Abstract
Quantitative evidence on technology-facilitated abuse (“tech abuse”) in intimate partner violence (IPV) contexts is lacking globally. This shortcoming creates barriers to the development of evidence-based interventions. This chapter draws on a data science-driven research project which aims to generate statistical evidence on the nature and extent of IPV tech abuse in the United Kingdom (UK). Using data from the independent UK charity Crimestoppers (2014–2019), we showcase an automated approach, facilitating Natural Language Processing and machine learning methods, to identify tech-abuse cases within large amounts of unstructured text data. The chapter offers both useful insights into the types of tech abuse found within the data, as well as the challenges and benefits computational methodologies provide. The research team has released the code and trained machine learning algorithm along with the publication of this chapter. This hopefully allows other researchers to test, deploy, and further improve the automated approach and could facilitate the analysis of other text datasets to identify tech abuse.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
University College London (UCL) Research Ethics Committee—Project ID Number: 10503/001.
- 2.
The code and the trained model for making predictions can be found at: “https://osf.io/fea5j/?view_only=35786879fdee4d21bc1da71cba3661d1”.
- 3.
For a full list of all stopwords, see Bird et al. (2009).
- 4.
We also extracted n-gram, and POS proportions, but they resulted in lower classification performances.
- 5.
Model parameters were set to l = 1 and dual = False, while the remaining parameters were unchanged (default settings).
References
Axelsson, S. (2000). The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security, 3(3), 186–205. https://doi.org/10.1145/357830.357849.
Batista, G. E. A. P. A., Prati, R. C., & Monard, M. C. (2004). A study of the behavior of several methods for balancing machine learning training data. ACM SIGKDD Explorations Newsletter, 6(1), 20–29. https://doi.org/10.1145/1007730.1007735.
Bird, S., Klein, E., & Loper, E. (2009). Natural language processing with python. O’Reilly Media.
Brown, M. L., Reed, L. A., & Messing, J. T. (2018). Technology-based abuse: Intimate partner violence and the use of information communication technologies. In J. R. Vickery & T. Everbach (Eds.), Mediating misogyny: Gender, technology, and harassment (pp. 209–227). Springer International Publishing. https://doi.org/10.1007/978-3-319-72917-6_11.
Burton, S., Tanczer, L. M., Vasudevan, S., & Carr, M. (2021). The UK code of practice for consumer IoT cybersecurity: Where we are and what next (pp. 1–74). Department of Digital Culture, Media and Sport; The PETRAS National Centre of Excellence for IoT Systems Cybersecurity. Retrieved from website: https://discovery.ucl.ac.uk/id/eprint/10117734/.
Citron, D., & Franks, M. A. (2014). Criminalizing revenge porn. Wake Forest Law Review, 49, 345–391.
Dhar, V. (2013). Data science and prediction. Communications of the ACM, 56(12), 64–73. https://doi.org/10.1145/2500499.
Dragiewicz, M., Burgess, J., Matamoros-Fernández, A., Salter, M., Suzor, N. P., Woodlock, D., & Harris, B. (2018). Technology facilitated coercive control: Domestic violence and the competing roles of digital media platforms. Feminist Media Studies, 18(4), 609–625. https://doi.org/10.1080/14680777.2018.1447341.
Flynn, A., & Henry, N. (2019). Image-based sexual abuse: An Australian reflection. Women & Criminal Justice, 1–14. https://doi.org/10.1080/08974454.2019.1646190.
Freed, D., Palmer, J., Minchala, D. E., Levy, K., Ristenpart, T., & Dell, N. (2017). Digital technologies and intimate partner violence: A qualitative analysis with multiple stakeholders. In Proceedings of the ACM on Human-Computer Interaction, 1(CSCW) (pp. 1–22). https://doi.org/10.1145/3134681.
Harris, B. A., & Woodlock, D. (2019). Digital coercive control: Insights from two landmark domestic violence studies. The British Journal of Criminology, 59(3), 530–550. https://doi.org/10.1093/bjc/azy052.
Henry, N., & Flynn, A. (2019). Image-based sexual abuse: Online distribution channels and illicit communities of support. Violence Against Women, 25(16), 1932–1955. https://doi.org/10.1177/1077801219863881.
Henry, N., Flynn, A., & Powell, A. (2020). Technology-facilitated domestic and sexual violence: A review. Violence Against Women, 26(15–16), 1828–1854. https://doi.org/10.1177/1077801219875821.
Henry, N., & Flynn, A. L. G. (2018). Technology-facilitated abuse among culturally and linguistically diverse woman: A qualitative study (p. 94). Canberra: Office of the eSafety Commissioner. Retrieved from website: https://research.monash.edu/en/publications/technology-facilitated-abuse-among-culturally-and-linguistically.
Henry, N., McGlynn, C., Flynn, A., Johnson, K., Powell, A., & Scott, A. J. (2020). Image-based sexual abuse: A study on the causes and consequences of non-consensual nude or sexual imagery. Routledge. https://doi.org/10.4324/9781351135153.
