Digital media and domestic violence in Australia: essential contexts

Authors:
Molly Dragiewicz Griffith University, Australia

Search for other papers by Molly Dragiewicz in
Current site
Google Scholar
Close
,
Bridget Harris Queensland University of Technology, Australia

Search for other papers by Bridget Harris in
Current site
Google Scholar
Close
,
Delanie Woodlock University of New England, Australia

Search for other papers by Delanie Woodlock in
Current site
Google Scholar
Close
, and
Michael Salter University of New South Wales, Australia

Search for other papers by Michael Salter in
Current site
Google Scholar
Close
Restricted access
Get eTOC alerts
Rights and permissions Cite this article

Domestic violence is a pervasive social problem in Australia. Digital media are increasingly integral to its dynamics. Technology-facilitated coercive control (TFCC) is a form of gender-based violence. This article examines domestic violence survivors’ experiences with TFCC, drawing on interviews with 20 Australian women. Study results enhance understanding of how abusers use digital media. We highlight four key contexts for understanding the role of technology in domestic violence: the coercive and controlling relationship, separation abuse, co-parenting and survivors’ safety work. These contexts provide insight into the dynamics of TFCC and illuminate key differences between this and other forms of online abuse.

  • Aghtaie, N., Larkins, C., Barter, C., Stanley, N., Wood, M. and Øverlien, C. (2018) Interpersonal violence and abuse in young people’s relationships in five European countries: online and offline normalisation of heteronormativity, Journal of Gender Based Violence, 2(2): 293310, doi: 10.1332/239868018X15263879270302.

    • Search Google Scholar
    • Export Citation
  • Anderson, K.L. (2009) Gendering coercive control, Violence Against Women, 15(12): 144457, doi: 10.1177/1077801209346837.

  • Australian Government and Department of Social Services (2016) Third Action Plan 2016–2019 of the National Plan to Reduce Violence Against Women and Their Children 2010–2022, Canberra: Australian Government.

    • Search Google Scholar
    • Export Citation
  • Australian Human Rights Commission (2014) Violence Against Women, https://humanrights.gov.au/our-work/sex-discrimination/projects/violence-against-women.

  • AIHW (Australian Institute of Health and Welfare) (2019) Family, Domestic and Sexual Violence in Australia: Continuing the National Story 2019, Canberra: AIHW, doi: 10.25816/5ebcc837fa7ea.

    • Search Google Scholar
    • Export Citation
  • Barter, C., McCarry, M., Berridge, D. and Evans, K. (2009) Partner Exploitation and Violence in Teenage Intimate Relationships, Bristol: NSPCC, https://www.researchgate.net/publication/265245739_Partner_Exploitation_and_Violence_in_Teenage_Intimate_Relationships.

    • Search Google Scholar
    • Export Citation
  • Barter, C., Stanley, N., Wood, M., Lanau, A., Aghtaie, N., Larkins, C. and Øverlien, C. (2017) Young people’s online and face-to-face experiences of interpersonal violence and abuse and their subjective impact across five European countries, Psychology of Violence, 7(3): 37584. doi: 10.1037/vio0000096

    • Search Google Scholar
    • Export Citation
  • Belknap, J., Chu, A.T. and DePrince, A.P. (2011) The roles of phones and computers in threatening and abusing women victims of male intimate partner abuse, Duke Journal of Gender Law and Policy, 19(2): 373406.

    • Search Google Scholar
    • Export Citation
  • Brown, C. and Hegarty, K. (2018) Digital dating abuse measures: a critical review, Aggression and Violent Behavior, 40: 4459, doi: 10.1016/j.avb.2018.03.003

    • Search Google Scholar
    • Export Citation
  • Brown, C., Flood, M. and Hegarty, K. (2020) Digital dating abuse perpetration and impact: the importance of gender, Journal of Youth Studies, (Online first): 116, doi: 10.1080/13676261.2020.1858041.

    • Search Google Scholar
    • Export Citation
  • Bryant, W. and Bricknell, S. (2017) Homicide in Australia 2012–13 to 2013–14: National Homicide Monitoring Program Report, Canberra: Australian Institute of Criminology.

    • Search Google Scholar
    • Export Citation
  • CEDAW (UN Committee on the Elimination of Discrimination Against Women) (1993) CEDAW General recommendation No. 19: Violence against women, https://www.refworld.org/docid/52d920c54.html.

