ABSTRACT
The shutdown measures necessary to stop the spread of COVID-19 have amplified the role of technology in intimate partner violence (IPV). Survivors may be forced to endure lockdowns with their abusers, intensifying the dangers of technology-enabled abuse (e.g. stalking, harassment, monitoring, surveillance). They may also be forced to rely on potentially compromised devices to reach support networks: a dangerous dilemma for digital safety. This qualitative study examines how technologists with computer security expertise provided remote assistance to IPV survivors during the pandemic. Findings from 24 consults with survivors and five focus groups with technologist consultants show how remote delivery of technology support services raised three fundamental challenges: (1) ensuring safety for survivors and consultants; (2) assessing device security over a remote connection; and (3) navigating new burdens for consultants, including emotional labor. We highlight implications for HCI researchers creating systems that enable access to remote expert services for vulnerable people.
- Yusuf Akamoglu, Hedda Meadan, Jamie N Pearson, and Katrina Cummings. 2018. Getting connected: Speech and language pathologists’ perceptions of building rapport via telepractice. Journal of Developmental and Physical Disabilities 30, 4(2018), 569–585.Google ScholarCross Ref
- I Elaine Allen and Jeff Seaman. 2013. Changing course: Ten years of tracking online education in the United States. ERIC.Google Scholar
- Apple. 2020. Official Apple Support. https://support.apple.com.Google Scholar
- Blake E Ashforth and Ronald H Humphrey. 1993. Emotional labor in service roles: The influence of identity. Academy of management review 18, 1 (1993), 88–115.Google Scholar
- Brittany Bice-Urbach, Tom Kratochwill, and Aaron J Fischer. 2018. Teleconsultation: Application to provision of consultation services for school consultants. Journal of Educational and Psychological Consultation 28, 3(2018), 255–278.Google ScholarCross Ref
- Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77–101.Google Scholar
- Gretchen A Brenes, Cobi W Ingram, and Suzanne C Danhauer. 2011. Benefits and challenges of conducting psychotherapy by telephone.Professional Psychology: Research and Practice 42, 6 (2011), 543.Google Scholar
- Brian E Bride, Melissa Radey, and Charles R Figley. 2007. Measuring compassion fatigue. Clinical social work journal 35, 3 (2007), 155–163.Google Scholar
- Laura Brignone and Jeffrey L Edleson. 2019. The Dating and Domestic Violence App Rubric: Synthesizing Clinical Best Practices and Digital Health App Standards for Relationship Violence Prevention Smartphone Apps. International Journal of Human–Computer Interaction 35, 19(2019), 1859–1869.Google Scholar
- Céleste M Brotheridge and Alicia A Grandey. 2002. Emotional labor and burnout: Comparing two perspectives of “people work”. Journal of vocational behavior 60, 1 (2002), 17–39.Google ScholarCross Ref
- Andrew M Campbell. 2020. An increasing risk of family violence during the Covid-19 pandemic: Strengthening community collaborations to save lives. Forensic Science International: Reports(2020), 100089.Google Scholar
- Rebecca Campbell. 2013. Emotionally involved: The impact of researching rape. Routledge.Google Scholar
- Joht Singh Chandan, Julie Taylor, Caroline Bradbury-Jones, Krishnarajah Nirantharakumar, Eddie Kane, and Siddhartha Bandyopadhyay. 2020. COVID-19: a public health approach to manage domestic violence is needed. The Lancet Public Health 5, 6 (2020), e309.Google ScholarCross Ref
- Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, and Thomas Ristenpart. 2018. The spyware used in intimate partner violence. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 441–458.Google ScholarCross Ref
- Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena Vakali. 2017. Measuring# gamergate: A tale of hate, sexism, and bullying. In Proceedings of the 26th international conference on world wide web companion. 1285–1290.Google ScholarDigital Library
- Ok-Kyu Choi and Erin Cho. 2019. The mechanism of trust affecting collaboration in virtual teams and the moderating roles of the culture of autonomy and task complexity. Computers in Human Behavior 91 (2019), 305–315.Google ScholarCross Ref
- Jan Coles, Jill Astbury, Elizabeth Dartnall, and Shazneen Limjerwala. 2014. A qualitative exploration of researcher trauma and researchers’ responses to investigating sexual violence. Violence against women 20, 1 (2014), 95–117.Google Scholar
- Sasha Costanza-Chock. 2018. Design Justice: towards an intersectional feminist framework for design theory and practice. Proceedings of the Design Research Society(2018).Google ScholarCross Ref
