Following, harassing and monitoring


  • Australian Bureau of Statistics (ABS), Personal Safety, Australia, 2016, ABS cat no. 4906.0 (2016).

    This release presents information from the Australian Bureau of Statistics’ (ABS) 2016 Personal Safety Survey (PSS).

    The survey collected detailed information from men and women about their experiences of violence since the age of 18, as well as experiences of current and previous partner violence, stalking, physical and sexual abuse and harassment, abuse before the age of 15, and general feelings of safety.

    Stalking was defined in the survey as ‘any unwanted contact or attention on more than one occasion that could have caused fear or distress, or multiple types of unwanted contact or behaviour experienced on one occasion only that could have caused fear or distress’. Overall, women were more likely than men to have experienced stalking, with approximately 17% of women (1.6 million), and 6.5% of men (587,000), reporting an experience of stalking since age 15 (see Table 34). ‘

    ‘Women were more likely to have experienced an episode of stalking by someone they knew than by a stranger’, with more than three quarters of female victims knowing their stalker. Further, women were also significantly more likely to be stalked by a man than by a woman (see Table 35). This section also contains information regarding whether victims perceived their experiences of stalking as a crime, and whether they reported the episode to the police (see Table 35).
  • Bagshaw, Dale, et al, ‘Reshaping Responses to Domestic Violence’ (Final Report, University of South Australia and Partnerships Against Domestic Violence, April 2000).

    This Australian research used a variety of methods including an anonymous ‘phone-in’ and focus groups. 102 women who were victims/survivors of domestic violence participated in the phone-in. According to the study authors, some of the callers reported ‘intense levels of surveillance, which leave women without autonomy.’ This experience was exacerbated for women living in rural and remote areas, especially on isolated properties. Strategies of surveillance included (p24):

    • ‘not allowing the woman to obtain a driver’s licence or paid employment,
    • constant telephone calls to check whereabouts, timing the distances to be travelled (for example, home from work) and/or
    • preventing the woman from closing the toilet door.’
    The writers commented that callers reported that ‘the law was not seen to take threats seriously and placed an unreasonable onus on the victim to provide dates or other evidence of violence, requiring a level of documentation that is generally impossible for a woman living in a state of constant surveillance’ (p46).
  • This paper discusses the use of ICTs (information and communication technologies) in situations of domestic violence or intimate partner violence. The term ICTs includes various forms of technology, such as computers and the associated use of the Internet, mobile phones and other communication devices, including global positioning systems (GPS) or satellite navigators, digital cameras and other recording equipment. The positive and negative aspects to the increased availability of ICTs are canvassed in this paper. Gendered language is used to reflect the fact that the majority of perpetrators of domestic violence are men, though it is acknowledged that both men and women (including those in same-sex relationships) may use ICTs to abuse, control and monitor current and former intimate partners.

    The paper discusses perpetrators’ abuse of ICTs in the context of domestic violence (both during a relationship and following separation), including details of the methods employed. It also discusses the phenomenon of cyberstalking and digital voyeurism. The paper then considers the use of the Internet by women survivors of domestic violence and domestic violence services.

    The paper concludes by considering some implications of the use of ICTs by domestic violence perpetrators, for services’ practice, legislation and policy, and research. Tips for safety planning with women follow in an appendix.
  • The minimisation of technology-facilitated stalking and abuse is reflected in the Australian 2013 National Community Attitudes towards Violence Against Women Survey. In this survey more than 17,500 telephone interviews were undertaken to compare the attitudes of 16-24 year olds to 35-64 years olds. The study found the majority of young people agreed that tracking a female partner by electronic means without consent was serious. Youth males rated it at an overall seriousness level of 80% while youth females rated it at 87%. This is compared to adult men who rated it at 81% with their female counterparts rating it at 90%. The study also found 52% of youth males and 40% of youth females thought non-consensual electronic tracking of a female partner was acceptable to some degree, compared to 41% of adult males and 29% of adult females.
  • Henry, Nicola, Anastasia Powell and Asher Flynn, Not Just ‘Revenge Pornography’: Australians’ Experiences of Image-Based Abuse - A Summary Report (RMIT University, 2017).

    This summary report presents the results of a national (Australian) online survey of 4,274 participants, 2,406 of which were female (56%) and 1,868 male (44%).Participants ranged in age from 16 to 49, with an average age of 34 years. In addition, 3,764 (88%) participants identified as heterosexual and 510 (12%) identified as lesbian, gay or bisexual (hereafter, LGB). Of those identifying as LGB, 244 identified as female (48%), and 266 (52%) identified as male. Key findings included:

