You are on page 1of 12

Computers in Human Behavior Reports 3 (2021) 100055

Contents lists available at ScienceDirect

Computers in Human Behavior Reports


journal homepage: www.journals.elsevier.com/computers-in-human-behavior-reports

Threaten me softly: A review of potential dating app risks


Anh Phan a, Kathryn Seigfried-Spellar b, Kim-Kwang Raymond Choo a, *
a
Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, 78249, USA
b
Department of Computer and Information Technology, Purdue University, West Lafayette, IN, 47907, USA

A R T I C L E I N F O A B S T R A C T

Keywords: The potential abuse of dating applications (apps), including during the current lockdowns due to COVID-19, has
Dating apps resulted in a growing community of research to learn to what extent the impacts of these apps have on the in-
Online dating dividual's psychological and physiological being, as well as the presumed security of their sensitive information.
Mobile forensics
In this paper, we seek to review the existing literature that encompasses the issues surrounding dating apps.
Dating app artifacts
Dating app risks
Specifically, we focus on crimes that can occur from the use of dating apps, potential mitigation strategies, the
Dating app forensics physiological and psychological effects on not only the general population, but also minority groups, and lastly, an
assessment on the associated cybersecurity risks and potential digital artifacts of interest in criminal in-
vestigations. Although research on dating apps will continue to struggle with the ever-changing technological
landscape, it is important to examine best practices and mitigation strategies that dating app developers can
utilize to create safer platforms. Finally, we conclude this paper with a number of potential research opportunities.

1. Introduction technology-facilitated intimate partner violence affects one in three


women and one in six men in the course of their lifetime. In another more
Internet dating websites first appeared in the mid-nineties (Brooks, recent PEW study, Anderson et al. (Anderson, Vogels, & Turner, 2020)
2011), and in recent times, dating applications (apps) became an found that young women were more likely to report negative experiences
increasing popular way of accessing dating services. The popularity of with online dating platforms, including harassment and receiving unso-
dating is partly due to the digitalization of our society and the perva- licited sexually explicit images. In addition, young women were twice
siveness of consumer technologies such as smart mobile and wearable more likely to receive threats of physical violence compared to young
devices (e.g., Android and iOS mobile devices). It has, for example, been men (Anderson et al., 2020). In some parts of the UK, the number of
estimated that the number of users will increase steadily in the 30 million crimes involving dating apps doubled from 2015 to 2018
range, with 2019 having 34.9 million dating app users (statista.com). (refinery29.com).
Dating app usage did not reportedly decrease in the recent COVID-19 This is partly due to the fact that dating app users are also seeking to
lockdowns (businessinsider.co; newshour nation); for example, a recent establish physical, face-to-face relationships after they are connected
media article reported that daily conversations between users of Tinder online (Kallis, 2020). For example, Queiroz et al. (Queiroz, de Sousa,
and OkCupid have respectively increased by 20% and 30% since March Brignol, Araújo, & Reis, 2019) found that a ‘high prevalence of HIV was
11, 2020 (fastcompany.com). observed among MSM [men who have sex with men] 50 years of age and older
Hence, it is not surprising that the research community is interested in who use dating apps’. This is partly due to unsafe sexual practices among
studying dating apps and its usage from different perspectives (Azzahro, the dating app users, including users who are traveling (Boston, 2015;
Hidayanto, Maulida, Zhu, & Sandhyaduhita, 2018; Buggs, 2019; Chak- Duguay, Burgess, & Suzor, 2020; James, Condie, & Lean, 2019; Vor-
raborty, 2019; Chan, 2018a, 2018b; Eskridgeet al., 2019; Gavin, objovas-Pinta & Dalla-Fontana, 2019). For example, according to
Rees-Evans, & Brosnan, 2019; Zervoulis, Smith, Reed, & Dinos, 2020). Sawyer, Smith and Benotsch (2018), dating app users ‘were twice as likely
While there are positive aspects associated with the use of such apps to have had unprotected sex’.
(Buggs, 2019; Lauckner et al., 2019; Mayshak, King, Chandler, & Han- There have also been a number of reported incidents involving dating
nah, 2020), there are also potential risks and these risks are not restricted app users in the media. For example, an individual was reportedly
to cyberspace only. According to Smith et al. (2017), sentenced to 12 years imprisonment for the rape of two women he had

* Corresponding author.
E-mail addresses: anh.phan@utsa.edu (A. Phan), kspellar@purdue.edu (K. Seigfried-Spellar), Raymond.choo@fulbrightmail.org (K.-K.R. Choo).

https://doi.org/10.1016/j.chbr.2021.100055
Received 31 August 2020; Received in revised form 8 December 2020; Accepted 4 January 2021
Available online 27 January 2021
2451-9588/© 2021 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-
nc-nd/4.0/).
A. Phan et al. Computers in Human Behavior Reports 3 (2021) 100055

met on Tinder between 2016 and 2017 (national/victoria). In another risks in the literature (see also Table 1). For example, O'Keefe (2005)
reported incident, a couple allegedly used dating apps to pick a potential reviewed potential risk factors associated with the perpetrators and
victim for their sexual fantasy, resulting in a female Tinder match getting victims of dating violence, as well as the effectiveness of existing pre-
strangled and dismembered (people.com). Another incident involved vention and intervention programs targeting dating violence. Murphy
Grindr, a popular dating app targeted toward “gay, bi, trans, and queer (2018) discussed the importance of finding a balance between privacy
people” (see grindr.com), where an individual used the app to rob two interest associated with dating apps and the need for user protection from
men because they were gay (Mich). In 2019, a list of most dangerous apps crimes that can derive from them, with the most frequently reported
for children from Chron was issued after the arrests of 25 men in a child crimes being ‘rape, stalking, and the grooming and sexual exploitation of
sex sting, all of whom used one of the apps (Jordan). Among them were children’. The study also provided an overview of the functionality of
dating apps, such as Bumble, Grindr, and Badoo. Another risk associated dating apps, the different crimes associated with dating apps, and the
with the use of dating apps is “cyber-flashing” where unsolicited sexually legal issues associated with the data stored on them. Anzani et al.
explicit material is sent via dating apps. In February 2020, it was reported (Anzani, Di Sarno, & Prunas, 2018) focused on how dating apps could be
that used to find sexual partners, specifically through apps that use geo-
location, and they examined the sociodemographics of the typical dating
Senator Connie M. Leyva (D-Chino) and Senator Lena Gonzalez (D-Long
app user, app use patterns, and profile presentation. More recently in
Beach) today introduced the FLASH (Forbid Lewd Activity and Sexual
2020, Ciocca et al. (2020) reviewed 34 articles published between 2016
Harassment) Act, which would establish legal protections for technology
and 2017 to understand the sexual health and sexual behaviors related to
users when they receive unsolicited sexually explicit images and video-
Tinder use.
s–also known as ‘cyber flashing’. (Senator leyva introduces flash, 2020)
We observe that existing reviews and surveys on dating apps gener-
In addition to the risks faced by app users, there are also potential ally do not include a cybersecurity or forensic focus, for example in terms
risks to the app developer. For example, Wang (Wang et al., 2019) re- of what digital artifacts can potentially be recovered from either the
ported that a number of dating platforms were closed down by the Chi- device or the app that could compromise the privacy of the users. This
nese authorities as these platforms provided MSM services. paper addresses this gap by reviewing cybersecurity risks and digital
Some of the risks associated with the use of dating apps also exist with artifacts associated with data app usage.
the use of other online/consumer technologies such as the Internet, social In the next section, we will briefly describe the potential criminal
media, online gaming, and other communication mobile apps (e.g., activities associated with the use of dating apps, as well as mitigation
Facebook Messenger and WeChat) (Ayalon & Toch, 2019; Douglass, strategies, based on the analysis of 120 articles identified in the litera-
Wright, Davis, & Lim, 2018; Gainsbury, Browne, & Rockloff, 2019; Henry ture. Furthermore, gay, bisexual, and other men who have sex with men
& Powell, 2018; Kochuchakkalackal & Reyes, 2020; Kulyk, Gerber, will collectively be referred to as MSM, unless otherwise noted based on
Marky, Beckmann, & Volkamer, 2018; Moor & Anderson, 2019; Wu & the original language used by the authors cited.
Ward, 2019; Zhong, Kebbell, & Webster, 2020). However, these tech-
nologies are generally not designed to facilitate dating (or hook-ups). For 2. Potential criminal activities and mitigation strategies
example, as explained by Shield (2019), ‘[p]latforms like Grindr also have
an undeniably sexual online culture, and sometimes the lines between social, While dating apps offer a range of benefits, there are also associated
logistical, and sexual requests (or offers) are not clear’ and it has been risks, such as those described in Table 2. These potential risks/activities
suggested that such apps can be, and have been, utilized to facilitate are categorized as technology-facilitated sexual violence (TFSV), stalk-
prostitution (Albury, Burgess, Light, Race, & Wilken, 2017; Brennan, ing, revenge pornography, and doxing (Douglass et al., 2018; Freed et al.,
2017). In addition, some dating apps allow users to post their HIV status, 2018; Henry & Powell, 2018; Zhong et al., 2020).
and this feature (not available on most other online/consumer technol-
ogies) can be exploited by HIV-negative individuals seeking to have sex
2.1. Potential criminal activities
with HIV-positive individuals, known as bug chasing (Díaz, Orlando--
Narv aez, & Ballester-Arnal, 2019). Dating apps may also facilitate sexual
Dating apps can be, and have been, abused to facilitate TFSV. Ac-
racism and other malicious activities (Carlson, 2019). Hence, we only
cording to Choi et al. (Choi, Wong, & Fong, 2018), there are two theories
focus on dating apps in this paper.
on the association between the Internet (and in our context, dating apps)
Specifically, we perform a search on Google Scholar and existing
and sexual abuse. One is the ease of accessibility to potential victims from
databases (e.g., ACM Digital Library, ScienceDirect, IEEEXplore,
a much larger pool, and consequently, increases the risk ‘of meeting
Springerlink, and SAGE Journals) to search for existing literature, using
someone who's sexually coercive’. The other theory is that people engaging
keywords such as “dating app” AND risks, “dating app” AND crimes,
in online interaction will sometimes share personal and sensitive infor-
“dating app” AND “security”, “dating app” AND “safety”, and “dating
mation (e.g., personally identifiable information; PII) or sexually explicit
app” AND privacy. Then, we review the publications’ abstract, intro-
images or conversations) due to an immediate trust with people they
duction, and conclusion, and categorize these publications as directly
meet online.
related or not directly related to the potential abuse of dating apps and
Why is this so? Yeao and Fung (2018) focused on the sociotemporal
their mitigation strategies. Publications that are not directly related to
patterns underlying dating apps and discovered that ‘the tempo and
the topic are excluded.
sequence with which we interact with someone not only reflect the significance
As part of the search, we locate a small number of reviews (or surveys,
of our relationship with that person but also affect its perceived quality’. The
as these two terms are used interchangeably) focusing on dating (app)
study's participants saw the pace of a relationship on the app as an

