Technology-facilitated abuse or ‘tech abuse’ in intimate partner violence (IPV) contexts describes the breadth of harms that can be enacted using digital systems and online tools. While the misappropriation of technologies in the context of IPV has been subject to prior research, a dedicated study on the United Kingdom’s IPV support sector has so far been missing. The present analysis summarises insights derived from semi-structured interviews with 34 UK voluntary and statutory sector representatives that were conducted over the course of two years (2018–2020). The analysis identifies four overarching themes that point out support services’ practices, concerns and challenges in relation to tech abuse, and specifically the Internet of Things (IoT). These themes include (a) technology-facilitated abuse, where interviewees outline their experiences and understanding of the concept of tech abuse; (b) IoT-enabled tech abuse, focusing on the changing dynamics of tech abuse due to the continuing rise of smart consumer products; (c) data, documentation and assessment, that directs our attention to the shortcomings of existing risk assessment and recording practices; and (d) training, support and assistance, in which participants point to the need for specialist support capabilities to be developed within and beyond existing services.
Alshehri, A., Salem, M.B. and Ding, L. (2020) Are smart home devices abandoning IPV victims?, arXiv:2008.06612 8.
Arief, B., Coopamootoo, K.P.L., Emms, M. and van Moorsel, A. (2014) Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse, in Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES ’14, New York: Association for Computing Machinery (ACM), pp 201–04. doi: 10.1145/2665943.2665965
Bellini, R., Forrest, S., Westmarland, N., Jackson, D. and Smeddinck, J.D. (2020) Choice-Point: Fostering Awareness and Choice with Perpetrators in Domestic Violence Interventions, in Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, Presented at the CHI ’20: CHI Conference on Human Factors in Computing Systems, Honolulu, HI: Association for Computing Machinery (ACM), pp 1–14. doi: 10.1145/3313831.3376386
Brass, I., Tanczer, L.M., Carr, M., Elsden, M. and Blackstock, J. (2018) Standardising a Moving Target: The Development and Evolution of IoT Security Standards, Presented at the Living in the Internet of Things: Cybersecurity of the IoT – 2018, IET [the Institution of Engineering and Technology], London. doi: 10.1049/cp.2018.0024
Braun, V. and Clarke, V. (2006) Using thematic analysis in psychology, Qualitative Research in Psychology, 3(2): 77–101. doi: 10.1191/1478088706qp063oa
Burdon, M. and Douglas, H. (2017) The smart home could worsen domestic abuse. But the same technology may also make us safer, The Conversation, http://theconversation.com/the-smart-home-could-worsen-domestic-abuse-but-the-same-technology-may-also-make-us-safer-82897.
Burton, S., Tanczer, L.M., Vasudevan, S. and Carr, M. (2021) The UK Code of Practice for Consumer IoT Cybersecurity: Where We Are and What Next, London: Department of Digital Culture, Media and Sport, The PETRAS National Centre of Excellence for IoT Systems Cybersecurity.
Carr, M. and Tanczer, L.M. (2018) UK cybersecurity industrial policy: an analysis of drivers, market failures and interventions, Journal of Cyber Policy, 3(3): 430–44. doi: 10.1080/23738871.2018.1550523
Douglas, H., Harris, B.A. and Dragiewicz, M. (2019) Technology-facilitated domestic and family violence: women’s experiences, The British Journal of Criminology. 59(3): 551–70. doi: 10.1093/bjc/azy068
Dragiewicz, M., Burgess, J., Matamoros-Fernández, A., Salter, M., Suzor, N.P., Woodlock, D. and Harris, B. (2018) Technology facilitated coercive control: domestic violence and the competing roles of digital media platforms, Feminist Media Studies, 18(4): 609–25. doi: 10.1080/14680777.2018.1447341
Eckstein, J.J. (2020) What is violence now? A grounded theory approach to conceptualizing technology-mediated abuse (TMA) as spatial and participatory, The Electronic Journal of Communication 29(3-4). Retrieved from https://www.cios.org/getfile/0290344_EJC
Freed, D., Palmer, J., Minchala, D., Levy, K., Ristenpart, T. and Dell, N. (2018) ‘A Stalker’s Paradise’: How Intimate Partner Abusers Exploit Technology, in Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI ’18, New York: Association for Computing Machinery (ACM), pp 1–13. doi: 10.1145/3173574.3174241
Freed, D., Palmer, J., Minchala, D.E., Levy, K., Ristenpart, T. and Dell, N. (2017) Digital technologies and intimate partner violence: a qualitative analysis with multiple stakeholders, Proceedings of the Association for Computing Machinery (ACM) on Human-Computer Interaction. 1(CSCW): 1–22. doi: 10.1145/3134681
Harbers, M., Bargh, M.S., Pool, R., Berkel, J.V., Braak, S.W.van den and Choenni, S. (2018) A Conceptual Framework for Addressing IoT Threats: Challenges in Meeting Challenges, in HICSS. Presented at the 51st Hawaii International Conference on System Sciences, AIS Electronic Library, Hilton Waikoloa Village, Hawaii, pp 2215–24. doi: 10.24251/hicss.2018.278
Harris, B.A. (2020) Technology and violence against women, in S. Walklate, K. Fitz-Gibbon, J. Maher and J. McCulloch (eds) The Emerald Handbook of Feminism, Criminology and Social Change, Emerald Studies in Criminology, Feminism and Social Change, Melbourne: Emerald Publishing Limited, pp 317–36. doi: 10.1108/978-1-78769-955-720201026.