    • 1 in 5 Australians have experienced image-based abuse
    • Victims of image-based abuse experience high levels of psychological distress
    • Women and men are equally likely to report being a victim
    • Perpetrators of image-based abuse are most likely to be male, and known to the victim
    • Men and young adults are more likely to voluntarily share a nude or sexual image of themselves
    • Women are more likely than men to fear for their safety due to image-based abuse
    • Abuse risk is higher for those who share sexual selfies, but they are not the only victims
    • 1 in 2 Australians with a disability report being a victim of image-based abuse
    • 1 in 2 Indigenous Australians report image-based abuse victimisation
    • Image-based abuse victimisation is higher for lesbian, gay and bisexual Australians
    • Young people aged 16 to 29 years are also at higher risk of image-based abuse
    • 4 in 5 Australians agree it should be a crime to share sexual or nude images without permission
  • Ogilvie, Emma, ‘Cyberstalking – Trends & issues in crime and criminal justice no. 166’ Australian Institute of Criminology, 2000.
    Cyberstalking is analogous to traditional forms of stalking, in that it incorporates persistent behaviours that instil apprehension and fear. This is a South Australian Study, which found of the 40 call-in participants, many of the women interviewed (15) reported they had been cyberstalked by a current or former partner. They reported the effects as ‘intense and long term’, affecting their ‘work, finances, and social, physical and emotional health. Ogilvie highlights the three primary ways in which cyberstalking is conducted: email stalking; internet stalking; and computer stalking. She outlines three methods used to counter cyberstalking, all of which have varying degrees of success: personal protection; technical fixes; and legislation.
  • Researchers at RMIT University and La Trobe University examined the extent, nature and impacts of digital harassment and abuse, as well as technology-facilitated sexual violence and harassment. 3000 Australian adults (aged 18 to 54) were surveyed about their experiences of these forms of abuse. Key findings include:

    • Overall, men and women were just as likely to report experiencing digital harassment and abuse
    • Women were more likely to report experiencing sexual harassment
    • Young adults aged 18 to 24 were more likely than any other age groups to experience digital harassment and abuse
    • Non-heterosexual identifying adults were significantly more likely to report being the target of both gender and sexuality based harassment
    • 1 in 10 Australians reported that someone had posted online or sent onto others a nude or semi-nude image of them without their permission
    • Women overwhelmingly experienced digital harassment and abuse from male perpetrators
    • Men experienced digital harassment and abuse equally from males and females
    • Women were significantly more likely than men to be ‘very or extremely upset’ by the digital harassment and abuse they experienced
    • More women than men reported that they told the person to stop, changed their online details or profile settings, left the site or turned off their device, as a result of their experience
  • Sun, Charissa, ‘Technology-Facilitated Stalking and Abuse: Putting Our Legal Framework to the Test’ (2015) (June) The Law Society Journal of New South Wales 78.

    This article reviews the NSW legal response to what is referred to as ‘technology assisted stalking and abuse.’ It includes helpful examples of this behaviour:

    • making numerous and unwanted calls to a person’s mobile phone;
    • sending threatening and/or abusive messages (text messaging, Whatsapp, Snapchat, facebook messaging, Twitter);
    • hacking into a person’s email or social media account to discover information about them;
    • hacking into a person’s email or social media account to impersonate them and send abusive messages to family/friends of that person;
    • using surveillance software and devices to spy on or stalk a person (eg placing a GPS tracker on a person’s car, placing a video camera in and around a person’s home to monitor both the person and other people who may come to the house); and
    • sharing, or threatening to share, intimate pictures of a person.
  • Woodlock, Delanie, Technology-facilitated Stalking: Findings and Recommendations from the SmartSafe Project (Domestic Violence Resource Centre Victoria, 2013).

    This research was funded by Legal Aid Victoria and undertaken by the Domestic Violence Resource Centre in Victoria. It draws on interviews and focus groups with 152 domestic violence workers and 46 victims/survivors. The central research question was: “How do mobile technologies present further opportunities for the perpetration of stalking and domestic violence against women?” Findings from the study include:

    • Perpetrators are using mobile technologies to abuse and harass women easily, instantaneously and at a distance
    • Perpetrators are using technology to create a sense of omnipresence in women’s lives through, for example, the use of GPS tracking on smartphones, and monitoring women’s social media accounts
    • Mobile technologies are being used as an easy way for perpetrators to punish and humiliate women
    • A wide variety of technology is being used in partner stalking, including text messaging, social media, GPS, and photo and video technologies
    • Women report that perpetrators are using mobile technologies to control and monitor them from a distance
    • Technology is often used in stalking both during the relationship and after separation
    • Technology is used by perpetrators to humiliate and publically shame women, often in sexualised ways.
    • The use of technology in stalking has a significant impact on women’s mental and physical wellbeing, their day to day routines, employment, parenting and relationships
    • Women who have experienced technology-facilitated stalking have often experienced other forms of domestic violence including emotional, financial and sexual abuse.
  • Woodlock, Delanie, ‘The Abuse of Technology in Domestic Violence and Stalking’ (2017) 23(5) Violence Against Women 584-602.
    This study discusses the increasing prevalence of technology in domestic violence and stalking (p 585). The results demonstrate that technology, including phones, computers, tablets, and social media, is frequently used in intimate partner violence (p 590). The use of technology creates an impression of the perpetrator’s omnipresence, for example through constant text messages or phone calls (pp 592, 598), and can isolate (pp 594-6, 598), humiliate and punish the victim (pp 596-7, 599). A particular threat of technology is the sharing of sexualised content online to humiliate victims (p 599).
  • Women’s Legal Service NSW, Domestic Violence Resource Centre Victoria and WESNET, ReCharge: Women’s Technology Safety, Legal Resources, Research & Training, National study findings 2015.
    This study affirms and builds on the findings of the 2013 SmartSafe study (Woodlock above). 546 domestic violence sector practitioners working across Victoria and New South Wales participated in the online survey. 98% reported that they had clients who had experienced technology-facilitated abuse and stalking, the most commonly used technology being text messages followed by Facebook. While GPS tracking via smartphone apps was less commonly used, it reportedly caused enormous fear. The study identifies groups particularly vulnerable to this form of abuse (CALD and Indigenous women; women with disabilities). The majority of practitioners believed that the laws relating to technology-facilitated abuse and stalking were adequate, but not used fully or effectively by police and magistrates to assist victims.


