Understand How Technology Facilitates Abuse

Technological intimate partner abuse is a pressing issue in today's digital society, and it requires a comprehensive understanding to effectively address it. This compilation of academic research articles serves as a valuable resource, offering a jumpstart to anyone seeking knowledge on this topic. These articles delve into various aspects of technological intimate partner abuse, shedding light on its prevalence, underlying mechanisms, and psychological impacts. From exploring the use of surveillance technologies to examining the role of social media in perpetuating abuse, the several articles listed provide critical insights into the complex dynamics of this form of abuse.


What is it?

Intimate partner violence through technological abuse, alternatively referred to as intimate partner cyber abuse (IPCA), represents a specific form of aggression perpetrated through communication and information technologies. It is essential to note that understanding domestic cyber violence as a mere extension of traditional domestic violence in the online environment is not a realistic reflection of the phenomenon, since cyber violence has its specific causes and manifestations

Abuse is abuse!

Due to the overlap of in-person and technology facilitated IPV perpetration, the greatest need for prevention and treatment seems to remain violent relationships overall, rather than specifically the negative use of technology. (Duerksen & Woodin, 2019)

On an international level, the United Nations estimates that 73 percent of females worldwide have endured online abuse. (UN Women, 2023)

Abuse is indiscriminate

The gender differences in the prevalence and frequency of cyber psychological aggression perpetration or victimization are not significant. (Zapor et al., 2017; Maftei & Dănilă, 2021)

Why it matters

“Technology, such as computers, smartphones, and tracking devices, allows abusers to overcome geographic and spatial boundaries that would have otherwise prevented them from contacting their victims. It also allows abusers to create ‘a sense of omnipresence and eroding [the victim's] feelings of safety after separation’”. (Al-Alosi, 2017)

What to look out for

Methods of abuse can include cyberstalking, technology-facilitated sexual violence, and general psychological abuse perpetrated through technology (Duerksen & Woodin, 2019)

  • Cyber-stalking can encompass online activity monitoring, the use of tracking devices, and malicious software.

    Online Monitoring
    Abusers may closely monitor their partner’s online activity, including social media profiles, emails, chat logs, and other digital communication channels. This allows them to maintain control over their partner and their autonomy

    Tracking Devices
    In some cases, especially in recent years, the use of GPS tracking devices or apps to monitor the physical movements of their victims have only gotten more and more accessible. Examples of this are the increasing usage of “item tags” such as AirTags and Galaxy SmartTags, as well as apps lilke “Find my Friends” and “Find my Phone”.

    Spyware and Malicious Software
    Malicious software (malware) and physical spyware are a method of abuse that can be a lot harder to detect. A well programed malwares often can go unnoticed for extended periods, allowing the abuser to violate all aspects of their partner’s privacy. However, for someone without extensive tech knowledge, spyware can simply be installed onto a partner’s phone to be disguised or hidden from rousing suspicion with a phone’s customization fuctions.

  • Revenge porn victims are frequently blamed for suffering the consequences of their own action. This is an unproductive view because it overlooks the problem and validates the aggressor's behavior. It stigmatizes sexual exploration, which is simply part of a healthy relationships.

    Many platforms and websites have mechanisms in place to report and remove revenge porn content. Victims should seek help from these resources and report the distribution to law enforcement when appropriate.

  • Using digital means, abusers can manipulate or restrict their partner’s access and decision-making in various aspects of their life. This form of control can encompass anything from social accounts to legal and financial decisions.

    Social Media
    By maintaining control over the partner’s social media, the abuse has the ability to manipulate the profile of the victim to isolate them from friends and family by limit their ability to communicate, and damage their reputation.

    Financial abuse
    By controlling their partner’s banking accounts, credit cards, and financial decisions, the abuser ensures the partner must rely on them for monetary needs, thus diminishing their independence.

    Power imbalance
    If the abuser maintains access to their social and financial accounts, the information obtained within those accounts will only widen the power imbalance between the partners and the victim may feel compelled to comply out of fear or concern for their safety.