Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-mwx4w Total loading time: 0 Render date: 2024-06-23T18:01:54.158Z Has data issue: false hasContentIssue false

19 - Technology and Hurt in Close Relationships

from PART V - HURT IN APPLIED CONTEXTS

Published online by Cambridge University Press:  04 August 2010

Anita L. Vangelisti
Affiliation:
University of Texas, Austin
Get access

Summary

Although it is acknowledged here that there are numerous ways technology can be used to hurt people, this chapter focuses solely on one type of technology – that being cyberspace. “It is generally understood that cyberspace is the space generated by software within a computer that produces a virtual reality” (Whitty, 2003a, p. 343). However, an alternative view is that cyberspace existed before the Internet in the form of telephone calls. Others would even contend that the telegraph is another example of communications in cyberspace (see Whitty & Carr, 2006, for a more detailed discussion). For the purposes of this chapter cyberspace is taken to mean the Internet and SMS text messaging.

It is noteworthy that the Internet was not first set up as a communication tool. Rather it was originally set up by the U.S. Defense Department in the 1960s as a system for their workers to share data. This original system, which was called the Arpanet, soon changed as the individuals using the system quickly reshaped it to meet their personal and social needs. Friendships began to blossom online and so too did romances, which often led to face-to-face meetings and sometimes even marriage. In the early days of the Internet, scholars held much hope for this new arena. Turkle (1995), for instance, argued that cyberspace was a kind of utopia where individuals could feel free to explore their identities without judgment.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2009

