skip to main content
10.1145/3613905.3652036acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Work in Progress

A Critical Analysis of the Prevalence of Technology-Facilitated Abuse in US College Students

Authors Info & Claims
Published:11 May 2024Publication History

ABSTRACT

The ubiquitous use of technology by college students makes them vulnerable to harassment, harm, and intimidation via technological means. We evaluate the prevalence of such technology-facilitated abuse (TFA) among college students in the USA using a critical, feminist, and trauma-informed lens, which is essential to inform policymakers and advocates who support students. We surveyed 776 college students in a large R1 university located in the Midwest region of the USA to examine the prevalence of TFA faced by students marginalized by socio-economic factors, the support sought by student survivors, and the efficacy of support structures. Our findings indicate that 70% students experience TFA, but more than half of them do not seek support. Among the survivors who seek support, 93% students solely rely on informal resources like friends and family, and 6% solely seek support from formal networks such as survivor services or law enforcement. Therefore, we call on policymakers to direct attention to TFA, create tailored interventions to support marginalized students and propose campus-wide campaigns to spread awareness among college students.

Footnotes

  1. 1 The university has a White-dominated student population.

    Footnote
  2. 2 The survey is available at this link: https://drive.google.com/file/d/1p9_Kj9d_1Ahu28edyrg_OucDHFWA9b86/view

    Footnote
  3. 3 The university has a White-dominated student population.

    Footnote
  4. 4 Gender identity expressed as Non-binary, Two-spirit, Gender-Fluid and Gender-Nonconforming and Sexual Orientation expressed as Lesbian, Gay, Bisexual, Transgender, Queer, Asexual, Pansexual

