You are on page 1of 9

Women’s Studies International Forum 96 (2023) 102664

Contents lists available at ScienceDirect

Women's Studies International Forum


journal homepage: www.elsevier.com/locate/wsif

Surveillant assemblage: Overt, covert, movement and social surveillance in


domestic and family violence in Singapore
Laura Vitis
Queensland University of Technology (QUT), 2 George St, Brisbane City, QLD 4000, Australia

A R T I C L E I N F O A B S T R A C T

Keywords: This paper explores the role of surveillance technologies in domestic and family violence in Singapore. To do so,
Surveillance it outlines findings from a pilot research project which focused on technology and violence against women in
Technology facilitated violence against women Singapore and involved fourteen semi-structured interviews with frontline workers in the fields of domestic and
Coercive control
family violence, sexual violence and LGBT support. Drawing from Dragiewicz et al.'s (2018) work on technology
Technology facilitated coercive control
Domestic violence
facilitated coercive control, this paper outlines how overt, covert, social and movement surveillance via digital,
Family violence internet and communication technologies was used to control and constrain survivors. This article explores how
the dynamics of domestic and family violence shaped the use of the surveillance technologies reported in these
accounts. It also argues that wider gendered, global and local surveillance cultures generated important per­
missions which legitimated surveillance as a technology of control and reproduced women and girls as nor­
malised surveillance subjects.

Introduction article outlines findings from a research project that examined how
technology shaped Singaporean women's experiences of domestic and
Over the past decade, there have been dedicated efforts to map the family violence by drawing on semi-structured interviews with frontline
relationship between technology and violence against women. This has workers in the fields of domestic and family violence, sexual violence
been evident in studies of doxing,1 online sexual harassment, gender- and LGBT support.
based cyberhate (Jane, 2017) and image-based abuse2 (McGlynn This article has two objectives. First, it adds to the ongoing literature
et al., 2017; Powell & Henry, 2017). While these modalities of violence on technology and violence against women in Singapore. Much has been
and harassment are used in various contexts, research on domestic written about the use of surveillance in Singapore due to the prominence
violence indicates that abusers use a range of technologies to facilitate of CCTV cameras (Lin, 2019), lateral surveillance5 (Jiow & Morales,
coercive control (Dragiewicz et al., 2018; Harris & Woodlock, 2019). 2015, p. 329), symbolic internet regulation 6 (Lee, 2010) and personal
This research has identified technological surveillance3 as a key regulation (Ganapathy, 2000). However, there is a lack of research on
concern. Mobile phones, smartphones, GPS, email and social networking the relationship between surveillance technologies and domestic and
sites enable abusers to surveil women's movements and personal lives, family violence. Thus, this article maps participants' accounts of how
facilitate threats or abuse and intensify controlling behaviours (Levy, men use overt, covert, movement and social surveillance via consumer
2014; Southworth et al., 2007; Woodlock, 2015, 2016). Hence, sur­ spyware, software, live cameras, hidden cameras and phones to restrict
veillance technologies are important sites of investigation into women's autonomy, relationships and decision-making. Second, it adds
contemporary patterns of domestic and family violence.4 As such, this to feminist surveillance scholarship's exploration of how surveillance

E-mail address: laura.vitis@qut.edu.au.


1 Posting someone's personal identifying information online to expose their identity.
2 The non-consensual production, distribution and dissemination of intimate images; threats to distribute intimate images without consent; and the unsolicited sharing of one's own nude or sexual images.
3 Covert hidden cameras, email, smart phones, messaging and social media monitoring.
4 Participants provided accounts of women's experiences of surveillance predominantly in the context of domestic violence perpetrated by male intimate partners. However, they also described surveillance being

used in the context of a young woman's experience of family violence perpetrated by her father. Therefore, when referring to this pilot study, I use the broader term of ‘domestic and family violence’. Where the
distinct terms ‘domestic violence’ and ‘family violence’ are used in this article, it is in reference to research and reports that have adopted these specific terms.
5 Surveillance of peers by peers.

6
Such as the symbolic banning of a limited number of pornographic websites.

https://doi.org/10.1016/j.wsif.2022.102664
Received 27 June 2020; Received in revised form 20 October 2022; Accepted 27 November 2022
Available online 16 December 2022
0277-5395/© 2022 Elsevier Ltd. All rights reserved.
L. Vitis Women’s Studies International Forum 96 (2023) 102664

