correct)
  • Avoiding any form of communication to respect the other person's space
  • Engaging in mutual activities with clear consent from both parties

Which of the following is the best example of 'mediated contact' in stalking?

  • Sending repeated emails or instant messages (correct)
  • Appearing at the same locations as the victim by coincidence
  • Face-to-face conversations
  • Sitting next to someone in public without interaction

What differentiates 'interactional contacts' from other forms of contact in stalking behavior?

  • They solely involve digital communication.
  • They always involve physical harm or threats.
  • They occur in-person, such as 'sitting next to the person in public'. (correct)
  • They are unintentional and purely coincidental encounters.

What is the primary objective of 'surveillance' as a stalking behavior?

<p>To secure knowledge about the victim without their awareness (C)</p> Signup and view all the answers

Which action is most representative of 'invasion' within the context of stalking?

<p>Theft of information (D)</p> Signup and view all the answers

Which of the following actions reflects 'harassment and intimidation' as a form of stalking?

<p>Verbal abuse (C)</p> Signup and view all the answers

What characterizes 'coercion and threat' in stalking behaviors?

<p>Suggesting potential harm to the victim, loved ones, or pets (A)</p> Signup and view all the answers

Which scenario best illustrates 'aggression' as a form of stalking?

<p>Physical violence or vandalism (A)</p> Signup and view all the answers

According to research, what potential issue can arise when victims use 'moving with tactics' (e.g. 'Lets just be friends')?

<p>It may fail because the stalker interprets it as a sign that they want to speak with them (B)</p> Signup and view all the answers

What is a potential adverse outcome of using 'moving against tactics' in a stalking situation?

<p>It may escalate the intensity of the stalker's behavior. (C)</p> Signup and view all the answers

What does 'moving away tactics' in the context of stalking refer to?

<p>Going where the stalker can't go, screening calls, and changing addresses, phone numbers, etc. (D)</p> Signup and view all the answers

What is the main characteristic of 'moving inward tactics' as a response to stalking?

<p>Focusing on internal coping mechanisms such as denial or distraction (B)</p> Signup and view all the answers

What does 'moving outwards' generally entail in the context of coping with stalking?

<p>Involves socialization and utilization of third party assistance (C)</p> Signup and view all the answers

According to attachment theory, what is a key difference between securely attached individuals and those with a fearful-avoidant attachment style?

<p>Securely attached individuals seek self-acceptance, while fearful-avoidant individuals expect rejection despite desiring acceptance (D)</p> Signup and view all the answers

How do dismissive-avoidant individuals typically maintain relational distance, according to attachment theory?

<p>By anticipating being devalued and protecting themselves accordingly (B)</p> Signup and view all the answers

What is the central idea behind the 'Relational Goal Pursuit Theory' in the context of stalking?

<p>When a relationship goal is thwarted, greater effort is applied to achieve the goal if it's importance is high (D)</p> Signup and view all the answers

According to the Relational Goal Pursuit Theory, when are indviduals more likely to rationalize obsessive behaviors?

<p>When they believe that with sufficient effort, they will ultimately achieve their desired relational goal. (B)</p> Signup and view all the answers

How does 'goal linking' influence the behavior of obsessive relationship pursuers?

<p>It leads them to link possessing a particular relationship with higher needs such as life happiness and self-worth (B)</p> Signup and view all the answers

According to Rosenfeld (2004), what is one of the significant predictors of escalated risk in stalking cases?

<p>A shared intimate history between the victim and stalker (B)</p> Signup and view all the answers

Why, according to research, are ex-intimate partners subjected to longer periods of stalking compared to other relationship groups?

<p>Due to the complex emotional histories and unresolved issues between former partners (A)</p> Signup and view all the answers

According to Miller (2012), what is the primary element that defines cyberstalking?

<p>Repeated threats, harassment, or unwanted contact through electronic means (A)</p> Signup and view all the answers

What are common forms of cyberstalking, according to research?

<p>Monitoring the victim's email and sending harassing text messages, using spyware, etc. (D)</p> Signup and view all the answers

How does cyberstalking relate to physical stalking, and why might it may be preferred by women stalkers?

<p>Cyberstalking is frequently used in conjunction with physical stalking and because of relative safety and anonymity (D)</p> Signup and view all the answers

According to Cupach and Spitzberg, what is an 'expressive' motive for stalking?

<p>Jealousy and anger (A)</p> Signup and view all the answers

According to Cupach and Spitzberg, which of the following is considered an 'instrumental' motive for stalking?

<p>Control (D)</p> Signup and view all the answers

Flashcards

Hyper-Intimacy

Reflects typical courtship activities but taken to an excessive level making it hard for the victim to get free from the situation and prolonging opportunities for contact.

Mediated Contacts

Contacts that involve communicating through emails, instant messaging, and the internet.

Interactional Contacts

Contacts that happen face to face, sitting next to the person in public, appearing in various places, intruding on conversations, and pursuing common activities.

Surveillance

Attempts to secure knowledge or information about the victim without their awareness, pursuing in person and online.

Signup and view all the flashcards

Invasion

Activities that violate normatively prescribed personal and legal boundaries, often involving theft of information and potentially leading to legal ramifications.

