
Stalking reflects a lesser-studied form of intimate partner violence (IPV; e.g., physical abuse) that may occur pre- and postseparation between two or more partners, incurring lifelong pervasive health impacts on those involved. Intersectionality theory elucidates how Two-Spirit, lesbian, gay, bisexual, trans, queer, questioning, intersex, and asexual (2SLGBTQQIA+) individuals' and rural women's identities are oppressed by society, thus subjecting them to unique IPV experiences. Therefore, this study aims to explore how stalking manifests among 2SLGBTQQIA+ individuals and women living rurally with lived experiences, both of which are underrepresented groups in current stalking literature.
We used secondary data from two IPV studies conducted among 2SLGBTQQ+ (no intersex or asexual participants) individuals and rural women (n = 29). We interviewed 2SLGBTQQ+ (n = 18) and rural women (n = 11) who resided in Alberta, Canada and experienced IPV via semi-structured, qualitative approaches. A thematic analysis was guided by intersectionality theory to analyze the data, applying inductive and semantic approaches.
Of the 29 participants, 15 were stalked by their abusive partners and 9 reported on the negative impacts of being stalked. Rural women and 2SLGBTQQ+ individuals were mainly stalked via physical forms of stalking and cyberstalking, respectively. We describe other forms of stalking and the ineffectiveness of legal systems in those seeking support for stalking. The impacts of stalking (e.g., hypervigilance) were so profound that the feeling of being stalked persisted, which we termed phantom stalking.
2SLGBTQQ+ individuals predominantly experienced stalking through technology and rural women experienced stalking in more public or physical forms, which stemmed from intersections with community and geographical factors, respectively. We posit the notion of “phantom stalking” and discuss and differentiate it from other psychiatric diagnoses. Additionally, we provide important recommendations related to legislation, education, safety, and research.
Citation: Stefan Kurbatfinski, Kendra Nixon, Susanne Marshall, Jason Novick, Dawn McBride, Nicole Letourneau. “That was terrifying!”: When 2SLGBTQQ+ individuals and rural women experiencing intimate partner violence are stalked[J]. AIMS Medical Science, 2024, 11(3): 265-291. doi: 10.3934/medsci.2024020
[1] | Won-Ki Seo . Fredholm inversion around a singularity: Application to autoregressive time series in Banach space. Electronic Research Archive, 2023, 31(8): 4925-4950. doi: 10.3934/era.2023252 |
[2] | Vladimir Rovenski . Willmore-type variational problem for foliated hypersurfaces. Electronic Research Archive, 2024, 32(6): 4025-4042. doi: 10.3934/era.2024181 |
[3] | Sang-Eon Han . Semi-Jordan curve theorem on the Marcus-Wyse topological plane. Electronic Research Archive, 2022, 30(12): 4341-4365. doi: 10.3934/era.2022220 |
[4] | Dong Li, Xiaxia Wu, Shuling Yan . Periodic traveling wave solutions of the Nicholson's blowflies model with delay and advection. Electronic Research Archive, 2023, 31(5): 2568-2579. doi: 10.3934/era.2023130 |
[5] | Ping Liu, Junping Shi . A degenerate bifurcation from simple eigenvalue theorem. Electronic Research Archive, 2022, 30(1): 116-125. doi: 10.3934/era.2022006 |
[6] | Li Du, Xiaoqin Yuan . The minimality of biharmonic hypersurfaces in pseudo-Euclidean spaces. Electronic Research Archive, 2023, 31(3): 1587-1595. doi: 10.3934/era.2023081 |
[7] | Chenghua Gao, Enming Yang, Huijuan Li . Solutions to a discrete resonance problem with eigenparameter-dependent boundary conditions. Electronic Research Archive, 2024, 32(3): 1692-1707. doi: 10.3934/era.2024077 |
[8] | Xiaoyan Xu, Xiaohua Xu, Jin Chen, Shixun Lin . On forbidden subgraphs of main supergraphs of groups. Electronic Research Archive, 2024, 32(8): 4845-4857. doi: 10.3934/era.2024222 |
[9] | Kwok-Pun Ho . Martingale transforms on Banach function spaces. Electronic Research Archive, 2022, 30(6): 2247-2262. doi: 10.3934/era.2022114 |
[10] | Fabrizio Catanese, Luca Cesarano . Canonical maps of general hypersurfaces in Abelian varieties. Electronic Research Archive, 2021, 29(6): 4315-4325. doi: 10.3934/era.2021087 |
Stalking reflects a lesser-studied form of intimate partner violence (IPV; e.g., physical abuse) that may occur pre- and postseparation between two or more partners, incurring lifelong pervasive health impacts on those involved. Intersectionality theory elucidates how Two-Spirit, lesbian, gay, bisexual, trans, queer, questioning, intersex, and asexual (2SLGBTQQIA+) individuals' and rural women's identities are oppressed by society, thus subjecting them to unique IPV experiences. Therefore, this study aims to explore how stalking manifests among 2SLGBTQQIA+ individuals and women living rurally with lived experiences, both of which are underrepresented groups in current stalking literature.
We used secondary data from two IPV studies conducted among 2SLGBTQQ+ (no intersex or asexual participants) individuals and rural women (n = 29). We interviewed 2SLGBTQQ+ (n = 18) and rural women (n = 11) who resided in Alberta, Canada and experienced IPV via semi-structured, qualitative approaches. A thematic analysis was guided by intersectionality theory to analyze the data, applying inductive and semantic approaches.
Of the 29 participants, 15 were stalked by their abusive partners and 9 reported on the negative impacts of being stalked. Rural women and 2SLGBTQQ+ individuals were mainly stalked via physical forms of stalking and cyberstalking, respectively. We describe other forms of stalking and the ineffectiveness of legal systems in those seeking support for stalking. The impacts of stalking (e.g., hypervigilance) were so profound that the feeling of being stalked persisted, which we termed phantom stalking.
2SLGBTQQ+ individuals predominantly experienced stalking through technology and rural women experienced stalking in more public or physical forms, which stemmed from intersections with community and geographical factors, respectively. We posit the notion of “phantom stalking” and discuss and differentiate it from other psychiatric diagnoses. Additionally, we provide important recommendations related to legislation, education, safety, and research.