technologies exploit and entrench social inequalities and reproduce who quickly embed themselves in the survivor's social media networks
gendered subjectivities (Koskela, 2012; Mason & Magnet, 2012, p. 108). to compromise their relationships or hinder their ability to sever contact
This article outlines how the surveillance strategies reported by partic­ (Douglas et al., 2019). Survivors are also subject to a wide range of
ipants were informed by the wider deployment of surveillance in image-based abuses, involving the production and dissemination of
Singapore. Therefore, I argue that domestic and family violence shaped intimate images without consent, the use of threats or coercion to obtain
surveillance technology use in these accounts; however, the gendered, images and threats to distribute images (Henry et al., 2017; Powell et al.,
global and local surveillance cultures generated important permissions 2019; Vitis, 2020). Image distribution during relationship breakdowns
that legitimated surveillance as a form of social control and reproduced or after rejection demonstrates how separation and post-separation are
women and girls as normalised surveillance subjects. periods of heightened risk of violence and coercive control for women
(Dobash et al., 2004; Royal Commission into Family Violence, 2016;
Technology and domestic violence Stark, 2007, p. 441).
Surveillance technologies are a core part of these abuse patterns. In
Abusers use digital, communication and internet technologies to this study, surveillance is broadly defined and includes the use of de­
systematically enact control and violence within intimate relationships vices/apps/software with surveillance capabilities, and the co-option of
(Borrajo et al., 2015; Hand et al., 2009; Southworth et al., 2007; other technologies to collate information, monitor and constrain.
Woodlock, 2013, p. 7). Through text, email, GPS, the internet of things7 Abusers utilise a rhizomatic array of technologies to create surveillant
and social media, abusers can surveil and harass with such speed and assemblages. For example, they might monitor their partner's social
frequency that abuse becomes unrelenting, leaving little space for activity and social circles through Facebook (Douglas et al., 2019),
freedom and respite (Dragiewicz et al., 2019). Despite its apparent check their text messages (NNEDV, 2014; Woodlock, 2015; Ybarra et al.,
‘newness’, technology has always been used by abusers for control and 2017) and send repeated messages/phone calls demanding to know
surveillance. For example, before the internet, perpetrators used infor­ their whereabouts (Dragiewicz et al., 2019, pp. 24–25; Hand et al.,
mation brokers, court databases, voter registries and religious di­ 2009; Woodlock, 2013). Abusers can also harness surveillance capabil­
rectories to access survivors' information post-separation (Southworth ities built into devices, apps and smartphones to monitor women's
et al., 2007). As technologies have always been part of the shifting interior and exterior lives (Fraser et al., 2010; Harkin et al., 2019).
modalities of domestic violence, this research begins from the pre­ Alternatively, they can restrict access to social networks, accounts and
sumption that these tools do not ‘cause’ violence but allow the perpe­ communication devices and destroy devices, cancel accounts and delete
trator to enact and sustain control in ways that are ‘easy, accessible and emails or texts (Dragiewicz et al., 2019). While some may force survi­
instantaneous’ (Woodlock, 2013, p. 7). By incorporating technology into vors to provide access to their accounts/devices, normative expectations
existing control patterns, abusers ‘make the most of these technological around shared passwords enable abusers to gain access without hacking
opportunities’ (Powell & Henry, 2017, p. 7), and because of this, these or force (Freed et al., 2017, p. 8). For example, Hand et al. (2009, pp.
acts need to be contextualised ‘against a shifting backdrop of control and 3–4) found that abusers would demand access to women's phones using
fear’ (Douglas et al., 2019, p. 17). social expectations that freely sharing passwords is a sign of ‘trust’ and
Contact-based harassment (CBH), image-based abuse and surveil­ hiding passwords is a sign of infidelity. Consequently, Dragiewicz et al.
lance are common modalities of technology abuse. CBH or what Dra­ (2019, p. 10) argue that technology abuse creates an ‘intimate threat
giewicz et al. (2019) define as ‘intrusion’, involves repeated, unwanted model’, as abusers already have access to passwords/devices and an­
harassing phone calls, text messages, direct messages and emails swers to security questions.
(Douglas et al., 2019; NNEDV, 2014; Southworth et al., 2007; Woodlock, Additionally, abusers have utilised consumer spyware by installing
2015). Perpetrators use low-cost, high-volume messaging services to keystroke loggers on computers (Southworth et al., 2007) and covert
send repeated, threatening and verbally abusive texts, both during and apps on phones, devices, cars and toys, which allow them to collect text
after a relationship (Woodlock, 2013). For example, Dragiewicz et al. messages, phone call records, emails and GPS data (Douglas et al., 2019;
(2019) show that abusers will rely heavily on a high volume of un­ Harkin et al., 2019; Levy, 2014). While not as commonly reported,
wanted messages or calls to maintain an unbroken line of contact before abusers can install live cameras in their homes both covertly and overtly
separation, and then threaten and escalate if the survivor tries to (Douglas et al., 2019; Woodlock, 2013). When covert, cameras are
disengage. Perpetrators can also use social media for CBH by publicly hidden within innocuous devices like children's toys, smoke detectors,
sharing unwanted, humiliating or harassing posts and sending unwanted radios and plants (Fraser et al., 2010; Hand et al., 2009; Powell & Henry,
messages to survivors (NNEDV, 2014; Woodlock, 2013). CBH via social 2017). Additionally, abusers co-opt existing camera technologies like
media is made more complex because disengaging can compromise home security cameras to surveil their spouses (Fraser et al., 2010).
access to friends, family and work opportunities (NNEDV, 2014). These are examples of surveillance drift where overt forms of surveil­
A unique element of CBH is networked or ‘diffused’ harassment lance deployed in socially legitimate ways are used by abusers for co­
(Powell & Henry, 2017). Perpetrators can target survivors' friends and ercive control (Fraser et al., 2010; Harkin et al., 2019). Importantly,
families online and use their own families to enact abuse (Dimond et al., camera surveillance enables the abuser to record and receive footage in
2011; Woodlock, 2015). They also use social media to post about sur­ real time (Hand et al., 2009), further intensifying their surveillant gaze
vivors (blaming or shaming them) and solicit support from friends and and collating intimate or personal information that can be used to
family (Freed et al., 2017; Woodlock, 2013). Abusers can also use online threaten and coerce (Douglas et al., 2019).
forums to outsource harassment and violence by sharing identifying
information, posting adverts impersonating survivors and inviting Omnipresent, disembodied and unending
strangers to contact them for sex or to commit rape (Powell & Henry,
2017; Southworth et al., 2007). These online forums and social networks Technologies can make abuse ‘spaceless’ (Hand et al., 2009; Harris &
act as proxy agents of abuse by enabling perpetrators to ‘outsource’ and Woodlock, 2019) and the perpetrator ‘omnipresent’ and inescapable
‘escalate’ abuse via third parties (Freed et al., 2017). Further, easy access (Dimond et al., 2011; Douglas et al., 2019; Freed et al., 2017; Woodlock,
to family and friends via social media can also be exploited by abusers 2015, p. 206). They are used as a bridge to enact control during sepa­
ration, unsettling women's ability to create ‘safe distances’ (Hand et al.,
2009) or ‘safety zones’ (Bruton & Tyson, 2018; Royal Commission into
7 The Internet of Things refers to the “expansion of internet-capabilities into devices that either did Family Violence, 2016, p. 17; Stark, 2007). As such, survivors report
not exist before…or were previously ‘offline’ tools” such as smart home devices like Amazon Echo exercising hypervigilant behaviours to manage the anxieties associated
(Lopez-Neira et al., 2019, p. 23).
with the abuser's omnipresence (Dragiewicz et al., 2019, p. 29;

2
L. Vitis Women’s Studies International Forum 96 (2023) 102664

Woodlock, 2015). workers showed that 37 % worked in homes with surveillance cameras
This not only impacts women's experiences of abuse but also shapes operating in living rooms, master bedrooms and the entire house
their ability to leave relationships (Dimond et al., 2011). When abusers (Wessels et al., 2017, p. 69). This is an increase from a previous survey,
use CBH or monitor messages, social media and emails, leaving becomes which found that 20 % of employers had cameras in their homes
more fraught, difficult and dangerous (Dimond et al., 2011; Dragiewicz (HOME, 2015). Also, the Straits Times endorsed consumer spyware
et al., 2019; Woodlock, 2015). To leave, women must identify the scale software (Qustodio Parental Control) designed for parents to covertly
and nature of digital surveillance and then laboriously ‘disentangle’ monitor their children's devices to track their locations, calls and mes­
themselves, often without professional assistance (Dragiewicz et al., sages (Lee, 2018; Singtel, 2019). This surveillance landscape is also
2019). To sever these connections, survivors can sacrifice communica­ coupled with lateral surveillance, or the surveillance of peers by peers
tion devices; however, they risk losing important information, contacts (Jiow & Morales, 2015, p. 329) as exemplified in the popular citizen
and autonomy (Powell & Henry, 2017). Moreover, the cost is prohibitive journalist website STOMP,9 which allows community members to name
for those who cannot afford to replace devices, cancel and renew phone and shame public transgressions online (Jiow & Morales, 2015, p. 329).
contracts or pay for additional prepaid phones (Dragiewicz et al., 2019). Taken together, these examples demonstrate how surveillance is
Separation can also escalate the threatening and coercive uses of deployed vertically and laterally by the state, employers and citizens.
technology. For example, perpetrators may threaten to distribute inti­ However, surveillance is not simply deployed because of the wider
mate images (Woodlock, 2015) and lock survivors out of accounts acceptance of its tools. It is a set of acts, technologies and discourses
(Freed et al., 2017) to prevent them from going to the police or leaving. embedded within relationships between power and inequalities (Kos­
Severing all contact with abusers (particularly phone contact) can kela, 2012). It is a core feature of socially unequal societies used to
escalate violence or more intrusive forms of stalking (Freed et al., 2017). entrench and exploit inequalities (Mason & Magnet, 2012). As Norris
Therefore, some survivors report that having a line of phone contact (2012, p. 258) argues:
with the abuser allows them to manage their safety while providing a
CCTV represents much more than just the ability to prevent and
sense of control (Dragiewicz et al., 2019).
detect crime. It is about the power to watch, to deploy, to intervene,
to identify and to regulate, often through exclusion…It concerns the
Surveillance in context reproduction of order.