Henry, N., Vasil, S., Flynn, A., Kellard, K., & Mortreux, C. (2021). Technology-facilitated domestic violence against immigrant and refugee women: A qualitative study. Journal of Interpersonal Violence. https://doi.org/10.1177/08862605211001465.
Jordan, M. I., & Mitchell, T. M. (2015). Machine learning: Trends, perspectives, and prospects. Science, 349(6245), 255–260. https://doi.org/10.1126/science.aaa8415.
Jurafsky, D., & Martin, J. H. (2019). Speech and language processing: An introduction to natural language processing, computational linguistics, and speech recognition—Third edition draft. Stanford. Retrieved from website: https://web.stanford.edu/~jurafsky/slp3/.
Karystianis, G., Adily, A., Schofield, P. W., Greenberg, D., Jorm, L., Nenadic, G., & Butler, T. (2019). Automated analysis of domestic violence police reports to explore abuse types and victim injuries: Text mining study. Journal of Medical Internet Research, 21(3). https://doi.org/10.2196/13067.
Kuhn, M., & Johnson, K. (2013). Applied predictive modeling. Springer.
Lopez-Neira, I., Patel, T., Parkin, S., Danezis, G., & Tanczer, L. M. (2019). ‘Internet of Things’: How abuse is getting smarter. Safe—The Domestic Abuse Quarterly (63), 22–26.
Markwick, K., Bickerdike, A., Wilson-Evered, E., & Zeleznikow, J. (2019). Technology and family violence in the context of post-separated parenting. Australian and New Zealand Journal of Family Therapy, 40(1), 143–162. https://doi.org/10.1002/anzf.1350.
McGlynn, C., Johnson, K., Rackley, E., Henry, N., Gavey, N., Powell, A., & Flynn, A. (2021). ‘It’s torture for the soul’: The harms of image-based sexual abuse. Social & Legal Studies, 30(4), 541–562. https://doi.org/10.1177/0964663920947791.
McGlynn, C., Rackley, E., & Houghton, R. (2017). Beyond ‘revenge porn’: The continuum of image-based sexual abuse. Feminist Legal Studies, 25(1), 25–46. https://doi.org/10.1007/s10691-017-9343-2.
McGlynn, C., Rackley, E., & Johnson, K. (2019). Shattering lives and myths: A report on image-based sexual abuse. Durham University; University of Kent.
Messing, J., Bagwell-Gray, M., Brown, M. L., Kappas, A., & Durfee, A. (2020). Intersections of stalking and technology-based abuse: Emerging definitions, conceptualization, and measurement. Journal of Family Violence, 35(7), 693–704. https://doi.org/10.1007/s10896-019-00114-7.
Murphy, K. P. (2012). Machine learning: A probabilistic perspective. MIT Press.
Nadkarni, P. M., Ohno-Machado, L., & Chapman, W. W. (2011). Natural language processing: An introduction. Journal of the American Medical Informatics Association, 18(5), 544–551. https://doi.org/10.1136/amiajnl-2011-000464.
Parkin, S., Patel, T., Lopez-Neira, I., & Tanczer, L. M. (2019). Usability analysis of shared device ecosystem security: Informing support for survivors of IoT-facilitated tech-abuse. In Proceedings of the New Security Paradigms Workshop (pp. 1–15). San Carlos, Costa Rica: Association for Computing Machinery. https://doi.org/10.1145/3368860.3368861.
Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., & Duchesnay, É. (2011). Scikit-learn: Machine learning in python. The Journal of Machine Learning Research, 12, 2825–2830.
Pennebaker, J. W., Boyd, R. L., Jordan, K., & Blackburn, K. (2015). The development and psychometric properties of LIWC2015. University of Texas at Austin. https://doi.org/10.15781/T29G6Z.
Powell, A., & Henry, N. (2018). Policing technology-facilitated sexual violence against adult victims: Police and service sector perspectives. Policing and Society, 28(3), 291–307. https://doi.org/10.1080/10439463.2016.1154964.
Powell, A., & Henry, N. (2019). Technology-facilitated sexual violence victimization: Results from an online survey of Australian adults. Journal of Interpersonal Violence, 34(17), 3637–3665. https://doi.org/10.1177/0886260516672055.
Powell, A., Scott, A. J., Flynn, A. L. G., & Henry, N. (2020). Image-based sexual abuse: An international study of victims and perpetrators—A summary report (pp. 1–16). RMIT University. Retrieved from website: https://www.researchgate.net/publication/339488012_Image-based_sexual_abuse_An_international_study_of_victims_and_perpetrators.
Provost, F., & Fawcett, T. (2013). Data science and its relationship to big data and data-driven decision making. Big Data, 1(1), 51–59. https://doi.org/10.1089/big.2013.1508.
Refuge. (2020, January 9). 72% of Refuge service users identify experiencing tech abuse. Retrieved from website: https://www.refuge.org.uk/72-of-refuge-service-users-identify-experiencing-tech-abuse/.
Riley, A. (2020). How your smart home devices can be turned against you. BBC Future. https://www.bbc.com/future/article/20200511-how-smart-home-devices-are-being-used-for-domestic-abuse.
