2,416
Views
15
CrossRef citations to date
0
Altmetric
Research Article

Technology-Facilitated Intimate Partner Abuse: a qualitative analysis of data from online domestic abuse forums

Pages 203-242 | Received 26 Mar 2018, Accepted 24 Oct 2019, Published online: 05 Dec 2019

References

  • Abramson, K. (2014). Turning up the lights on gaslighting. Philosophical Perspectives, 28(1), 1–30. doi:10.1111/phpe.12046
  • Ackland, R. (2013). Web social science: Concepts, data and tools for social scientists in the digital age (1st ed.). London, UK: Sage Publications Ltd.
  • Almuhimedi, H., Schaub, F., Sadeh, N., Adjerid, I., Acquisti, A., Gluck, J., … Agarwal, Y. (2015). Your location has been shared 5,398 times!: A field study on mobile app privacy nudging. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 787–796. doi:10.1145/2702123.2702210
  • Attard, A., & Coulson, N. S. (2012). A thematic analysis of patient communication in Parkinson’s disease online support group discussion forums. Computers in Human Behavior, 28(2), 500–506. doi:10.1016/j.chb.2011.10.022
  • Barnes, S. B. (2006). A privacy paradox: Social networking in the United States. First Monday: Peer-Reviewed Journal on the Internet, 11(9). doi:10.5210/fm.v11i9.1394
  • Barth, S., & de Jong, M. D. T. (2017). The privacy paradox – Investigating discrepancies between expressed privacy concerns and actual online behavior – A systematic literature review. Telematics and Informatics, 34(7), 1038–1058. doi:10.1016/j.tele.2017.04.013
  • Bent-Goodley, T. B. (2007). Health disparities and violence against women: Why and how cultural and societal influences matter. Trauma, Violence, & Abuse, 8(2), 90–104. doi:10.1177/1524838007301160
  • Besmer, A., & Richter Lipford, H. (2010). Moving beyond untagging: photo privacy in a tagged world. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1563–1572. doi:10.1145/1753326.1753560
  • Black, M. C., Basile, K. C., Breiding, M. J., Smith, S. G., Walters, M. L., Merrick, M. T., … Stevens, M. R. (2011). National intimate partner and sexual violence survey: 2010 summary report. Retrieved from National Center for Injury Prevention and ControlCenters for Disease Control and Prevention website: https://www.cdc.gov/ViolencePrevention/pdf/NISVS_Report2010-a.pdf
  • British Psychological Society. (2017). Ethics guidelines for Internet-mediated research (No. INF206/04.2017). Retrieved from Author website: www.bps.org.uk/publications/policy-and-guidelines/research-guidelines-policy-documents/research-guidelines-poli
  • Burman, E., & Chantler, K. (2005). Domestic violence and minoritisation: Legal and policy barriers facing minoritized women leaving violent relationships. International Journal of Law and Psychiatry, 28(1), 59–74. doi:10.1016/j.ijlp.2004.12.004
  • Campbell, J. C. (2004). Danger assessment. Retrieved from Danger Assessment website: https://www.dangerassessment.org/DA.aspx
  • Campbell, J. C., & Messing, J. (2017). assessing dangerousness, third edition: Domestic violence offenders and child abusers. New York, NY: Springer Publishing Company.
  • Carminati, B., & Ferrari, E. (2011). Collaborative access control in on-line social networks. 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom), 231–240. doi:10.4108/icst.collaboratecom.2011.247109
  • Cerulli, C., Edwardsen, E. A., Hall, D., Chan, K. L., & Conner, K. R. (2015). Improving coordinated responses for victims of intimate partner violence: Law enforcement compliance with state-mandated intimate partner violence documentation. Violence Against Women, 21(7), 897–907. doi:10.1177/1077801215584072
  • Charmaz, K. (2014). Constructing grounded theory: Introducing qualitative methods series (2nd ed.). London, UK: SAGE Publications.