In their work on technology-facilitated coercive control (TFCC), Domestic and family violence abusers draw upon the extant
Dragiewicz et al. (2018, p. 610) argue that digital media affordances gendered dynamics that render women as surveillant subjects and
situated within gender unequal societies can amplify abuse. Evidenced contribute to the wider continuum of surveillance deployed against
from the examples above, abusers utilise increasingly available sur­ them. Before digital surveillance, women's sexuality and civic partici­
veillance technologies and the acceptance of surveillance as part of so­ pation were intensively surveilled through social norms (Koskela, 2012,
cial relations within global and local surveillance cultures (Lyon, 2018; p. 49). More recently, surveillance technologies have transformed
Mason & Magnet, 2012, p. 155). Global surveillance cultures can be women's bodies into sites of risk governance both before and during
characterised by the rise of automated surveillance via global platforms gestation (Abu-Laban, 2015; Koskela, 2012; Levy, 2014; Lupton, 2013;
that collate and analyse de-territorialised, liquid and user-generated Marks, 2019). In Singapore, racialised and gendered surveillance is
data (Lyon, 2018, p. 3). In this context, surveillance becomes a particularly evident in the medicalised control of domestic workers and
‘normal part of the modern relational life’, embedded and overt, yet the deployment of CCTV in the home to monitor their labour (Huang &
accepted and legitimated (Levy, 2014, p. 684). These global surveillance Yeoh, 2007; Vitis, 2020). Therefore, while surveillance in TFCC is situ­
cultures are also imbricated with local surveillance cultures. ated within the wider availability of surveillance tools, women are
In Singapore, authoritarian, lateral and managerial surveillance have already predetermined as surveillance sites through gestation and care
been regarded as productive tools for formal and informal social control work. As Levy (2014, p. 688) argues, ‘it is striking how many technol­
and prioritised over individual privacy concerns (Jiow & Morales, ogies of intimate surveillance construct women in particular as moni­
2015). This is evident in the high saturation of public CCTV (Lin, 2019) tored subjects’.
and the increasing implementation of facial recognition technologies in
public spaces (Tan, 2018). For example, Singapore's Smart Nation The research
initiative in Geylang includes the installation of ‘smart lamp posts’ fitted
with environment/noise sensors and facial recognition software (Gov­ This article presents findings from a pilot project investigating how
tech, 2018). The appetite for sensor surveillance has been clearly arti­ digital, image, internet and communication technologies shaped
culated by K. Shanmugam (Minister for Home Affairs and Law), who, women's experiences of dating, domestic, family and sexual violence in
when reflecting on the saturation of public facial recognition in China, Singapore. Semi-structured interviews were conducted with 14 frontline
noted the following: workers in the fields of domestic and family violence, sexual violence
and LGBT support. The study received ethical approval from the Uni­
Our capabilities must similarly be that if something happens, we versity of Liverpool and participants were recruited using purposive and
want to trace the person, we need to have complete real-time capa­ snowball sampling. First, participants were recruited directly from
bilities. Where is he? What is he doing? Which car is he getting into? Family Service Centres, Family Violence Specialist Centres and anti-
Which carpark? Is he getting to the exit points? Alert ICA immedi­ violence organisations working in the fields of violence against
ately with video analytics. We are not there yet. We have to get there. women and LGBT support. These organisations were contacted through
(MHA, 2018, para 18) their public contact information and frontline workers in the service
Camera surveillance and consumer spyware targeted at children and were invited to participate in the study. Second, participants recruited
domestic workers8 also demonstrate the embeddedness of surveillance. directly through these organisations were also invited to recommend
For example, camera surveillance of domestic workers has become any relevant organisations or colleagues who might be interested in
increasingly prevalent in Singapore, and a study of 735 foreign domestic participating in the study. Interviews focused on participants' observa­
tions of how technology affects clients' experiences of dating, domestic,
family and sexual violence. Semi-structured interviews were used to
8 In December 2021, there were 246,300 migrant domestic workers registered in Singapore (Ministry

of Manpower, 2022), and the majority of these workers are women from Indonesia, Myanmar and the

Philippines (Yeoh et al., 2020). 9 Created and controlled by Singapore Press Holdings.

3
L. Vitis Women’s Studies International Forum 96 (2023) 102664

allow participants to discuss their professional experiences working with So he's also monitoring the children at home. The wife is a full-time
survivors in detail. All interviews were audio-recorded, transcribed, housewife. So sometimes at work he would call in to the wife and ask
manually coded and analysed using thematic analysis to produce over­ the wife why is the son not doing the homework, then why is the son
arching themes and patterns (Braun & Clarke, 2021). Drawing from playing, why is the son…So he's monitoring from his office where he
these interviews, I explore the four modalities of surveillance reported was working…it's a form of control. It's all very psychological
by frontline workers: overt, covert, movement and social surveillance. In because the wife felt very stressed and very - being monitored, you
the following section, I examine how these surveillance forms were know.
imbricated within the dynamics of domestic and family violence and (Participant F)
sustained, obfuscated and normalised within wider surveillance
Home camera surveillance was also used post-separation to engender
cultures.
constraints. In one case, an abuser—who had been issued an exclusion
This study focuses on two key gaps in current academic scholarship.
order10—installed a camera to maintain control while he was outside
It addresses the lacuna of research on domestic and family violence
the home:
within the surveillance literature which has been critiqued for repro­
ducing the assumption that private space provides safety from surveil­ after he was… restricted from coming back home—because he was
lance (cf. Abu-Laban, 2015; Wright et al., 2015, p. 98). It also addresses very violent—and because my client was handicapped. She was
the need for additional research on technology and domestic and family wheelchair bound, so the risk escalated quite…because he still has
violence in Singapore as much of the literature mapping this phenom­ access to the house when she's not at home, for example, he installs
enon has emerged from countries outside Southeast Asia. Additionally, CCTV in the living room to monitor my client. Whenever she's not
previous research into domestic and family violence in Singapore home then he'll call again: ‘I don't see you at home in the living room.
(Bouhours et al., 2013; Ganapathy, 2006)—while crucial—has not I have CCTV there. Why are you out again?’
addressed the contemporary modalities of technology-facilitated (Participant M)
violence coming to the attention of local frontline services (AWARE,
In addition to demonstrating how surveillance continues post-
2019, 2022). For example, Singaporean women's organization AWARE
separation (despite an exclusion order), this case also shows how
has noted that the number of image-based abuse cases reported by cli­
abusers exploit how women with disabilities rely on communication
ents has been rising since 2017, and in 2021, 19 % of all new cases re­
technologies (Woodlock, 2015). These reports highlight how CCTV-style
ported to their service involved technology-facilitated sexual violence
surveillance serves as a tool of constraint and control by restricting
(AWARE, 2022). A recent survey of 1000 Singaporeans run by the
women's freedom and spaces of autonomy (Stark, 2007).
Singapore Together Alliance for Action to tackle online harm affirmed
Stark (2007) highlighted how abusers use microregulations to
these reports, finding that 31 % of respondents had either experienced or
maintain control during physical separation. Similarly, overt camera
witnessed gender-based online harms (MCI, 2022).
surveillance is used prosthetically by magnifying the abuser's gaze and
This recognition of technology-facilitated violence against women is
systematising control. In these cases, live camera surveillance allowed
coupled with growing attention to the prevalence of domestic and family
the abuser's gaze to become seamless and unending. For example, in one
violence in Singapore. For example, the Ministry of Home Affairs and
case, a man would watch his wife from his work desk and issue her
Ministry of Social and Family Development's recent Taskforce on Family
‘corrections’ via a phone call or message. This demonstrates how an
Violence (TFV) report indicated that frontline services reported a ‘steady
assemblage of surveillance technologies can be utilised to erode the
increase in the number of enquiries and new cases of family violence’
protective barriers of space and make control more immediate, inven­
between 2018 and 2020 and this increase was intensified during the
tive and omnipresent (Dimond et al., 2011; Douglas et al., 2019; Freed
COVID-19 pandemic (TFV, 2021, p. 9). As such, the taskforce recom­
et al., 2017; Woodlock, 2015, p. 206). These cases highlight how abusers
mended improving community awareness of the dimensions of family
use a perceived territoriality and proprietary custodianship of homes,
violence and developing more research on emerging patterns of family
wives and children to legitimate their actions (Wright et al., 2015).
violence (TFV, 2021). These issues and the role of technology in family
Indeed, microregulation of daily life is a common technique of coercive
violence, were also acknowledged in the Singaporean Government's
control because it is legitimated by the normative constraints already
recent White paper on Singaporean women's development (SCWO, 2022, p.
embedded in women's performance of care work which ‘merge with
58). In this context, further empirical research is required to understand
their fear of not doing what is demanded’ (Stark, 2007, p. 411).
the nature of TFCC in the city-state. This study addresses these gaps by
While camera surveillance is common in TFCC (Dragiewicz et al.,
focusing on women's experiences of surveillance within the context of
2019), live and overt camera feeds are not prominent in the research
domestic and family violence and exploring how it produces gendered
literature. Therefore, it is important to determine what sustains this
subjectivities.
modality. First, overt camera surveillance was legitimated as a childcare
tool. For example, in both cases mentioned above, cameras were justi­
Overt surveillance
fied because abusers wanted to check on their children and ensure their
wives met their parenting standards. Indeed, one worker noted that
Nine of the 14 participants interviewed discussed cases where video/
while they were aware of home camera surveillance and its implications,
audio surveillance was overtly placed in the home. In these cases,
its use for child safety was normalised:
cameras were installed in bedrooms and general living areas to monitor
and control women's behaviour or prevent them from leaving. For We are more or less aware of recordings without consent and the
example: legalities behind it…For example, CCTV at home. We know that it's
an intrusion of privacy and that if it's not based on consent, techni­
the man actually put the surveillance in the home, in the hope that he
cally, you have rights to report and also to do something about it
would catch the wife not taking care of the children well…Then the
rather than remain silent… but most of us are in agreement that it's
wife would every time put like a towel over it to cover. Because she
not an excuse for spouses to use as a method of control unless they're
felt that she is doing what she thinks is right. But he is recording it,
really ascertaining that it's for safety purposes, like for children,
and she is worried that he would use it against her.
(Participant A)
In these cases, the abuser installed the camera, watched the live feed 10 A protection order that allows right of exclusive occupation to any protected person of a shared

