skip to main content
10.1145/3411764.3445589acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19

Published:07 May 2021Publication History

ABSTRACT

The shutdown measures necessary to stop the spread of COVID-19 have amplified the role of technology in intimate partner violence (IPV). Survivors may be forced to endure lockdowns with their abusers, intensifying the dangers of technology-enabled abuse (e.g. stalking, harassment, monitoring, surveillance). They may also be forced to rely on potentially compromised devices to reach support networks: a dangerous dilemma for digital safety. This qualitative study examines how technologists with computer security expertise provided remote assistance to IPV survivors during the pandemic. Findings from 24 consults with survivors and five focus groups with technologist consultants show how remote delivery of technology support services raised three fundamental challenges: (1) ensuring safety for survivors and consultants; (2) assessing device security over a remote connection; and (3) navigating new burdens for consultants, including emotional labor. We highlight implications for HCI researchers creating systems that enable access to remote expert services for vulnerable people.

References

  1. Yusuf Akamoglu, Hedda Meadan, Jamie N Pearson, and Katrina Cummings. 2018. Getting connected: Speech and language pathologists’ perceptions of building rapport via telepractice. Journal of Developmental and Physical Disabilities 30, 4(2018), 569–585.Google ScholarGoogle ScholarCross RefCross Ref
  2. I Elaine Allen and Jeff Seaman. 2013. Changing course: Ten years of tracking online education in the United States. ERIC.Google ScholarGoogle Scholar
  3. Apple. 2020. Official Apple Support. https://support.apple.com.Google ScholarGoogle Scholar
  4. Blake E Ashforth and Ronald H Humphrey. 1993. Emotional labor in service roles: The influence of identity. Academy of management review 18, 1 (1993), 88–115.Google ScholarGoogle Scholar
  5. Brittany Bice-Urbach, Tom Kratochwill, and Aaron J Fischer. 2018. Teleconsultation: Application to provision of consultation services for school consultants. Journal of Educational and Psychological Consultation 28, 3(2018), 255–278.Google ScholarGoogle ScholarCross RefCross Ref
  6. Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77–101.Google ScholarGoogle Scholar
  7. Gretchen A Brenes, Cobi W Ingram, and Suzanne C Danhauer. 2011. Benefits and challenges of conducting psychotherapy by telephone.Professional Psychology: Research and Practice 42, 6 (2011), 543.Google ScholarGoogle Scholar
  8. Brian E Bride, Melissa Radey, and Charles R Figley. 2007. Measuring compassion fatigue. Clinical social work journal 35, 3 (2007), 155–163.Google ScholarGoogle Scholar
  9. Laura Brignone and Jeffrey L Edleson. 2019. The Dating and Domestic Violence App Rubric: Synthesizing Clinical Best Practices and Digital Health App Standards for Relationship Violence Prevention Smartphone Apps. International Journal of Human–Computer Interaction 35, 19(2019), 1859–1869.Google ScholarGoogle Scholar
  10. Céleste M Brotheridge and Alicia A Grandey. 2002. Emotional labor and burnout: Comparing two perspectives of “people work”. Journal of vocational behavior 60, 1 (2002), 17–39.Google ScholarGoogle ScholarCross RefCross Ref
  11. Andrew M Campbell. 2020. An increasing risk of family violence during the Covid-19 pandemic: Strengthening community collaborations to save lives. Forensic Science International: Reports(2020), 100089.Google ScholarGoogle Scholar
  12. Rebecca Campbell. 2013. Emotionally involved: The impact of researching rape. Routledge.Google ScholarGoogle Scholar
  13. Joht Singh Chandan, Julie Taylor, Caroline Bradbury-Jones, Krishnarajah Nirantharakumar, Eddie Kane, and Siddhartha Bandyopadhyay. 2020. COVID-19: a public health approach to manage domestic violence is needed. The Lancet Public Health 5, 6 (2020), e309.Google ScholarGoogle ScholarCross RefCross Ref