Table 1
Existing literature reviews: A comparative summary.
Law Risks Motivations Crime Function Sociodemographics Psychology Physiology Digital Artifacts

Studies O'Keefe (2005) ✓


Anzani (Anzani et al., 2018) ✓ ✓ ✓
Murphy et al. (Murphy, 2018) ✓ ✓ ✓ ✓
Ciocca et al. (2020) ✓
This paper ✓ ✓ ✓ ✓ ✓ ✓

2
A. Phan et al. Computers in Human Behavior Reports 3 (2021) 100055

Table 2
Features that can be exploited.
Crimes

Stalking TFSV Revenge Pornography Attempted Murder Fraud

Features Geolocation ✓ ✓
Audiovisual exchange ✓ ✓ ✓
Chat ✓ ✓
Profile Presentation ✓

attribution of the quality of their connection. The convenience and speed ‘have been threatened or victimized’ by nonconsensual pornography; they
of dating apps do not stop when users meet a new potential match, but found that participants saw sharing intimate images on dating apps as
continues beneath the surface when they decide to “open up” to one necessary for the following reasons. One is that ‘sharing verifies identity’.
another, even if the meeting time is recent. Such a feature can, however, The anonymous nature of dating apps could cause users to be cautious
be exploited to obtain personal information about one or more users to with those they meet online and therefore require the other to share
facilitate activities, such as cyberstalking or bug chasing. A literature images that could validate their personal information/identity. The
review of TFSV's effects on adults (Henry & Powell, 2018) distinguished second reason is that ‘if users want to see what others look like, they have to
between three different TFSV behaviors: 1) sexual coercion occurs share first’. The same way one partner in a relationship opens up about
through blackmail, bribery, or threats that force a user to take part in themselves because the other has already done so, exchanging intimate
unwanted sexual activity; 2) contact sexual offense refers to the use of images could be seen as an online form of reciprocating and building
technology to facilitate physical assault (e.g., sexual assault); and 3) the trust. The last reason mentioned is that sharing these images allows body
use of a third-party to assault an app user, based on false identity or positivity and sexual freedom. The study also gave three reasons as to
deception. why dating apps should be studied as platforms for revenge pornography.
Stalking is a behavior that may be facilitated by features associated The first reason is the wide use of online dating platforms. The second is
with dating apps. One example is the popular geolocation feature, which that dating apps are ‘designed to promote and facilitate the free disclosure of
can be broadly categorized into real-time geolocation (that matches intimate images and other personal information’. The app can only provide
people in close proximity at the same time) and post-hoc geolocation. users with suitable matches if they are willing to share with it personal,
The latter category allows apps to add a temporal overlay as users walk and sometimes sensitive, information - information that at one point in
pass each other repeatedly, thereby showing them as potential matches time was usually only shared with close friends or family members.
(Veel & Thylstrup, 2018). Utilized by many dating apps (e.g., Happn), Thirdly, the study recalls that ‘apps remind us that our embodied,
this feature would allow a stalker to track thier target in a much more phenomenological social experiences are simultaneously digital and physical’,
convenient and accurate way with a greater probability of staying hid- meaning that dating apps are created with the ultimate goal of joining
den. Unlike cyberstalking, physical tracking generally involves a stalker two users, who met online, together in the real world by using features
being in the same physical space as the target in order to learn their daily that follow both the individual's physical and online presence. These
routines/routes. Here, the risk of getting caught is higher, but when done reasons open dating app users to the potential of being victimized by the
remotely, the culprit is able to do essentially the same task without the very same information they decided to share with that app's community.
fear of being discovered by the target. Along the same line is a term called Similar findings have also been echoed in other studies (Fehlbaum &
geoslavery, where geolocation is used by a stalker to punish their victim Bowden, 2020; Riggs & Punyanunt-Carter, 2020; Snaychuk & O'Neill,
for ‘location infractions without requiring constant physical surveillance’ 2020).
(Eterovic-Soric, Choo, Ashman, & Mubarak, 2017). Location infractions Finally, along with the sexual images, ex-partners often post identi-
could be the victim visiting anyone deemed a threat by the stalker or fying information, including work address (14 percent), email (26
traveling a distance too far from them. Other technological means percent), and the victim's full name (59 percent) (cybercivilrights.org).
include spyware, keyloggers, and even a stalker app (Eterovic-Soric et al., This sharing of personal documents is known as doxing. Doxing, also
2017). Spyware can be used to monitor the victim's computer usage, such spelled doxxing, refers to “dropping documents” that disclose a person's
as emails, without their knowledge while keyloggers are able to record identifying information on the internet to retaliate against and harass the
all keystrokes, thus giving the culprit unauthorized access to the in- outed person. Like nonconsensual pornography, doxing is a form of
dividual's online affairs. The stalker app is a type of spyware for mobile cyberharassment (Citron, 2014; Douglas, 2016; Freed et al., 2018). Ac-
devices that allows another user to covertly monitor and control the cording to Douglas (2016), doxing falls under threat categories: dean-
target's mobile device via geolocation, and also view or block commu- onymization (i.e., victim loses anonymity), targeting (victim loses
nication with the target^ a€™s friends and family (Eterovic-Soric et al., obscurity), and delegitimization (i.e., victim loses credibility). For vic-
2017). tims of intimate partner violence, ex-partners may release sexually
One crime not often discussed in the realm of online dating is explicit photos as a form of delegitimization (Douglas, 2016). In addition,
nonconsensual pornography. Nonconsensual pornography may be the release of personally identifiable information can expose the victim to
viewed as a sub-category of cyberharassment (Kamal & Newman, 2016). cyberharassment (Blanch & Hsu, 2016).
Nonconsensual pornography, sometimes referred to as revenge pornog-
raphy, is the distribution of sexually graphic images of individuals 2.2. Potential mitigation strategies
without their consent, often for the purpose of humiliation (Dymock &
van Der Westhuizen, 2019; Hall & Hearn, 2019; Kraljic & Ünver, 2019; While there are potential mitigation strategies and solutions, we first
Wexler, 2018). Sexually explicit or compromising photographs and must examine the assumptions that app developers make when creating
videos are often taken and given voluntarily to another individual in the online programs, and whether those assumptions are a part of the
context of an intimate relationship (also referred to as sexting in the problem or solution when discussing the potential dangers of dating
literature) (Wexler, 2018; Albury & Byron, 2014; Dymock & van Der apps. For example, Bivens and Hasinoff (2018) examined 807 features of
Westhuizen, 2019; Franks; Hall & Hearn, 2019; Kraljic & Ünver, 2019; 215 anti-rape apps to examine if and how mobile apps address sexual
Kitchen, 2015; Schreurs, Sumter, & Vandenbosch, 2020; Walrave et al., violence. If sexual violence can be facilitated by technology, so can the
2015). perceptions of it. 87% of the apps' features were designed for potential
According to Waldman (Waldman), 10.4 million US internet users victims, 12% designed for bystanders, and 1% for perpetrators where the

3
A. Phan et al. Computers in Human Behavior Reports 3 (2021) 100055

features either targeted incident intervention or education and aware- What all of these potential solutions have in common is their goal of
ness. For the potential victims, 80% of the features were made ‘to be used breaking the common myths associated with sexual assault. As mobile
during a specific incident’ – alerting a list of contacts about the incident or apps are so ubiquitous in today's society, the potential change these so-
monitoring the user with GPS to alert contacts if they remained idle too lutions could have may be able to impact the way society perceives sexual
long or veered off a suggested route. While these elements might sound violence, and thus help so many individuals move past the common
reassuring, they would most likely be ineffective in a real attack because myths that exist in today's safety apps. However, it is also not realistic to
they do not address the various forms of coercion a perpetrator would expect app developers to be responsible in mitigating all risks due to the
probably use nor are they specific to the various circumstances a po- use of dating apps. For example, a background check on an app user can
tential victim may find themselves in. Bivens and Hasinoff argued that only reveal previous criminal history but not predict future offending.
the prominence of Incident Intervention features and ‘victim-centric ap-
proaches’ in anti-rape apps do not challenge rape myths, but rather 3. Physiology
reinforce the two most common ones, namely: sexual violence is pri-
marily committed by strangers and ‘potential victims are responsible for One aspect of dating apps' risks that literature reviews lack is the
preventing sexual violence through personal vigilance and risk reduction’. possible effects dating apps have on the individual's physiology. This
Thus, the support the apps provide do not reduce our society's tendency section will focus on the association of dating app use with sexual
toward victim-blaming. This is similar to the study by Debnam and behavior and unhealthy image perception, specifically eating disorders.
Kumodzi (2019) on adolescents' viewpoints on a safety planning app Due to the geosocial-networking (GSN) feature of many dating apps,
designed to address sexual violence (the authors focused on adolescents meeting a potential match face-to-face (FTF) has reached a new level of
due to the issue of teen dating violence). The teenage participants found convenience and speed that may be seen by many as lucrative. However,
that the app was designed to address common perceptions of sexual because of this convenience, some users may be more motivated to
abuse – gender exclusiveness and generalized safety dilemmas. However, engage in risky sexual behaviors, such as sex without protection or with
the app's language implied that females were always the victims and the use of drugs. Hahn et al. (2018) conducted two experiments with the
seemed to assume only heterosexual relationships. As for the safety di- goal of highlighting “the importance of understanding GSN app use in the
lemmas, the participants noted that the app poorly addressed psycho- spread” of risky sexual behaviors “among emerging adults.” However,
logical abuse – a form of abuse that they believed was ‘strongly present in the study found no statistical difference between users and non-users.
their relationships’. However, Choi et al. (2016) explored the association between dating
Other potential solutions to facilitate the design of safety apps and app use and risky sexual behaviors among college students and found
staying safe when dating online are summarized in Table 3. In Debnam that the use of dating apps was associated with having more sexual
and Kumodzi (2019), youth proposed installing quicker ways in safety partners, more unprotected intercourse, increased likelihood of incon-
apps to help a friend in a dangerous situation, such as having a button sistent condom use, and not using a condom in their most recent sexual
that when clicked would provide immediate service or instructions when encounter. Choi et al. also believe that individuals who are sexually
in an emergency. Bivens and Hasinoff (2018) also explored various so- active may be more likely to use dating apps because of their convenience
lutions for both the victim and perpetrator. As discussed earlier, the and accessible nature. Again, this research suggests dating apps may
common myths of sexual assault cause app developers to create programs facilitate risky sexual behaviors.
that do not necessarily aid in fighting against a rape culture in which Before discussing the relationship between dating apps and eating
victim-blaming occurs. It was also explained that new apps can ‘facilitate disorders, it is important to understand the underlying issue: image
collective forms of resistance to rape culture by coordinating and collecting perception. This stems from the Objectification Theory, which tries to
testimonies of personal experiences’, such as making anonymous reports explain the pervasive tendency to equate humans (in particular, women,
with the option to pursue the case only if another person reports the same but this section focuses on both genders) with their bodies (Calogero,
assailant (Bivens & Hasinoff, 2018). However, apps seem to lack edu- 2012). Sexual objectification involves the fragmentation of a person into
cation on effective self-defense techniques, emotional and physical a collection of sexual parts, thus stripping them of a personality so that
self-defense training, or other resources that could provide better pro- they exist merely as a body. To objectify oneself (called
tection against perpetrators. The study also stated that ‘it is clear that an self-objectification) means to adopt a third-person perception instead of a
effective anti-rape app would need to be part of a broader rape prevention first-person one, thus placing greater value on how one appears to others
program’ (Bivens & Hasinoff, 2018). The most successful programs pro- instead of how one feels. This creates “an objectified body” that is
vided, over a long period of time beginning in teenage years, education “malleable, measurable, and controllable.” Research suggests dating app
that aimed to break gender stereotypes and relationships and focused on users prioritize physical appearance to any other feature of a person's
empathy for the victim, rather than placing blame. Aware that potential profile (Shimokobe and Mirandaa). This emphasis on evaluation by
perpetrators ‘would likely not seek out an app on their own’, Bivens and physical appearance led Coor et al. (2016) to examine the association
Hasinoff suggested ‘the use of such an educational app [to] be required in between dating apps and disordered eating. A large body of evidence
schools or workplaces … and as part of a comprehensive evidence-based sexual indicates self-objectification directly predicts more disordered eating
violence prevention program’ (Bivens & Hasinoff, 2018). behaviors (Calogero, 2012). Coor et al. expected to find that dating app
users would demonstrate elevated rates of unhealthy weight control
behavior (UWCB) compared to non-users; six UWCBs were identified
including fasting, diet pill use, and anabolic steroid use among the male
and female participants. Laxative use was 11.7% while 25% reported
Table 3
Potential mitigation strategies against dating app-facilitated crime. vomiting for weight control. Dating app users had significantly higher
odds of UWCBs compared to non-users, with female users having
Strategy Effective Against
2.3–26.9 times the chance of engaging in all six behaviors and male users
Install app features with immediate Unsuspecting emergencies having 3.2–14.6 times the chance. This study highlighted an
help
under-researched issue associated with the use of dating apps. The
Collect testimonies of personal Victim-blaming in rape culture
experiences attention paid to physical appearance on dating apps may cause users to
Training in emotional þ physical Perpetrators that try to cause emotional þ feel pressured by the probability of success – number of matches,
self-defense physical harm exchanged messages. To increase that probability, they may be motivated
Educational programs over a long Breaking stereotypes in gender þ to take potentially harmful actions in order to fit into their belief of
time period relationships
accepted physical beauty and thus be accepted by those online.

