Selected Research Papers on Technology used in Intimate Partner Violence

open access logo

Content Warning: this page contains content related to intimate partner violence


IPVTechBib is an online archive of selected research papers on Technology used in Intimate Partner violence. The icons next to each paper make it easy to download, cite, and link to papers. If you think I missed a paper, let me know. This page was largely inspired by the great Censorbib webpage. You can sort papers by year, reverse year (default), author, and reverse author.


If you are victim of surveillance in an intimate relationship, you can get support from organisations such as the National Network to End Domestic Violence in the US, the Refuge for women and children against domestic violence in UK, or la fédération nationale Solidarité France en France.

source code book 59 Papers
source code icon IPVTechBib code
update icon Last update: 2022-10-12
donate icon About Me
  • Intimate partner stalking and femicide: urgent implications for women's safety File download iconCached PDF download iconBibTeX download iconLink to paper
    Judith McFarlane, Jacquelyn Campbell, Kathy Jacquelyn
    Article in: Behavioral Sciences & the Law 20., 2002,
  • Intimate Partner Violence, Technology, and Stalking Cached PDF download iconBibTeX download iconLink to paper
    Cynthia Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, Sarah Tucker
    Article in: Violence against women 13., 2007,
  • Stalking in the Context of Intimate Partner AbuseIn the Victims' Words File download iconCached PDF download iconBibTeX download iconLink to paper
    Heather Melton
    Article in: Feminist Criminology - FEM CRIMINOL 2., 2007,
  • The Use of Information and Communication Technologies to Coerce and Control in Domestic Violence and Following Separation PDF download iconCached PDF download iconBibTeX download iconLink to paper
    T. Hand, D. Chung, M. Peters
    In Proc. of: , 2009,
  • The New Age of Stalking: Technological Implications for Stalking File download iconCached PDF download iconBibTeX download iconLink to paper
    Cynthia Fraser, Erica Olsen, Kaofeng Lee, Cindy Southworth, Sarah Tucker
    Article in: Juvenile and Family Court Journal 61., 2010,
  • Domestic violence and information communication technologies File download iconCached PDF download iconBibTeX download iconLink to paper
    J. P. Dimond, C. Fiesler, A. S. Bruckman
    Article in: Interacting with Computers 23.5, 2011,
  • Using technology to control intimate partners: An exploratory study of college undergraduates File download iconCached PDF download iconBibTeX download iconLink to paper
    Sloane Burke, Michele Wallen, Karen Vail-Smith, David Knox
    Article in: Computers in Human Behavior 27., 2011,
  • Technology-facilitated stalking: findings and resources from the SmartSafe project PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Delanie Woodlock
    Miscellaneous, 2013
  • Assessing Technology in the Context of Violence Against Women & Children: Examining Benefits & Risks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    British Columbia Society Transition Houses
    Miscellaneous, 2013
  • Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Budi Arief, Kovila Coopamootoo, Martin Emms, Aad Moorsel
    Article in: Proceedings of the ACM Conference on Computer and Communications Security ., 2014,
  • Smartphones Are Used To Stalk, Control Domestic Abuse Victims File download iconBibTeX download iconLink to paper
    NPR
    Webpage, https://www.npr.org/sections/alltechconsidered/2014/09/15/346149979/smartphones-are-used-to-stalk-control-domestic-abuse-victims, 2014
  • A social problem, not a technological problem : bullying, cyberbulling and public policy PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Berg, Breheny, Public Affairs (Australia)
    Book, Institute of Public Affairs [Melbourne], 2014
  • Intimate Surveillance PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Karen E.C. Levy
    In Proc. of: Idaho Law Review 50, 2015,
  • Romantic Partner Monitoring After Breakups: Attachment, Dependence, Distress, and Post-Dissolution Online Surveillance via Social Networking Sites PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Jesse Fox, Robert Tokunaga
    Article in: Cyberpsychology, Behavior, and Social Networking 18., 2015,
  • The Abuse of Technology in Domestic Violence and Stalking File download iconCached PDF download iconBibTeX download iconLink to paper
    Delanie Woodlock
    Article in: Violence Against Women 23., 2016,
  • Digital Technologies and Intimate Partner Violence: A Qualitative Analysis with Multiple Stakeholders PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    Article in: Proceedings of the ACM on Human-Computer Interaction 1., 2017,
  • Stories from survivors: Privacy & security practices when coping with intimate partner abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tara Matthews, Kathleen O’Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo
    In Proc. of: , 2017,
