Exploring the use of story completion to understand the perpetration of technology-facilitated abuse in relationships

PurposeThis paper presents a novel exploration of the story completion (SC) method for investigating perpetration of technology-facilitated abuse in relationships (TAR).Design/methodology/approachThe authors adopted the infrequently used SC method to explore TAR perpetration. The perpetration of TAR can involve socially undesirable and potentially illegal behaviours such as online stalking, non-consensual sharing of nude images, and other coercive and controlling behaviours. These problematic behaviours present an ideal context for employing the SC method to reveal new data on TAR perpetrator perspectives, motivations and behaviours.FindingsThe SC method elicited new hypotheses regarding TAR perpetration behaviours and motivations. Post-study reflection on the multifaceted nature of perpetration raised questions about the utility of SC as a stand-alone method for investigating TAR perpetration. Challenges encountered included: striking the most effective length, detail and ambiguity in the story stems, difficulty in eliciting important contextual features in participants’ stories, and other issues scholars encounter when investigating perpetration of violence more broadly. The authors close with suggestions for more effective use of SC methodology in TAR and intimate partner violence research.Originality/valueThis paper expands discussion of the SC method’s application and extends scholarship on violence and perpetration research methodologies. The paper demonstrates the importance of story stem design to the attainment of research objectives and the usefulness and limitations of SC in exploring this sensitive topic and hard-to-reach population. It also advocates for the combined application of SC with other methodological approaches for the attainment of research outcomes when investigating multifaceted phenomenon.

[1]  D. Woodlock,et al.  Technology and Domestic and Family Violence , 2023 .

[2]  E. Hornecker,et al.  Care Stories: Understanding People's Hopes and Fears for Technologies of Care through Story Elicitation , 2022, MindTrek.

[3]  I. Lavi,et al.  Meta-Analysis of Cyber Intimate Partner Violence Perpetration and Victimization: Different Types and their Associations with Face-to-Face IPV among Men and Women , 2022, Trauma, violence & abuse.

[4]  Christopher E. M. Lloyd,et al.  ‘Mad, bad, or possessed’? Perceptions of Self-Harm and Mental Illness in Evangelical Christian Communities , 2022, Pastoral Psychology.

[5]  K. Boydell,et al.  ‘This bloody rona!’: using the digital story completion method and thematic analysis to explore the mental health impacts of COVID-19 in Australia , 2022, BMJ Open.

[6]  K. Boydell,et al.  How can Story Completion be Used in Culturally Safe Ways? , 2022, International Journal of Qualitative Methods.

[7]  C. Butler,et al.  The social construction of gender variance in childhood, adolescence and parenthood: A story completion study , 2021, Journal of Family Therapy.

[8]  Kelsey Hegarty,et al.  Technology-facilitated abuse in relationships: Victimisation patterns and impact in young people , 2021, Comput. Hum. Behav..

[9]  L. Howard,et al.  Healthcare experiences of perpetrators of domestic violence and abuse: a systematic review and meta-synthesis , 2021, BMJ Open.

[10]  V. Braun,et al.  Conceptual and design thinking for thematic analysis , 2021 .

[11]  Victoria Clarke,et al.  Exploring therapists' and psychology students' constructions of sexual refusal in heterosexual relationships: A qualitative story completion study , 2021, Counselling and Psychotherapy Research.

[12]  K. Hegarty,et al.  Exploring the Impact of Technology-Facilitated Abuse and Its Relationship with Domestic Violence: A Qualitative Study on Experts’ Perceptions , 2021, Global qualitative nursing research.

[13]  K. Hegarty,et al.  Digital dating abuse perpetration and impact: The importance of gender , 2020, Journal of Youth Studies.

[14]  Brian Penti,et al.  How We Talk About “Perpetration of Intimate Partner Violence” Matters , 2020, The Journal of the American Board of Family Medicine.

[15]  Deborah Lupton,et al.  Towards more-than-human digital data studies: developing research-creation methods , 2020, Qualitative Research.

[16]  Chinmay Kulkarni,et al.  "All Rise for the AI Director": Eliciting Possible Futures of Voice Technology through Story Completion , 2020, Conference on Designing Interactive Systems.

[17]  Tawanna Dillahunt,et al.  Reaching Hard-To-Reach Populations: An Analysis of Survey Recruitment Methods , 2019, CSCW Companion.

[18]  K. Gravett Story Completion: Storying as a Method of Meaning-Making and Discursive Discovery , 2019, International Journal of Qualitative Methods.

[19]  E. Borrajo,et al.  Cyber dating abuse (CDA): Evidence from a systematic review , 2019, Aggression and Violent Behavior.

[20]  Kari N. Duerksen,et al.  Technological intimate partner violence: Exploring technology-related perpetration factors and overlap with in-person intimate partner violence , 2019, Comput. Hum. Behav..