4
A. Phan et al. Computers in Human Behavior Reports 3 (2021) 100055

4. Psychology offline world continued to have high dating anxiety when using the on-
line platform. Future researchers should be aware of these contradicting
Majority of the research on dating apps explored the psychological ideas when investigating the impact self-esteem may have on a person's
impact and reasons why people seek dating online. This section discusses dating preferences online.
the factors for using dating apps, the dangers, and the unique effect The motivation of sexuality has two perceptions – to meet someone of
dating apps have on minority groups. the same sexual orientation or to gratify one's sexual desires using the
most convenient tool. The Solis and Wong study (Solis & Wong, 2019)
found that women were more motivated by self-esteem and sociability to
4.1. Contributing factors use dating apps while men were more motivated by sexuality. The latter
concurs with Sevi et al.‘s (2018) finding that men's use of the popular
Table 4 summarizes five key motivations of using dating apps. dating app, Tinder, for casual sex was positively correlated with socio-
For many users, the impact of dating apps resides psychologically by sexuality – a person's willingness to take part in uncommitted sexual
playing a role in shaping how the individual perceives oneself. Solis and activity.
Wong (2019) investigated the motivations behind dating app use and Another motivation to consider because of its psychological inheri-
found that the most popular reason was fun and ease of connectivity. tance is attachment orientation, as examined by Chin et al. (2019).
Many enjoyed the app's ability to allow easy communication with a large, Attachment orientation has two dimensions – anxiety and avoidance.
diverse population; this was also found by Chin et al. (2019) where the Those with higher attachment anxiety enjoy physical intimacy while
reason for dating app use with the highest frequency was to “meet having concerns about abandonment; those with high attachment
others.” Three other popular reasons were self-esteem, sociability, and avoidance dislike physical intimacy while those low in both dimensions
sexuality. Again, because of the Internet's capability of vast communi- are typically securely attached and feel comfortable in a relationship.
cation, users found that dating apps provided another avenue to meet Thus, “anxious and avoidant attachments emerged as significant pre-
new people with whom friendships could be made, in addition to or dictors of reports of reasons to use dating apps,” where “people who
instead of, meeting people for romantic purposes. Self-esteem could be reported higher anxious attachment reported greater likelihood of dating
taken in two ways. One perception is that individuals with low app use,” and the higher the person's avoidant attachment, the less likely
self-esteem may wish to use a dating app due to the possibility that their they were to use dating apps (Chin et al., 2019). The potential reasons for
profile will receive positive reactions (i.e., many matches, many mes- the former finding have already been discussed. As for the latter, the
sages and likes). For those who fear rejection and/or have trouble reason lies in the theory that those with avoidant attachment tend to stay
meeting people physically, dating apps provide a unique mode of emotionally distant from others, including intimacy. Thus, it is possible
communication in that they are given the opportunity to become familiar that they have less motivation to use dating apps. It should be noted,
with strangers without having to meet them in person, thus taking away however, that this study was correlational and not causal. While it is
the pressure they may feel in physical social situations. This could also be plausible for an individual to use/not use a dating app based on a certain
seen as dating anxiety where people with high dating anxiety may be attachment orientation, it is also plausible for one's attachment orienta-
more likely to use dating apps because of the ease of communication tion to shift because of dating app use. Nevertheless, the impact that
(Sumter & Vandenbosch, 2019). In Chin et al. (2019), results showed attachment orientation on dating app use should be further examined by
people who were more anxious were more likely to use dating apps. future research.
Despite this common viewpoint, however, the same study's survey
showed those who were low in dating anxiety had a higher likelihood of 4.2. Dangers
using dating apps. In addition, those with high dating anxiety in the
Dating apps can also be used as a platform to engage in behaviors that
Table 4 would be considered as potentially dangerous, psychologically, by
Motivations of using dating apps. others. Table 5 presents some potential risks associated with dating apps
Motivations Definition Studies and the studies that highlighted them. Two potential dangers – deception
and geolocation – will now be explored.
Fun & Ease of To easily explore profiles & (Anzani et al., 2018; Chin,
Connectivity meet new people Edelstein, & Vernon, 2019; Due to the possibility of anonymity in the online world, many dating
Rosenfeld, Thomas, & Hausen, app users could find themselves communicating with a fabricated profile.
2019; Veel & Thylstrup, 2018; Even though many dating apps use links to other social media “as a
Yeo & Fung, 2018) warranting cue to hamper deception,” (Murphy, 2018) people can still
Eating Unhealthy eating behaviors (Calogero, 2012; Shimokobe and
Disorders to control online image Mirandab)
get away with hiding behind a fabricated online persona. Doing so causes
perception potential dangers for the victims to arise, such as coaxing them into
Sexuality To fill sexual gratification or (Blackwell, Birnholtz, & Abbott, sharing sensitive information or agreeing to meet FTF to discover too late
to meet others of the same 2015; Chan, 2018a, 2018b; Choi that they are someone completely different. Duncan and March (2019)
sexual orientation et al., 2016; Ferris & Duguay,
investigated whether gender, sadism, and the Dark Triad – Psychopathy
2019; Hahn et al., 2018; Sawyer
et al., 2018; Sevi, Aral, & (empathy deficits), Machiavellianism (cunning behavior to reach one's
Eskenazi, 2018; Solis & Wong, own goals), and Narcissism (exaggerated self-importance) – could predict
2019; Sumter & Vandenbosch, antisocial behaviors, like deception, on a dating app known as Tinder.
2019; Waldman; Wu & Ward, They believed that gender and the Dark Traid would predict significant
2018)
Self-esteem To feel a greater sense of (Anzani et al., 2018; Hallam,
variance in the perpetration of antisocial online behaviors. Results sug-
confidence from the Walrave, & Backer, 2018; gested that while gender was not a significant predictor of antisocial use
validation of others Shimokobe and Mirandab) (which goes against prior research that showed men were more likely to
Love To find a committed (Anzani et al., 2018; Chan, have antisocial behaviors; this could be due to the survey having an
relationship 2018a, 2018b; Sawyer et al.,
uneven balance of females and males), the four different psychological
2018; Solis & Wong, 2019)
Social To find social relationships/ (Franco, 2019, p. 91; Anzani traits were all significantly positive predictors of antisocial-general use.
friendships et al., 2018; Bivens & Hoque, The anonymity of the Internet may motivate people to participate in
2018; Chan, 2018a, 2018b; Chin antisocial behaviors by existing through any kind of online persona they
et al., 2019; Lauckner et al., desire, thus creating a separation between the online persona and one's
2019; Sawyer et al., 2018)
true self. Whether this type of separation exists could be a notable topic to

