Deepfakes and Domestic Violence: Perpetrating Intimate Partner Abuse Using Video Technology
Technology-facilitated abuse is becoming an increasingly standard component of domestic violence, having proliferated in recent decades due to an increased use of smart phones and the Internet. While there are a variety of ways that videos and other content can be altered to misrepresent people and...
Saved in:
Published in | Victims & offenders Vol. 17; no. 5; pp. 647 - 659 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
Philadelphia
Routledge
04.07.2022
Taylor & Francis Ltd |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Technology-facilitated abuse is becoming an increasingly standard component of domestic violence, having proliferated in recent decades due to an increased use of smart phones and the Internet. While there are a variety of ways that videos and other content can be altered to misrepresent people and events, the use of deepfake technology is increasing in popularity because users can create high-quality, realistic visuals and manipulate video and audio to manufacture situations. Deepfake technology is widely available to everyone, and there are online communities where people discuss, and sometimes, create, non-consensual sexual deepfakes to be used for malicious purposes. Deepfake technology poses significant risk for victims of domestic violence because perpetrators can use deepfakes to threaten, blackmail, and abuse victims. Research on the use of deepfakes as a means of technology-facilitated image-based sexual abuse is in its infancy. Therefore, this policy analysis aims to add to the criminological literature on the subject by exploring the intersection of deepfake technology and domestic abuse to bring further attention to the issue and to help guide future policy, accounting for privacy issues, criminal and civil litigation, and the role that law enforcement officials and domestic violence advocates play in prevention. |
---|---|
AbstractList | Technology-facilitated abuse is becoming an increasingly standard component of domestic violence, having proliferated in recent decades due to an increased use of smart phones and the Internet. While there are a variety of ways that videos and other content can be altered to misrepresent people and events, the use of deepfake technology is increasing in popularity because users can create high-quality, realistic visuals and manipulate video and audio to manufacture situations. Deepfake technology is widely available to everyone, and there are online communities where people discuss, and sometimes, create, non-consensual sexual deepfakes to be used for malicious purposes. Deepfake technology poses significant risk for victims of domestic violence because perpetrators can use deepfakes to threaten, blackmail, and abuse victims. Research on the use of deepfakes as a means of technology-facilitated image-based sexual abuse is in its infancy. Therefore, this policy analysis aims to add to the criminological literature on the subject by exploring the intersection of deepfake technology and domestic abuse to bring further attention to the issue and to help guide future policy, accounting for privacy issues, criminal and civil litigation, and the role that law enforcement officials and domestic violence advocates play in prevention. |
