skip to main content
10.1145/3491101.3503548acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
extended-abstract

Aiding Intimate Violence Survivors in Lockdown: Lessons about Digital Security in the Covid-19 Pandemic

Authors Info & Claims
Published:28 April 2022Publication History

ABSTRACT

The global pandemic and associated lockdown measures created new and severe forms of vulnerability for people living in the context of intimate partner violence and coercive control, including being trapped in their homes with abusers and struggling to access advocates as services moved online. This paper outlines innovations used by victim advocates and service providers in reaching survivors in often impossible circumstances, and summarizes lessons from the design of a safety-planning application named “myPlan”. We propose digital security guidelines for products and services which may be used by survivors cohabiting with abusers or using devices which may be under surveillance. We conclude with reflections on whether technology design leads to empowerment: although we cannot overstate the importance of digital security design which is sensitive to the unique vulnerabilities of marginalized people, true empowerment requires a greater commitment to funding accessible housing, mental health support, and advocacy.

Skip Supplemental Material Section

Supplemental Material

3491101.3503548-talk-video.mp4

mp4

27.6 MB

References

  1. M. L. Evans, M. Lindauer, and M. E. Farrell, “A Pandemic within a Pandemic — Intimate Partner Violence during Covid-19,” New England Journal of Medicine, 2020, doi: 10.1056/nejmp2024046.Google ScholarGoogle Scholar
  2. A. R. Piquero, W. G. Jennings, E. Jemison, C. Kaukinen, and F. M. Knaul, “Domestic violence during the COVID-19 pandemic - Evidence from a systematic review and meta-analysis,” Journal of Criminal Justice, vol. 74, p. 101806, May 2021, doi: 10.1016/J.JCRIMJUS.2021.101806.Google ScholarGoogle ScholarCross RefCross Ref
  3. A. Kourti , “Domestic Violence During the COVID-19 Pandemic: A Systematic Review:,” https://doi.org/10.1177/15248380211038690, Aug. 2021, doi: 10.1177/15248380211038690.Google ScholarGoogle Scholar
  4. S. Fielding, “In quarantine with an abuser: surge in domestic violence reports linked to coronavirus,” The Guardian, 2021.Google ScholarGoogle Scholar
  5. E. Tseng, D. Freed, K. Engel, T. Ristenpart, and N. Dell, “A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19,” CHI Conference on Human Factors in Computing Systems (CHI ’21), 2021.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Slupska, “Safe at Home: Towards a Feminist Critique of Cybersecurity,” St Antony's International Review, 2019.Google ScholarGoogle Scholar
  7. S. Havron, D. Freed, R. Chatterjee, D. McCoy, N. Dell, and T. Ristenpart, “Clinical computer security for victims of intimate partner violence,” 2019.Google ScholarGoogle Scholar
  8. L. Tanczer, I. L. Neira, S. Parkin, T. Patel, and G. Danezis, “Gender and IoT Research Report technology-facilitated abuse,” no. November, 2018.Google ScholarGoogle Scholar
  9. E. Tseng , “The Tools and Tactics Used in Intimate Partner Surveillance:An Analysis of Online Infidelity Forums,” arXiv preprint arXiv:2005.14341, 2020.Google ScholarGoogle Scholar
  10. United Nations Office on Drugs and Crime, “GLOBAL STUDY ON HOMICIDE Gender-related killing of women and girls,” 2018.Google ScholarGoogle Scholar
  11. N. J. Sokoloff and I. Dupont, “Domestic violence at the intersections of race, class, and gender: Challenges and contributions to understanding violence against marginalized women in diverse communities,” Violence Against Women. 2005. doi: 10.1177/1077801204271476.Google ScholarGoogle Scholar
  12. K. M. Devries , “The global prevalence of intimate partner violence against women,” Science. 2013. doi: 10.1126/science.1240937.Google ScholarGoogle Scholar
  13. D. Woodlock, “The Abuse of Technology in Domestic Violence and Stalking,” Violence Against Women, 2017, doi: 10.1177/1077801216646277.Google ScholarGoogle Scholar
  14. M. L. Brown, L. A. Reed, and J. T. Messing, “Technology-based abuse: Intimate partner violence and the use of information communication technologies.,” in Mediating misogyny, Palgrave Macmillan, Cham., 2018, pp. 209–227.Google ScholarGoogle ScholarCross RefCross Ref
  15. N. Sambasivan , “‘They Don't Leave Us Alone Anywhere We Go’: Gender and Digital Abuse in South Asia,” 2019. doi: 10.1145/3290605.3300232.Google ScholarGoogle Scholar