5
A. Phan et al. Computers in Human Behavior Reports 3 (2021) 100055

Table 5 following discussion will elaborate assess geolocation on the basis of


Risks associated with the use of dating apps. psychology. One study (Veel & Thylstrup, 2018) discussed geolocation
Risks Definition Studies from a cultural-theoretical viewpoint to help understand its flaws in the
world of dating apps. It looked to German sociologist, George Simmel,
Lies & Causing someone to accept a (Anzani et al., 2018; Ferris &
Deception false claim as the truth to reach Duguay, 2019; Henry & Powell, who saw the stranger as someone who may be a member of a group in
a certain goal with them 2018; Hu et al., 2020; Lauckner spatial, but not social, terms. This “familiar stranger,” as built upon by
et al., 2019; Markowitz & Stanley Milgram, is a person whom one recognizes regularly – the person
Hancock, 2018; Murphy, 2018; seen on the train every morning or a classmate in a weekly yoga session.
Shetty, Grispos, & Choo, 2020)
Sexual Risk Unsafe sexual behaviors (e.g., (Anzani et al., 2018; Choi et al.,
When an encounter occurs outside of that regular environment, the in-
bug chasing) 2016; Coor et al., 2016; Duncan dividuals who are “familiar strangers” are more likely to interact with
& March 2019; Hahn et al., one another instead of with complete strangers because their regular
2018; Sawyer et al., 2018; YSet spatial encounters are seen as something shared. This can be applied to
al, 2019)
dating apps that match users based on their physical proximity because it
Dangerous Those who cause physical & (Bivens & Hasinoff, 2018;
People psychological harm to others Carlson, 2019; Choi et al., 2018; contains the theory of the “familiar stranger” – in that a person within
purposefully Debnam & Kumodzi, 2019; one's temporal space will have some common ground and therefore be a
Eterovic-Soric et al., 2017; better match than someone outside of it. While this can give users a
Gillett, 2018; Henry & Powell, “reassuring sense of urgency” since it provides opportunities for romantic
2018; Lauckner et al., 2019;
Murphy, 2018; Scannell, 2019;
endeavors within physical proximity, there still exists a fine line between
Shetty et al., 2020; Stoicescu, the familiar stranger and someone who evolves into a stalker. Because
Matei, & Rughinis, 2019; Veel & stalking involves repeating ordinary routine behavior that then turns
Thylstrup, 2018) menacing toward the target, geolocation is a resembling attribute due to
Cyber Allowing one's personal (Atkinson, Mitchell, Rio, &
its spatio-temporal configuration that emphasizes repetition as a
information to potentially be Matich, 2018; Cahyani, Choo,
accessed without permission Ab Rahman, & Ashman, 2019; matching criterion. The trouble then lies in the concept of the familiar
Choo, Farnden, & Martini, 2015; stranger. If perceived as a potential romantic partner with whom there is
Kim, Kim, Lee, Kim, & Kim, a common ground, a prospective stalker may see no restriction in their
2018; Mata, Beebe, & Choo, attempt to become intimate with and gain knowledge about the target;
2018; Murphy, 2018; Shetty
the repetitive nature geolocation can possess in dating apps may cause
et al., 2020; Waldman)
Harassment Repeatedly attacking another (Franco, 2019, p. 91; Bivens & that person to view the other as someone they must interact with by
person to make them feel Hasinoff, 2018; Bivens & whatever means possible, even if those means evolve into dangerous or
aggressive pressure or Hoque, 2018; Carlson, 2019; inappropriate endeavors.
intimidation Chan, 2018a, 2018b; Duncan &
March 2019; Gillett, 2018;
Henry & Powell, 2018; 4.3. Minority groups
Lauckner et al., 2019; Murphy,
2018; Scannell, 2019; As previously discussed, understanding the effect of dating apps on
Waldman) minority groups is an understudied area. For example, the experiences of
minority groups with regard to online dating may be unique to their
explore as individuals' online presences become more prominent in the characteristic(s), whether that be sexual orientation, lifestyle, or
modern age. Continuing in the world of deception, Markowitz and ethnicity. Even though one may think that the rise of online dating would
Hancock (2018) evaluated the frequency of this act in exchanged mes- offer the benefit of being able to expand one's knowledge about various
sages between dating app users; specifically, when lies occurred during types of individuals and lifestyles, users may still have negative experi-
the three important periods in an online dating relationship: 1) the ences that reflect common stereotypes. Three groups will now be dis-
profile stage where users try to give their best presentation through their cussed to further explain those experiences – users in rural communities,
profile; 2) the matching stage that shows which users are compatible women, and those in the LGBTQ þ community.
with whom; and, 2) the discovery stage when two matches have estab-
lished mutual interest and begin communicating. Deception does not 4.3.1. Rural communities
necessarily stop after the user creates their profile, but may continue into There is little research on dating app experiences within rural com-
the communicating process in order to “fulfill certain impression man- munities despite the constant expansion of technologies. This is, perhaps,
agement goals.” The authors categorized messages in three ways, due to the fact that most dating apps use location as a key feature to
namely: self-presentation lies, butler lies (messages for availability perform matching and the population of dating app users in rural areas is
management), and other. One key finding was that nearly two-thirds of likely to be (significantly) lower. A follow-up question would then be
deceptive messages involved self-presentation and butler lies, where the whether or not online dating experiences would differ between those
latter took up 30%. The less a user liked their partner, the more likely living in and out of urban areas, as well as those from a different culture
they were to give a butler lie to appear unavailable. As for or ethnicity. For example, Carlson (2019) looked at the experiences of
self-presentation lies, messages confirmed that users often lied to amplify Indigenous Australians. It was found that Indigenous people struggle
their attractiveness. Another finding was that more lies were created at between the public and private self due to expectations from family,
the start of the interaction than the end, but the magnitude of lies community, and the workplace, which at times results in strategic out-
remained similar for both periods. Despite these deceptive behaviors that ness – a process where people assess certain social situations before
evidently exist in dating app communications, participants of another deciding what to disclose. For example, a gay Aboriginal man said he had
study (Lauckner et al., 2019) felt that they were simply a part of the not come out as gay on Facebook, but regularly used Grindr to meet other
dating app experience. This could be interpreted as a growing mindset gay men. He reportedly saw Facebook as his public self and Grindr as his
that inappropriate behaviors like deception should be expected and/or private self.
accepted in the world of online dating. Such an interpretation should not Other gay Indigenous men in the study revealed that they have been
be ignored by future research. subject to racism on dating apps, specifically sexual racism where sexual
The second danger to explore revolves around geolocation, a feature preference is based on racial exclusion. This could include profiles
already discussed as a facilitator for crimes such as stalking. The explicitly saying which ethnicity they did not desire or being sent racist
messages simply based on profiles (Lauckner et al., 2019). While chatting

6
A. Phan et al. Computers in Human Behavior Reports 3 (2021) 100055

with a potential partner, one participant was sent a racial comment about Internet platforms, there is also the potential for female users on dating
Aboriginal people and after taking offense, “was then sent a barrage of apps to experience hostile interactions and/or online harassment, such as
texts similar” to the first. Similar to these participants, eight Aboriginal inappropriate images, offensive messages or threats. Women in another
women in the study revealed that they received numerous Tinder mes- study reported making changes to their lives because of the aggressive
sages with “sinister undertones” for sexual violence once they disclosed messages received (Franco, 2019, p. 91). Occurrences like this show that
themselves as Aboriginal. dating experiences in the real and online world have continued to be
Having to maintain one's online profile in order to avoid possible similar in their negativity where men “simply feel more comfortable with
penalties from the other romantic party is something Indigenous people making women less comfortable” (Franco, 2019, p. 91). Currently, it is
are familiar with, coming from remote areas, having to navigate unfa- unclear if women's experiences of intimate intrusions through dating
miliar cultural landscapes while keeping aware of the perceptions of both apps are more similar to dating abuse or sexual harassment and it may be
sides. the case that the two behaviors overlap (Gillett, 2018). What this high-
lights is the still-present ambiguity in the different relationships when it
4.3.2. Women comes to the mistreatment of females; many do not even report sexual
A popular dating app known as the “first feminist dating app,” harassment as the commonality of it makes them think it is part of the
Bumble, was studied (Bivens & Hoque, 2018) to analyze the intersections everyday experience. Because of the lack of insight on women's experi-
between gender, sex, and sexuality on dating apps. It was noted that in ences with intimate intrusions through dating apps, there are some
2015, there were one million users on the app and that by 2017, it had questions to consider in order to move forward: how do women under-
increased to 18 million. The MeToo movement was mentioned as a stand intimate intrusions and what do they do in response? What is the
possible trigger for this rise in female users “who were tired of being impact of intimate intrusions and how do online platforms address the
spammed with annoying messages” – females who wanted to experience abuse that can take place?
something other than the traditional heterosexual romantic occurrences.
However, what Bivens and Hoque (2018) found was that the logic of 4.3.3. LGBTQþ
Bumble was perhaps more restricting than what the creators intended – a There is a growing number of dating apps that have specific de-
dating app that allowed women to take the lead in communicating with mographics in mind, one of them being the LGBTQ þ community. It was
potential partners. Its logic “relies on policing the male body as if it al- found that, in a pool of 541 respondents for one study, there were more
ways exists in an intrinsically brusque and brash state of being,” only able non-heterosexual dating app users than their counterparts (Sumter &
to act in a savage form of masculinity. This assumes that a male seeking Vandenbosch, 2019). In Texas alone in 2019, there's a LGBTQ þ popu-
potential partners will by nature act “uncivil” and will be unable to lation estimate of 500,000 to 1.4 million with neighboring states con-
behave in any other way, thus creating a clearly narrow “construction of taining 50,000 to 199,000 (lgbtmap.org). As the community grows larger
masculinity.” In the same breath, the female user is seen as naturally and meets more attention in society, so does the amount of research
more genteel. The issue with this construction is that despite the app's interested in how individuals of this group interact and are affected by
goal of breaking down the gender stereotypes often seen in the dating dating apps. Interviewees who used Grindr (Blackwell et al., 2015)
world, they are still evident in the way Bumble perceives each gender's viewed the platform as a virtual place where they were co-situated with
natural behavior. A female user stated that after sending the first message similar people, “like having a gay bar in my pocket.” There are two
to a male, the control was taken right back by him. reasons for this. One is that in cities where there are few or no physical
What Bumble and other “feminist” dating apps are trying to accom- spaces for gay, trans, and bisexual men to meet, apps like Grindr can
plish lies in the perspective of techno feminism, which sees technology as provide those spaces and allow users to interact as similarly as they
something that co-evolves with gender relations. Chan (2018a, 2018b) would if in a physical space. The other reason lies in the possibility that
looked at this perspective through the experiences of heterosexual an individual who has not “come out” yet publicly would still be able to
women in China. The significance in dating app use for the interviewed express their sexuality on the app. This reason is one more unique to
women included the following. Because they felt the education system in LGBTQ-targeted apps than those that do not necessarily target this de-
China provided little for its citizens to think about intimacy or sexuality, mographic. In the States, 46% of LGBTQ þ individuals remain closeted in
dating apps gave an environment where they could do further explora- the workplace for reasons such as not wanting to be stereotyped or
tion and come to their own conclusion about the relationship between worrying if doing so would cause the loss of relationships with
sex and love. Dating apps also made it easier to expand their relationship co-workers (Paul). 53% of LGBTQ þ employees have reported hearing
pool, a feature that has been explained before. The apps also provided jokes made about their community when working. It is evident that there
women with new social avenues. Many saw it as a third place between are still spaces where LGBTQ þ people either feel uncomfortable to
home and the workplace where social interactions could occur; many reveal their identity or have to gauge whether it is LGBT-friendly first.
informants even felt that their social lives were on dating apps. Because Again, apps like Grindr give individuals opportunities to explore their
they have people from all walks of life, they also felt that they could learn sexuality and interact with others similar to them while still allowing
and explore new experiences. Despite these benefits, there is still stigma them to keep it private in their physical environments; being able to meet
against using a dating app in China that could even hurt a person's “someone who is also gay, also about the same age … also looking for the
reputation. Some informants had first-hand negative judgements for same thing you're looking for, just seems less likely to hurt you than
using dating apps and to earn approval, would have to prove their someone else who does not share the same personal narrative”
innocence by doing something like deleting the app in front of the other (Waldman).
person. Another challenge the informants experienced was handling One aspect that many users of Grindr (can be applicable to other
sexual harassment. All of them reported being asked for hook-ups, which LGBTQ-targeted apps too) have discussed is the prioritization/emphasis
reflects the public impression that dating apps are mainly used for sexual on the physicality of users. Like other dating apps, profile pictures are the
meetings. To combat these sometimes unwanted efforts, the informants first things seen by users searching for matches. Depending on what is
would either explicitly say in their profiles that they did not desire shown in those pictures, such as one's face versus a certain body part,
hookups or report harassment within the app. One participant felt she different cues on the user's intentions will be interpreted. For example,
had more power as a female dating app user than as an employee because one interviewee (Blackwell et al., 2015) said that in order to convey that
of her ability to report harassment and then see the profile get deleted. he was looking for more social interactions than casual sex, his profile
Gillett (2018) states that “little is known to date about women's picture contained his face instead of a torso “because that may be taken
everyday lived experiences of intimate intrusions facilitated through as looking for sex.” The opposite was also evident as another individual,
dating apps.” Where there is the issue of “gendered cyberhate” on various through his profile pictures, made it explicit that he was on the app for

