Subtopic Deep Dive

Stalking and Intimate Partner Violence
Research Guide

What is Stalking and Intimate Partner Violence?

Stalking and Intimate Partner Violence examines stalking behaviors as an escalation tactic within abusive relationships, linking them to increased risks of femicide and coercive control.

Researchers analyze qualitative data from survivors and quantitative risk assessment protocols to identify stalking patterns in IPV. Key studies include Nicolaidis et al. (2003) with 130 citations on attempted homicide survivors and Melton (2012) with 12 citations on police responses. Over 20 papers from 2003-2022 explore predictive validity and tech-enabled abuse.

12
Curated Papers
3
Key Challenges

Why It Matters

Lethality assessments in IPV cases use stalking indicators to prioritize interventions, as shown in Svalin and Levander (2019) review of risk tools across settings (45 citations). Safety apps like MyPlan reduce dating violence, per Glass et al. (2015) RCT protocol (73 citations). Police protocols such as VioGén improve gender violence prediction, demonstrated by López-Ossorio et al. (2015) (50 citations). These applications enhance victim protection and perpetrator management.

Key Research Challenges

Predictive Validity of Risk Tools

Risk assessments for IPV stalking show variable accuracy across settings, as reviewed by Svalin and Levander (2019) analyzing practitioner tools. Challenges include inconsistent implementation and limited longitudinal data. Flowers et al. (2020) highlight gaps in identifying stalker characteristics.

Tech Abuse in Stalking

Digital tools enable new stalking forms like password demands, per Maftei and Dănilă (2021). PenzeyMoog and Slakoff (2021) identify tech abuse types but note insufficient solutions. Measuring prevalence remains difficult due to underreporting.

Escalation to Lethality

Linking stalking to homicide requires temporal sequences, as in Monckton-Smith et al. (2022). Nicolaidis et al. (2003) use survivor data to reveal warning signs, but real-time detection lags. Police integration of IPA and stalking data poses coordination issues, per Melton (2012).

Essential Papers

1.

Could we have known? A qualitative analysis of data from women who survived an attempted homicide by an intimate partner

Christina Nicolaidis, Mary Ann Curry, Yvonne Ulrich et al. · 2003 · Journal of General Internal Medicine · 130 citations

2.

A safety app to respond to dating violence for college women and their friends: the MyPlan study randomized controlled trial protocol

Nancy Glass, Amber Clough, James Case et al. · 2015 · BMC Public Health · 73 citations

3.

Eficacia predictiva de la valoración policial del riesgo de la violencia de género

Juan José López‐Ossorio, José Luís González Álvarez, Antonio Andrés Pueyo · 2015 · Psychosocial Intervention · 50 citations

"Para prevenir la violencia de género se desarrolló el protocolo denominado « valoración policial del riesgo » (VPR) para su uso por profesionales de las fuerzas de seguridad del Estado. Este proto...

4.

The Predictive Validity of Intimate Partner Violence Risk Assessments Conducted by Practitioners in Different Settings—a Review of the Literature

Klara Svalin, Sten Levander · 2019 · Journal of Police and Criminal Psychology · 45 citations

Intimate partner violence (IPV) is a global health problem with severe consequences. One way to prevent repeat IPVis to identify the offender’s risk of recidivism by conducting a risk assessment an...

5.

Give me your password! What are you hiding? Associated factors of intimate partner violence through technological abuse

Alexandra Maftei, Oana Dănilă · 2021 · Current Psychology · 24 citations

6.

As Technology Evolves, so Does Domestic Violence: Modern-Day Tech Abuse and Possible Solutions

Eva PenzeyMoog, Danielle C. Slakoff · 2021 · 19 citations

Abstract The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this chapter, we dis...

7.

Identifying the characteristics associated with intimate partner stalking: a mixed methods structured review and narrative synthesis

Caroline Flowers, Belinda Winder, Karen Slade · 2020 · Journal of Forensic Psychiatry and Psychology · 14 citations

The empirical research on the clinical management of intimate partner stalking perpetrators remains in the early stages of informing forensic practice. This study presents the first known structure...

Reading Guide

Foundational Papers

Start with Nicolaidis et al. (2003) for survivor perspectives on homicide attempts, then Melton (2012) for police-IPV stalking intersections; these establish core qualitative and institutional frameworks.

