In: Tanczer, Leonie Maria. "Technology-facilitated abuse and the Internet of Things (IoT): The implication of the smart, Internet-connected devices on domestic violence and abuse." Technology and Domestic and Family Violence. Routledge, 2023. 76-87.
In: Tanczer, L. M., López-Neira, I., & Parkin, S. (2021). 'I feel like we're really behind the game': Perspectives of the United Kingdom's intimate partner violence support sector on the rise of technology-facilitated abuse. Journal of Gender-Based Violence, 5(3), 431–450. https://doi.org/10.1332/239868
Abstract Purpose Technology-facilitated domestic abuse (TFDA) is a prevalent form of domestic abuse. While police are recognized as critical first responders to intimate partner violence, there is limited research about what the challenges to policing TFDA are perceived to be and how they might be addressed. This article speaks to this issue.
Methods Between April 2020 and June 2022, n = 196 Australian and n = 256 United Kingdom representatives of services engaged with domestic abuse victim-survivors participated in an online survey about TFDA. Survey components asked respondents to report on challenges to policing TFDA. The authors analyzed these comments.
Results Key themes identified from the survey responses regarding challenges to policing TFDA include that participants held perceptions that (a) police do not recognize TFDA as an aspect of coercive control and thus do not recognize its seriousness, (b) police receive inadequate training about TFDA, (c) police have insufficient time and personnel to tackle TFDA and (d) evidence collection is an obstacle to policing TFDA.
Conclusions The study points to a need to address the perceived concerns associated with policing TFDA to effectively respond to domestic abuse in the digital age and ensure domestic abuse perpetrators who misuse emerging technologies are held accountable.
Technology-facilitated abuse or 'tech abuse' in intimate partner violence (IPV) contexts describes the breadth of harms that can be enacted using digital systems and online tools. While the misappropriation of technologies in the context of IPV has been subject to prior research, a dedicated study on the United Kingdom's IPV support sector has so far been missing. The present analysis summarises insights derived from semi-structured interviews with 34 UK voluntary and statutory sector representatives that were conducted over the course of two years (2018–2020). The analysis identifies four overarching themes that point out support services' practices, concerns and challenges in relation to tech abuse, and specifically the Internet of Things (IoT). These themes include (a) technology-facilitated abuse, where interviewees outline their experiences and understanding of the concept of tech abuse; (b) IoT-enabled tech abuse, focusing on the changing dynamics of tech abuse due to the continuing rise of smart consumer products; (c) data, documentation and assessment, that directs our attention to the shortcomings of existing risk assessment and recording practices; and (d) training, support and assistance, in which participants point to the need for specialist support capabilities to be developed within and beyond existing services.
Abstract Purpose Computational text mining methods are proposed as a useful methodological innovation in Intimate Partner Violence (IPV) research. Text mining can offer researchers access to existing or new datasets, sourced from social media or from IPV-related organisations, that would be too large to analyse manually. This article aims to give an overview of current work applying text mining methodologies in the study of IPV, as a starting point for researchers wanting to use such methods in their own work.
Methods This article reports the results of a systematic review of academic research using computational text mining to research IPV. A review protocol was developed according to PRISMA guidelines, and a literature search of 8 databases was conducted, identifying 22 unique studies that were included in the review.
Results The included studies cover a wide range of methodologies and outcomes. Supervised and unsupervised approaches are represented, including rule-based classification (n = 3), traditional Machine Learning (n = 8), Deep Learning (n = 6) and topic modelling (n = 4) methods. Datasets are mostly sourced from social media (n = 15), with other data being sourced from police forces (n = 3), health or social care providers (n = 3), or litigation texts (n = 1). Evaluation methods mostly used a held-out, labelled test set, or k-fold Cross Validation, with Accuracy and F1 metrics reported. Only a few studies commented on the ethics of computational IPV research.
Conclusions Text mining methodologies offer promising data collection and analysis techniques for IPV research. Future work in this space must consider ethical implications of computational approaches.
In: Turner, S., Galindo Quintero, J., Turner, S., Lis, J., & Tanczer, L. M. (2020). The exercisability of the right to data portability in the emerging Internet of Things (IoT) environment. New Media & Society. https://doi.org/10.1177/1461444820934033
In: Tanczer, L. M., Brass, I., Elsden, M., Carr, M., & Blackstock, J. (2019). The United Kingdom's Emerging Internet of Things (IoT) Policy Landscape. In R. Ellis & V. Mohan (Eds.), Rewired: Cybersecurity Governance (pp. 37–56). Hoboken, New Jersey: Wiley.
