Jump to ContentJump to Main Navigation
Battered Women's Protective StrategiesStronger Than You Know$
Users without a subscription are not able to see the full content.

Sherry Hamby

Print publication date: 2013

Print ISBN-13: 9780199873654

Published to Oxford Scholarship Online: January 2014

DOI: 10.1093/acprof:oso/9780199873654.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (oxford.universitypressscholarship.com). (c) Copyright Oxford University Press, 2021. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 23 April 2021

Invisible Strategies

Invisible Strategies

(p.151) 11 Invisible Strategies
Battered Women's Protective Strategies

Sherry Hamby

Oxford University Press

Many, many steps women take to protect themselves are all but invisible to many people. Battered women do many things to protect themselves that have been little documented in research and little recognized in many standard safety planning and other interventions. Financial planning of all types needs more recognition as the key to successful self-protection, which also suggests that safety planning needs a timeframe that allows for realistic financial planning. Other invisible strategies include organizing one's affairs, education, job training, cyber-protection, identity theft protection, and wellness activities. This chapter also looks at individual differences in approaches to coping. The VIGOR studies produced 133 separate protective strategies identified by women in open-ended responses. This chapter lists them all.

Keywords:   Invisible strategies, finances, education, cyber-protection, wellness, subtypes, battered women, domestic violence, intimate partner violence

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .