Digital Coercive Control and Spatiality: Rural, Regional, and Remote Women's Experience

The Emerald International Handbook of Technology-Facilitated Violence and Abuse

ISBN: 978-1-83982-849-2, eISBN: 978-1-83982-848-5

Publication date: 4 June 2021

Abstract

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical framework for technology-facilitated harms in heterosexual relationships which we characterize as digital coercive control. Here, we include behaviors which can be classified as abuse and stalking and also individualized tactics which are less easy to categorize, but evoke fear and restrict the freedoms of a particular woman. Drawing on their knowledge of a victim/survivor's experiences and, in the context of patterns and dynamics of abuse, digital coercive control strategies are personalized by perpetrators and extend and exacerbate “real-world” violence.

Digital coercive control is unique because of its spacelessness and the ease, speed, and identity-shielding which technology affords. Victim/survivors describe how perpetrator use of technology creates a sense of omnipresence and omnipotence which can deter women from exiting violent relationships and weakens the (already tenuous) notion that abuse can be “escaped.” We contend that the ways that digital coercive control shifts temporal and geographic boundaries warrant attention. However, spatiality more broadly cannot be overlooked. The place and shape in which victim/survivors and perpetrators reside will shape both experiences of and response to violence. In this chapter, we explore these ideas, reporting on findings from a study on digital coercive control in regional, rural, and remote Australia. We adopt a feminist research methodology in regard to our ethos, research processes, analysis, and the outputs and outcomes of our project. Women's voices are foreground in this approach and the emphasis is on how research can be used to inform, guide, and develop responses to domestic violence.

Keywords

Citation

Harris, B. and Woodlock, D. (2021), "Digital Coercive Control and Spatiality: Rural, Regional, and Remote Women's Experience", Bailey, J., Flynn, A. and Henry, N. (Ed.) The Emerald International Handbook of Technology-Facilitated Violence and Abuse (Emerald Studies In Digital Crime, Technology and Social Harms), Emerald Publishing Limited, Leeds, pp. 387-406. https://doi.org/10.1108/978-1-83982-848-520211030

Publisher

:

Emerald Publishing Limited

Copyright © 2021 Bridget Harris and Delanie Woodlock. Published by Emerald Publishing Limited. This chapter is published under the Creative Commons Attribution (CC BY 4.0) licence. Anyone may reproduce, distribute, translate and create derivative works of these chapters (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this licence may be seen at http://creativecommons.org/licences/by/4.0/legalcode.

License

This chapter is published under the Creative Commons Attribution (CC BY 4.0) licence. Anyone may reproduce, distribute, translate and create derivative works of these chapters (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this licence may be seen at http://creativecommons.org/licences/by/4.0/legalcode.


Introduction

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. Advocate and practitioner knowledge of this issue is growing, but thus far the literature has largely focused on dating violence in teen and adolescent settings, examining different phenomena in each study and not always using a gendered lens. Often these investigations fail to distinguish between perpetrator types (friends, acquaintances, partners) or consider the broader dynamic in which online (and also offline) harms are enacted. In this chapter, we propose a theoretical and practical framework for technology-facilitated harms in heterosexual relationships which we characterize as digital coercive control. Here, we include behaviors which can be classified as abuse and stalking and also individualized tactics, which are less easy to categorize, but evoke fear and restrict the freedoms of a particular woman. Drawing on their knowledge of a victim/survivor's experiences and in the context of patterns and dynamics of abuse, digital coercive control strategies are personalized by perpetrators and extend and exacerbate “real-world” violence.

Digital coercive control is unique because of its spacelessness and the ease, speed, and identity-shielding which technology affords. Victim/survivors describe how perpetrator use of technology creates a sense of omnipresence and omnipotence, which can deter women from exiting violent relationships and weakens the (already tenuous) notion that abuse can be “escaped.” We contend that the ways that digital coercive control shifts temporal and geographic boundaries warrant attention. However, spatiality more broadly cannot be overlooked. The place and shape in which victim/survivors and perpetrators reside will shape both experiences of and response to violence. In this chapter, we explore these ideas, reporting on findings from a study on digital coercive control in regional, rural, and remote Australia. We adopt a feminist research methodology in regard to our ethos, research processes, analysis, and the outputs and outcomes of our project. Women's voices are foreground in this approach and the emphasis is on how research can be used to inform, guide, and develop responses to domestic violence.

The behaviors we discuss are not exclusive to heterosexual relationships, although we emphasize that, recognizing patterns in victimization and perpetration, our work has focused on examination of female victim/survivors and male abusers.

We begin with a review of related literature, with a focus on intimate partner violence, and the key concepts of digital coercive control, and spacelessness and spatiality. We then provide necessary background explaining what led us to undertake the study we report on in this chapter. Next, we set out our research approach and methods before moving on to report on our findings, discussing them in the context of the existing literature, highlighting themes related to digital coercive control; low versus high-tech abuse; gendered and sexualized shaming; monitoring and surveillance; spacelessness and post-separation violence; technology as a tool for breaking isolation, rurality and patriarchal gender roles; and networking of abuse using family and friends. In conclusion, we call for future scholarly investigation and policy and practice developing relating to intimate partner violence that considers spatiality, not only in terms of the spacelessness of digital media and devices but also the influence of place and space more generally.

Overview of Related Literature and Key Concepts

Investigating Intimate Partner Violence

The bulk of literature on technology-facilitated violence in intimate relationships centers on “electronic (or cyber) dating violence.” Sometimes the focus is purely on electronic channels, though there may be consideration of how “online” violence intersects with “offline” dating violence (see, for instance, Barter et al., 2017; Borrajo, Gámez-Guadix, & Calvete, 2015a; Draucker & Martsolf, 2010; Marganski & Melander, 2018; Temple et al., 2016; Zweig, Dank, Yahner, & Lachman, 2013). Often a quantitative methodology and system of analysis is adopted which draws on surveys or questionnaires of high school or college/university students (Cutbush, Williams, Miller, Gibbs, & Clinton-Sherrod, 2018; Harris & Woodlock, 2019). Potentially, such approaches can provide insight into prevalence rates, too, although there has been extensive variation in rates recorded. Proportionally lower or mid-range levels have been observed by some (12% by Hinduja & Patchin, 2011; 26% by Zweig et al., 2013; 32.2%–53% by Reed, Tolman, & Ward, 2017; 40% by Barter et al., 2017, in their respective studies) and higher levels in others (93% by Leisring & Giumetti, 2014). Essentially, these variations in prevalence rates can be attributed to differences in framework, such as the phenomena examined as well as measurement and theoretical processes.

Reviews of electronic dating violence have undoubtedly yielded useful data, both in regard to the role of technology in young people's intimate interactions and the ways that intrusion, harassment, aggression, abuse, and stalking can be performed in these settings. However, in some investigations, the relationships between parties are not necessarily restricted to dating partners, but may also include friends (Bennett, Guran, Ramos, & Margolin, 2011) and other behaviors, such as cyberbullying (Cutbush & Williams, 2016). There is some debate among scholars as to whether or not there is a sex symmetry or asymmetry of cyber partner violence. We (Harris & Woodlock, 2019) are concerned with the “gender blindness” of the literature. However, Borrajo, Gámez-Guadix, and Calvete (2015b) maintain that studies generally show that men and women perpetrate different types of cyber aggression and that the women experience more harmful effects in victimization. We contend that, where the dynamics, patterns and context of violence are not foreground, sex differences in the type, intention, and impacts of acts are obscured (Harris, 2018; Harris & Woodlock, 2019, see also Dragiewicz et al., 2018). Some measurement scales may include “false positives” for violence (Dragiewicz, 2009; Hamby & Turner, 2013) or fail to distinguish patterns of control and coercion – which underscores domestic violence – from incidents of situational couple violence.