  • COAG (Coalition of Australian Governments) (2016) COAG Advisory Panel on Reducing Violence against Women and Their Children: Final Report, Canberra: Australian Government.

    • Search Google Scholar
    • Export Citation
  • DeKeseredy, W.S., Dragiewicz, M. and Schwartz, M.D. (2017) Abusive Endings: Separation and Divorce Violence Against Women, Oakland, CA: University of California Press.

    • Search Google Scholar
    • Export Citation
  • Dimond, J.P., Fiesler, C. and Bruckman, A.S. (2011) Domestic violence and information communication technologies, Interacting with Computers, 23(5): 41321, doi: 10.1016/j.intcom.2011.04.006.

    • Search Google Scholar
    • Export Citation
  • Dobash, R.E. and Dobash, R.P. (1979) Violence Against Wives: A Case Against the Patriarchy, New York: Free Press.

  • Domestic and Family Violence Death Review and Advisory Board (2017) Domestic and Family Violence Death Review and Advisory Board Annual Report 2016–2017, Brisbane: Queensland Government.

    • Search Google Scholar
    • Export Citation
  • Douglas, H., Harris, B.A. and Dragiewicz, M. (2019) Technology-facilitated domestic and family violence: women’s experiences, British Journal of Criminology, 59(3): 55170, doi: 10.1093/bjc/azy068.

    • Search Google Scholar
    • Export Citation
  • Dragiewicz, M., Burgess, J., Matamoros-Fernández, A., Salter, M., Suzor, N.P., Woodlock, D. and Harris, B. (2018) Technology-facilitated coercive control: domestic violence and the competing roles of digital media platforms, Feminist Media Studies, 18(4): 60925, doi: 10.1080/14680777.2018.1447341.

    • Search Google Scholar
    • Export Citation
  • Dragiewicz, M., Harris, B., Woodlock, D., Salter, M., Easton, H., Lynch, A., Campbell, H., Leach, J. and Milne, L. (2019) Domestic Violence and Communication Technology: Survivor Experiences of Intrusion, Surveillance, and Identity Crime, Sydney: Australian Communications Consumer Action Network.

    • Search Google Scholar
    • Export Citation
  • George, A. and Harris, B. (2014) Landscapes of Violence: Women Surviving Family Violence in Regional and Rural Victoria, Geelong: Deakin University.

    • Search Google Scholar
    • Export Citation
  • Harris, B. (2018) Spacelessness, spatiality and intimate partner violence: technology-facilitated abuse, stalking and justice, in K. Fitz-Gibbon, S. Walklate, J. McCullough and J. Maher (eds) Intimate Partner Violence, Risk and Security: Securing Women’s Lives in a Global World, London: Routledge, pp 5270.

    • Search Google Scholar
    • Export Citation
  • Harris, B.A. and Woodlock, D. (2019) Digital coercive control: insights from two landmark domestic violence studies, The British Journal of Criminology, 59(3): 53050, doi: 10.1093/bjc/azy052.

    • Search Google Scholar
    • Export Citation
  • HM Government (2019) Online Harms White Paper, London: United Kingdom Government’s Department for Digital, Media, Culture and Sport and the Home Office, https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/793360/Online_Harms_White_Paper.pdf.

    • Search Google Scholar
    • Export Citation
  • Kelly, L., Sharp-Jeffs, N. and Klein, R. (2014) Finding the Costs of Freedom: How Women and Children Rebuild Their Lives After Domestic Violence, London: Solace Women’s Aid.

    • Search Google Scholar
    • Export Citation
  • KPMG (2016) The Cost of Violence Against Women and Their Children in Australia: Final Report, Canberra: Department of Social Services.

  • Laing, L. (2017) Secondary victimization: domestic violence survivors navigating the family law system, Violence Against Women, 23(11): 131435, doi: 10.1177/1077801216659942.

    • Search Google Scholar
    • Export Citation
  • Martin, D. (1976) Battered Wives, Volcano, CA: Volcano Press.

  • Mirza, N. (2018) Reframing agency in abusive contexts: beyond ‘free choice’ and ‘open resistance, Journal of Gender-Based Violence, 2(1): 4156, doi: 10.1332/239868017X15127297709475.