  14. Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, and Thomas Ristenpart. 2018. The spyware used in intimate partner violence. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 441–458.Google ScholarGoogle ScholarCross RefCross Ref
  15. Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena Vakali. 2017. Measuring# gamergate: A tale of hate, sexism, and bullying. In Proceedings of the 26th international conference on world wide web companion. 1285–1290.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Ok-Kyu Choi and Erin Cho. 2019. The mechanism of trust affecting collaboration in virtual teams and the moderating roles of the culture of autonomy and task complexity. Computers in Human Behavior 91 (2019), 305–315.Google ScholarGoogle ScholarCross RefCross Ref
  17. Jan Coles, Jill Astbury, Elizabeth Dartnall, and Shazneen Limjerwala. 2014. A qualitative exploration of researcher trauma and researchers’ responses to investigating sexual violence. Violence against women 20, 1 (2014), 95–117.Google ScholarGoogle Scholar
  18. Sasha Costanza-Chock. 2018. Design Justice: towards an intersectional feminist framework for design theory and practice. Proceedings of the Design Research Society(2018).Google ScholarGoogle ScholarCross RefCross Ref
  19. Andy Crabtree, Jacki O’Neill, Peter Tolmie, Stefania Castellani, Tommaso Colombino, and Antonietta Grasso. 2006. The practical indispensability of articulation work to immediate and remote help-giving. In Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work. 219–228.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Ronald J. Deibert. [n.d.]. The Citizen Lab. https://citizenlab.ca/.Google ScholarGoogle Scholar
  21. Jill P Dimond, Casey Fiesler, and Amy S Bruckman. 2011. Domestic violence and information communication technologies. Interacting with Computers 23, 5 (2011), 413–421.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Lynn Dombrowski, Ellie Harmon, and Sarah Fox. 2016. Social justice-oriented interaction design: Outlining key design strategies and commitments. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems. 656–671.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Molly Dragiewicz, Delanie Woodlock, Bridget Harris, and Claire Reid. 2019. Technology-facilitated coercive control. The Routledge international handbook of violence studies (2019), 244–253.Google ScholarGoogle Scholar
  24. Carolyn Ellis and Art Bochner. 2000. Autoethnography, personal narrative, reflexivity: Researcher as subject. (2000).Google ScholarGoogle Scholar
  25. Chuka Emezue. 2020. Digital or digitally delivered responses to domestic and intimate partner violence during CoViD-19. JMIR public health and surveillance 6, 3 (2020), e19831.Google ScholarGoogle Scholar
  26. Technology enabled Coercive Control Working Group. [n.d.]. TECHNOLOGY-ENABLED COERCIVE CONTROL WORKING GROUP, SEATTLE, WA, USA.https://teccworkinggroup.org/.Google ScholarGoogle Scholar
  27. NYC ENDGBV. 2019. NYC Mayor’s Office to Combat Domestic and Gender-Based Violence. https://www1.nyc.gov/site/ocdv/about/about-endgbv.page.Google ScholarGoogle Scholar
  28. Sheena Erete and Jennifer O Burrell. 2017. Empowered participation: How citizens use technology in local governance. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 2307–2319.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Sheena Erete, Aarti Israni, and Tawanna Dillahunt. 2018. An intersectional approach to designing in the margins. Interactions 25, 3 (2018), 66–69.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Operation: Safe Escape. 2020. About Us - Operation: Safe Escape. https://safeescape.org/about/.Google ScholarGoogle Scholar
  31. Rose Eveleth. 2015. How to deter doxxing: newsroom strategies to prevent the harassment that can follow public posting of personal information. Nieman Reports 3(2015), 46.Google ScholarGoogle Scholar
  32. Charles R Figley. 2002. Treating compassion fatigue. Routledge.Google ScholarGoogle Scholar
  33. NYC FJCs. 2019. NYC Family Justice Centers. https://www1.nyc.gov/site/ocdv/programs/family-justice-centers.page.Google ScholarGoogle Scholar