Slupska, J., & Tanczer, L. M. (2021). Threat Modeling Intimate Partner Violence: Tech abuse as cybersecurity challenge in the Internet of Things (IoT). In J. Bailey, A. Flynn, & N. Henry (Eds.), Handbook on technology-facilitated violence and abuse: International perspectives and experiences. Emerald Publishing.
Snook, Chayn, & SafeLives. (2017). Tech vs abuse: Research findings 2017 (pp. 1–56). Comic Relief.
Southworth, C., Finn, J., Dawson, S., Fraser, C., & Tucker, S. (2007). Intimate partner violence, technology, and stalking. Violence Against Women, 13(8), 842–856. https://doi.org/10.1177/1077801207302045.
Tanczer, L. M. (2021). Das Internet der Dinge: Die Auswirkung »smarter« Geräte auf häusliche Gewalt. In bff: Bundesverband Frauenberatungsstellen und Frauennotruf, & N. Prasad (Eds.), Geschlechtsspezifische Gewalt in Zeiten der Digitalisierung: Formen und Interventionsstrategien (pp. 205–225). Berlin: Transcript. https://doi.org/10.14361/9783839452813.
Tanczer, L. M., Lopez-Neira, I., Parkin, S., Patel, T., & Danezis, G. (2018). Gender and IoT (G-IoT) research report: The rise of the Internet of Things and implications for technology-facilitated abuse (pp. 1–9). University College London. Retrieved from website: https://www.ucl.ac.uk/steapp/sites/steapp/files/giot-report.pdf.
Women’s Aid. (2018). Online and digital abuse. Retrieved from website: https://www.womensaid.org.uk/information-support/what-is-domestic-abuse/onlinesafety/.
Woodlock, D. (2017). The abuse of technology in domestic violence and stalking. Violence Against Women, 23(5), 584–602. https://doi.org/10.1177/1077801216646277.
Yardley, E. (2020). Technology-facilitated domestic abuse in political economy: A new theoretical framework. Violence Against Women. https://doi.org/10.1177/1077801220947172.
Acknowledgements
The authors are indebted to Crimestoppers for sharing their data, the Jill Dando Institute Research Laboratory (JDIRL) for hosting all records, and to Oli Hutt and Nigel Swift for providing us with technical support while using the JDIRL. We are also thankful to the book editors (Dr. Asher Flynn, Dr. Anastasia Powell, and Dr. Lisa Sugiura) for their flexibility and support throughout our analysis and write-up process. Parts of the insights discussed in this publication stem from findings derived from UCL’s “Gender and IoT” research project. The latter has received funding from the UCL Social Science Plus+ scheme, UCL Public Policy, the PETRAS IoT Research Hub (EP/N02334X/1), the UK Home Office, and the NEXTLEAP Project (EU Horizon 2020 Framework Programme for Research and Innovation, H2020-ICT-2015, ICT-10-2015, grant agreement No. 688722). The work was also supported by the Dawes Centre for Future Crime at UCL.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix A: Used Keywords
Appendix A: Used Keywords
Physical devices:
“smart”, “device”, “computer”, “laptop”, “alexa”, “tablet”, “keytracker”, “tracker”, “(smart)-heater”, “light”, “lock”
Online platform apps:
“online”, “technology”, “internet”, “digital”, “dating app”, “facebook”, “systems”, “messages””, “apps”, ““service”, “account”, “platform”, “dating site”, “instagram”, “snapchat”, “tinder”, “app”, “whatsapp”, “spyware”, “find my iPhone”, “find my Friends”, “gps”, “youtube”, “caller id”, “profile”, “sniffer”, “Badoo”, “messenger”, “chat messenger”, “fake account”, “flirtfinder”, “ipad”, “snap chat”, “what’s app”
Verbs:
“dating”, “stalking”, “control”, “victimisation”, “report”, “access”, “texting”, “calling”, “sexting”, “experience”, “bullying”, “rape”, “video”, “use”, “abuse”, “sexualise”, “harass”, “harm”, “perpetrate”, “experiment”, “sharing”, “threat”, “intimate”, “message”, “phone”, “post”, “follow”, “cyberbullying”, “doxing”, “tracking”, “monitoring”, “watching”, “blackmailing”, “humiliate”, “restrict”, “destroy”, “punish”, “force”, “impersonate”, “gaslight”, “controlling”, “distribute”, “hacking”, “attack”, “expose”, “film”, “command”, “spread”, “shout”
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Soldner, F., Tanczer, L.M., Hammocks, D., Lopez-Neira, I., Johnson, S.D. (2021). Using Machine Learning Methods to Study Technology-Facilitated Abuse: Evidence from the Analysis of UK Crimestoppers’ Text Data. In: Powell, A., Flynn, A., Sugiura, L. (eds) The Palgrave Handbook of Gendered Violence and Technology. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-83734-1_24
Download citation
DOI: https://doi.org/10.1007/978-3-030-83734-1_24
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-030-83733-4
Online ISBN: 978-3-030-83734-1
eBook Packages: Social SciencesSocial Sciences (R0)