- Andy Crabtree, Jacki O’Neill, Peter Tolmie, Stefania Castellani, Tommaso Colombino, and Antonietta Grasso. 2006. The practical indispensability of articulation work to immediate and remote help-giving. In Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work. 219–228.Google ScholarDigital Library
- Ronald J. Deibert. [n.d.]. The Citizen Lab. https://citizenlab.ca/.Google Scholar
- Jill P Dimond, Casey Fiesler, and Amy S Bruckman. 2011. Domestic violence and information communication technologies. Interacting with Computers 23, 5 (2011), 413–421.Google ScholarDigital Library
- Lynn Dombrowski, Ellie Harmon, and Sarah Fox. 2016. Social justice-oriented interaction design: Outlining key design strategies and commitments. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems. 656–671.Google ScholarDigital Library
- Molly Dragiewicz, Delanie Woodlock, Bridget Harris, and Claire Reid. 2019. Technology-facilitated coercive control. The Routledge international handbook of violence studies (2019), 244–253.Google Scholar
- Carolyn Ellis and Art Bochner. 2000. Autoethnography, personal narrative, reflexivity: Researcher as subject. (2000).Google Scholar
- Chuka Emezue. 2020. Digital or digitally delivered responses to domestic and intimate partner violence during CoViD-19. JMIR public health and surveillance 6, 3 (2020), e19831.Google Scholar
- Technology enabled Coercive Control Working Group. [n.d.]. TECHNOLOGY-ENABLED COERCIVE CONTROL WORKING GROUP, SEATTLE, WA, USA.https://teccworkinggroup.org/.Google Scholar
- NYC ENDGBV. 2019. NYC Mayor’s Office to Combat Domestic and Gender-Based Violence. https://www1.nyc.gov/site/ocdv/about/about-endgbv.page.Google Scholar
- Sheena Erete and Jennifer O Burrell. 2017. Empowered participation: How citizens use technology in local governance. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 2307–2319.Google ScholarDigital Library
- Sheena Erete, Aarti Israni, and Tawanna Dillahunt. 2018. An intersectional approach to designing in the margins. Interactions 25, 3 (2018), 66–69.Google ScholarDigital Library
- Operation: Safe Escape. 2020. About Us - Operation: Safe Escape. https://safeescape.org/about/.Google Scholar
- Rose Eveleth. 2015. How to deter doxxing: newsroom strategies to prevent the harassment that can follow public posting of personal information. Nieman Reports 3(2015), 46.Google Scholar
- Charles R Figley. 2002. Treating compassion fatigue. Routledge.Google Scholar
- NYC FJCs. 2019. NYC Family Justice Centers. https://www1.nyc.gov/site/ocdv/programs/family-justice-centers.page.Google Scholar
- UC Berkeley Center for Longterm Cybersecurity. [n.d.]. Citizen Clinic. https://cltc.berkeley.edu/citizen-clinic/.Google Scholar
- John C Fortney, Jeffrey M Pyne, Eric E Turner, Kellee M Farris, Tre M Normoyle, Marc D Avery, Donald M Hilty, and Jürgen Unützer. 2015. Telepsychiatry integration of mental health services into rural primary care settings. International Review of Psychiatry 27, 6 (2015), 525–539.Google ScholarCross Ref
- Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, and Nicola Dell. 2019. ” Is my phone hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence. Proceedings of the ACM on Human-Computer Interaction 3, CSCW(2019), 1–24.Google ScholarDigital Library
- Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2017. Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders. PACM: Human-Computer Interaction: Computer-Supported Cooperative Work and Social Computing (CSCW) Vol. 1, No. 2 (2017), Article 46.Google Scholar
- Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2018. ”A Stalker’s Paradise” How Intimate Partner Abusers Exploit Technology. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1–13.Google ScholarDigital Library
- Lee Ann Fujii. 2017. Interviewing in social science research: A relational approach. Routledge.Google Scholar
- Ryan Gabrielson, R. Grochowski Jones, and Eric Sagara. 2014. Deadly Force, in Black and White: A Pro Publica analysis of killings by police shows outsize risk for young black males. ProPublica: Journalism in the Public Interest (2014).Google Scholar
- Aakash Gautam, Deborah Tatar, and Steve Harrison. 2019. Adding Voices to Support Web Navigation Among a Low Digital Literacy Group. In Companion Publication of the 2019 on Designing Interactive Systems Conference 2019 Companion. 165–169.Google ScholarDigital Library
- Liza H Gold. 2020. Domestic Violence, Firearms, and Mass Shootings.The journal of the American Academy of Psychiatry and the Law 48, 1(2020), 35–42.Google Scholar
- Diarmaid Harkin. 2019. Regulating private sector security provision for victims of domestic violence. Theoretical criminology 23, 3 (2019), 415–432.Google ScholarCross Ref
- Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2019. Clinical computer security for victims of intimate partner violence. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 105–122.Google Scholar
- Leigh Honeywell. 2019. Personal communication.Google Scholar
- Kathrine Huntington. 2020. Journalism in the Age of Doxxing. (2020).Google Scholar
- Shanti Kulkarni. 2019. Intersectional trauma-informed intimate partner violence (IPV) services: Narrowing the gap between IPV service delivery and survivor needs. Journal of family violence 34, 1 (2019), 55–64.Google ScholarCross Ref
- Jorge Larreamendy-Joerns and Gaea Leinhardt. 2006. Going the distance with online education. Review of educational research 76, 4 (2006), 567–605.Google Scholar
- Karen Levy and Bruce Schneier. 2020. Privacy threats in intimate relationships. Journal of Cybersecurity 6, 1 (2020), tyaa006.Google ScholarCross Ref
- Michael Massimi, Jill P Dimond, and Christopher A Le Dantec. 2012. Finding a new normal: the role of technology in life disruptions. In Proceedings of the acm 2012 conference on computer supported cooperative work. 719–728.Google ScholarDigital Library
- Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F Churchill, and Sunny Consolvo. 2017. Stories from survivors: Privacy & security practices when coping with intimate partner abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 2189–2201.Google ScholarDigital Library
- Brendan R McDonald, Robert D Morgan, and Patrick S Metze. 2016. The attorney-client working relationship: A comparison of in-person versus videoconferencing modalities.Psychology, Public Policy, and Law 22, 2 (2016), 200.Google ScholarCross Ref
- Diana Nadine Moreira and Mariana Pinto da Costa. 2020. The impact of the Covid-19 pandemic in the precipitation of intimate partner violence. International journal of law and psychiatry 71 (2020), 101606.Google ScholarCross Ref
- J Andrew Morris and Daniel C Feldman. 1996. The dimensions, antecedents, and consequences of emotional labor. Academy of management review 21, 4 (1996), 986–1010.Google ScholarCross Ref
- David T Nguyen and John Canny. 2009. More than face-to-face: empathy effects of video framing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 423–432.Google ScholarDigital Library
- Bureau of Labor Statistics. [n.d.]. Workplace Violence in Healthcare, 2018. https://www.bls.gov/iif/oshwc/cfoi/workplace-violence-healthcare-2018.htmGoogle Scholar
- Vicente Peñarroja, Virginia Orengo, Ana Zornoza, and Ana Hernández. 2013. The effects of virtuality level on task-related collaborative behaviors: The mediating role of team trust. Computers in Human Behavior 29, 3 (2013), 967–974.Google ScholarDigital Library
- Sachin R Pendse, Faisal M Lalani, Munmun De Choudhury, Amit Sharma, and Neha Kumar. 2020. ” Like Shock Absorbers”: Understanding the Human Infrastructures of Technology-Mediated Mental Health Support. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–14.Google ScholarDigital Library
- Stephen A Rains, Steven R Brunner, Chelsie Akers, Corey A Pavlich, and Selin Goktas. 2017. Computer-mediated communication (CMC) and social support: Testing the effects of using CMC on support outcomes. Journal of Social and Personal Relationships 34, 8(2017), 1186–1205.Google ScholarCross Ref
- Abhilasha Ravichander and Alan W Black. 2018. An empirical study of self-disclosure in spoken dialogue systems. In Proceedings of the 19th Annual SIGdial Meeting on Discourse and Dialogue. 253–263.Google ScholarCross Ref
- Rosalie J Russo-Gleicher. 2014. Improving student retention in online college classes: Qualitative insights from faculty. Journal of College Student Retention: Research, Theory & Practice 16, 2(2014), 239–260.Google ScholarCross Ref
- Phoebe Sengers, John McCarthy, and Paul Dourish. 2006. Reflective HCI: Articulating an Agenda for Critical Practice. In CHI ’06 Extended Abstracts on Human Factors in Computing Systems (Montréal, Québec, Canada) (CHI EA ’06). Association for Computing Machinery, New York, NY, USA, 1683–1686. https://doi.org/10.1145/1125451.1125762Google ScholarDigital Library
- Anthony C Smith, Emma Thomas, Centaine L Snoswell, Helen Haydon, Ateev Mehrotra, Jane Clemensen, and Liam J Caffery. 2020. Telehealth for global emergencies: Implications for coronavirus disease 2019 (COVID-19). Journal of telemedicine and telecare(2020), 1357633X20916567.Google Scholar
- Jessica Soedirgo and Aarie Glas. 2020. Toward Active Reflexivity: Positionality and Practice in the Production of Knowledge. PS: Political Science & Politics 53, 3 (2020), 527–531.Google ScholarCross Ref
- Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, and Sarah Tucker. 2007. Intimate partner violence, technology, and stalking. Violence against women 13, 8 (2007), 842–856.Google Scholar