  34. UC Berkeley Center for Longterm Cybersecurity. [n.d.]. Citizen Clinic. https://cltc.berkeley.edu/citizen-clinic/.Google ScholarGoogle Scholar
  35. John C Fortney, Jeffrey M Pyne, Eric E Turner, Kellee M Farris, Tre M Normoyle, Marc D Avery, Donald M Hilty, and Jürgen Unützer. 2015. Telepsychiatry integration of mental health services into rural primary care settings. International Review of Psychiatry 27, 6 (2015), 525–539.Google ScholarGoogle ScholarCross RefCross Ref
  36. Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, and Nicola Dell. 2019. ” Is my phone hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence. Proceedings of the ACM on Human-Computer Interaction 3, CSCW(2019), 1–24.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2017. Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders. PACM: Human-Computer Interaction: Computer-Supported Cooperative Work and Social Computing (CSCW) Vol. 1, No. 2 (2017), Article 46.Google ScholarGoogle Scholar
  38. Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2018. ”A Stalker’s Paradise” How Intimate Partner Abusers Exploit Technology. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1–13.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Lee Ann Fujii. 2017. Interviewing in social science research: A relational approach. Routledge.Google ScholarGoogle Scholar
  40. Ryan Gabrielson, R. Grochowski Jones, and Eric Sagara. 2014. Deadly Force, in Black and White: A Pro Publica analysis of killings by police shows outsize risk for young black males. ProPublica: Journalism in the Public Interest (2014).Google ScholarGoogle Scholar
  41. Aakash Gautam, Deborah Tatar, and Steve Harrison. 2019. Adding Voices to Support Web Navigation Among a Low Digital Literacy Group. In Companion Publication of the 2019 on Designing Interactive Systems Conference 2019 Companion. 165–169.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Liza H Gold. 2020. Domestic Violence, Firearms, and Mass Shootings.The journal of the American Academy of Psychiatry and the Law 48, 1(2020), 35–42.Google ScholarGoogle Scholar
  43. Diarmaid Harkin. 2019. Regulating private sector security provision for victims of domestic violence. Theoretical criminology 23, 3 (2019), 415–432.Google ScholarGoogle ScholarCross RefCross Ref
  44. Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2019. Clinical computer security for victims of intimate partner violence. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 105–122.Google ScholarGoogle Scholar
  45. Leigh Honeywell. 2019. Personal communication.Google ScholarGoogle Scholar
  46. Kathrine Huntington. 2020. Journalism in the Age of Doxxing. (2020).Google ScholarGoogle Scholar
  47. Shanti Kulkarni. 2019. Intersectional trauma-informed intimate partner violence (IPV) services: Narrowing the gap between IPV service delivery and survivor needs. Journal of family violence 34, 1 (2019), 55–64.Google ScholarGoogle ScholarCross RefCross Ref
  48. Jorge Larreamendy-Joerns and Gaea Leinhardt. 2006. Going the distance with online education. Review of educational research 76, 4 (2006), 567–605.Google ScholarGoogle Scholar
  49. Karen Levy and Bruce Schneier. 2020. Privacy threats in intimate relationships. Journal of Cybersecurity 6, 1 (2020), tyaa006.Google ScholarGoogle ScholarCross RefCross Ref
  50. Michael Massimi, Jill P Dimond, and Christopher A Le Dantec. 2012. Finding a new normal: the role of technology in life disruptions. In Proceedings of the acm 2012 conference on computer supported cooperative work. 719–728.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F Churchill, and Sunny Consolvo. 2017. Stories from survivors: Privacy & security practices when coping with intimate partner abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 2189–2201.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Brendan R McDonald, Robert D Morgan, and Patrick S Metze. 2016. The attorney-client working relationship: A comparison of in-person versus videoconferencing modalities.Psychology, Public Policy, and Law 22, 2 (2016), 200.Google ScholarGoogle ScholarCross RefCross Ref