  • Chatterjee, R., Doerfler, P., Orgad, H., Havron, S., Palmer, J., Freed, D., … Ristenpart, T. (2018). The spyware used in intimate partner violence. 2018 IEEE Symposium on Security and Privacy (SP), 441–458. doi:10.1109/SP.2018.00061
  • Coulson, N. S., & Knibb, R. C. (2007). Coping with food allergy: Exploring the role of the online support group. CyberPsychology & Behavior, 10(1), 145–148. doi:10.1089/cpb.2006.9978
  • Crawford, G., Maycock, B., Tobin, R., Brown, G., & Lobo, R. (2018). Prevention of HIV and Other Sexually Transmissible Infections in Expatriates and Traveler Networks: Qualitative Study of Peer Interaction in an Online Forum. Journal of Medical Internet Research, 20(9), e10787. doi:10.2196/10787
  • Dimond, J. P., Fiesler, C., & Bruckman, A. S. (2011). Domestic violence and information communication technologies. Interacting with Computers, 23(5), 413–421. doi:10.1016/j.intcom.2011.04.006
  • Duke, A., & Davidson, M. M. (2009). Same-sex intimate partner violence: Lesbian, gay, and bisexual affirmative outreach and advocacy. Journal of Aggression, Maltreatment & Trauma, 18(8), 795–816. doi:10.1080/10926770903291787
  • Dutton, D. G., & Painter, S. (1993). Emotional attachments in abusive relationships: A test of traumatic bonding theory. Violence and Victims; New York, 8(2), 105–120. doi:10.1891/0886-6708.8.2.105
  • Ellsberg, M., Jansen, H. A., Heise, L., Watts, C. H., & Garcia-Moreno, C. (2008). Intimate partner violence and women’s physical and mental health in the WHO multi-country study on women’s health and domestic violence: An observational study. The Lancet, 371(9619), 1165–1172. doi:10.1016/S0140-6736(08)60522-X
  • European Parliament, & Council of the European Union. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council on on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). Pub. L. No. 32016R0679, 119 OJ L 1, Official Journal of the European Union, European Union.
  • European Union Agency for Fundamental Rights. (2014). Violence against women: An EU-wide survey. Luxembourg: Author. European Union.
  • Eysenbach, G., & Till, J. E. (2001). Ethical issues in qualitative research on internet communities. British Medical Journal, 323(7321), 1103–1105. doi:10.1136/bmj.323.7321.1103
  • Felt, A. P., Ha, E., Egelman, S., Haney, A., Chin, E., & Wagner, D. (2012). Android permissions: User attention, comprehension, and behavior. Proceedings of the Eighth Symposium on Usable Privacy and Security, 3. doi:10.1145/2335356.2335360
  • Femi-Ajao, O., Kendal, S., & Lovell, K. (2018). A qualitative systematic review of published work on disclosure and help-seeking for domestic violence and abuse among women from ethnic minority populations in the UK. Ethnicity & Health, 1–15. doi:10.1080/13557858.2018.1447652
  • Fox, J., & Tokunaga, R. S. (2015). Romantic partner monitoring after breakups: Attachment, dependence, distress, and post-dissolution online surveillance via social networking sites. Cyberpsychology, Behavior, and Social Networking, 18(9), 491–498. doi:10.1089/cyber.2015.0123
  • Freed, D., Palmer, J., Minchala, D., Levy, K., Ristenpart, T., & Dell, N. (2018). “A stalker’s paradise”. How Intimate Partner Abusers Exploit Technology. Proceedings Of The, 1–667. doi:10.1145/3173574.3174241
  • Freed, D., Palmer, J., Minchala, D. E., Levy, K., Ristenpart, T., & Dell, N. (2017). Digital technologies and intimate partner violence: A qualitative analysis with multiple stakeholders. Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 1(CSCW), 46, 1–46: 22. doi:10.1145/3134681
  • García-Moreno, C., Jansen, H. A. F. M., Ellsberg, M., Heise, L., & Watts, C. (2005). WHO multi-country study on women’s health and domestic violence against women. Retrieved from World Health Organization website: http://www.who.int/reproductivehealth/publications/violence/24159358X/en/
  • Garg, V., Benton, K., & Camp, L. J. (2014). The privacy paradox: A Facebook case study. Proceedings of the 42nd Research Conference on Communication, Information and Internet Policy. Presented at the The 42nd Research Conference on Communication, Information and Internet Policy, Arlington, VA.