All graphs considered in this paper are finite, undirected and simple. Let G be a graph with vertex-set V(G) and edge-set E(G). A subset D of V(G) is called a dominating set of G if every vertex of G is either in D or adjacent to a vertex of D. The domination number γ(G) is the cardinality of a minimum dominating set of G.
The domination in graphs is so classic that it has been widely studied in networks theory, while the decision problem for the domination number of a general graph was proved to be NP-complete [8]. On the study of domination, there are three early textbooks compiled by Haynes et al. [13,14] and Henning et al. [17]. Recently, Haynes, Hedetniemi and Henning [11,12] edited two new books on this field once again.
Definition 1.1. [24] (1) A vertex v∈V(G) is called γ-fixed if v belongs to every minimum dominating set of G. (2) A vertex v∈V(G) is called γ-bad if v does not belong to any minimum dominating set of G. (For simplicity, we abbreviate "γ-fixed" and "γ-bad" to "fixed" and "bad" respectively in this paper.)
Definition 1.2. A vertex v∈V(G) is called critical if γ(G−v)<γ(G). In particular, we agree that the single vertex of a trivial graph is critical.
Remark for Definition 1.2: It is easy to see that γ(G−v)<γ(G)⇔γ(G−v)≤γ(G)−1⇔γ(G−v)=γ(G)−1, where γ(G−v)≤γ(G)−1⇒γ(G−v)=γ(G)−1 holds because if not so, then γ(G−v)≤γ(G)−2, and thus G would have a dominating set with cardinality ((γ(G)−2)+|v|)<γ(G), contradicting the minimality of γ(G).
The terms of fixed and bad vertices of graphs were introduced by Samodivkin [24], which can help us to research the constructions of minimum dominating sets of a graph better and shorten the processes of our proofs [7,22,24,25]. (In [28], fixed and bad vertices of a graph are also called universal and idle vertices, respectively.) The notions of domination critical, which include vertex-critical [4] and edge-critical [3,27], are very important to domination of graphs. But in this paper, we are not going to discuss the topic of edge-critical.
Definition 1.3. A graph G is called vertex-critical if every vertex of G is critical.
There are lots of nice properties on domination vertex-critical graphs [1,2,19,29,30]. Many of them possess symmetry, and even vertex-transitivity. For example, the graph C4⋅C4 obtained by identifying two vertices of two cycles of orders four, the Harary graph H3,8 and the circulant graph C12⟨1,5⟩ (See Figure 1.).
Trees is a kind of basic graph class often applied to algorithm design. There are a good few results on the study of the constructions for special trees, such as trees with equal domination and total domination numbers [7], trees with equal domination and restrained domination numbers [6], trees with equal total domination and disjunctive domination numbers [18], trees with equal independent domination and weak domination numbers [10], trees with a minimum vertex cover also being a minimum total dominating set [5], trees with two disjoint minimum independent dominating sets [15], trees with the paired domination number being twice the matching number [26], trees without fixed vertices [31], trees without fixed vertices and critical vertices [23,16], trees with unique minimum dominating sets [9,34], trees with equal Roman {2}-domination and Roman domination numbers [21], and trees with total Roman domination number being equal to the sum of domination number and semitotal domination number [20].
Naturally, there are two such questions: Can we exhaustively characterize vertex-critical graphs, as well as graphs without critical vertices? It seems not easy to solve these two questions. Therefore, in this paper, we study on the latter one and focus on the graph class-trees. Via defining 3 operations of graphs, we get a constructive characterization of trees without critical vertices.
For any u,v∈V(G), denote by dG(u,v) the distance from u to v in G as well as dG(v), NG(v), NG[v] and N2G(v) the degree, open neighborhood, closed neighborhood and 2-open neighborhood of vertex v in G respectively, where the 2-open neighborhood of vertex v in G is defined as N2G(v)={x∈V(G)∣d(x,v)=2}. For any ∅≠X⊆V(G), let G[X] denote the subgraph of G induced by X.
Denote by MDS_(G) the set composed of all the minimum dominating sets of G. That is, MDS_(G)={D∣D is a minimum dominating set of G}. A vertex of degree one (resp. degree zero) in G is called an end-vertex (resp. isolated vertex) of G. Let g be a cut-vertex of G. If a component P of G−g is a path and g is adjacent to an end-vertex of P in G, then we call P as a pendant path of G and say that g and P are linked with each other. A pendant path of G with order l (l≥1) is called an l-pendant path of G. Let P2k+1=v1v2⋯v2k+1 be a path of order 2k+1. Then vk+1 is the center of P2k+1.
Let r be a vertex, l and m be two non-negative integers with l+m≥1. Let P13≅P23≅⋯≅Pl3≅P3 with Pi3=viuiwi, i=1,2,…,l, and P12≅P22≅⋯≅Pm2≅P2 with Pj2=xjyj, j=1,2,…,m. For every 1≤i≤l, link r and ui by an edge. For every 1≤j≤m, link r and xj by an edge. Denote the resulting graph as Rl,m and call r as the root of Rl,m (See Figure 2).
Now, we give three observations and some known lemmas, which will support our proofs in the next section.
Observation 2.1. Let G be a graph. If G1 and G2 are vertex-induced subgraphs of G such that V(G)=V(G1)∪V(G2), then γ(G)≤γ(G1)+γ(G2) with the equality holding when G1 and G2 are two components of G.
Observation 2.2. Let u∈V(G). If u is adjacent to two end-vertices v and w in G, then v and w are bad in G, and u is fixed in G.
Observation 2.3. Let u be an end-vertex of G with NG(u)={v}. Then u is non-fixed and v is non-bad in G, and |{u,v}∩D|=1 for any D∈MDS_(G).
Lemma 2.4. [3] For any nontrivial tree T and any v∈V(T), v is a fixed vertex of T if and only if γ(T−v)>γ(T).
Lemma 2.5. [32] Let G be a graph with minimum degree at least one. If x is a bad or fixed vertex of G, then all the elements of NG[x] are non-critical vertices of G.
Lemma 2.6. [33] Let G be a graph.
(a) If x is a non-fixed vertex of G, then γ(G−x)≤γ(G).
(b) If x is a bad vertex of G, then γ(G−x)=γ(G).