7
A. Phan et al. Computers in Human Behavior Reports 3 (2021) 100055

sexual encounters. The emphasis on how a person looks physically in addition, biomedical prevention strategies now complicate fantasy
dating apps could lead to the issue of racism. Waldman (Waldman) saw versus reality, in that bug chasers can ‘play out their fantasies while
that multiple users have seen profiles stating ethnicities that were not remaining safe from HIV’ (García-Iglesias, 2019). Overall, dating apps
desired and that even after reporting them, would not see those profiles allow MSM to share their HIV status, which may be a strategy for
get taken down. A platform that does not enforce ways to give users a reducing HIV risk. However, it can also facilitate risky sexual behaviors,
safer environment and/or ignore those who do not feel safe potentially such as bug chasing.
allows for other offensive behaviors to arise. This could be seen as a So far, only apps like Grindr, which specifically target the LGBTQ þ
particularly significant issue for the LGBTQ þ community since, as community, have been mentioned. One study, however, wanted to see
mentioned earlier, many join LGBTQ-targeted apps to meet people with the experiences of women in this community on the Tinder app (Ferris &
whom they can relate and thus feel more comfortable with. Duguay, 2019). Despite Tinder's ability to switch sexual preferences so
Another issue deriving from this emphasis on physicality is noncon- that only those who also had those preferences would show up, partici-
sensual or revenge pornography. 15% of LGB users have been affected by pants still reported the opposite sex showing up. In this case, women
this act compared to the 4% of general US internet users (Waldman). seeking women (WSW) said that men and heterosexual women still
With this in mind, is it possible that MSM dating app users are more showed up in a space thought to only allow other WSWs. Some believed
frequently threatened with or victimized by non-consensual image that these profiles switched their sexual preferences to do things such as
sharing than the general population? Waldman (Waldman) discovered sway the potential partner's mind, act deceptively, or suggest unwanted
that 14.5% of the 917 participants reported someone on a dating app had sexual acts. These intrusions caused participants to not see Tinder as a
made public their intimate images without consent and that more than queer women-friendly space. Another problem found was that the lesbian
68% cared if their images were shared with others. There was a senti- digital imaginary that many saw within Tinder, such as the expectation
ment made by many that someone sharing photos of his attractive that users would make static claims about their sexual identity or their
physique would not have a problem if those photos spread beyond his stereotype-filled references to LGBTQ þ culture, made users feel as if
knowledge. 82.6% agreed that sharing photos is a necessary part of the their identities were stigmatized. Within dating apps – that do not
process of meeting people on apps like Grindr. The “lax approach” – as necessarily target a certain demographic while still allowing for speci-
said by one participant – when it comes to sharing intimate images in the ficity of a sexual preference – exists ‘conventional and stereotypical pre-
gay community suggests “that some gay men … on dating apps do not sentations of sexual identity’ that restrict not only those who may still be
understand the privacy invasions inherent in sharing graphic images figuring out their sexual identity, but also LGBTQ þ users to feel the need
without consent.” Knowing this, future research could attempt at finding to present themselves along those stereotypes in order to feel recognized
if comparisons exist in the culture and interactions between dating apps in their community.
that target LGBTQ þ individuals and their heterosexual counterparts.
Another potential solution, as suggested by Brandtzaeg, Pultier and Moen 5. Digital breadcrumbs
(2019), is to adopt privacy-by-design, where users have to opt-in to share
data with the app provider and any third-party entity. When creating an account on a dating app, personal information (e.g.,
Finally, dating apps, like Grindr, provide an opportunity for MSM to date of birth, age, lifestyle, sexual preferences, and profile picture) needs
engage in serosorting (Newcomb, Mongrella, Weis, McMillen, & Mus- to be provided so that the app can find the most preferable/most-fitting
tanski, 1999). Serosorting is the selection of sexual partners based on the matches for the user thereby providing an opportunity to communicate
individual and his partner's HIV status (Parsons et al., 2005, 2006), for with others. For example, (private) data stored in the app could also be
there are a number of HIV biomedical prevention strategies, including recovered when one has access to the mobile device the app was installed
antiretroviral therapy (ART), pre-exposure prophylaxis (PrEP), and on. Given the number of dating app users steadily increasing, it is also
post-exposure prophylaxis (PEP). According to Newcomb et al. (1999), it important to explore and understand the security and data risks associ-
is not uncommon for MSM to disclose their use of biomedical prevention ated with dating apps, as well as the potential digital artifacts that could
strategies on dating apps. In Newcomb et al.‘s study, the majority of MSM be acquired from the forensic analysis of a dating app or the device. For
who made these disclosures specifically requested to have condomless example, Cahyani et al. (2019) suggested that in order to begin a digital
anal sex (CAS). Newcomb et al. (1999) concluded ‘dating apps may provide investigation process, some of the following questions should be asked in
a more efficient and less stigmatizing environment in which HIV-positive MSM regards to who, what, when, where, and how.
can disclose their status and seek partners to whom transmission is less likely’
due to their use of biomedical prevention strategies. However, a meta  Who is the user?
analysis by Purcell et al. (Purcell, Higa, Mizuno, & Lyles, 2017) suggests  Who is the partner and/or potential partners?
that although serosorting may be a strategy for reducing HIV risk when  What online dating activities were conducted?
condoms are not consistently used, for HIV-negative MSM who consis-  When were they conducted?
tently use condoms, the switch to serosorting is more risky. Future  How can artifacts be extracted from mobile devices where the apps
research should continue to explore the role of serosorting on dating apps were installed?
for men seeking sex with men.
Although dating apps provide a mechanism for disclosure of HIV Using these questions as a guide, the following section will look at the
status, and subsequent serosorting, it may also lend itself to a type of mobile artifacts/information that can be found when using dating apps
fetish referred to as bug chasing. Bug chasers “fetishize semen from an while also providing some recommendations on mobile security.
HIV-positive man and wish to be infected by it” (Jaspal, 2019). In other
words, the HIV-negative man seeks to have unprotected sex with an 5.1. Digital artifacts
HIV-positive man with the primary motivation being HIV infection (Díaz
et al., 2019). Research suggests only a small minority of MSM are bug To secure the sensitive data often associated with using dating apps,
chasers (García-Iglesias, 2019); however, the exact prevalence is difficult developers rely on various protocols, such as SSL, PKI, or TLS, to encrypt
to determine for several reasons (Jaspal, 2019). First, it is illegal in some communication. However, the use of these protocols does not necessarily
countries to deliberately infect a person with HIV (i.e., the person who guarantee against data leakage. For example, an attacker can exploit
infects the bugchaser is referred to as the gift giver). Second, it is vulnerabilities (e.g., technical flaws) either in protocols or their imple-
considered a stigmatized sexual behavior (Jaspal, 2019). However, mentations to bypass the security measures and hijack the communica-
Garcia-Iglesias (2019) argues that bug chasers do not necessarily exhibit tions, as we have previously demonstrated (Shetty et al., 2020; D'Orazio
a fixed identity, but instead, their fetish can be ‘fluid and evolving’. In & Choo, 2017).

8
A. Phan et al. Computers in Human Behavior Reports 3 (2021) 100055

Generally, a dating app is considered insecure if any of the three CIA a user to have fake GPS coordinates multiple times, create new distances
aspects (i.e., confidentiality, integrity, and availability) are violated from the target, and draw out the radii at the fake coordinates. Besides
(Shetty et al., 2020; D'Orazio & Choo, 2017). Confidentiality is the GPS coordinates, other personal data found included the following.
compromised when an user gains unauthorized access to someone's Within the mobile device's memory, user information such as real name,
personal information; Integrity is compromised when a user changes gender, and email could be obtained. In one database file named “asso-
someone's information; Availability is compromised when a user is able ciated_person,” there were matches to the user. The database previously
to deny access to someone's information. To test these aspects, Shetty mentioned – db_app.db – contained various information on other users,
et al. (2020) examined seven popular dating apps, including Tinder and including profile descriptions, sexual orientation and desires.
Happn (both of which utilize the geolocation feature), and created victim In addition to dating apps that have specific demographics like Feeld,
dating app accounts, and an “evil” wireless access point that would be Cahyani et al. (2019) forensically analyzed 28 other dating apps and
able to intercept traffic between the mobile devices. If a dating app is found that apps such as MyCupid, Happn, and SayHi contained messages
secure, that traffic should remain encrypted and unusable. For the apps, between users that can be obtained using a mobile forensic tool. From
Tinder, Happn, Badoo, and MeetMe, confidentiality, integrity, and many of the apps, including Jack'd and Amores Possiveis, photos that had
availability were able to be compromised. Profile images, chat messages, been sent between users could be found with the latter app even
Facebook profile information, and credentials that many users attach to providing the ID of the device that took the picture(s). This should be
the dating app were some of the artifacts found in the network trans- highlighted as this artifact gives an adversary a piece of information that
actions that occur between mobile devices on a certain dating app. One is outside of the app, which could provide them with the opportunity to
noticeable data leak that these four apps contained relates to the user's find ways to not only target the user within the app, but also the user's
credentials. If a person uses their Facebook credentials to log into the device.
app, an intruder can either obtain those credentials or an authentication In another more recent work (Knox, Moghadam, Patrick, Phan, &
token. An authentication token is used by many apps to allow a user to Choo, 2020), Knox et al. studied two recent Android and three recent iOS
bypass the login process after the first login. If an intruder knows the versions of the Happn dating app. Unlike most other dating apps, this app
token value, they are able to use it to login as the user to whom the token allows users to track other users who had previously crossed paths and
belongs. For example, the authors were able to intercept and store the view these users’ information (e.g., profile, pictures or other
victim's Facebook authentication token. After creating a fake Tinder user-uploaded information). Using both freely available and commercial
profile, they intercepted another network packet containing the fake forensic tools, we were able to recover a broad range of digital artifacts
profile's token and then replaced it with the victim's. This gave the from the devices that had the apps installed.
intruder complete access to that person's profile. Table 6 summarizes the types of digital artifacts found within each
There are some dating apps that target a specific demographic in reviewed study.
terms of sexual lifestyle or orientation. Mata et al. (2018) analyzed the In addition to the digital artifacts that could be recovered from the
Feeld app, which targets users who seek unconventional sexual lifestyles user's devices (e.g., Android and iOS devices), data about the users are
through either sexuality or behaviors. This type of app deserves attention also available via the app developers and platforms. One such risk, as
because of the highly personal information a user would need to input. A described in Table 5, is the unauthorized access of user data (e.g., sexual
dating app is unique in that while the information is often intimate, users’ orientation, preferred sexual positions, HIV status, and geolocation in-
profiles are public. One scenario of risk to consider is that if an individual formation). For example, app developers or platforms may be compelled
of high status or position is also a user of an app, such as Feeld – what to monitor, search, or hand over data of national security interest to
would the consequences be if someone was able to gain access to their foreign government agencies. Such data could then be used to facilitate
intimate information and communications? Through the network activ- honey trap operations. Due to such concerns, a Chinese company was
ity and prediction of app activity, one study was able to identify one such reportedly required by the Committee on Foreign Investment in the
dating app user as most likely wealthy, gay, male, and a sufferer of United States (CFIUS) to sell its stake in Grindr (reuters.com;
anxiety (Atkinson et al., 2018). washingtonpost.com).
To see which artifacts could be obtained from Feeld, we created two Despite the security standards put into place by both dating and all
profiles that would then match and communicate with one another. From other app developers, it is clear that data/privacy leakage remains an
the network traffic alone, the users' GPS coordinates could be found. With ongoing concern (Barrett, 2018; Jozani, Ayaburi, Ko, & Choo, 2020; Li
these coordinates, a process known as trilateration was attempted to see et al., 2014; Lutz & Ranzini, 2017; Pentina, Zhang, Bata, & Chen, 2016;
if it was feasible to get an accurate location of another user. The distance Reardon et al., 2019). To combat this, there are security and
from a targeted user could be found from the app's database file – privacy-preserving countermeasures that developers can incorporate to
db_app.db. In some dating apps, it is even contained in the packets sent achieve enhanced security and privacy for their users, including solutions
from device to server (Kim et al., 2018). This would be used as the radius designed for other geolocation-based services (Argyros, Petsios, Siva-
at the current location of the “adversary.” If the adversary obtains 3þ korn, Keromytis, & Polakis, 2017; Shen, Zhou, Cao, Dong, & Choo, 2020;
distances between their coordinates and the target's, an accurate location Zhang, Mao, Choo, Peng, & Wang, 2020).
can be found (Kim et al., 2018). This can be done by using tools that allow

