ABSTRACT
The global pandemic and associated lockdown measures created new and severe forms of vulnerability for people living in the context of intimate partner violence and coercive control, including being trapped in their homes with abusers and struggling to access advocates as services moved online. This paper outlines innovations used by victim advocates and service providers in reaching survivors in often impossible circumstances, and summarizes lessons from the design of a safety-planning application named “myPlan”. We propose digital security guidelines for products and services which may be used by survivors cohabiting with abusers or using devices which may be under surveillance. We conclude with reflections on whether technology design leads to empowerment: although we cannot overstate the importance of digital security design which is sensitive to the unique vulnerabilities of marginalized people, true empowerment requires a greater commitment to funding accessible housing, mental health support, and advocacy.
Supplemental Material
- M. L. Evans, M. Lindauer, and M. E. Farrell, “A Pandemic within a Pandemic — Intimate Partner Violence during Covid-19,” New England Journal of Medicine, 2020, doi: 10.1056/nejmp2024046.Google Scholar
- A. R. Piquero, W. G. Jennings, E. Jemison, C. Kaukinen, and F. M. Knaul, “Domestic violence during the COVID-19 pandemic - Evidence from a systematic review and meta-analysis,” Journal of Criminal Justice, vol. 74, p. 101806, May 2021, doi: 10.1016/J.JCRIMJUS.2021.101806.Google ScholarCross Ref
- A. Kourti , “Domestic Violence During the COVID-19 Pandemic: A Systematic Review:,” https://doi.org/10.1177/15248380211038690, Aug. 2021, doi: 10.1177/15248380211038690.Google Scholar
- S. Fielding, “In quarantine with an abuser: surge in domestic violence reports linked to coronavirus,” The Guardian, 2021.Google Scholar
- E. Tseng, D. Freed, K. Engel, T. Ristenpart, and N. Dell, “A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19,” CHI Conference on Human Factors in Computing Systems (CHI ’21), 2021.Google ScholarDigital Library
- J. Slupska, “Safe at Home: Towards a Feminist Critique of Cybersecurity,” St Antony's International Review, 2019.Google Scholar
- S. Havron, D. Freed, R. Chatterjee, D. McCoy, N. Dell, and T. Ristenpart, “Clinical computer security for victims of intimate partner violence,” 2019.Google Scholar
- L. Tanczer, I. L. Neira, S. Parkin, T. Patel, and G. Danezis, “Gender and IoT Research Report technology-facilitated abuse,” no. November, 2018.Google Scholar
- E. Tseng , “The Tools and Tactics Used in Intimate Partner Surveillance:An Analysis of Online Infidelity Forums,” arXiv preprint arXiv:2005.14341, 2020.Google Scholar
- United Nations Office on Drugs and Crime, “GLOBAL STUDY ON HOMICIDE Gender-related killing of women and girls,” 2018.Google Scholar
- N. J. Sokoloff and I. Dupont, “Domestic violence at the intersections of race, class, and gender: Challenges and contributions to understanding violence against marginalized women in diverse communities,” Violence Against Women. 2005. doi: 10.1177/1077801204271476.Google Scholar
- K. M. Devries , “The global prevalence of intimate partner violence against women,” Science. 2013. doi: 10.1126/science.1240937.Google Scholar
- D. Woodlock, “The Abuse of Technology in Domestic Violence and Stalking,” Violence Against Women, 2017, doi: 10.1177/1077801216646277.Google Scholar
- M. L. Brown, L. A. Reed, and J. T. Messing, “Technology-based abuse: Intimate partner violence and the use of information communication technologies.,” in Mediating misogyny, Palgrave Macmillan, Cham., 2018, pp. 209–227.Google ScholarCross Ref
- N. Sambasivan , “‘They Don't Leave Us Alone Anywhere We Go’: Gender and Digital Abuse in South Asia,” 2019. doi: 10.1145/3290605.3300232.Google Scholar
- T. Matthews , “Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner Abuse,” 2017. doi: 10.1145/3025453.3025875.Google ScholarDigital Library