  • Gleason, W. J. (1993). Mental disorders in battered women: An empirical study. Violence and Victims; New York, 8(1), 53–68.
  • Hamberger, K., & Phelan, M. B. (2006). Domestic violence screening in medical and mental health care settings. Journal of Aggression, Maltreatment & Trauma, 13(3–4), 61–99. doi:10.1300/J146v13n03_04
  • Hargreaves, S., Bath, P. A., Duffin, S., & Ellis, J. (2018). Sharing and empathy in digital spaces: qualitative study of online health forums for breast cancer and motor neuron disease (Amyotrophic lateral sclerosis). Journal of Medical Internet Research, 20(6), e222. doi:10.2196/jmir.9709
  • Harris, B. A., & Woodlock, D. (2018). Digital coercive control: Insights from two landmark domestic violence studies. The British Journal of Criminology. doi:10.1093/bjc/azy052
  • Herman, J. L. (2015). Trauma and recovery: The aftermath of violence — From domestic abuse to political terror. New York, NY: Basic Books.
  • Herron, D., Moncur, W., & van den Hoven, E. (2016). Digital possessions after a romantic break up. Proceedings of the 9th Nordic Conference on Human-Computer Interaction, 36, 1–36: 10. doi:10.1145/2971485.2971539
  • Herron, D., Moncur, W., & van den Hoven, E. (2017). Digital decoupling and disentangling: Towards design for romantic break up. Proceedings of the 2017 Conference on Designing Interactive Systems, 1175–1185. doi:10.1145/3064663.3064765
  • Hilton, N. Z., Harris, G. T., & Rice, M. E. (2010). Risk assessment for domestically violent men: Tools for criminal justice, offender intervention, and victim services. Retrieved from http://www.apa.org/pubs/books/4318055.aspx
  • HMIC. (2014). Everyone’s business: Improving the police response to domestic abuse. Retrieved from Her Majesty’s Inspectorate of Constabulary website: https://www.justiceinspectorates.gov.uk/hmicfrs/publications/improving-the-police-response-to-domestic-abuse/
  • HMICFRS. (2017). A progress report on the police response to domestic abuse (No. 978-1-78655-586–1). Retrieved from Her Majesty’s Inspectorate of Constabulary and Fire & Rescue Services website: https://www.justiceinspectorates.gov.uk/hmicfrs/wp-content/uploads/progress-report-on-the-police-response-to-domestic-abuse.pdf
  • Holtz, P., Kronberger, N., & Wagner, W. (2012). Analyzing internet forums: A practical guide. Journal of Media Psychology: Theories, Methods, and Applications, 24(2), 55–66. doi:10.1027/1864-1105/a000062
  • Hu, H., Ahn, G., & Jorgensen, J. (2013). Multiparty access control for online social networks: Model and mechanisms. IEEE Transactions on Knowledge and Data Engineering, 25(7), 1614–1627. doi:10.1109/TKDE.2012.97
  • Ilia, P., Polakis, I., Athanasopoulos, E., Maggi, F., & Ioannidis, S. (2015). Face/off: Preventing privacy leakage from photos in social networks. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 781–792. doi:10.1145/2810103.2813603
  • Im, E.-O., & Chee, W. (2012). Practical guidelines for qualitative research using online forums. Computers, Informatics, Nursing, 30(11), 604–611. doi:10.1097/NXN.0b013e318266cade
  • Kearney, M. H. (2001). Enduring love: A grounded formal theory of women’s experience of domestic violence. Research in Nursing & Health, 24(4), 270–282. doi:10.1002/nur.1029
  • Kimmerle, J., Bientzle, M., & Cress, U. (2014). Personal experiences and emotionality in health-related knowledge exchange in internet forums: A randomized controlled field experiment comparing responses to facts vs personal experiences. Journal of Medical Internet Research, 16(12), e277. doi:10.2196/jmir.3766
  • Kulwicki, A., Aswad, B., Carmona, T., & Ballout, S. (2010). Barriers in the utilization of domestic violence services among arab immigrant women: Perceptions of professionals, service providers & community leaders. Journal of Family Violence, 25(8), 727–735. doi:10.1007/s10896-010-9330-8
