Technology and Domestic and Family Violence: Victimisation, Perpetration and Responses

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book brings together academics and advocates to explore an emerging issue: the use of technology by perpetrators of domestic and family violence. Of interest too is critique of government and non-government activities in this arena and how technology can be harnessed to respond to harm. Domestic and family violence (DFV) is widely recognised as an important social issue, impacting the safety and wellbeing of victim/survivors and their children, and on a broader scale, threatening risk and security on global levels. This book provides insights drawn from research and practice in the Global South and Global North to provide an evidence base and real-world solutions and initiatives to understand, address and ultimately prevent technology-facilitated domestic and family violence and how technology can be used to effect positive change and empower victim/survivors and communities. Technology and Domestic and Family Violence will be of great interest to students and scholars on victimology, criminology, social work, law, women’s studies, sociology and media studies. It will also be a valuable reference for practitioners, government and non-government advocates working on issues around domestic violence.

Author(s): Bridget Harris, Delanie Woodlock
Series: Routledge Studies in Crime and Society
Publisher: Routledge
Year: 2022

Language: English
Pages: 234
City: London

Cover
Half Title
Series Information
Title Page
Copyright Page
Table of Contents
List of Figures
List of Tables
List of Contributors
Acknowledgements
Part 1 Conceptualising, Categorising, and Measuring Harm
1 Weaponising Technology in Intimate Relationships: An Introduction and Overview
Introduction
Terminologies
Domestic and Family Violence
Technology-facilitated Abuse
Technology
The Approach in this Text
Scope and Scale
Norms and Normalisation
Behaviours, Boundaries, and Oppressions
Surveillance Societies
A Call for Further Review
Victim/survivors
Abusers and Perpetrators
Digital Coercive Control
Critiques
This Volume
References
2 Characteristics of Technology-Facilitated Domestic Violence
Elements of CyberIPA
Cyberbullying and Cyberharassment
Cyberfraud
Cybersexual Abuse
Cyberstalking
Putting It Together: CyberIPA Is a Serious Multifaceted Problem
References
3 Technology-Facilitated Abuse: The Need for Indigenous-Led Research and Response
Introduction
Contextualising Technology-Facilitated Abuse
Within and Beyond Intimate Relationships
Research and Findings in Australia
Impacts
Help-seeking and Responding to Technology-Facilitated Abuse
Coercive Control and Criminalisation
Conclusion
Notes
References
4 Best-Practice Principles for Measurement of Technology-Facilitated Coercive Control
Key Terms
Best Practice Principles for Measuring Technology-Facilitated Coercive Control
Some Emerging Research On Technology Use in Intimate Relationships Reproduces and Exacerbates Known Domestic Violence Measurement Problems
Distorting Control
Conclusion
References
Part 2 Specific Technologies and Forms of Harm
5 Cyberstalking in the Context of Intimate Relationships: Who’s Monitoring the Monitors?
Introduction
Key Components of Cyberstalking
Combat the Risks of Cyberstalking
The Research
Method
Sample
Data Collection Protocols
Data Analysis
Results
Discussion
Future Directions
Conclusion
References
6 Technology-Facilitated Abuse and the Internet of Things (IoT): The Implication of the Smart, Internet-Connected Devices...
Introduction
The Rise and Impact of the Internet of Things (IoT)
IoT’s Impact On Domestic Violence and Abuse
Socio-technical Responses to IoT-Facilitated Tech Abuse
Conclusion
References
7 The New Panopticon: Women’s Experiences of Mobile Phone-Mediated Coercive Control Within Abusive Relationships
Introduction
The Nature of Coercive Control
Mobile Phones and Domestic Abuse
The Research Study
The Women’s Experiences
Surveillance