Young people are certainly heavy adopters of technology, yet by generally drawing from a school or college/university cohort, scholars have inadvertently reinforced myths that older persons do not experience technology-facilitated violence in relationships (George & Harris, 2014). Here, we note that, while much can be learned from works on digital dating violence, this is not always characterized as interpersonal violence and there are likely significant lifestyle contrasts between the age cohorts. For instance, middle or high schoolers (and indeed college/university students) are less likely to reside together, share children, or have connected finances. Our own work, which focuses specifically on adult women's victimization by domestic violence, has found an average age in the early-mid 30s and affirmed that older women (above the age of 50) also report experiencing image-based sexual abuse and other forms of technology-facilitated domestic violence (Harris & Woodlock, in press; Woodlock, 2013, 2017). Literature on perpetrator use of technology in the context of domestic violence is limited, but growing, and driven both by advocates and academics (Dimond, Fiesler, & Bruckman, 2011; Fraser, Olsen, Lee, Southworth, & Tucker, 2010; Hand, Chung, & Peters, 2009; Mason & Magnet, 2012; Southworth, Dawson, Fraser, & Tucker, 2005). Domestic violence agencies and civil societies (such as the United Nations and also organizations such as Take Back the Tech) broadly have also shaped research, policy, and practice agendas (Harris, Dragiewicz, & Woodlock, 2021).

Digital Coercive Control

Digital media can provide channels to enact, extend, and exacerbate other forms of abuse (such as economic, psychological, or sexual abuse). In-person stalking may be accompanied by cyberstalking (technology-facilitated monitoring of a victim/survivor’s movements, activities, or communications [George & Harris, 2014]). Additionally, abusers may impair an authorized function or cause an unauthorized function on a device. Victim/survivors also report incidents of “doxing”: when their private and identifying information is published without their consent. Technology can provide vehicles for abusers to impersonate real people (or create profiles of fake people) or engage in identity theft, in efforts to intimidate, harass, or defraud targets (Douglas, Harris, & Dragiewicz, 2019; Dragiewicz et al., 2018; Harris, 2020; Harris & Woodlock, in press). These acts can be accomplished through access to a victim/survivors' actual or virtual properties and achieved through force, coercion, deception, or stealth (Dragiewicz et al., 2019). This is not an unchanging list. Technologies and strategies of perpetration will evolve as will, ideally, recognition and responses to such harms.

Some of the aforementioned presentations can be identified, categorized, and regulated under various laws, such as those pertaining to domestic violence, stalking, image-based sexual abuse, or cyber offenses. However, the same behaviors performed by perpetrators in abusive relationships can also be present and innocuous in nonabusive relationships. Checking locations of an intimate partner, or sending frequent text messages, for instance, can be deemed harmless or harmful depending on the dynamics of the relationship (Dragiewicz et al., 2019). Similarly, while video phone calls can enable connections between parents and children in families without domestic violence, we have heard accounts of perpetrators encouraging children to turn on video functions in efforts to locate a woman's residence and gain information about entrance points and security in a refuge (Dragiewicz et al., 2019; Harris & Woodlock, in press). Moreover, abusers have knowledge of a victim/survivor's personal history, experiences, and health of a victim/survivor, and so their strategies are individualized. Women might be sent messages that may not be viewed as offensive or abusive by an outsider, but might evoke fear and unrest because of the terms or incidents mentioned or because the time at which contact was made has a certain meaning for them (Woodlock, 2013).

Ultimately, we contend that “the relational and individual features of technology-facilitated domestic violence mean that it cannot be easily or absolutely cataloged” (Harris & Woodlock, in press). To capture the use of devices and digital media to stalk, harass, threaten, and abuse partners (or ex-partners and direct or collateral victims, such as children), we propose that the phrase (and term) digital coercive control be adopted (Harris & Woodlock, 2019; Dragiewicz et al., 2018 suggest “technology-facilitated coercive control”). This term identifies “the method (digital), intent (coercive behavior), and impact (control of an ex/partner)” and positions harm in a broader setting of sex-based inequality (Harris & Woodlock, 2019, p. 533). The concept of “coercive control” is central here (see also Havard & Lefevre, 2020; Woodlock, 2013, 2017), which is a gendered theory. Essentially, theorists maintain that men use coercive control violence in efforts to exploit, maintain, and reinforce their status and power (Douglas et al., 2019; Harris & Woodlock, 2019; Hester, 2010; Stark, 2007). Though there is debate about how applicable coercive control may be for some victim/survivor experiences (such as in LGBTIQ+ relationships, Harris & Woodlock, in press), we emphasize that we see this as an intersectional approach and that the dynamics, distribution, and outcomes of violence are also shaped by racism, xenophobia, and homophobia (Stark & Hester, 2019).

Though Stark (2007) did not pioneer the concept of coercive control, his work has been most influential in academic study and practical application (Douglas et al., 2019). Stark's (2007, 2012) model encompasses spatially diffuse modes (like “spaceless” digital channels) and a range of perpetrator tactics (such as isolation, intimidation, threats, degradation, gaslighting, monitoring, and stalking), including those not generally classed as “serious” forms of violence (Harris, 2018). While advocates often appreciate that technology-facilitated abuse has extensive impacts on victim/survivors' sense of well-being and security, criminal justice agents have, in the past, suggested these harms are less serious and distinct from other forms of abuse (George & Harris, 2014). We see digital coercive control as typically part of women's broader experience of violence and highlight the pattern as opposed to using an “incident” centric model of abuse (Stark, 2007; Woodlock, 2013). Digital coercive control specifically (and coercive control more broadly) creates a condition of “entrapment” and “unfreedom”, which constrains women's “space for action” (Kelly, 2003).

Spacelessness and Spatiality

Digital coercive control is an extension of violence enacted through more traditional, “offline” channels (Harris & Woodlock, 2019). However, there are unique features of technology which warrant attention. Temporal boundaries have been shifted as digital media has afforded instantaneous communication. Scholars and civil societies have wondered if the ease and immediacy of messaging and the absence of face-to-face contact (of some channels) may result in senders exhibiting little empathy for recipients or dissociating from the effects of the message they are sending (Gray, 2012; see also Amnesty International, 2018). The spacelessness of technology, too, is transformative. While access points (devices) exist in the “real-world,” social media accounts, digital profiles and alike are not bound to any geographic location. Thus, victim/survivors can be exposed to digital coercive control anywhere and anytime they use digital media (Harris, 2018; Woodlock, 2013, 2017). This is exacerbated by the “context collapse”: the blurring of public and private, professional and personal lives on social media (Davis & Jurgenson, 2014). As the different domains become intermeshed, violence is increasingly not confined to certain domains. Thus, even abuse in the domestic sphere which was long shrouded by a “veil of privacy” (Fineman, 1994) is by no means enacted only in “private” digital spaces (Vickery & Everbach, 2018). Abusers, for instance, mount campaigns on social media platforms in efforts to publicly shame and humiliate victim/survivors and post intimate images and videos without consent on internet sites (George & Harris, 2014; Harris & Woodlock, 2019; Woodlock, 2013).