    Footnote
Skip Supplemental Material Section

Supplemental Material

Video Preview

Video Preview

mp4

14.7 MB

3613905.3652036-talk-video.mp4

Talk Video

mp4

69.6 MB

References

  1. 2021. Statistics: National Statistics Domestic Violence Fact Sheet. https://ncadv.org/STATISTICS.Google ScholarGoogle Scholar
  2. Zainab Agha, Karla Badillo-Urquiola, and Pamela J. Wisniewski. 2023. "Strike at the Root": Co-designing Real-Time Social Media Interventions for Adolescent Online Risk Prevention. Proceedings of the ACM on Human-Computer Interaction 7, CSCW1 (April 2023), 1–32. https://doi.org/10/gtmcnzGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  3. Zainab Agha, Kelsey Miu, Sophia Piper, Jinkyung Park, and Pamela J. Wisniewski. 2023. Co-Designing User Personas and Risk Scenarios for Evaluating Adolescent Online Safety Interventions. In Companion Publication of the 2023 Conference on Computer Supported Cooperative Work and Social Computing(CSCW ’23 Companion). Association for Computing Machinery, New York, NY, USA, 249–253. https://doi.org/10/gtmcpcGoogle ScholarGoogle Scholar
  4. Tousif Ahmed, Roberto Hoyle, Kay Connelly, David Crandall, and Apu Kapadia. 2015. Privacy Concerns and Behaviors of People with Visual Impairments. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems(CHI ’15). Association for Computing Machinery, 3523–3532. https://doi.org/10/ghfpdrGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  5. Tousif Ahmed, Patrick Shaffer, Kay Connelly, David Crandall, and Apu Kapadia. 2016. Addressing Physical Safety, Security, and Privacy for People with Visual Impairments. 341–354. https://www.usenix.org/conference/soups2016/technical-sessions/presentation/ahmed (accessed 2023-09-11)Google ScholarGoogle Scholar
  6. Taslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, and Bryan Semaan. 2020. "I Am Uncomfortable Sharing What I Can’t See": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications. 1929–1948. https://www.usenix.org/conference/usenixsecurity20/presentation/akter (accessed 2023-09-11)Google ScholarGoogle Scholar
  7. J. Alemany, E. del Val, J. Alberola, and A. García-Fornes. 2019. Enhancing the Privacy Risk Awareness of Teenagers in Online Social Networks through Soft-Paternalism Mechanisms. International Journal of Human-Computer Studies 129 (Sept. 2019), 27–40. https://doi.org/10/gpbrvhGoogle ScholarGoogle Scholar
  8. Eileen M. Alexy, Ann W. Burgess, Timothy Baker, and Shirley A. Smoyak. 2005. Perceptions of Cyberstalking Among College Students. 5, 3 (08 2005), 279. https://doi.org/10/b2hn7wGoogle ScholarGoogle Scholar
  9. Majed Almansoori, Andrea Gallardo, Julio Poveda, Adil Ahmed, and Rahul Chatterjee. 2022. A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance. 2022, 4 (Oct. 2022), 120–139. https://doi.org/10/gsn96xGoogle ScholarGoogle ScholarCross RefCross Ref
  10. Donna L. Ansara and Michelle J. Hindin. 2010. Formal and Informal Help-Seeking Associated with Women’s and Men’s Experiences of Intimate Partner Violence in Canada. 70, 7 (April 2010), 1011–1018. https://doi.org/10/drwk3sGoogle ScholarGoogle Scholar
  11. Zahra Ashktorab and Jessica Vitak. 2016. Designing Cyberbullying Mitigation and Prevention Solutions through Participatory Design With Teenagers. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems(CHI ’16). Association for Computing Machinery, New York, NY, USA, 3895–3905. https://doi.org/10.1145/2858036.2858548Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Avast. 2020. 51% increase in the use of online spying and stalking apps during lockdown — prnewswire.com. https://www.prnewswire.com/news-releases/51-increase-in-the-use-of-online-spying-and-stalking-apps-during-lockdown-301090012.html. [Accessed 05-Oct-2022].Google ScholarGoogle Scholar
  13. Karla Badillo-Urquiola. 2020. A Social Ecological Approach to Empowering Foster Youth to Be Safer Online. In Companion Publication of the 2020 Conference on Computer Supported Cooperative Work and Social Computing(CSCW ’20 Companion). Association for Computing Machinery, New York, NY, USA, 75–79. https://doi.org/10.1145/3406865.3418365Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Karla Badillo-Urquiola, Xinru Page, and Pamela J. Wisniewski. 2019. Risk vs. Restriction: The Tension between Providing a Sense of Normalcy and Keeping Foster Teens Safe Online. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems(CHI ’19). Association for Computing Machinery, New York, NY, USA, 1–14. https://doi.org/10/ghdmbbGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  15. Karla Badillo-Urquiola, Zachary Shea, Zainab Agha, Irina Lediaeva, and Pamela Wisniewski. 2021. Conducting Risky Research with Teens: Co-designing for the Ethical Treatment and Protection of Adolescents. Proceedings of the ACM on Human-Computer Interaction 4, CSCW3 (Jan. 2021), 231:1–231:46. https://doi.org/10/gtmcn3Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Jane Bailey, Asher Flynn, and Nicola Henry. 2021. Pandemics and Systemic Discrimination: Technology-Facilitated Violence and Abuse in an Era of COVID-19 and Antiracist Protest. In The Emerald International Handbook of Technology Facilitated Violence and Abuse, Jane Bailey, Asher Flynn, and Nicola Henry (Eds.). Emerald Publishing Limited, 787–797. https://doi.org/10.1108/978-1-83982-848-520211057Google ScholarGoogle ScholarCross RefCross Ref
  17. Victoria L. Banyard, Katie M. Edwards, Elizabeth A. Moschella, and Katherine M. Seavey. 2019. “Everybody’s Really Close-Knit”: Disconnections Between Helping Victims of Intimate Partner Violence and More General Helping in Rural Communities. 25, 3 (03 2019), 337–358. https://doi.org/10/gnp9kvGoogle ScholarGoogle Scholar
  18. Chris Baraniuk. 2019. Stalkerware: The secret apps people use to spy on their partners — newscientist.com. https://www.newscientist.com/article/mg24432572-600-stalkerware-the-secret-apps-people-use-to-spy-on-their-partners/. [Accessed 05-Oct-2022].Google ScholarGoogle Scholar