Author | Lucas, Kweilin T. |
Author_xml | – sequence: 1 givenname: Kweilin T. surname: Lucas fullname: Lucas, Kweilin T. email: kweilin_lucas@mhu.edu organization: Mars Hill University |
BookMark | eNqFkEtPAyEUhYmpia36E0xIXLcywLx0o7G-kiZ2Ud24IAxzUeoUKtCY_nuZVDcudAPkcs6993wjNLDOAkInGZlkpCJnWZ4XvKqKCSWUpoMVRV7soWFfH_O6zgY_7yQ6QKMQloRwnsRD9DIFWGv5DgFL2-KpW0GIRuFn4zqwCs7xHPwaopfR2Ff8YKNZyQh4Ln204PFVswmAn0L_-WxacHgB6s26zr1uj9C-ll2A4-_7ED3d3iyu78ezx7uH66vZWNGiimNa6qzQqgYGdZUxSGE4UbkGAqAZU6ypWt6CbHSjc061rilrMplzTpnSHNghOt31XXv3sUn7i6XbeJtGClqUJWW0rMqkutiplHcheNBCmZhSOZvCmU5kRPQ0xQ9N0dMU3zSTO__lXvtEwm__9V3ufMZq51fy0_muFVFuO-e1l1aZINjfLb4AH-qOoA |
CitedBy_id | crossref_primary_10_1007_s11196_023_09970_5 crossref_primary_10_3390_nursrep14040203 crossref_primary_10_3366_scot_2024_0493 crossref_primary_10_1016_j_jrt_2025_100110 crossref_primary_10_1016_j_jrt_2024_100087 crossref_primary_10_1109_ACCESS_2023_3306022 crossref_primary_10_1111_asap_12395 crossref_primary_10_1080_14650045_2024_2308115 crossref_primary_10_1371_journal_pone_0287503 crossref_primary_10_1177_15248380251320992 crossref_primary_10_3389_fpubh_2023_1307841 crossref_primary_10_1111_nin_12686 crossref_primary_10_1177_09732586241276984 crossref_primary_10_1177_10790632231224356 crossref_primary_10_1007_s11930_024_00397_y crossref_primary_10_1080_23311916_2024_2320971 |
Cites_doi | 10.1109/ICASSP39728.2021.9414582 10.1177/1365712718807226 10.1007/s10691-017-9343-2 10.1109/MCSE.2018.2874117 10.1080/0312407X.2019.1607510 10.1007/s40429-021-00363-x 10.4135/9781412971997.n55 10.4324/9781315204765-4 10.1089/cyber.2020.0272 10.1111/soc4.12639 10.1353/tj.2018.0097 10.1080/15295036.2020.1832697 10.1177/1077801216646277 10.1177/10439862211001616 10.1037/vio0000233 10.1080/08164649.2018.1542592 10.1177/1557085116654565 10.1007/s13347-018-0325-3 10.1093/oso/9780195154276.001.0001 10.1093/bjc/azy052 10.1080/14680777.2018.1447341 10.22215/timreview/1282 10.1177/0964663920947791 |
ContentType | Journal Article |
Copyright | 2022 Taylor & Francis Group, LLC 2022 2022 Taylor & Francis Group, LLC |
Copyright_xml | – notice: 2022 Taylor & Francis Group, LLC 2022 – notice: 2022 Taylor & Francis Group, LLC |
DBID | AAYXX CITATION 7QJ 7U3 BHHNA |
DOI | 10.1080/15564886.2022.2036656 |
DatabaseName | CrossRef Applied Social Sciences Index & Abstracts (ASSIA) Social Services Abstracts Sociological Abstracts |
DatabaseTitle | CrossRef Applied Social Sciences Index and Abstracts (ASSIA) Social Services Abstracts Sociological Abstracts |
DatabaseTitleList | Applied Social Sciences Index and Abstracts (ASSIA) |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Social Welfare & Social Work |
EISSN | 1556-4991 |
EndPage | 659 |
ExternalDocumentID | 10_1080_15564886_2022_2036656 2036656 |
Genre | Research Article |
GroupedDBID | ..I .7I .QK 0BK 0R~ 123 1PW 29Q 4.4 AAMFJ AAMIU AAPUL AAZMC ABCCY ABFIM ABIVO ABJNI ABLIJ ABPEM ABTAI ABXUL ABXYU ACGFS ACTIO ACTOA ADAHI ADCVX ADKVQ ADZJE AECIN AEISY AEKEX AEMXT AEYOC AEZRU AGDLA AGMYJ AGRBW AHDZW AIJEM AKBVH ALMA_UNASSIGNED_HOLDINGS ALQZU AVBZW AWYRJ BEJHT BLEHA BMOTO BOHLJ CCCUG CQ1 CS3 DGFLZ DKSSO EBS EIS ESI EV9 E~B E~C F5P G-F GTTXZ H13 HZ~ IPNFZ KYCEM LJTGL M4Z O9- P2P PQQKQ RIG RNANH ROSJB RSYQP S-F STATR TBQAZ TFH TFL TFW TNTFI TRJHH TUROJ TWQ UT5 UT9 ~01 ~S~ AAGDL AAHIA AAYXX ADYSH AEFOU AFRVT AIYEW AMPGV CITATION 7QJ 7U3 BHHNA TASJS |
