APA Citation
Leitão, R. (2019). Technology-Facilitated Intimate Partner Abuse: A Qualitative Analysis of Data from Online Domestic Abuse Forums. *Human--Computer Interaction*, 1-40. https://doi.org/10.1080/07370024.2019.1685883
Summary
Leitão's groundbreaking research analyzes survivor testimonies from online domestic abuse forums to examine how technology enables intimate partner abuse. The study reveals sophisticated patterns of digital stalking, surveillance, and control that narcissistic abusers employ to maintain dominance over their victims. Through qualitative analysis of forum posts, this research documents how abusers weaponize smartphones, social media, GPS tracking, and other digital tools to extend their control beyond physical presence, creating inescapable environments of psychological terror and surveillance.
Why This Matters for Survivors
This research validates what many survivors already know: narcissistic abusers exploit every available tool to maintain control, including technology. By documenting these patterns in survivors' own words, Leitão's work legitimizes experiences that are often dismissed or minimized. The study provides crucial evidence that technological abuse is not just "checking up" or jealousy—it's a deliberate, systematic form of psychological warfare that can continue even after physical separation from the abuser.
What This Research Establishes
Technology serves as a powerful tool for extending coercive control beyond physical presence, enabling abusers to monitor, harass, and intimidate victims through digital surveillance, GPS tracking, and manipulation of communication platforms.
Survivors consistently report sophisticated patterns of technological abuse that include monitoring communications, demanding immediate responses, using location tracking, accessing private accounts, and leveraging digital information to threaten and control.
Online domestic violence forums serve as crucial lifelines for isolated survivors, providing anonymous spaces to share experiences, receive validation, and access safety information that may not be available through traditional support systems.
Technology-facilitated abuse often escalates after separation, contradicting the myth that leaving an abusive relationship ends the abuse, as digital tools enable continued surveillance and harassment from a distance.
Why This Matters for Survivors
This research validates your experience if you’ve felt constantly watched, monitored, or controlled through technology. What you’re experiencing has a name—technology-facilitated abuse—and it’s a recognized form of intimate partner violence. Your abuser’s use of technology to track, monitor, or control you isn’t love or care; it’s abuse.
If your partner demands immediate responses to texts, checks your phone, tracks your location, or seems to know things they shouldn’t know about your activities, you’re experiencing technological abuse. This research confirms that such behaviors are deliberate control tactics used by abusers to maintain dominance and create an atmosphere of constant surveillance.
The study’s documentation of survivor experiences in online forums highlights the importance of peer support in recovery. If traditional support systems haven’t understood or validated your experiences with digital abuse, know that other survivors do. Your experiences matter and deserve recognition as serious forms of abuse.
Understanding that technology can be weaponized helps you develop more comprehensive safety strategies. This research emphasizes that healing from abuse in the digital age requires addressing both physical and technological safety, and that seeking support for digital abuse is just as important as addressing other forms of intimate partner violence.
Clinical Implications
Therapists must expand their understanding of intimate partner violence to include technology-facilitated abuse patterns. Traditional assessments may miss the pervasive nature of digital surveillance and control, which can be as psychologically damaging as physical abuse. Clinicians should routinely ask specific questions about digital monitoring, technological control, and online harassment.
The constant surveillance documented in this research creates unique trauma responses that require specialized intervention approaches. Survivors of technological abuse may experience hypervigilance around digital devices, anxiety about online presence, and difficulty establishing boundaries with technology. Treatment must address both traditional trauma symptoms and technology-specific triggers.
Digital safety planning should be integrated into all intimate partner violence interventions. Clinicians need training on technological abuse tactics, digital security measures, and safe communication strategies. This includes understanding how to help clients document digital evidence while maintaining their safety and privacy.
The role of online support communities highlighted in this research suggests that therapists should consider how to safely integrate peer support into treatment. Understanding the validation and resources survivors find in digital spaces can inform therapeutic interventions and help clinicians support clients’ participation in online recovery communities.
How This Research Is Used in the Book
This research provides crucial evidence for understanding how narcissistic abusers exploit technology to maintain control and surveillance over their victims. The study’s documentation of survivor experiences helps validate the sophisticated and pervasive nature of technological abuse that many survivors face.
“When we understand that narcissistic abusers will weaponize every available tool—including technology—to maintain control, we can better prepare survivors for the reality that healing requires both emotional recovery and practical digital safety measures. Leitão’s research reminds us that in the digital age, ‘leaving’ an abuser is more complex than physical separation.”
Historical Context
Published in 2019, this research emerged at a critical juncture when smartphones and social media had become integral to daily life, yet the abuse potential of these technologies was only beginning to be systematically studied. Leitão’s work helped establish technology-facilitated abuse as a legitimate area of intimate partner violence research, contributing to policy discussions and resource development for survivors navigating digital abuse.
Further Reading
• Southworth, C., et al. (2007). “Intimate Partner Violence, Technology, and Stalking.” Violence Against Women, 13(8), 842-856.
• Dragiewicz, M., et al. (2018). “Technology Facilitated Coercive Control: Domestic Violence and the Competing Roles of Digital Media Platforms.” Feminist Media Studies, 18(4), 609-625.
• Woodlock, D. (2017). “The Abuse of Technology in Domestic Violence and Stalking.” Violence Against Women, 23(5), 584-602.
About the Author
Renata Leitão is a researcher in human-computer interaction with expertise in digital privacy, security, and intimate partner abuse. Her work focuses on understanding how technology intersects with interpersonal violence, particularly examining the experiences of survivors navigating digital abuse. Leitão's research has been instrumental in raising awareness about technology-facilitated abuse within both academic and policy circles, contributing to the development of digital safety resources for survivors.
Historical Context
Published in 2019, this research emerged during a critical period of growing awareness about technology-facilitated abuse. As smartphones and social media became ubiquitous, researchers began documenting how these tools were being weaponized in abusive relationships, providing essential evidence for policy makers and support services.
Frequently Asked Questions
Technology-facilitated intimate partner abuse involves using digital tools like smartphones, social media, GPS tracking, and surveillance apps to monitor, harass, threaten, or control a partner. This can include checking messages, tracking location, impersonating the victim online, or using technology to threaten and intimidate.
Narcissistic abusers exploit technology for constant surveillance and control through GPS tracking, monitoring communications, demanding immediate responses to messages, using shared accounts to spy, installing surveillance software, and leveraging digital evidence to shame or threaten their victims.
Yes, technological abuse often escalates after separation. Abusers may continue stalking through social media, tracking devices, shared accounts, or by creating fake profiles. They may also use technology to harass the victim's friends, family, or workplace contacts.
Signs include unexplained knowledge of activities, demands for immediate responses to messages, controlling access to devices or accounts, monitoring location constantly, accessing private communications, and using technology to isolate the victim from support networks.
Survivors can change passwords, enable two-factor authentication, check for tracking apps, use private browsing modes, create new email accounts, document evidence safely, seek help from domestic violence organizations, and consider temporary digital detoxes when safe to do so.
Understanding digital abuse helps survivors recognize that technological surveillance and control are forms of serious abuse, not love or care. This validation is crucial for healing and helps survivors develop safety strategies that address both physical and digital threats.
Therapists should ask specific questions about digital abuse, validate these experiences as serious forms of control, help clients develop digital safety plans, provide resources about technological security, and understand how constant digital surveillance affects trauma responses.
Online forums provide anonymous spaces for survivors to share experiences, receive validation, access safety resources, and connect with others who understand their situation. These platforms often serve as lifelines for isolated survivors seeking support and information.