  19. Betty Jo Barrett and Melissa St. Pierre. 2011. Variations in Women’s Help Seeking in Response to Intimate Partner Violence: Findings From a Canadian Population-Based Study. 17, 1 (Jan. 2011), 47–70. https://doi.org/10/b4ftqqGoogle ScholarGoogle Scholar
  20. Rosanna Bellini. 2023. Paying the Price: When Intimate Partners Use Technology for Financial Harm. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. ACM, 1–17. https://doi.org/10/gr8rpzGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  21. Rasika Bhalerao, Vaughn Hamilton, Allison McDonald, Elissa M. Redmiles, and Angelika Strohmayer. 2022. Ethical Practices for Security Research with At-Risk Populations. In 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). 546–553. https://doi.org/10.1109/EuroSPW55150.2022.00065Google ScholarGoogle ScholarCross RefCross Ref
  22. Katie Bishop. 2021. How ’Stalkerware’ Technology Made It Easy For My Abusive Ex To Spy On Me — refinery29.com. https://www.refinery29.com/en-gb/rise-of-stalkerware-tech. [Accessed 05-Oct-2022].Google ScholarGoogle Scholar
  23. Lindsay Blackwell, Jill Dimond, Sarita Schoenebeck, and Cliff Lampe. 2017. Classification and Its Consequences for Online Harassment: Design Insights from HeartMob. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (Dec. 2017), 24:1–24:19. https://doi.org/10/gqj8rqGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  24. Lindsay Blackwell, Jean Hardy, Tawfiq Ammari, Tiffany Veinot, Cliff Lampe, and Sarita Schoenebeck. 2016. LGBT Parents and Social Media: Advocacy, Privacy, and Disclosure during Shifting Social Movements. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems(CHI ’16). Association for Computing Machinery, 610–622. https://doi.org/10/grx6ccGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  25. Warren J Blumenfeld and R M Cooper. 2010. LGBT and Allied Youth Responses to Cyberbullying: Policy Implications. (2010).Google ScholarGoogle Scholar
  26. Leanne Bowler, Eleanor Mattern, and Cory Knobel. 2014. Developing Design Interventions for Cyberbullying: A Narrative-Based Participatory Approach. iConference 2014 Proceedings (March 2014). https://doi.org/10/gtmfk3Google ScholarGoogle Scholar
  27. Matthew J. Breiding, Kathleen C. Basile, Joanne Klevens, and Sharon G. Smith. 2017. Economic Insecurity and Intimate Partner and Sexual Violence Victimization. 53, 4 (Oct. 2017), 457–464. https://doi.org/10/gckhb7Google ScholarGoogle Scholar
  28. Lynn Brewer. 2018. Domestic Violence and the LGBTQ Community. https://ncadv.org/blog/posts/domestic-violence-and-the-lgbtq-community (accessed 2023-05-17)Google ScholarGoogle Scholar
  29. Cynthia Brown and Kelsey Hegarty. 2021. Development and Validation of the TAR Scale: A Measure of Technology-Facilitated Abuse in Relationships. 3 (Jan. 2021), 100059. https://doi.org/10/gshf3dGoogle ScholarGoogle Scholar
  30. Chay Brown, Mandy Yap, Annick Thomassin, Minda Murray, and Eunice Yu. 2021. “Can I Just Share My Story?” Experiences of Technology-Facilitated Abuse among Aboriginal and Torres Strait Islander Women in Regional and Remote Australia. 5, 2 (Oct. 2021). https://www.journalofglobalindigeneity.com/article/29716-can-i-just-share-my-story-experiences-of-technology-facilitated-abuse-among-aboriginal-and-torres-strait-islander-women-in-regional-and-remote-aust (accessed 2023-06-19)Google ScholarGoogle Scholar
  31. Megan Lindsay Brown, Judy Krysik, Walter LaMendola, Drishti Sinha, Lauren Reed, Megan Lindsay Brown, Judy Krysik, Walter LaMendola, Drishti Sinha, and Lauren Reed. 2020. Relationship Fluidity: The Changing Nature of Intimacy for Emerging Adult Women. https://www.igi-global.com/gateway/chapter/www.igi-global.com/gateway/chapter/241032 (accessed 2023-06-27)Google ScholarGoogle Scholar
  32. Sarah Jane Brubaker, Brittany Keegan, Xavier L. Guadalupe-Diaz, and Bre’Auna Beasley. 2017. Measuring and Reporting Campus Sexual Assault: Privilege and Exclusion in What We Know and What We Do. 11, 12 (Dec. 2017), e12543. https://doi.org/10/ggfjskGoogle ScholarGoogle Scholar
  33. Sloane C. Burke, Michele Wallen, Karen Vail-Smith, and David Knox. 2011. Using Technology to Control Intimate Partners: An Exploratory Study of College Undergraduates. 27, 3 (05 2011), 1162–1167. https://doi.org/10/fmrxh2Google ScholarGoogle Scholar
  34. Nancy Chi Cantalupo and William C. Kidder. 2016. Mapping the Title IX Iceberg: Sexual Harassment (Mostly) in Graduate School by College Faculty. 66, 4 (2016), 850–881. https://heinonline.org/HOL/P?h=hein.journals/jled66&i=857 (accessed 2023-09-04)Google ScholarGoogle Scholar
  35. Matthew Carrasco and Andruid Kerne. 2018. Queer Visibility: Supporting LGBT+ Selective Visibility on Social Media. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems(CHI ’18). Association for Computing Machinery, 1–12. https://doi.org/10/gmqk66Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. CDC. 2021. Fast facts: Preventing intimate partner violence. 19 (2021), 2022.Google ScholarGoogle Scholar
  37. Rose Ceccio, Sophie Stephenson, Danny Yuxing Huang, and Rahul Chatterjee. 2023. Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance. (2023).Google ScholarGoogle Scholar
  38. Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, and Thomas Ristenpart. 2018. The spyware used in intimate partner violence. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 441–458.Google ScholarGoogle ScholarCross RefCross Ref
  39. Janet X. Chen, Allison McDonald, Yixin Zou, Emily Tseng, Kevin A Roundy, Acar Tamersoy, Florian Schaub, Thomas Ristenpart, and Nicola Dell. 2022. Trauma-Informed Computing: Towards Safer Technology Experiences for All. In CHI Conference on Human Factors in Computing Systems. ACM, 1–20. https://doi.org/10.1145/3491102.3517475Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Ann L Coker, Keith E Davis, Ileana Arias, Sujata Desai, Maureen Sanderson, Heather M Brandt, and Paige H Smith. 2002. Physical and mental health effects of intimate partner violence for men and women. 23, 4 (2002), 260–268.Google ScholarGoogle Scholar
  41. Wendy Craig, Meyran Boniel-Nissim, Nathan King, Sophie D Walsh, Maartje Boer, Peter D Donnelly, Yossi Harel-Fisch, Marta Malinowska-Cieślik, Margarida Gaspar de Matos, Alina Cosma, 2020. Social media use and cyber-bullying: A cross-national analysis of young people in 42 countries. 66, 6 (2020), S100–S108.Google ScholarGoogle Scholar