  • Inside the 'Stalkerware' Surveillance Market, Where Ordinary People Tap Each Other's Phones File download iconBibTeX download iconLink to paper
    Vice Motherboard
    Webpage, https://www.vice.com/en_us/article/53vm7n/inside-stalkerware-surveillance-market-flexispy-retina-x, 2017
  • Intimate Partner Digital Abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Michelle Ybarra, Myeshia Price-Feeney, Amanda Lenhart, Kathryn Zickuhr
    Miscellaneous, 2017
  • The Spyware Used in Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    R. Chatterjee, P. Doerfler, H. Orgad, S. Havron, J. Palmer, D. Freed, K. Levy, N. Dell, D. McCoy, T. Ristenpart
    In Proc. of: 2018 IEEE Symposium on Security and Privacy (SP), 2018,
  • A Stalker's Paradise: How Intimate Partner Abusers Exploit Technology PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, Nicola Dell
    In Proc. of: ACM Conference on Human Factors in Computing Systems, 2018,
  • Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, Jason Hong
    In Proc. of: Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security, 2018, USENIX Association
  • Rapport sur les cyber-violences conjugales PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Centre Hubertine Auclert
    Miscellaneous (french), 2018
  • Digital Coercive Control: Insights from Two Landmark Domestic Violence Studies File download iconCached PDF download iconBibTeX download iconLink to paper
    Bridget Harris, Delanie Woodlock
    Article in: British Journal of Criminology 59., 2018,
  • Gender and IoT Research Report The rise of the Internet of Things and implications for technology-facilitated abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Leonie Tanczer, Isabel Neira, Simon Edward Parkin, Trupti N Patel, George Danezis
    In Proc. of: , 2018,
  • Cyber-Violence: Digital Abuse in the Context of Domestic Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Hadeel al-alosi
    Article in: ., 2018,
  • Technology Related Violence Aganst Women - Investigating Tech Related Violence Against Women in Peri-Urban Areas of Uganda PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Wougnet, APC, Sida
    Article in: ., 2018,
  • “Is My Phone Hacked?” Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Sam Havron, Emily Tseng, Andrea Gallardo, Rahul Chatterjee, Thomas Ristenpart, Nicola Dell
    Article in: Proc. ACM Hum.-Comput. Interact. 3.CSCW, 2019, Association for Computing Machinery
  • Clinical Computer Security for Victims of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, 2019, USENIX Association
  • The Predator in Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ron Deibert
    Miscellaneous, 2019
  • Installing Fear - A Canadian Legal and Policy Analysis of Using, Developing, and Selling Smartphone Spyware and Stalkerware Applications PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cynthia Khoo, Kate Robertson, Ronald Deibert
    Miscellaneous, 2019
  • The commodification of mobile phone surveillance: An analysis of the consumer spyware industry File download iconCached PDF download iconBibTeX download iconLink to paper
    Diarmaid Harkin, Adam Molnar, Erica Vowles
    Article in: Crime, Media, Culture: An International Journal ., 2019,
  • Technology-Facilitated Intimate Partner Abuse: a qualitative analysis of data from online domestic abuse forums File download iconCached PDF download iconBibTeX download iconLink to paper
    Roxanne Leitão
    Article in: Human–Computer Interaction 0.0, 2019, Taylor & Francis
  • Women, Domestic Violence Service Providers, and Knowledge of Technology-Related Abuse File download iconCached PDF download iconBibTeX download iconLink to paper
    Nadine E White
    Miscellaneous, 2019
  • Technology-facilitated Domestic and Family Violence: Women’s Experiences File download iconCached PDF download iconBibTeX download iconLink to paper
    Heather Douglas, Bridget Harris, Molly Dragiewicz
    Article in: British Journal of Criminology 59., 2019,
  • Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Simon Parkin, Trupti Patel, Isabel Lopez-Neira, Leonie Tanczer
    In Proc. of: , 2019,
  • Anticipating Smart Home Security and Privacy Threats with Survivors of Intimate Partner Abuse File download iconCached PDF download iconBibTeX download iconLink to paper
    Roxanne Leitão
    In Proc. of: , 2019,
  • ‘Internet of Things’: How Abuse is Getting Smarter File download iconCached PDF download iconBibTeX download iconLink to paper
    Isabel Lopez-Neira, Trupti Patel, Simon Parkin, George Danezis, Leonie Tanczer
    Article in: SSRN Electronic Journal 63., 2019,
  • The Many Kinds of Creepware Used for Interpersonal Attacks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    K. A. Roundy, P. Barmaimon Mendelberg, N. Dell, D. McCoy, D. Nissani, T. Ristenpart, A. Tamersoy
    In Proc. of: 2020 IEEE Symposium on Security and Privacy (SP), 2020, IEEE Computer Society
  • Privacy threats in intimate relationships PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Karen Levy, Bruce Schneier
    Article in: ArXiv abs/2006.03907., 2020,
