HomePsychology and Education: A Multidisciplinary Journalvol. 35 no. 4 (2025)

Technology-Facilitated Abuse among College Students in a Private University

Eun Princess Balintag | Lay Nicolo Alvear | Sophia Lourenz Galicia | Jonh Kenneth Cadabona | Kenisha Leigh Bumanghat | Aprille Joy Fernando | Michelle Pagaduan | Kristel Joy Dappiawen | Lady Valen Charon Dela Peña

Discipline: Education

 

Abstract:

The advancements in technology have without a doubt helped humanity in so many ways. However, it is sometimes used for the wrong things, such as cyberbullying, cyberstalking, or blackmailing, which are forms of technology-facilitated abuse (TFA). This study aims to minimize the prevalence of technology-facilitated abuse by raising awareness and finding possible ways and policies to effectively prevent it. Through utilizing the Convergent Mixed-methods Approach and surveying 360 Saint Mary’s University college students, this study found that, overall, the extent of their experiences of technology-facilitated abuse ranges from not at all to experience at a low extent. Moreover, findings indicate that monitoring, stalking, and controlling behaviors are the most common types of technology-facilitated abuse they experience. Notably, significant differences can be seen in the extent of the respondents' experiences of technology-facilitated abuse. This suggests the need to be literate and knowledgeable about the pros and cons of technology and the digital world. These findings indicate the need to raise awareness about technology-facilitated abuse. The school could aid in addressing the rising cases of technology-facilitated abuse by educating students regarding the importance of digital safety, and by providing support for those who may be victims of technology-facilitated abuse, it could contribute to making a safer online environment for the students.



References:

  1. Abreu, R. L., & Kenny, M. C. (2017). Cyberbullying and LGBTQ Youth: A Systematic Literature Review and Recommendations for Prevention and intervention. Journal of Child & Adolescent Trauma, 11(1), 81–97. https://doi.org/10.1007/s40653-017-0175-7
  2. Anander, L. (2024). Rumors, gossip, and your health. WebMD. https://www.webmd.com/balance/health-rumors-gossip
  3. Anderson, J. (2024). 3. Fifty-fifty anecdotes: How digital life has been both positive and negative. Pew Research Center. https://www.pewresearch.org/internet/2018/07/03/fifty-fifty-anecdotes-how-digital-life-has-been-both-positive-and-negative/
  4. Australian Bureau of Statistics. (2018). Household use of information technology, Australia, 2016–17. https://www.abs.gov.au/statistics/industry/technology-and-innovation/household-use-information-technology/latest-release
  5. Australian Human Rights Commission (2020). Respect@ Work, the Australian Human Rights Commission’s report of the National Inquiry into Sexual Harassment in Australian Workplaces. AHRC.
  6. Badshah, A., PhD. (2022). Be careful on social media: Essential tips for social media users. Medium. https://medium.com/illumination/be-careful-on-social-media-essential-tips-for-social-media-users-8287543a90df
  7. Beres, M. (2020). Perspectives of rape-prevention educators on the role of consent in sexual violence prevention. Sex Education, 20(2), 227–238. https://doi.org/10.1080/14681811.2019.1621744
  8. Briggs C. (2018). An emerging trend in domestic violence: technology-facilitated abuse. Australian Journal of Child and Family Health Nursing, 15(1), 2. https://search.informit.org/doi/10.3316/informit.021135494223385
  9. Brookfield, K., Fyson, R., & Goulden, M. (2023). Technology-Facilitated domestic abuse: an under-Recognised safeguarding issue? The British Journal of Social Work, 54(1), 419–436. https://doi.org/10.1093/bjsw/bcad206
  10. Chin, K. (2024). The impact of social media on cybersecurity. UpGuard. https://www.upguard.com/blog/the-impact-of-social-media-on-cybersecurity
  11. Dictionary.com | Meanings & Definitions of English Words. (2021). In Dictionary.com. https://www.dictionary.com/browse/perpetrator?fbclid=IwAR2TPnE9y73RivYlwh0uEv2WpTyq51j7rFdJA82fN4zbVgg21vXT-t2PScw
  12. Douglas, H., Harris, B. A., & Dragiewicz, M. (2018). Technology-facilitated domestic and family violence: Women’s experiences. The British Journal of Criminology, 59(3), 551–570. https://doi.org/10.1093/bjc/azy068
  13. Dragiewicz, M., Burgess, J., Matamoros-Fernández, A., Salter, M., Suzor, N. P., Woodlock, D., & Harris, B. (2018). Technology-facilitated coercive control: Domestic violence and the competing roles of digital media platforms. Feminist Media Studies, 18(4), 609–625.
  14. Fido, D., & Harper, C. A. (2020). Non-consensual image-based sexual offending. In Springer eBooks. https://doi.org/10.1007/978-3-030-59284-4
  15. Fiolet, R., Brown, C., Wellington, M., Bentley, K., & Hegarty, K. (2021). Exploring the Impact of Technology-Facilitated Abuse and Its Relationship with Domestic Violence: A Qualitative Study on Experts’ Perceptions. Global Qualitative Nursing Research, 8(1), 233339362110281. https://doi.org/10.1177/23333936211028176
  16. Flynn, A., & Henry, N. (2019a). Image-based sexual abuse: An Australian reflection. Women and Criminal Justice. Advance online publication. https://doi.org/10.1080/08974 554.2019.1646190
  17. Flynn, A., & Henry, N. (2019b). Image-based sexual abuse. In Oxford Research Encyclopedia of Criminology and Criminal Justice. Oxford University Press. https://doi. Org/10.1093/acrefore/978019264079.013.534
  18. Fraser, C., Olsen, E., Lee, K., Southworth, C., & Tucker, S. (2010). The new age of stalking: Technological implications for stalking. Juvenile and Family Court Journal, 61(4), 39–55
  19. Giordano, A. L., Prosek, E. A., & Watson, J. C. (2021). Understanding Adolescent Cyberbullies: Exploring Social Media Addiction and Psychological Factors. Journal of Child and Adolescent Counseling, 7(1), 42–55. https://doi.org/10.1080/23727810.2020.1835420
  20. Gordon, S. (2022, July 22). How to prevent cyberbullying. Verywell Family. https://www.verywellfamily.com/how-to-prevent-cyberbullying-5113808
  21. Gupta, N., Das, S., Walsh, K., & Chatterjee, R. (2024). A Critical analysis of the prevalence of Technology-Facilitated Abuse in US College Students. ACM Digital Library. https://doi.org/10.1145/3613905.3652036
  22. Hinduja, S. & Patchin, J. W. (2020). Bullying, Cyberbullying, and Sexual Orientation/Gender Identity. Cyberbullying Research Center (cyberbullying.org).
  23. Infosec Train. (2024). How to Deal with Cyber Extortion? InfosecTrain. https://www.infosectrain.com/blog/how-to-deal-with-cyber-extortion/
  24. International Telecommunication Union (ITU). (2019). Measuring digital development: Facts and figures 2019. https://www.itu.int/en/ITU-D/Statistics/Documents/facts/FactsFigures2019.pdf
  25. Kaur, P., Dhir, A., Tandon, A., Alzeiby, E. A., & Abohassan, A. A. (2021). A systematic literature review on cyberstalking. An analysis of past achievements and future promises. Technological Forecasting and Social Change, 163, 120426. https://doi.org/10.1016/j.techfore.2020.120426
  26. Kukreti, M. (2023). How to Deal with Cyber Extortion? InfosecTrain. https://www.infosectrain.com/blog/how-to-deal-with-cyber-extortion/