(c) If x is a non-fixed and non-critical vertex of G, then γ(G−x)=γ(G).
Lemma 2.7. [34] Let T be a tree containing only one vertex u of degree at least 3. Then u is linked with |NT(u)| pendant paths in T.
Lemma 2.8. [34] Let T be a tree with at least two vertices of degree at least 3 and let dT(u,v)=max{dT(x,y)| both x and y are vertices of degree at least 3 in T}. Then u is linked with |NT(u)|−1 pendant paths in T.
Lemma 2.9. [34] Let G0 be a graph without any isolated vertices and possessing a fixed vertex. If G is a graph obtained via linking a fixed vertex of G0 and the single vertex of P1 by an edge, then γ(G)=γ(G0).
Lemma 2.10. [34] Let G0 be a graph without any isolated vertices and possessing a fixed vertex. If G is a graph obtained via linking a fixed vertex of G0 and the center of P3 by an edge, then γ(G)=γ(G0)+1.
We now ask a question: Is there a nontrivial tree only containing critical vertices? Unluckily, the answer to this question is no (See Lemma 3.1).
Lemma 3.1. If dG(u)=1 and v∈NG(u)∪N2G(u), then v is a non-critical vertex of G.
Proof. Suppose to the contrary that v is a critical vertex of G. If v∈NG(u), let D1∈MDS_(G−v). Then by Definition 1.2, we have |D1|=γ(G)−1. Since u is an isolated vertex of G−v, it follows that u is fixed in G−v. Now, if we let D2=(D1−{u})∪{v}, then D2 is a dominating set of G with |D2|=|D1|=γ(G)−1, a contradiction.
If v∈N2G(u), then |D′|=γ(G)−1 for any D′∈MDS_(G−v). Let NG(u)={w}. Since u is still an end-vertex of G−v, it follows from Observation 2.3 that w is a non-bad vertex of G−v. Let D′1∈MDS_(G−v) with w∈D′1. On one hand, we have |D′1|=γ(G)−1. But on the other hand, D′1 is also a dominating set of G, which implies that |D′1|≥γ(G), a contradiction.
Lemma 3.1 tells us that if G is nontrivial and has an end-vertex, then G must have a non-critical vertex. Therefore, a tree is vertex-critical if and only if it is trivial.
In this subsection, via several operations of graphs, we can get large graphs without critical vertices from small graphs without critical vertices step by step. In particular, these processes of operations are reversible for trees. (Here, large graph represents graph with large order while small graph represents graph with small order.) For a graph G0, we define the following three operations.
Operation i. Link a fixed vertex of G0 and the single vertex of P1 by an edge. Denote the resulting graph by G0∽P1. (Refer to Figure 3 (i)).
Operation ii. Link a fixed vertex of G0 and the center of P3 by and edge. Denote the resulting graph by G0∽P3. (Refer to Figure 3 (ii)).
Operation iii. Link an arbitrary vertex of G0 and the root of Rl,m by and edge. Denote the resulting graph by G0∽Rl,m. (Refer to Figure 3 (iii)).
Remark. In fact, the resulting graph may be not unique. So, "G=G0∽P1" means that "G is obtained from G0 by Operation i".
Lemma 3.2. Let G0 be a graph without any isolated vertices and possessing a fixed vertex, and let G=G0∽P1. Then all the vertices of G0 are non-critical if and only if all the vertices of G are non-critical.
Proof. (⇒) Suppose that V(P1)={v1} and gv1∈E(G). From Lemma 2.9, we have γ(G)=γ(G0)=γ(G−v1). So by Definition 1.2, v1 is a non-critical vertex of G. Also, we have g is a non-critical vertex of G by Lemma 3.1. It remains to prove that x is a non-critical vertex of G for every x∈V(G−v1−g)⊆V(G0). Since all the vertices of G0 are non-critical, we have γ(G0−x)≥γ(G0). Since dG−x(v1)=1, we have v1 is a non-fixed vertex of G−x by Observation 2.3. So there exists D−x∈MDS_(G−x) such that v1∉D−x, and then g∈D−x. Thus D−x∩V(G0−x) is a dominating set of G0−x. Hence γ(G−x)=|D−x|=|D−x∩V(G0−x)|≥γ(G0−x)≥γ(G0)=γ(G), which implies that x is a non-critical vertex of G. The necessity follows.
(⇐) Assume to the contrary that G0 has a critical vertex y0. Since all the vertices of G are non-critical, we have γ(G−y0)≥γ(G). Let D−0∈MDS_(G0−y0). Then |D−0∪{y0}|=γ(G0−y0)+1=γ(G0), which implies that D−0∪{y0}∈MDS_(G0). By the definition of Operation i, g is a fixed vertex of G0. So we have g∈D−0∪{y0}, and g is a non-critical vertex of G0 by Lemma 2.5. Thus g≠y0, and therefore g∈D−0, which implies that D−0 is a dominating set of G−y0. Hence γ(G0−y0)=|D−0|≥γ(G−y0)≥γ(G)=γ(G0), which contradicts the assumption that y0 is a critical vertex of G0. The sufficiency follows.
Lemma 3.3. Let G0 and W be two graphs. Let G be a graph obtained via linking an arbitrary vertex of G0 and an arbitrary vertex of W by an edge. If γ(G)=γ(G0)+γ(W) and all the vertices of G are non-critical, then all the vertices of G0 are non-critical.
Proof. For any y∈V(G0), since all the vertices of G are non-critical, it follows that γ(G−y)≥γ(G). By Observation 2.1, we have γ(G0−y)+γ(W)≥γ(G−y)≥γ(G)=γ(G0)+γ(W). Thus γ(G0−y)≥γ(G0), and so y is a non-critical vertex of G0. The lemma follows.
Lemma 3.4. Let G0 be a graph without isolated vertices and possessing a fixed vertex, and G=G0∽P3.
(a) If all the vertices of G are non-critical, then all the vertices of G0 are non-critical.
(b) When G0 is a tree, (in order to avoid confusion, ) we rewrite T0=G0 and T=G. If all the vertices of T0 are non-critical, then all the vertices of T are non-critical.