Henry, N. and Powell, A. (2016) Sexual violence in the digital age: the scope and limits of criminal law, Social & Legal Studies, 25(4): 397–418. doi: 10.1177/0964663915624273
Janes, B., Crawford, H. and OConnor, T. (2020) Never ending story: authentication and access control design flaws in shared IoT devices, in IEEE Security and Privacy SafeThings Workshop, San Francisco, CA: Presented at the SafeThings 2020, IEEE, pp 6.
Kelly, L. (1988) Surviving Sexual Violence, Cambridge: Polity Press.
Leitão, R. (2019) Anticipating Smart Home Security and Privacy Threats with Survivors of Intimate Partner Abuse, in Proceedings of the 2019 on Designing Interactive Systems Conference, DIS ’19. Presented at the DIS’19, Association for Computing Machinery (ACM), San Diego, CA, pp 527–39. doi: 10.1145/3322276.3322366
Lopez-Neira, I., Patel, T., Parkin, S., Danezis, G. and Tanczer, L.M. (2019) ‘Internet of Things’: how abuse is getting smarter, Safe – The Domestic Abuse Quarterly, 63: 22–6, https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3350615.
Markwick, K., Bickerdike, A., Wilson‐Evered, E. and Zeleznikow, J. (2019) Technology and family violence in the context of post-separated parenting, Australian and New Zealand Journal of Family Therapy, 40(1): 143–62. doi: 10.1002/anzf.1350
Matthews, T., O’Leary, K., Turner, A., Sleeper, M., Woelfer, J.P., Shelton, M., Manthorne, C., Churchill, E.F. and Consolvo, S. (2017) Stories from survivors: privacy & security practices when coping with intimate partner abuse, in Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, CHI ’17, New York: Association for Computing Machinery (ACM), pp 2189–201. doi: 10.1145/3025453.3025875
Mayhew, J. and Jahankhani, H. (2020) Combating domestic abuse inflicted in smart societies, in H. Jahankhani, S. Kendzierskyj, N. Chelvachandran and J. Ibarra (eds) Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity, Advanced Sciences and Technologies for Security Applications, Cham: Springer International Publishing, pp 347–73. doi: 10.1007/978-3-030-35746-7_16
Messing, J., Bagwell-Gray, M., Brown, M.L., Kappas, A. and Durfee, A. (2020) Intersections of stalking and technology-based abuse: emerging definitions, conceptualization, and measurement, Journal of Family Violence, 35(7): 693–704. doi: 10.1007/s10896-019-00114-7.
O’Shea, B., Julian, R., Prichard, J. and Kelty, S. (2019) Challenges in Policing Cyberstalking: A Critique of the Stalking Risk Profile in the Context of Online Relationships, in Online Othering, Cham: Springer, pp 331–53. https://link.springer.com/chapter/10.1007/978-3-030-12633-9_14
Parkin, S., Patel, T., Lopez-Neira, I. and Tanczer, L.M. (2019) Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse, in Proceedings of the New Security Paradigms Workshop, NSPW ’19, San Carlos, Costa Rica: Association for Computing Machinery (ACM), pp 1–15. doi: 10.1145/3368860.3368861
Powell, A. and Henry, N. (2019) Technology-facilitated sexual violence victimization: results from an online survey of Australian adults, Journal of Interpersonal Violence, 34(17): 3637–65. doi: 10.1177/0886260516672055
Robinson, A.L., Myhill, A., Wire, J., Roberts, J. and Tilley, N. (2016) Risk-led Policing of Domestic Abuse and the DASH Risk Model, London: College of Policing.
Rodríguez-Rodríguez, I., Rodríguez, J.V., Elizondo-Moreno, A., Heras-González, P. and Gentili, M. (2020) Towards a holistic ICT platform for protecting intimate partner violence survivors based on the IoT paradigm, Symmetry 12, 37. doi: 10.3390/sym12010037.