from a distance and then called their wife if they saw something that residence or a specified part of a shared residence by excluding the person against whom the order is

displeased them: made (Women's Charter, 1961, s. 65).

4
L. Vitis Women’s Studies International Forum 96 (2023) 102664

checking the children. If not, we have our line that's not a method to but the wife later found out about it. She was scared because …[s]he
be used to gain control for your other spouse. instigated arguments and fights. So she was recorded…I know there
(Participant M) was one in the main hall…Then another one in one of the rooms.
(Participant A)
This comment illustrates the relationship between home surveillance
and abuse. However, it also highlights how child surveillance can be Covert surveillance at separation was also recognised by women who
used to obfuscate abuse. This was further demonstrated by another inadvertently found that their husbands were recording them at home.
worker who recalled a case where a young woman sought a Personal For example, one client, who was contemplating separation, found her
Protection Order (PPO) because of her controlling father: husband had been recording her phone conversations with her mother to
determine whether she was being advised on separation. In another
This father has also placed CCTV inside her room, so if she has to
case, a hidden camera was voyeuristically used during the separation.
change, she has to go to the bathroom inside the room to change.
(Participant E) this case that the wife doesn't know that the husband put a camera in
the bedroom. Then one day, I think she was dressing, and then she
These practices legitimise surveillance as ‘good parenting’ and part
saw a tiny dot, it's like something there. Then she discovered [liter­
of the parental prerogative. Harkin et al. (2019, p. 2) show that the use
ally a] pinhole camera. Then she confronted her husband, and she
of consumer spyware products for children has a level of cultural
reported this to the police…they were in the process of divorce, and
legitimacy and is justified through a perceived ethic of care and
the husband wasn't staying with her. But the husband wants to know,
permission for parental control. Not only does this reproduce children as
still wants to know what's going on with the wife's daily activities…
appropriate sites of technological surveillance, but it also enables these
she felt she has been, privacy has been invaded.
technologies to be “premised on a morally justifiable ethic of ‘safety’”
(Participant F)
while ‘facilitat[ing] controlling behaviour, manipulation, distrust and
even physical violence’ (Harkin et al., 2019, p. 8). The fusion of the These devices are used prosthetically (Powell et al., 2018) by per­
‘ethic of safety’ with surveillance technologies is particularly apparent petrators to forge new points of connection to maintain control during
in the Singaporean context, where National Telcos now market con­ separation (Dimond et al., 2011). As Dragiewicz et al. (2019) noted,
sumer spyware software to parents to protect and monitor their children separation does not prevent TFCC; rather, abusers use any information,
(Lee, 2018; Singtel, 2019). This dynamic is evidenced in the latter case, line of contact, or device available to continue control.
where parental demands for control shape the use of cameras in family What is also evident in these cases is the potential for surveillance
violence. Therefore, this specific surveillance modality is legitimated by data to be used to threaten and coerce. For example, Participant C noted
proprietary parental expectations and bolstered by industry and tech­ that in one case, a hidden recording device was used to gather infor­
nological affordances (Levy, 2014), enabling home cameras to be mation about a client's strategy for separation, and Participant A noted
installed without scrutiny and hindering their removal. that recordings were used to collect evidence that could be used in future
An additional justification for overt surveillance is the surveillance of custody disputes or to discredit a PPO application. Others noted that
domestic workers. For example, in one case, a worker highlighted how their clients expressed concerns that a partial recording of the rela­
the client wanted to install cameras for this purpose: tionship would easily discredit their accounts of abuse and reproduce
domestic violence as a ‘symmetrical’ problem between both parties,
so the idea was that the wife had wanted to implement, to install the
particularly when recordings strategically focused on ‘fights’. This af­
CCTV in the house to monitor the maid. But because this marital
firms Woodlock's (2015) research, which found that abusers will obtain
thing started between the husband and wife, so the husband used the
non-consensual recordings (usually intimate images/videos) and
CCTV footage to present evidence that she had been hitting the
threaten to use them to prevent intervention order applications. Women
children.
are, therefore, particularly disadvantaged by covert surveillance due to
(Participant N)
the difficulties of capturing the dynamics of domestic violence in a de-
Camera surveillance of domestic workers has become increasingly contextualised visual form coupled with the ongoing perception that
prevalent in Singapore (Wessels et al., 2017). The use of camera sur­ video recordings are objective resources (Koskela, 2012, pp. 50–51). The
veillance in this context is underpinned by the construction of foreign perception of objectivity is another technological affordance that facil­
domestic workers as socio-sexual risks and is connected to a wider web itates and obfuscates abuse.
of medicalised and managerial surveillance (Huang & Yeoh, 2007; Yeoh Whether these recordings are admissible for a PPO application, the
et al., 2010) which ‘circumscribe family formation and close off the threat and loss of control embedded within covert surveillance are co­
possibility of [their] sinking roots into Singapore society’ (Yeoh et al., ercive and harmful (Bates, 2017). For example, threats to distribute
2010, p. 40). This creates conditions for exploiting workers and a intimate images have arisen because they do not require the perpetrator
context where abusers can legitimate and/or co-opt the installation of to have images or follow through to be impactful. Simply alluding to the
cameras. potential dissemination of non-consensually obtained personal infor­
mation is coercive (Vitis, 2020), particularly in a wider context where
Covert surveillance women's bodies and behaviours are the subjects of disciplinary sur­
veillance (Koskela, 2012). Therefore, the potential for these intimate
In addition to overt camera surveillance, there were other cases recordings to be released into the digital super-public (Powell et al.,
where clients discovered that their spouses had installed hidden cam­ 2018), courts or intimate networks places women in a position of serious
eras/recording devices around the home. These covert forms of sur­ vulnerability. This is particularly true because they can be used during
veillance were used voyeuristically to continue surveillance post- child custody disputes to injure, blackmail and constrain women's spaces
separation and obtain information to blackmail, discredit and control. for action (Kelly, 2003).
For example, Participant A detailed a case where a perpetrator installed
a hidden camera in the home to record videos to discredit his wife's Movement surveillance
account of his violence:
While these cases demonstrate technological surveillance within the
I've got clients who use surveillance…hidden camera, against the
home, workers also highlighted that men would use consumer spyware
other party… the man was trying to prove that he didn't have any
(apps) in addition to the GPS capabilities of smartphones to track the
violence, so he put it there. I think eventually, the wife didn't know,
location and movements of their wives and children outside the home.