  • Kummervold, P. E., Gammon, D., Bergvik, S., Johnsen, J.-A. K., Hasvold, T., & Rosenvinge, J. H. (2002). Social support in a wired world: Use of online mental health forums in Norway. Nordic Journal of Psychiatry, 56(1), 59–65. doi:10.1080/08039480252803945
  • Laxton, C. (2014). Virtual world, real fear: Women’s Aid report into online abuse, harassment and stalking. Retrieved from https://www.womensaid.org.uk/virtual-world-real-fear/
  • Lettl, C., Herstatt, C., & Gemuenden, H. G. (2005). Learning from users for radical innovation. International Journal of Technology Management, 33(1), 25–45. doi:10.1504/IJTM.2006.008190
  • Liu, B., Andersen, M. S., Schaub, F., Almuhimedi, H., Zhang, S., Sadeh, N., … Agarwal, Y. (2016). Follow my recommendations: A personalized privacy assistant for mobile app permissions. Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security (pp. 27–41). Berkeley, CA, USA: USENIX Association.
  • Liu, Y., Gummadi, K. P., Krishnamurthy, B., & Mislove, A. (2011). Analyzing Facebook privacy settings: User expectations vs. reality. Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, 61–70. doi:10.1145/2068816.2068823
  • Lovatt, M., Bath, P. A., & Ellis, J. (2017). Development of trust in an online breast cancer forum: A qualitative study. Journal of Medical Internet Research, 19(5), e175. doi:10.2196/jmir.7471
  • Marganski, A., & Melander, L. (2015). Intimate partner violence victimization in the cyber and real world: Examining the extent of cyber aggression experiences and its association with in-person dating violence. Journal of Interpersonal Violence, 0886260515614283. doi:10.1177/0886260515614283
  • Marshall, T. C. (2012). Facebook surveillance of former romantic partners: Associations with postbreakup recovery and personal growth. Cyberpsychology, Behavior, and Social Networking, 15(10), 521–526. doi:10.1089/cyber.2012.0125
  • Matthews, T., O’Leary, K., Turner, A., Sleeper, M., Woelfer, J. P., Shelton, M., … Consolvo, S. (2017). Stories from survivors: Privacy & security practices when coping with intimate partner abuse. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2189–2201. doi:10.1145/3025453.3025875
  • McClennen, J. C., Summers, A. B., & Vaughan, C. (2008). Gay men’s domestic violence: Dynamics, help-seeking behaviors, and correlates. Journal of Gay & Lesbian Social Services, 14(1), 23–49. doi:10.1300/J041v14n01_02
  • Melling, B., & Houguet-Pincham, T. (2011). Online peer support for individuals with depression: A summary of current research and future considerations. Psychiatric Rehabilitation Journal, 34(3), 252–254. doi:10.2975/34.3.2011.252.254
  • Meng, J. (2016). Your health buddies matter: Preferential selection and social influence on weight management in an online health social network. Health Communication, 31(12), 1460–1471. doi:10.1080/10410236.2015.1079760
  • Miller, E., McCaw, B., Humphreys, B. L., & Mitchell, C. (2015). Integrating intimate partner violence assessment and intervention into healthcare in the United States: A systems approach. Journal of Women’s Health, 24(1), 92–99. doi:10.1089/jwh.2014.4870
  • Moncur, W., Gibson, L., & Herron, D. (2016). The role of digital technologies during relationship breakdowns. Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, 371–382. doi: 10.1145/2818048.2819925
  • Mondal, M., Messias, J., Ghosh, S., Gummadi, K. P., & Kate, A. (2017). Managing longitudinal exposure of socially shared data on the Twitter social media. International Journal of Advances in Engineering Sciences and Applied Mathematics, 9(4), 238–257. doi:10.1007/s12572-017-0196-3
  • Naslund, J. A., Aschbrenner, K. A., Marsch, L. A., & Bartels, S. J. (2016). The future of mental health care: Peer-to-peer support and social media. Epidemiology and Psychiatric Sciences, 25(2), 113–122. doi:10.1017/S2045796015001067
  • Navarro, J. N., Clevenger, S., & Marcum, C. D. (2016). The intersection between intimate partner abuse, technology, and cybercrime: Examining the virtual enemy. Durham, NC, USA: Carolina Academic Press.