ID | FETCH-LOGICAL-c268t-27f16fc9e3e9813e56440c5fe0eef33c3b8d4deabfbf542ff923b1a54423cf4e3 |
ISSN | 1556-4886 |
IngestDate | Fri Jul 25 23:49:33 EDT 2025 Thu Apr 24 23:13:16 EDT 2025 Tue Jul 01 00:44:02 EDT 2025 Wed Dec 25 09:06:35 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 5 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c268t-27f16fc9e3e9813e56440c5fe0eef33c3b8d4deabfbf542ff923b1a54423cf4e3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 2677232787 |
PQPubID | 196247 |
PageCount | 13 |
ParticipantIDs | informaworld_taylorfrancis_310_1080_15564886_2022_2036656 proquest_journals_2677232787 crossref_citationtrail_10_1080_15564886_2022_2036656 crossref_primary_10_1080_15564886_2022_2036656 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-07-04 |
PublicationDateYYYYMMDD | 2022-07-04 |
PublicationDate_xml | – month: 07 year: 2022 text: 2022-07-04 day: 04 |
PublicationDecade | 2020 |
PublicationPlace | Philadelphia |
PublicationPlace_xml | – name: Philadelphia |
PublicationTitle | Victims & offenders |
PublicationYear | 2022 |
Publisher | Routledge Taylor & Francis Ltd |
Publisher_xml | – name: Routledge – name: Taylor & Francis Ltd |
References | cit0033 Chesney R. (cit0008) 2019 cit0034 cit0031 cit0030 Li Y. (cit0046) 2018 O’Malley R. L. (cit0053) 2020; 37 Agarwal S. (cit0001) 2019 cit0039 cit0035 Clevenger S. (cit0011) 2018; 12 cit0036 cit0066 cit0023 cit0067 cit0064 cit0021 Stark E (cit0061) 2007 cit0065 McGlynn C. (cit0050) 2020; 30 cit0063 Harris B. A. (cit0038) 2018; 59 cit0060 Gover A. R (cit0032) 2009 Citron D. K. (cit0009) 2019; 107 de Ruiter A (cit0019) 2020 cit0028 cit0029 cit0026 cit0024 cit0025 Diakopoulos N. (cit0022) 2020; 23 cit0055 cit0012 cit0056 cit0010 cit0054 cit0051 cit0052 DeKeseredy W. S (cit0020) 2021; 8 cit0017 Yanet R. (cit0068) 2020; 10 cit0018 cit0015 Fallis D (cit0027) 2020 cit0059 cit0016 Thies J. (cit0062) 2016 cit0013 cit0057 cit0014 cit0058 cit0044 cit0045 cit0042 Harris D (cit0037) 2019; 17 cit0043 cit0040 cit0041 Chawla R (cit0007) 2019; 4 Al-Alosi H (cit0003) 2017; 40 cit0006 cit0004 cit0048 cit0005 cit0049 Yang X. (cit0069) 2019 cit0002 cit0047 |
References_xml | – ident: cit0039 doi: 10.1109/ICASSP39728.2021.9414582 – ident: cit0063 – year: 2016 ident: cit0062 publication-title: Proceeding of 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) – ident: cit0034 – ident: cit0015 – ident: cit0040 – ident: cit0044 – ident: cit0049 doi: 10.1177/1365712718807226 – ident: cit0002 – ident: cit0051 doi: 10.1007/s10691-017-9343-2 – ident: cit0054 – ident: cit0018 doi: 10.1109/MCSE.2018.2874117 – ident: cit0006 – ident: cit0025 – ident: cit0067 doi: 10.1080/0312407X.2019.1607510 – ident: cit0021 – ident: cit0058 – volume: 40 start-page: 1573 issue: 4 year: 2017 ident: cit0003 publication-title: UNSW Law Journal – volume: 8 start-page: 330 issue: 2 year: 2021 ident: cit0020 publication-title: Current Addiction Reports doi: 10.1007/s40429-021-00363-x – volume: 17 start-page: 99 issue: 1 year: 