Domestic violence abusers capitalize on temporal and spaceless features of technology to erode boundaries and create a sense of omnipresence and omnipotence (Woodlock, 2017). This can include, for instance, high volumes of contact such as seemingly unending abusive text or email messages and posts on social media and constantly monitoring the activities, movements, and correspondence of victim/survivors using technology (Woodlock, 2013). As noted above, such practices create a condition of entrapment and unfreedom (Stark, 2007) and can be a deterrent to help-seeking and attempting to exit a violent relationship (Dimond et al., 2011; Hand et al., 2009). Our heavy utilization and reliance on technology (in providing education, employment, leisure, social, and civic engagement opportunities) ensures that it is difficult for victim/survivors to escape exposure to digital coercive control. There has been some recognition in the existing literature of spatiality in these regards, but little exploration of how the place and space in which digital coercive control is enacted can shape victim/survivor experiences of and responses to such abuse (Harris, 2016; Harris & Woodlock, 2019; Harris & Woodlock, in press).

Background to Our Study

Our study evolved from previous work we conducted in this field. Woodlock's (2013; 2017) SmartSafe project was one of the first investigations, globally, to survey victim/survivors and support workers about the use of technology in abusive relationships. She documented how, via digital channels and devices, abusers sought to control, intimidate, and isolate women. Woodlock's research provided insights into impacts of and trends in perpetration and areas to knowledge-build in the Australian domestic violence sector (such as in safety planning processes). At the time there was scant scholarship on this topic. Some literature made reference to perpetrators using technology though this was not their focus. A study by George and Harris (2014) on victim/survivor's experiences of family violence in regional and rural Victoria (Australia) reported that technology-facilitated abuse and stalking had particular impacts on the well-being and safety of women in nonmetropolitan areas. They also highlighted the innovative digital strategies of advocates, offering opportunities to overcome geographic and social barriers to help-seeking, with limited resource investment. This was the first study to explore sociospatial impacts of violence in regard to technology-facilitated abuse, stalking, and advocacy, although not their main area of inquiry. Moving forward, we (Woodlock and Harris) decided to jointly develop a project that would advance our understanding of how technology shapes experiences of and responses to domestic violence in different places and spaces (Harris & Woodlock, in press).

Our research project Spaceless Violence and Advocacy: Technology-Facilitated Abuse, Stalking and Service Provision in Australia examined women's experiences of digital coercive control in regional, rural, and remote Australia (centering on the most heavily populated jurisdictions of Australia, the states of New South Wales [NSW], Victoria, and Queensland). We recognized that, compared to urban victim/survivors, those in nonurban locations face exacerbated barriers when seeking assistance (DeKeseredy & Schwartz, 2009; George & Harris, 2014; Hogg & Carrington, 2006). Abusers often capitalize on and seek to extend geographic and social isolation, including through technology (Farhall, Harris, & Woodlock, 2020). Risk in rural locations can be elevated by the sheer distance between a victim/survivor's residence and first responders. Consequently, what would be a serious assault in a metropolitan zone can quickly become a homicide in a nonmetropolitan zone (Harris, 2018; Lanier & Maume, 2009). In these settings, technology has the potential to contribute to the abuse and danger victim/survivors face (Harris, 2016). However, we emphasize that technology also can potentially bolster and provide new borderless avenues for help-seeking, the provision of assistance and services to victim/survivors, and regulation of violence (see also Harris, 2016; Harris et al., 2021). There is evidence that, in some rural or remote places, women have greater uptake of technology (for personal and professional purposes) than men (Hay & Pearce, 2014) and that Indigenous people are high adapters of technology (Carlson, 2013). This is significant, particularly as Indigenous women are overrepresented as victims/survivors of domestic and family violence (see Our Watch, 2018) and because there are indications that rates of domestic and family violence are highest in (at least some) regional and rural areas (see Dillon, Hussain, & Loxton, 2015; George & Harris, 2014).

Research Approach and Methods

We used feminist research methods in our project as this approach is centered on providing an insight into women's experiences as they understand them. Using feminist methods means that the researchers are concerned with not only the methods used and how appropriate they are for the topic but also with the research process and ethics (Burman, Batchelor, & Brown, 2001). The outcome of the research is also of importance when using feminist methods, with an obligation that the outputs and outcomes are for, not just about, those that are participating in a project. Ethical feminist research practice is seen as work that “will get to places and audiences where it might help further the social good” (Sprague, 2005, p. 224). Reflecting on and integrating these principles into our study, our aim was that the product of our work would be shared with community organizations that work directly with victim/survivors. Our findings would also inform training for domestic violence advocates and practitioners.

Our project used semistructured interviews as the main research method. Interviews provide an insight into women's experiences that have often been marginalized, and as such are central to feminist research methods (Reinharz, 1992). As in-depth interviewing usually works with small sample sizes, feminist interviewing aims to gain deep understanding into women's experiences, and the findings may not necessarily be able to be generalized to larger populations (Hesse-Biber, 2007). We wanted to understand the meaning that women made of the use of technology in violence they were subjected to, and if they felt that where they lived shaped their experiences. Consequently, we cannot draw generalizations about how many women in rural, regional, and remote locations in Australia are subjected to technology abuse, but our findings can advance understandings about how technology is used in domestic violence and how geographical space and place impact these experiences.

Recruitment

We partnered with Women's Legal Service (NSW), a community legal center which provides free information, education, and representation for women, as well as engaging in law reform and campaigning for women's rights and protections. The agency had also worked with Woodlock previously on the issue of technology and domestic violence (Woodlock, 2015). Through their facilitation we made contact with women's services throughout rural NSW, Queensland, and Victoria, to recruit victim/survivors who had been subjected to the use of technology in domestic violence.

Recruiting women who were connected to domestic violence support services ensured that our participants had support from a service throughout the process; they were able to discuss risks before the interview and debrief with staff afterward. This approach has limitations, as the majority of women who are subjected to domestic violence do not seek formal support. Therefore, the participants only included women who had recognized the abuse they were subjected to was domestic violence, or someone else they had contact with (such as family, friends, or professionals), prompted them to seek support. Relying on services to assist with the recruitment processes also puts added pressure on domestic violence services, which are already under considerable strain, and we found it an uncomfortable process to send reminders and prompts to organizations.

Interview Process and Demographics

We conducted individual interviews with 13 women and one focus group with two women. Our participants ranged in age from 25 to 50, with an average age of 33. While this correlates with the average age of women impacted by domestic violence, it is older than the high school and university aged cohorts that are largely focused on in relation to electronic dating violence. When asked about their cultural background, the majority of participants said they were Australian (69%) and within this group 15% identified as Aboriginal. There were 31% who said they were born overseas, with 15% from New Zealand, 8% from South America, and 8% from Asia. All women were subjected to abuse from a male former intimate partner.

