‘I feel like we’re really behind the game’: perspectives of the United Kingdom’s intimate partner violence support sector on the rise of technology-facilitated abuse

Authors:
Leonie Maria Tanczer University College London, UK

Search for other papers by Leonie Maria Tanczer in
Current site
Google Scholar
Close
,
Isabel López-Neira University College London, UK

Search for other papers by Isabel López-Neira in
Current site
Google Scholar
Close
, and
Simon Parkin Delft University of Technology, The Netherlands and previously University College London, UK

Search for other papers by Simon Parkin in
Current site
Google Scholar
Close
Restricted access
Get eTOC alerts
Rights and permissions Cite this article

Technology-facilitated abuse or ‘tech abuse’ in intimate partner violence (IPV) contexts describes the breadth of harms that can be enacted using digital systems and online tools. While the misappropriation of technologies in the context of IPV has been subject to prior research, a dedicated study on the United Kingdom’s IPV support sector has so far been missing. The present analysis summarises insights derived from semi-structured interviews with 34 UK voluntary and statutory sector representatives that were conducted over the course of two years (2018–2020). The analysis identifies four overarching themes that point out support services’ practices, concerns and challenges in relation to tech abuse, and specifically the Internet of Things (IoT). These themes include (a) technology-facilitated abuse, where interviewees outline their experiences and understanding of the concept of tech abuse; (b) IoT-enabled tech abuse, focusing on the changing dynamics of tech abuse due to the continuing rise of smart consumer products; (c) data, documentation and assessment, that directs our attention to the shortcomings of existing risk assessment and recording practices; and (d) training, support and assistance, in which participants point to the need for specialist support capabilities to be developed within and beyond existing services.

  • Alshehri, A., Salem, M.B. and Ding, L. (2020) Are smart home devices abandoning IPV victims?, arXiv:2008.06612 8.

  • Arief, B., Coopamootoo, K.P.L., Emms, M. and van Moorsel, A. (2014) Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse, in Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES ’14, New York: Association for Computing Machinery (ACM), pp 20104. doi: 10.1145/2665943.2665965

    • Search Google Scholar
    • Export Citation
  • Bellini, R., Forrest, S., Westmarland, N., Jackson, D. and Smeddinck, J.D. (2020) Choice-Point: Fostering Awareness and Choice with Perpetrators in Domestic Violence Interventions, in Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, Presented at the CHI ’20: CHI Conference on Human Factors in Computing Systems, Honolulu, HI: Association for Computing Machinery (ACM), pp 114. doi: 10.1145/3313831.3376386

    • Search Google Scholar
    • Export Citation
  • Brass, I., Tanczer, L.M., Carr, M., Elsden, M. and Blackstock, J. (2018) Standardising a Moving Target: The Development and Evolution of IoT Security Standards, Presented at the Living in the Internet of Things: Cybersecurity of the IoT – 2018, IET [the Institution of Engineering and Technology], London. doi: 10.1049/cp.2018.0024

    • Search Google Scholar
    • Export Citation
  • Braun, V. and Clarke, V. (2006) Using thematic analysis in psychology, Qualitative Research in Psychology, 3(2): 77101. doi: 10.1191/1478088706qp063oa

    • Search Google Scholar
    • Export Citation
  • Burdon, M. and Douglas, H. (2017) The smart home could worsen domestic abuse. But the same technology may also make us safer, The Conversation, http://theconversation.com/the-smart-home-could-worsen-domestic-abuse-but-the-same-technology-may-also-make-us-safer-82897.

    • Search Google Scholar
    • Export Citation
  • Burton, S., Tanczer, L.M., Vasudevan, S. and Carr, M. (2021) The UK Code of Practice for Consumer IoT Cybersecurity: Where We Are and What Next, London: Department of Digital Culture, Media and Sport, The PETRAS National Centre of Excellence for IoT Systems Cybersecurity.

