Search results
1 – 10 of 21Bridget Harris and Delanie Woodlock
Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical…
Abstract
Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical framework for technology-facilitated harms in heterosexual relationships which we characterize as digital coercive control. Here, we include behaviors which can be classified as abuse and stalking and also individualized tactics which are less easy to categorize, but evoke fear and restrict the freedoms of a particular woman. Drawing on their knowledge of a victim/survivor's experiences and, in the context of patterns and dynamics of abuse, digital coercive control strategies are personalized by perpetrators and extend and exacerbate “real-world” violence.
Digital coercive control is unique because of its spacelessness and the ease, speed, and identity-shielding which technology affords. Victim/survivors describe how perpetrator use of technology creates a sense of omnipresence and omnipotence which can deter women from exiting violent relationships and weakens the (already tenuous) notion that abuse can be “escaped.” We contend that the ways that digital coercive control shifts temporal and geographic boundaries warrant attention. However, spatiality more broadly cannot be overlooked. The place and shape in which victim/survivors and perpetrators reside will shape both experiences of and response to violence. In this chapter, we explore these ideas, reporting on findings from a study on digital coercive control in regional, rural, and remote Australia. We adopt a feminist research methodology in regard to our ethos, research processes, analysis, and the outputs and outcomes of our project. Women's voices are foreground in this approach and the emphasis is on how research can be used to inform, guide, and develop responses to domestic violence.
Details
Keywords
Suzie McGreevy and Pauline Boland
An emerging evidence base, and increased awareness of the effects of trauma on the body, advocates a sensory-based approach to treatment with posttraumatic stress and complex…
Abstract
Purpose
An emerging evidence base, and increased awareness of the effects of trauma on the body, advocates a sensory-based approach to treatment with posttraumatic stress and complex trauma survivors. This paper aims to identify, analyse and summarise the empirical evidence for the sensory-based interventions, which occupational therapists are using in the treatment of adult and adolescent trauma survivors.
Design/methodology/approach
An integrative review of the literature was undertaken. Both empirical and conceptual papers were included. An inductive approach and constant comparative method were used to understand and synthesise the research.
Findings
The literature search yielded 18 papers describing the types of sensory-based interventions used, sensory processing (SP) patterns and the context and evidence for sensory-based occupational therapy practice with trauma survivors. Nine of the studies were empirical and nine were conceptual and review papers. Themes identified included: atypical SP patterns; type of sensory-based intervention used with trauma survivors; and transdisciplinary treatment programmes can reduce the symptoms of trauma.
Practical implications
Sensory-based interventions with adult and adolescent trauma survivors are emerging as promising areas of practice and research in the literature. Although empirical data is limited, the sensory needs of the body in processing trauma experiences is becoming more recognised and are supported by the atypical SP patterns identified in survivors. A sensory-based, transdisciplinary approach to treatment has the potential to be effective in treating the trauma survivor.
Originality/value
With a skill base in sensory integration and occupational analysis, occupational therapists have much to offer the field of trauma studies. This review begins to address the gap in the literature, recommending more rigorous controlled outcome research with larger sample sizes, person-centred studies focussing on the trauma survivor’s perspective and continuing professional development and mentorship for occupational therapists working with this population.
Details
Keywords
Julia Slupska and Leonie Maria Tanczer
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…
Abstract
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.
Details
Keywords
Jenifer Wolf Williams and Stuart Allen
Though trauma survivors sometimes emerge as leaders in prosocial causes related to their previous negative or traumatic experiences, little is known about this transition, and…
Abstract
Though trauma survivors sometimes emerge as leaders in prosocial causes related to their previous negative or traumatic experiences, little is known about this transition, and limited guidance is available for survivors who hope to make prosocial contributions. To understand what enables trauma-inspired prosocial leadership development, the transition narratives of seven trauma-inspired leaders who varied by global region, primary language, gender, ethnicity, religion, trauma type, and leadership area were analyzed. Using interpretative phenomenological analysis in an exploratory study, participants’ transitional journeys were examined through analysis of their autobiographies. Critical findings included frequent references by all participants to perspective enlargement (reframing a problem or context) and resilience to the negative, apathetic, or retaliatory responses to the mission (possibly learned through resilience to trauma itself). This study explores posttraumatic leadership conceptually and makes suggestions for leadership development among trauma-inspired survivors
Eva PenzeyMoog and Danielle C. Slakoff
The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this…
Abstract
The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this chapter, we discuss three unique types of technological abuse: (1) financial abuse via banking websites and apps; (2) abuse via smart home devices (i.e., “Internet of Things” abuse); and (3) stalking via geo-location or GPS. We also argue pregnancy and wellness apps provide an opportunity for meaningful intervention for pregnant victims of domestic violence.
While there is no way to ensure users' safety in all situations, we argue thoughtful considerations while designing and building digital products can result in meaningful contributions to victims' safety. This chapter concludes with PenzeyMoog's (2020) “Framework for Inclusive Safety,” which is a roadmap for building technology that increases the safety of domestic violence survivors. This framework includes three key points: (1) the importance of educating technologists about domestic violence; (2) the importance of identifying possible abuse situations and designing against them; and (3) identifying user interactions that might signal abuse and offering safe interventions.
Details
Keywords
Michael Salter and Elly Hanson
This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the…
Abstract
This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the absence of adequate intervention by internet service providers, social media platforms, and government. The chapter discusses the history of online CSE, focusing on regulatory stances over time in which online risks to children have been cast as natural and inevitable by the hegemony of a “cyberlibertarian” ideology. We illustrate the success of this ideology, as well as its profound contradictions and ethical failures, by presenting key examples in which internet users have taken decisive action to prevent online CSE and promote the removal of CSAM. Rejecting simplistic characterizations of “vigilante justice,” we argue instead that the fact that often young internet users report feeling forced to act against online CSE and CSAM undercuts libertarian claims that internet regulation is impossible, unworkable, and unwanted. Recent shifts toward a more progressive ethos of online harm minimization are promising; however, this ethos risks offering a new legitimizing ideology for online business models that will continue to put children at risk of abuse and exploitation. In conclusion, we suggest ways forward toward an internet built in the interests of children, rather than profit.
Details