10,091
Views
58
CrossRef citations to date
0
Altmetric
Articles

Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control

ORCID Icon, , &
Pages 368-380 | Received 24 Aug 2018, Accepted 30 Jan 2019, Published online: 22 Jul 2019

References

  • Australian Association of Social Workers (AASW). (2010). Code of ethics. Canberra, Australia: Author.
  • Borrajo, E., Gámez-Guadix, M., Pereda, N., & Calvete, E. (2015). The development and validation of the cyber dating abuse questionnaire among young couples. Computers in Human Behavior, 48, 358–365. doi: 10.1016/j.chb.2015.01.063
  • Caulfield, L. (2015). ‘Us’ and ‘them’: Workers as survivors. DVRCV Advocate, Autumn/Winter.
  • Commonwealth of Australia. (2010). National plan to reduce violence against women and their children 2010–2022. Canberra, Australia: Department of the Prime Minister and Cabinet.
  • Commonwealth of Australia. (2016). COAG advisory panel on reducing violence against women and their children—Final report. Canberra, Australia: Department of the Prime Minister and Cabinet.
  • Coy, M., & Garner, M. (2012). Definitions, discourses and dilemmas: Policy and academic engagement with the sexualisation of popular culture. Gender and Education, 24(3), 285–301. doi: 10.1080/09540253.2012.667793
  • Domestic and Family Violence Death Review Advisory Board. (2016). Case review meeting 1: Perpetrator suicides and homicide suicides meeting communique. Brisbane, Australia: Department of Justice and Attorney-General.
  • Domestic Violence Death Review Team. (2015). NSW domestic violence death review team: Annual report 2013-2015. Sydney: Author.
  • Dragiewicz, M., Burgess, J., Matamoros-Fernández, A., Salter, M., Suzor, N. P., Woodlock, D., & Harris, B. (2018). Technology facilitated coercive control: Domestic violence and the competing roles of digital media platforms. Feminist Media Studies, 18(4), 609–625. doi: 10.1080/14680777.2018.1447341
  • Dwyer, J., & Miller, R. (2014). Working with families where an adult is violent: Best interest case practice model specialist practice resource. Melbourne, Australia: Department of Health and Human Services.
  • George, A., & Harris, B. (2014). Landscapes of violence: Women surviving family violence in regional and rural Victoria. Geelong, Australia: Centre for Rural Regional Law and Justice, Deakin University.
  • Goodman, L. A., & Epstein, D. (2008). Psychology of women. Listening to battered women: A survivor-centered approach to advocacy, mental health, and justice. Washington, DC: American Psychological Association.
  • Hand, T., Chung, D., & Peters, M. (2009). The use of information and communication technologies to coerce and control in domestic violence and following separation. Kensington: Australian Domestic and Family Violence Clearinghouse, UNSW.
  • Harris, B., & Woodlock, D. (2018). Digital coercive control: Insights from two landmark domestic violence studies. Manuscript submitted for publication.
  • Hartmann, M., & Krishnan, S. (2016). Ethical and safety recommendations for intervention research on violence against women. Building on lessons from the WHO publication “Putting women first”. Geneva: World Health Organization.
  • King, N., & Horrocks, C. (2010). Interviews in qualitative research. Thousand Oaks, CA: Sage Publications.
  • Lenhart, A., Ybarra, M., Zickuhr, K., & Price-Feeney, M. (2016). Online harassment, digital abuse, and cyberstalking in America. Retrieved from https://www.datasociety.net/pubs/oh/Online_Harassment_2016.pdf
  • Mullen, P. E., Pathé, M., & Purcell, R. (2009). Stalkers and their victims (2nd ed.). London: Cambridge University Press.
  • Nichols, A. J. (2013). Meaning-making and domestic violence victim advocacy: An examination of feminist identities, ideologies, and practices. Feminist Criminology, 8(3), 177–201. doi: 10.1177/1557085113482727
  • Reed, L. A., Tolman, R. M., Ward, L. M., & Safyer, P. (2016). Keeping tabs: Attachment anxiety and electronic intrusion in high school dating relationships. Computers in Human Behavior, 58, 259–268. doi: 10.1016/j.chb.2015.12.019
  • SafetyNet. (n.d.). Technology safety: Exploring technology in the context of intimate partner violence, sexual assault, and violence against women. Retrieved from https://www.techsafety.org/
  • Saldaña, J. (2012). The coding manual for qualitative researchers. Thousand Oaks, CA: Sage Publications.
  • Stark, E. (2007). Coercive control: The entrapment of women in personal life. London: Oxford University Press.
  • State of Victoria. (2012). Family violence risk assessment and risk management framework and practice guides 1-3. Melbourne, Australia: Author.
  • State of Victoria. (2016). Ending family violence: Victoria’s plan for change. Melbourne: Author.
  • State of Victoria, & Neave, M. (2016). Royal commission into family violence: Summary and recommendations (Parliamentary Paper No 132 (2014–16)). Melbourne: State of Victoria.
  • Weisz, A. N., Tolman, R. M., & Saunders, D. G. (2000). Assessing the risk of severe domestic violence: The importance of survivors’ predictions. Journal of Interpersonal Violence, 15(1), 75–90. doi: 10.1177/088626000015001006
  • WESNET. (2018). Technology safety Australia. Retrieved from https://techsafety.org.au/
  • Women’s Aid. (2014). Virtual world, real fear: Women’s Aid report into online abuse, harassment and stalking. London, UK: Author.
  • Woodlock, D. (2017). The abuse of technology in domestic violence and stalking. Violence Against Women, 23(5), 584–602. doi: 10.1177/1077801216646277
  • World Health Organization. (2017). Violence against women fact sheet. Retrieved from http://www.who.int/news-room/fact-sheets/detail/violence-against-women

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.