  42. Kimberle Crenshaw. 1995. Mapping the margins. 3, 15 (1995), 357–383.Google ScholarGoogle Scholar
  43. Walter S. DeKeseredy, Martin D. Schwartz, James Nolan, Micholas Mastron, and Amanda Hall-Sanchez. 2019. Polyvictimization and the Continuum of Sexual Abuse at a College Campus: Does Negative Peer Support Increase the Likelihood of Multiple Victimizations. 59, 2 (2019), 276–295. https://doi.org/10/gshf25Google ScholarGoogle Scholar
  44. National Institute of Justice DOJ. 2023. Five Things About Violence Against American Indian and Alaska Native Women and Men. (2023).Google ScholarGoogle Scholar
  45. Nathalie Dougé, Erik B Lehman, and Jennifer S McCall-Hosenfeld. 2014. Social support and employment status modify the effect of intimate partner violence on depression symptom severity in women: results from the 2006 behavioral risk factor surveillance system survey. 24, 4 (2014), e425–e434.Google ScholarGoogle Scholar
  46. Suzie Dunn. 2021. Is It Actually Violence? Framing Technology-Facilitated Abuse as Violence. In The Emerald International Handbook of Technology-Facilitated Violence and Abuse, Jane Bailey, Asher Flynn, and Nicola Henry (Eds.). Emerald Publishing Limited, 25–45. https://doi.org/10.1108/978-1-83982-848-520211002Google ScholarGoogle ScholarCross RefCross Ref
  47. Brianna Dym, Jed R. Brubaker, Casey Fiesler, and Bryan Semaan. 2019. "Coming Out Okay": Community Narratives for LGBTQ Identity Recovery Work. 3 (Nov. 2019), 154:1–154:28. Issue CSCW. https://doi.org/10/gkdmf9Google ScholarGoogle Scholar
  48. Katie M Edwards, Christina M Dardis, and Christine A Gidycz. 2012. Women’s Disclosure of Dating Violence: A Mixed Methodological Study. 22, 4 (Nov. 2012), 507–517. https://doi.org/10/f4fc4wGoogle ScholarGoogle Scholar
  49. Marcus Felson and Lawrence E Cohen. 1980. Human ecology and crime: A routine activity approach. 8 (1980), 389–406.Google ScholarGoogle Scholar
  50. Bonnie S. Fisher, Francis T. Cullen, and Michael G. Turner. 2000. The Sexual Victimization of College Women. Research Report. https://eric.ed.gov/?id=ED449712 (accessed 2023-08-30)Google ScholarGoogle Scholar
  51. Diana Freed, Natalie N. Bazarova, Sunny Consolvo, Eunice J Han, Patrick Gage Kelley, Kurt Thomas, and Dan Cosley. 2023. Understanding Digital-Safety Experiences of Youth in the U.S.. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems(CHI ’23). Association for Computing Machinery, New York, NY, USA, 1–15. https://doi.org/10/gsw7s6Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, and Nicola Dell. 2019. " Is my phone hacked?" Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence. 3, CSCW (2019), 1–24.Google ScholarGoogle Scholar
  53. Diana Freed, Jackeline Palmer, Diana Elizabeth Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2017. Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders. 1, CSCW (Dec. 2017), 1–22. https://doi.org/10.1145/3134681Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Diana Freed, Jackeline Palmer, Diana Elizabeth Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2017. Digital technologies and intimate partner violence: A qualitative analysis with multiple stakeholders. 1, CSCW (2017), 1–22.Google ScholarGoogle Scholar
  55. FTC. 2021. How to Spot Extortion Scams on LGBTQ+ Dating Apps. https://consumer.ftc.gov/consumer-alerts/2021/09/how-spot-extortion-scams-lgbtq-dating-appsGoogle ScholarGoogle Scholar
  56. Maite Garaigordobil and Vanesa Martínez-Valderrey. 2015. Effects of Cyberprogram 2.0 on “Face-to-Face” Bullying, Cyberbullying, and Empathy. Psicothema27.1 (Feb. 2015), 45–51. https://doi.org/10/gfdcrdGoogle ScholarGoogle Scholar
  57. Christine Geeng, Mike Harris, Elissa Redmiles, and Franziska Roesner. 2022. "Like Lesbians Walking the Perimeter": Experiences of {U.S}. {LGBTQ+} Folks With Online Security, Safety, and Privacy Advice. 305–322. https://www.usenix.org/conference/usenixsecurity22/presentation/geeng (accessed 2023-02-08)Google ScholarGoogle Scholar
  58. David Geller. 2020. An Increase in ’Stalkerware’ is Posing Privacy Issues During COVID-19 — verisk.com. https://www.verisk.com/insurance/covid-19/iso-insights/an-increase-in-stalkerware-is-posing-privacy-issues-during-the-pandemic/. [Accessed 05-Oct-2022].Google ScholarGoogle Scholar
  59. Mélissa Godin. 2020. How Domestic Abusers Have Exploited Technology During the Pandemic — time.com. https://time.com/5922566/technology-domestic-abuse-coronavirus-pandemic/. [Accessed 05-Oct-2022].Google ScholarGoogle Scholar
  60. Oliver L. Haimson, Jed R. Brubaker, Lynn Dombrowski, and Gillian R. Hayes. 2015. Disclosure, Stress, and Support During Gender Transition on Facebook. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing(CSCW ’15). Association for Computing Machinery, 1176–1190. https://doi.org/10/gsnxrtGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  61. Bridget Harris and Delanie Woodlock. 2022. ‘You Can’t Actually Escape It’: Policing the Use of Technology in Domestic Violence in Rural Australia. 11, 1 (03 2022), 135–148. https://doi.org/10/gr8rn2Google ScholarGoogle Scholar
  62. Tirion Elizabeth Havard and Michelle Lefevre. 2020. Beyond the Power and Control Wheel: How Abusive Men Manipulate Mobile Phone Technologies to Facilitate Coercive Control. 4, 2 (06 2020), 223–239. https://doi.org/10/gnntq8Google ScholarGoogle Scholar
  63. Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2019. Clinical computer security for victims of intimate partner violence. In 28th { USENIX} Security Symposium ({ USENIX} Security 19). 105–122.Google ScholarGoogle Scholar
  64. Jennifer Hefner and Daniel Eisenberg. 2009. Social Support and Mental Health Among College Students. 79, 4 (2009), 491–499. https://doi.org/10/d5tdbcGoogle ScholarGoogle Scholar
  65. Nicola Henry, Asher Flynn, and Anastasia Powell. 2018. Policing Image-Based Sexual Abuse: Stakeholder Perspectives. 19, 6 (Nov. 2018), 565–581. https://doi.org/10/gn7zhhGoogle ScholarGoogle Scholar
