skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: "So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums
A growing body of research suggests that intimate partner abusers use digital technologies to surveil their partners, including by installing spyware apps, compromising devices and online accounts, and employing social engineering tactics. However, to date, this form of privacy violation, called intimate partner surveillance (IPS), has primarily been studied from the perspective of victim-survivors. We present a qualitative study of how potential perpetrators of IPS harness the emotive power of sharing personal narratives to validate and legitimise their abusive behaviours. We analysed 556 stories of IPS posted on publicly accessible online forums dedicated to the discussion of sexual infidelity. We found that many users share narrative posts describing IPS as they boast about their actions, advise others on how to perform IPS without detection, and seek suggestions for next steps to take. We identify a set of common thematic story structures, justifications for abuse, and outcomes within the stories that provide a window into how these individuals believe their behaviour to be justified. Using these stories, we develop a four-stage framework that captures the change in a potential perpetrator's approach to IPS. We use our findings and framework to guide a discussion of efforts to combat abuse, including how we can identify crucial moments where interventions might be safely applied to prevent or deescalate IPS.  more » « less
Award ID(s):
1916126 1916096
PAR ID:
10273841
Author(s) / Creator(s):
; ; ; ; ; ;
Date Published:
Journal Name:
Proceedings of the ACM on Human-Computer Interaction
Volume:
4
Issue:
CSCW3
ISSN:
2573-0142
Page Range / eLocation ID:
1 to 27
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Abusers increasingly use spyware apps, account compromise, and social engineering to surveil their intimate partners, causing substantial harms that can culminate in violence. This form of privacy violation, termed intimate partner surveillance (IPS), is a profoundly challenging problem to address due to the physical access and trust present in the relationship between the target and attacker. While previous research has examined IPS from the perspectives of survivors, we present the first measurement study of online forums in which (potential) attackers discuss IPS strategies and techniques. In domains such as cybercrime, child abuse, and human trafficking, studying the online behaviors of perpetrators has led to better threat intelligence and techniques to combat attacks. We aim to provide similar insights in the context of IPS. We identified five online forums containing discussion of monitoring cellphones and other means of surveilling an intimate partner, including three within the context of investigating relationship infidelity. We perform a mixed-methods analysis of these forums, surfacing the tools and tactics that attackers use to perform surveillance. Via qualitative analysis of forum content, we present a taxonomy of IPS strategies used and recommended by attackers, and synthesize lessons for technologists seeking to curb the spread of IPS. 
    more » « less
  2. null (Ed.)
    We argue that existing security, privacy, and anti-abuse protections fail to address the growing threat of online hate and harassment. In order for our community to understand and address this gap, we propose a taxonomy for reasoning about online hate and harassment. Our taxonomy draws on over 150 interdisciplinary research papers that cover disparate threats ranging from intimate partner violence to coordinated mobs. In the process, we identify seven classes of attacks—such as toxic content and surveillance—that each stem from different attacker capabilities and intents. We also provide longitudinal evidence from a three-year survey that hate and harassment is a pervasive, growing experience for online users, particularly for at-risk communities like young adults and people who identify as LGBTQ+. Responding to each class of hate and harassment requires a unique strategy and we highlight five such potential research directions that ultimately empower individuals, communities, and platforms to do so. 
    more » « less
  3. Inaccurate assumptions about people who abuse technology can inhibit effective socio-technical interventions for at-risk populations, including IPV survivors. Our study aims to rectify this concerning oversight through a synthesis of seven research projects on how 152 abusive partners (APs) discuss and understand their malicious use of technology in face-to-face interactions. AP accounts about technology abuse are rich sources of insight into technology abuse, but demonstrate a heterogeneity of awareness of, choice to use, and ability to desist from participating in technology abuse. To ensure immediate practical benefits for practitioner communities, we also engaged 20 facilitators of abusive partner intervention programs (APIPs) in focused group discussions to identify potential solutions for addressing technology abuse in their programming. Findings reveal that facilitators grapple with a complex set of challenges, stemming from the concern about teaching APs new abusive techniques in-session, and lacking professional tools to investigate, evaluate, and resolve technology abuse attacks. Our work provides valuable insights into addressing technology abuse in the APIP ecosystem, offering targeted lessons for the CSCW community and stakeholders in violence prevention. 
    more » « less
  4. Reproductive coercion is an understudied form of intimate partner abuse related to physical, sexual, and psychological abuse. Prior research suggests that women accurately predict whether their abuser will continue the abuse. Thus, understanding factors related to these perceptions is necessary to enhance safety. Using a diverse sample of women in the United States seeking protection orders, the current study examines reproductive coercion as a predictor of women’s perceptions of future violence. Findings suggest that psychological abuse and, to a lesser extent, reproductive coercion are related to whether women believe their abuser will continue their abuse. Implications for research and services are discussed. 
    more » « less
  5. Civil Protection Orders (CPOs) are among the most common legal tools that victims of intimate partner violence and abuse (IPV/A) use to protect themselves. The current study adds to the CPO research by using quantitative data to look at how female survivors' experiences with court personnel (attorneys, mediators, and hearing officers) shape their satisfaction with the court process, and what types of individual and court-related factors are related to perceived fairness of court personnel. The current study uses in-depth quantitative data collected from women over the age of 18 who sought a CPO due to violence from a male current or former partner. The findings indicate that women's satisfaction with the court process is significantly impacted by the perceived fairness of court personnel. In turn, specific behaviors by court personnel predict women's ratings of fairness of those personnel. Additionally, women's socioeconomic status impacts how fair they perceive the hearing officers to be. Court personnel play an integral role in helping victims navigate the legal system in ways that could protect their safety and influence how they perceive the CPO system as it relates to the abuse they have experienced. 
    more » « less