Table 6
Digital artifacts that could potentially be acquired during dating app forensics.
Artifact Types

Messages Images Location Credentials Authentication Token Personal Information Matches Matches' Information

Studies Shetty et al. (2020) ✓ ✓ ✓ ✓ ✓ ✓ ✓


Atkinson et al. (2018) ✓
Cahyani et al. (2019) ✓ ✓ ✓ ✓ ✓
Choo et al. (2015) ✓ ✓ ✓ ✓
Kim et al. (2018) ✓ ✓ ✓ ✓
Mata et al. (2018) ✓ ✓ ✓ ✓ ✓ ✓
Knox et al. (2020) ✓ ✓ ✓ ✓ ✓ ✓ ✓

9
A. Phan et al. Computers in Human Behavior Reports 3 (2021) 100055

6. Conclusion and future research literature relating to dating apps and identify potential gaps.

As the popularity of dating apps continues to grow, it is important to


also understand the potential risks associated with the use of such apps. Declaration of competing interest
Potential crimes, such as stalking, fraud, and sexual abuse, could affect a
user for example in terms of physiological effects (e.g., sexual diseases or The authors declare that they have no known competing financial
eating disorders) and psychological effects (e.g., emotional abuse or interests or personal relationships that could have appeared to influence
injury to self-esteem). In this study, we focused only on the dating app the work reported in this paper.
literature published in English. However, there is a risk that the study
may ‘lose sight of the cultural specificities of Internet use’ (or in the context of References
our paper, dating app usage), as explained by Dhoest and Szulc (2016).
Hence, a potential future research agenda is to extend the literature re- Albury, K., & Byron, P. (2014). Queering sexting and sexualisation. Media International
view to include articles published in other languages (e.g., Chinese - Australia, 153(1), 138–147.
Albury, K., Burgess, J., Light, B., Race, K., & Wilken, R. (2017). Data cultures of mobile
Mandarin, Spanish, Russian, Arabic, and French), and study potential dating and hook-up apps: Emerging issues for critical social science research. Big Data
cultural aspects associated with dating app usage. & Society, 4(2), 2053951717720950.
While there are existing best practices and mitigation strategies that Anderson, M., Vogels, E. A., & Turner, E. (2020). The virtues and downsides of online dating.
https://www.pewresearch.org/internet/2020/02/06/the-virtues-and-downsides-of-
dating app developers can utilize to create safer platforms for their users online-dating/.
physically and online, there is also a need for future research to inves- Anzani, A., Di Sarno, M., & Prunas, A. (2018). Using smartphone apps to find sexual
tigate other possible solutions and whether the dangers explored are partners: A review of the literature. Sexologies, 27(3). e61–e65.
Argyros, G., Petsios, T., Sivakorn, S., Keromytis, A. D., & Polakis, J. (2017). Evaluating the
correlational or truly caused by dating app usage. In addition, one of the privacy guarantees of location proximity services. ACM Transactions on Privacy and
challenges faced by dating app researchers is the fast-paced technological Security (TOPS), 19(4), 1–31.
landscape (e.g., app features). Wang (2020), for example, noted that the Atkinson, J. S., Mitchell, J. E., Rio, M., & Matich, G. (2018). Your wifi is leaking: What do
your mobile apps gossip about you? Future Generation Computer Systems, 80, 546–557.
Chinese gay dating platform
Ayalon, O., & Toch, E. (2019). Evaluating users' perceptions about a system's privacy:
Differentiating social and institutional aspects. In Fifteenth symposium on useable
Blued has evolved from a single-feature location-based dating app into a privacy and security. {SOUPS} 2019.
multipurpose digital platform that includes newsfeeds, live streaming, Azzahro, F., Hidayanto, A. N., Maulida, R. M., Zhu, Y., & Sandhyaduhita, P. I. (2018).
gaming, online shopping, and overseas surrogacy consulting [and this] Exploring the influential factors in continuance usage of online dating apps:
Gratification, subjective well-being and self-disclosure. In M. Hirano, M. D. Myers,
process of adding new features to the basic dating structure [is referred to] K. Kijima, M. Tanabu, & D. Senoo (Eds.), 22nd Pacific Asia conference on information
as ‘functionality imbrication’ (gongneng diedai). This means that new systems, PACIS 2018, Yokohama, Japan (p. 322). June 26-30, 2018.
functionalities overlap rather than replace old ones, so as to cater for Barrett, L. (2018). Confiding in con men: Us privacy law, the gdpr, and information
fiduciaries. Seattle UL Rev, 42, 1057.
multisided markets.
Birchall, C. (2016). Shareveillance: Subjectivity between open and closed data. Big Data &
Society, 3(2), 2053951716663965.
Any supplemental features or functionalities introduced by the dating Birchall, C. (2017). Shareveillance: The dangers of openly sharing and covertly collecting data.
platform could have legal, security, and privacy implications. U of Minnesota Press.
In addition, there are potential ethical issues involving the collection, Bivens, R., & Hasinoff, A. A. (2018). Rape: Is there an app for that? An empirical analysis
of the features of anti-rape apps. Information, Communication & Society, 21(8),
mining, and sharing of data from dating apps (Vitak, Shilton, & Ashk-
1050–1067.
torab, 2016; Woodfield & Iphofen, 2017, pp. 1–12). For example, insti- Bivens, R., & Hoque, A. S. (2018). Programming sex, gender, and sexuality: Infrastructural
tutional review board (IRB) approval is generally required for studies failures in the ‘feminist’ dating app bumble. Canadian Journal of Communication,
43(3), 441–459.
that involve the interviewing of or collection of data from dating app
Blackwell, C., Birnholtz, J., & Abbott, C. (2015). Seeing and being seen: Co-situation and
participants, such as in the study of Pond and Farvid (2017). However, do impression formation using grindr, a location-aware gay dating app. New Media &
researchers need IRB approval if they design tools to automatically crawl Society, 17(7), 1117–1136.
and scrape data from these dating services (e.g., the OKCupid dataset Blanch, J. L., & Hsu, W. L. (2016). An introduction to violent crime on the internet. Cyber
Misbehavior, 64(2–11), 8.
obtained using a data scraper (Kirkegaard & Bjerrekær, 2016))? Such Boston, N. (2015). Libidinal cosmopolitanism, postcolonial transitions in Europe:
data can potentially be on a much larger scale, more revealing (including Contexts. Practices and Politics, 291.
PII), and most certainly obtained without the expressed consent of other Brandtzaeg, P. B., Pultier, A., & Moen, G. M. (2019). Losing control to data-hungry apps: A
mixed-methods approach to mobile app privacy. Social Science Computer Review,
app users. Birchall (2016, 2017), for example, coined this phenomenon 37(4), 466–488.
as ‘shareveillance’. Hence, how should ethical practices evolve in our Brennan, J. (2017). Cruising for cash: Prostitution on grindr. Discourse, Context & Media,
increasingly digitalized society? 17, 1–8.
Brooks, M. (2011). How has internet dating changed society? An insider's look ‘. Internet
In the foreseeable future, dating experience may also be augmented Dating Executive Alliance.
with other technologies (e.g., augmented reality or immersive reality) Buggs, S. G. (2019). Color, culture, or cousin? Multiracial americans and framing
and data from other devices such as devices on the users (e.g., smart lens boundaries in interracial relationships. Journal of Marriage and Family, 81(5),
1221–1236.
and smart clothing whose data collectively can be used to infer a user's
https://www.businessinsider.com/tinder-grindr-dating-apps-users-asking-matches-violat
lifestyle preference), devices in the users (e.g., embedded medical de- e-social-distancing-2020-5.
vices whose data can be used to infer a user's medical condition), and Cahyani, N. D. W., Choo, K. R., Ab Rahman, N. H., & Ashman, H. (2019). An evidence-
based forensic taxonomy of windows phone dating apps. Journal of Forensic Sciences,
devices in the user's physical proximity (e.g., data from other users' de-
64(1), 243–253.
vices may also be used to profile the user's physical movements and who Calogero, R. M. (2012). Objectification theory, self-objectification, and body image. In
the user interacts with and the nature of the interaction). This may result Encyclopedia of body image and human appearance. Elsevier.
in new security and privacy risks. Hence, it is also important to keep a Carlson, B. (2019). Love and hate at the cultural interface: Indigenous australians and
dating apps. Journal of Sociology, 1440783319833181.
watchful brief of existing and emerging security and privacy risks with Chakraborty, D. (2019). Components affecting intention to use online dating apps in
the aims of designing security and privacy best practices and mitigation India: A study conducted on smartphone users. Asia-Pacific Journal of Management
strategies. Research and Innovation, 15(3), 87–96.
Chan, L. S. (2018a). Ambivalence in networked intimacy: Observations from gay men
The constantly evolving technological landscape can also complicate using mobile dating apps. New Media & Society, 20(7), 2566–2581.
the drafting of new regulation and legislation (Hashemi & Hashemi, Chan, L. S. (2018b). Liberating or disciplining? A technofeminist analysis of the use of
2019; Mauer & Reppucci, 2019; Senator leyva introduces flash, 2020; dating apps among women in urban China, communication. Cultural Critique, 11(2),
298–314.
Waldman, 2019), which generally lag behind technologies. Hence, one Chin, K., Edelstein, R. S., & Vernon, P. A. (2019). Attached to dating apps: Attachment
potential future research agenda is to comprehensively review the legal orientations and preferences for dating apps. Mobile Media Communication, 7(1),
41–59.