Recent Advances

Study Svalin and Levander (2019) for risk tool validity, Flowers et al. (2020) for stalker traits, and Monckton-Smith et al. (2022) for escalation sequences.

Core Methods

Core techniques include qualitative analysis of survivor interviews (Nicolaidis et al., 2003), predictive protocol validation (López-Ossorio et al., 2015), structured reviews (Svalin and Levander, 2019), and temporal sequence modeling (Monckton-Smith et al., 2022).

How PapersFlow Helps You Research Stalking and Intimate Partner Violence

Discover & Search

Research Agent uses searchPapers and citationGraph to map high-citation works like Nicolaidis et al. (2003, 130 citations) as a hub connecting to Glass et al. (2015) and Svalin and Levander (2019). exaSearch uncovers Spanish-language protocols like López-Ossorio et al. (2015); findSimilarPapers expands from Melton (2012) to recent tech abuse papers.

Analyze & Verify

Analysis Agent applies readPaperContent to extract risk factors from Flowers et al. (2020), then verifyResponse with CoVe checks claims against Monckton-Smith et al. (2022). runPythonAnalysis processes citation networks or recidivism stats from Svalin and Levander (2019) via pandas; GRADE grading scores evidence strength in Nicolaidis et al. (2003) qualitative data.

Synthesize & Write

Synthesis Agent detects gaps in tech abuse interventions from Maftei and Dănilă (2021) vs. PenzeyMoog and Slakoff (2021). Writing Agent uses latexEditText for risk model drafts, latexSyncCitations to integrate 10+ papers, and latexCompile for reports; exportMermaid visualizes escalation sequences from Monckton-Smith et al. (2022).

Use Cases

"Run stats on recidivism rates from IPV risk assessment papers."

Research Agent → searchPapers('IPV stalking risk prediction') → Analysis Agent → runPythonAnalysis(pandas on Svalin 2019 + López-Ossorio 2015 data) → statistical summary table with p-values and confidence intervals.

"Draft LaTeX review on stalking escalation in IPV with citations."

Research Agent → citationGraph(Nicolaidis 2003) → Synthesis Agent → gap detection → Writing Agent → latexEditText + latexSyncCitations(10 papers) + latexCompile → formatted PDF with temporal sequence diagram.

"Find code for IPV stalking risk models from papers."

Research Agent → paperExtractUrls(VioGén protocol papers) → Code Discovery → paperFindGithubRepo → githubRepoInspect → Python scripts for risk prediction from López-Ossorio et al. (2015)-linked repos.

Automated Workflows

Deep Research workflow conducts systematic review of 50+ IPV stalking papers, chaining searchPapers → citationGraph → GRADE grading for structured lethality assessment report. DeepScan applies 7-step analysis with CoVe checkpoints to verify tech abuse patterns across Maftei (2021) and PenzeyMoog (2021). Theorizer generates coercive control models from Melton (2012) and Monckton-Smith (2022) sequences.

Frequently Asked Questions

What defines stalking in IPV contexts?

Stalking in IPV involves repeated unwanted pursuit post-separation, escalating coercive control, as analyzed in Flowers et al. (2020) mixed-methods review and Melton (2012) police study.

What are key risk assessment methods?

Methods include VioGén protocol (López-Ossorio et al., 2015) for police prediction and practitioner tools reviewed by Svalin and Levander (2019), focusing on recidivism validity.

What are foundational papers?

Nicolaidis et al. (2003, 130 citations) provides qualitative survivor data on attempted homicides; Melton (2012, 12 citations) examines police handling of stalking-IPA overlap.

What open problems exist?

Challenges include tech abuse measurement (Maftei and Dănilă, 2021) and real-time lethality prediction (Monckton-Smith et al., 2022), with needs for longitudinal multisite data.

Research Stalking, Cyberstalking, and Harassment with AI

PapersFlow provides specialized AI tools for Social Sciences researchers. Here are the most relevant for this topic:

See how researchers in Social Sciences use PapersFlow

Field-specific workflows, example queries, and use cases.

Social Sciences Guide

Start Researching Stalking and Intimate Partner Violence with AI

Search 474M+ papers, run AI-powered literature reviews, and write with integrated citations — all in one workspace.

See how PapersFlow works for Social Sciences researchers