| Literature DB >> 32930073 |
Aikaterini Grimani1, Anna Gavine2, Wendy Moncur3.
Abstract
This systematic review synthesizes evidence of how people use the internet to deploy covert strategies around escaping from, or perpetrating, intimate partner violence (IPV). Online tools and services can facilitate individuals leaving abusive relationships, yet they can also act as a barrier to departure. They may also enable abusive behaviors. A comprehensive literature search of published and unpublished studies in electronic databases was conducted. Two researchers independently screened abstracts and full texts for study eligibility and evaluated the quality of included studies. The systematic review includes 22 studies (9 qualitative and 11 cross-sectional studies, a randomized control trial [RCT] and a nonrandomized study [NRS]) published between 2004 and 2017. Four covert behaviors linked to covert online strategies around IPV were identified: presence online, granular control, use of digital support tools and services, and stalking and surveillance. The same technology that provides individuals with easy access to information and supportive services related to IPV, such as digital devices, tools, and services, also enables perpetrators to monitor or harass their partners. This review takes a rigorous interdisciplinary approach to synthesizing knowledge on the covert strategies adopted by people in relation to IPV. It has particular relevance to practitioners who support survivors in increasing awareness of the role of digital technologies in IPV, to law enforcement agencies in identifying new forms of evidence of abuse, and in enabling designers of online/social media applications to take the needs and vulnerabilities of IPV survivors into account.Entities:
Keywords: covert behaviors; digital technologies; interpersonal electronic surveillance; intimate partner violence; social networking sites
Mesh:
Year: 2020 PMID: 32930073 PMCID: PMC8905127 DOI: 10.1177/1524838020957985
Source DB: PubMed Journal: Trauma Violence Abuse ISSN: 1524-8380
Figure 1.Flowchart of the study selection process used for the systematic review.
Covert Strategies Related to IPV.
| Covert Strategies | No. of Studies and References | |
|---|---|---|
| Presence online | 9 | ( |
| Granular control | 7 | ( |
| Technological interventions | 8 | ( |
| Stalking and surveillance | 14 | ( |
Note. IPV = intimate partner violence.
Technology Which Enables Concealed and Supportive Behaviors Related to IPV.
| Facilitators | No. of Studies and References | |
|---|---|---|
| Digital devices | 8 | ( |
| Digital tools and services | 6 | ( |
Note. IPV = intimate partner violence.
Technology Which Deters Concealed and Supported Behaviors Related to IPV.
| Barriers | No. of Studies and References | |
|---|---|---|
| Social networking sites | 8 | ( |
| Digital devices | 9 | ( |
| Digital tools and services | 7 | ( |
Note. IPV = intimate partner violence.
Summary of Critical Findings.
| Strategies | Facilitators to Effective Implementation of the Strategies | Barriers to Effective Implementation of the Strategies |
|---|---|---|
| Presence online Restricted present online/use of technology ( Use of communication channels ( Access to supportive resources ( | Digital devices Smartphone ( Computer with access to the internet/email ( | Social networking sites Facebook ( |
| Digital tools and services Web applications ( Mobile application ( Software ( | Digital devices GPS device; computer; mobile phone ( | |
| Digital tools and services Blocking tools ( Monitoring tools ( Spyware ( | ||
| Granular control Anonymous email accounts ( Blocking mechanisms ( Strengthened privacy settings ( Limited or avoiding sharing information online ( | Digital devices Computer ( Smartphone ( | Social networking sites Facebook and other social media ( |
| Digital tools and services Phone and computer-related services ( Google search ( Caller ID or call blocking ( Software ( Web applications ( | Digital devices GPS device; computer; mobile phone ( Video or digital cameras; GPS device; listening devices ( Mobile phone ( | |
| Digital tools and services Blocking tools ( Spyware ( Monitoring tools ( | ||
| Use of digital support tools and services Digital interventions: Online Safety Planning Intervention ( Online support services ( | Digital devices Computer; mobile phone; smartphone ( Tablet ( MIVO (e-mail device) ( | Digital devices Computer ( Tablet ( |
| Digital tools and services Phone and computer-related services/applications ( Google search ( | ||
| Stalking and Surveillance Stalking ( Surveillance and monitoring ( Sexting coercion ( | Digital devices Computer ( | Social networking sites Facebook and other social media ( |
| Digital tools and services Phone and computer-related services ( Google search ( Software ( Caller ID or call blocking ( | Digital devices GPS device; computer; mobile phone ( Monitoring devices ( Video or digital cameras; GPS device; listening devices ( | |
| Digital tools and services Monitoring tools ( Email monitoring ( Spyware ( |