Interviews were conducted in person as well as via the telephone depending on the participant's preference. The in-person interviews were held at the support service offices. One focus group was also held at a support service office. Prior to their participation, women were given plain language information about the project and had time to discuss the risks and benefits with the support services, as well as with the researchers. The interviews and focus group that were conducted at the support service offices were attended by both researchers, with one taking the lead and the other researcher offering support. For the interviews that were conducted via the phone, contact was first made via the support service who explained the research to the participant and then with her permission, forwarded her details to the researchers, as well as outlining any safe contact protocols. These included sending a text message before calling the phone so that the participant recognized our numbers. All participants received a $50 gift card to acknowledge their contribution and time. We also gave a donation to services that assisted us in recognition of their time and the effort that went into finding participants for our research. The interviews and focus group were recorded, with participant consent, and transcripts were subsequently prepared. Pseudonyms were assigned to participants in the transcripts in order to protect their confidentiality.

Analysis and Interpretation of Findings

The transcripts from our 13 interviews and one focus group were coded using thematic analysis, and we used NVivo to assist with categorization (King & Horrocks, 2010; Saldaña, 2012). We applied the system of thematic analysis outlined by King and Horrocks (2010), first coding the interviews descriptively, using codes such as “GPS used to track” and “Contact with police.” Then we applied interpretive coding to the findings, where meaning was interpreted according to the research question. Interpretive codes included “Technology used to control” and “Victim-blaming by police.” Both researchers read and coded the transcripts separately, using double coding to increase the trustworthiness of the analysis. Our codes and themes were then compared and contrasted, and we worked together in the development of a thematic structure of descriptive and interpretive codes. We then collaborated on the final stage of thematic analysis which is to define overarching themes (King & Horrocks, 2010). These overarching themes include “The use of technology by perpetrators is often not taken seriously as a form of abuse” and that “Technology is used alongside other forms of abuse.”

Findings

Digital Coercive Control

Victim/survivors in our study detailed the way that technology was incorporated into perpetrating coercive and controlling tactics, often extending and exacerbating other forms of (offline) abuse (Harris & Woodlock, in press). Digital coercive control occurred alongside other forms of harm such as sexual violence, physical abuse, and nonfatal strangulation. For many victim/survivors, digital coercive control began during the relationship and was largely characterized by abusive text messages, monitoring via apps and GPS devices, and image-base sexual abuse. Technology had a heavy presence in their lives and abusers' reach and contact was extensive. Women talked about feeling as though they were exposed to harm anywhere and at any time and being constantly under surveillance. Kira described her abuser making “constant [contact]. I wouldn't be surprised if there was a hundred [texts and emails] a day. It was very, very frequent.” Likewise, Louise was sent a raft of messages – “10 in a row” – before she had a chance to respond, and

…full on harassment with phone calls all the time… at four o'clock in the morning – phone call after phone call and if I'd tell him to stop, like there would be [no] chance [that] he would.

Earlier in relationships, women might feel that such contact was romantic or demonstrated their devotion. As Claire explained:

[It was] little things that I kind of mistook as, oh, he's very caring, [but it] was obviously the beginning of the grooming and the controlling and the forward behaviors that I ended up accepting actually, as someone caring for me.

Abusers often framed their behaviors as helpful or positive. Maya's ex would routinely open her email inbox and “clean up” her emails for her. He linked his phone number to her email account because, he said, she was forgetful, and he could help retrieve her account if she lost her password. Women also talked about how their abusers would demand to have passwords on children's devices too, “to keep her [our daughter] safe.” As Fiona explained, these can be claims and concerns all parents have, but the context of her relationship meant his access to her devices and, her children's devices, was problematic:

I've got a friend who's got a tracking device on her son (he hurt himself from riding) and he said ‘just look me up, where I am, if you're worried’, you know? She's a great woman, right? So she's got his best interests. But in a DV [domestic violence] situation, it's completely different.

Low-Tech vs High-Tech Methods

Navarro (2015) notes that abusers can use “low-tech” methods (which do not require specialized knowledge) or “high-tech” methods (drawing on advanced knowledge). Women in our study believed that perpetrators mainly drew on low-tech strategies and skill sets. However, it can be hard to discern exactly what avenues perpetrators engage. Sometimes perpetrators delighted in women being forewarned they had control of devices or accounts, creating a (perhaps inflated) sense of perpetrator omnipresence and omnipotence. Abusers also sought to hide their activities (see also Dragiewicz et al., 2019; Harris & Woodlock, 2019). Many women suspected that perpetrators engage in covert strategies and applications they had not discovered, which was a source of great anxiety. Fiona stressed that “there are some things you will never know about, with technology.” Complicating the issue, domestic relationships involve the sharing of intimate knowledge, account ownership and access, and unique relational dynamics that enable insider threats to digital security (Freed et al., 2018, see also Dragiewicz et al., 2019). While we appreciate that some abusers may be more tech-savvy than others or use high-tech approaches and apps (like spwyare, screenloggers, or keyloggers), abusers are also well positioned to guess or locate account information and can also use stealth, deception, and force to accomplish their goals (Harris, 2020). As our participants acknowledged, there was information (such as about their location) that could have been either gleaned from high-tech channels (like GPS tracking devices, hidden in their property) or low-tech channels (such as location-enabled features on devices, like “find my friends” apps).

Gendered and Sexualized Shaming and Humiliation

Abuse and harassment were often gendered and sexualized and technology was used in attempts to shame and humiliate women. Six of the thirteen women we consulted were subjected to image-based sexual abuse. Some women talked about images or videos being created with consent but numerous women, upon reflection during interviews, mentioned feeling manipulated, pressured, or coerced by abusers. Our participants also described feeling unease knowing perpetrators had possession of images or videos. Shelly lamented that her ex refused to delete “inappropriate photos” of her and

…he brings up that he has these photos, and he's tried to use them as an emotional tool as well. Just saying “I've got a whole memory stick full of photos, if you want to get smart, I'll post them.”

Three women were aware that their abuser had publicly shared images or videos of them.

In text and social media communications “name-calling” like “slut” was common “[i]f he didn't get his own way” (Fiona), as were attacks on women's sexuality. Threats of rape and sexual assault were widely reported, too, like messages that said “I deserved to be raped because I needed somebody to straighten me out” (Kira). Filipovic (2007) and Jane (2014) report that sexual violence can be presented as “corrective” to perceived “transgressions” from gender roles: here, we might think about expectations of female passivity and men's expectations of dominance. Menacing terms and expressions could evoke anxiety and pain in all of our participants. For those who had previous histories of sexual violence, these words had particular meanings and consequences. Cody's ex was well aware she had been sexually abused as a child. During their relationship he referred to and blamed her for this victimization. Post-separation he knew that adopting slurs she associated with her past and mentioning names of family members would trigger her memory and trauma. Natalie's ex shared information about her sexual history with her mother, family, and friends, over the phone. As Woodlock (2017) and Logan, Shannon, and Walker (2005) explain, perpetrators use technology and their knowledge of women's fears and personal history to torment women, to deter them from leaving, and to show they have power beyond the private sphere.

Monitoring and Surveillance

Perpetrators used access to our participants' accounts and devices to monitor their communications, activities, and movements. Some set up or gifted phones, tablets, or computers on shared plans which allowed them to follow women's use. Others would view billing information. Women were not always aware of men's oversight. Fiona recalled how, at the time, she did not know that her abuser was examining her message and call histories:

He would say it in a way that [was off-the-cuff] so I didn't realize he was actually looking at the phone bill. I didn't realize he was checking how long and how often I would call certain people and would remark “oh you talk to such-and-such for [a while] every day, don't you?” I'd say “no, I don't”…. He said “yeah, you do.”