  66. Nicola Henry, Asher Flynn, and Anastasia Powell. 2020. Technology-Facilitated Domestic and Sexual Violence: A Review. 26, 15-16 (Dec. 2020), 1828–1854. https://doi.org/10/ghstg9Google ScholarGoogle Scholar
  67. Nicola Henry, Clare McGlynn, Asher Flynn, Kelly Johnson, Anastasia Powell, and Adrian J. Scott. 2020. Image-Based Sexual Abuse: A Study on the Causes and Consequences of Non-consensual Nude or Sexual Imagery. Routledge.Google ScholarGoogle Scholar
  68. Nicola Henry and Anastasia Powell. 2018. Technology-Facilitated Sexual Violence: A Literature Review of Empirical Research. 19, 2 (04 2018), 195–208. https://doi.org/10/gddz8gGoogle ScholarGoogle Scholar
  69. Nicola Henry and Alice Witt. 2021. Governing Image-Based Sexual Abuse: Digital Platform Policies, Tools, and Practices. In The Emerald International Handbook of Technology-Facilitated Violence and Abuse, Jane Bailey, Asher Flynn, and Nicola Henry (Eds.). Emerald Publishing Limited, 749–768. https://doi.org/10.1108/978-1-83982-848-520211054Google ScholarGoogle ScholarCross RefCross Ref
  70. Rebecca L. Heron and Maarten C. Eisma. 2021. Barriers and Facilitators of Disclosing Domestic Violence to the Healthcare Service: A Systematic Review of Qualitative Research. 29, 3 (May 2021), 612–630. https://doi.org/10/gs9bccGoogle ScholarGoogle Scholar
  71. Jina Huh-Yoo, Afsaneh Razi, Diep N. Nguyen, Sampada Regmi, and Pamela J. Wisniewski. 2023. “Help Me:” Examining Youth’s Private Pleas for Support and the Responses Received from Peers via Instagram Direct Messages. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems(CHI ’23). Association for Computing Machinery, New York, NY, USA, 1–14. https://doi.org/10/gr6j4jGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  72. Min-Wei Hung, Chien Wen (Tina) Yuan, Nanyi Bi, Yi-Chao Chen, Wan-Chen Lee, Ming-Chyi Huang, and Chuang-Wen You. 2022. To Use or Abuse: Opportunities and Difficulties in the Use of Multi-channel Support to Reduce Technology Abuse by Adolescents. 6, CSCW1 (April 2022), 125:1–125:27. https://doi.org/10/gsjq7kGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  73. Naulsberry Jean Baptiste, Jinkyung Park, Neeraj Chatlani, Naima Samreen Ali, and Pamela J. Wisniewski. 2023. Teens on Tech: Using an Asynchronous Remote Community to Explore Adolescents’ Online Safety Perspectives. In Companion Publication of the 2023 Conference on Computer Supported Cooperative Work and Social Computing(CSCW ’23 Companion). Association for Computing Machinery, New York, NY, USA, 45–49. https://doi.org/10/gtmcpbGoogle ScholarGoogle Scholar
  74. Akiko Kamimura, Asha Parekh, and Lenora M Olson. 2013. Health indicators, social support, and intimate partner violence among women utilizing services at a community organization. 23, 3 (2013), e179–e185.Google ScholarGoogle Scholar
  75. Jonathan J. Kandell. 1998. Internet Addiction on Campus: The Vulnerability of College Students. 1, 1 (01 1998), 11–17. https://doi.org/10/db86jgGoogle ScholarGoogle Scholar
  76. Vanessa Kitzie. 2018. "I Pretended to Be a Boy on the Internet": Navigating Affordances and Constraints of Social Networking Sites and Search Engines for LGBTQ+ Identity Work. (07 2018). https://doi.org/10.5210/fm.v23i7.9264Google ScholarGoogle ScholarCross RefCross Ref
  77. L. B. Klein and Sandra L. Martin. 2021. Sexual Harassment of College and University Students: A Systematic Review. 22, 4 (Oct. 2021), 777–792. https://doi.org/10/gsn7g9Google ScholarGoogle Scholar
  78. Shanti Kulkarni. 2019. Intersectional Trauma-Informed Intimate Partner Violence (IPV) Services: Narrowing the Gap between IPV Service Delivery and Survivor Needs. 34, 1 (Jan. 2019), 55–64. https://doi.org/10.1007/s10896-018-0001-5Google ScholarGoogle ScholarCross RefCross Ref
  79. Roxanne Leitão. 2021. Technology-Facilitated Intimate Partner Abuse: a qualitative analysis of data from online domestic abuse forums. 36, 3 (2021), 203–242.Google ScholarGoogle Scholar
  80. Megan Lindsay and Judy Krysik. 2012. Online Harassment Among College Students. 15, 5 (06 2012), 703–719. https://doi.org/10/gndh2mGoogle ScholarGoogle Scholar
  81. Rebecca M. Loya. 2014. The Role of Sexual Violence in Creating and Maintaining Economic Insecurity Among Asset-Poor Women of Color. 20, 11 (Nov. 2014), 1299–1320. https://doi.org/10.1177/1077801214552912Google ScholarGoogle ScholarCross RefCross Ref
  82. Jeneile Luebke, Peninnah Kako, Alexa Lopez, Marin Schmitt, Anne Dressel, Kathryn Klein, and Lucy Mkandawire-Vahlmu. 2022. Barriers Faced by American Indian Women in Urban Wisconsin in Seeking Help Following an Experience of Intimate Partner Violence. (Oct. 2022), 10778012221132304. https://doi.org/10/gsc3hkGoogle ScholarGoogle Scholar
  83. Minna Lyons and Gayle Brewer. 2022. Experiences of Intimate Partner Violence during Lockdown and the COVID-19 Pandemic. 37, 6 (Aug. 2022), 969–977. https://doi.org/10.1007/s10896-021-00260-xGoogle ScholarGoogle ScholarCross RefCross Ref
  84. Regan L Mandryk, Julian Frommel, Nitesh Goyal, Guo Freeman, Cliff Lampe, Sarah Vieweg, and Donghee Yvette Wohn. 2023. Combating Toxicity, Harassment, and Abuse in Online Social Spaces: A Workshop at CHI 2023. In Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems(CHI EA ’23). Association for Computing Machinery, 1–7. https://doi.org/10/gsnxtcGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  85. Alison Marganski and Lisa Melander. 2018. Intimate partner violence victimization in the cyber and real world: Examining the extent of cyber aggression experiences and its association with in-person dating violence. 33, 7 (2018), 1071–1095.Google ScholarGoogle Scholar
  86. Alison Marganski and Lisa Melander. 2018. Intimate Partner Violence Victimization in the Cyber and Real World: Examining the Extent of Cyber Aggression Experiences and Its Association With In-Person Dating Violence. 33, 7 (04 2018), 1071–1095. https://doi.org/10/gdd2qxGoogle ScholarGoogle Scholar