    • Search Google Scholar
    • Export Citation
  • Carr, M. and Tanczer, L.M. (2018) UK cybersecurity industrial policy: an analysis of drivers, market failures and interventions, Journal of Cyber Policy, 3(3): 43044. doi: 10.1080/23738871.2018.1550523

    • Search Google Scholar
    • Export Citation
  • Douglas, H., Harris, B.A. and Dragiewicz, M. (2019) Technology-facilitated domestic and family violence: women’s experiences, The British Journal of Criminology. 59(3): 55170. doi: 10.1093/bjc/azy068

    • Search Google Scholar
    • Export Citation
  • Dragiewicz, M., Burgess, J., Matamoros-Fernández, A., Salter, M., Suzor, N.P., Woodlock, D. and Harris, B. (2018) Technology facilitated coercive control: domestic violence and the competing roles of digital media platforms, Feminist Media Studies, 18(4): 60925. doi: 10.1080/14680777.2018.1447341

    • Search Google Scholar
    • Export Citation
  • Eckstein, J.J. (2020) What is violence now? A grounded theory approach to conceptualizing technology-mediated abuse (TMA) as spatial and participatory, The Electronic Journal of Communication 29(3-4). Retrieved from https://www.cios.org/getfile/0290344_EJC

    • Search Google Scholar
    • Export Citation
  • Freed, D., Palmer, J., Minchala, D., Levy, K., Ristenpart, T. and Dell, N. (2018) ‘A Stalker’s Paradise’: How Intimate Partner Abusers Exploit Technology, in Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI ’18, New York: Association for Computing Machinery (ACM), pp 113. doi: 10.1145/3173574.3174241

    • Search Google Scholar
    • Export Citation
  • Freed, D., Palmer, J., Minchala, D.E., Levy, K., Ristenpart, T. and Dell, N. (2017) Digital technologies and intimate partner violence: a qualitative analysis with multiple stakeholders, Proceedings of the Association for Computing Machinery (ACM) on Human-Computer Interaction. 1(CSCW): 122. doi: 10.1145/3134681

    • Search Google Scholar
    • Export Citation
  • Harbers, M., Bargh, M.S., Pool, R., Berkel, J.V., Braak, S.W.van den and Choenni, S. (2018) A Conceptual Framework for Addressing IoT Threats: Challenges in Meeting Challenges, in HICSS. Presented at the 51st Hawaii International Conference on System Sciences, AIS Electronic Library, Hilton Waikoloa Village, Hawaii, pp 221524. doi: 10.24251/hicss.2018.278

  • Harris, B.A. (2020) Technology and violence against women, in S. Walklate, K. Fitz-Gibbon, J. Maher and J. McCulloch (eds) The Emerald Handbook of Feminism, Criminology and Social Change, Emerald Studies in Criminology, Feminism and Social Change, Melbourne: Emerald Publishing Limited, pp 31736. doi: 10.1108/978-1-78769-955-720201026.

    • Search Google Scholar
    • Export Citation
  • Henry, N. and Powell, A. (2016) Sexual violence in the digital age: the scope and limits of criminal law, Social & Legal Studies, 25(4): 397418. doi: 10.1177/0964663915624273

    • Search Google Scholar
    • Export Citation
  • Janes, B., Crawford, H. and OConnor, T. (2020) Never ending story: authentication and access control design flaws in shared IoT devices, in IEEE Security and Privacy SafeThings Workshop, San Francisco, CA: Presented at the SafeThings 2020, IEEE, pp 6.

    • Search Google Scholar
    • Export Citation
  • Kelly, L. (1988) Surviving Sexual Violence, Cambridge: Polity Press.

  • Leitão, R. (2019) Anticipating Smart Home Security and Privacy Threats with Survivors of Intimate Partner Abuse, in Proceedings of the 2019 on Designing Interactive Systems Conference, DIS ’19. Presented at the DIS’19, Association for Computing Machinery (ACM), San Diego, CA, pp 52739. doi: 10.1145/3322276.3322366

    • Search Google Scholar
    • Export Citation
  • Lopez-Neira, I., Patel, T., Parkin, S., Danezis, G. and Tanczer, L.M. (2019) ‘Internet of Things’: how abuse is getting smarter, Safe – The Domestic Abuse Quarterly, 63: 226, https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3350615.