5
L. Vitis Women’s Studies International Forum 96 (2023) 102664

For example, Participant M noted that in one case, a client's husband was you talking about[?]’… Then she would in a way like sneak out, and
emotionally and physically abusive and used a GPS tracking app on then spend a short time with her friend. …So he will start messaging,
family phones to monitor her: ‘where are you now’ and all these things. Then because the two—his
parents are staying with them—so his parents sometimes would tell
[The] family decided—they installed a GPS. It was an agreed
him your wife went out, you know. He started to suspect where did
consensus kind of thing so that they could check their child's
she go. So she would sometimes have to make up some reason, ‘oh I
whereabouts…But then when their relationship soured it became a
went to get groceries, I went to do this and that for the family’.
tool for the husband to start tracking the wife's whereabouts in a
(Participant F)
more manipulative way. She would then call—‘Why are you at, say,
[here] when your workplace is at [X]? Are you not informing me that In these cases, immediate and expected contact enables perpetrators
you haven't moved in?’ to close the distance between survivors and instantaneously extend their
(Participant M) controlling behaviours. Moreover, the above case demonstrates how this
surveillance is legitimated by the gendered assertion that women's place
Importantly, this app was installed with her consent and justified
is in the home. Therefore, while consumer spyware cannot be under­
because it could be used to access their children's location. The legiti­
stated, more commonplace technologies like messages were also used to
mating role of parental surveillance was also evidenced in the case
surveille in deeply constrictive and psychologically impactful ways.
discussed above, where a young woman's father installed cameras in her
bedroom and GPS surveillance on her phone.
Social surveillance
he actually tracks her using her mobile phone about her where­
abouts…If there are times if she's switched off her data, he is unable Besides monitoring women in the home and public space, partici­
to track her and then that becomes an issue. If she were to switch off pants highlighted how perpetrators restricted access to support and so­
her handphone or if there's tests or exams going on, that becomes an cial connections to expand their surveillant assemblage and compromise
issue as well… but she's aware that she's being tracked and all that… ‘spaces for action’ (Kelly, 2003). As Stark (2007) notes, when women
Even when he is able to track where she is, when she comes back seek spaces of freedom, abusers routinely target and attempt to destroy
home, he will question her and all that. In this case there's more of those spaces. This was evidenced in several cases where men used access
emotion abuse that's going on, like the father is not happy with her if (given or taken) to emails, social media and phones to read messages and
she goes out with her friends or even if she is staying at school to find out who the survivor had been in contact with. For example, one
study and all that. worker noted a case where the client's husband used social media to
(Participant E) monitor her social life, friends and movements:

Therefore, perpetrators use consumer spyware to widen their sur­ There's one whereby the husband check on the wife activities with
veillance assemblage and tighten constraints on movement outside the friends…So on one that she will, he will go onto her Facebook to
home. Moreover, both cases demonstrate how abusers capitalise on check her account…But he will go onto the website to check on the
normalising locational surveillance for children. The rise of consumer wife's activity. Who she go[es] out with. To look at the photos and all
spyware has been mobilised by legitimising parental tracking as a form these things that, who she took photos with. That's want to keep track
of ‘care’ surveillance, despite compromising children's privacy and au­ on what's happening… track conversation of the wife with her mum.
tonomy (Harkin et al., 2019). Harkin et al. (2019) show that popular (Participant C)
consumer spyware apps are marketed as tools for child/teen surveillance
Importantly, some argued that these abuses were legitimated
and yet covertly and overtly advertise their software to ‘catch a cheating
through the presumption that shared access is a sign of openness and
spouse’. Therefore, these technologies both facilitate and are under­
fidelity in intimate relationships:
pinned by the moral and social acceptance of intrusive and non-
consensual surveillance for care work and acceptance of ‘cheating’ as It's expected that the wife has to show her phone to the husband and
a justification for technological surveillance. Abusers capitalise on both he needs to check. I find the phone is a very personal thing…this
these norms. expectation. It's like, ‘if she has nothing to hide, nothing to fear, why
Participants also reported that repeated messages and calls were must she keep her phone away from me? Why must she set a pass­
used to restrict conditions of movement and freedom within public word for it? Why must it be extra protected? Why can't it be taken
spaces. As noted above, accusations of cheating were used to legitimate away from her?’
locational contact-based surveillance: (Participant E)
So the husband keeps sending the SMS to the wife, ‘are you with As is evident here, this behaviour is scaffolded by a wider surveil­
someone, are you with someone?’ I think the wife is very trauma­ lance culture and beliefs that intimate access is proof of trust. This af­
tised…Yeah, yeah it's quite frequent. Because when the couple goes firms Dragiewicz et al.'s (2019) argument that intimate partners' existing
to work… the husband will send an SMS, he said, in the beginning access or knowledge of ways to gain access to accounts creates an inti­
the husband wanted to test whether the wife would respond with mate threat model of technological abuse.
SMS, if the wife didn't respond with an SMS in time, the husband Participants also reported cases where women had to account for
would say ‘maybe you're with someone’, so the husband would send their social media usage. In these cases, abusers mobilised gender norms
more SMS to the wife. So the wife feels very, very triggered, very to make accusations about their online conduct:
frustrated. ‘Because I'm at work, why don't you trust me?’
Also, cases where if there's videos, audio messages which is recorded,
(Participant B)
that can also be used as ‘look, I found this on your phone’, and then
The clients were distressed by the scale of the controlling messages, the wife is being questioned about it…Something that she went out
which compromised their access to public spaces, relationships and with her friends and she took a video. There's this client where she
autonomy. For example: went out clubbing with her friends and then she took photos and a
video of her friends enjoying themselves. She's with a group of fe­
Because she's a full-time housewife, they have children, and some­
male friends certainly but then that became an issue. It's like, ‘why do
times she wants to find some time for herself to meet her friends.
you have to go out with your friends? You have a family to look
Then she would try not to let him know because otherwise he would
after’. All these kinds of expectations that come in.
be questioning ‘who are you seeing, where are you going, what are