Signup and view all the flashcards

Harassment and Intimidation

Behavior involving verbal or non-verbal actions that annoy, bother, stress, insult, or harm the reputation of the victim.

Signup and view all the flashcards

Coercion and Threat

In stalking cases, it involves a shift in tone towards implicit suggestions of potential harm to the victim, including threats against loved ones, pets, or property.

Signup and view all the flashcards

Aggression

32% of cases involve physical violence. Acts of vandalism, assault, injury, attempted suicide or rape, and use of weapons.

Signup and view all the flashcards

Moving With Tactics

Efforts to negotiate with the pursuer with the goal of a peaceful end, such as suggesting to remain "just friends".

Signup and view all the flashcards

Moving Against Tactics

Involves threatening to injure or deter the pursuer, threatening to call the police, Advice strongly against these tactics Demonstrates the importance of them in their life Escalates intensity.

Signup and view all the flashcards

Moving Away Tactics

Taking actions such as Screening all calls, changing routes, email addresses, undistinguished phone numbers, going where the offender can't, Responsibility of costs. Changing physical addresses.

Signup and view all the flashcards

Moving Inward Tactics

Involves acting as if the problem is nothing, denial, distraction, engaging in medication, and redefinition.

Signup and view all the flashcards

Moving Outwards

Involves socialization, utilization of third-party assistance, seeking counseling, informal support, law enforcement or protective orders.

Signup and view all the flashcards

Attachment Theory

Securely attached infants derive security from accessible caregivers, insecurely attached infants experience rejection. Attachment tendencies are reflected in adult intimate relationships.

Signup and view all the flashcards

Securely Attached Individuals

Possess positive view of self and positive view of others They pursue self-acceptance by seeking to obtain the acceptance of important others

Signup and view all the flashcards

Fearful-Avoidant Attachment

Hold negative views of both self and others Although they desire acceptance – they expect rejection

Signup and view all the flashcards

Dismissive-Avoidant Attachment

Possess a positive view of self but a negative view of others? They anticipate being devalued – and protect themselves accordingly - by maintaining relational distance

Signup and view all the flashcards

Relational Goal Pursuit Theory

Explains why relationship pursuers persist, even when thwarted, linking lower-order goals (relationship) with higher-order goals (happiness and self-worth). Effort will achieve.

Signup and view all the flashcards

Stalking Duration

The longer the duration of the stalking - the greater the potential damage to the victim.

Signup and view all the flashcards

Risk Factors for Stalking Violence

A prior intimate relationship between victim and stalker and The presence of explicit threats are risk factors for stalking violence

Signup and view all the flashcards

Stalking Victimization

A history of substance abuse is a predictor of future violence and ex-intimate partners are subjected to longer periods of stalking

Signup and view all the flashcards

Cyberstalking

A set of behaviors that involve repeated threats, harassment, or other unwanted contact - by the use of computer or other electronic, or other unwanted contact

Signup and view all the flashcards

Forms of Cyberstalking

Monitoring the victim's email communications and Sending insulting or threatening emails. Often used with physical stalking.

Signup and view all the flashcards

Cupach and spitz burg grouped motives

Expressive - jealousy, anger. Intimacy Instrumental - tangible disputes, control, power Personaliogical = drugs dependency mental issue and incompetence Contextual breakup nostalgia rival for affections

Signup and view all the flashcards

Study Notes

Hyper-Intimacy

  • Reflects courtship activities but taken to an excessive level.
  • A situation that is hard for the victim to get free from.
  • Prolongs opportunities for contact.

Mediated Contacts

  • Efforts to communicate through everything.
  • Instant messaging and emails.
  • Cyber stalking and Internet use.
  • Some stalkers engage in real life stalking.

Interactional Contacts

  • Face-to-face interactions.
  • Sitting next to the person in public.
  • Appearing in various places and intruding on conversations.
  • Pursuing common activities and locations.

Surveillance

  • Attempts to secure knowledge or information about the victim without their awareness.
  • Pursue in person and online to obtain info.

Invasion

  • Activities that violate normative prescribed personal and legal boundaries.
  • Prior planning is involved.
  • Theft of information.
  • Poses a risk of legal ramifications.

Harassment and Intimidation

  • Can be verbal or non-verbal.
  • Causes stress and annoyance.
  • Includes insults and harms reputation.

Coercion and Threat

  • Occurs across 54% of stalking cases.
  • Tone shifts to implicit suggestions of potential harm to the victim.
  • Threats against loved ones, pets, and property.
  • May involve escalation of previous behaviors.
  • Threatening with suicide.

Aggression

  • 32% of cases involve physical violence.
  • Includes vandalism, assault, and use of weapons.
  • Can lead to injury, attempted suicide, and attempted rape.

Moving With Tactics

  • Efforts to negotiate with the pursuer.
  • Seeking a peaceful end can fail as the stalker may want to speak to them.

Moving Against Tactics

  • Threatening injury or deterring the pursuer.
  • Threatening to call the police.
  • Demonstrates the importance of them in their life.
  • Escalates intensity.
  • Advised strongly against these tactics.