  27. Lee, M. H. L., Kaur, M., Shaker, V., Yee, A., Sham, R., & Siau, C. S. (2023). Cyberbullying, Social Media Addiction and Associations with Depression, Anxiety, and Stress among Medical Students in Malaysia. International Journal of Environmental Research and Public Health, 20(4), 3136. https://doi.org/10.3390/ijerph20043136
  28. Løkkeberg, S. T., Ihlebæk, C., Brottveit, G., & Del Busso, L. (2023). Digital Violence and Abuse: A scoping review of adverse experiences within adolescent intimate partner relationships. Trauma Violence & Abuse, 25(3), 1954–1965. https://doi.org/10.1177/15248380231201816
  29. Mumford, E. A., Maitra, P., Sheridan, J., Rothman, E. F., Olsen, E., & Roberts, E. (2023). Technology-facilitated abuse of young adults in the United States: A latent class analysis. Cyberpsychology Journal of Psychosocial Research on Cyberspace, 17(3). https://doi.org/10.5817/cp2023-3-7
  30. Ngo, E. (2020). Social Media: The Unseen Risks of Cybercrimes. Anna Maria College. https://annamaria.edu/wp-content/uploads/2021/06/Emily-Ngo-Fall-2020.pdf
  31. Paullet, K.L., Rota, D.R., Swan, T.T. (2009) Cyberstalking: an exploratory study of students at a midatlantic university. Issues Informat. Syst., 10 (2) (2009), pp. 640-649
  32. Pietsch, N. (2023). Supporting Youth Experiencing Technology-Facilitated Sexual Violence. https://gbvlearningnetwork.ca/our-work/issuebased_newsletters/issue-39/index.html
  33. Powell, A., Flynn, A., & Hindes, S. (2021). Technology-facilitated abuse: A survey of support services stakeholders (Research report, 02/2021). ANROWS.
  34. Powell, A., Henry, N., Flynn, A., & Scott, A. J. (2019). Imagebased sexual abuse: The extent, nature, and predictors of perpetration in a community sample of Australian residents. Computers in Human Behavior, 92, 393–402. https://doi.org/10.1016/j.chb.2018.11.009
  35. Pröllochs, N., Bär, D., & Feuerriegel, S. (2021). Emotions in online rumor diffusion. EPJ Data Science, 10(1). https://doi.org/10.1140/epjds/s13688-021-00307-5
  36. Refuge Against Domestic Violence - Help for women & children. (2023). What is tech abuse? - Use tech safely | Refuge Tech Safety. Refuge Against Domestic Violence - Help for Women & Children. https://refugetechsafety.org/what-is-tech-abuse/
  37. Republic Act No. 11313. (n.d.). https://lawphil.net/statutes/repacts/ra2019/ra_11313_2019.html
  38. Reyns, B. W., & Fissel, E. R. (2020). Cyberstalking. In T. J. Holt & A. M. Bossler (Eds.), The Palgrave handbook of international cybercrime and cyberdeviance (pp. 1283– 1306). Springer International Publishing. https://doi. Org/10.1007/978-3-319-78440-3_57
  39. Rock, A. (2019). Who are the perpetrators of child sexual abuse and what are the signs? Campus Safety Magazine. https://www.campussafetymagazine.com/safety/child-sexual-abuse-perpetrators-signs/?fbclid=IwAR3hYfqN1JuAgrlRSMDNtbbHazLt2B37HuDa6S5oM2lTXP6t1wyOrOrsXlM
  40. Snaychuk, L. A., & O’Neill, M. L. (2020b). Technology-Facilitated Sexual Violence: Prevalence, risk, and resiliency in undergraduate students. Journal of Aggression Maltreatment & Trauma, 29(8), 984–999. https://doi.org/10.1080/10926771.2019.1710636
  41. Stalking and monitoring. (n.d.). 1800RESPECT. https://www.1800respect.org.au/violence-and-abuse/stalking
  42. Teresa. (2020). What is Relationship and Dating Violence? - Students. Students. https://students.wustl.edu/relationship-dating-violence/
  43. The importance of policies in schools. (2021). Saved You a Spot. https://savedyouaspot.wordpress.com/2021/04/14/the-importance-of-policies-in-schools/
  44. Todd, C., Bryce, J., & Franqueira, V. N. L. (2020). Technology, cyberstalking and domestic homicide: informing prevention and response strategies. Policing & Society, 31(1), 82–99. https://doi.org/10.1080/10439463.2020.1758698
  45. Turner, H. A., Finkelhor, D., Mitchell, K., & Colburn, D. (2024). Prevalence of Technology-Facilitated Abuse Among Sexual and Gender Minority Youths. JAMA Network Open, 7(2), e2354485. https://doi.org/10.1001/jamanetworkopen.2023.54485
  46. UNICEF. (2019). Online bullying remains prevalent in the Philippines, other countries. UNICEF. https://www.unicef.org/philippines/press-releases/online-bullying-remains-prevalent-philippines-other-countries
  47. What is cyber extortion? | Insureon. (n.d.). https://www.insureon.com/insurance-glossary/cyber-extortion#:~:text=Cyber%20extortion%20is%20an%20online,which%20could%20paralyze%20your%20business.
  48. What is Technology Facilitated Abuse — Cyber Awareness Ireland. (n.d.). Cyber Awareness Ireland. https://cyberawarenessireland.com/what-is-technology-facilitated-abuse
  49. Winkelman, B., Sloane, Oomen-Early, J., Walker, A., Chu, L.,Yick-Flanagan, A.,(2015). “Exploring Cyber Harassment among Women Who Use Social Media.” Universal Journal of Public Health, 3 (5): 194-201. Doi: 10.13189/ ujph.2015.030504 https://digitalcommons.georgiasouthern.edu/commhealth-facpubs/130
  50. Witwer, A., (2020). Countering Technology-Facilitated Abuse: Criminal Justice Strategies for combating nonconsensual pornography, sextortion, doxing, and swatting | Office of Justice Programs.. https://ojp.gov/ncjrs/virtual-library/abstracts/countering-technology-facilitated-abuse-criminal-justice-strategies
  51. Wolbers, H., Boxall, H., Long, C., & Gunnoo, A. (2022). Sexual harassment, aggression and violence victimisation among mobile dating app and website users in Australia. https://doi.org/10.52922/rr78740