In: New media & society: an international and interdisciplinary forum for the examination of the social dynamics of media and information change, Band 23, Heft 10, S. 2861-2881
The right to data portability (RtDP), as outlined in the European Union's General Data Protection Regulation (GDPR), enables data subjects to transmit their data from one service to another. This is of particular interest in the evolving Internet of Things (IoT) environment. This research delivers the first empirical analysis detailing the exercisability of the RtDP in the context of consumer IoT devices and the information provided to users about exercising the right. In Study 1, we reviewed 160 privacy policies of IoT producers to understand the level of information provided to a data subject. In Study 2, we tested four widely available IoT systems to examine whether procedures are in place to enable users to exercise the RtDP. Both studies showcase how the RtDP is not yet exercisable in the IoT environment, risking consumers being unable to unlock the long-term benefits of IoT systems.
AbstractThe Internet and digital technologies have become indispensable in academia. A world without email, search engines, and online databases is practically unthinkable. Yet, in this time of digital dependence, the academy barely demonstrates an appetite to reflect upon the new challenges that digital technologies have brought to the scholarly profession. This forum's inspiration was a roundtable discussion at the 2017 International Studies Association Annual Convention, where many of the forum authors agreed on the need for critical debate about the effects of online surveillance and censorship techniques on scholarship. This forum contains five critiques regarding our digitized infrastructures, datafied institutions, mercenary corporations, exploitative academic platforms, and insecure online practices. Together, this unique collection of articles contributes to the research on academic freedom and helps to frame the analysis of the neoliberal higher education sector, the surveillance practices that students and staff encounter, and the growing necessity to improve our "digital hygiene."
Frontmatter -- Inhalt -- Einleitung -- Digitalisierung geschlechtsspezifischer Gewalt als Diskussionsgegenstand -- Digitalisierung geschlechtsspezifischer Gewalt -- Menschenrechtlicher Schutzrahmen für Betroffene von digitaler Gewalt -- Formen digitaler geschlechtsspezifischer Gewalt -- Spezifika geschlechtsspezifischer Gewalt im digitalen Raum -- Funktionsprinzipien des Internets und ihre Risiken im Kontext digitaler geschlechtsspezifischer Gewalt -- Intersektionale Machtverhältnisse im Internet -- Rechtliche Handlungsoptionen bei digitaler Gewalt -- Möglichkeiten und Grenzen strafrechtlicher Intervention bei digitaler Gewalt -- Zivilrechtliche Interventionen bei digitaler Gewalt -- Rechtliche Handlungsoptionen: Öffentliches Recht -- Erfahrungen und Strategien im Umgang mit digitaler geschlechtsspezifischer Gewalt -- Erfahrungen mit der Beratung von betroffenen Mädchen und Frauen im Kontext digitaler Gewalt -- Das Internet der Dinge -- Der Feind in der eigenen Tasche -- Individuelle Strategien im Umgang mit geschlechtsspezifischer digitaler Gewalt -- Strategien im Umgang mit Online-Hate Speech -- Digitale Erste Hilfe: Prävention und Intervention -- Digitale Erste Hilfe und Sicherheitsprinzipien für Berater*innen bei digitaler Gewalt -- Digitale Sicherheit für frauenspezifische Einrichtungen -- Ausblick -- Effektiver Schutz vor digitaler geschlechtsspezifischer Gewalt -- Autor*innen
Digitale Gewalt kommt nicht nur im öffentlichen Raum vor, sondern auch in privaten Beziehungen – und hat in Kombination mit häuslicher und sexualisierter Gewalt eine deutlich geschlechtsspezifische Komponente. Durch Informations- und Kommunikationstechnologien haben Gewaltformen wie Doxing, Stalking, Hate Speech und Online-Belästigung und -Bedrohung stark zugenommen und durch die Nutzung des Internets ihre Wirkmächtigkeit verstärkt. Die Beiträger*innen des Bandes liefern für den Umgang mit diesen Gewaltformen grundlegende interdisziplinäre Analysen und diskutieren sowohl juristische, technische und aktivistische Interventionen als auch Erfahrungen aus der Beratungspraxis. Dabei werden zentrale politische Änderungsbedarfe ausgemacht und entsprechende Handlungsoptionen aufgezeigt.