Several abusers informed women they were using (GPS) tracking mechanisms. Natalie's ex told a friend of hers he was using technology to find her:

He'd just appear. I'd be in some random supermarket and he'd just be behind me, or I'd be in some bushy area… he'd just appear in random places… just behind me.

As a consequence, she felt like he could turn up at any time: “I just had the nervous tic of looking over my shoulder every five seconds.”

Spacelessness and Continued Violence Post-Separation

The accounts of our participants challenged myths surrounding domestic violence, including that violence can be easily escaped and that violence ends post-separation, as has been well established in the literature (see, for instance, DeKeseredy, Dragiewicz, & Schwartz, 2017; DeKeseredy & Schwartz, 2009). For many, digital coercive control escalated (especially in regard to cyberstalking); at the very least, it did not subside, post-separation. Thus, the notion of “‘feeling safe’ from an abuser no longer has the same geographic and spatial boundaries it once did” (Hand et al., 2009, n.p.; see also Dimond et al., 2011; Fraser et al., 2010). These harms are spaceless which means “[t]here wasn't ever a break from it… you can't actually escape it,” as Kira says, “every other type of abuse, I was able to…it just ended at some point.” However, the space in which the woman and perpetrators are based matters.

Impact of Social and Geographic Features on Visibility

Social and geographic features of regional, rural, and remote locations shaped experiences of abuse and barriers that our participants encountered when seeking help and responding to violence. They described how, living in small communities, they felt more visible. They were more likely to be known to services and agencies when disclosing violence and seeking assistance and so were confronted with “going public” with private violence (see also George & Harris, 2014). Victim/survivors who identified as Indigenous, culturally or linguistically diverse, or those who had previously come into contact with the criminal justice system described feeling especially visible.

Technology as a Tool for Breaking Isolation

Though women in our study engaged with support workers and practitioners in their geographic area, we note that, for rural women, technology can provide confidential channels beyond their community to respond to violence. In that way, technology was a lifeline for many of our participants, especially those who were geographically and/or socially isolated. Perpetrators sought to extend their isolation while they lived together, for instance, by moving their family to remote farms, destroying their relationships with others, and restricting their access to technology. For those who did not have social networks in the area, including newly arrived women (and those on temporary visas), technology offered key channels to maintain links with friends and family. Digital media could also offer further employment and education channels, which was vital, as rural communities had less opportunities than in urban communities. Our participants' experiences demonstrate the ways in which technology can be a source of empowerment, in enabling women to access resources and build capabilities to exit relationships and gain independence (see also Louie, this volume).

Rurality and Patriarchal Gender Roles

In essence, rurality brought forward barriers into our participants' lives. A wealth of literature has documented how geographic, social, and ideological structures and features in rural places can foster and facilitate violence (Farhall et al., 2020; see also Bosch & Bergen, 2006; Loxton, Hussain, & Schofield, 2003). In our study, as with our previous studies (see George & Harris, 2014; Harris, 2016), victim/survivors described their communities as conservative or conducive to violence, because of localized gender roles and patriarchal values. As Hogg and Carrington (2006, p. 180) argue, gender in rural communities can have unique meanings and presentations:

The social organisation of masculinity in these rural social sites is constructed more narrowly around heteronormative conceptions of masculinity that subordinate others through practices of domination that have historically relied on the exercise of violence.

Rural hegemonic masculinity has been observed by scholars, internationally (in New Zealand, by Campbell, 2000; South Africa, by Jewkes et al., 2006; the United States, by DeKeseredy & Schwartz, 2009; United Kingdom, by Hey, 1986; Whitehead, 1976 as cited in Harris & Woodlock, in press).

In small, close-knit communities, women can be ostracized or demonized when disclosing abuse, particularly when “traditional” patriarchal, gender, and family values are present (George & Harris, 2014; Hornosty & Doherty, 2002; Wendt, 2009). Speaking to this, Kira, reflecting on her past victimization (as a child in the family setting and, being sexually assaulted as a child and adolescent and, as an adult, subjected to domestic violence) noted:

I grew up in a small community… once one [person] started [engaging in violence] it was kind of a trend where all the males in the community would just, I guess, jump on board, if that makes sense?

Informal support networks can be reluctant to assist victim/survivors or intervene to prevent violence, especially where perpetrators are well-known and regarded (National Rural Crime Network, 2019; Neilson & Renou, 2015). Claire's ex “went around the streets telling people that I'm crazy” and his version of events spread quickly, because of the small size community. Claire went on to explain: “he [my abuser] is established – he knows people and he's well-liked … He's in a boy's club and knows lots of people.” She talked about, in contrast, feeling alone. Here, we can consider how abuser allies and perpetrator peer support networks (see DeKeseredy, 1990; DeKeseredy & Schwartz, 2016) are shaped by rurality, facilitating not only violence but also women's isolation.

DeKeseredy and Schwartz proposed that “abusive patriarchal men” may have like-minded allies who develop, exchange, and reinforce values and beliefs that support violence and provide resources and guidance that essentially “allows men to feel normal and justified when committing violence against current and former intimate partners” (2016, p. 4). Numerous participants spoke about these structures which underscored what we termed “proxy perpetrators.” This can include persons within their abuser's social network who elect to engage in digital coercive control.

Engagement of Family and Friends in Networks of Abuse

Family members or friends may, for instance, contribute to negative social media campaigns attacking a victim/survivor, send demeaning messages to her, or use technology to stalk her movements, without prompting from the perpetrator (see also George & Harris, 2014). We include, in this category, persons who unwillingly or unknowingly facilitate perpetration, such as children (see also Dragiewicz et al., 2019).

Children were also manipulated into facilitating abuse of our participants. When Shelly blocked her ex on social media, he reached out to her daughter, claiming he wanted to watch her play sports and “she felt excited that he wanted to watch, so she gave him all the details [that helped him find me].” Other family members and friends appeared to be actively commissioned by an abuser, enlisted to harass or watch a woman using digital channels (see Bosch & Bergen, 2006; Dutton & Goodman, 2005; Murray et al., 2019). One woman, Kira, told us that friends of her ex would inform him of her whereabouts and activities. When she blocked his number, others provided their phones or digital profiles so he could contact her and “continue to harass me through [their accounts].” It was difficult for her to know if he was also using tracking devices to monitor her movements. These networks of abuse exacerbated the vulnerabilities of rural women.

Conclusion

Moving forward, we advocate for further studies of technology in the context of domestic violence which examine how victim/survivors, perpetrators, and advocates use technology. Technology shifts temporal and geographic boundaries and so will impact experiences of violence and abuse, as well as the responses that follow. We call for future scholarly investigation and policy and practice development to consider spatiality, examining not only the spacelessness of digital media and devices but also the influence of place and space. The metropole has, overwhelmingly, been the focus of studies in this arena. This is a knowledge deficit that must be addressed: barriers and risk to regional, rural, and remote women can not only be exacerbated but also potentially overcome (or at least abated) through technology.

References

Amnesty International, 2018 Amnesty International . (2018). Toxic Twitter: Violence and abuse against women online. London. Amnesty International.

Barter et al., 2017 Barter, C. , Stanley, N. , Wood, M. , Lanau, A. , Aghtaie, N. , Larkins, C. , & Øverlien, C. (2017). Young people's online and face-to-face experiences of interpersonal violence and their subjective impact across five European countries. Psychology of Violence, 7(3), 375384.