2019 ident: cit0037 publication-title: Duke Law & Technology Review – volume: 4 start-page: 4 issue: 6 year: 2019 ident: cit0007 publication-title: International Journal of Advance Research and Development – start-page: 472 volume-title: 21st Century Criminology: A Reference Handbook year: 2009 ident: cit0032 doi: 10.4135/9781412971997.n55 – start-page: 38 year: 2019 ident: cit0001 publication-title: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops – ident: cit0014 – ident: cit0035 – ident: cit0036 doi: 10.4324/9781315204765-4 – ident: cit0041 doi: 10.1089/cyber.2020.0272 – ident: cit0045 – volume: 12 start-page: e12639 issue: 1 year: 2018 ident: cit0011 publication-title: Sociology Compass doi: 10.1111/soc4.12639 – ident: cit0028 doi: 10.1353/tj.2018.0097 – ident: cit0031 doi: 10.1080/15295036.2020.1832697 – ident: cit0066 doi: 10.1177/1077801216646277 – ident: cit0030 – volume: 23 start-page: 1 issue: 7 year: 2020 ident: cit0022 publication-title: New Media & Society – ident: cit0055 – volume: 107 start-page: 1753 issue: 6 year: 2019 ident: cit0009 publication-title: California Law Review – ident: cit0059 – ident: cit0013 – ident: cit0017 – ident: cit0042 – ident: cit0010 doi: 10.1177/10439862211001616 – volume: 10 start-page: 68 issue: 1 year: 2020 ident: cit0068 publication-title: Psychology of Violence doi: 10.1037/vio0000233 – ident: cit0052 – ident: cit0023 – ident: cit0048 doi: 10.1080/08164649.2018.1542592 – ident: cit0004 doi: 10.1177/1557085116654565 – ident: cit0056 – year: 2020 ident: cit0019 publication-title: Philosophy & Technology – ident: cit0064 – ident: cit0060 – ident: cit0012 – ident: cit0043 – ident: cit0016 – ident: cit0029 doi: 10.1007/s13347-018-0325-3 – ident: cit0033 – year: 2019 ident: cit0069 publication-title: IEEE International Conference on Acoustics, Speech, and Signal Processing – volume-title: Coercive control: The entrapment of women in personal life year: 2007 ident: cit0061 doi: 10.1093/oso/9780195154276.001.0001 – volume: 59 start-page: 530 issue: 3 year: 2018 ident: cit0038 publication-title: The British Journal of Criminology doi: 10.1093/bjc/azy052 – volume: 37 start-page: 258 issue: 1 year: 2020 ident: cit0053 publication-title: Journal of Interpersonal Violence – year: 2018 ident: cit0046 publication-title: IEEE Workshop on Information Forensics and Security – ident: cit0026 – ident: cit0024 doi: 10.1080/14680777.2018.1447341 – ident: cit0005 – ident: cit0047 – ident: cit0065 doi: 10.22215/timreview/1282 – year: 2020 ident: cit0027 publication-title: Philosophy & Technology – start-page: 147 year: 2019 ident: cit0008 publication-title: Foreign Affairs – ident: cit0057 – volume: 30 start-page: 541 issue: 4 year: 2020 ident: cit0050 publication-title: Social & Legal Studies doi: 10.1177/0964663920947791 |
SSID | ssj0044022 |
Score | 2.335414 |
Snippet | Technology-facilitated abuse is becoming an increasingly standard component of domestic violence, having proliferated in recent decades due to an increased use... |
SourceID | proquest crossref informaworld |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 647 |