  87. Hiroaki Masaki, Kengo Shibata, Shui Hoshino, Takahiro Ishihama, Nagayuki Saito, and Koji Yatani. 2020. Exploring Nudge Designs to Help Adolescent SNS Users Avoid Privacy and Safety Threats. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems(CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–11. https://doi.org/10/gkcx3sGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  88. Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F Churchill, and Sunny Consolvo. 2017. Stories from survivors: Privacy & security practices when coping with intimate partner abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 2189–2201.Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, and Sunny Consolvo. 2017. Stories from Survivors: Privacy & Security Practices When Coping with Intimate Partner Abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 2189–2201. https://doi.org/10/gr8rpqGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  90. Travis Mayberry, Erik-Oliver Blass, and Ellis Fenske. 2023. Blind My - An Improved Cryptographic Protocol to Prevent Stalking in Apple’s Find My Network. 2023, 1 (01 2023), 85–97. https://doi.org/10/gr8rpxGoogle ScholarGoogle Scholar
  91. Nora McDonald, Karla Badillo-Urquiola, Morgan G. Ames, Nicola Dell, Elizabeth Keneski, Manya Sleeper, and Pamela J. Wisniewski. 2020. Privacy and Power: Acknowledging the Importance of Privacy Research and Design for Vulnerable Populations. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems(CHI EA ’20). Association for Computing Machinery, New York, NY, USA, 1–8. https://doi.org/10/gsptbzGoogle ScholarGoogle Scholar
  92. Nora McDonald and Andrea Forte. 2020. The Politics of Privacy Theories: Moving from Norms to Vulnerabilities. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems(CHI ’20). Association for Computing Machinery, 1–14. https://doi.org/10.1145/3313831.3376167Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. Sarah McMahon and Kate Stepleton. 2018. Undergraduate Exposure to Messages About Campus Sexual Assault: Awareness of Campus Resources. 59, 1 (2018), 110–115. https://doi.org/10/ggfjrmGoogle ScholarGoogle Scholar
  94. Lisa A Melander. 2010. College Students’ Perceptions of Intimate Partner Cyber Harassment. (2010).Google ScholarGoogle Scholar
  95. Terance D Miethe and Robert Frank Meier. 1994. Crime and its social context: Toward an integrated theory of offenders, victims, and situations. Suny Press.Google ScholarGoogle Scholar
  96. Monica N. Modi, Sheallah Palmer, and Alicia Armstrong. 2014. The Role of Violence Against Women Act in Addressing Intimate Partner Violence: A Public Health Issue. 23, 3 (03 2014), 253–259. https://doi.org/10/f54nz5Google ScholarGoogle Scholar
  97. Phoebe Moh, Pubali Datta, Noel Warford, Adam Bates, Nathan Malkin, and Michelle L. Mazurek. 2023. Characterizing Everyday Misuse of Smart Home Devices. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE, 2835–2849. https://doi.org/10/gsnqv9Google ScholarGoogle Scholar
  98. Michelle L. Munro-Kramer, Alexandra C. Dulin, and Caroline Gaither. 2017. What Survivors Want: Understanding the Needs of Sexual Assault Survivors. 65, 5 (2017), 297–305. https://doi.org/10.1080/07448481.2017.1312409Google ScholarGoogle ScholarCross RefCross Ref
  99. Jordana N Navarro and Jana L Jasinski. 2013. Why girls? Using routine activities theory to predict cyberbullying experiences between girls and boys. 23, 4 (2013), 286–303.Google ScholarGoogle Scholar
  100. Borke Obada-Obieh, Yue Huang, Lucrezia Spagnolo, and Konstantin Beznosov. 2022. SoK: The Dual Nature of Technology in Sexual Abuse. In 2022 IEEE Symposium on Security and Privacy (SP). 2320–2343. https://doi.org/10.1109/SP46214.2022.9833663Google ScholarGoogle ScholarCross RefCross Ref
  101. Charlie Osborne. 2021. There’s been a rise in stalkerware. And the tech abuse problem goes beyond smartphones — zdnet.com. https://www.zdnet.com/article/theres-been-a-rise-in-stalkerware-and-the-tech-abuse-problem-goes-beyond-smartphones/. [Accessed 05-Oct-2022].Google ScholarGoogle Scholar
  102. Ellen Pence and Michael Paymar. 1993. Education groups for men who batter: The Duluth model. Springer Publishing Company.Google ScholarGoogle Scholar
  103. Justin Petelka, Lucy Van Kleunen, Liam Albright, Elizabeth Murnane, Stephen Voida, and Jaime Snyder. 2020. Being (In)Visible: Privacy, Transparency, and Disclosure in the Self-Management of Bipolar Disorder. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems(CHI ’20). Association for Computing Machinery, 1–14. https://doi.org/10/gsqgrrGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  104. Anthony T. Pinter, Morgan Klaus Scheuerman, and Jed R. Brubaker. 2021. Entering Doors, Evading Traps: Benefits and Risks of Visibility During Transgender Coming Outs. 4 (01 2021), 272:1–272:27. Issue CSCW3. https://doi.org/10/gsnt2zGoogle ScholarGoogle Scholar
  105. John R. Porter, Kiley Sobel, Sarah E. Fox, Cynthia L. Bennett, and Julie A. Kientz. 2017. Filtered Out: Disability Disclosure Practices in Online Dating Communities. 1 (Dec. 2017), 1–13. Issue CSCW. https://doi.org/10/gfgx4kGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  106. Anastasia Powell and Nicola Henry. 2019. Technology-Facilitated Sexual Violence Victimization: Results From an Online Survey of Australian Adults. 34, 17 (09 2019), 3637–3665. https://doi.org/10/gfttwzGoogle ScholarGoogle Scholar
  107. Anastasia Powell, Adrian Scott, Asher Flynn, and Nicola Henry. 2020. Image-Based Sexual Abuse: An International Study of Victims and Perpetrators. https://doi.org/10.13140/RG.2.2.35166.59209Google ScholarGoogle ScholarCross RefCross Ref
  108. Afsaneh Razi, Karla Badillo-Urquiola, and Pamela J. Wisniewski. 2020. Let’s Talk about Sext: How Adolescents Seek Support and Advice about Their Online Sexual Experiences. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems(CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–13. https://doi.org/10/gtmcn6Google ScholarGoogle ScholarDigital LibraryDigital Library
  109. Lauren A. Reed, Richard M. Tolman, and L. Monique Ward. 2016. Snooping and Sexting: Digital Media as a Context for Dating Aggression and Abuse Among College Students. 22, 13 (Nov. 2016), 1556–1576. https://doi.org/10/f875j7Google ScholarGoogle ScholarCross RefCross Ref