6
L. Vitis Women’s Studies International Forum 96 (2023) 102664

(Participant E) That means they are not allowed to contact certain people. It be­
comes something like isolation. Yeah, they isolate the person. So to
These gendered expectations were also evidenced by another
an extent there was a case where there was confinement. That means
participant who highlighted how a client's husband hacked her Face­
where the wife is not allowed to text anybody, including friends. The
book account and computer to read her emails. He used this information
husband would check her handphone every time he comes back after
to accuse her of cheating and called her a ‘slut’ for having friendships
work. If he sees that she contacts someone, she will get into trouble.
with men. He also used these accusations to undermine her reputation in
He might be physically abusive.
her largely Christian community and compromise her relationship with
(Participant O)
her in-laws:
Importantly, restrictions emerged as part of an increasing pattern of
Yeah and he would show this to the wife's family and I think to all
controlling behaviour. As one worker noted:
their friends, ‘see my wife is unfaithful’. How, as a Christian…she's
not a good Christian…So he would try to not only show it to the wife, the perpetuator has a tendency to be more controlling, so there were
he would show it to the people that are close to them. He would try to times when he would confiscate the phone [off] the client to limit her
convince them, ‘oh my wife did this thing to me’. interactions with friends and with [systems] and all of that…For this
(Participant B) family, because I've been working with them for some time, so there
are originally some precursors to before that he would take the
While social interactions were monitored on social media, partici­
phone away. So things like he would be a lot more suspicious of her
pants noted that men also used consumer spyware to record information
interactions with people around her, which he got a lot more jealous
(text or phone calls) from women's smartphones. For example, one
about, with the way she interacts with other people, the way she
worker discussed a case where a woman—whose husband was physi­
talks to people, when she goes on social media…finally it was during
cally violent and controlling—placed an app on her phone that recorded
an argument that he would take her phone away.
her location, phone calls and text messages. He justified this by claiming
(Participant L)
that she was cheating. In some cases, women were unaware of consumer
spyware on their devices and only realised when their husbands started These cases illustrate the relationship between escalating micro­
turning up at places mentioned in their messages. As one participant regulations and the risk of physical violence. The escalation described
relayed, this led a client to remark that there was ‘no way out’ from her above also aligns with research on intimate partner homicide, showing
husband. that stalking and intensified control over devices is risk factors for fatal
Importantly, this software can be installed and run without the sur­ violence (Domestic and Family Violence Death Review, 2017).
vivor's knowledge. For example, one worker recalled how she discov­
ered this accidentally during a client meeting: Discussion
I managed to sit in for the session because they were struggling with
Overall, participants reported that consumer spyware, software, live
this particular handphone device. What we found out later on was
cameras, hidden cameras and phones were used to create surveillant
the husband installed this tracking app in her phone, searched it,
assemblages and restrict women's autonomy, decision-making, re­
whichever, whenever she receives a call or a text it will be recorded
lationships and movement. While this research cannot make any claims
and then sent to his phone. Based on what I know of the case, there is
about prevalence, it does indicate that the experiences discussed by
physical violence happening in the family…Then he was also sus­
frontline workers are consistent with research on domestic violence
picious of her having an extramarital affair, so he decided to do that
across the globe. This work has consistently shown that technology
to her phone. She didn't know, I think, until the second or third
entrenches forms of coercive control and hinders women's ability to seek
month when he started confronting her about how come this person
respite and separation (Dragiewicz et al., 2019).
has been texting such-and-such. She was like, ‘how do you know
While some workers indicated that they were confident in their
about my texts, or how do you even know that I receive such a call?’
ability to explain the modes of surveillance and provide advice, others
He said, ‘I have evidence’, and then he replayed it for her and she was
indicated that they were unfamiliar with the technologies used by
just shocked.
abusers. As observed elsewhere, workers provided with technological
(Participant M)
abuse training are more confident in their ability to provide technical
This case affirms how abusers use surveillant technologies to create a advice and assess risk (Dorozenko & Chung, 2018). Therefore, workers
sense of both omniscience and omnipresence, which in turn compro­ who provide support to survivors—particularly those who work with
mises women's ability to seek help and leave abusive relationships clients applying for PPOs—should have access to training opportunities
(Dimond et al., 2011; Douglas et al., 2019; Freed et al., 2017; Woodlock, for TFCC and eSafety strategies to better assess risk, implement safety
2015). Moreover, it highlights how this is supported by the wider ar­ plans and ensure that survivors are not responsible for developing these
chitecture of consumer spyware products, which claim that users should skills in the absence of technical support. As noted above, the Ministry of
not use their software without consent yet enable them to collect private Home Affairs and the Ministry of Social and Family Development's
social correspondence via WhatsApp, Facebook and SMS records (Har­ recent taskforce (TFV, 2021) identified several areas of improvement in
kin et al., 2019). In doing so, these products contribute material and violence prevention and support. Among the wide-ranging recommen­
discursive resources towards legitimating narratives that controlling dations, there was an emphasis on advancing public and practitioner
surveillance is justified for ‘infidelity’, in addition to legitimating the knowledge of family violence. The taskforce recommended increasing
perceived right to surveille women's spaces of sociality (Harkin et al., public awareness of the different patterns of family violence by
2019; Levy, 2014). refreshing public awareness campaigns and emphasising non-physical
Workers also noted that abusers moved from monitoring phones to abuse (TFV, 2021). In addition, the taskforce recommended devel­
restricting phone use. In one case, the abuser would routinely monitor oping standardised assessment tools to improve frontline workers'
his wife's phones for evidence of cheating and demand that she uses the abilities to identify and respond to family violence (TFV, 2021). In line
phone on speaker in his presence. Similarly, another worker reported with these recommendations, this study highlights that advanced
that men had cut phone contracts and confiscated their phones as a form training in TFCC and eSafety strategies for frontline staff and their in­
of isolation. For example: clusion in assessment practices would be a welcome development. It
would also be beneficial to update community resources on the defini­
tions of domestic and family violence to include patterns of TFCC to

7
L. Vitis Women’s Studies International Forum 96 (2023) 102664

broaden the public's awareness of the relationship between technology s/completed-grants/1429-domestic-violence-and-communication-technology-victim


