1/11
Vocabulary terms covering the risks, contradictions, research methods, and technological interventions related to Intimate Partner Violence (IPV) as discussed in the lecture.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Intimate Partner Violence (IPV)
Abuse within romantic relationships that can be facilitated by digital tools used for monitoring and control.
Technology-facilitated abuse
The misuse of digital tools—including spyware, tracking apps, and monitoring social media—to control and intimidate partners, often without their consent.
Modern Contradiction (Core Issue)
A dual role where technology functions as both a tool for connection and emotional closeness and a tool for harm and manipulation.
Privacy-Vulnerability Paradox
The normalization of sharing passwords and devices to build trust, which simultaneously weakens privacy boundaries and increases the risk of boundary violations.
Digital Tools to Support IPV Survivors Survey
An online survey tool using a 7-point Likert scale (1: Strongly Disagree to 7: Strongly Agree) to evaluate tool effectiveness, safety concerns, and practical use.
Electronic logs (e-logs)
Digital documentation systems used to record incidents of abuse, organize evidence, and track patterns of behavior for legal context.
Victim advocates / shelter staff
Study participants who assess client needs, technology access, and the impact of immigration status on a survivor's ability to get help.
Licensed attorneys
Legal professionals who evaluate the usability and viability of digital evidence, such as text messages and witness corroboration, in court.
Law enforcement officers
Professionals focused on evidence collection, the importance of timestamps, and the consistency of documentation in IPV-related calls.
Informal Interview
A research component involving role-specific, open-ended questions conducted over phone calls to evaluate tool effectiveness and safety features.
Survivor-centered digital tools
Proposed technology designs that incorporate secure logging, emergency exit features, and safe evidence storage to improve documentation and legal outcomes.
Study Limitations
Factors restricting the research, including a focus only on professional perspectives (not survivors directly) and a limited geographic region of Texas.