The Emerald International Handbook of Technology-Facilitated Violence and Abuse 2021
DOI: 10.1108/978-1-83982-848-520211047
|View full text |Cite
|
Sign up to set email alerts
|

As Technology Evolves, so Does Domestic Violence: Modern-Day Tech Abuse and Possible Solutions

Abstract: The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this chapter, we discuss three unique types of technological abuse: (1) financial abuse via banking websites and apps; (2) abuse via smart home devices (i.e., "Internet of Things" abuse); and (3) stalking via geolocation or GPS. We also argue pregnancy and wellness apps provide an opportunity for meaningful intervention for pregnant victims of d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Recognition that the features, functions, and management of technologies can at times contribute to or enable TAR is central to developing principles and infrastructure that limit the harmful use of technology. In other words, investment in efforts to minimize or stop harm through safety by design approaches is needed (PenzeyMoog & Slakoff, 2021). So too are technology-mediated mechanisms that interrupt the potentially harmful behavioral patterns of perpetrators.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recognition that the features, functions, and management of technologies can at times contribute to or enable TAR is central to developing principles and infrastructure that limit the harmful use of technology. In other words, investment in efforts to minimize or stop harm through safety by design approaches is needed (PenzeyMoog & Slakoff, 2021). So too are technology-mediated mechanisms that interrupt the potentially harmful behavioral patterns of perpetrators.…”
Section: Discussionmentioning
confidence: 99%
“…Insights into the psychological processes that lead to the enactment of TAR are needed to facilitate the development of primary prevention initiatives and guide the work of agencies that deliver perpetrator behavior change programs. Furthermore, an understanding of the tactics, ethos, and drivers of TAR is also vital to advancing "safety by design," the principles and infrastructure that limit how technology can be co-opted (PenzeyMoog & Slakoff, 2021). Addressing this gap, the aim of this study is to advance the limited knowledge of the emotions and motivations that may influence an individual to engage in TAR, from the perpetrator perspective.…”
Section: Introductionmentioning
confidence: 99%
“…IPV in the US cuts across all genders, races, and social classes (Petrosky et al, 2017) and includes physical, financial, emotional, sexual, and psychological abuse (Larsen, 2016). As technology has evolved, other forms of violence have been characterized, such as coercive control and tech-facilitated violence or cyberviolence (PenzeyMoog & Slakoff, 2021). Based on these two definitions, researchers have argued that DV is a broader term that includes IPV, elder abuse, and child abuse in a family setting or cohabitation setting involving physical violence, sexual violence, and/or emotional violence (Boserup et al, 2020), whereas IPV represents physical violence, sexual violence, or emotional violence that occurs within the family, between intimate partners in cohabitation or non-cohabitation relationships.…”
Section: Methodsmentioning
confidence: 99%