Publications by authors named "Leonie Tanczer"

Technology-facilitated abuse (TFA) describes the misuse or repurposing of digital systems to harass, coerce, or abuse. It is a global problem involving both existing and emerging technologies. Despite significant work across research, policy, and practice to understand the issue, the field operates within linguistic, conceptual, and disciplinary silos, inhibiting collaboration.

View Article and Find Full Text PDF

Background: The advance of digital health technologies has created new forms of potential pathology which are not captured in current clinical guidelines. Through simulation-based research, we have identified the challenges to clinical care that emerge when patients suffer from illnesses stemming from failures in digital health technologies.

Methods: Clinical simulation sessions were designed based on patient case reports relating to (a) medical device hardware errors, (b) medical device software errors, (c) complications of consumer technology and (d) technology-facilitated abuse.

View Article and Find Full Text PDF

Smart, Internet-connected devices-the so-called "Internet of Things" (IoT)-pose significant threats to victim-survivors of domestic and family violence (DFV). IoT systems have been used to abuse, harass, monitor, intimidate, and gaslight victim-survivors. We present findings from an abusability analysis that examined 13 IoT devices and allowed us to make several observations about common vulnerabilities to victim-survivors of DFV.

View Article and Find Full Text PDF
Article Synopsis
  • Biotechnological syndromes are health issues that arise from the combination of human biology and digital technology, manifesting through device malfunctions and cyber abuse.
  • A study was conducted using clinical simulations to assess how well physicians can respond to these syndromes, identify gaps in their training, and recognize real-world cases stemming from digital tech.
  • Results showed that participants cited various issues in their practices, such as device malfunctions and inadequate training, highlighting significant barriers to effectively diagnosing and treating technology-related health problems.
View Article and Find Full Text PDF

Purpose: Computational text mining methods are proposed as a useful methodological innovation in Intimate Partner Violence (IPV) research. Text mining can offer researchers access to existing or new datasets, sourced from social media or from IPV-related organisations, that would be too large to analyse manually. This article aims to give an overview of current work applying text mining methodologies in the study of IPV, as a starting point for researchers wanting to use such methods in their own work.

View Article and Find Full Text PDF

Safeguarding vulnerable patients is a key responsibility of healthcare professionals. Yet, existing clinical and patient management protocols are outdated as they do not address the emerging threats of technology-facilitated abuse. The latter describes the misuse of digital systems such as smartphones or other Internet-connected devices to monitor, control and intimidate individuals.

View Article and Find Full Text PDF