Bennett et al., 2011 Bennett, C. C. , Guran, E. L. , Ramos, M. C. , & Margolin, G. (2011). College students' electronic victimization in friendships and dating relationships: Anticipated distress and associations with risky behaviours. Violence & Victims, 26(4), 410429.

Borrajo et al., 2015a Borrajo, E. , Gámez-Guadix, M. , & Calvete, E. (2015a). Cyber dating abuse: Prevalence, context, and relationship with offline dating aggression. Psychological Reports, 116(2), 565585.

Borrajo et al., 2015b Borrajo, E. , Gámez-Guadix, M. , & Calvete, E. (2015b). Justification beliefs of violence, myths about love and cyber dating abuse. Psicothema, 27(4), 327333.

Bosch and Bergen, 2006 Bosch, K. , & Bergen, M. B. (2006). The influence of supportive and nonsupportive persons in helping rural women in abusive partner relationships become free from abuse. Journal of Family Violence, 21(5), 311320.

Burman et al., 2001 Burman, M. J. , Batchelor, S. A. , & Brown, J. A. (2001). Researching girls and violence: Facing the dilemmas of fieldwork. British Journal of Criminology, 41(2), 443459.

Campbell et al., 2000 Campbell, H. (2000). The glass phallus: Pub(lic) masculinity and drinking in rural New Zealand. Rural Sociology, 65, 562581.

Carlson, 2013 Carlson, B. (2013). The ‘new frontier’: Emergent Indigenous identities and social media. In M. Harris , M. Nakata , & B. Carlson (Eds.), The politics of identity: Emerging indigeneity (pp. 147168). Sydney: University of Technology Sydney E-Press.

Cutbush and Williams, 2016 Cutbush, S. , & Williams, J. (2016). Teen dating violence, sexual harassment, and bullying among middle school youth: Examining measurement invariance by gender. Journal of Research on Adolescence, 26(4), 918926.

Cutbush et al., 2018 Cutbush, S. , Williams, J. , Miller, S. , Gibbs, D. , & Clinton-Sherrod, M. (2018). Longitudinal patterns of electronic teen dating violence among middle school students. Journal of Interpersonal Violence. doi:10.1177/0886260518758326

Davis and Jurgenson, 2014 Davis, J. L. , & Jurgenson, N. (2014). Context collapse: Theorising context collusions and collisions. Information, Communication & Society, 17(4), 476485.

DeKeseredy, 1990 DeKeseredy, W. S. (1990). Male peer support and woman abuse: The current state of knowledge. Sociological Focus, 23(2), 129139.

DeKeseredy et al., 2017 DeKeseredy, W. S. , Dragiewicz, M. , & Schwartz, M. D. (2017). Abusive endings: Separation and divorce violence against women. Oakland, CA: University of California Press.

DeKeseredy and Schwartz, 2009 DeKeseredy, W. S. , & Schwartz, M. D. (2009). Dangerous exits: Escaping abusive relationships in rural America. New Brunswick, NJ: Rutgers University Press.

DeKeseredy and Schwartz, 2016 DeKeseredy, W. S. , & Schwartz, M. D. (2016). Thinking sociologically about image-based sexual abuse: The contribution of male peer support theory. Sexualization, Media & Society, 2(4), 18.

Dillon et al., 2015 Dillon, G. , Hussain, R. , & Loxton, D. (2015). Intimate partner violence in the young cohort of the Australian longitudinal study on women's health: Urban/rural comparisons and demographic associations. Advances in Mental Health, 13(1), 1829.

Dimond et al., 2011 Dimond, J. P. , Fiesler, C. , & Bruckman, A. S. (2011). Domestic violence and information technologies. Interacting with Computers, 29, 413431.

Douglas et al., 2019 Douglas, H. , Harris, B. A. , & Dragiewicz, M. (2019). Technology-facilitated domestic and family violence: Women's experiences. British Journal of Criminology, 59(3), 551570.

Dragiewicz, 2009 Dragiewicz, M. (2009). Why sex and gender matter in domestic violence research and advocacy. In E. Stark , & E. Buzawa (Eds.), Violence against women in families and relationships: Volume 3, Criminal Justice and the Law (pp. 201215). Santa Barbara, CA: Praeger.

Dragiewicz et al., 2018 Dragiewicz, M. , Burgess, J. , Matamoros-Fernández, A. , Salter, M. , Suzor, N. P. , Woodlock, D. , & Harris, B. (2018). Technology-facilitated coercive control: Domestic violence and the competing role of digital media platforms. Feminist Media Studies, 18(4), 609625.

Dragiewicz et al., 2019 Dragiewicz, M. , Harris, B. , Woodlock, D. , Salter, M. , Easton, H. , Lynch, A. , … Milne, L. (2019). Domestic violence and communication technology: Survivor experiences of intrusion, surveillance, and identity crime. Sydney: The Australian Communications Consumer Action Network.

Draucker and Martsolf, 2010 Draucker, C. B. , & Martsolf, D. S. (2010). The role of electronic communication technology in adolescent dating violence. Journal of Child and Adolescent Psychiatric Nursing, 23(3), 133142.

Dutton and Goodman, 2005 Dutton, M. A. , & Goodman, L. A. (2005). Coercion in intimate partner violence: Towards a new conceptualization. Sex Roles, 52(11–12), 743756.

Farhall et al., forthcoming, 2020 Farhall, K. , Harris, B. , & Woodlock, D. (2020). The impact of rurality on women’s ‘space for action’ in domestic violence. Findings from a meta-synthesis. International Journal of Rural Criminology, 5(2), 181–203.

Filipovic, 2007 Filipovic, J. (2007). Blogging while female: Hoe internet misogyny parallels ‘real world’ harassment. Yale Journal of Law and Feminism, 19, 295303.

Fineman, 1994 Fineman, M. A. (1994). Preface. In M. A. Fineman , & R. Mykitiuk (Eds.), The public nature of private violence: The discovery of domestic abuse (pp. xixvii). New York, NY: Routledge.

Fraser et al., 2010 Fraser, C. , Olsen, E. , Lee, K. , Southworth, C. , & Tucker, S. (2010). The new age of stalking: Technological implications for stalking. Juvenile and Family Court Journal, 61, 3955.

Freed et al., 2018 Freed, D. , Palmer, J. , Michala, D. , Levy, K. , Ristenpart, T. , & Dell, N. (2018). A stalker's paradise: How intimate partner abusers exploit technology. Presented at the IEEE Symposium on Security and Privacy (Oakland 2018), Oakland, ACM Press (pp. 113).

George and Harris, 2014 George, A. , & Harris, B. (2014). Landscapes of violence: Women surviving family violence in regional and rural Victoria. Geelong: Deakin University.

Gray, 2012 Gray, K. L. (2012). Deviant bodies, stigmatized identities, and racist acts: Examining the experiences of African-African gamers in Xbox Live. New Review in Hypermedia and Multimedia, 18(4). 261271.

Hamby and Turner, 2013 Hamby, S. , & Turner, H. (2013). Measuring teen dating violence in males and females: Insights from the national survey of children's exposure to violence. Psychology of Violence, 3, 323339.

Hand et al., 2009 Hand, T. , Chung, D. , & Peters, M. (2009). The use of information and communication technologies to coerce and control in domestic violence and following separation. Sydney: Australian Domestic and Family Violence Clearinghouse.