    • Search Google Scholar
    • Export Citation
  • Markwick, K., Bickerdike, A., Wilson‐Evered, E. and Zeleznikow, J. (2019) Technology and family violence in the context of post-separated parenting, Australian and New Zealand Journal of Family Therapy, 40(1): 14362. doi: 10.1002/anzf.1350

    • Search Google Scholar
    • Export Citation
  • Matthews, T., O’Leary, K., Turner, A., Sleeper, M., Woelfer, J.P., Shelton, M., Manthorne, C., Churchill, E.F. and Consolvo, S. (2017) Stories from survivors: privacy & security practices when coping with intimate partner abuse, in Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, CHI ’17, New York: Association for Computing Machinery (ACM), pp 2189201. doi: 10.1145/3025453.3025875

    • Search Google Scholar
    • Export Citation
  • Mayhew, J. and Jahankhani, H. (2020) Combating domestic abuse inflicted in smart societies, in H. Jahankhani, S. Kendzierskyj, N. Chelvachandran and J. Ibarra (eds) Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity, Advanced Sciences and Technologies for Security Applications, Cham: Springer International Publishing, pp 34773. doi: 10.1007/978-3-030-35746-7_16

    • Search Google Scholar
    • Export Citation
  • Messing, J., Bagwell-Gray, M., Brown, M.L., Kappas, A. and Durfee, A. (2020) Intersections of stalking and technology-based abuse: emerging definitions, conceptualization, and measurement, Journal of Family Violence, 35(7): 693704. doi: 10.1007/s10896-019-00114-7.

    • Search Google Scholar
    • Export Citation
  • O’Shea, B., Julian, R., Prichard, J. and Kelty, S. (2019) Challenges in Policing Cyberstalking: A Critique of the Stalking Risk Profile in the Context of Online Relationships, in Online Othering, Cham: Springer, pp 33153. https://link.springer.com/chapter/10.1007/978-3-030-12633-9_14

    • Search Google Scholar
    • Export Citation
  • Parkin, S., Patel, T., Lopez-Neira, I. and Tanczer, L.M. (2019) Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse, in Proceedings of the New Security Paradigms Workshop, NSPW ’19, San Carlos, Costa Rica: Association for Computing Machinery (ACM), pp 115. doi: 10.1145/3368860.3368861

    • Search Google Scholar
    • Export Citation
  • Powell, A. and Henry, N. (2019) Technology-facilitated sexual violence victimization: results from an online survey of Australian adults, Journal of Interpersonal Violence, 34(17): 363765. doi: 10.1177/0886260516672055

    • Search Google Scholar
    • Export Citation
  • Robinson, A.L., Myhill, A., Wire, J., Roberts, J. and Tilley, N. (2016) Risk-led Policing of Domestic Abuse and the DASH Risk Model, London: College of Policing.

    • Search Google Scholar
    • Export Citation
  • Rodríguez-Rodríguez, I., Rodríguez, J.V., Elizondo-Moreno, A., Heras-González, P. and Gentili, M. (2020) Towards a holistic ICT platform for protecting intimate partner violence survivors based on the IoT paradigm, Symmetry 12, 37. doi: 10.3390/sym12010037.

    • Search Google Scholar
    • Export Citation
  • Sambasivan, N., Ahmed, N., Batool, A., Bursztein, E., Churchill, E., Sanely Gaytan-Lugo, L., Mathews, T., Nemar, D., Thomas, K. and Consolvo, S. (2019) Toward Gender-Equitable Privacy and Security in South Asia, IEEE Security Privacy, 17(4): 717. doi: 10.1109/MSEC.2019.2912727

    • Search Google Scholar
    • Export Citation
  • Slupska, J. and Tanczer, L.M. (2021) Threat modeling intimate partner violence: tech abuse as a cybersecurity challenge in the Internet of Things, in J. Bailey, A. Flynn and N. Henry (eds) The Emerald International Handbook of Technology Facilitated Violence and Abuse, Bingley: Emerald Publishing Limited, pp 66388. doi: 10.1108/978-1-83982-848-520211049

    • Search Google Scholar
    • Export Citation
  • Slupska, J. (2019) Safe at home: towards a feminist critique of cybersecurity, St Antony’s International Review, 15: 83100.

  • Stark, E. (2007) Coercive Control: How Men Entrap Women in Personal Life, New York: Oxford University Press.

  • Stark, E. (2016) From domestic violence to coercive control in the United Kingdom, Domestic Violence Report, 21(2): 236.