- R. Chatterjee , “The Spyware Used in Intimate Partner Violence,” 2018. doi: 10.1109/SP.2018.00061.Google ScholarCross Ref
- D. Freed, J. Palmer, D. Minchala, K. Levy, T. Ristenpart, and N. Dell, “‘A Stalker's Paradise’: How Intimate Partner Abusers Exploit Technology,” 2018. doi: 10.1145/3173574.3174241.Google Scholar
- I. Lopez-Neira, T. Patel, S. Parkin, G. Danezis, and L. Tanczer, “‘Internet of Things’: How Abuse is Getting Smarter,” SSRN Electronic Journal, 2019, doi: 10.2139/ssrn.3350615.Google Scholar
- J. Messing, M. Bagwell-Gray, M. L. Brown, A. Kappas, and A. Durfee, “Intersections of Stalking and Technology-Based Abuse: Emerging Definitions, Conceptualization, and Measurement,” Journal of Family Violence, 2020, doi: 10.1007/s10896-019-00114-7.Google Scholar
- M. Dragiewicz , “Technology facilitated coercive control: domestic violence and the competing roles of digital media platforms,” Feminist Media Studies, 2018, doi: 10.1080/14680777.2018.1447341.Google ScholarCross Ref
- K. Levy and B. Schneier, “Privacy threats in intimate relationships,” Journal of Cybersecurity, vol. 6, no. 1, 2020.Google ScholarCross Ref
- L. Nuttall, J. Evans, M. Franklin, and S. Burne James, “Coercive Control Resistant Design,” 2019.Google Scholar
- D. FREED , “‘Is my phone hacked?’ Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence,” Proc. ACM Hum.-Comput. Interact., vol. 3, 2019.Google Scholar
- L. Wood , “On the Front Lines of the COVID-19 Pandemic: Occupational Experiences of the Intimate Partner Violence and Sexual Assault Workforce,” Journal of Interpersonal Violence, 2020, doi: 10.1177/0886260520983304.Google Scholar
- K. B. Eden , “Use of online safety decision aid by abused women: Effect on decisional conflict in a randomized controlled trial,” American Journal of Preventive Medicine, 2015, doi: 10.1016/j.amepre.2014.09.027.Google Scholar
- N. Glass , “A safety app to respond to dating violence for college women and their friends: The MyPlan study randomized controlled trial protocol,” BMC Public Health, 2015, doi: 10.1186/s12889-015-2191-6.Google ScholarCross Ref
- J. T. Messing, I. Ogbonnoya, and M. L. Brown, “Intimate partner violence,” in Approaches to Child and Family Protection: Core Opportunities and Challenges in Child- and Family-Serving Systems,Google Scholar
- K. Hegarty , “An online healthy relationship tool and safety decision aid for women experiencing intimate partner violence (I-DECIDE): a randomised controlled trial,” The Lancet Public Health, vol. 4, no. 6, 2019, doi: 10.1016/S2468-2667(19)30079-9.Google Scholar
- L. Tarzia, D. Iyer, E. Thrower, and K. Hegarty, “‘Technology Doesn't Judge You’: Young Australian Women's Views on Using the Internet and Smartphones to Address Intimate Partner Violence,” Journal of Technology in Human Services, vol. 35, no. 3, 2017, doi: 10.1080/15228835.2017.1350616.Google ScholarCross Ref
- K. B. Eden , “Use of online safety decision aid by abused women: Effect on decisional conflict in a randomized controlled trial,” American Journal of Preventive Medicine, vol. 48, no. 4, 2015, doi: 10.1016/j.amepre.2014.09.027.Google ScholarCross Ref
- J. Koziol-McLain , “Efficacy of a web-based safety decision aid for women experiencing intimate partner violence: Randomized controlled trial,” Journal of Medical Internet Research, vol. 20, no. 1, 2018, doi: 10.2196/jmir.8617.Google Scholar
- N. E. Glass , “The Longitudinal Impact of an Internet Safety Decision Aid for Abused Women,” American Journal of Preventive Medicine, vol. 52, no. 5, 2017, doi: 10.1016/j.amepre.2016.12.014.Google ScholarCross Ref
- M. R. Decker , “Safety decision-making and planning mobile app for intimate partner violence prevention and response: Randomised controlled trial in Kenya,” BMJ Global Health, vol. 5, no. 7, 2020, doi: 10.1136/bmjgh-2019-002091.Google Scholar
- N. E. Glass , “Longitudinal Impact of the myPlan App on Health and Safety Among College Women Experiencing Partner Violence,” Journal of Interpersonal Violence, 2021, doi: 10.1177/0886260521991880.Google Scholar