Harris, 2016 Harris, B. (2016). Violent landscapes: A spatial study of family violence. In A. Harkness , B. Harris , & D. Baker (Eds.), Locating crime in context and place: Perspectives in regional and rural Victoria (pp. 7084). Sydney: The Federation Press.

Harris, 2018 Harris, B. (2018). Spacelessness, spatiality and intimate partner violence: Technology-facilitated abuse, stalking and justice. In K. Fitz-Gibbon , S. Walklate , J. McCulloch , & J. M. Maher (Eds.), Intimate partner violence, risk and security: Securing women's lives in a global world (pp. 5270). London: Routledge.

Harris, 2020 Harris, B. (2020). Technology, domestic and family violence: Perpetration, experiences and responses. Brisbane: Queensland University of Technology, Centre for Justice.

Harris et al., forthcoming, 2021 Harris, B. , Dragiewicz, M. , & Woodlock, D. (2021). Positive uses of technology to address domestic violence. In J. Blaustein , K. Fitz-Gibbon , N. W. Pino , & R. White (Eds.), Emerald handbook of crime, justice and sustainable development. (pp. 295–313) Bingley: Emerald Publishing Limited.

Harris and Woodlock, 2019 Harris, B. , & Woodlock, D. (2019). Digital coercive control: Insights from two landmark domestic violence studies. British Journal of Criminology, 59(3), 530550.

Harris and Woodlock, forthcoming Harris, B. , & Woodlock, D. (in press). Spaceless violence and advocacy: Technology-facilitated abuse, stalking and service provision. Canberra: Australian Institute of Criminology.

Havard and Lefevre, 2020 Havard, T. , & Lefevre, M. (2020). Beyond the power and control wheel: How abusive men manipulate mobile phone technologies to facilitate coercive control. Journal of Gender-Based Violence. doi:10.1332/239868020X15850131608789

Hay and Pearce, 2014 Hay, R. , & Pearce, P. (2014). Technology adoption by rural women in Queensland, Australia: Women driving technology from the homestead for the paddock. Journal of Rural Studies, 36, 318327.

Hesse-Biber, 2007 Hesse-Biber, S. N. (2007). The practices of feminist in-depth interviewing. In S. N. Hesse-Biber (Ed.), Feminist research practice: A primer (pp. 233263). Thousand Oaks, CA: SAGE Publications.

Hester, 2010 Hester, M. (2010). Gender and sexuality. In C. Itzin , A. Taket , & S. Barter-Godfrey (Eds.), Domestic and sexual violence and abuse: Tackling the health and mental health effects (pp. 99131). London: Routledge.

Hey, 1986 Hey, V. (1986). Patriarchy and pub culture. London: Tavistock.

Hinduja and Patchin, 2011 Hinduja, S. , & Patchin, J. W. (2011). Electronic dating violence: A brief guide for educators and parents. United States of America: Cyberbullying Research Centre.

Hogg and Carrington, 2006 Hogg, R. , & Carrington, K. (2006). Policing the rural crisis. Sydney: The Federation Press.

Hornosty and Doherty, 2002 Hornosty, J. , & Doherty, D. (2002). Responding to wife abuse in farm and rural communities: Searching for solutions that work. Paper presented at The rural Canada: Moving forward or left behind? A national conference, Regina, Canada.

Jane, 2014 Jane, E. A. (2014). ‘Back to the kitchen, cunt’: Speaking the unspeakable about online misogyny. Continuum: Journal of Media & Cultural Studies, 28(4), 558570.

Jewkes et al., 2006 Jewkes, R. , Dunkle, K. , Koss, M. P. , Levin, J. B. , Nduna, M. , Jama, N. , & Sikweyiyam, Y. (2006). Rape perpetration by young, rural South African men: Prevalence, patterns, and risk factors. Social Science & Medicine, 63, 29492961.

Kelly, 2003 Kelly, L. (2003). The wrong debate: Reflections on why force is not the key issue with respect to trafficking in women for sexual exploitation. Feminist Review, 73, 139144.

King and Horrocks, 2010 King, N. , & Horrocks, C. (2010). Interviews in qualitative research. Thousand Oaks, CA: SAGE.

Lanier and Maume, 2009 Lanier, C. , & Maume, M. O. (2009). Intimate partner violence and social isolation across the rural/urban divide. Violence Against Women, 15, 13111330.

Leisring and Giumetti, 2014 Leisring, P. A. , & Giumetti, G. W. (2014). Sticks and stones may break my bones, but abusive text messages also hurt: Development and validation of the Cyber Psychological Abuse scale. Partner Abuse, 5(3), 323341.

Logan et al., 2005 Logan, T. K. , Shannon, L. , & Walker, R. (2005). Stalking victimization in the context of intimate partner violence. Violence Against Women, 11(7), 876911.

Loxton et al., 2003 Loxton, D. , Hussain, R. , & Schofield, M. (2003). Women's experiences of domestic abuse in rural and remote Australia. Paper presented at the 7th National Rural Health Conference, Hobart, Australia.

Marganski and Melander, 2018 Marganski, A. , & Melander, L. (2018). Intimate partner violence victimization in the cyber and real world: Examining the extent of cyber aggression experiences and its association with in-person dating violence. Journal of Interpersonal Violence, 33(7), 10711095.

Mason and Magnet, 2012 Mason, C. , & Magnet, S. (2012). Surveillance studies and violence against women. Surveillance and Society, 10, 105118.

Murray et al., 2019 Murray, L. , Warr, D. , Chen, J. , Block, K. , Murdolo, A. , Quiazon, R. , … Vaughan, C. (2019). Between 'here' and 'there': Family violence against immigrant and refugee women in urban and rural Southern Australia. Gender, Place & Culture, 26(1), 91110.

National Rural Crime Network, 2019 National Rural Crime Network . (2019). Captive and controlled: Domestic abuse in rural areas. National Rural Crime Network.

Navarro, 2015 Navarro, J. (2015). Cyberabuse and cyberstalking. In J. N. Navarro , S. Clevenger , & C. D. Marcum (Eds.), The intersection between intimate partner abuse, technology, and cybercrime: Examining the virtual enemy (pp. 125140). Durham, NC: Carolina Academic Press.

Neilson and Renou, 2015 Neilson, C. , & Renou, B. (2015). Will somebody listen to me? Insight, actions and hope for women experiencing family violence in regional Victoria. Bendigo, VIC: Loddon Campaspe Community Legal Centre.

Our Watch, 2018 Our Watch . (2018). Changing the picture: A national resource to support the prevention of violence against Aboriginal and Torres strait Islander women and their children. Melbourne: Our Watch.

Reed et al., 2017 Reed, L. A. , Tolman, R. M. , & Ward, L. M. (2017). Gender matters: Experiences and consequences of digital dating abuse victimization in adolescent dating relationships. Journal of Adolescence, 59, 7989.

Reinharz, 1992 Reinharz, S. (1992). Feminist methods in social research. Oxford: Oxford University Press.

Saldañ a, 2012 Saldaña, J. (2012). The coding manual for qualitative researchers. Thousand Oaks, CA: SAGE Publications.

Southworth et al., 2005 Southworth, C. , Dawson, S. , Fraser, C. , & Tucker, S. (2005). A high-tech twist on abuse: Technology, intimate partner stalking, and advocacy. Violence Against Women Online Resources. Retrieved from http://nnedv.org/downloads/SafetyNet/NNEDV_HighTechTwist_PaperAndApxA_English08.pdf

Sprague, 2005 Sprague, J. (2005). Feminist methodologies for critical researchers: Bridging differences. Alta Mira: Rowmman & Littlefield.