  53. Diana Nadine Moreira and Mariana Pinto da Costa. 2020. The impact of the Covid-19 pandemic in the precipitation of intimate partner violence. International journal of law and psychiatry 71 (2020), 101606.Google ScholarGoogle ScholarCross RefCross Ref
  54. J Andrew Morris and Daniel C Feldman. 1996. The dimensions, antecedents, and consequences of emotional labor. Academy of management review 21, 4 (1996), 986–1010.Google ScholarGoogle ScholarCross RefCross Ref
  55. David T Nguyen and John Canny. 2009. More than face-to-face: empathy effects of video framing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 423–432.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Bureau of Labor Statistics. [n.d.]. Workplace Violence in Healthcare, 2018. https://www.bls.gov/iif/oshwc/cfoi/workplace-violence-healthcare-2018.htmGoogle ScholarGoogle Scholar
  57. Vicente Peñarroja, Virginia Orengo, Ana Zornoza, and Ana Hernández. 2013. The effects of virtuality level on task-related collaborative behaviors: The mediating role of team trust. Computers in Human Behavior 29, 3 (2013), 967–974.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Sachin R Pendse, Faisal M Lalani, Munmun De Choudhury, Amit Sharma, and Neha Kumar. 2020. ” Like Shock Absorbers”: Understanding the Human Infrastructures of Technology-Mediated Mental Health Support. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–14.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Stephen A Rains, Steven R Brunner, Chelsie Akers, Corey A Pavlich, and Selin Goktas. 2017. Computer-mediated communication (CMC) and social support: Testing the effects of using CMC on support outcomes. Journal of Social and Personal Relationships 34, 8(2017), 1186–1205.Google ScholarGoogle ScholarCross RefCross Ref
  60. Abhilasha Ravichander and Alan W Black. 2018. An empirical study of self-disclosure in spoken dialogue systems. In Proceedings of the 19th Annual SIGdial Meeting on Discourse and Dialogue. 253–263.Google ScholarGoogle ScholarCross RefCross Ref
  61. Rosalie J Russo-Gleicher. 2014. Improving student retention in online college classes: Qualitative insights from faculty. Journal of College Student Retention: Research, Theory & Practice 16, 2(2014), 239–260.Google ScholarGoogle ScholarCross RefCross Ref
  62. Phoebe Sengers, John McCarthy, and Paul Dourish. 2006. Reflective HCI: Articulating an Agenda for Critical Practice. In CHI ’06 Extended Abstracts on Human Factors in Computing Systems (Montréal, Québec, Canada) (CHI EA ’06). Association for Computing Machinery, New York, NY, USA, 1683–1686. https://doi.org/10.1145/1125451.1125762Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Anthony C Smith, Emma Thomas, Centaine L Snoswell, Helen Haydon, Ateev Mehrotra, Jane Clemensen, and Liam J Caffery. 2020. Telehealth for global emergencies: Implications for coronavirus disease 2019 (COVID-19). Journal of telemedicine and telecare(2020), 1357633X20916567.Google ScholarGoogle Scholar
  64. Jessica Soedirgo and Aarie Glas. 2020. Toward Active Reflexivity: Positionality and Practice in the Production of Knowledge. PS: Political Science & Politics 53, 3 (2020), 527–531.Google ScholarGoogle ScholarCross RefCross Ref
  65. Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, and Sarah Tucker. 2007. Intimate partner violence, technology, and stalking. Violence against women 13, 8 (2007), 842–856.Google ScholarGoogle Scholar
  66. Geek Squad. 2020. Geek Squad services. https://www.geeksquad.com.Google ScholarGoogle Scholar
  67. Coalition Against Stalkerware. 2020. Coalition Against Stalkerware. https://stopstalkerware.org/.Google ScholarGoogle Scholar
  68. Evan Stark. 2009. Coercive control: The entrapment of women in personal life. Oxford University Press.Google ScholarGoogle Scholar
  69. Ronnie J Steinberg. 1999. Emotional labor in job evaluation: Redesigning compensation practices. The Annals of the American Academy of Political and Social Science 561, 1(1999), 143–157.Google ScholarGoogle ScholarCross RefCross Ref