Sambasivan, N., Ahmed, N., Batool, A., Bursztein, E., Churchill, E., Sanely Gaytan-Lugo, L., Mathews, T., Nemar, D., Thomas, K. and Consolvo, S. (2019) Toward Gender-Equitable Privacy and Security in South Asia, IEEE Security Privacy, 17(4): 71–7. doi: 10.1109/MSEC.2019.2912727
Slupska, J. and Tanczer, L.M. (2021) Threat modeling intimate partner violence: tech abuse as a cybersecurity challenge in the Internet of Things, in J. Bailey, A. Flynn and N. Henry (eds) The Emerald International Handbook of Technology Facilitated Violence and Abuse, Bingley: Emerald Publishing Limited, pp 663–88. doi: 10.1108/978-1-83982-848-520211049
Slupska, J. (2019) Safe at home: towards a feminist critique of cybersecurity, St Antony’s International Review, 15: 83–100.
Stark, E. (2007) Coercive Control: How Men Entrap Women in Personal Life, New York: Oxford University Press.
Stark, E. (2016) From domestic violence to coercive control in the United Kingdom, Domestic Violence Report, 21(2): 23–6.
Stark, E. and Hester, M. (2019) Coercive control: update and review, Violence Against Women, 25(1): 81–104. doi: 10.1177/1077801218816191
Sweet, P.L. (2019) The sociology of gaslighting, American Sociological Review, 84(5): 851–75. doi: 10.1177/0003122419874843
Tanczer, L.M. (2021) Das internet der dinge: die auswirkungen »smarter« geräte auf häusliche Gewalt, in BFF (Bundesverband Frauenberatungsstellen und Frauennotruf) and N. Prasad (eds) Geschlechtsspezifische Gewalt in Zeiten der Digitalisierung: Formen und Interventionsstrategien, Berlin: transcript, pp 205–25. doi: 10.14361/9783839452813.
Tanczer, L.M. (2019) The government published its draft domestic abuse bill, but risks ignoring the growing threat of tech abuse, Medium, https://medium.com/policy-postings/the-government-published-its-draft-domestic-abuse-bill-but-risks-ignoring-the-growing-threat-of-368a6fb70a14.
Tanczer, L.M., Blythe, J., Yahya, F., Brass, I., Elsden, M., Blackstock, J. and Carr, M. (2018a) Summary Literature Review of Industry Recommendations and International Developments on IoT Security, London: Department forDigital, Culture, Media and Sport (DCMS) and PETRAS IoT Hub, https://www.gov.uk/government/publications/summary-literature-review-on-iot-security.
Tanczer, L.M., Lopez-Neira, I., Parkin, S., Patel, T. and Danezis, G. (2018b) Gender and IoT (G-IoT) Research Report: The Rise of the Internet of Things and Implications for Technology-facilitated Abuse, London: University College London, https://www.ucl.ac.uk/steapp/sites/steapp/files/giot-report.pdf.
Tanczer, L.M., Brass, I., Elsden, M., Carr, M. and Blackstock, J. (2019a) The United Kingdom’s Emerging Internet of Things (IoT) Policy Landscape, Rewired: Cybersecurity Governance, Hoboken, New Jersey: Wiley, pp 37–56, https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3385548.
Tanczer, L.M., Patel, T., Parkin, S., Lopez-Neira, I. and Slupska, J. (2019b) Written Submission to the Online Harms White Paper Consultation, London: University College London, https://www.ucl.ac.uk/steapp/sites/steapp/files/online_harms_white_paper_consultation_response_giot_june_2019_final.pdf.
UCL STEaPP (2018) UCL runs a digital security training event aimed at domestic abuse support services, UCL Department of Science, Technology, Engineering and Public Policy, https://www.ucl.ac.uk/steapp/news/2018/nov/ucl-runs-digital-security-training-event-aimed-domestic-abuse-support-services.
UN Women (2020) Online and ICT-facilitated violence against women and girls during COVID-19, EVAW COVID-19 Briefs., New York: UN Women.
Walby, S. and Towers, J. (2018) Untangling the concept of coercive control: theorizing domestic violent crime, Criminology & Criminal Justice, 18(1): 7–28. doi: 10.1177/1748895817743541
Women’s Aid (2020) Our Approach: Change that Lasts, Bristol: Women’s Aid Federation of England.
Woodlock, D. (2017) The abuse of technology in domestic violence and stalking, Violence Against Women, 23(5): 584–602. doi: 10.1177/1077801216646277
Yardley, E. (2020) Technology-facilitated domestic abuse in political economy: a new theoretical framework, Violence Against Women, 27(10): 1479–98. doi: 10.1177/1077801220947172
May 2022 onwards | Past Year | Past 30 Days | |
---|---|---|---|
Abstract Views | 1140 | 771 | 57 |
Full Text Views | 117 | 49 | 6 |
PDF Downloads | 134 | 69 | 8 |