- M. E. Bagwell-Gray , “From myPlan to ourCircle: adapting a web-based safety planning intervention for native American women exposed to intimate partner violence,” Journal of Ethnic and Cultural Diversity in Social Work, vol. 30, no. 1, 2021, doi: 10.1080/15313204.2020.1770651.Google Scholar
- T. Bloom, A. Gielen, and N. Glass, “Developing an app for college women in abusive same-sex relationships and their friends,” Journal of Homosexuality, vol. 63, no. 6, 2016, doi: 10.1080/00918369.2015.1112597.Google ScholarCross Ref
- M. Lindsay , “Survivor Feedback on a Safety Decision Aid Smartphone Application for College-Age Women in Abusive Relationships,” Journal of Technology in Human Services, vol. 31, no. 4, 2013, doi: 10.1080/15228835.2013.861784.Google ScholarCross Ref
- B. Sabri , “The weWomen and ourCircle randomized controlled trial protocol: A web-based intervention for immigrant, refugee and indigenous women with intimate partner violence experiences,” Contemporary Clinical Trials, vol. 76, 2019, doi: 10.1016/j.cct.2018.11.013.Google ScholarCross Ref
- C. Alvarez, K. Debnam, A. Clough, K. Alexander, and N. E. Glass, “Responding to intimate partner violence: Healthcare providers’ current practices and views on integrating a safety decision aid into primary care settings,” Research in Nursing and Health, vol. 41, no. 2, 2018, doi: 10.1002/nur.21853.Google Scholar
- T. L. Bloom, N. E. Glass, J. Case, C. Wright, K. Nolte, and L. Parsons, “Feasibility of an online safety planning intervention for rural and urban pregnant abused women,” Nursing Research, vol. 63, no. 4, 2014, doi: 10.1097/NNR.0000000000000036.Google Scholar
- C. Sas, S. Whittaker, S. Dow, J. Forlizzi, and J. Zimmerman, “Generating implications for design through design research,” 2014. doi: 10.1145/2556288.2557357.Google ScholarDigital Library
- J. Slupska, S. Dawson Duckworth, L. Ma, and G. Neff, “Reconfigure: Feminist Action Research in Cybersecurity,” CHI ’21: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, 2021.Google Scholar
- Becky Kazansky, “‘It depends on your threat model’: the anticipatory dimensions of resistance to data-driven surveillance,” Big Data & Society, vol. 8, no. 1, 2021.Google Scholar
- T. E. Havard and M. Lefevre, “Beyond the power and control wheel: How abusive men manipulate mobile phone technologies to facilitate coercive control,” Journal of Gender-Based Violence, 2020, doi: 10.1332/239868020X15850131608789.Google Scholar
- B. A. Harris and D. Woodlock, “Digital coercive control: Insights from two landmark domestic violence studies,” British Journal of Criminology, 2019, doi: 10.1093/bjc/azy052.Google Scholar
- J. T. Messing and J. Thaller, “Intimate Partner Violence Risk Assessment: A Primer for Social Workers,” British Journal of Social Work, vol. 45, no. 6, 2015, doi: 10.1093/bjsw/bcu012.Google ScholarCross Ref
- N. M. St Vil, B. Sabri, V. Nwokolo, K. A. Alexander, and J. C. Campbell, “A qualitative study of survival strategies used by low-income black women who experience intimate partner violence,” Social Work (United States). 2017. doi: 10.1093/sw/sww080.Google Scholar
- S. Meyer, “Why women stay: A theoretical examination of rational choice and moral reasoning in the context of intimate partner violence,” Australian and New Zealand Journal of Criminology, 2012, doi: 10.1177/0004865812443677.Google Scholar
- S. U. Noble, Algorithms of oppression: How search engines reinforce racism. 2018. doi: 10.15713/ins.mmj.3.Google ScholarCross Ref
Recommendations
Technological intimate partner violence: Exploring technology-related perpetration factors and overlap with in-person intimate partner violence
AbstractTechnology creates new opportunities for intimate partner violence (IPV) to occur. There are common risk factors for in-person and technological IPV (tIPV), however considerably less research has investigated technology-specific risk ...
Highlights- Technological disinhibition predicts technological IPV perpetration.
- Social ...
Comments