Proof. (a) Suppose that P3=v1v2v3 and E(G)−E(G0)−E(P3)={gv2}. Then g is fixed in G0. From Lemma 2.10, we get γ(G)=γ(G0)+1. Item (a) follows by Lemma 3.3.
(b) Firstly, by Observation 2.2, v2 is a fixed vertex of T. So by Lemma 2.5, v1,v2, v3 and g are non-critical vertices of T.
Secondly, we need to show that x is a non-critical vertex of T for every x∈V(T−g)−V(P3). That is, to prove γ(T−x)≥γ(T). Since T0 has no critical vertices, we have γ(T0−x)≥γ(T0). Let D−x∈MDS_(T−x). If g∈D−x, then D−x∩V(T0−x) is a dominating set of T0−x, and so γ(T−x)=|D−x|=|D−x∩V(T0−x)|+|{v2}|≥γ(T0−x)+1≥γ(T0)+1=γ(T). If g∉D−x, then (D−x∩V(T0−x))∪{x} is a dominating set of T0−g. By Lemma 2.4, we have |(D−x∩V(T0−x))∪{x}|≥γ(T0−g)≥γ(T0)+1, which implies that |D−x∩V(T0−x)|≥γ(T0). So γ(T−x)=|D−x|=|D−x∩V(T0−x)|+|{v2}|≥γ(T0)+1=γ(T). Item (b) follows.
Note. In Lemma 3.4 (b), we restrict G0 to be a tree because if G0 is a general graph, then the result maybe not true. (See the following Example 3.5).
Example 3.5. Define G0 and G as shown in Figure 4. Then G=G0∽P3. It is not hard to check that γ(G0)=2, h1 and g are fixed vertices of G0, as well as w1,u1,u2,u3,u4 and h2 are bad vertices of G0. By Lemma 2.5, G0 has no critical vertices. However, since γ(G)=γ(G0)+1=3, we can see that {h2,v2}∈MDS_(G−w1), which implies that w1 is a critical vertex of G.
Lemma 3.6. Let G0 be a graph and G=G0∽Rl,m. Then
(a)γ(G)=γ(G0)+(l+m);
(b) all the vertices of G0 are non-critical if and only if all the vertices of G are non-critical.
Proof. Suppose that E(G)−E(G0)−E(Rl,m)={gr}. Set U={u1,u2,…,ul}, X={x1,x2,…,xm}, Y={y1,y2,…,ym} and Z=X∪Y.
(a) We can easily see that γ(Rl,m)=l+m. So γ(G)≤γ(G0)+(l+m). It remains to prove γ(G)≥γ(G0)+(l+m). Let D∈MDS_(G). If D∩V(G0) can dominate g in G, then D∩V(G0) is a dominating set of G0, and so |D|≥|D∩V(G0)|+|U|+|D∩Z|≥γ(G0)+(l+m); if not, then r∈D and (D∩V(G0))∪{g} is a dominating set of G0, and so |D|=|D∩V(G0)|+|{r}|+|U|+|D∩Z|=|(D∩V(G0))∪{g}|+(l+m)≥γ(G0)+(l+m).
(b) (⇐) The sufficiency follows immediately by Item (a) and Lemma 3.3.
(⇒) We claim that r is a bad vertex of G. Otherwise, let Dr∈MDS_(G) with r∈Dr. If g∈Dr, then Dr−{r} is a dominating set of G, contradicting the minimality of |Dr|. So we have g∉Dr, and then Dr∩V(G0) is a dominating set of G0−g. Thus γ(G0−g)≤|Dr∩V(G0)|=|Dr|−|U|−|Dr∩Z|−|{r}|=γ(G)−(l+m)−1=γ(G0)−1, which implies that g is a critical vertex of G0, contradicting the known condition that G0 has no critical vertices.
Now firstly, for every 1≤i≤l and every 1≤j≤m, we have ui,vi,wi,r,g and xj are non-critical vertices of G by Lemma 2.5.
Secondly, if there exists some 1≤j′≤m such that γ(G−yj′)=γ(G)−1, we can let D−∈MDS_(G−yj′) with r∈D− by Observation 2.3. But then D−∪{yj′}∈MDS_(G) with r∈D−∪{yj′}, contradicting the claim that r is bad in G. So for every 1≤j≤m, we have γ(G−yj)≥γ(G), which implies that yj is non-critical in G.
Finally, it remains to show that γ(G−x)≥γ(G) for every x∈V(G−g)−V(Rl,m)⊆V(G0). Since all the vertices of G0 are non-critical, we have γ(G0−x)≥γ(G0). Let D−x∈MDS_(G−x). If D−x∩V(G0−x) can dominate g, then D−x∩V(G0−x) is a dominating set of G0−x, and so γ(G−x)=|D−x|≥|D−x∩V(G0−x)|+|U|+|D−x∩Z|≥γ(G0−x)+(l+m)≥γ(G0)+(l+m)=γ(G); if not, then we have r∈D−x and (D−x∩V(G0−x))∪{g} is a dominating set of G0−x, and so γ(G−x)=|D−x|=|D−x∩V(G0−x)|+|{r}|+|U|+|D−x∩Z|=|(D−x∩V(G0−x))∪{g}|+(l+m)≥γ(G0−x)+(l+m)≥γ(G0)+(l+m)=γ(G). The necessity follows.
Since it is hard to obtain a constructive characterization of graphs without critical vertices, we only solve this problem partly by restricting the graph class to be trees in this subsection.
Theorem 3.7. A nontrivial tree T has no critical vertices if and only if T can be obtained from P2 or P3 by a finite sequence of Operations i–iii.
Proof. Let T be the set of graphs obtained from P2 or P3 by a finite sequence of Operations i–iii. It suffices to prove that T has no critical vertices if and only if T∈T.
(⇐) Assume that T is obtained by doing n times Operations i, ii and iii. We will prove that all the vertices of T are non-critical by induction on n. When n=0, we have T=P2 or T=P3, and the result is true clearly. Suppose that the result is true when n=k(k≥0). Then from Lemmas 3.2, 3.4 (b), and 3.6 (b), we know that the result is also true when n=k+1. By the induction principle, the sufficiency follows.