-experiences-of-intrusion-surveillance-and-identity-theft.
and abuse (NFVNS, 2018).
Fraser, B. C., Olsen, E., Lee, K., Southworth, C., & Tucker, S. (2010). The new age of
While these forms of surveillance have been documented elsewhere, stalking: Technological implications for stalking. Juvenile and Family Court Journal, 4
the prominence of overt camera surveillance at home is an important (4), 39–55.
finding of this research. Particularly as these cameras were sometimes Freed, D., Palmer, J., Minchala, D., Levy, K., Ristenpart, T., & Dell, N. (2017). Digital
technologies and intimate partner violence: A qualitative analysis with multiple
installed to monitor children or domestic workers. These examples stakeholders. Proceedings of the ACM on Human-Computer Interaction, 1(1), 1–22.
capture what Harkin et al. (2019) describe as the co-option of the Ganapathy, N. (2000). Conceptualising community policing, crime prevention and
legitimacy of care surveillance to enable abuse. As such, these accounts criminology: A Singapore perspective. Australian and New Zealand Journal of
Criminology, 33(3), 266–286.
demonstrate how the social acceptance of surveillance assists the nor­ Ganapathy, N. (2006). Between the devil and the deep-blue sea: Conceptualising victims'
malisation of controlling behaviour. Their legitimating functions also experiences of policing in domestic violence in the Singaporean context. Australian
illustrate how the use of surveillance in domestic and family violence is and New Zealand Journal of Criminology, 39(1), 90–108.
GovTech. (2018). 10 tech developments to look forward to in 2019. https://www.tech.
shaped by an interplay between gender norms, patterns of coercive gov.sg/media/technews/10-tech-developments-to-look-forward-to-in-2019.
control and global and local surveillance cultures. Hand, T., Chung, D., & Peters, M. (2009, January). The use of information and
This study had several limitations. First, its findings are limited by communication technologies to coerce and control in domestic violence and
following separation. Australian Domestic & Family Violence Clearinghouse, 1–16.
the sample size. It included a small sample of 14 frontline workers in the Harkin, D., Molnar, A., & Vowles, E. (2019). The commodification of mobile phone
fields of domestic and family violence, sexual violence and LGBT sup­ surveillance: An analysis of the consumer spyware industry. Crime, Media, Culture, 16
port. Second, it focused on instances where women sought service (1), 33–60. https://doi.org/10.1177/1741659018820562
Harris, B. A., & Woodlock, D. (2019). Digital coercive control: Insights from two
support, applied for a protection order and usually came into contact
landmark domestic violence studies. The British Journal of Criminology, 59, 530–550.
with service providers in relation to a wider pattern of physical violence. Henry, N., Powell, A., & Flynn, A. (2017). Not just ‘revenge pornography: Australians
Because of this, these findings cannot be generalised to the broader experiences of image-based abuse: A summary report. Gendered Violence and Abuse
professional experiences of frontline workers or personal experiences of Research Alliance (GeVARA), Centre for Global Research, and Centre for Applied
Social Research. https://www.rmit.edu.au/content/dam/rmit/documents/college
women seeking support. Therefore, this study is limited in its ability to -of-design-and-social-context/schools/global-urban-and-social-studies/revenge_porn
capture the full extent of surveillance in domestic and family violence. _report_2017.pdf.
However, these findings highlight some key issues around the use of HOME. (2015, March). Home sweet home? Work, life and well-being of foreign domestic
workers in Singapore [Report]. Humanitarian Organization for Migration Economics.
surveillance technologies in abuse. As such, they demonstrate the need https://static1.squarespace.com/static/5a12725612abd96b9c737354/t/5a1fe56
for further research with a larger number of survivors and frontline 10d9297c2b97526ff/1512039798091/Report_Home-sweet-home_work-life-and-we
workers to better understand the nature and prevalence of surveillance ll-being-of-foreigndomestic-workers-in-Singapore.pdf.
Huang, S., & Yeoh, B. S. A. (2007). Emotional labour and transnational domestic work:
technologies in Singaporean women's experiences of domestic and The moving geographies of ‘maid abuse’ in Singapore. Mobilities, 2(2), 195–217.
family violence. Jane, E. A. (2017). Feminist flight and fight responses to gendered cyberhate. In
M. Segrave, & L. Vitis (Eds.), Gender, technology and violence (pp. 45–61). Routledge.
Jiow, H. J., & Morales, S. (2015). Lateral surveillance in Singapore. Surveillance & Society,
References 13(3/4), 327–337. http://library.queensu.ca/ojs/index.php/surveillance-and-
society/index.
Abu-Laban, Y. (2015). Gendering surveillance studies: The empirical and normative Kelly, L. (2003). The wrong debate: Reflections on why force is not the key issue with
promise of feminist methodology. Surveillance & Society, 13(1), 44–56. respect to trafficking in women for sexual exploitation. Feminist Review, 73, 139–144.
AWARE. (2019). A recap: Taking ctrl, finding alt 2019. https://www.aware.org.sg/201 Koskela, H. (2012). ‘You shouldn't wear that body’: The problematic of surveillance and
9/11/a-recap-taking-ctrl-finding-alt-2019/. gender. In K. Ball, K. Haggerty, & D. Lyon (Eds.), Routledge handbook of surveillance
AWARE. (2022). Image-based sexual abuse featured in 7 in 10 cases of technology- studies (pp. 49–56). Routledge.
facilitated sexual violence seen by AWARE in 2021. https://www.aware.org.sg/2022 Lee, O. G. (2018, 11 March). 10 great apps for kids – And parents. Straits Times. https
/04/image-based-sexual-abuse-featured-in-7-in-10-cases-of-technology-facilitated- ://www.straitstimes.com/lifestyle/10-great-apps-for-kids-and-parents.
sexual-violence-seen-by-aware-in-2021/. Lee, T. (2010). The media, cultural control and government in Singapore. Routledge.
Bates, S. (2017). Revenge porn and mental health: A qualitative analysis of the mental Levy, K. (2014). Intimate surveillance. Idaho LawRevue, 51, 679–694.
health effects of revenge porn on female survivors. Feminist Criminology, 12(1), Lin, J. (2019, 20 August). Singapore is the 11th most-surveilled city in the world – But it
22–42. doesn't even come close to China: Report. Business Insider. https://www.businessinsi
Borrajo, E., Gamez-Guadix, M., & Calvete, E. (2015). Cyber dating abuse: Prevalence, der.sg/singapore-is-the-11th-most-surveilled-city-in-the-world-but-it-doesnt-even-
context, and relationship with offline dating aggression. Psychological Reports, 1, come-close-to-china-report/.
565–585. Lopez-Neira, I., Patel, T., Parkin, S., Danezis, G., & Tanczer, L. (2019). ‘Internet of
Bouhours, B., Chan, C., Bong, B., & Anderson, S. (2013). International Violence against Things’: How abuse is getting smarter. Safe – The Domestic Abuse Quarterly, 63,
Women Survey: Final report on Singapore. https://evaw-global-database.unwomen. 22–26.
org/en/countries/asia/singapore/2013/international-violence-against-women- Lupton, D. (2013). Risk. Routledge.
survey. Lyon, D. (2018). The culture of surveillance: Watching as a way of life. Polity Press.
Braun, V., & Clarke, V. (2021). Thematic analysis: A practical guide (1st ed.). SAGE. Marks, G. (2019, 6 June). Femtech' startups on the rise as investors scent profits in women's
Bruton, C., & Tyson, D. (2018). Leaving violent men: A study of women's experiences of health. The Guardian. https://www.theguardian.com/business/2019/jun/06/femte
separation in Victoria, Australia. Australian & New Zealand Journal of Criminology, 51 ch-startups-womens-health-investors.
(3), 339–354. Mason, C. L., & Magnet, S. (2012). Surveillance studies and violence against women.
Dimond, J. P., Fiesler, C., & Bruckman, A. S. (2011). Domestic violence and information Surveillance & Society, 10, 105–118. https://doi.org/10.24908/ss.v10i2.4094
communication technologies. Interacting with Computers, 23(5), 413–421. McGlynn, C., Rackley, E., & Houghton, R. (2017). Beyond ‘revenge porn’: The continuum
Dobash, R. E., Dobash, R., Cavanagh, K., & Lewis, R. (2004). Not an ordinary killer – Just of image-based sexual abuse. Feminist Legal Studies, 25, 25–46. https://doi.org/
an ordinary guy: Men who murder an intimate woman partner. Violence Against 10.1007/s10691-017-9343-2
Women, 10, 577–605. MCI. (2022). Sunlight AfA releases topline findings from poll on online harms at webinar.
Domestic and Family Violence Death Review. (2017). Domestic and Family Violence Death https://www.mci.gov.sg/pressroom/news-and-stories/pressroom/2022/3/sunlight
Review and Advisory Board. Domestic and Family Violence Death Review and -afa-releases-topline-findings-from-poll-on-online-harms-at-webinar.
Advisory Board. MHA. (2018, 3 May). Police workplan seminar 2018 - Speech by Mr K Shanmugam. Minister
Dorozenko, D., & Chung, D. (2018). Research and evaluation of the safer technology for for Home Affairs and Minister for Law. Ministry of Home Affairs. https://www.mha.
women training and the Safe Connections program [Report]. https://wesnet.org.au/ gov.sg/mediaroom/speeches/police-workplan-seminar-2018—speech-by-mr-k-shan
wp-content/uploads/sites/3/2019/10/Safe-Connections-Evaluation_Telstra-Report mugam-minister-for-home-affairs-and-minister-for-law/.
_-Final.pdf. Ministry of Manpower. (2022). Foreign workforce numbers. Ministry of Manpower
Douglas, H., Harris, B. A., & Dragiewicz, M. (2019). Technology-facilitated domestic and Singapore. https://www.mom.gov.sg/documents-and-publications/foreig
family violence: Women's experiences. British Journal of Criminology, 59, 551–570. n-workforce-numbers.
Dragiewicz, M., Burgess, J., Matamoros-Fernández, A., Salter, M., Suzor, N., NFVNS. (2018). What is family violence. The National Family Violence Networking
Woodlock, D., & Harris, B. (2018). Technology facilitated coercive control: Domestic System. https://www.msf.gov.sg/breakthesilence/SitePages/Home_Family.aspx?
violence and the competing roles of digital media platforms. Feminist Media Studies, family=1.
18, 609–625. NNEDV. (2014). A glimpse from the field: How abusers are misusing technology. Safety
Dragiewicz, M., Harris, B., Woodlock, D., Salter, M., Easton, H., Lynch, A., & Milne, L. Net Technology Safety Survey 2014. https://static1.squarespace.com/static/51dc54
(2019). Domestic violence and communication technology: Survivor experiences of 1ce4b03ebab8c5c88c/t/54e3d1b6e4b08500fcb455a0/1424216502058/NNED
intrusion, surveillance and identity crime. ACCAN and QUT. https://accan.org.au/grant V_Glimpse+From+the+Field+-+2014.pd.