  • Newell, A. F., Gregor, P., Morgan, M., Pullin, G., & Macaulay, C. (2011). User-sensitive inclusive design. Universal Access in the Information Society; Heidelberg, 10(3), 235–243. doi:10.1007/s10209-010-0203-y
  • Niela-Vilén, H., Axelin, A., Salanterä, S., & Melender, H.-L. (2014). Internet-based peer support for parents: A systematic integrative review. International Journal of Nursing Studies, 51(11), 1524–1537. doi:10.1016/j.ijnurstu.2014.06.009
  • Office for National Statistics. (2017, November 23). Domestic abuse in England and Wales: Year ending March 2017 [Statistical bulletin]. Retrieved from Office for National Statistics website: https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/bulletins/domesticabuseinenglandandwales/yearendingmarch2017
  • PERF. (2015). Police improve response to domestic violence, but abuse often remains the ‘Hidden Crime’. Police Executive Research Forum Newsletter, 29, 1. Retrieved from https://www.policeforum.org/assets/docs/Subject_to_Debate/Debate2015/debate_2015_janfeb.pdf
  • Prayudi, Y., & Sn, A. (2015). Digital chain of custody: State of the art. International Journal of Computer Applications, 114(5), 1–9. doi:10.5120/19971-1856
  • Pullin, G., & Newell, A. (2007). Focussing on Extra-Ordinary Users. Universal Acess in Human Computer Interaction. Coping with Diversity, 253–262. doi:10.1007/978-3-540-73279-2_29
  • Rains, S. A., Peterson, E. B., & Wright, K. B. (2015). Communicating social support in computer-mediated contexts: A meta-analytic review of content analyses examining support messages shared online among individuals coping with illness. Communication Monographs, 82(4), 403–430. doi:10.1080/03637751.2015.1019530
  • Richards, L. (2016). Domestic abuse, stalking and harassment and honour based violence (DASH, 2009–16) risk identification and assessment and management model. Retrieved from National Police Chiefs’ Council & Safe Lives website: https://www.dashriskchecklist.co.uk/wp-content/uploads/2016/09/DASH-2009-2016-with-quick-reference-guidance.pdf
  • Rizo, C. F., Macy, R. J., Ermentrout, D. M., O’Brien, J., Pollock, M. D., & Dababnah, S. (2017). Research with children exposed to partner violence: perspectives of service-mandated, CPS- and court-involved survivors on research with their children. Journal of Interpersonal Violence, 32(19), 2998–3026. doi:10.1177/0886260515596534
  • Robinson, L., & Spilsbury, K. (2008). Systematic review of the perceptions and experiences of accessing health services by adult victims of domestic violence. Health & Social Care in the Community, 16(1), 16–30. doi:10.1111/j.1365-2524.2007.00721.x
  • Rodgers, M. A., Grisso, J. A., Crits-Christoph, P., & Rhodes, K. V. (2017). No quick fixes: A mixed methods feasibility study of an urban community health worker outreach program for intimate partner violence. Violence Against Women, 23(3), 287–308. doi:10.1177/1077801216640383
  • Ruff, L. (2012). Does training matter? Exploring police officer response to domestic dispute calls before and after training on intimate partner violence. The Police Journal, 85(4), 285–300. doi:10.1350/pojo.2012.85.4.516
  • SafeLives. (2016). A cry for health: Why we must invest in domestic abuse services in hospitals. Retrieved from SafeLives website: http://www.safelives.org.uk/sites/default/files/resources/SAFJ4993_Themis_report_WEBcorrect.pdf
  • Saldana, J. (2015). The coding manual for qualitative researchers (1st ed.). London, UK: SAGE.
