Skip to main content
social

Intimate Partner Violence, Technology, and Stalking

Southworth, C., Finn, J., Dawson, S., Fraser, C., & Tucker, S. (2007)

APA Citation

Southworth, C., Finn, J., Dawson, S., Fraser, C., & Tucker, S. (2007). Intimate Partner Violence, Technology, and Stalking.

Summary

This groundbreaking research examined how technology was increasingly being weaponized in intimate partner violence and stalking behaviors. The study documented emerging patterns of digital abuse, including GPS tracking, cell phone monitoring, computer surveillance, and online harassment tactics used by abusive partners to maintain control. The researchers identified how abusers exploit technology to extend surveillance beyond physical separation, making escape more difficult for victims and creating new forms of psychological terror.

Why This Matters for Survivors

If you've experienced a narcissistic partner using technology to monitor, harass, or control you, this research validates that tech-enabled abuse is real and widespread. It helps survivors understand that digital stalking is a serious form of abuse, not paranoia, and provides crucial insights into safety planning in our connected world.

What This Research Establishes

Technology creates new pathways for intimate partner violence - abusers systematically exploit digital tools including GPS, spyware, and social media to extend surveillance and control beyond physical presence.

Digital stalking causes measurable psychological harm - victims experience increased anxiety, hypervigilance, and trauma symptoms when subjected to technology-enabled monitoring and harassment.

Traditional safety planning must include technology components - conventional approaches to intimate partner violence intervention require updating to address digital threats and surveillance tactics.

Abusers adapt quickly to new technologies - the research documented how perpetrators rapidly adopt emerging digital tools to maintain power and control in abusive relationships.

Why This Matters for Survivors

If you’ve felt like your narcissistic partner somehow always knows where you are or what you’re doing, you’re not imagining it. This research validates that technology abuse is real and increasingly common. Your concerns about being monitored through your phone, computer, or social media accounts are legitimate safety concerns, not paranoia.

The constant feeling of being watched, even after separation, creates a unique form of psychological terror. When abusers use technology to extend their reach, it can feel like there’s no safe space or possibility of true escape. Understanding that this is a documented form of abuse helps you name what’s happening and take it seriously.

This research shows you’re not alone in experiencing digital surveillance and harassment. Many survivors report similar experiences of having their devices compromised, their locations tracked, or their online activities monitored. Recognizing these patterns helps validate your experience and guides you toward appropriate safety resources.

The findings emphasize that healing requires addressing both the psychological impact of constant surveillance and implementing practical digital safety measures. Your recovery journey may need to include learning new ways to protect yourself in digital spaces while processing the trauma of technological violation.

Clinical Implications

Therapists working with intimate partner violence survivors must screen for technology-facilitated abuse as a routine part of assessment. Many clients may not initially recognize digital surveillance or harassment as forms of abuse, requiring clinicians to ask specific questions about technology experiences and validate these concerns.

Treatment planning should incorporate the unique psychological impacts of digital stalking, including hypervigilance around technology use and persistent fears about privacy and safety. The constant nature of technological surveillance can create particularly severe trauma responses that require specialized therapeutic attention.

Clinicians need to understand basic technology safety principles to make appropriate referrals and avoid inadvertently increasing client risk. This includes knowing when to recommend professional device inspection and how to discuss digital safety without creating additional anxiety about technology use.

The research highlights the importance of coordinating with domestic violence advocates who specialize in technology safety. Mental health providers should develop relationships with local programs that offer tech safety planning, recognizing this as an essential component of comprehensive treatment for survivors of intimate partner violence.

How This Research Is Used in the Book

This foundational research on technology-facilitated abuse informs our understanding of how narcissistic abusers adapt traditional control tactics to digital environments. The findings help survivors recognize that technological surveillance represents an evolution of familiar narcissistic behaviors rather than entirely new phenomena.

“When narcissistic abusers discovered they could carry their surveillance into victims’ pockets through smartphones, they didn’t just gain a new tool—they acquired an almost omnipresent ability to maintain the illusion of inescapable control that lies at the heart of their psychological manipulation.”

Historical Context

Published in 2007, this research emerged during a pivotal moment when smartphones were becoming mainstream and social media platforms were rapidly expanding. The authors were among the first to recognize that these technological advances would fundamentally change the landscape of intimate partner violence, requiring new approaches to both understanding and addressing abuse dynamics.

Further Reading

• Dragiewicz, M., et al. (2018). Technology facilitated coercive control: Domestic violence and the competing roles of digital media platforms. Feminist Media Studies, 18(4), 609-625.

• Freed, D., et al. (2017). “A stalker’s paradise”: How intimate partner abusers exploit technology. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 667-678.

• Hand, T., et al. (2009). The use of information and communication technologies to coerce and control in domestic violence and following separation. Stakeholder Paper, 6, 1-27.

About the Author

Cindy Southworth is the Executive Vice President of the National Network to End Domestic Violence (NNEDV) and a nationally recognized expert on technology safety and domestic violence. She has led pioneering work on understanding how technology intersects with intimate partner abuse.

Jerry Finn is a Professor in the School of Social Work at the University of Washington, specializing in technology applications in social work and intimate partner violence research.

Shawndell Dawson, Cynthia Fraser, and Sarah Tucker are researchers who have contributed to understanding the intersection of technology and domestic violence.

Historical Context

Published in 2007 during the early smartphone era, this research was pioneering in recognizing how emerging technologies were creating new avenues for abuse and control in intimate relationships.

Frequently Asked Questions

Cited in Chapters

Chapter 8 Chapter 12 Chapter 15

Related Terms

Glossary

recovery

Safety Planning

A personalized, practical strategy for leaving an abusive relationship safely or protecting yourself if you must stay. Safety planning addresses immediate safety, documentation, resources, and steps for leaving—recognizing that leaving is often the most dangerous time.

Related Research

Further Reading

abuse 2007

Coercive Control: How Men Entrap Women in Personal Life

Stark, E.

Book Ch. 2, 16, 19

Start Your Journey to Understanding

Whether you're a survivor seeking answers, a professional expanding your knowledge, or someone who wants to understand narcissism at a deeper level—this book is your comprehensive guide.