ABSTRACT
The ubiquitous use of technology by college students makes them vulnerable to harassment, harm, and intimidation via technological means. We evaluate the prevalence of such technology-facilitated abuse (TFA) among college students in the USA using a critical, feminist, and trauma-informed lens, which is essential to inform policymakers and advocates who support students. We surveyed 776 college students in a large R1 university located in the Midwest region of the USA to examine the prevalence of TFA faced by students marginalized by socio-economic factors, the support sought by student survivors, and the efficacy of support structures. Our findings indicate that 70% students experience TFA, but more than half of them do not seek support. Among the survivors who seek support, 93% students solely rely on informal resources like friends and family, and 6% solely seek support from formal networks such as survivor services or law enforcement. Therefore, we call on policymakers to direct attention to TFA, create tailored interventions to support marginalized students and propose campus-wide campaigns to spread awareness among college students.
Footnotes
1 The university has a White-dominated student population.
Footnote2 The survey is available at this link: https://drive.google.com/file/d/1p9_Kj9d_1Ahu28edyrg_OucDHFWA9b86/view
Footnote3 The university has a White-dominated student population.
Footnote4 Gender identity expressed as Non-binary, Two-spirit, Gender-Fluid and Gender-Nonconforming and Sexual Orientation expressed as Lesbian, Gay, Bisexual, Transgender, Queer, Asexual, Pansexual
Footnote
Supplemental Material
Available for Download
- 2021. Statistics: National Statistics Domestic Violence Fact Sheet. https://ncadv.org/STATISTICS.Google Scholar
- Zainab Agha, Karla Badillo-Urquiola, and Pamela J. Wisniewski. 2023. "Strike at the Root": Co-designing Real-Time Social Media Interventions for Adolescent Online Risk Prevention. Proceedings of the ACM on Human-Computer Interaction 7, CSCW1 (April 2023), 1–32. https://doi.org/10/gtmcnzGoogle ScholarDigital Library
- Zainab Agha, Kelsey Miu, Sophia Piper, Jinkyung Park, and Pamela J. Wisniewski. 2023. Co-Designing User Personas and Risk Scenarios for Evaluating Adolescent Online Safety Interventions. In Companion Publication of the 2023 Conference on Computer Supported Cooperative Work and Social Computing(CSCW ’23 Companion). Association for Computing Machinery, New York, NY, USA, 249–253. https://doi.org/10/gtmcpcGoogle Scholar
- Tousif Ahmed, Roberto Hoyle, Kay Connelly, David Crandall, and Apu Kapadia. 2015. Privacy Concerns and Behaviors of People with Visual Impairments. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems(CHI ’15). Association for Computing Machinery, 3523–3532. https://doi.org/10/ghfpdrGoogle ScholarDigital Library
- Tousif Ahmed, Patrick Shaffer, Kay Connelly, David Crandall, and Apu Kapadia. 2016. Addressing Physical Safety, Security, and Privacy for People with Visual Impairments. 341–354. https://www.usenix.org/conference/soups2016/technical-sessions/presentation/ahmed (accessed 2023-09-11)Google Scholar
- Taslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, and Bryan Semaan. 2020. "I Am Uncomfortable Sharing What I Can’t See": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications. 1929–1948. https://www.usenix.org/conference/usenixsecurity20/presentation/akter (accessed 2023-09-11)Google Scholar
- J. Alemany, E. del Val, J. Alberola, and A. García-Fornes. 2019. Enhancing the Privacy Risk Awareness of Teenagers in Online Social Networks through Soft-Paternalism Mechanisms. International Journal of Human-Computer Studies 129 (Sept. 2019), 27–40. https://doi.org/10/gpbrvhGoogle Scholar
- Eileen M. Alexy, Ann W. Burgess, Timothy Baker, and Shirley A. Smoyak. 2005. Perceptions of Cyberstalking Among College Students. 5, 3 (08 2005), 279. https://doi.org/10/b2hn7wGoogle Scholar
- Majed Almansoori, Andrea Gallardo, Julio Poveda, Adil Ahmed, and Rahul Chatterjee. 2022. A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance. 2022, 4 (Oct. 2022), 120–139. https://doi.org/10/gsn96xGoogle ScholarCross Ref
- Donna L. Ansara and Michelle J. Hindin. 2010. Formal and Informal Help-Seeking Associated with Women’s and Men’s Experiences of Intimate Partner Violence in Canada. 70, 7 (April 2010), 1011–1018. https://doi.org/10/drwk3sGoogle Scholar
- Zahra Ashktorab and Jessica Vitak. 2016. Designing Cyberbullying Mitigation and Prevention Solutions through Participatory Design With Teenagers. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems(CHI ’16). Association for Computing Machinery, New York, NY, USA, 3895–3905. https://doi.org/10.1145/2858036.2858548Google ScholarDigital Library
- Avast. 2020. 51% increase in the use of online spying and stalking apps during lockdown — prnewswire.com. https://www.prnewswire.com/news-releases/51-increase-in-the-use-of-online-spying-and-stalking-apps-during-lockdown-301090012.html. [Accessed 05-Oct-2022].Google Scholar
- Karla Badillo-Urquiola. 2020. A Social Ecological Approach to Empowering Foster Youth to Be Safer Online. In Companion Publication of the 2020 Conference on Computer Supported Cooperative Work and Social Computing(CSCW ’20 Companion). Association for Computing Machinery, New York, NY, USA, 75–79. https://doi.org/10.1145/3406865.3418365Google ScholarDigital Library