  110. Eduardo Reis, Carla Moleiro, and Patrícia Arriaga. 2023. Intimate Partner Violence Directed at Men: Experiences of Violence, Help-seeking, and Potential Gender Role Conflict Among Portuguese Men. (2023), 1–20.Google ScholarGoogle Scholar
  111. Stuart Roe. 2017. “Family Support Would Have Been Like Amazing”: LGBTQ Youth Experiences With Parental and Family Support. 25, 1 (Jan. 2017), 55–62. https://doi.org/10/gmhgrmGoogle ScholarGoogle Scholar
  112. Michaela M. Rogers, Colleen Fisher, Parveen Ali, Peter Allmark, and Lisa Fontes. 2022. Technology-Facilitated Abuse in Intimate Relationships: A Scoping Review. (05 2022), 152483802210902. https://doi.org/10/gr8rnwGoogle ScholarGoogle Scholar
  113. Wendy Roldan, Karla Badillo-Urquiola, Kiley Sobel, Kung Jin Lee, Pamela J. Wisniewski, June Ahn, Tamara Clegg, and Jason Yip. 2021. Justice-Centered Design Engagements with Children and Teens: What’s at Stake, the Actions We Take, and the Commitments We Make. In Proceedings of the 20th Annual ACM Interaction Design and Children Conference(IDC ’21). Association for Computing Machinery, New York, NY, USA, 666–669. https://doi.org/10.1145/3459990.3460515Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. Jody M. Ross, Michelle Drouin, and Amanda Coupe. 2019. Sexting Coercion as a Component of Intimate Partner Polyvictimization. 34, 11 (06 2019), 2269–2291. https://doi.org/10/gr8rpgGoogle ScholarGoogle Scholar
  115. Jody M Ross, Michelle Drouin, and Amanda Coupe. 2019. Sexting coercion as a component of intimate partner polyvictimization. 34, 11 (2019), 2269–2291.Google ScholarGoogle Scholar
  116. Kevin A Roundy, Paula Barmaimon Mendelberg, Nicola Dell, Damon McCoy, Daniel Nissani, Thomas Ristenpart, and Acar Tamersoy. 2020. The many kinds of creepware used for interpersonal attacks. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 626–643.Google ScholarGoogle ScholarCross RefCross Ref
  117. Nithya Sambasivan, Amna Batool, Nova Ahmed, Tara Matthews, Kurt Thomas, Laura Sanely Gaytán-Lugo, David Nemer, Elie Bursztein, Elizabeth Churchill, and Sunny Consolvo. 2019. "They Don’t Leave Us Alone Anywhere We Go": Gender and Digital Abuse in South Asia. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems(CHI ’19). Association for Computing Machinery, 1–14. https://doi.org/10.1145/3290605.3300232Google ScholarGoogle ScholarDigital LibraryDigital Library
  118. Ari Schlesinger, W. Keith Edwards, and Rebecca E. Grinter. 2017. Intersectional HCI: Engaging Identity through Gender, Race, and Class. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 5412–5427. https://doi.org/10/cggwGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  119. Ellen Simpson and Bryan Semaan. 2021. For You, or For"You"? Everyday LGBTQ+ Encounters with TikTok. 4 (01 2021), 252:1–252:34. Issue CSCW3. https://doi.org/10/gsnxrmGoogle ScholarGoogle Scholar
  120. Julia Slupska. 2019. Safe at Home: Towards a Feminist Critique of Cybersecurity. https://www.semanticscholar.org/paper/Safe-at-Home%3A-Towards-a-Feminist-Critique-of-Slupska/bf6752dcbe067f3efa9f90f021f770ba70811077 (accessed 2023-02-15)Google ScholarGoogle Scholar
  121. Julia Slupska and Megan Lindsay Brown. 2022. Aiding Intimate Violence Survivors in Lockdown: Lessons about Digital Security in the Covid-19 Pandemic. In Extended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems(CHI EA ’22). Association for Computing Machinery, 1–5. https://doi.org/10.1145/3491101.3503548Google ScholarGoogle ScholarDigital LibraryDigital Library
  122. Julia Slupska, Scarlet Dawson Dawson Duckworth, Linda Ma, and Gina Neff. 2021. Participatory Threat Modelling: Exploring Paths to Reconfigure Cybersecurity. In Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems(CHI EA ’21). Association for Computing Machinery, 1–6. https://doi.org/10.1145/3411763.3451731Google ScholarGoogle ScholarDigital LibraryDigital Library
  123. Julia Slupska and Angelika Strohmayer. 2022. Networks of Care: Tech Abuse Advocates’ Digital Security Practices. In 31st USENIX Security Symposium (USENIX Security 22). 341–358.Google ScholarGoogle Scholar
  124. Natalie J Sokoloff and Ida Dupont. 2005. Domestic violence at the intersections of race, class, and gender: Challenges and contributions to understanding violence against marginalized women in diverse communities. 11, 1 (2005), 38–64.Google ScholarGoogle ScholarCross RefCross Ref
  125. Marie Louise Juul Søndergaard, Gopinaath Kannabiran, Simran Chopra, Nadia Campo Woytuk, Dilrukshi Gamage, Ebtisam Alabdulqader, Heather McKinnon, Heike Winschiers-Theophilus, and Shaowen Bardzell. 2022. Feminist Voices about Ecological Issues in HCI. In Extended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems(CHI EA ’22). Association for Computing Machinery, 1–7. https://doi.org/10/grr5j6Google ScholarGoogle ScholarDigital LibraryDigital Library
  126. Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, and Rahul Chatterjee. 2023. “It’s the Equivalent of Feeling Like You’re in Jail”: Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse. (2023).Google ScholarGoogle Scholar
  127. Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, and Rahul Chatterjee. 2023. Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse. (2023).Google ScholarGoogle Scholar
  128. Kateryna M Sylaska and Katie M Edwards. 2014. Disclosure of intimate partner violence to informal social support network members: A review of the literature. 15, 1 (2014), 3–21.Google ScholarGoogle ScholarCross RefCross Ref
  129. NNEDV TechSafety. [n. d.]. DocuSAFE Documentation and Evidence Collection App. https://www.techsafety.org/docusafeGoogle ScholarGoogle Scholar
  130. Kurt Thomas, Devdatta Akhawe, Michael Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, and Gianluca Stringhini. 2021. SoK: Hate, Harassment, and the Changing Landscape of Online Abuse. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 247–267. https://doi.org/10.1109/SP40001.2021.00028Google ScholarGoogle ScholarCross RefCross Ref