(⇒) We are going to prove the necessity by induction on |V(T)|. When |V(T)|=2 or 3, the result is true clearly. Suppose that the result is true when |V(T)|<k(k≥4). We consider the case when |V(T)|=k below.
Case 1. T has a pendant path of order at least 3.
Let P3 be a 3-pendant path of T and T0=T−V(P3). Note that P3≅R0,1. So T=T0∽R0,1. By Lemma 3.6 (b), all the vertices of T0 are non-critical. Since |V(T0)|<|V(T)|=k, we have T0∈T by the induction hypothesis. Hence T=T0∽R0,1∈T.
Case 2. T has a vertex u adjacent to an end-vertex w in T and u is fixed in T−w.
Let T0=T−w. Then T=T0∽P1. By Lemma 3.2, T0 has no critical vertices. Since |V(T0)|=k−1<k, we have T0∈T. Hence T=T0∽P1∈T.
Case 3. T has a vertex u of degree 3 which is adjacent to two end-vertices v,w of T and a fixed vertex g of T−{v,u,w} in T.
Let T0=T−{v,u,w}. Then T=T0∽P3. By Lemma 3.4 (a), T0 has no critical vertices. So T0∈T, and hence T∈T.
Case 4. T has a vertex u of degree at least 3 linked with |NT(u)|−1 2-pendant paths.
Let P12,P22,…,Pm2 be the 2-pendant paths linked with u in T, where m=|NT(u)|−1. Then T[{u}∪⋃mj=1V(Pj2)]≅R0,m. Let T0=T−({u}∪⋃mj=1V(Pj2)). Then T=T0∽R0,m. As a consenquence, we have T∈T.
Case 5. All of Cases 1–4 do not occur.
Since |V(T)|≥4 and Case 1 does not occur, T is not a path. So T has at least one vertex of degree at least 3.
Claim 5.1. There does not exist a vertex u adjacent to three end-vertices in T.
Suppose not. Let v1 be an end-vertex which is adjacent to u in T and let T0=T−v1. By Observation 2.2, u is a fixed vertex of T0, which is contrary to the supposition that Case 2 does not occur.
Claim 5.2. There does not exist a vertex u linked with one 1-pendant path P1 and one 2-pendant path P2 in T.
Suppose not. Let V(P2)={x,y} with ux∈E(T). By Observation 2.3, there exists Du∈MDS_(T) such that u∈Du. Let D∗u=(Du−{x,y})∪{y}. Then D∗u−{y} is a dominating set of T−y, which implies that y is a critical vertex of T, contradicting the known condition that T has no critical vertices.
Claim 5.3. T has at least two vertices of degree at least 3.
Suppose, to the contrary, that T has only one vertex c with dT(c)≥3. By Lemma 2.7, c is linked with |NT(c)| pendant paths in T. Since Case 1 does not occur, it follows from Claims 5.2 and 5.1 that all of these |NT(c)| pendant paths are 2-pendant paths. But this contradicts the supposition that Case 4 does not occur.
Claim 5.4. If u and v are two vertices of degree at least 3 in T such that dT(u,v)= max {dT(x,y)|both x and y are vertices of degrees at least 3 in T}, then |NT(u)|=3 and u is adjacent to 2 end-vertices in T.
By Lemma 2.8, u is linked with |NT(u)|−1 pendant paths in T. Since Cases 1 and 4 does not occur, it follows from Claims 5.2 and 5.1 that |NT(u)|=3 and u is adjacent to 2 end-vertices in T.
Now, let u and v be two vertices of T satisfying the supposition of Claim 5.4. Suppose that v1 and w1 are two end-vertices which are adjacent to u in T and NT(u)−{v1,w1}={r}. By Claim 5.4, the equivalent status of v and u, and Observation 2.2, we get that v is a fixed vertex of T−{u,v1,w1}. Since Case 3 does not occur, we have r≠v.
Let Tv be the component of T−r such that v∈V(Tv), {z}=NT(r)∩V(Tv), NT(r)−{z}={u1,u2,…,uq} (where u1=u) and Tu1,Tu2,…,Tuq be the components of T−r such that ui∈V(Tui) for every 1≤i≤q. Furthermore, we may suppose without loss of generality that Tu1,Tu2,…,Tul are not pendant paths of T as well as Tul+1,Tul+2,…,Tul+m are pendant paths of T, where 1≤l≤q and l+m=q.
Claim 5.5. Tui is a 2-pendant path of T for every l+1≤i≤l+m.
Suppose, to the contrary, that Tui′ is a pendant path of T with |V(Tui′)|≠2 for some l+1≤i′≤l+m. By Lemma 3.1, r is a non-critical vertex of T−V(Tui′). Since Case 1 does not occur, we have |V(Tui′)|=1. Let V(Tui′)={w} and T0=T−{u,v1,w1}. By Observations 2.2 and 2.3, one may let Dr∈MDS_(T) with u,r∈Dr. We claim that Dr∩V(T0)∈MDS_(T0). Otherwise there exists D0∈MDS_(T0) such that |D0|<|Dr∩V(T0)|. But then {u}∪D0 would be a dominating set of T with |{u}∪D0|<|{u}∪(Du∩V(T0))|=|Dr|, contradicting the minimality of |Dr|. Thus γ(T)=|Dr|=|{u}|+|Dr∩V(T0)|=1+γ(T0). Since Case 3 does not occur, r is not a fixed vertex of T0. Let ˆDr0∈MDS_(T0) with r∉ˆDr0. Then w∈ˆDr0 and {u}∪ˆDr0∈MDS_(T). Since ({u}∪ˆDr0)−{w} is a dominating set of T−w, it follows that w is a critical vertex of T, a contradiction.
Claim 5.6. For every 2≤i≤l, ui is the unique vertex of V(Tui) satisfying dT(ui)≥3.
Firstly, since Tui is not a pendant path of T, Tui has a vertex with degree at least 3 in T. Secondly, we claim that for every h∈V(Tui)−{ui}, h is not a vertex of V(Tui) with degree at least 3 in T. Otherwise, we have dT(h,v)=dT(h,ui)+dT(ui,v)>dT(ui,v)=1+dT(r,v)=dT(u,v), contradicting the selection of u and v. From these two observations, Claim 5.6 follows.