- Karla Badillo-Urquiola, Xinru Page, and Pamela J. Wisniewski. 2019. Risk vs. Restriction: The Tension between Providing a Sense of Normalcy and Keeping Foster Teens Safe Online. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems(CHI ’19). Association for Computing Machinery, New York, NY, USA, 1–14. https://doi.org/10/ghdmbbGoogle ScholarDigital Library
- Karla Badillo-Urquiola, Zachary Shea, Zainab Agha, Irina Lediaeva, and Pamela Wisniewski. 2021. Conducting Risky Research with Teens: Co-designing for the Ethical Treatment and Protection of Adolescents. Proceedings of the ACM on Human-Computer Interaction 4, CSCW3 (Jan. 2021), 231:1–231:46. https://doi.org/10/gtmcn3Google ScholarDigital Library
- Jane Bailey, Asher Flynn, and Nicola Henry. 2021. Pandemics and Systemic Discrimination: Technology-Facilitated Violence and Abuse in an Era of COVID-19 and Antiracist Protest. In The Emerald International Handbook of Technology Facilitated Violence and Abuse, Jane Bailey, Asher Flynn, and Nicola Henry (Eds.). Emerald Publishing Limited, 787–797. https://doi.org/10.1108/978-1-83982-848-520211057Google ScholarCross Ref
- Victoria L. Banyard, Katie M. Edwards, Elizabeth A. Moschella, and Katherine M. Seavey. 2019. “Everybody’s Really Close-Knit”: Disconnections Between Helping Victims of Intimate Partner Violence and More General Helping in Rural Communities. 25, 3 (03 2019), 337–358. https://doi.org/10/gnp9kvGoogle Scholar
- Chris Baraniuk. 2019. Stalkerware: The secret apps people use to spy on their partners — newscientist.com. https://www.newscientist.com/article/mg24432572-600-stalkerware-the-secret-apps-people-use-to-spy-on-their-partners/. [Accessed 05-Oct-2022].Google Scholar
- Betty Jo Barrett and Melissa St. Pierre. 2011. Variations in Women’s Help Seeking in Response to Intimate Partner Violence: Findings From a Canadian Population-Based Study. 17, 1 (Jan. 2011), 47–70. https://doi.org/10/b4ftqqGoogle Scholar
- Rosanna Bellini. 2023. Paying the Price: When Intimate Partners Use Technology for Financial Harm. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. ACM, 1–17. https://doi.org/10/gr8rpzGoogle ScholarDigital Library
- Rasika Bhalerao, Vaughn Hamilton, Allison McDonald, Elissa M. Redmiles, and Angelika Strohmayer. 2022. Ethical Practices for Security Research with At-Risk Populations. In 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). 546–553. https://doi.org/10.1109/EuroSPW55150.2022.00065Google ScholarCross Ref
- Katie Bishop. 2021. How ’Stalkerware’ Technology Made It Easy For My Abusive Ex To Spy On Me — refinery29.com. https://www.refinery29.com/en-gb/rise-of-stalkerware-tech. [Accessed 05-Oct-2022].Google Scholar
- Lindsay Blackwell, Jill Dimond, Sarita Schoenebeck, and Cliff Lampe. 2017. Classification and Its Consequences for Online Harassment: Design Insights from HeartMob. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (Dec. 2017), 24:1–24:19. https://doi.org/10/gqj8rqGoogle ScholarDigital Library
- Lindsay Blackwell, Jean Hardy, Tawfiq Ammari, Tiffany Veinot, Cliff Lampe, and Sarita Schoenebeck. 2016. LGBT Parents and Social Media: Advocacy, Privacy, and Disclosure during Shifting Social Movements. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems(CHI ’16). Association for Computing Machinery, 610–622. https://doi.org/10/grx6ccGoogle ScholarDigital Library
- Warren J Blumenfeld and R M Cooper. 2010. LGBT and Allied Youth Responses to Cyberbullying: Policy Implications. (2010).Google Scholar
- Leanne Bowler, Eleanor Mattern, and Cory Knobel. 2014. Developing Design Interventions for Cyberbullying: A Narrative-Based Participatory Approach. iConference 2014 Proceedings (March 2014). https://doi.org/10/gtmfk3Google Scholar
- Matthew J. Breiding, Kathleen C. Basile, Joanne Klevens, and Sharon G. Smith. 2017. Economic Insecurity and Intimate Partner and Sexual Violence Victimization. 53, 4 (Oct. 2017), 457–464. https://doi.org/10/gckhb7Google Scholar
- Lynn Brewer. 2018. Domestic Violence and the LGBTQ Community. https://ncadv.org/blog/posts/domestic-violence-and-the-lgbtq-community (accessed 2023-05-17)Google Scholar
- Cynthia Brown and Kelsey Hegarty. 2021. Development and Validation of the TAR Scale: A Measure of Technology-Facilitated Abuse in Relationships. 3 (Jan. 2021), 100059. https://doi.org/10/gshf3dGoogle Scholar
- Chay Brown, Mandy Yap, Annick Thomassin, Minda Murray, and Eunice Yu. 2021. “Can I Just Share My Story?” Experiences of Technology-Facilitated Abuse among Aboriginal and Torres Strait Islander Women in Regional and Remote Australia. 5, 2 (Oct. 2021). https://www.journalofglobalindigeneity.com/article/29716-can-i-just-share-my-story-experiences-of-technology-facilitated-abuse-among-aboriginal-and-torres-strait-islander-women-in-regional-and-remote-aust (accessed 2023-06-19)Google Scholar
- Megan Lindsay Brown, Judy Krysik, Walter LaMendola, Drishti Sinha, Lauren Reed, Megan Lindsay Brown, Judy Krysik, Walter LaMendola, Drishti Sinha, and Lauren Reed. 2020. Relationship Fluidity: The Changing Nature of Intimacy for Emerging Adult Women. https://www.igi-global.com/gateway/chapter/www.igi-global.com/gateway/chapter/241032 (accessed 2023-06-27)Google Scholar
