384
Views
18
CrossRef citations to date
0
Altmetric
Original Articles

Informant Personality Descriptions of Postintimate Stalkers Using the Five Factor Profile

Pages 169-178 | Published online: 10 Jun 2010

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (2)

R.D. MacKenzie, D.V. James, T.E. McEwan, P.E. Mullen & J.R.P. Ogloff. (2010) Stalkers and intelligence: implications for treatment. The Journal of Forensic Psychiatry & Psychology 21:6, pages 852-872.
Read now
JanH. Kamphuis, Nynke Tuin, Marieke Timmermans & Raija-Leena Punamäki. (2008) Extending the Rorschach Trauma Content Index and Aggression Indexes to Dream Narratives of Children Exposed to Enduring Violence: An Exploratory Study. Journal of Personality Assessment 90:6, pages 578-584.
Read now

Articles from other publishers (16)

Jordan G. Gibby & Jason B. Whiting. (2022) Insecurity, Control, and Abuse: What Attachment Theory Can Teach Us About Treating Intimate Partner Violence. Contemporary Family Therapy 45:1, pages 93-105.
Crossref
Danika R. Sciarrotta, Luci A. Martin & Richard Rogers. (2020) Control Balance, Personality Traits, Attachment, and Communication Styles Associated with Stalking. Journal of Interpersonal Violence 37:9-10, pages NP6236-NP6260.
Crossref
Catherine M. Millman, Belinda Winder & Mark D. Griffiths. 2019. Police Science. Police Science 290 307 .
Catherine M. Millman, Belinda Winder & Mark D. Griffiths. 2019. Social Issues Surrounding Harassment and Assault. Social Issues Surrounding Harassment and Assault 113 130 .
Catherine M Millman, Belinda Winder & Mark D. Griffiths. (2017) UK-Based Police Officers' Perceptions of, and Role in Investigating, Cyber-Harassment as a Crime. International Journal of Technoethics 8:1, pages 87-102.
Crossref
Blanca E. Retana Franco & Rozzana Sánchez Aragón. (2015) Acoso Cibernético: Validación en México del ORI-82. Acta de Investigación Psicológica 5:3, pages 2097-2111.
Crossref
Olivia De Smet, Kasia Uzieblo, Tom Loeys, Ann Buysse & Thomas Onraedt. (2015) Unwanted Pursuit Behavior After Breakup: Occurrence, Risk Factors, and Gender Differences. Journal of Family Violence 30:6, pages 753-767.
Crossref
Frans van Paassen. (2015) Afgunst en jaloezie in psychotherapie. Tijdschrift voor Psychotherapie 41:2, pages 115-131.
Crossref
Patrizia Velotti, Jeff Elison & Carlo Garofalo. (2014) Shame and aggression: Different trajectories and implications. Aggression and Violent Behavior 19:4, pages 454-461.
Crossref
Olivia De Smet, Tom Loeys & Ann Buysse. (2012) Post-Breakup Unwanted Pursuit: A Refined Analysis of the Role of Romantic Relationship Characteristics. Journal of Family Violence 27:5, pages 437-452.
Crossref
H. Colleen Sinclair, Roshni T. Ladny & Amy E. Lyndon. (2011) Adding insult to injury: effects of interpersonal rejection types, rejection sensitivity, and self‐regulation on obsessive relational intrusion. Aggressive Behavior 37:6, pages 503-520.
Crossref
Olivia De Smet, Ann Buysse & Ruben Brondeel. (2011) Effect of the Breakup Context on Unwanted Pursuit Behavior Perpetration Between Former Partners*. Journal of Forensic Sciences 56:4, pages 934-941.
Crossref
Christina L. Patton, Matt R. Nobles & Kathleen A. Fox. (2010) Look who's stalking: Obsessive pursuit and attachment theory. Journal of Criminal Justice 38:3, pages 282-290.
Crossref
Rachel D. MacKenzie, Paul E. Mullen, James R. P. Ogloff, Troy E. McEwan & David V. James. (2008) Parental Bonding and Adult Attachment Styles in Different Types of Stalker*. Journal of Forensic Sciences.
Crossref
D. P. H. Barelds & P. Barelds‐Dijkstra. (2007) Relations between different types of jealousy and self and partner perceptions of relationship quality. Clinical Psychology & Psychotherapy 14:3, pages 176-188.
Crossref
Jan H. Kamphuis & Paul M. G. Emmelkamp. (2016) 20 Years of Research into Violence and Trauma. Journal of Interpersonal Violence 20:2, pages 167-174.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.