  16. T. Matthews , “Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner Abuse,” 2017. doi: 10.1145/3025453.3025875.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. R. Chatterjee , “The Spyware Used in Intimate Partner Violence,” 2018. doi: 10.1109/SP.2018.00061.Google ScholarGoogle ScholarCross RefCross Ref
  18. D. Freed, J. Palmer, D. Minchala, K. Levy, T. Ristenpart, and N. Dell, “‘A Stalker's Paradise’: How Intimate Partner Abusers Exploit Technology,” 2018. doi: 10.1145/3173574.3174241.Google ScholarGoogle Scholar
  19. I. Lopez-Neira, T. Patel, S. Parkin, G. Danezis, and L. Tanczer, “‘Internet of Things’: How Abuse is Getting Smarter,” SSRN Electronic Journal, 2019, doi: 10.2139/ssrn.3350615.Google ScholarGoogle Scholar
  20. J. Messing, M. Bagwell-Gray, M. L. Brown, A. Kappas, and A. Durfee, “Intersections of Stalking and Technology-Based Abuse: Emerging Definitions, Conceptualization, and Measurement,” Journal of Family Violence, 2020, doi: 10.1007/s10896-019-00114-7.Google ScholarGoogle Scholar
  21. M. Dragiewicz , “Technology facilitated coercive control: domestic violence and the competing roles of digital media platforms,” Feminist Media Studies, 2018, doi: 10.1080/14680777.2018.1447341.Google ScholarGoogle ScholarCross RefCross Ref
  22. K. Levy and B. Schneier, “Privacy threats in intimate relationships,” Journal of Cybersecurity, vol. 6, no. 1, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  23. L. Nuttall, J. Evans, M. Franklin, and S. Burne James, “Coercive Control Resistant Design,” 2019.Google ScholarGoogle Scholar
  24. D. FREED , “‘Is my phone hacked?’ Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence,” Proc. ACM Hum.-Comput. Interact., vol. 3, 2019.Google ScholarGoogle Scholar
  25. L. Wood , “On the Front Lines of the COVID-19 Pandemic: Occupational Experiences of the Intimate Partner Violence and Sexual Assault Workforce,” Journal of Interpersonal Violence, 2020, doi: 10.1177/0886260520983304.Google ScholarGoogle Scholar
  26. K. B. Eden , “Use of online safety decision aid by abused women: Effect on decisional conflict in a randomized controlled trial,” American Journal of Preventive Medicine, 2015, doi: 10.1016/j.amepre.2014.09.027.Google ScholarGoogle Scholar
  27. N. Glass , “A safety app to respond to dating violence for college women and their friends: The MyPlan study randomized controlled trial protocol,” BMC Public Health, 2015, doi: 10.1186/s12889-015-2191-6.Google ScholarGoogle ScholarCross RefCross Ref
  28. J. T. Messing, I. Ogbonnoya, and M. L. Brown, “Intimate partner violence,” in Approaches to Child and Family Protection: Core Opportunities and Challenges in Child- and Family-Serving Systems,Google ScholarGoogle Scholar
  29. K. Hegarty , “An online healthy relationship tool and safety decision aid for women experiencing intimate partner violence (I-DECIDE): a randomised controlled trial,” The Lancet Public Health, vol. 4, no. 6, 2019, doi: 10.1016/S2468-2667(19)30079-9.Google ScholarGoogle Scholar
  30. L. Tarzia, D. Iyer, E. Thrower, and K. Hegarty, “‘Technology Doesn't Judge You’: Young Australian Women's Views on Using the Internet and Smartphones to Address Intimate Partner Violence,” Journal of Technology in Human Services, vol. 35, no. 3, 2017, doi: 10.1080/15228835.2017.1350616.Google ScholarGoogle ScholarCross RefCross Ref
  31. K. B. Eden , “Use of online safety decision aid by abused women: Effect on decisional conflict in a randomized controlled trial,” American Journal of Preventive Medicine, vol. 48, no. 4, 2015, doi: 10.1016/j.amepre.2014.09.027.Google ScholarGoogle ScholarCross RefCross Ref
  32. J. Koziol-McLain , “Efficacy of a web-based safety decision aid for women experiencing intimate partner violence: Randomized controlled trial,” Journal of Medical Internet Research, vol. 20, no. 1, 2018, doi: 10.2196/jmir.8617.Google ScholarGoogle Scholar
  33. N. E. Glass , “The Longitudinal Impact of an Internet Safety Decision Aid for Abused Women,” American Journal of Preventive Medicine, vol. 52, no. 5, 2017, doi: 10.1016/j.amepre.2016.12.014.Google ScholarGoogle ScholarCross RefCross Ref
  34. M. R. Decker , “Safety decision-making and planning mobile app for intimate partner violence prevention and response: Randomised controlled trial in Kenya,” BMJ Global Health, vol. 5, no. 7, 2020, doi: 10.1136/bmjgh-2019-002091.Google ScholarGoogle Scholar
  35. N. E. Glass , “Longitudinal Impact of the myPlan App on Health and Safety Among College Women Experiencing Partner Violence,” Journal of Interpersonal Violence, 2021, doi: 10.1177/0886260521991880.Google ScholarGoogle Scholar