- Sarah Jane Brubaker, Brittany Keegan, Xavier L. Guadalupe-Diaz, and Bre’Auna Beasley. 2017. Measuring and Reporting Campus Sexual Assault: Privilege and Exclusion in What We Know and What We Do. 11, 12 (Dec. 2017), e12543. https://doi.org/10/ggfjskGoogle Scholar
- Sloane C. Burke, Michele Wallen, Karen Vail-Smith, and David Knox. 2011. Using Technology to Control Intimate Partners: An Exploratory Study of College Undergraduates. 27, 3 (05 2011), 1162–1167. https://doi.org/10/fmrxh2Google Scholar
- Nancy Chi Cantalupo and William C. Kidder. 2016. Mapping the Title IX Iceberg: Sexual Harassment (Mostly) in Graduate School by College Faculty. 66, 4 (2016), 850–881. https://heinonline.org/HOL/P?h=hein.journals/jled66&i=857 (accessed 2023-09-04)Google Scholar
- Matthew Carrasco and Andruid Kerne. 2018. Queer Visibility: Supporting LGBT+ Selective Visibility on Social Media. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems(CHI ’18). Association for Computing Machinery, 1–12. https://doi.org/10/gmqk66Google ScholarDigital Library
- CDC. 2021. Fast facts: Preventing intimate partner violence. 19 (2021), 2022.Google Scholar
- Rose Ceccio, Sophie Stephenson, Danny Yuxing Huang, and Rahul Chatterjee. 2023. Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance. (2023).Google Scholar
- Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, and Thomas Ristenpart. 2018. The spyware used in intimate partner violence. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 441–458.Google ScholarCross Ref
- Janet X. Chen, Allison McDonald, Yixin Zou, Emily Tseng, Kevin A Roundy, Acar Tamersoy, Florian Schaub, Thomas Ristenpart, and Nicola Dell. 2022. Trauma-Informed Computing: Towards Safer Technology Experiences for All. In CHI Conference on Human Factors in Computing Systems. ACM, 1–20. https://doi.org/10.1145/3491102.3517475Google ScholarDigital Library
- Ann L Coker, Keith E Davis, Ileana Arias, Sujata Desai, Maureen Sanderson, Heather M Brandt, and Paige H Smith. 2002. Physical and mental health effects of intimate partner violence for men and women. 23, 4 (2002), 260–268.Google Scholar
- Wendy Craig, Meyran Boniel-Nissim, Nathan King, Sophie D Walsh, Maartje Boer, Peter D Donnelly, Yossi Harel-Fisch, Marta Malinowska-Cieślik, Margarida Gaspar de Matos, Alina Cosma, 2020. Social media use and cyber-bullying: A cross-national analysis of young people in 42 countries. 66, 6 (2020), S100–S108.Google Scholar
- Kimberle Crenshaw. 1995. Mapping the margins. 3, 15 (1995), 357–383.Google Scholar
- Walter S. DeKeseredy, Martin D. Schwartz, James Nolan, Micholas Mastron, and Amanda Hall-Sanchez. 2019. Polyvictimization and the Continuum of Sexual Abuse at a College Campus: Does Negative Peer Support Increase the Likelihood of Multiple Victimizations. 59, 2 (2019), 276–295. https://doi.org/10/gshf25Google Scholar
- National Institute of Justice DOJ. 2023. Five Things About Violence Against American Indian and Alaska Native Women and Men. (2023).Google Scholar
- Nathalie Dougé, Erik B Lehman, and Jennifer S McCall-Hosenfeld. 2014. Social support and employment status modify the effect of intimate partner violence on depression symptom severity in women: results from the 2006 behavioral risk factor surveillance system survey. 24, 4 (2014), e425–e434.Google Scholar
- Suzie Dunn. 2021. Is It Actually Violence? Framing Technology-Facilitated Abuse as Violence. In The Emerald International Handbook of Technology-Facilitated Violence and Abuse, Jane Bailey, Asher Flynn, and Nicola Henry (Eds.). Emerald Publishing Limited, 25–45. https://doi.org/10.1108/978-1-83982-848-520211002Google ScholarCross Ref
- Brianna Dym, Jed R. Brubaker, Casey Fiesler, and Bryan Semaan. 2019. "Coming Out Okay": Community Narratives for LGBTQ Identity Recovery Work. 3 (Nov. 2019), 154:1–154:28. Issue CSCW. https://doi.org/10/gkdmf9Google Scholar
- Katie M Edwards, Christina M Dardis, and Christine A Gidycz. 2012. Women’s Disclosure of Dating Violence: A Mixed Methodological Study. 22, 4 (Nov. 2012), 507–517. https://doi.org/10/f4fc4wGoogle Scholar
- Marcus Felson and Lawrence E Cohen. 1980. Human ecology and crime: A routine activity approach. 8 (1980), 389–406.Google Scholar
- Bonnie S. Fisher, Francis T. Cullen, and Michael G. Turner. 2000. The Sexual Victimization of College Women. Research Report. https://eric.ed.gov/?id=ED449712 (accessed 2023-08-30)Google Scholar
- Diana Freed, Natalie N. Bazarova, Sunny Consolvo, Eunice J Han, Patrick Gage Kelley, Kurt Thomas, and Dan Cosley. 2023. Understanding Digital-Safety Experiences of Youth in the U.S.. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems(CHI ’23). Association for Computing Machinery, New York, NY, USA, 1–15. https://doi.org/10/gsw7s6Google ScholarDigital Library
- Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, and Nicola Dell. 2019. " Is my phone hacked?" Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence. 3, CSCW (2019), 1–24.Google Scholar
- Diana Freed, Jackeline Palmer, Diana Elizabeth Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2017. Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders. 1, CSCW (Dec. 2017), 1–22. https://doi.org/10.1145/3134681Google ScholarDigital Library