  • Stalkerware Test 2020 PDF download iconCached PDF download iconBibTeX download iconLink to paper
    AV Comparatives
    Miscellaneous, 2020
  • The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart
    In Proc. of: 29th USENIX Security Symposium (USENIX Security 20), 2020, USENIX Association
  • Technology-Facilitated Domestic Abuse in Political Economy: A New Theoretical Framework File download iconCached PDF download iconBibTeX download iconLink to paper
    Elizabeth Yardley
    Article in: Violence Against Women 0.0, 2020, PMID: 32757887
  • Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control File download iconCached PDF download iconBibTeX download iconLink to paper
    Delanie Woodlock, Mandy McKenzie, Deborah Western, Bridget Harris
    Article in: Australian Social Work 73.3, 2020, Routledge
  • Technology and violence against women File download iconBibTeX download iconLink to paper
    Bridget Harris
    In Coll. of: The Emerald Handbook of Feminism, Criminology and Social Change, 2020, Emerald
  • “So-called privacy breeds evil”: Narrative Justifications for Intimate Partner Surveillance in Online Forums PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Rosanna Bellini, Emily Tseng
    In Proc. of: , 2020,
  • Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers File download iconCached PDF download iconBibTeX download iconLink to paper
    Audrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman
    In Proc. of: Proceedings of the ACM Internet Measurement Conference, 2020, Association for Computing Machinery
  • Diagnóstico de violencia de género digital en Ecuador PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Navegando red
    Miscellaneous, 2020
  • A Digital Safety Dilemma: Analysis of Computer-Mediated Computer Security Interventions for Intimate Partner Violence During COVID-19 PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diana Freed, Emily Tseng, Thomas Ristenpart, Nicola Dell, Kristen Engle
    Article in: ., 2021,
  • Threat Modeling Intimate Partner Violence: Tech Abuse as a Cybersecurity Challenge in the Internet of Things File download iconCached PDF download iconBibTeX download iconLink to paper
    Julia Slupska, Leonie Maria Tanczer
    Article in: ., 2021,
  • ‘I feel like we’re really behind the game’: perspectives of the United Kingdom’s intimate partner violence support sector on the rise of technology-facilitated abuse PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Leonie Tanczer, Isabel López-Neira, Simon Parkin
    Article in: Journal of Gender-Based Violence ., 2021,
  • The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin Roundy, Florian Schaub, Acar Tamersoy
    In Proc. of: 30th USENIX Security Symposium (USENIX Security 21), 2021, USENIX Association
  • Trust and Abusability Toolkit: Centering Safety in Human-Data Interactions PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Angelika Strohmayer, Julia Slupska, Rosanna Bellini, Lynne Coventry, Tara Hairston, Adam Dodge
    Book, , 2021 Funding information: This toolkit was funded by UK Research and Innovation\textquoterights Engineering and Physical Sciences Research Council\textquoterights Human-Data Interaction Network+ (EP/R045178/1 Human Data Interaction: Legibility, Agency, Negotiability) and parts of this work were funded by a UK Research and Innovation Citizen Science grant (BB/T018593/1).
  • Technology-Facilitated Abuse Prevalence and Associations Among a Nationally Representative Sample of Young Men PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Laura Seewald, Tova B. Walsh, Richard M. Tolman, Shawna J. Lee, Lauren A. Reed, Quyen Ngo, Vijay Singh
    Article in: The Annals of Family Medicine 20.1, 2022, The Annals of Family Medicine
  • Technology-Facilitated Abuse in Intimate Relationships: A Scoping Review File download iconCached PDF download iconBibTeX download iconLink to paper
    Michaela M. Rogers, Colleen Fisher, Parveen Ali, Peter Allmark, Lisa Fontes
    Article in: Trauma, Violence, \& Abuse ., 2022, PMID: 35537445
  • Analyzing the Monetization Ecosystem of Stalkerware PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, Kevin R. B. Butler
    In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
  • A Global Survey of Android Dual-Use Applications Used in Intimate Partner Surveillance PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Majed Almansoori, Andrea Gallardo, Julio Poveda, Adil Ahmed, Rahul Chatterjee
    In Proc. of: Privacy Enhancing Technologies Symposium, 2022,
  • Technology-Based Responses to Technology-Facilitated Domestic and Family Violence: An Overview of the Limits and Possibilities of Tech-Based “Solutions” File download iconCached PDF download iconBibTeX download iconLink to paper
    Diarmaid Harkin, Robert Merkel
    Article in: Violence Against Women ., 2022, PMID: 35763542
  • No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Enze Liu, Sumanth Rao, Sam Havron, Grant Ho Stefan Savage, Damon McCoy Geoffrey M. Voelker and
    In Proc. of: Privacy Enhancing Technologies Symposium, 2023,
Icons taken without modification from Font Awesome.