  36. M. E. Bagwell-Gray , “From myPlan to ourCircle: adapting a web-based safety planning intervention for native American women exposed to intimate partner violence,” Journal of Ethnic and Cultural Diversity in Social Work, vol. 30, no. 1, 2021, doi: 10.1080/15313204.2020.1770651.Google ScholarGoogle Scholar
  37. T. Bloom, A. Gielen, and N. Glass, “Developing an app for college women in abusive same-sex relationships and their friends,” Journal of Homosexuality, vol. 63, no. 6, 2016, doi: 10.1080/00918369.2015.1112597.Google ScholarGoogle ScholarCross RefCross Ref
  38. M. Lindsay , “Survivor Feedback on a Safety Decision Aid Smartphone Application for College-Age Women in Abusive Relationships,” Journal of Technology in Human Services, vol. 31, no. 4, 2013, doi: 10.1080/15228835.2013.861784.Google ScholarGoogle ScholarCross RefCross Ref
  39. B. Sabri , “The weWomen and ourCircle randomized controlled trial protocol: A web-based intervention for immigrant, refugee and indigenous women with intimate partner violence experiences,” Contemporary Clinical Trials, vol. 76, 2019, doi: 10.1016/j.cct.2018.11.013.Google ScholarGoogle ScholarCross RefCross Ref
  40. C. Alvarez, K. Debnam, A. Clough, K. Alexander, and N. E. Glass, “Responding to intimate partner violence: Healthcare providers’ current practices and views on integrating a safety decision aid into primary care settings,” Research in Nursing and Health, vol. 41, no. 2, 2018, doi: 10.1002/nur.21853.Google ScholarGoogle Scholar
  41. T. L. Bloom, N. E. Glass, J. Case, C. Wright, K. Nolte, and L. Parsons, “Feasibility of an online safety planning intervention for rural and urban pregnant abused women,” Nursing Research, vol. 63, no. 4, 2014, doi: 10.1097/NNR.0000000000000036.Google ScholarGoogle Scholar
  42. C. Sas, S. Whittaker, S. Dow, J. Forlizzi, and J. Zimmerman, “Generating implications for design through design research,” 2014. doi: 10.1145/2556288.2557357.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. J. Slupska, S. Dawson Duckworth, L. Ma, and G. Neff, “Reconfigure: Feminist Action Research in Cybersecurity,” CHI ’21: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, 2021.Google ScholarGoogle Scholar
  44. Becky Kazansky, “‘It depends on your threat model’: the anticipatory dimensions of resistance to data-driven surveillance,” Big Data & Society, vol. 8, no. 1, 2021.Google ScholarGoogle Scholar
  45. T. E. Havard and M. Lefevre, “Beyond the power and control wheel: How abusive men manipulate mobile phone technologies to facilitate coercive control,” Journal of Gender-Based Violence, 2020, doi: 10.1332/239868020X15850131608789.Google ScholarGoogle Scholar
  46. B. A. Harris and D. Woodlock, “Digital coercive control: Insights from two landmark domestic violence studies,” British Journal of Criminology, 2019, doi: 10.1093/bjc/azy052.Google ScholarGoogle Scholar
  47. J. T. Messing and J. Thaller, “Intimate Partner Violence Risk Assessment: A Primer for Social Workers,” British Journal of Social Work, vol. 45, no. 6, 2015, doi: 10.1093/bjsw/bcu012.Google ScholarGoogle ScholarCross RefCross Ref
  48. N. M. St Vil, B. Sabri, V. Nwokolo, K. A. Alexander, and J. C. Campbell, “A qualitative study of survival strategies used by low-income black women who experience intimate partner violence,” Social Work (United States). 2017. doi: 10.1093/sw/sww080.Google ScholarGoogle Scholar
  49. S. Meyer, “Why women stay: A theoretical examination of rational choice and moral reasoning in the context of intimate partner violence,” Australian and New Zealand Journal of Criminology, 2012, doi: 10.1177/0004865812443677.Google ScholarGoogle Scholar
  50. S. U. Noble, Algorithms of oppression: How search engines reinforce racism. 2018. doi: 10.15713/ins.mmj.3.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    CHI EA '22: Extended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems
    April 2022
    3066 pages
    ISBN:9781450391566
    DOI:10.1145/3491101

    Copyright © 2022 Owner/Author

    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 28 April 2022

    Check for updates

    Qualifiers

    • extended-abstract
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate6,164of23,696submissions,26%

    Upcoming Conference

    CHI '24
    CHI Conference on Human Factors in Computing Systems
    May 11 - 16, 2024
    Honolulu , HI , USA
  • Article Metrics

    • Downloads (Last 12 months)51
    • Downloads (Last 6 weeks)5

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format