- Diana Freed, Jackeline Palmer, Diana Elizabeth Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2017. Digital technologies and intimate partner violence: A qualitative analysis with multiple stakeholders. 1, CSCW (2017), 1–22.Google Scholar
- FTC. 2021. How to Spot Extortion Scams on LGBTQ+ Dating Apps. https://consumer.ftc.gov/consumer-alerts/2021/09/how-spot-extortion-scams-lgbtq-dating-appsGoogle Scholar
- Maite Garaigordobil and Vanesa Martínez-Valderrey. 2015. Effects of Cyberprogram 2.0 on “Face-to-Face” Bullying, Cyberbullying, and Empathy. Psicothema27.1 (Feb. 2015), 45–51. https://doi.org/10/gfdcrdGoogle Scholar
- Christine Geeng, Mike Harris, Elissa Redmiles, and Franziska Roesner. 2022. "Like Lesbians Walking the Perimeter": Experiences of {U.S}. {LGBTQ+} Folks With Online Security, Safety, and Privacy Advice. 305–322. https://www.usenix.org/conference/usenixsecurity22/presentation/geeng (accessed 2023-02-08)Google Scholar
- David Geller. 2020. An Increase in ’Stalkerware’ is Posing Privacy Issues During COVID-19 — verisk.com. https://www.verisk.com/insurance/covid-19/iso-insights/an-increase-in-stalkerware-is-posing-privacy-issues-during-the-pandemic/. [Accessed 05-Oct-2022].Google Scholar
- Mélissa Godin. 2020. How Domestic Abusers Have Exploited Technology During the Pandemic — time.com. https://time.com/5922566/technology-domestic-abuse-coronavirus-pandemic/. [Accessed 05-Oct-2022].Google Scholar
- Oliver L. Haimson, Jed R. Brubaker, Lynn Dombrowski, and Gillian R. Hayes. 2015. Disclosure, Stress, and Support During Gender Transition on Facebook. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing(CSCW ’15). Association for Computing Machinery, 1176–1190. https://doi.org/10/gsnxrtGoogle ScholarDigital Library
- Bridget Harris and Delanie Woodlock. 2022. ‘You Can’t Actually Escape It’: Policing the Use of Technology in Domestic Violence in Rural Australia. 11, 1 (03 2022), 135–148. https://doi.org/10/gr8rn2Google Scholar
- Tirion Elizabeth Havard and Michelle Lefevre. 2020. Beyond the Power and Control Wheel: How Abusive Men Manipulate Mobile Phone Technologies to Facilitate Coercive Control. 4, 2 (06 2020), 223–239. https://doi.org/10/gnntq8Google Scholar
- Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2019. Clinical computer security for victims of intimate partner violence. In 28th { USENIX} Security Symposium ({ USENIX} Security 19). 105–122.Google Scholar
- Jennifer Hefner and Daniel Eisenberg. 2009. Social Support and Mental Health Among College Students. 79, 4 (2009), 491–499. https://doi.org/10/d5tdbcGoogle Scholar
- Nicola Henry, Asher Flynn, and Anastasia Powell. 2018. Policing Image-Based Sexual Abuse: Stakeholder Perspectives. 19, 6 (Nov. 2018), 565–581. https://doi.org/10/gn7zhhGoogle Scholar
- Nicola Henry, Asher Flynn, and Anastasia Powell. 2020. Technology-Facilitated Domestic and Sexual Violence: A Review. 26, 15-16 (Dec. 2020), 1828–1854. https://doi.org/10/ghstg9Google Scholar
- Nicola Henry, Clare McGlynn, Asher Flynn, Kelly Johnson, Anastasia Powell, and Adrian J. Scott. 2020. Image-Based Sexual Abuse: A Study on the Causes and Consequences of Non-consensual Nude or Sexual Imagery. Routledge.Google Scholar
- Nicola Henry and Anastasia Powell. 2018. Technology-Facilitated Sexual Violence: A Literature Review of Empirical Research. 19, 2 (04 2018), 195–208. https://doi.org/10/gddz8gGoogle Scholar
- Nicola Henry and Alice Witt. 2021. Governing Image-Based Sexual Abuse: Digital Platform Policies, Tools, and Practices. In The Emerald International Handbook of Technology-Facilitated Violence and Abuse, Jane Bailey, Asher Flynn, and Nicola Henry (Eds.). Emerald Publishing Limited, 749–768. https://doi.org/10.1108/978-1-83982-848-520211054Google ScholarCross Ref
- Rebecca L. Heron and Maarten C. Eisma. 2021. Barriers and Facilitators of Disclosing Domestic Violence to the Healthcare Service: A Systematic Review of Qualitative Research. 29, 3 (May 2021), 612–630. https://doi.org/10/gs9bccGoogle Scholar
- Jina Huh-Yoo, Afsaneh Razi, Diep N. Nguyen, Sampada Regmi, and Pamela J. Wisniewski. 2023. “Help Me:” Examining Youth’s Private Pleas for Support and the Responses Received from Peers via Instagram Direct Messages. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems(CHI ’23). Association for Computing Machinery, New York, NY, USA, 1–14. https://doi.org/10/gr6j4jGoogle ScholarDigital Library
- Min-Wei Hung, Chien Wen (Tina) Yuan, Nanyi Bi, Yi-Chao Chen, Wan-Chen Lee, Ming-Chyi Huang, and Chuang-Wen You. 2022. To Use or Abuse: Opportunities and Difficulties in the Use of Multi-channel Support to Reduce Technology Abuse by Adolescents. 6, CSCW1 (April 2022), 125:1–125:27. https://doi.org/10/gsjq7kGoogle ScholarDigital Library
- Naulsberry Jean Baptiste, Jinkyung Park, Neeraj Chatlani, Naima Samreen Ali, and Pamela J. Wisniewski. 2023. Teens on Tech: Using an Asynchronous Remote Community to Explore Adolescents’ Online Safety Perspectives. In Companion Publication of the 2023 Conference on Computer Supported Cooperative Work and Social Computing(CSCW ’23 Companion). Association for Computing Machinery, New York, NY, USA, 45–49. https://doi.org/10/gtmcpbGoogle Scholar