Stark, 2007 Stark, E. (2007). Coercive control: The entrapment of women in personal life. Oxford: Oxford Unversity Press.

Stark, 2012 Stark, E. (2012). Looking beyond domestic violence: Policing coercive control. Journal of Police Crisis Negotiations, 12, 199217.

Stark, 2019 Stark, E. , & Hester, M. (2019). Coercive control: Update and review. Violence Against Women, 25(1), 81104.

Temple et al., 2016 Temple, J. R. , Choi, H. J. , Brem, M. , Wolford-Clevenger, C. , Stuart, G. L. , Peskin, F. M. , & Elmquist, J. (2016). The temporal association between traditional and cyber dating abuse among adolescents. Journal of Youth and Adolescence, 45, 340349.

Vickery and Everbach, 2018 Vickery, J. R. , & Everbach, T. (2018). The persistency of misogyny: From the streets, to our screens, to the White House. In J. R. Vickery , & T. Everbach (Eds.), Mediating misogyny: Gender, technology and harassment (pp. 127). Cham: Palgrave.

Wendt, 2009 Wendt, S. (2009). Domestic violence in rural Australia. Sydney: The Federation Press.

Whitehead, 1976 Whitehead, A. (1976). Sexual antagonisms in Herefordshire. In D. Barker , & S. Allen (Eds.), Dependence and exploitation in work and marriage (pp. 169203). London: Longman.

Woodlock, 2013 Woodlock, D. (2013). Technology-facilitated stalking: Findings and recommendations from the SmartSafe project. Carlton, VIC: Domestic Violence Resource Centre Victoria.

Woodlock, 2015 Woodlock, D. (2015). Recharge: Women's technology safety, legal resources, research and training. Collingwood: Women's Legal Service NSW, Domestic Violence Resource Centre Victirua and WESNET. Retrieved from https://www.dvrcv.org.au/sites/default/files/ReCharge_0.pdf

Woodlock, 2017 Woodlock, D. (2017). The abuse of technology in domestic violence and stalking. Violence Against Women, 23(5), 584602.

Zweig et al., 2013 Zweig, J. M. , Dank, M. , Yahner, J. , & Lachman, P. (2013). The rate of cyber dating abuse among teens and how it relates to other forms of teen dating violence. Journal of Youth and Adolescence, 42, 10631077.

Prelims
Technology-Facilitated Violence and Abuse: International Perspectives and Experiences
Section 1 TFVA Across a Spectrum of Behaviors
Chapter 1 Introduction
Chapter 2 Is it Actually Violence? Framing Technology-Facilitated Abuse as Violence
Chapter 3 “Not the Real World”: Exploring Experiences of Online Abuse, Digital Dualism, and Ontological Labor
Chapter 4 Polyvictimization in the Lives of North American Female University/College Students: The Contribution of Technology-Facilitated Abuse
Chapter 5 The Nature of Technology-Facilitated Violence and Abuse among Young Adults in Sub-Saharan Africa
Chapter 6 The Face of Technology-Facilitated Aggression in New Zealand: Exploring Adult Aggressors' Behaviors
Chapter 7 The Missing and Murdered Indigenous Women Crisis: Technological Dimensions
Chapter 8 Attending to Difference in Indigenous People's Experiences of Cyberbullying: Toward a Research Agenda
Section 2 Text-Based Harms
Chapter 9 Introduction
Chapter 10 “Feminism is Eating Itself”: Women's Experiences and Perceptions of Lateral Violence Online
Chapter 11 Claiming Victimhood: Victims of the “Transgender Agenda”
Chapter 12 Doxxing: A Scoping Review and Typology
Chapter 13 Creating the Other in Online Interaction: Othering Online Discourse Theory
Chapter 14 Text-Based (Sexual) Abuse and Online Violence Against Women: Toward Law Reform?
Section 3 Image-Based Harms
Chapter 15 Introduction
Chapter 16 Violence Trending: How Socially Transmitted Content of Police Misconduct Impacts Reactions toward Police Among American Youth
Chapter 17 Just Fantasy? Online Pornography's Contribution to Experiences of Harm
Chapter 18 Intimate Image Dissemination and Consent in a Digital Age: Perspectives from the Front Line
Section 4 Dating Applications
Chapter 19 Introduction
Chapter 20 Understanding Experiences of Sexual Harms Facilitated through Dating and Hook Up Apps among Women and Girls
Chapter 21 “That's Straight-Up Rape Culture”: Manifestations of Rape Culture on Grindr
Chapter 22 Navigating Privacy on Gay-Oriented Mobile Dating Applications
Section 5 Intimate Partner Violence and Digital Coercive Control
Chapter 23 Introduction
Chapter 24 Digital Coercive Control and Spatiality: Rural, Regional, and Remote Women's Experience
Chapter 25 Technology-Facilitated Violence Against Women in Singapore: Key Considerations
Chapter 26 Technology as Both a Facilitator of and Response to Youth Intimate Partner Violence: Perspectives from Advocates in the Global-South
Chapter 27 Technology-Facilitated Domestic Abuse and Culturally and Linguistically Diverse Women in Victoria, Australia
Section 6 Legal Responses
Chapter 28 Introduction
Chapter 29 Human Rights, Privacy Rights, and Technology-Facilitated Violence
Chapter 30 Combating Cyber Violence Against Women and Girls: An Overview of the Legislative and Policy Reforms in the Arab Region
Chapter 31 Image-Based Sexual Abuse: A Comparative Analysis of Criminal Law Approaches in Scotland and Malawi
Chapter 32 Revenge Pornography and Rape Culture in Canada's Nonconsensual Distribution Case Law
Chapter 33 Reasonable Expectations of Privacy in an Era of Drones and Deepfakes: Expanding the Supreme Court of Canada's Decision in R v Jarvis
Chapter 34 Doxing and the Challenge to Legal Regulation: When Personal Data Become a Weapon
Chapter 35 The Potential of Centralized and Statutorily Empowered Bodies to Advance a Survivor-Centered Approach to Technology-Facilitated Violence Against Women
Section 7 Responses Beyond Law
Chapter 36 Introduction
Chapter 37 Technology-Facilitated Violence Against Women and Girls in Public and Private Spheres: Moving from Enemy to Ally
Chapter 38 As Technology Evolves, so Does Domestic Violence: Modern-Day Tech Abuse and Possible Solutions
Chapter 39 Threat Modeling Intimate Partner Violence: Tech Abuse as a Cybersecurity Challenge in the Internet of Things
Chapter 40 Justice on the Digitized Field: Analyzing Online Responses to Technology-Facilitated Informal Justice through Social Network Analysis
Chapter 41 Bystander Apathy and Intervention in the Era of Social Media
Chapter 42 “I Need You All to Understand How Pervasive This Issue Is”: User Efforts to Regulate Child Sexual Offending on Social Media
Chapter 43 Governing Image-Based Sexual Abuse: Digital Platform Policies, Tools, and Practices
Chapter 44 Calling All Stakeholders: An Intersectoral Dialogue about Collaborating to End Tech-Facilitated Violence and Abuse
Chapter 45 Pandemics and Systemic Discrimination: Technology-Facilitated Violence and Abuse in an Era of COVID-19 and Antiracist Protest