SubjectTerms | Consensual sex Deepfake Domestic violence Extortion image-based sexual abuse Infancy Intimate partner violence Law enforcement Litigation Perpetrators Policy analysis Popularity Privacy revenge pornography Sexual abuse Technology Victims |
Title | Deepfakes and Domestic Violence: Perpetrating Intimate Partner Abuse Using Video Technology |
URI | https://www.tandfonline.com/doi/abs/10.1080/15564886.2022.2036656 https://www.proquest.com/docview/2677232787 |
Volume | 17 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwELZge-GCeIrCgnxAXFBCEjvehBuioFUFCKHtUolD5DhjadV2U2VTIfHrGb-y2bZSeVyilVd2Es9n-7Mz8w0hL5u8RmI8MzkAOYt4mepIJg2LtMqRjXOj-mPinT9_EfMjfnicH28zFdrokr6O1a9r40r-xapYhnY1UbJ_YdmhUSzA32hfvKKF8fpHNj4AONfyBJzO8kF7ZiQz1OulDyUyu_2v0CEvNma2ngH9ChkqIG_s-rXxjq8vNsg77XnBctVAe_mo3dPWpQkcOdtYnLRa2_RzAxn_ZPKm2QnjJ6yMX_siHp8lZM7vdHuWuOuE5CfEXEQ4yL1c9aisdFm2hll0NkJLPpoShVPU9KurcPrfVyZu5-loWjY3i83DxeYbqcgvCWXbpdf_c5vsZbg7yCZkb_HtcD4PSzDHTbH9zB0ePoRuFcmba2-xQ0p2JGuvLNGWdyzukbt-w0DfOevfJ7dg_YBMXVQ1_Q6nWnZAX9FQ0HYnD8mPARgUgUEDMGgAxls6hgUNsKAeFtTCglpYUAsLuoXFI3L08cPi_TzyWTQilYmij7KZToVWJTAoi5QBvj5PjI9hAqAZU6wuGt6ArHWtc55pjZS_TmXOkWgrzYE9JpN1u4YnhEoQpRKGIkoTsaekhJKVRVKAzLFFsU946MZKeYl5k-nktEq9Em3o_cr0fuV7f5_EQ7Vzp7FyU4VybKOqt4db2mWiqdgNdafBoJUfypsqEwgjluHi9fQ_mn5G7mwH1ZRM-u4CniNl7esXHqC_AY30jpQ |
linkProvider | Taylor & Francis |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT9wwELYoHOiFR6HisW19QL1l2cSOSbihAgqv1QotLVIPluOMq2ohi7LZC7-emTxgl6riwDXROLEzHn8zmfmGsb0sTBEYH1APQCk8GfvOM71MeM6GiMYlsf5QvfNVXyU38vw2vJ2phaG0SvKhXU0UUdlq2twUjG5T4vbxDFSoeJRhEFAxlVCISj6wpTCWAh2wpeH1eZK09liih1T980Qhj6TaOp7_DTR3Qs3xl_5jr6tD6HSV2fb169yTUXdapl37-IrZ8X3zW2MrDUblR7VSrbMFyD-xTl3Iy3_BnTMF8O-8vTAuRhvs9zHAgzMjmHB8Lj8e3xN9h-U_m7KmQz6AAhE6KVz-h5_l5V_EysAHqLo5FPwonU6AVwkMKJPBmL8E_TfZzenJ8EfiNY0bPBuoqPSCA-crZ2MQEEe-AJyN7FFaWw_ACWFFGmUyA5O61IUycA5RZuqbUCK2s06C-MwW83EOW4wbULFVhEoMFYlZYyAWcdSLwIQ4otpmsv1Y2jas5tRc4077Dflpu5iaFlM3i7nNus9iDzWtx1sC8awm6LKKp7i6-YkWb8h2WrXRjYWY6EChXyMCtJc77xj6G1tOhleX-vKsf7HLPtKtKpdYdthiWUzhCyKmMv3abIkn3oYHQQ |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT9wwELYKSBUX2tIiHlvqQ8Ut203smKQ31O1qoYBWiJfEwbKdMUIL2VU2e-mv7zixy0uIA8ckGid2JuPPzjffEPK9SDUC411XA5CziOexjVSvYJE1KaJx7lR_XL7z0bEYnvGDyzSwCWeeVunW0LYVimhitfu4p4UNjLgfOAUK9DtHMEhcLhUTCEoWyJLAQ3TypdOTg-EwhGOOC6TmlycaRc4qpPG81NCjCeqRfOmzcN3MQYMPRIenb6kn4-681l3z94mw45u695GseIRK91qX-kTeQblKOm0aL72AW6sqoDs0nJhU48_kqg8wtWoMM4q3pf3JnRPvMPTcJzX9pCOoEJ87dyuv6X5Z3yBSBjpCxy2hont6PgPa0BfQpoAJvd_y_0LOBr9Pfw0jX7YhMonI6ijZtbGwJgcGeRYzwN7wniO19QAsY4bprOAFKG21TXliLWJMHauUI7IzlgNbI4vlpIR1QhWI3AiHSZRLETNKQc7yrJeBSrFFsUF4eFfSeE1zV1rjVsZe-jQMpnSDKf1gbpDuf7NpK-rxmkH-0BFk3eym2Lb0iWSv2HaC10gfH2YyEbiqYQlGy803NP2NvB_1B_Jw__jPFll2VxoiMe-Qxbqaw1eES7Xe9h_EP5AyBeU |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Deepfakes+and+Domestic+Violence%3A+Perpetrating+Intimate+Partner+Abuse+Using+Video+Technology&rft.jtitle=Victims+%26+offenders&rft.au=Lucas%2C+Kweilin+T.&rft.date=2022-07-04&rft.pub=Routledge&rft.issn=1556-4886&rft.eissn=1556-4991&rft.volume=17&rft.issue=5&rft.spage=647&rft.epage=659&rft_id=info:doi/10.1080%2F15564886.2022.2036656&rft.externalDocID=2036656 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1556-4886&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1556-4886&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1556-4886&client=summon |