10
A. Phan et al. Computers in Human Behavior Reports 3 (2021) 100055

Choi, E. P.-H., Wong, J. Y.-H., Lo, H. H.-M., Wong, W., Chio, J. H.-M., & Fong, D. Y.-T. Hu, Y., Wang, H., Zhou, Y., Guo, Y., Li, L., Luo, B., et al. (2020). Dating with scambots:
(2016). The impacts of using smartphone dating applications on sexual risk Understanding the ecosystem of fraudulent dating applications. IEEE Transactions on
behaviours in college students in Hong Kong. PLoS One, 11, 11. Dependable and Secure Computing.
Choi, E. P. H., Wong, J. Y. H., & Fong, D. Y. T. (2018). An emerging risk factor of sexual James, D., Condie, J., & Lean, G. (2019). Travel, tinder and gender in digitally mediated
abuse: The use of smartphone dating applications. Sex Abuse, 30(4), 343–366. tourism encounters. In The geographies of digital sexuality (pp. 49–68). Springer.
Choo, K. R., Farnden, J., & Martini, B. (2015). Privacy risks in mobile dating apps. In 21st Jaspal, R. (2019). The social psychology of gay men. Springer.
Americas conference on information systems, AMCIS 2015, Puerto Rico, August 13-15, J. R. Jordan, Police say these apps could be dangerous for children, Houston Chronicle 6
2015. Association for Information Systems. http://aisel.aisnet.org/amcis2015/ISSec (Aug). URL https://www.chron.com/news/houston-texas/houston/article/Police-sa
urity/GeneralPresentations/13. y-these-apps-could-be-dangerous-for-14285028.php.
Ciocca, G., Robilotta, A., Fontanesi, L., Sansone, A., D'Antuono, L., Limoncin, E., et al. Jozani, M., Ayaburi, E., Ko, M., & Choo, K.-K. R. (2020). Privacy concerns and benefits of
(2020). Sexological aspects related to tinder use: A comprehensive review of the engagement with social media-enabled apps: A privacy calculus perspective.
literature. Sexual Medicine Reviews. Computers in Human Behavior, 107. Article 106260.
Citron, D. K. (2014). Hate crimes in cyberspace. Harvard University Press. Kallis, R. B. (2020). Understanding the motivations for using tinder. Qualitative Research
Coor, A., Kachur, R., Friedman, A., Witbart, L., Habel, M. A., Bernstein, K., et al. (2016). Reports in Communication, 1–8.
Sexually transmitted disease, human immunodeficiency virus, and pregnancy testing Kamal, M., & Newman, W. J. (2016). Revenge pornography: Mental health implications
behaviors among internet and mobile dating application users and nonusers. Sexually and related legislation. Journal of the American Academy of Psychiatry & the Law
Transmitted Diseases, 46(8) (2019) e83–e85. Online, 44(3), 359–367.
http://www.cybercivilrights.org/revenge-porn-infographic/. Kim, K., Kim, T., Lee, S., Kim, S., & Kim, H. (2018). When harry met tinder: Security
D'Orazio, C. J., & Choo, K. R. (2017). A technique to circumvent SSL/TLS validations on analysis of dating apps on android. In Secure IT systems (pp. 454–467).
ios devices. Future Generation Computer Systems, 74, 366–374. Kirkegaard, E. O., & Bjerrekær, J. D. (2016). The okcupid dataset: A very large public
Debnam, K. J., & Kumodzi, T. (January 2019). Adolescent perceptions of an interactive dataset of dating site users. Open Differential Psychology, 46, 1–10.
mobile application to respond to teen dating violence. Journal of Interpersonal Kitchen, A. N. (2015). The need to criminalize revenge porn: How a law protecting
Violence. p. 0 886260518821455. victims can avoid running afoul of the first amendment. Chicago Kent Law Review, 90,
Dhoest, A., & Szulc, L. (2016). Navigating online selves: Social, cultural, and material 247.
contexts of social media use by diasporic gay men. Social Mediaþ Society, 2(4), Knox, S., Moghadam, S., Patrick, K., Phan, A., & Choo, K.-K. R. (2020). What's really
2056305116672485. ‘happening’? A forensic analysis of android and ios happn dating apps. Computers &
Díaz, Y. M. S., Orlando-Narv aez, S. A., & Ballester-Arnal, R. (2019). Risk behaviors for hiv Security, 101833.
infection. a review of emerging trends. Ci^encia & Saúde Coletiva, 24, 1417–1426. Kochuchakkalackal, G. K., & Reyes, M. E. S. (2020). An emerging mental health concern:
Douglas, D. M. (2016). Doxing: A conceptual analysis. Ethics and Information Technology, Risk factors, symptoms, and impact of internet gaming disorder. Journal of Technology
18(3), 199–210. in Behavioral Science, 5(1), 70–78.
Douglass, C. H., Wright, C. J., Davis, A. C., & Lim, M. S. (2018). Correlates of in-person Kraljic, S., & Ünver, Y. (2019). Revenge pornography as a new criminal offence in the
and technology-facilitated sexual harassment from an online survey among young slovenian criminal code. Compendium of Contemporary Legal Issues, 137.
australians. Sexual Health, 15(4), 361–365. Kulyk, O., Gerber, P., Marky, K., Beckmann, C., & Volkamer, M. (2018). Does this app
Duguay, S., Burgess, J., & Suzor, N. (2020). Queer women's experiences of patchwork respect my privacy? Design and evaluation of information materials supporting
platform governance on tinder, instagram, and vine. Convergence, 26(2), 237–252. privacy-related decisions of smartphone users. In NDSS symposium.
Duncan, Z., & March, E. (2019). Using tinder® to start a fire: Predicting antisocial use of Lauckner, C., Truszczynski, N., Lambert, D., Kottamasu, V., Meherally, S., Schipani-
tinder® with gender and the dark tetrad. Personality and Individual Differences, 145, McLaughlin, A. M., et al. (2019). ‘catfishing,’ cyberbullying, and coercion: An
9–14. exploration of the risks associated with dating app use among rural sexual minority
Dymock, A., & van Der Westhuizen, C. (2019). A dish served cold: Targeting revenge in males. Journal of Gay & Lesbian Mental Health, 23(3), 289–306.
revenge pornography. Legal Studies, 39(3), 361–377. http://www.lgbtmap.org//equality-maps/lgbt_populations.
Eskridge, M., et al. (2019). Falling in love with algorithmic compatibility in a digital Li, M., Zhu, H., Gao, Z., Chen, S., Yu, L., Hu, S., et al. (2014). All your location are belong
dating landscape: Sexually affective data, networked intimacy, and online gendered to us: Breaking mobile social networks for automated user location tracking. In
identity constructions. Journal of Research in Gender Studies, 9(2), 92–98. Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and
Eterovic-Soric, B., Choo, K.-K. R., Ashman, H., & Mubarak, S. (2017). Stalking the stalkers computing (pp. 43–52).
– detecting and deterring stalking behaviours using technology: A review. Computers Lutz, C., & Ranzini, G. (2017). Where dating meets data: Investigating social and
& Security, 70, 278–289. institutional privacy concerns on tinder. Social Mediaþ Society, 3(1),
https://www.fastcompany.com/90492617/how-covid-19-killed-hookup-culture-and- 2056305117697735.
saved-romance. Markowitz, D. M., & Hancock, J. T. (2018). Deception in mobile dating conversations.
Fehlbaum, A. E., & Bowden, K. (2020). Battling against demeaning and abusive selfie Journal of Communication, 68(3), 547–569.
sharing: Empowerment through activism after image abuse. In Young adult sexuality in Mata, N., Beebe, N., & Choo, K. R. (2018). Are your neighbors swingers or kinksters?
the digital age (pp. 30–53). IGI Global. Feeld app forensic analysis. In 17th IEEE international conference on trust, security and
Ferris, L., & Duguay, S. (July 2019). Tinder's lesbian digital imaginary: Investigating (im) privacy in computing and communications/12th IEEE international conference on big data
permeable boundaries of sexual identity on a popular dating app. New Media & science and engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3,
Society, 1461. 2018 (pp. 1433–1439). IEEE.
Franco, E. (2019). Swipe left, because it ain't right!: An ethnographic study on women's Mauer, V. A., & Reppucci, N. D. (2019). Legal and psychological approaches to
interpretations of negative responses on online dating apps. The American Papers. understanding and addressing teen dating violence. In Advances in psychology and law,
M. A. Franks, Drafting an effective’revenge porn’law: A guide for legislators, Available at: (pp. 277–317). Springer.
SSRN 2468823 (2015). Mayshak, R., King, R. M., Chandler, B., & Hannah, M. (2020). To swipe or not to swipe:
Freed, D., Palmer, J., Minchala, D., Levy, K., Ristenpart, T., & Dell, N. (2018). “a stalker's The dark tetrad and risks associated with mobile dating app use. Personality and
paradise” how intimate partner abusers exploit technology. In Proceedings of the 2018 Individual Differences, 163, 110099.
CHI conference on human factors in computing systems (pp. 1–13). Mich. Man allegedly used grindr app to lure and shoot 2 men because they were gay,
Gainsbury, S. M., Browne, M., & Rockloff, M. (2019). Identifying risky internet use: PEOPLE.com. [Online]. Available: [Accessed: 0 6 (Aug). URL https://people.com
Associating negative online experience with specific online behaviours. New Media & /crime/michigan-man-allegedly-used-grindr-app-lure-shoot-2-gay-men/.
Society, 21(6), 1232–1252. Moor, L., & Anderson, J. R. (2019). A systematic literature review of the relationship
García-Iglesias, J. (2019). Wanting hiv is ‘such a hot choice’: Exploring bugchasers' fluid between dark personality traits and antisocial online behaviours. Personality and
identities and online engagements. Deviant Behavior, 1–12. Individual Differences, 144, 40–55.
Gavin, J., Rees-Evans, D., & Brosnan, M. (2019). Shy geek, likes music, technology, and Murphy, A. (2018). Dating dangerously: Risks lurking within mobile dating apps. Catholic
gaming: An examination of autistic males’ online dating profiles. Cyberpsychology, University Journal of Law and Technology, 26(1), 100–126.
Behavior, and Social Networking, 22(5), 344–348. https://www.news.com.au/national/victoria/courts-law/tinder-rapist-wh
Gillett, R. (2018). Intimate intrusions online: Studying the normalisation of abuse in o-claimed-to-be-ex-sniper-jailed-for-over-12-years/news-story/824f10c8c84e1534c
dating apps. Women's Studies International Forum, 69, 212–219. 9b3a8f6259a8d0f#.ia9h9.
Hahn, H. A., You, D. S., Sferra, M., Hubbard, M., Thamotharan, S., & Fields, S. A. (2018). Newcomb, M. E., Mongrella, M. C., Weis, B., McMillen, S. J., & Mustanski, B. (1999).
Is it too soon to meet? Examining differences in geosocial networking app use and Partner disclosure of prep use and undetectable viral load on geosocial networking
sexual risk behavior of emerging adults. Sexuality & Culture, 22(1), 1–21. apps: Frequency of disclosure and decisions about condomless sex. Journal of Acquired
Hall, M., & Hearn, J. (2019). Revenge pornography and manhood acts: A discourse Immune Deficiency Syndromes, 71(2) (2016) 200.
analysis of perpetrators' accounts. Journal of Gender Studies, 28(2), 158–170. https://www.pbs.org/newshour/nation/coronavirus-has-changed-online-dating-heres-
Hallam, L., Walrave, M., & Backer, C. J. S. D. (2018). Information disclosure, trust and why-some-say-thats-a-good-thing.
health risks in online dating. In M. Walrave, J. V. Ouytsel, K. Ponnet, & J. R. Temple O'Keefe, M. (2005). Teen dating violence: A review of risk factors and prevention efforts.
(Eds.), Sexting: Motives and risk in online sexual self-presentation (pp. 19–38). Cham: National Electronic Network on violence against women, 1, 1–5.
Springer International Publishing. Parsons, J. T., Schrimshaw, E. W., Wolitski, R. J., Halkitis, P. N., Purcell, D. W., Hoff, C. C.,
Hashemi, N., & Hashemi, T. H. (2019). Don't let them fool ya: An examination of et al. (2005). Sexual harm reduction practices of hiv-seropositive gay and bisexual
regulation crowdfunding as a framework for federal protection against online dating men: Serosorting, strategic positioning, and withdrawal before ejaculation. AIDS, 19,
risks. USFL Rev, 53, 421. S13–S25.
Henry, N., & Powell, A. (2018). Technology-facilitated sexual violence: A literature Parsons, J. T., Severino, J., Nanin, J., Punzalan, J. C., von Sternberg, K., Missildine, W.,
review of empirical research. Trauma, Violence, & Abuse, 19(2), 195–208. et al. (2006). Positive, negative, unknown: Assumptions of hiv status among hiv-
positive men who have sex with men. AIDS Education and Prevention, 18(2), 139–149.