Since dT(ui,v)=dT(u1,v), we have |NT(ui)|=3 and ui is adjacent to 2 end-vertices in T for every 2≤i≤l by Claim 5.4, which implies that
T[{r}∪l⋃i=1V(Tui)∪m⋃j=1V(Tul+j)]≅Rl,m. |
(See Figure 5.) Let T0=T−({r}∪⋃li=1V(Tui)∪⋃mj=1V(Tul+j)). Then T=T0∽Rl,m. By Lemma 3.6 (b), T0 has no critical vertices. Thus we have T0∈T by the induction hypothesis, and so T∈T.
In conclusion, the result is true when |V(T)|=k. The necessity follows.
We think that it is quite difficult to give a construction for graphs without critical vertices. For further studies, ones may consider to characterize unicyclic graphs without critical vertices, or graphs with domination number 3 and without critical vertices.
1. National Natural Science Foundation of China (no. 12061047);
2. Natural Science Foundation of Jiangxi Province (no. 20192BAB211002);
3. Undergraduate Innovation Training Project of Hubei Province (no. 202111072011);
4. Foundation of Cultivation of Scientific Institutions of Jianghan University (no. 06210033).
The authors declared that they have no conflicts of interest to this work.
[1] |
Krug EG, Mercy JA, Dahlberg LL, et al. (2002) The world report on violence and health. Lancet 360: 1083-1088. https://doi.org/10.1016/S0140-6736(02)11133-0 ![]() |
[2] | Cotter A (2021) Intimate partner violence in Canada, 2018: an overview. Juristat: Canadian Centre for Justice Statistics : 1-23. Available from: https://www150.statcan.gc.ca/n1/pub/85-002-x/2021001/article/00003-eng.htm. |
[3] |
Coleman FL (1997) Stalking behavior and the cycle of domestic violence. J Interpers Violence 12: 420-432. https://doi.org/10.1177/088626097012003007 ![]() |
[4] |
Mechanic MB, Weaver TL, Resick PA (2000) Intimate partner violence and stalking behavior: exploration of patterns and correlates in a sample of acutely battered women. Violence Vict 15: 55-72. ![]() |
[5] | Government of Canada, Criminal Code (R.S.C., 1985, c. C-46). Ontario Government of Canada, 2023. Available from: https://laws-lois.justice.gc.ca/eng/acts/c-46/section-264.html#:~:text=264%20(1)%20No%20person%20shall,or%20the%20safety%20of%20anyone |
[6] |
Braveman P, Gottlieb L (2014) The social determinants of health: it's time to consider the causes of the causes. Public Health Rep 129: 19-31. https://doi.org/10.1177/00333549141291s206 ![]() |
[7] |
Bauer GR, Churchill SM, Mahendran M, et al. (2021) Intersectionality in quantitative research: a systematic review of its emergence and applications of theory and methods. SSM Popul Health 14: 100798. https://doi.org/10.1016/j.ssmph.2021.100798 ![]() |
[8] |
Kattari SK, Walls NE, Speer SR (2017) Differences in experiences of discrimination in accessing social services among transgender/gender nonconforming individuals by (dis)ability. J Soc Work Disabil Rehabil 16: 116-140. https://doi.org/10.1080/1536710x.2017.1299661 ![]() |
[9] |
Kattari SK, Walls NE, Whitfield DL, et al. (2017) Racial and ethnic differences in experiences of discrimination in accessing social services among transgender/gender-nonconforming people. J Ethn Cult Diversit 26: 217-235. https://doi.org/10.1080/15313204.2016.1242102 ![]() |
[10] | Statistics Canada, Section 3: Police-reported intimate partner violence in Canada, 2019. Ontario Statistics Canada, 2021. Available from: https://www150.statcan.gc.ca/n1/pub/85-002-x/2021001/article/00001/03-eng.htm |
[11] |
Faller YN, Wuerch MA, Hampton MR, et al. (2021) A web of disheartenment with hope on the horizon: intimate partner violence in rural and northern communities. J Interpers Violence 36: 4058-4083. https://doi.org/10.1177/0886260518789141 ![]() |
[12] |
Peek-Asa C, Wallis A, Harland K, et al. (2011) Rural disparity in domestic violence prevalence and access to resources. J Womens Health 20: 1743-1749. https://doi.org/10.1089/jwh.2011.2891 ![]() |
[13] |
Cao L, Wang SYK (2020) Correlates of stalking victimization in Canada: a model of social support and comorbidity. Int J Law Crime Justice 63: 100437. https://doi.org/10.1016/j.ijlcj.2020.100437 ![]() |
[14] |
Brownridge DA (2008) Understanding the elevated risk of partner violence against aboriginal women: a comparison of two nationally representative surveys of Canada. J Fam Viol 23: 353-367. https://doi.org/10.1007/s10896-008-9160-0 ![]() |
[15] | Panchuk K, Hart C, Lewchuk DR (2022) Women+ and intimate partner violence in rural, remote and northern communities. Rural and Northern Social Work Practice: Canadian Perspectives . |
[16] | Statistics Canada, Population growth in Canada's rural areas, 2016 to 2021. Ontario Statistics Canada, 2022. Available from: https://www12.statcan.gc.ca/census-recensement/2021/as-sa/98-200-x/2021002/98-200-x2021002-eng.cfm |
[17] | Jaffray B (2021) Intimate partner violence: experiences of sexual minority women in Canada, 2018. Available from: https://www150.statcan.gc.ca/n1/pub/85-002-x/2021001/article/00005-eng.htm |
[18] | Jaffray B (2021) Intimate partner violence: experiences of sexual minority men in Canada, 2018. Juristat . Available from: https://www150.statcan.gc.ca/n1/pub/85-002-x/2021001/article/00004-eng.htm. |
[19] |
Langenderfer-Magruder L, Walls NE, Whitfield DL, et al. (2020) Stalking victimization in LGBTQ adults: a brief report. J Interpers Violence 35: 1442-1453. https://doi.org/10.1177/0886260517696871 ![]() |
[20] |
McCart MR, Smith DW, Sawyer GK (2010) Help seeking among victims of crime: a review of the empirical literature. J Trauma Stress 23: 198-206. https://doi.org/10.1002/jts.20509 ![]() |
[21] |