[21]  George Danezis,et al.  ‘Internet of Things’: How Abuse is Getting Smarter , 2019, SSRN Electronic Journal.

[22]  Hannah Frith,et al.  Editorial Introduction to the Special Issue: Using Story Completion Methods in Qualitative Research , 2019, Qualitative Research in Psychology.

[23]  Emily Jennings,et al.  Breaking gendered boundaries? Exploring constructions of counter-normative body hair practices in Āotearoa/New Zealand using story completion , 2019, Qualitative Research in Psychology.

[24]  Nicole Westmarland,et al.  Researching Gender, Violence and Abuse , 2018 .

[25]  K. Stonard The prevalence and overlap of technology-assisted and offline adolescent dating violence , 2018, Current Psychology.

[26]  Jamie Guillory,et al.  Recruiting Hard-to-Reach Populations for Survey Research: Using Facebook and Instagram Advertisements and In-Person Intercept in LGBT Bars and Nightclubs to Recruit LGBT Young Adults , 2018, Journal of medical Internet research.

[27]  K. Hegarty,et al.  Digital dating abuse measures: A critical review , 2018 .

[28]  Lisa A. Melander,et al.  Intimate Partner Violence Victimization in the Cyber and Real World: Examining the Extent of Cyber Aggression Experiences and Its Association With In-Person Dating Violence , 2018, Journal of interpersonal violence.

[29]  Gavin Wood,et al.  "They're Just Tixel Pits, Man": Disputing the 'Reality' of Virtual Reality Pornography through the Story Completion Method , 2017, CHI.

[30]  K. Hegarty,et al.  Methodological and Ethical Challenges in a Web-Based Randomized Controlled Trial of a Domestic Violence Intervention , 2017, Journal of medical Internet research.

[31]  N. Titov,et al.  Facebook as an effective recruitment strategy for mental health research of hard to reach populations , 2016, Internet interventions.

[32]  Justin W. Patchin,et al.  Measuring cyberbullying: Implications for research , 2015 .

[33]  Debra Gray,et al.  Hypothetically speaking: Using vignettes as a stand-alone qualitative method , 2015 .

[34]  Virginia Braun,et al.  Thou Shalt Not Covet Another Man? Exploring Constructions of Same‐Sex and Different‐Sex Infidelity Using Story Completion , 2015 .

[35]  E. Uhlmann,et al.  A Person-Centered Approach to Moral Judgment , 2015, Perspectives on psychological science : a journal of the Association for Psychological Science.

[36]  Parliamentary Counsel Online Safety Bill , 2012 .

[37]  V. Braun,et al.  Using thematic analysis in psychology , 2006 .

[38]  N. Sokoloff,et al.  Domestic Violence at the Intersections of Race, Class, and Gender , 2005, Violence against women.

[39]  M. Krohn,et al.  LABELING, LIFE CHANCES, AND ADULT CRIME: THE DIRECT AND INDIRECT EFFECTS OF OFFICIAL INTERVENTION IN ADOLESCENCE ON CRIME IN EARLY ADULTHOOD* , 2003 .

[40]  Christa Reiser,et al.  Social Stratification and the Digital Divide , 2003 .

[41]  Todd R. Clear,et al.  Incarceration and the Community: The Problem of Removing and Returning Offenders , 2001 .

[42]  B. Paterson,et al.  A Protocol for Researcher Safety , 1999, Qualitative health research.

[43]  E. Gullone,et al.  An examination of adolescent risk-taking using a story completion task. , 1997, Journal of adolescence.

[44]  Celia Kitzinger,et al.  Engendering Infidelity: Essentialist and Social Constructionist Readings of a Story Completion Task , 1995 .

[45]  C. Pope,et al.  Qualitative Research: Observational methods in health care settings , 1995, BMJ.

[46]  S. Lamb,et al.  Blaming The Perpetrator: Language that Distorts Reality in Newspaper Articles on Men Battering Women , 1995 .

[47]  Carol Collier Kuhlthau,et al.  Inside the search process: Information seeking from the user's perspective , 1991, J. Am. Soc. Inf. Sci..

[48]  S. Lamb Acts without agents: an analysis of linguistic avoidance in journal articles on men who batter women. , 1991, The American journal of orthopsychiatry.

[49]  M. Horner Toward An Understanding of Achievement‐Related Conflicts in Women , 1972 .

[50]  K. Hegarty,et al.  Development and validation of the TAR Scale: A measure of technology-facilitated abuse in relationships , 2021 .

[51]  Walter S. DeKeseredy,et al.  Routledge handbook of critical criminology , 2012 .

[52]  L. Heise,et al.  CHANGING COMMUNITY RESPONSES TO WIFE ABUSE A RESEARCH AND DEMONSTRATION PROJECT IN IZTACALCO, MEXICO , 1999 .