- Geek Squad. 2020. Geek Squad services. https://www.geeksquad.com.Google Scholar
- Coalition Against Stalkerware. 2020. Coalition Against Stalkerware. https://stopstalkerware.org/.Google Scholar
- Evan Stark. 2009. Coercive control: The entrapment of women in personal life. Oxford University Press.Google Scholar
- Ronnie J Steinberg. 1999. Emotional labor in job evaluation: Redesigning compensation practices. The Annals of the American Academy of Political and Social Science 561, 1(1999), 143–157.Google ScholarCross Ref
- Jina Suh, Eric Horvitz, Ryen W White, and Tim Althoff. 2020. Population-Scale Study of Human Needs During the COVID-19 Pandemic: Analysis and Implications. arXiv preprint arXiv:2008.07045(2020).Google Scholar
- Linda Tickle-Degnen and Robert Rosenthal. 1990. The nature of rapport and its nonverbal correlates. Psychological inquiry 1, 4 (1990), 285–293.Google Scholar
- National Network to End Domestic Violence Safety Net Project. 2020. Response to the COVID-19 Pandemic. https://www.techsafety.org/covid19.Google Scholar
- National Network to End Domestic Violence Safety Net Project. 2020. Safety Net Apps. https://www.techsafety.org/safetynetapps.Google Scholar
- National Network to End Domestic Violence Safety Net Project. 2020. Technology Safety. https://www.techsafety.org/.Google Scholar
- Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2020. The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 1893–1909. https://www.usenix.org/conference/usenixsecurity20/presentation/tsengGoogle Scholar
- Emily Tseng, Fabian Okeke, Madeline Sterling, and Nicola Dell. 2020. ” We can learn. Why not?” Designing Technologies to Engender Equity for Home Health Aides. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–14.Google ScholarDigital Library
- Jean M Twenge, Brian H Spitzberg, and W Keith Campbell. 2019. Less in-person social interaction with peers among US adolescents in the 21st century and links to loneliness. Journal of Social and Personal Relationships 36, 6(2019), 1892–1913.Google ScholarCross Ref
- Kim Usher, Navjot Bhullar, Joanne Durkin, Naomi Gyamfi, and Debra Jackson. 2020. Family violence and COVID-19: Increased vulnerability and reduced options for support. International journal of mental health nursing (2020).Google ScholarCross Ref
- N Van Gelder, A Peterman, A Potts, M O’Donnell, K Thompson, N Shah, and S Oertelt-Prigione. 2020. COVID-19: Reducing the risk of infection might increase the risk of intimate partner violence. EClinicalMedicine 21(2020).Google Scholar
- Peter M Vernig. 2016. Telemental Health: Digital disruption and the opportunity to expand care. Journal of the American Psychiatric Nurses Association 22, 1(2016), 73–75.Google ScholarCross Ref
- Douglas M Walls, Brandy Dieterle, and Jennifer Roth Miller. 2018. Safely social: User-centered design and difference feminism. COMPOSING FEMINIST INTERVENTIONS: ACTIVISM, ENGAGEMENT, PRAXIS (2018), 391.Google Scholar
- John Wihbey and Leighton Walter Kille. 2015. Excessive or reasonable force by police? Research on law enforcement and racial conflict. Journalist’s Resource(2015).Google Scholar
- UN Women. 2020. The COVID-19 shadow pandemic: Domestic violence in the world of work: A call to action for the private sector. https://www.unwomen.org/en/digital-library/publications/2020/06/brief-domestic-violence-in-the-world-of-work.Google Scholar
- Delanie Woodlock. 2017. The abuse of technology in domestic violence and stalking. Violence against women 23, 5 (2017), 584–602.Google Scholar
- Odette Zero and Meghan Geary. 2020. COVID-19 and Intimate Partner Violence: A Call to Action.Rhode Island Medical Journal 103, 5 (2020).Google Scholar
Index Terms
- A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19
Recommendations
Care Infrastructures for Digital Security in Intimate Partner Violence
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsSurvivors of intimate partner violence (IPV) face complex threats to their digital privacy and security. Prior work has established protocols for directly helping them mitigate these harms; however, there remains a need for flexible and pluralistic ...
"Is my phone hacked?" Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence
Intimate partner abusers use technology to track, monitor, harass, and otherwise harm their victims, and prior work reports that victims have few resources for obtaining help with such attacks. This paper presents a qualitative analysis of data from a ...
Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders
Digital technologies, including mobile devices, cloud computing services, and social networks, play a nuanced role in intimate partner violence (IPV) settings, including domestic abuse, stalking, and surveillance of victims by abusive partners. However, ...
Comments