  • Dimond, Jill P., Casey Fiesler and Amy S. Bruckman, ‘Domestic violence and information communication technologies’ (2010) 23(5) Interacting with Computers 415.
    In this 2011 US study, qualitative interviews were conducted with 10 female domestic violence survivors living in a women’s refuge. It found that a key issue for women was that technology was essential for them to escape and heal from domestic violence, to find support and financial independence through work. However, in a ‘dangerous trade-off’, these same tools were being manipulated to exert coercion and control over the women to make it more difficult for them to leave the relationship. The study reiterates that even after a woman has left a domestic violence situation, she may feel unable to sever the abuse due to the omnipotent nature of technology.
  • Drouin, Michelle, Jody Ross and Elizabeth Tobin, Sexting: A new digital vehicle for intimate partner aggression (2015) 50 Computers in Human Behaviour 197.
    In this study, the authors examined the relationships between sexting coercion, physical sex coercion, intimate partner violence, and mental health and trauma symptoms within a sample of 480 young adult undergraduates (160 men and 320 women). Approximately one fifth of the sample indicated that they had engaged in sexting when they did not want to. Those who had been coerced into sexting had usually been coerced by subtler tactics (e.g., repeated asking and being made to feel obligated) than more severe forms of coercion (e.g., physical threats). Nevertheless, the trauma related to these acts of coercion both at the time they occurred and now (looking back) were greater for sexting coercion than for physical sex coercion. Moreover, women noted significantly more trauma now (looking back) than at the time the events occurred for sexting coercion. Additionally, those who experienced more instances of sexting coercion also endorsed more symptoms of anxiety, depression, and generalized trauma. Finally, sexting coercion was related to both physical sex coercion and intimate partner violence, which suggests that sexting coercion may be a form of intimate partner violence, providing perpetrators with a new, digital route for physical and sexual covictimization.
  • Mechanic, Mindy B, Terri L Weaver and Patricia A Resick, ‘Intimate Partner Violence and Stalking Behaviors: Exploration of Patterns and Correlates in a Sample of Acutely Battered Women’ (2000) 15(1) Violence and Victims 55.
    These USA based researchers recruited 114 battered women from shelters, agencies, and from the community at large to complete a survey and an interview about stalking. Results support the view that violent and harassing stalking behaviours occur with high frequency among physically battered women, both while they are in the relationship and after they leave their abusive partners. Emotional and psychological abuse emerged as strong predictors of within- and post-relationship stalking, and contributed significantly to women's fears of future serious harm or death, even after the effects of physical violence were controlled. The length of time a woman was out of the violent relationship was the strongest predictor of post-separation stalking: stalking increased over time.
  • Stark, Evan, Coercive Control: How Men Entrap Women in Personal Life (Oxford University Press, 2007).

    This book is a key text on domestic and family violence. Although Stark is based in the United States his work has been highly influential in Australia. In this book Stark explains that domestic and family violence is a pattern of controlling behaviours akin to terrorism and hostage-taking. Drawing on court records, interviews, and FBI statistics, Stark details coercive strategies that men use to deny women their very personhood. He explains that surveillance and stalking include behaviours such as gathering information without the victim’s knowledge and letting the victim know she is being watched, and serve as a means of curtailing the victim’s activities and isolating her (p457-8).

    Stark also discusses what he refers to as ‘micro-surveillance’, including activities such as going through diaries and drawers etc; monitoring phone calls, bank accounts and movements; or requiring partners to ‘check-in’ as a form of coercive control used by abusers in relationships (p461-3). Stark notes on p374 surveillance tactics may be extended to the point the victim is essentially confined, amounting to a deprivation of liberty. See this YouTube video of Evan Stark, discussing the central thesis of his book: Coercive Control: The Entrapment of Women in Personal Life.