- Akiko Kamimura, Asha Parekh, and Lenora M Olson. 2013. Health indicators, social support, and intimate partner violence among women utilizing services at a community organization. 23, 3 (2013), e179–e185.Google Scholar
- Jonathan J. Kandell. 1998. Internet Addiction on Campus: The Vulnerability of College Students. 1, 1 (01 1998), 11–17. https://doi.org/10/db86jgGoogle Scholar
- Vanessa Kitzie. 2018. "I Pretended to Be a Boy on the Internet": Navigating Affordances and Constraints of Social Networking Sites and Search Engines for LGBTQ+ Identity Work. (07 2018). https://doi.org/10.5210/fm.v23i7.9264Google ScholarCross Ref
- L. B. Klein and Sandra L. Martin. 2021. Sexual Harassment of College and University Students: A Systematic Review. 22, 4 (Oct. 2021), 777–792. https://doi.org/10/gsn7g9Google Scholar
- Shanti Kulkarni. 2019. Intersectional Trauma-Informed Intimate Partner Violence (IPV) Services: Narrowing the Gap between IPV Service Delivery and Survivor Needs. 34, 1 (Jan. 2019), 55–64. https://doi.org/10.1007/s10896-018-0001-5Google ScholarCross Ref
- Roxanne Leitão. 2021. Technology-Facilitated Intimate Partner Abuse: a qualitative analysis of data from online domestic abuse forums. 36, 3 (2021), 203–242.Google Scholar
- Megan Lindsay and Judy Krysik. 2012. Online Harassment Among College Students. 15, 5 (06 2012), 703–719. https://doi.org/10/gndh2mGoogle Scholar
- Rebecca M. Loya. 2014. The Role of Sexual Violence in Creating and Maintaining Economic Insecurity Among Asset-Poor Women of Color. 20, 11 (Nov. 2014), 1299–1320. https://doi.org/10.1177/1077801214552912Google ScholarCross Ref
- Jeneile Luebke, Peninnah Kako, Alexa Lopez, Marin Schmitt, Anne Dressel, Kathryn Klein, and Lucy Mkandawire-Vahlmu. 2022. Barriers Faced by American Indian Women in Urban Wisconsin in Seeking Help Following an Experience of Intimate Partner Violence. (Oct. 2022), 10778012221132304. https://doi.org/10/gsc3hkGoogle Scholar
- Minna Lyons and Gayle Brewer. 2022. Experiences of Intimate Partner Violence during Lockdown and the COVID-19 Pandemic. 37, 6 (Aug. 2022), 969–977. https://doi.org/10.1007/s10896-021-00260-xGoogle ScholarCross Ref
- Regan L Mandryk, Julian Frommel, Nitesh Goyal, Guo Freeman, Cliff Lampe, Sarah Vieweg, and Donghee Yvette Wohn. 2023. Combating Toxicity, Harassment, and Abuse in Online Social Spaces: A Workshop at CHI 2023. In Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems(CHI EA ’23). Association for Computing Machinery, 1–7. https://doi.org/10/gsnxtcGoogle ScholarDigital Library
- Alison Marganski and Lisa Melander. 2018. Intimate partner violence victimization in the cyber and real world: Examining the extent of cyber aggression experiences and its association with in-person dating violence. 33, 7 (2018), 1071–1095.Google Scholar
- Alison Marganski and Lisa Melander. 2018. Intimate Partner Violence Victimization in the Cyber and Real World: Examining the Extent of Cyber Aggression Experiences and Its Association With In-Person Dating Violence. 33, 7 (04 2018), 1071–1095. https://doi.org/10/gdd2qxGoogle Scholar
- Hiroaki Masaki, Kengo Shibata, Shui Hoshino, Takahiro Ishihama, Nagayuki Saito, and Koji Yatani. 2020. Exploring Nudge Designs to Help Adolescent SNS Users Avoid Privacy and Safety Threats. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems(CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–11. https://doi.org/10/gkcx3sGoogle ScholarDigital Library
- Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F Churchill, and Sunny Consolvo. 2017. Stories from survivors: Privacy & security practices when coping with intimate partner abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 2189–2201.Google ScholarDigital Library
- Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, and Sunny Consolvo. 2017. Stories from Survivors: Privacy & Security Practices When Coping with Intimate Partner Abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 2189–2201. https://doi.org/10/gr8rpqGoogle ScholarDigital Library
- Travis Mayberry, Erik-Oliver Blass, and Ellis Fenske. 2023. Blind My - An Improved Cryptographic Protocol to Prevent Stalking in Apple’s Find My Network. 2023, 1 (01 2023), 85–97. https://doi.org/10/gr8rpxGoogle Scholar
- Nora McDonald, Karla Badillo-Urquiola, Morgan G. Ames, Nicola Dell, Elizabeth Keneski, Manya Sleeper, and Pamela J. Wisniewski. 2020. Privacy and Power: Acknowledging the Importance of Privacy Research and Design for Vulnerable Populations. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems(CHI EA ’20). Association for Computing Machinery, New York, NY, USA, 1–8. https://doi.org/10/gsptbzGoogle Scholar
- Nora McDonald and Andrea Forte. 2020. The Politics of Privacy Theories: Moving from Norms to Vulnerabilities. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems(CHI ’20). Association for Computing Machinery, 1–14. https://doi.org/10.1145/3313831.3376167Google ScholarDigital Library
- Sarah McMahon and Kate Stepleton. 2018. Undergraduate Exposure to Messages About Campus Sexual Assault: Awareness of Campus Resources. 59, 1 (2018), 110–115. https://doi.org/10/ggfjrmGoogle Scholar
- Lisa A Melander. 2010. College Students’ Perceptions of Intimate Partner Cyber Harassment. (2010).Google Scholar