11
A. Phan et al. Computers in Human Behavior Reports 3 (2021) 100055

K. Paul, Nearly 50. Solis, R. J. C., & Wong, K. Y. J. (2019). To meet or not to meet? Measuring motivations
Pentina, I., Zhang, L., Bata, H., & Chen, Y. (2016). Exploring privacy paradox in and risks as predictors of outcomes in the use of mobile dating applications in China.
information-sensitive mobile app adoption: A cross-cultural comparison. Computers in Chinese Journal of Communication, 12(2), 204–223.
Human Behavior, 65, 409–419. https://www.statista.com/topics/2158/online-dating/.
https://people.com/crime/jury-convicts-man-tinder-strangled/. Stoicescu, M.-V., Matei, S., & Rughinis, R. (2019). Sharing and privacy in dating apps. In
Pond, T., & Farvid, P. (2017). I do like girls, i promise’: Young bisexual women's 22nd international conference on control systems and computer science (pp. 432–437).
experiences of using tinder. Psychology of Sexualities Review, 8(2), 6–24. (CSCS 2019).
Purcell, D. W., Higa, D., Mizuno, Y., & Lyles, C. (2017). Quantifying the harms and Sumter, S. R., & Vandenbosch, L. (2019). Dating gone mobile: Demographic and
benefits from serosorting among hiv-negative gay and bisexual men: A systematic personality-based correlates of using smartphone-based dating applications among
review and meta-analysis. AIDS and Behavior, 21(10), 2835–2843. emerging adults. New Media & Society, 21(3), 655–673.
Queiroz, A. A. F. L., de Sousa, A. F. L., Brignol, S., Araújo, T. M. E., & Reis, R. K. (2019). Veel, K., & Thylstrup, N. B. (2018). Geolocating the stranger: The mapping of uncertainty
Vulnerability to hiv among older men who have sex with men users of dating apps in as a configuration of matching and warranting techniques in dating apps. Journal of
Brazil. Brazilian Journal of Infectious Diseases, 23(5), 298–306. Aesthetics & Culture, 10(3), 43–52.
 Wijesekera, P., On, A. E. B., Vallina-Rodriguez, N., & Egelman, S.
Reardon, J., Feal, A., Vitak, J., Shilton, K., & Ashktorab, Z. (2016). Beyond the belmont principles: Ethical
(2019). 50 ways to leak your data: An exploration of apps' circumvention of the challenges, practices, and beliefs in the online data research community. In
android permissions system. In 28th USENIX security symposium, USENIX security Proceedings of the 19th ACM conference on computer-supported cooperative work & social
2019, Santa Clara, CA, USA, August 14-16, 2019 (pp. 603–620). USENIX Association. computing (pp. 941–953).
https://www.refinery29.com/en-gb/2019/04/229777/crimes-involving-dating-apps. Vorobjovas-Pinta, O., & Dalla-Fontana, I. J. (2019). The strange case of dating apps at a
https://www.reuters.com/article/us-grindr-m-a-beijingkunlun/chinas-kunlun-tech- gay resort: Hyper-local and virtual-physical leisure. Tourism Review.
agrees-to-u-s-demand-to-sell-grindr-gay-dating-app-idUSKCN1SJ28N. A. E. Waldman, Law, privacy, and online dating: ‘revenge porn’ in gay online
Riggs, R. E., & Punyanunt-Carter, N. M. (2020). Young adult use of sexting. In Young adult communities, in: Law & social inquiry, undefined/ed, pp. 1–32.
sexuality in the digital age (pp. 1–12). IGI Global. Waldman, A. E. (2019). Law, privacy, and online dating:”revenge porn” in gay online
Rosenfeld, M. J., Thomas, R. J., & Hausen, S. (2019). Disintermediating your friends: How communities. Law & Social Inquiry, 44(4), 987–1018.
online dating in the United States displaces other ways of meeting. Proceedings of the Walrave, M., Ponnet, K., Van Ouytsel, J., Van Gool, E., Heirman, W., & Verbeek, A.
National Academy of Sciences, 116(36), 17753–17758. (2015). Whether or not to engage in sexting: Explaining adolescent sexting behaviour
Sawyer, A. N., Smith, E. R., & Benotsch, E. G. (2018). Dating application use and sexual by applying the prototype willingness model. Telematics and Informatics, 32(4),
risk behavior among young adults. Sexuality Research and Social Policy, 15(2), 796–808.
183–191. Wang, S., et al. (2019). Living with censorship the political economy and cultural politics
Scannell, M. J. (2019). Online dating and the risk of sexual assault to college students. of Chinese gay dating apps. Sociological Review, 64(3), 495–514.
Building Healthy Academic Communities Journal, 3(1), 34–43. Wang, S. (2020). Chinese affective platform economies: Dating, live streaming, and
Schreurs, L., Sumter, S. R., & Vandenbosch, L. (2020). A prototype willingness approach performative labor on blued, media. Culture & Society, 42(4), 502–520.
to the relation between geo-social dating apps and willingness to sext with dating app https://www.washingtonpost.com/politics/2019/04/03/why-is-us-is-forcing-chinese-co
matches. Archives of Sexual Behavior, 1–13. mpany-sell-gay-dating-app-grindr/.
Senator leyva introduces flash. (2020). Senator leyva introduces flash act to ban sending Wexler, C. (2018). The changing nature of crime and criminal investigations, Critical Issues in
unsolicited lewd pictures and videos. https://sd20.senate.ca.gov/news/2020-02-20-s Policing Series.
enator-leyva-introduces-flash-act-ban-sending-unsolicited-lewd-pictures-and-videos. Woodfield, K., & Iphofen, R. (2017). Introduction to volume 2: The ethics of online research.
Sevi, B., Aral, T., & Eskenazi, T. (2018). Exploring the hook-up app: Low sexual disgust Bingley: Emerald Publishing Limited.
and high sociosexuality predict motivation to use tinder for casual sex. Personality and Wu, S., & Ward, J. (2019). Looking for “interesting people”: Chinese gay men's
Individual Differences, 133, 17–20. exploration of relationship development on dating apps. Mobile Media &
Shen, H., Zhou, J., Cao, Z., Dong, X., & Choo, K.-K. R. (2020). Blockchain-based Communication, 2050157919888558.
lightweight certificate authority for efficient privacy-preserving location-based Wu, S., & Ward, J. (2018). The mediation of gay men's lives: A review on gay dating app
service in vehicular social networks. IEEE Internet of Things Journal. studies. Sociology Compass, 12, 2.
Shetty, R., Grispos, G., & Choo, K.-K. R. (2020). Are you dating danger? An Yeo, T. E. D., & Fung, T. H. (2018). ‘mr right now’: Temporality of relationship formation
interdisciplinary approach to evaluating the (in)security of android dating apps. IEEE on gay mobile dating apps. Mobile Media & Communication, 6(1), 3–18.
Transactions on Sustainable Computing. YS et al., The association between syphilis incidence and dating app use in Japan, Social
Shield, A. D. (2019). “i was staying at the camp, and i met this guy on grindr, and he Science Research Network, Rochester, NY, SSRN Scholarly Paper ID 3335064
asked me to move in with him”: Tourists, immigrants, and logistical uses of socio- (September 2019).
sexual media. In Immigrants on Grindr, (pp. 111–142). Springer. Zervoulis, K., Smith, D. S., Reed, R., & Dinos, S. (2020). Use of ‘gay dating apps’ and its
T. Shimokobe, M. A. Miranda, I have clout. Swipe right: Dating apps and implications on relationship with individual well-being and sense of community in men who have sex
self-esteem and body image 35. with men. Psychology & Sexuality, 11(1–2), 88–102.
T. Shimokobe, M. A. Miranda, I have clout. swipe right: Dating apps and implications on Zhong, L. R., Kebbell, M. R., & Webster, J. L. (2020). An exploratory study of technology-
self-esteem and body image 35. facilitated sexual violence in online romantic interactions: Can the internet's toxic
Smith, S. G., Basile, K. C., Gilbert, L. K., Merrick, M. T., Patel, N., Walling, M., et al. disinhibition exacerbate sexual aggression? Computers in Human Behavior, 108,
(2017). National intimate partner and sexual violence survey (nisvs): 2010-2012 state 106314.
report. Zhang, S., Mao, X., Choo, K.-K. R., Peng, T., & Wang, G. (2020). A trajectory privacy-
Snaychuk, L. A., & O'Neill, M. L. (2020). Technology-facilitated sexual violence: preserving scheme based on a dual-k mechanism for continuous location-based
Prevalence, risk, and resiliency in undergraduate students. Journal of Aggression, services. Information Sciences, 527, 406–419.
Maltreatment & Trauma, 1–16.

12

You might also like