Rollè L, Giardina G, Caldarera AM, et al. (2018) When intimate partner violence meets same sex couples: a review of same sex intimate partner violence. Front Psychol 9: 1506. https://doi.org/10.3389/fpsyg.2018.01506 ![]() |
[22] |
Daley A, Brotman S, MacDonnell JA, et al. (2020) A framework for enhancing access to equitable home care for 2SLGBTQ+ communities. Int J Environ Res Public Health 17: 7533. https://doi.org/10.3390/ijerph17207533 ![]() |
[23] | Henriquez NR, Ahmad N (2021) “The message is you don't exist”: exploring lived experiences of rural lesbian, gay, bisexual, transgender, queer/questioning (LGBTQ) people utilizing health care services. SAGE Open Nurs 7. https://doi.org/10.1177/23779608211051174 |
[24] |
Abboud S, Veldhuis C, Ballout S, et al. (2022) Sexual and gender minority health in the Middle East and North Africa region: a scoping review. Int J Nurs Stud Adv 4: 100085. https://doi.org/10.1016/j.ijnsa.2022.100085 ![]() |
[25] |
Javed S, Chattu VK (2021) Patriarchy at the helm of gender-based violence during COVID-19. AIMS Public Health 8: 32-35. https://doi.org/10.3934/publichealth.2021003 ![]() |
[26] | Kardashevskaya M, Arisman K, Novick J, et al. (2022) Responding to women who experience intimate partner violence in rural municipalities across the prairies: final report. Available from: https://www.umanitoba.ca/sites/resolve/files/2022-09/Rural%20IPV%20Final%20Report.pdf |
[27] | Haller A, White S, Bresch L, et al. (2022) Examining the nature & context of intimate partner violence in 2SLGBTQ+ communities: final report. Available from: https://www.umanitoba.ca/sites/resolve/files/2022-09/2SLGBTQ%20Final%20Report.pdf |
[28] | Statistics Canada, Illustrated Glossary: Rural area (RA). Ontario Statistics Canada, 2022. Available from: https://www150.statcan.gc.ca/n1/pub/92-195-x/2021001/geo/ra-rr/ra-rr-eng.htm |
[29] |
Woulfe JM, Goodman LA (2021) Identity abuse as a tactic of violence in LGBTQ communities: Initial validation of the identity abuse measure. J Interpers Violence 36: 2656-2676. https://doi.org/10.1177/0886260518760018 ![]() |
[30] |
Chowdhury R (2023) The role of religion in domestic violence and abuse in UK muslim communities. Oxf J Law Relig 12: 178-198. https://doi.org/10.1093/ojlr/rwad008 ![]() |
[31] | McLemore A (2021) Stalking by way of the courts: Tennessee's abusive civil action law and why all states should adopt a similar approach to abusive Litigation in the family law context. UCLA Womens Law J 28: 333. https://doi.org/10.5070/L328155792 |
[32] | Statistics Canada, Census profile, 2021 census of population: profiles of a community or region: 98-316-X2021001. Ontario Statistics Canada, 2023. Available from: https://www150.statcan.gc.ca/n1/en/catalogue/98-316-X2021001 |
[33] | Sutton D (2023) Gender-related homicide of women and girls in Canada. Available from: https://www150.statcan.gc.ca/n1/pub/85-002-x/2023001/article/00003-eng.htm |
[34] | Otter.ai (2019, August). Available from: https://otter.ai./ |
[35] |
Braun V, Clarke V (2006) Using thematic analysis in psychology. Qual Res Psychol 3: 77-101. https://doi.org/10.1191/1478088706qp063oa ![]() |
[36] | Kurbatfinski S, Whitehead J, Hodge L, et al. (2023) 2SLGBTQQIA+ experiences of intimate partner abuse and help-seeking: an intersectional scoping review. |
[37] |
Capaldi DM, Knoble NB, Shortt JW, et al. (2012) A systematic review of risk factors for intimate partner violence. Partner Abuse 3: 231-280. https://doi.org/10.1891/1946-6560.3.2.231 ![]() |
[38] |
Gilchrist G, Potts LC, Connolly DJ, et al. (2023) Experience and perpetration of intimate partner violence and abuse by gender of respondent and their current partner before and during COVID-19 restrictions in 2020: a cross-sectional study in 13 countries. BMC Public Health 23: 316. https://doi.org/10.1186/s12889-022-14635-2 ![]() |
[39] |
Whitton SW, Lawlace M, Dyar C, et al. (2021) Exploring mechanisms of racial disparities in intimate partner violence among sexual and gender minorities assigned female at birth. Cultur Divers Ethnic Minor Psychol 27: 602-612. https://doi.org/10.1037/cdp0000463 ![]() |
[40] |
Reyns BW, Scherer H (2018) Stalking victimization among college students: the role of disability within a lifestyle-routine activity framework. Crime Delinquency 64: 650-673. https://doi.org/10.1177/0011128717714794 ![]() |
[41] | Breiding MJ, Smith SG, Basile KC, et al. (2014) Prevalence and characteristics of sexual violence, stalking, and intimate partner violence victimization—national intimate partner and sexual violence survey, United States, 2011. MMWR Surveill Summ 63: 1-18. |
[42] |
Reyns BW, Scherer H (2019) Disability type and risk of sexual and stalking victimization in a national sample: a lifestyle–routine activity approach. Crim Justice Behav 46: 628-647. https://doi.org/10.1177/0093854818809148 ![]() |
[43] | Statistics Canada, Family matters: to have kids or not to have kids: that is the question! Ontario Statistics Canada, 2023. Available from: https://www150.statcan.gc.ca/n1/pub/11-627-m/11-627-m2023006-eng.htm |
[44] |
Nikupeteri A, Katz E, Laitinen M (2021) Coercive control and technology-facilitated parental stalking in children's and young people's lives. J Gen Based Violence 5: 395-412. https://doi.org/10.1332/239868021X16285243258834 ![]() |
[45] |
Humphreys C, Diemer K, Bornemisza A, et al. (2019) More present than absent: men who use domestic violence and their fathering. Child Fam Soc Work 24: 321-329. https://doi.org/10.1111/cfs.12617 ![]() |
[46] |