- Terance D Miethe and Robert Frank Meier. 1994. Crime and its social context: Toward an integrated theory of offenders, victims, and situations. Suny Press.Google Scholar
- Monica N. Modi, Sheallah Palmer, and Alicia Armstrong. 2014. The Role of Violence Against Women Act in Addressing Intimate Partner Violence: A Public Health Issue. 23, 3 (03 2014), 253–259. https://doi.org/10/f54nz5Google Scholar
- Phoebe Moh, Pubali Datta, Noel Warford, Adam Bates, Nathan Malkin, and Michelle L. Mazurek. 2023. Characterizing Everyday Misuse of Smart Home Devices. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE, 2835–2849. https://doi.org/10/gsnqv9Google Scholar
- Michelle L. Munro-Kramer, Alexandra C. Dulin, and Caroline Gaither. 2017. What Survivors Want: Understanding the Needs of Sexual Assault Survivors. 65, 5 (2017), 297–305. https://doi.org/10.1080/07448481.2017.1312409Google ScholarCross Ref
- Jordana N Navarro and Jana L Jasinski. 2013. Why girls? Using routine activities theory to predict cyberbullying experiences between girls and boys. 23, 4 (2013), 286–303.Google Scholar
- Borke Obada-Obieh, Yue Huang, Lucrezia Spagnolo, and Konstantin Beznosov. 2022. SoK: The Dual Nature of Technology in Sexual Abuse. In 2022 IEEE Symposium on Security and Privacy (SP). 2320–2343. https://doi.org/10.1109/SP46214.2022.9833663Google ScholarCross Ref
- Charlie Osborne. 2021. There’s been a rise in stalkerware. And the tech abuse problem goes beyond smartphones — zdnet.com. https://www.zdnet.com/article/theres-been-a-rise-in-stalkerware-and-the-tech-abuse-problem-goes-beyond-smartphones/. [Accessed 05-Oct-2022].Google Scholar
- Ellen Pence and Michael Paymar. 1993. Education groups for men who batter: The Duluth model. Springer Publishing Company.Google Scholar
- Justin Petelka, Lucy Van Kleunen, Liam Albright, Elizabeth Murnane, Stephen Voida, and Jaime Snyder. 2020. Being (In)Visible: Privacy, Transparency, and Disclosure in the Self-Management of Bipolar Disorder. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems(CHI ’20). Association for Computing Machinery, 1–14. https://doi.org/10/gsqgrrGoogle ScholarDigital Library
- Anthony T. Pinter, Morgan Klaus Scheuerman, and Jed R. Brubaker. 2021. Entering Doors, Evading Traps: Benefits and Risks of Visibility During Transgender Coming Outs. 4 (01 2021), 272:1–272:27. Issue CSCW3. https://doi.org/10/gsnt2zGoogle Scholar
- John R. Porter, Kiley Sobel, Sarah E. Fox, Cynthia L. Bennett, and Julie A. Kientz. 2017. Filtered Out: Disability Disclosure Practices in Online Dating Communities. 1 (Dec. 2017), 1–13. Issue CSCW. https://doi.org/10/gfgx4kGoogle ScholarDigital Library
- Anastasia Powell and Nicola Henry. 2019. Technology-Facilitated Sexual Violence Victimization: Results From an Online Survey of Australian Adults. 34, 17 (09 2019), 3637–3665. https://doi.org/10/gfttwzGoogle Scholar
- Anastasia Powell, Adrian Scott, Asher Flynn, and Nicola Henry. 2020. Image-Based Sexual Abuse: An International Study of Victims and Perpetrators. https://doi.org/10.13140/RG.2.2.35166.59209Google ScholarCross Ref
- Afsaneh Razi, Karla Badillo-Urquiola, and Pamela J. Wisniewski. 2020. Let’s Talk about Sext: How Adolescents Seek Support and Advice about Their Online Sexual Experiences. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems(CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–13. https://doi.org/10/gtmcn6Google ScholarDigital Library
- Lauren A. Reed, Richard M. Tolman, and L. Monique Ward. 2016. Snooping and Sexting: Digital Media as a Context for Dating Aggression and Abuse Among College Students. 22, 13 (Nov. 2016), 1556–1576. https://doi.org/10/f875j7Google ScholarCross Ref
- Eduardo Reis, Carla Moleiro, and Patrícia Arriaga. 2023. Intimate Partner Violence Directed at Men: Experiences of Violence, Help-seeking, and Potential Gender Role Conflict Among Portuguese Men. (2023), 1–20.Google Scholar
- Stuart Roe. 2017. “Family Support Would Have Been Like Amazing”: LGBTQ Youth Experiences With Parental and Family Support. 25, 1 (Jan. 2017), 55–62. https://doi.org/10/gmhgrmGoogle Scholar
- Michaela M. Rogers, Colleen Fisher, Parveen Ali, Peter Allmark, and Lisa Fontes. 2022. Technology-Facilitated Abuse in Intimate Relationships: A Scoping Review. (05 2022), 152483802210902. https://doi.org/10/gr8rnwGoogle Scholar
- Wendy Roldan, Karla Badillo-Urquiola, Kiley Sobel, Kung Jin Lee, Pamela J. Wisniewski, June Ahn, Tamara Clegg, and Jason Yip. 2021. Justice-Centered Design Engagements with Children and Teens: What’s at Stake, the Actions We Take, and the Commitments We Make. In Proceedings of the 20th Annual ACM Interaction Design and Children Conference(IDC ’21). Association for Computing Machinery, New York, NY, USA, 666–669. https://doi.org/10.1145/3459990.3460515Google ScholarDigital Library
- Jody M. Ross, Michelle Drouin, and Amanda Coupe. 2019. Sexting Coercion as a Component of Intimate Partner Polyvictimization. 34, 11 (06 2019), 2269–2291. https://doi.org/10/gr8rpgGoogle Scholar
- Jody M Ross, Michelle Drouin, and Amanda Coupe. 2019. Sexting coercion as a component of intimate partner polyvictimization. 34, 11 (2019), 2269–2291.Google Scholar
