Warwick Business School, 3042University of Warwick, Coventry, United Kingdom.
School of Nursing and Health Sciences, 3042University of Dundee, United Kingdom.
Trauma Violence Abuse. 2022 Apr;23(2):581-593. doi: 10.1177/1524838020957985. Epub 2020 Sep 15.
This systematic review synthesizes evidence of how people use the internet to deploy covert strategies around escaping from, or perpetrating, intimate partner violence (IPV). Online tools and services can facilitate individuals leaving abusive relationships, yet they can also act as a barrier to departure. They may also enable abusive behaviors. A comprehensive literature search of published and unpublished studies in electronic databases was conducted. Two researchers independently screened abstracts and full texts for study eligibility and evaluated the quality of included studies. The systematic review includes 22 studies (9 qualitative and 11 cross-sectional studies, a randomized control trial [RCT] and a nonrandomized study [NRS]) published between 2004 and 2017. Four covert behaviors linked to covert online strategies around IPV were identified: presence online, granular control, use of digital support tools and services, and stalking and surveillance. The same technology that provides individuals with easy access to information and supportive services related to IPV, such as digital devices, tools, and services, also enables perpetrators to monitor or harass their partners. This review takes a rigorous interdisciplinary approach to synthesizing knowledge on the covert strategies adopted by people in relation to IPV. It has particular relevance to practitioners who support survivors in increasing awareness of the role of digital technologies in IPV, to law enforcement agencies in identifying new forms of evidence of abuse, and in enabling designers of online/social media applications to take the needs and vulnerabilities of IPV survivors into account.
本系统评价综合了有关人们如何利用互联网来实施逃避或实施亲密伴侣暴力(IPV)的隐蔽策略的证据。在线工具和服务可以帮助个人离开虐待关系,但它们也可能成为离开的障碍。它们也可能使虐待行为得逞。我们对电子数据库中已发表和未发表的研究进行了全面的文献检索。两名研究人员独立筛选了摘要和全文,以确定研究的合格性,并评估了纳入研究的质量。本系统评价包括 2004 年至 2017 年期间发表的 22 项研究(9 项定性研究和 11 项横断面研究、一项随机对照试验[RCT]和一项非随机研究[NRS])。确定了与 IPV 相关的隐蔽在线策略有关的四种隐蔽行为:在线存在、粒度控制、数字支持工具和服务的使用以及跟踪和监视。为个人提供方便访问与 IPV 相关的信息和支持性服务的相同技术,例如数字设备、工具和服务,也使施虐者能够监控或骚扰他们的伴侣。本综述采用严格的跨学科方法综合了有关人们在 IPV 方面采用的隐蔽策略的知识。它对支持幸存者提高对数字技术在 IPV 中的作用的认识的从业者、执法机构识别虐待的新形式的证据以及使在线/社交媒体应用程序的设计者能够考虑 IPV 幸存者的需求和脆弱性具有特别重要的意义。