  70. Jina Suh, Eric Horvitz, Ryen W White, and Tim Althoff. 2020. Population-Scale Study of Human Needs During the COVID-19 Pandemic: Analysis and Implications. arXiv preprint arXiv:2008.07045(2020).Google ScholarGoogle Scholar
  71. Linda Tickle-Degnen and Robert Rosenthal. 1990. The nature of rapport and its nonverbal correlates. Psychological inquiry 1, 4 (1990), 285–293.Google ScholarGoogle Scholar
  72. National Network to End Domestic Violence Safety Net Project. 2020. Response to the COVID-19 Pandemic. https://www.techsafety.org/covid19.Google ScholarGoogle Scholar
  73. National Network to End Domestic Violence Safety Net Project. 2020. Safety Net Apps. https://www.techsafety.org/safetynetapps.Google ScholarGoogle Scholar
  74. National Network to End Domestic Violence Safety Net Project. 2020. Technology Safety. https://www.techsafety.org/.Google ScholarGoogle Scholar
  75. Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2020. The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 1893–1909. https://www.usenix.org/conference/usenixsecurity20/presentation/tsengGoogle ScholarGoogle Scholar
  76. Emily Tseng, Fabian Okeke, Madeline Sterling, and Nicola Dell. 2020. ” We can learn. Why not?” Designing Technologies to Engender Equity for Home Health Aides. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–14.Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. Jean M Twenge, Brian H Spitzberg, and W Keith Campbell. 2019. Less in-person social interaction with peers among US adolescents in the 21st century and links to loneliness. Journal of Social and Personal Relationships 36, 6(2019), 1892–1913.Google ScholarGoogle ScholarCross RefCross Ref
  78. Kim Usher, Navjot Bhullar, Joanne Durkin, Naomi Gyamfi, and Debra Jackson. 2020. Family violence and COVID-19: Increased vulnerability and reduced options for support. International journal of mental health nursing (2020).Google ScholarGoogle ScholarCross RefCross Ref
  79. N Van Gelder, A Peterman, A Potts, M O’Donnell, K Thompson, N Shah, and S Oertelt-Prigione. 2020. COVID-19: Reducing the risk of infection might increase the risk of intimate partner violence. EClinicalMedicine 21(2020).Google ScholarGoogle Scholar
  80. Peter M Vernig. 2016. Telemental Health: Digital disruption and the opportunity to expand care. Journal of the American Psychiatric Nurses Association 22, 1(2016), 73–75.Google ScholarGoogle ScholarCross RefCross Ref
  81. Douglas M Walls, Brandy Dieterle, and Jennifer Roth Miller. 2018. Safely social: User-centered design and difference feminism. COMPOSING FEMINIST INTERVENTIONS: ACTIVISM, ENGAGEMENT, PRAXIS (2018), 391.Google ScholarGoogle Scholar
  82. John Wihbey and Leighton Walter Kille. 2015. Excessive or reasonable force by police? Research on law enforcement and racial conflict. Journalist’s Resource(2015).Google ScholarGoogle Scholar
  83. UN Women. 2020. The COVID-19 shadow pandemic: Domestic violence in the world of work: A call to action for the private sector. https://www.unwomen.org/en/digital-library/publications/2020/06/brief-domestic-violence-in-the-world-of-work.Google ScholarGoogle Scholar
  84. Delanie Woodlock. 2017. The abuse of technology in domestic violence and stalking. Violence against women 23, 5 (2017), 584–602.Google ScholarGoogle Scholar
  85. Odette Zero and Meghan Geary. 2020. COVID-19 and Intimate Partner Violence: A Call to Action.Rhode Island Medical Journal 103, 5 (2020).Google ScholarGoogle Scholar

Index Terms

  1. A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CHI '21: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems
          May 2021
          10862 pages
          ISBN:9781450380966
          DOI:10.1145/3411764

          Copyright © 2021 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 7 May 2021

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          Overall Acceptance Rate6,199of26,314submissions,24%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format