- Kevin A Roundy, Paula Barmaimon Mendelberg, Nicola Dell, Damon McCoy, Daniel Nissani, Thomas Ristenpart, and Acar Tamersoy. 2020. The many kinds of creepware used for interpersonal attacks. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 626–643.Google ScholarCross Ref
- Nithya Sambasivan, Amna Batool, Nova Ahmed, Tara Matthews, Kurt Thomas, Laura Sanely Gaytán-Lugo, David Nemer, Elie Bursztein, Elizabeth Churchill, and Sunny Consolvo. 2019. "They Don’t Leave Us Alone Anywhere We Go": Gender and Digital Abuse in South Asia. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems(CHI ’19). Association for Computing Machinery, 1–14. https://doi.org/10.1145/3290605.3300232Google ScholarDigital Library
- Ari Schlesinger, W. Keith Edwards, and Rebecca E. Grinter. 2017. Intersectional HCI: Engaging Identity through Gender, Race, and Class. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 5412–5427. https://doi.org/10/cggwGoogle ScholarDigital Library
- Ellen Simpson and Bryan Semaan. 2021. For You, or For"You"? Everyday LGBTQ+ Encounters with TikTok. 4 (01 2021), 252:1–252:34. Issue CSCW3. https://doi.org/10/gsnxrmGoogle Scholar
- Julia Slupska. 2019. Safe at Home: Towards a Feminist Critique of Cybersecurity. https://www.semanticscholar.org/paper/Safe-at-Home%3A-Towards-a-Feminist-Critique-of-Slupska/bf6752dcbe067f3efa9f90f021f770ba70811077 (accessed 2023-02-15)Google Scholar
- Julia Slupska and Megan Lindsay Brown. 2022. Aiding Intimate Violence Survivors in Lockdown: Lessons about Digital Security in the Covid-19 Pandemic. In Extended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems(CHI EA ’22). Association for Computing Machinery, 1–5. https://doi.org/10.1145/3491101.3503548Google ScholarDigital Library
- Julia Slupska, Scarlet Dawson Dawson Duckworth, Linda Ma, and Gina Neff. 2021. Participatory Threat Modelling: Exploring Paths to Reconfigure Cybersecurity. In Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems(CHI EA ’21). Association for Computing Machinery, 1–6. https://doi.org/10.1145/3411763.3451731Google ScholarDigital Library
- Julia Slupska and Angelika Strohmayer. 2022. Networks of Care: Tech Abuse Advocates’ Digital Security Practices. In 31st USENIX Security Symposium (USENIX Security 22). 341–358.Google Scholar
- Natalie J Sokoloff and Ida Dupont. 2005. Domestic violence at the intersections of race, class, and gender: Challenges and contributions to understanding violence against marginalized women in diverse communities. 11, 1 (2005), 38–64.Google ScholarCross Ref
- Marie Louise Juul Søndergaard, Gopinaath Kannabiran, Simran Chopra, Nadia Campo Woytuk, Dilrukshi Gamage, Ebtisam Alabdulqader, Heather McKinnon, Heike Winschiers-Theophilus, and Shaowen Bardzell. 2022. Feminist Voices about Ecological Issues in HCI. In Extended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems(CHI EA ’22). Association for Computing Machinery, 1–7. https://doi.org/10/grr5j6Google ScholarDigital Library
- Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, and Rahul Chatterjee. 2023. “It’s the Equivalent of Feeling Like You’re in Jail”: Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse. (2023).Google Scholar
- Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Danny Yuxing Huang, and Rahul Chatterjee. 2023. Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse. (2023).Google Scholar
- Kateryna M Sylaska and Katie M Edwards. 2014. Disclosure of intimate partner violence to informal social support network members: A review of the literature. 15, 1 (2014), 3–21.Google ScholarCross Ref
- NNEDV TechSafety. [n. d.]. DocuSAFE Documentation and Evidence Collection App. https://www.techsafety.org/docusafeGoogle Scholar
- Kurt Thomas, Devdatta Akhawe, Michael Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, and Gianluca Stringhini. 2021. SoK: Hate, Harassment, and the Changing Landscape of Online Abuse. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 247–267. https://doi.org/10.1109/SP40001.2021.00028Google ScholarCross Ref
- Kristen Thomasen and Suzie Dunn. 2021. Reasonable Expectations of Privacy in an Era of Drones and Deepfakes: Expanding the Supreme Court of Canada’s Decision in RvJarvis. In The Emerald International Handbook of Technology-Facilitated Violence and Abuse, Jane Bailey, Asher Flynn, and Nicola Henry (Eds.). Emerald Publishing Limited, 555–576. https://doi.org/10.1108/978-1-83982-848-520211040Google ScholarCross Ref
- Joe Tidy. 2019. Stalkerware: The software that spies on your partner — bbc.com. https://www.bbc.com/news/technology-50166147. [Accessed 05-Oct-2022].Google Scholar
- Emily Tseng, Diana Freed, Kristen Engel, Thomas Ristenpart, and Nicola Dell. 2021. A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. ACM, 1–17. https://doi.org/10.1145/3411764.3445589Google ScholarDigital Library
- Emily Tseng, Diana Freed, Kristen Engel, Thomas Ristenpart, and Nicola Dell. 2021. A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19. 18, 22 (2021), 28–29.Google Scholar
- Emily Tseng, Mehrnaz Sabet, Rosanna Bellini, Harkiran Kaur Sodhi, Thomas Ristenpart, and Nicola Dell. 2022. Care Infrastructures for Digital Security in Intimate Partner Violence. In CHI Conference on Human Factors in Computing Systems. ACM, 1–20. https://doi.org/10.1145/3491102.3502038Google ScholarDigital Library