8
L. Vitis Women’s Studies International Forum 96 (2023) 102664

Norris, C. (2012). The success of failure: Account for the global growth of CCTV. In Vitis, L. (2020). Private, hidden and obscured: Image-based sexual abuse in Singapore.
K. Ball, K. Haggerty, & D. Lyon (Eds.), Routledge handbook of surveillance studies (pp. Asian Journal of Criminology, 15(1), 25–43. https://doi.org/10.1007/s11417-019-
251–258). Routledge. 09293-0
Powell, A., & Henry, N. (2017). Sexual violence in a digital age. Palgrave Macmillan. Wessels, A., Ong, M., & Daniel, D. (2017). Bonded to the system. Labour exploitation in
Powell, A., Henry, N., Flynn, A., & Scott, A. (2019). Image-based sexual abuse: The the foreign domestic work sector in Singapore [Technical report]. https://www.rese
extent, nature, and predictors of perpetration in a community sample of Australian archgate.net/profile/Anja_Wessels/publication/321298753_Bonded_to_the_system_
residents. Computers in Human Behavior, 92, 393–402. Labour_exploitation_in_the_foreign_domestic_work_sector_in_Singapore/links/5a2
Powell, A., Stratton, G., & Cameron, R. (2018). Digital criminology: Crime and justice in 3672a4585155dd41cc58b/Bonded-to-the-system-Labour-exploitation-in-the
digital society. Routledge. -foreigndomestic-work-sector-in-Singapore.pdf.
Royal Commission into Family Violence. (2016). Report and recommendations. Women's Charter. (1961). https://sso.agc.gov.sg/Act/WC1961.
SCWO. (2022). White paper on Singapore women's development. https://www.scwo.org. Woodlock, D. (2013). In The rise of technology-based stalking (pp. 4–7). DVRCV Advocate.
sg/wp-content/uploads/2022/03/White-Paper-on-Singapore-Womens-Developmen Woodlock, D. (2015). Remote control. DVRCV Advocate.
t.pdf. Woodlock, D. (2016). The abuse of technology in domestic violence and stalking.
Singtel. (2019). Surf smart with Singtel Surf School. https://www.singtel.com/personal/ Violence Against Women, 23(5), 584–602. https://doi.org/10.1177/
products-services/lifestyle-services/surfschool. 1077801216646277
Southworth, C., Finn, J., Dawson, S., Fraser, C., & Tucker, S. (2007). Intimate partner Wright, J., Glasbeek, A., & van der Meulen, E. (2015). Securing the home: Gender, CCTV
violence, technology, and stalking. Violence Against Women, 13(8), 842–856. and the hybridized space of apartment buildings. Theoretical Criminology, 19(1),
Stark, E. (2007). Coercive control: How men entrap women in personal life. Oxford 95–111.
University Press. Ybarra, M., Price-Feeney, M., Lenhart, A., & Zickuhr, K. (2017). Intimate partner digital
Tan, M. (2018). Tech in the home team: Harnessing technology to monitor threats. Ministry of abuse. Data & Society Research Institute and Center for Innovative Public Health
Home Affairs. https://www.mha.gov.sg/hometeamnews/our-community/ViewArtic Research. https://datasociety.net/pubs/oh/Intimate_Partner_Digital_Abuse_2017.
le/tech-in-the-home-team-harnessing-technology-to-monitor-threats. pdf.
TFV [Taskforce on Family Violence]. (2021, September). Tackling family violence: Yeoh, B., Huang, S., & Dunn, K. (2010). Sexualised politics of proximities among female
Awareness. Prevention. Protection. Accountability. MSF. https://www.msf.gov.sg transnational migrants in Singapore. Population, Space and Place, 16(1), 37–49.
/publications/Documents/Taskforce%20on%20Family%20Violence%20Report% Yeoh, B. S. A., Goh, C., & Wee, K. (2020). Social protection for migrant domestic workers
20-%20Tackling%20Family%20Violence%20-%20Awareness%20-%20Prevention% in Singapore: International conventions, the law, and civil society action. American
20-%20Protection%20-%20Accountability.pdf. Behavioral Scientist, 64, 841–858.

You might also like