Please use this identifier to cite or link to this item:
Record ID: 2a36ab0a-3df2-45f7-a48c-b9024006a12e
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMcDonald, Noraen
dc.contributor.authorBellini, Rosannaen
dc.contributor.authorTseng, Emilyen
dc.contributor.authorGreenstadt, Rachelen
dc.contributor.authorDell, Nicolaen
dc.contributor.authorRistenpart, Thomasen
dc.contributor.authorMcCoy, Damonen
dc.publisherAssociation for Computing Machineryen
dc.relation.ispartof23rd ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2020)en
dc.title"So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forumsen
dc.typeConference Paperen
dc.subject.readinglistANROWS Notepad 2020 November 5en
dc.description.notes<p><span style="left: 65.6488px;top: 323.117px;font-size: 12.933px;font-family: sans-serif;">A growing body of research suggests that intimate partner abusers use digital technologies to surveil their</span><span style="left: 66.1017px;top: 338.924px;font-size: 12.933px;font-family: sans-serif;">partners, including by installing spyware apps, compromising devices and online accounts, and employing</span><span style="left: 66.1017px;top: 354.731px;font-size: 12.933px;font-family: sans-serif;"> social engineering tactics. However, to date, this form of privacy violation, called intimate partner surveillance </span><span style="left: 65.7137px;top: 370.539px;font-size: 12.933px;font-family: sans-serif;">(IPS), has primarily been studied from the perspective of victim-survivors. We present a qualitative study of</span><span style="left: 66.1017px;top: 386.346px;font-size: 12.933px;font-family: sans-serif;">how potential perpetrators of IPS harness the emotive power of sharing personal narratives to validate and </span><span style="left: 66.1017px;top: 402.153px;font-size: 12.933px;font-family: sans-serif;">legitimise their abusive behaviours. We analysed 556 stories of IPS posted on publicly accessible online forums</span><span style="left: 66.1017px;top: 417.96px;font-size: 12.933px;font-family: sans-serif;"> dedicated to the discussion of sexual infidelity. We found that many users share narrative posts describing IPS</span><span style="left: 66.1017px;top: 433.766px;font-size: 12.933px;font-family: sans-serif;"> as they boast about their actions, advise others on how to perform IPS without detection, and seek suggestions </span><span style="left: 66.1017px;top: 449.573px;font-size: 12.933px;font-family: sans-serif;">for next steps to take. We identify a set of common thematic story structures, justifications for abuse, and</span><span style="left: 66.1017px;top: 465.38px;font-size: 12.933px;font-family: sans-serif;"> outcomes within the stories that provide a window into how these individuals believe their behaviour to</span><span style="left: 66.1017px;top: 481.187px;font-size: 12.933px;font-family: sans-serif;">be justified. Using these stories, we develop a four-stage framework that captures the change in a potential</span><span style="left: 66.1017px;top: 496.994px;font-size: 12.933px;font-family: sans-serif;"> perpetrator&rsquo;s approach to IPS. We use our findings and framework to guide a discussion of efforts to combat </span><span style="left: 66.1017px;top: 512.801px;font-size: 12.933px;font-family: sans-serif;">abuse, including how we can identify crucial moments where interventions might be safely applied to prevent</span><span style="left: 66.1017px;top: 528.608px;font-size: 12.933px;font-family: sans-serif;">or deescalate IPS</span>.</p>en
dc.identifier.source23rd ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2020)en
dc.subject.listANROWS Notepad 2020 November 5en
Appears in Collections:ANROWS Notepad 2020
Conference Papers

Files in This Item:
There are no files associated with this item.

Items in ANROWS library are protected by copyright, with all rights reserved, unless otherwise indicated.

Google Media

Google ScholarTM

Who's citing