  • Stark, E. and Hester, M. (2019) Coercive control: update and review, Violence Against Women, 25(1): 81104. doi: 10.1177/1077801218816191

    • Search Google Scholar
    • Export Citation
  • Sweet, P.L. (2019) The sociology of gaslighting, American Sociological Review, 84(5): 85175. doi: 10.1177/0003122419874843

  • Tanczer, L.M. (2021) Das internet der dinge: die auswirkungen »smarter« geräte auf häusliche Gewalt, in BFF (Bundesverband Frauenberatungsstellen und Frauennotruf) and N. Prasad (eds) Geschlechtsspezifische Gewalt in Zeiten der Digitalisierung: Formen und Interventionsstrategien, Berlin: transcript, pp 20525. doi: 10.14361/9783839452813.

    • Search Google Scholar
    • Export Citation
  • Tanczer, L.M. (2019) The government published its draft domestic abuse bill, but risks ignoring the growing threat of tech abuse, Medium, https://medium.com/policy-postings/the-government-published-its-draft-domestic-abuse-bill-but-risks-ignoring-the-growing-threat-of-368a6fb70a14.

    • Search Google Scholar
    • Export Citation
  • Tanczer, L.M., Blythe, J., Yahya, F., Brass, I., Elsden, M., Blackstock, J. and Carr, M. (2018a) Summary Literature Review of Industry Recommendations and International Developments on IoT Security, London: Department forDigital, Culture, Media and Sport (DCMS) and PETRAS IoT Hub, https://www.gov.uk/government/publications/summary-literature-review-on-iot-security.

    • Search Google Scholar
    • Export Citation
  • Tanczer, L.M., Lopez-Neira, I., Parkin, S., Patel, T. and Danezis, G. (2018b) Gender and IoT (G-IoT) Research Report: The Rise of the Internet of Things and Implications for Technology-facilitated Abuse, London: University College London, https://www.ucl.ac.uk/steapp/sites/steapp/files/giot-report.pdf.

    • Search Google Scholar
    • Export Citation
  • Tanczer, L.M., Brass, I., Elsden, M., Carr, M. and Blackstock, J. (2019a) The United Kingdom’s Emerging Internet of Things (IoT) Policy Landscape, Rewired: Cybersecurity Governance, Hoboken, New Jersey: Wiley, pp 3756, https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3385548.

    • Search Google Scholar
    • Export Citation
  • Tanczer, L.M., Patel, T., Parkin, S., Lopez-Neira, I. and Slupska, J. (2019b) Written Submission to the Online Harms White Paper Consultation, London: University College London, https://www.ucl.ac.uk/steapp/sites/steapp/files/online_harms_white_paper_consultation_response_giot_june_2019_final.pdf.

    • Search Google Scholar
    • Export Citation
  • UCL STEaPP (2018) UCL runs a digital security training event aimed at domestic abuse support services, UCL Department of Science, Technology, Engineering and Public Policy, https://www.ucl.ac.uk/steapp/news/2018/nov/ucl-runs-digital-security-training-event-aimed-domestic-abuse-support-services.

    • Search Google Scholar
    • Export Citation
  • UN Women (2020) Online and ICT-facilitated violence against women and girls during COVID-19, EVAW COVID-19 Briefs., New York: UN Women.

  • Walby, S. and Towers, J. (2018) Untangling the concept of coercive control: theorizing domestic violent crime, Criminology & Criminal Justice, 18(1): 728. doi: 10.1177/1748895817743541

    • Search Google Scholar
    • Export Citation
  • Women’s Aid (2020) Our Approach: Change that Lasts, Bristol: Women’s Aid Federation of England.

  • Woodlock, D. (2017) The abuse of technology in domestic violence and stalking, Violence Against Women, 23(5): 584602. doi: 10.1177/1077801216646277

    • Search Google Scholar
    • Export Citation
  • Yardley, E. (2020) Technology-facilitated domestic abuse in political economy: a new theoretical framework, Violence Against Women, 27(10): 147998. doi: 10.1177/1077801220947172

    • Search Google Scholar
    • Export Citation
Leonie Maria Tanczer University College London, UK

Search for other papers by Leonie Maria Tanczer in
Current site
Google Scholar
Close
,
Isabel López-Neira University College London, UK

Search for other papers by Isabel López-Neira in
Current site
Google Scholar
Close
, and
Simon Parkin Delft University of Technology, The Netherlands and previously University College London, UK

Search for other papers by Simon Parkin in
Current site
Google Scholar
Close

Content Metrics

May 2022 onwards Past Year Past 30 Days
Abstract Views 1140 771 57
Full Text Views 117 49 6
PDF Downloads 134 69 8

Altmetrics

Dimensions