    • Search Google Scholar
    • Export Citation
  • Reed, L.A., Tolman, R.M. and Ward, L.M. (2016) Snooping and sexting: digital media as a context for dating aggression and abuse among college students, Violence Against Women, 22(13): 155676, doi: 10.1177/1077801216630143.

    • Search Google Scholar
    • Export Citation
  • Rennie, E., Yunkaporta, T. and Holcombe-James, I. (2018) Cyber Safety in Remote Aboriginal Communities: Final Report, Melbourne: Digital Ethnography Research Centre.

    • Search Google Scholar
    • Export Citation
  • Royal Commission into Family Violence (2016) Royal Commission into Family Violence: Volume III: Report and recommendations, Melbourne: Victorian Government.

    • Search Google Scholar
    • Export Citation
  • Šimonović, D. (2018) Report of the Special Rapporteur on Violence Against Women, its Causes and Consequences on Online Violence Against Women and Girls from a Human Rights Perspective (No.A/HRC/38/47), New York: United Nations General Assembly.

    • Search Google Scholar
    • Export Citation
  • Southworth, C., Finn, J., Dawson, S., Fraser, C. and Tucker, S. (2007) Intimate partner violence, technology, and stalking, Violence Against Women, 13(8): 84256, doi: 10.1177/1077801207302045.

    • Search Google Scholar
    • Export Citation
  • Stark, E. (2007) Coercive Control: How Men Entrap Women in Personal Life, New York: Oxford University Press.

  • WESNET (2019) Supporting Survivors of Technology-facilitated Abuse from Aboriginal and or Torres Strait Islander, and/or Culturally and Linguistically Diverse Communities: National Listening Tour Report, Canberra: WESNET.

    • Search Google Scholar
    • Export Citation
  • Woodlock, D. (2013) SmartSafe-Technology-facilitated Stalking: Findings and Recommendations from the SmartSafe Project, Collingwood: Domestic Violence Resource Centre Victoria.

    • Search Google Scholar
    • Export Citation
  • Woodlock, D. (2015) Recharge: Women’s Technology Safety, Legal Resources, Research, and Training, Collingwood: Women’s Legal Service NSW, Domestic Violence Resource Centre Victoria and WESNET.

    • Search Google Scholar
    • Export Citation
  • Woodlock, D. (2017) The abuse of technology in domestic violence and stalking, Violence Against Women, 23(5): 584602, doi: 10.1177/1077801216646277.

    • Search Google Scholar
    • Export Citation
  • Woodlock, D., McKenzie, M., Western, D. and Harris, B. (2020) Technology as a weapon in domestic violence: responding to digital coercive control, Australian Social Work, 73(3): 36880, doi: 10.1080/0312407X.2019.1607510.

    • Search Google Scholar
    • Export Citation
  • Ybarra, M.L., Price-Feeney, M., Lenhart, A. and Zickuhr, K. (2017) Intimate Partner Digital Abuse, New York: Data and Society Research Institute, Center for Innovative Public Health Research.

    • Search Google Scholar
    • Export Citation
  • Zuboff, S. (2019) The age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power, New York: Public Affairs.

    • Search Google Scholar
    • Export Citation
Molly Dragiewicz Griffith University, Australia

Search for other papers by Molly Dragiewicz in
Current site
Google Scholar
Close
,
Bridget Harris Queensland University of Technology, Australia

Search for other papers by Bridget Harris in
Current site
Google Scholar
Close
,
Delanie Woodlock University of New England, Australia

Search for other papers by Delanie Woodlock in
Current site
Google Scholar
Close
, and
Michael Salter University of New South Wales, Australia

Search for other papers by Michael Salter in
Current site
Google Scholar
Close

Content Metrics

May 2022 onwards Past Year Past 30 Days
Abstract Views 2084 1435 152
Full Text Views 1095 33 3
PDF Downloads 785 43 2

Altmetrics

Dimensions

You are not currently authorised to access the full text of this chapter or article.
Access options
To access the full chapter or article then please choose one of the options below.
Purchase
Pay to access content (PDF download and unlimited online access)
Other access options
Redeem Token
Institutional Login
Log in via Open Athens or Shibboleth. Please contact your librarian if you need any help.
Login with Institutional Access
Personal Login
Login to your BUP account with your individual credentials.
Login with BUP account

Institutional librarians can find more information about free trials here