  • Sillence, E. (2013). Giving and receiving peer advice in an online breast cancer support group. Cyberpsychology, Behavior, and Social Networking, 16(6), 480–485. doi:10.1089/cyber.2013.1512
  • Snook, Chayn, & SafeLives. (2017). Tech vs abuse: research findings. Retrieved from Comic Relief website: https://www.techvsabuse.info/research-findings
  • Southworth, C., Finn, J., Dawson, S., Fraser, C., & Tucker, S. (2007). Intimate partner violence, technology, and stalking. Violence Against Women, 13(8), 842–856. doi:10.1177/1077801207302045
  • SpoofCard. (2018). Spoof calls & change your caller ID. Retrieved from Easily Disguise Your Caller ID website: https://www.spoofcard.com/secondary-callerid
  • Such, J. M., & Criado, N. (2016). Resolving multi-party privacy conflicts in social media. IEEE Transactions on Knowledge and Data Engineering, 28(7), 1851–1863. doi:10.1109/TKDE.2016.2539165
  • Sugiura, L. (2016). Researching online forums—Digital research ethics case study 1. Retrieved from British Sociological Association website: https://www.britsoc.co.uk/ethics
  • Taket, A., Nurse, J., Smith, K., Watson, J., Shakespeare, J., Lavis, V., … Feder, G. (2003). Routinely asking women about domestic violence in health settings. British Medical Journal, 327(7416), 673–676. doi:10.1136/bmj.327.7416.673
  • Thomas, K., Grier, C., & Nicol, D. M. (2010). Unfriendly: Multi-party privacy risks in social networks. Proceedings of the 10th International Conference on Privacy Enhancing Technologies, 236–252. doi:10.1007/978-3-642-14527-8_14
  • Warren-Gash, C., Bartley, A., Bayly, J., Dutey-Magni, P., Edwards, S., Madge, S., … Rodger, A. (2016). Outcomes of domestic violence screening at an acute London trust: Are there missed opportunities for intervention? British Medical Journal, 6(1), e009069. doi:10.1136/bmjopen-2015-009069
  • Westera, N. J., & Powell, M. B. (2017). Prosecutors’ perceptions of how to improve the quality of evidence in domestic violence cases. Policing and Society, 27(2), 157–172. doi:10.1080/10439463.2015.1039002
  • Winzelberg, A. (1997). The analysis of an electronic support group for individuals with eating disorders. Computers in Human Behavior, 13(3), 393–407. doi:10.1016/S0747-5632(97)00016-2
  • Wisniewski, P. J., Knijnenburg, B. P., & Lipford, H. R. (2017). Making privacy personal: Profiling social network users to inform privacy education and nudging. International Journal of Human-Computer Studies, 98, 95–108. doi:10.1016/j.ijhcs.2016.09.006
  • Woodlock, D. (2016). The abuse of technology in domestic violence and stalking. Violence Against Women, 23(5), 584–602. doi:10.1177/1077801216646277
  • World Health Organisation. (2017). Violence against women: Intimate partner and sexual violence against women. Retrieved from World Health Organisation website: http://www.who.int/mediacentre/factsheets/fs239/en/
  • Yu, L., Motipalli, S. M., Lee, D., Liu, P., Xu, H., Liu, Q., … Luo, B. (2018). My friend leaks my privacy: Modeling and analyzing privacy in social networks. Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 93–104. doi:10.1145/3205977.3205981
  • Zaidi, A. U., Fernando, S., & Ammar, N. (2015). An exploratory study of the impact of information communication technology (ICT) or computer mediated communication (CMC) on the level of violence and access to service among intimate partner violence (IPV) survivors in Canada. Technology in Society, 41, 91–97. doi:10.1016/j.techsoc.2014.12.003
  • Zimmer, M., & Kinder-Kurlanda, K. (2017). Internet research ethics for the social age: New challenges, cases, and contexts. Peter Lang: International Academic Publishers, New York, NY, US.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.