Moving Away Tactics

  • Go where the offender can't go.
  • Using undistinguished phone numbers and screening calls.
  • Changing email addresses and routes.
  • Responsibility of costs.
  • Changing physical addresses.

Moving Inward Tactics

  • Involves denial and distraction.
  • Redefinition.
  • Engaging in medication.
  • Acting as if the problem is nothing is unlikely to deter the pursuer.

Moving Outwards

  • Involves socialization and utilization of third-party assistance.
  • Considers the necessity of seeking counseling.
  • Involves informal support.
  • Contacting law enforcement and obtaining protective orders.

Attachment Theory

  • Bonding experiences are between infants and their primary caregivers.
  • Securely attached infants derive security from accessible and responsible caregivers.
  • Insecurely attached infants experience rejection, abandonment, or indifference.
  • The tripartite conceptualization of attachment evolved into 4 categories based on models of self and others:
    • Positively viewed self is worthy of love and support.
    • Negatively views self as unworthy.
    • Positively viewed others are reliable and supportive partners.
    • Negatively viewed others are unreliable/rejecting.
  • Attachment tendencies acquired in infancy guide orientation to attachment figures through lifespan; styles of secure attachement, anxious ambivalence and avoidance.
  • Securely attached individuals possess a positive view of self.
  • Pursue self-acceptance by seeking the acceptance of important others.
  • Fearful-avoidant attachments hold negative view of both self and others.
    • Although they desire acceptance, they expect rejection.
  • Dismissive-avoidant attachments possess a positive view of self, but a negative view of others.
    • They anticipate being devalued so protect themselves by maintaining distance.
  • Two dimensions of avoidance capture the incompatiblity and eschew relationship closeness.
  • The dimension of anxiety taps into to worry obsessively about partner abandonment and the loss of desired intimacy.

Relational Goal Pursuit Theory

  • People pursue relationships because they are desired end states.
  • Great effort is exerted when a relationship goal is thwarted.
  • Effort required exceeds the value of the goal, the goal is abandoned in favor of an alternate goal.
  • Goals are organized in a hierarchical fashion.
    • Lower-order goals are easily discarded/replaced, but higher-order goals are hardened.
  • Goal linking occurs when an individual perceives particular lower-order goals.
    • Possessing a particular relationship with higher-order goals, such as life and self worth.
  • Obsessive relational pursuers rationalize that with sufficient effort.
    • Achieved desired goal, believe more persistent goal, striving activity will be successful.
  • Obsessive pursuers attribute actions to noble intentions.
    • Pursuing "love" and "connection" justify persistent behaviors.

Stalking Victimization

  • The longer of the duration of the stalking - the greater the potential damage to the victim (McEwan et al., 2007)
  • The frequency of physical violence in stalking episodes is high.
  • The best predictors of risk factors for stalking violence were:
    • A prior intimate relationship between the victim and stalker
    • Victims who shared a prior intimate relationship are at high risk of violence Rosenfeld (2004)
  • Presence of explicit threats:
    • Majority do not actually proceed to violence.
    • Have uttered a threat toward prior assault.
  • A history of substance abuse is a predictor of future violence
    • Particularly among the mentally disordered
  • Absence of psychosis:
    • Psychotic stalkers are less likely to be physically violent than non-psychotic stalkers
  • Ex-intimate partners are subjected to longer periods of stalking vs. other relationships.
  • Strangers are typically stalked for the shortest duration.

Cyberstalking (Miller 2012)

  • Behaviors that involve repeated threats, harassment, or any other unwanted contact using a computer or other electronics.
  • Has the effect of making another person feel afraid, intimidated, or concerned for his/her safety.
  • Gathering personal, financial, and other information through Internet services.
  • Using spyware or keystroke hardware on the victim's computer to monitor communications.
  • Using social networking sites, harassing the victim and impersonating them.
  • Sending harassing text messages by cell phone.
  • Taking surreptitious photos or videos using previously recorded intimate images to.
  • Forms of cyberstalking include: -Monitoring the victim's email communication.
    • Sending insulting/threatening emails, sometimes anonymously.
    • Disrupting the victim's email communications by flooding the inbox.
    • Sending a virus/malware program.
    • Using the victim's email identity to send false messages or purchase goods.
  • Cyberstalking is frequently used in conjunction with physical stalking and can be considered an extension of it.
  • Prior intimate partner stalkers are somewhat less likely to be cyberstalked than stalked because stalker already know them.
  • May also be preferred pursuit harassment, or methodology of women stalkers because of the safety and anonymity.

Cupach and Spitzburg Grouped Motives

  • Expressive - jealousy, anger, intimacy.
  • Instrumental - tangible disputes, control, power.
  • Personaliogical - drugs, dependency, mental issue and incompetence.
  • Contextual breakup, nostalgia, rival for affections.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Tech Abuse and Online Stalking Research
10 questions
Stalking Awareness Flashcards
4 questions

Stalking Awareness Flashcards

MatchlessAltoSaxophone avatar
MatchlessAltoSaxophone
Understanding Sexual Violence and Stalking
45 questions
Use Quizgecko on...
Browser
Browser