This systematic review synthesizes evidence of how people use the internet to deploy covert strategies around escaping from, or perpetrating, intimate partner violence (IPV). Online tools and services can facilitate individuals leaving abusive relationships, yet they can also act as a barrier to departure. They may also enable abusive behaviors. A comprehensive literature search of published and unpublished studies in electronic databases was conducted. Two researchers independently screened abstracts and full texts for study eligibility and evaluated the quality of included studies. The systematic review includes 22 studies (9 qualitative and 11 cross-sectional studies, a randomized control trial [RCT] and a nonrandomized study [NRS]) publ...
This PhD work aimed to better understand how 1) existing and near-future digital technologies are us...
Purpose: Computational text mining methods are proposed as a useful methodologica...
A multidisciplinary team of academics from the University of Kent’s Institute for Cyber Security in ...
This systematic review synthesizes evidence of how people use the internet to deploy covert strategi...
INTRODUCTION: Traditional forms of intimate partner violence (IPV) such as physical and psychologica...
Technology-facilitated abuse (TFA) is a significant, harmful phenomenon and emerging trend in intima...
During the COVID-19 pandemic, lockdowns and isolation have limited the availability of face-to-face ...
Women are increasingly at risk of gender-based violence through technology and digital tools. Some ...
16 pagesTechnology has undeniably become an integrated component of day to day life. From Google Map...
An emerging concern in relation to the importance of technology and social media in everyday life re...
Intimate Partner Violence (IPV) can have a lasting impact on survivors’ emotional, physical, and psy...
Cyber intimate partner violence (C-IPV) is a technology-mediated form of violence. It has been exami...
For most of us advances in digital technology have made our lives easier, by providing access to inf...
This study aimed to determine the information needs of the intimate partner violence (IPV) survivors...
This PhD work aimed to better understand how 1) existing and near-future digital technologies are us...
Purpose: Computational text mining methods are proposed as a useful methodologica...
A multidisciplinary team of academics from the University of Kent’s Institute for Cyber Security in ...
This systematic review synthesizes evidence of how people use the internet to deploy covert strategi...
INTRODUCTION: Traditional forms of intimate partner violence (IPV) such as physical and psychologica...
Technology-facilitated abuse (TFA) is a significant, harmful phenomenon and emerging trend in intima...
During the COVID-19 pandemic, lockdowns and isolation have limited the availability of face-to-face ...
Women are increasingly at risk of gender-based violence through technology and digital tools. Some ...
16 pagesTechnology has undeniably become an integrated component of day to day life. From Google Map...
An emerging concern in relation to the importance of technology and social media in everyday life re...
Intimate Partner Violence (IPV) can have a lasting impact on survivors’ emotional, physical, and psy...
Cyber intimate partner violence (C-IPV) is a technology-mediated form of violence. It has been exami...
For most of us advances in digital technology have made our lives easier, by providing access to inf...
This study aimed to determine the information needs of the intimate partner violence (IPV) survivors...
This PhD work aimed to better understand how 1) existing and near-future digital technologies are us...
Purpose: Computational text mining methods are proposed as a useful methodologica...
A multidisciplinary team of academics from the University of Kent’s Institute for Cyber Security in ...