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Amato, P. R., & Previti, D. (2003). People's reasons for divorcing: Gender, social class, the life course, and adjustment. Journal of Family Issues, 24, 602–626.CrossRefGoogle Scholar
Andrejevic, M. (2006). Monitoring survey. Unpublished raw data.
Barak, A. (2005). Sexual harassment on the Internet. Social Science Computer Review, 23(1), 77–92.CrossRefGoogle Scholar
Bocij, P. (2003). Victims of cyberstalking: An exploratory study of harassment perpetrated via the Internet. Retrieved November 20, 2005, from http://firstmonday.org/issues/issue8_10/bocij/CrossRef
Bocij, P. (2004). Cyberstalking: Harassment in the internet age and how to protect your family. Westport, CT: Praeger.Google Scholar
Buss, D. M., Larsen, R., Westen, D., & Semmelroth, J. (1992). Sex differences in jealousy: Evolution, physiology, and psychology. Psychological Science, 3, 251–255.CrossRefGoogle Scholar
Caspi, A., & Gorsky, P. (2006). Online deception: Prevalence, motivation and emotion. CyberPsychology & Behavior, 9(1), 54–59.CrossRefGoogle Scholar
Cooper, A., Delmonico, D. L., & Burg, R. (2000). Cybersex users, abusers, and compulsives: New findings and implications. Sexual Addiction & Compulsivity, 7, 5–29.CrossRefGoogle Scholar
Cornwell, B., & Lundgren, D. C. (2001). Love on the Internet: Involvement and misrepresentation in romantic relationships in cyberspace vs. realspace. Computers in Human Behavior, 17, 197–211.CrossRefGoogle Scholar
Paulo, B. M., & Kashy, D. A. (1998). Everyday lies in close and casual relationships. Journal of Personality and Social Psychology, 74, 147–167.Google Scholar
DeSteno, D., Bartlett, M. Y., Braverman, J., & Salovey, P. (2002). Sex differences in jealousy: Evolutionary mechanism or artifact of measurement?Journal of Personality and Social Psychology, 83, 1103–1116.CrossRefGoogle ScholarPubMed
DeSteno, D., & Salovey, P. (1996). Evolutionary origins of sex differences in jealousy? Questioning the “fitness” of the model. Psychological Science, 7, 367–371.CrossRefGoogle Scholar
Goffman, E. (1997). The presentation of self in everyday life. In Lemert, C. & Branaman, A. (Eds.), The Goffman reader. New York: Doubleday Anchor. (Original work published in 1959)Google Scholar
Griffiths, M. (2000). Internet addiction – Time to be taken seriously?Addiction Research, 8, 413–418.CrossRefGoogle Scholar
Grohol, J. M. (1998). Response to the HomeNet study, PsychCentral. Retrieved October, 27, 2004, from http://psychcentral.com/homenet.htm
Hancock, J., Thom-Santelli, J., & Ritchie, T. (2004). Deception and design: The impact of communication technologies on lying behavior. Proceedings of the Conference on Computer Human Interaction, 6(1), 130–136.CrossRefGoogle Scholar
Harris, C. R., & Christenfeld, N. (1996). Gender, jealousy, and reason. Psychological Science, 7, 364–366.CrossRefGoogle Scholar
Kraut, R., Kiesler, S., Boneva, B., Cummings, J., Helgeson, V., & Crawford, A. (2002). Internet paradox revisited. Journal of Social Issues, 58, 49–74.CrossRefGoogle Scholar
Kraut, R., Patterson, M., Lundmark, V., Kiesler, S., Mukopadhyay, T., & Scherlies, W. (1998). Internet paradox: A social technology that reduces social involvement and psychological well-being?American Psychologist, 53, 1017–1031.CrossRefGoogle ScholarPubMed
LaRose, R., Eastin, M., & Gregg, J. (2001). Reformulating the Internet paradox: Social cognitive explanations of Internet use and depression. Journal of Online Behavior, 1(2). Retrieved October 27, 2004, from http://www.behavior.net/JOB/v1n2/paradox.htmlGoogle Scholar
Mileham, B. L. A. (2007). Online infidelity in Internet chat rooms: An ethnographic exploration. Computers in Human Behavior, 23(1), 11–31.CrossRefGoogle Scholar
Morahan-Martin, J. (1999). The relationship between loneliness and Internet use and abuse. Cyberpsychology & Behavior, 2, 431–439.CrossRefGoogle Scholar
,Out my ex.com. (n.d.). Retrieved November 20, 2005, from http://www.outmyex.com
Parker, T. S., & Wampler, K. S. (2003). How bad is it? Perceptions of the relationship impact of different types of internet sexual activities. Contemporary Family Therapy, 25(4), 415–429.CrossRefGoogle Scholar
,Philanderers.com (n.d.). Retrieved October 31, 2005, from http://www.philanderers.com
Roscoe, B., Cavanaugh, L., & Kennedy, D. (1988). Dating infidelity: Behaviors reasons, and consequences. Adolescence, 23, 35–43.Google Scholar
Shackelford, T., & Buss, D. (1996). Betrayal in mateships, friendships, and coalitions. Journal of Personality and Social Psychology, 22, 1151–1164.CrossRefGoogle Scholar
Sproull, L., & Kiesler, S. (1986). Reducing social context cues: Electronic mail in organizational communication. Management Science, 32, 1492–1512.CrossRefGoogle Scholar
Turkle, S. (1995). Life on the screen: Identity in the age of the Internet. London: Weidenfeld & Nicolson.Google Scholar
Utz, S. (2005). Types of deception and underlying motivation: What people think. Social Science Computer Review, 23(1), 39–48.CrossRefGoogle Scholar
Whitty, M. T. (2002). Liar, liar! An examination of how open, supportive and honest people are in chat rooms. Computers in Human Behavior, 18, 343–352.CrossRefGoogle Scholar
Whitty, M. T. (2003a). Cyber-flirting: Playing at love on the Internet. Theory and Psychology, 13(3), 339–357.CrossRefGoogle Scholar
Whitty, M. T. (2003b). Pushing the wrong buttons: Men's and women's attitudes towards online and offline infidelity. CyberPsychology & Behavior, 6(6), 569–579.CrossRefGoogle Scholar
Whitty, M. T. (2004). Cyber-flirting: An examination of men's and women's flirting behaviour both offline and on the Internet. Behaviour Change, 21(2), 115–126.CrossRefGoogle Scholar
Whitty, M. T. (2005). The ‘realness' of cyber-cheating: Men and women's representations of unfaithful Internet relationships. Social Science Computer Review, 23(1), 57–67.CrossRefGoogle Scholar
Whitty, M. T. (2008). Revealing the ‘real’ me, searching for the ‘actual’ you: Presentations of self on an internet dating site. Computers in Human Behavior, 24(4), 1707–1723.CrossRefGoogle Scholar
Whitty, M. T., & Buchanan, T. (in press). Looking for love in so many places: Characteristics of online daters and speed daters. Interpersona: An International Journal on Personal Relationships.
Whitty, M. T., & Carr, A. N. (2003). Cyberspace as potential space: Considering the web as a playground to cyber-flirt. Human Relations, 56, 861–891.CrossRefGoogle Scholar
Whitty, M. T., & Carr, A. N. (2005a). Electronic bullying in the workplace. In Fisher, B., Bowie, V., & Cooper, C. (Eds.), Workplace violence. (pp. 103–115). Devon, UK: Willan Publishing.Google Scholar
Whitty, M. T., & Carr, A. N. (2005b). Taking the good with the bad: Applying Klein's work to further our understandings of cyber-cheating. Journal of Couple and Relationship Therapy, 4(2/3), 103–115.CrossRefGoogle Scholar
Whitty, M. T., & Carr, A. N. (2006). Cyberspace romance: The psychology of online relationships. Basingstoke: Palgrave Macmillan.CrossRefGoogle Scholar
Whitty, M. T., & Carville, S. E. (2008). Would I lie to you? Self-serving lies and other-oriented lies told across different media. Computers in Human Behavior, 24(3), 1021–1031.CrossRefGoogle Scholar
Whitty, M. T., & McLaughlin, D. (2007). Online recreation: The relationship between loneliness, internet self-efficacy and the use of the internet for entertainment purposes. Computers in Human Behavior, 23, 1435–1446.CrossRefGoogle Scholar
Whitty, M. T., & Quigley, L. (2008). Emotional and sexual infidelity offline and in cyberspace. Journal of Marital and Family Therapy, 34, 461–488.CrossRefGoogle ScholarPubMed
Wilkins, L. (2003, May 20). Stalker had sophisticated cyber plan. BBC News, UK edition. Retrieved March, 2, 2005, from http://news.bbc.co.uk/1/hi/uk/3040623.stm
Winnicott, D. W. (1971). Playing and reality. New York: Basic Books.Google Scholar
Yarab, P. E., Sensibaugh, C. C., & Allgeier, E. (1998). More than just sex: Gender differences in the incidence of self-defined unfaithful behavior in heterosexual dating relationships. Journal of Psychology & Human Sexuality, 10(2), 45–57.CrossRefGoogle Scholar
Young, K. S. (1998). Internet addiction: The emergence of a new clinical disorder. CyberPsychology & Behavior, 1, 237–244.CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×