Entrapment Through Permanent Visibility
Training/learning How to Behave
Docile Bodies and the Efficient Machine/normalisation and Acceptance of the Rules
The Training of the Women Into Compliance
Resistance
Conclusion
Acknowledgements
References
Part 3 Victimisation of Cohorts and Communities
8 Digital Abuse of Women With Disabilities
Introduction
What Are Intellectual And/or Cognitive Disabilities?
What Is Known About Violence Against Women With Disabilities?
Technology Abuse and Women With Disabilities
Methodology
Findings
Harassment Via Technology
Technology-facilitated Stalking
Soliciting and Unauthorised Posting and Distribution of Images
Perpetrators of Technology Abuse
Impacts of Technology Abuse
Challenges in Help-Seeking
Conclusion
References
9 The Co-Option of Children in Relation to Intimate Partner Violence and the Use of Technology
Introduction
Previous Research
Queensland Study
Tracking Devices in Toys
Applications in Children’s Phones
Facebook Stalking
Legal Responses
Family Law
Domestic Violence Protection Orders
Stalking
Conclusions
References
10 Technology-Facilitated Domestic Violence: Some Queer Considerations
Introduction
Theorising Queer Domestic and Family Violence
Conceptualisations and Boundaries of Technology-Facilitated Domestic Or ‘Family’ Violence
Conceptualisations of Technology and Subjectivity
Typologies of TFDFV
Contexts of TFDFV
Conclusion
Note
References
11 Remote-Control: Regional, Rural, and Remote Women’s Experiences of Digital Coercive Control
Introduction
Digital Coercive Control (DCC)
Spatiality
Spaceless Violence Study
Accounts of DCC
DCC Within Domestic Violence and the Family
DCC as Facilitating Humiliation
Gendered and Sexualised Technology-Facilitated Harassment
Image-based Sexual Abuse
Changing Settings, Functions, and Tampering With Digital Accounts Devices
Technology-facilitated Stalking
Impacts of DCC
DCC and Rurality
Conclusion
References
Part 4 Harnessing Technology
12 Domestic Violence Disclosure Schemes: The Opportunities and Limits of Technology and Information Sharing
Introduction
Domestic Violence Disclosure Schemes (DVDS): What Are They and What Do They Do?
The Benefits and Limits of Information Sharing Through a DVDS
The Application Process
The Benefits of Information Sharing
The Reliability of the Information Disclosed
Barriers to Accessing DVDS
Why a DVDS Creates Space for Victim Blaming and Responsibilisation
Conclusion
References
13 Technological Resources for People Experiencing and Using Violence in Their Intimate Relationships: Moving Beyond Safety and Referral
Introduction
Technology to Support Women Experiencing IPV in Australia
Expanding the Scope of Technological Interventions for IPV in Australia
So What Does All of this Look Like in Practice?
Do Therapeutic Technological IPV Interventions Work?
The Potential of Technology to Intervene Early With Men Using Violence in Relationships
Conclusion
References
14 How Women of Uganda Network (WOUGNET) Uses Technology to Respond to Online Gender-Based Violence
Introduction
Addressing Non-Consensual Intimate Imagery
Reporting Violence Against Women
Education and Training
Direct Lobbying and Advocacy
Media Campaigns and Activism
Future Directions
15 Emergent Best Practices in Trauma-Informed Design From Chayn’s Interventions With and for Survivors of Technology Abuse
Introduction
The Need for Trauma-Informed Design
Design Principles
Safety
Agency
Equity
Privacy
Accountability
Plurality
Shared Power
Hope
Conclusion
Notes
16 Spaceless Violence: Concluding Thoughts and Future Steps
Tactics of Digital Abuse and Taming Technology: Reviewing the Text
Manifestations of Technology Abuse
The Need for an Intimate Threat Model
Conceptualising and Contextualising Technology-Facilitated DFV
Coercive Control
Ac(counting) for Context
Foucauldian Readings of Control, Surveillance, and Self-Regulation
Vulnerabilities, Oppressions, and Intersectionality
Harnessing Technology?
Digital Justice?
For Us and With Us: Trauma-Informed Technologies
Moving Forward
References
Index