Recognizing and Combating Technology-Facilitated Abuse
/In addition to Domestic Violence Awareness Month, October is also recognized as National Cyber Security Awareness Month.
Online Harassment is Abuse
One misconception about technology-facilitated abuse is that online harassment is not “real” abuse, that the harassment or threats they receive online may not be credible or as scary. Yet, not only can online threats be extremely terrifying, but much of this abuse is often tied to offline behaviors, including stalking and assault. Victims’ experiences are often minimized as they are told to just “get offline,” “change their number,” or “log off.” When so many of us live and work online, disconnecting is not a sustainable solution. We instead focus on educating survivors on helpful safety planning strategies, including creating strong passwords, locking down their accounts, and documenting instances of abuse and harassment. However, for there to be true cyber security for victims of violence, we must work to stop the abusive and harmful behaviors and tactics that are often perpetrated online.
Technology-facilitated abuse is a serious issue that does not always remain online and could possibly escalate to other forms of violence. [1] The presence of technology in our lives today is also vastly different than 50 years ago. How we look for employment, stay connected to friends and family, or even use transportation all requires some interaction with technology. Studies show that 74 percent of adults who are online use a social networking site [2] and 81 percent of adult cell phone owners send and receive text messages. [3] Technology can give victims access to important resources and services and allow them to stay connected to their loved ones and other support systems. While safety planning provides important steps to give control back to survivors, creating safe online environments should also be a priority of advocates, service providers, technologists, and law enforcement.
In a survey conducted by NNEDV, 97 percent of domestic violence programs reported that abusers use technology to stalk, harass, and control victims. Nearly 80 percent of programs reported that abusers monitor survivors’ social media accounts and 86 percent reported that victims are harassed through social media. [4] One in four stalking victims report cyber stalking, which includes receiving unwanted emails, text messaging, and social media surveillance and/or harassment. [5] All of these behaviors - harassing, monitoring, and unwanted calls and text messages, creates a pattern of stalking and abusive tactics that aims to control the victim and to further instill fear. [6]
Technology is Not the Problem
It’s important to recognize that technology is not the enemy. Asking a survivor to log off, press delete, or not use social media, will not stop the abuse from happening. If we really want to increase cyber security, we must hold bad actors accountable for their actions. This means that we must address the sharing of nonconsensual personal images, take threats and harassment seriously, and call out rape culture that is tweeted, texted, or shared.
While there are some limitations to monitoring technology-facilitated abuse and proving who is behind abuse, [4] there has been tremendous effort in creating policies around privacy, victim confidentiality, and technology safety.
NNEDV’s Safety Net project is dedicated to looking at the intersection of technology and intimate partner violence, and addresses how technology impacts the safety, privacy, accessibility, and civil rights of victims. In addition to training, education and advocacy, the Safety Net project offers a host of resources and tip sheets for survivors and agencies working with survivors.
Get Involved
Visit techsafety.org to learn more about technology, privacy, and safety as it relates to survivors of abuse and the programs that serve them.
This month, we are challenging widely-held perceptions about domestic violence using the hashtag #31n31 – and this week we are focusing on technology safety-related misconceptions. (See the entire campaign on Pinterest.)
Learn more about Cyber Security Awareness month and other ways you can be involved at Stay Safe Online.
[1] Matthew J. Breiding et al., (2014). Prevalence and Characteristics of Sexual Violence, Stalking, and Intimate Partner Violence Victimization – National Intimate Partner and Sexual Violence Survey, United States, 2011. Centers for Disease Control and Prevention Morbidity and Mortality Weekly Report, 63(8). http://www.cdc.gov/mmwr/pdf/ss/ss6308.pdf
[2] Social Media Use Over Time: Pew Research Center http://www.pewinternet.org/data-trend/social-media/social-media-use-all-users/
[3] Cell Phone Activities: Pew Research Center http://www.pewinternet.org/data-trend/mobile/cell-phone-activities/
[4] A Glimpse From the Field: How Abusers Are Misusing Technology (2014)https://static1.squarespace.com/static/51dc541ce4b03ebab8c5c88c/t/54e3d1b6e4b08500fcb455a0/1424216502058/NNEDV_Glimpse+From+the+Field+-+2014.pdf
[5] Katrina Baum et al., (2009) “Stalking Victimization in the United States,” (Washington, DC:BJS, 2009) https://victimsofcrime.org/docs/src/baum-k-catalano-s-rand-m-rose-k-2009.pdf?sfvrsn=0
[6] Fraser, C., Olsen, E., Lee, K., Southworth, C., & Tucker, S. (2010). The new age of stalking: Technological implications for stalking. Juvenile & Family Court Journal, 61(4), 39-55.