  131. Kristen Thomasen and Suzie Dunn. 2021. Reasonable Expectations of Privacy in an Era of Drones and Deepfakes: Expanding the Supreme Court of Canada’s Decision in RvJarvis. In The Emerald International Handbook of Technology-Facilitated Violence and Abuse, Jane Bailey, Asher Flynn, and Nicola Henry (Eds.). Emerald Publishing Limited, 555–576. https://doi.org/10.1108/978-1-83982-848-520211040Google ScholarGoogle ScholarCross RefCross Ref
  132. Joe Tidy. 2019. Stalkerware: The software that spies on your partner — bbc.com. https://www.bbc.com/news/technology-50166147. [Accessed 05-Oct-2022].Google ScholarGoogle Scholar
  133. Emily Tseng, Diana Freed, Kristen Engel, Thomas Ristenpart, and Nicola Dell. 2021. A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. ACM, 1–17. https://doi.org/10.1145/3411764.3445589Google ScholarGoogle ScholarDigital LibraryDigital Library
  134. Emily Tseng, Diana Freed, Kristen Engel, Thomas Ristenpart, and Nicola Dell. 2021. A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19. 18, 22 (2021), 28–29.Google ScholarGoogle Scholar
  135. Emily Tseng, Mehrnaz Sabet, Rosanna Bellini, Harkiran Kaur Sodhi, Thomas Ristenpart, and Nicola Dell. 2022. Care Infrastructures for Digital Security in Intimate Partner Violence. In CHI Conference on Human Factors in Computing Systems. ACM, 1–20. https://doi.org/10.1145/3491102.3502038Google ScholarGoogle ScholarDigital LibraryDigital Library
  136. Kim Usher, Navjot Bhullar, Joanne Durkin, Naomi Gyamfi, and Debra Jackson. 2020. Family Violence and COVID-19: Increased Vulnerability and Reduced Options for Support. 29, 4 (Aug. 2020), 549–552. https://doi.org/10.1111/inm.12735Google ScholarGoogle ScholarCross RefCross Ref
  137. Judy A Van Wyk, Michael L Benson, Greer Litton Fox, and Alfred DeMaris. 2003. Detangling individual-, partner-, and community-level correlates of partner violence. 49, 3 (2003), 412–438.Google ScholarGoogle Scholar
  138. Joseph C. Von Nessen and Erin Schubert. 2022. The Economic Impact of Domestic Violence In Milwaukee & Wisconsin 2021. https://static1.squarespace.com/static/5d39f654dfc553000198b222/t/6345b7f7fc2276703a2bf19d/1665513464758/Economic+Impact+of+DV+FINAL.+10.11.2022.pdf (accessed 2023-05-16)Google ScholarGoogle Scholar
  139. Rachel J. Voth Schrag, Kristen E. Ravi, and Sarah R. Robinson. 2020. The Role of Social Support in the Link Between Economic Abuse and Economic Hardship. 35, 1 (Jan. 2020), 85–93. https://doi.org/10.1007/s10896-018-0019-8Google ScholarGoogle ScholarCross RefCross Ref
  140. Ari Ezra Waldman. 2021. Navigating Privacy on Gay-Oriented Mobile Dating Applications *. In The Emerald International Handbook of Technology-Facilitated Violence and Abuse, Jane Bailey, Asher Flynn, and Nicola Henry (Eds.). Emerald Publishing Limited, 369–381. https://doi.org/10.1108/978-1-83982-848-520211027Google ScholarGoogle ScholarCross RefCross Ref
  141. Ruolin Wang, Chun Yu, Xing-Dong Yang, Weijie He, and Yuanchun Shi. 2019. EarTouch: Facilitating Smartphone Use for Visually Impaired People in Mobile and Public Scenarios. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems(CHI ’19). Association for Computing Machinery, 1–13. https://doi.org/10/ghmkqsGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  142. Noel Warford, Tara Matthews, Kaitlyn Yang, Omer Akgul, Sunny Consolvo, Patrick Gage Kelley, Nathan Malkin, Michelle L. Mazurek, Manya Sleeper, and Kurt Thomas. 2022. SoK: A Framework for Unifying At-Risk User Research. In 2022 IEEE Symposium on Security and Privacy (SP). 2344–2360. https://doi.org/10/gr8rp5Google ScholarGoogle Scholar
  143. Emily A. Waterman, Emily R. Dworkin, Christina M. Dardis, Sarah E. Ullman, Katie M. Edwards, and Lindsey M. Rodriguez. 2021. Exploring the Association between Anticipated and Actual Responses to Disclosures of Intimate Partner Violence and Sexual Assault. 38, 4 (April 2021), 1131–1151. https://doi.org/10/gs9bcbGoogle ScholarGoogle Scholar
  144. Jennifer M. Watson, Michele Cascardi, Sarah Avery-Leaf, and K. Daniel O’Leary. 2001. High School Students’ Responses to Dating Aggression. 16, 3 (Jan. 2001), 339–348. https://doi.org/10/gs9bb9Google ScholarGoogle Scholar
  145. Leila Wood, Rachel Voth Schrag, Dixie Hairston, and Cynthia Jones. 2021. Exploring Advocacy Practices for Interpersonal Violence Survivors on College Campuses: Approaches and Key Factors.11, 1 (01 2021), 28–39. https://doi.org/10/gmvf9xGoogle ScholarGoogle Scholar
  146. Delanie Woodlock. 2017. The Abuse of Technology in Domestic Violence and Stalking. 23, 5 (April 2017), 584–602. https://doi.org/10.1177/1077801216646277Google ScholarGoogle ScholarCross RefCross Ref
  147. Delanie Woodlock and Bridget Harris. 2022. ‘You Have to Be Really Careful’: Technology and the Abuse of Women with Intellectual and Cognitive Disabilities. (08 2022), 1–21. https://doi.org/10/gscxq6Google ScholarGoogle Scholar
  148. Delanie Woodlock, Michael Salter, Molly Dragiewicz, and Bridget Harris. 2023. “Living in the Darkness”: Technology-Facilitated Coercive Control, Disenfranchised Grief, and Institutional Betrayal. 29, 5 (04 2023), 987–1004. https://doi.org/10/gscxq7Google ScholarGoogle Scholar
  149. Emily M Wright. 2015. The relationship between social support and intimate partner violence in neighborhood context. 61, 10 (2015), 1333–1359.Google ScholarGoogle Scholar
  150. Michelle Ybarra, Myeshia Price-Feeney, Amanda Lenhart, and Kathryn Zickuhr. 2017. Intimate Partner Digital Abuse. (2017).Google ScholarGoogle Scholar
  151. G. D. Zimet, S. S. Powell, G. K. Farley, S. Werkman, and K. A. Berkoff. 1990. Psychometric Characteristics of the Multidimensional Scale of Perceived Social Support. 55, 3-4 (1990), 610–617. https://doi.org/10/bjdp5qGoogle ScholarGoogle Scholar

Index Terms

  1. A Critical Analysis of the Prevalence of Technology-Facilitated Abuse in US College Students

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Article Metrics

          • Downloads (Last 12 months)122
          • Downloads (Last 6 weeks)122

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        View Full Text

        HTML Format

        View this article in HTML Format .

        View HTML Format