Bristow SM, Jackson D, Power T, et al. (2022) Rural mothers' feelings of isolation when caring for a child chronic health condition: a phenomenological study. J Child Health Care 26: 185-198. https://doi.org/10.1177/13674935211007324 ![]() |
[47] |
Logan TK, Stevenson E, Evans L, et al. (2004) Rural and urban women's perceptions of barriers to health, mental health, and criminal justice services: implications for victim services. Violence Vict 19: 37-62. https://doi.org/10.1891/vivi.19.1.37.33234 ![]() |
[48] |
Anderson KM, Renner LM, Bloom TS (2014) Rural women's strategic responses to intimate partner violence. Health Care Women Int 35: 423-441. https://doi.org/10.1080/07399332.2013.815757 ![]() |
[49] |
Riddell T, Ford-Gilboe M, Leipert B (2009) Strategies used by rural women to stop, avoid, or escape from intimate partner violence. Health Care Women Int 30: 134-159. https://doi.org/10.1080/07399330802523774 ![]() |
[50] |
Bocij P, McFarlane L (2003) Cyberstalking: the technology of hate. Police J 76: 204-221. https://doi.org/10.1350/pojo.76.3.204.19442 ![]() |
[51] |
Fraser C, Olsen E, Lee K, et al. (2010) The new age of stalking: technological implications for stalking. Juv Fam Court J 61: 39-55. https://doi.org/10.1111/j.1755-6988.2010.01051.x ![]() |
[52] |
Castro Á, Barrada JR (2020) Dating apps and their sociodemographic and psychosocial correlates: a systematic review. Int J Environ Res Public Health 17: 6500. https://doi.org/10.3390/ijerph17186500 ![]() |
[53] |
Blackwell C, Birnholtz J, Abbott C (2015) Seeing and being seen: co-situation and impression formation using Grindr, a location-aware gay dating app. New Media Soc 17: 1117-1136. https://doi.org/10.1177/1461444814521595 ![]() |
[54] |
Kaur P, Dhir A, Tandon A, et al. (2021) A systematic literature review on cyberstalking. An analysis of past achievements and future promises. Technol Forecast Soc 163: 120426. https://doi.org/10.1016/j.techfore.2020.120426 ![]() |
[55] |
Ogbe E, Harmon S, Van den Bergh R, et al. (2020) A systematic review of intimate partner violence interventions focused on improving social support and/ mental health outcomes of survivors. PLoS One 15: e0235177. https://doi.org/10.1371/journal.pone.0235177 ![]() |
[56] | Benitez CT, McNiel DE, Binder RL (2010) Do protection orders protect?. J Am Acad Psychiatry Law 38: 376-385. |
[57] |
Holt VL, Kernic MA, Wolf ME, et al. (2003) Do protection orders affect the likelihood of future partner violence and injury?. Am J Prev Med 24: 16-21. https://doi.org/10.1016/s0749-3797(02)00576-7 ![]() |
[58] |
Holt VL, Kernic MA, Lumley T, et al. (2002) Civil protection orders and risk of subsequent police-reported violence. JAMA 288: 589-594. https://doi.org/10.1001/jama.288.5.589 ![]() |
[59] |
McFarlane J, Malecha A, Gist J, et al. (2004) Protection orders and intimate partner violence: an 18-month study of 150 black, Hispanic, and white women. Am J Public Health 94: 613-618. https://doi.org/10.2105/ajph.94.4.613 ![]() |
[60] |
Logan TK, Walker R (2010) Civil protective order effectiveness: justice or just a piece of paper?. Violence Vict 25: 332-348. https://doi.org/10.1891/0886-6708.25.3.332 ![]() |
[61] |
Carlson MJ, Harris SD, Holden GW (1999) Protective orders and domestic violence: risk factors for re-abuse. J Fam Violence 14: 205-226. https://doi.org/10.1023/A:1022032904116 ![]() |
[62] | Koshan J (2023) Preventive justice? Domestic violence protection orders and their intersections with family and other laws and legal systems. Can J Fam L 35: 241. https://doi.org/10.2139/ssrn.4372318 |
[63] | American Psychiatric Association (2013) Diagnostic and Statistical Manual of Mental Disorders (DSM-5). 5 Eds., Washington: American Psychiatric Association. https://doi.org/10.1176/appi.books.9780890425596 |
[64] |
Zimmermann K, Carnahan LR, Paulsey E, et al. (2016) Health care eligibility and availability and health care reform: Are we addressing rural women's barriers to accessing care?. J Health Care Poor Underserved 27: 204-219. https://doi.org/10.1353/hpu.2016.0177 ![]() |
[65] |
Sankar P, Mora S, Merz JF, et al. (2003) Patient perspectives of medical confidentiality: a review of the literature. J Gen Intern Med 18: 659-669. https://doi.org/10.1046/j.1525-1497.2003.20823.x ![]() |
[66] |
Sabri B, Tharmarajah S, Njie-Carr VPS, et al. (2022) Safety planning with marginalized survivors of intimate partner violence: challenges of conducting safety planning intervention research with Marginalized women. Trauma Violence Abuse 23: 1728-1751. https://doi.org/10.1177/15248380211013136 ![]() |
[67] |
Natarajan M (2016) Police response to domestic violence: a case study of TecSOS mobile phone use in the London metropolitan police service. Polic J Policy Pract 10: 378-390. https://doi.org/10.1093/police/paw022 ![]() |
[68] |
Hearn J, Hall M, Lewis R, et al. (2023) The spread of digital intimate partner violence: ethical challenges for business, workplaces, employers and management. J Bus Ethics 187: 695-711. https://doi.org/10.1007/s10551-023-05463-4 ![]() |
[69] | Waite S, Pajovic V, Denier N (2010) Lesbian, gay and bisexual earnings in the Canadian labor market: new evidence from the Canadian community health survey. Res Soc Strat Mobil 67: 100484. https://doi.org/10.1016/j.rssm.2020.100484 |
[70] |
Coy M, Scott E, Tweedale R, et al. (2015) “It's like going through the abuse again”: domestic violence and women and children's (un) safety in private law contact proceedings. J Soc Welf Fam Law 37: 53-69. https://doi.org/10.1080/09649069.2015.1004863 ![]() |
![]() |
![]() |