- Kim Usher, Navjot Bhullar, Joanne Durkin, Naomi Gyamfi, and Debra Jackson. 2020. Family Violence and COVID-19: Increased Vulnerability and Reduced Options for Support. 29, 4 (Aug. 2020), 549–552. https://doi.org/10.1111/inm.12735Google ScholarCross Ref
- Judy A Van Wyk, Michael L Benson, Greer Litton Fox, and Alfred DeMaris. 2003. Detangling individual-, partner-, and community-level correlates of partner violence. 49, 3 (2003), 412–438.Google Scholar
- Joseph C. Von Nessen and Erin Schubert. 2022. The Economic Impact of Domestic Violence In Milwaukee & Wisconsin 2021. https://static1.squarespace.com/static/5d39f654dfc553000198b222/t/6345b7f7fc2276703a2bf19d/1665513464758/Economic+Impact+of+DV+FINAL.+10.11.2022.pdf (accessed 2023-05-16)Google Scholar
- Rachel J. Voth Schrag, Kristen E. Ravi, and Sarah R. Robinson. 2020. The Role of Social Support in the Link Between Economic Abuse and Economic Hardship. 35, 1 (Jan. 2020), 85–93. https://doi.org/10.1007/s10896-018-0019-8Google ScholarCross Ref
- Ari Ezra Waldman. 2021. Navigating Privacy on Gay-Oriented Mobile Dating Applications *. In The Emerald International Handbook of Technology-Facilitated Violence and Abuse, Jane Bailey, Asher Flynn, and Nicola Henry (Eds.). Emerald Publishing Limited, 369–381. https://doi.org/10.1108/978-1-83982-848-520211027Google ScholarCross Ref
- Ruolin Wang, Chun Yu, Xing-Dong Yang, Weijie He, and Yuanchun Shi. 2019. EarTouch: Facilitating Smartphone Use for Visually Impaired People in Mobile and Public Scenarios. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems(CHI ’19). Association for Computing Machinery, 1–13. https://doi.org/10/ghmkqsGoogle ScholarDigital Library
- Noel Warford, Tara Matthews, Kaitlyn Yang, Omer Akgul, Sunny Consolvo, Patrick Gage Kelley, Nathan Malkin, Michelle L. Mazurek, Manya Sleeper, and Kurt Thomas. 2022. SoK: A Framework for Unifying At-Risk User Research. In 2022 IEEE Symposium on Security and Privacy (SP). 2344–2360. https://doi.org/10/gr8rp5Google Scholar
- Emily A. Waterman, Emily R. Dworkin, Christina M. Dardis, Sarah E. Ullman, Katie M. Edwards, and Lindsey M. Rodriguez. 2021. Exploring the Association between Anticipated and Actual Responses to Disclosures of Intimate Partner Violence and Sexual Assault. 38, 4 (April 2021), 1131–1151. https://doi.org/10/gs9bcbGoogle Scholar
- Jennifer M. Watson, Michele Cascardi, Sarah Avery-Leaf, and K. Daniel O’Leary. 2001. High School Students’ Responses to Dating Aggression. 16, 3 (Jan. 2001), 339–348. https://doi.org/10/gs9bb9Google Scholar
- Leila Wood, Rachel Voth Schrag, Dixie Hairston, and Cynthia Jones. 2021. Exploring Advocacy Practices for Interpersonal Violence Survivors on College Campuses: Approaches and Key Factors.11, 1 (01 2021), 28–39. https://doi.org/10/gmvf9xGoogle Scholar
- Delanie Woodlock. 2017. The Abuse of Technology in Domestic Violence and Stalking. 23, 5 (April 2017), 584–602. https://doi.org/10.1177/1077801216646277Google ScholarCross Ref
- Delanie Woodlock and Bridget Harris. 2022. ‘You Have to Be Really Careful’: Technology and the Abuse of Women with Intellectual and Cognitive Disabilities. (08 2022), 1–21. https://doi.org/10/gscxq6Google Scholar
- Delanie Woodlock, Michael Salter, Molly Dragiewicz, and Bridget Harris. 2023. “Living in the Darkness”: Technology-Facilitated Coercive Control, Disenfranchised Grief, and Institutional Betrayal. 29, 5 (04 2023), 987–1004. https://doi.org/10/gscxq7Google Scholar
- Emily M Wright. 2015. The relationship between social support and intimate partner violence in neighborhood context. 61, 10 (2015), 1333–1359.Google Scholar
- Michelle Ybarra, Myeshia Price-Feeney, Amanda Lenhart, and Kathryn Zickuhr. 2017. Intimate Partner Digital Abuse. (2017).Google Scholar
- G. D. Zimet, S. S. Powell, G. K. Farley, S. Werkman, and K. A. Berkoff. 1990. Psychometric Characteristics of the Multidimensional Scale of Perceived Social Support. 55, 3-4 (1990), 610–617. https://doi.org/10/bjdp5qGoogle Scholar
Index Terms
- A Critical Analysis of the Prevalence of Technology-Facilitated Abuse in US College Students
Recommendations
Care Infrastructures for Digital Security in Intimate Partner Violence
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsSurvivors of intimate partner violence (IPV) face complex threats to their digital privacy and security. Prior work has established protocols for directly helping them mitigate these harms; however, there remains a need for flexible and pluralistic ...
Trauma-Informed Computing: Towards Safer Technology Experiences for All
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsTrauma is the physical, emotional, or psychological harm caused by deeply distressing experiences. Research with communities that may experience high rates of trauma has shown that digital technologies can create or exacerbate traumatic experiences. Via ...
A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19
CHI '21: Proceedings of the 2021 CHI Conference on Human Factors in Computing SystemsThe shutdown measures necessary to stop the spread of COVID-19 have amplified the role of technology in intimate partner violence (IPV). Survivors may be forced to endure lockdowns with their abusers, intensifying the dangers of technology-enabled ...
Comments