Abstract
The shrinking of secure online spaces and incidents of technology-facilitated (gender-based) violence (TF(GB)V) against female feminists have partially led to self-censorship, thereby constricting public discourse. To unravel the impact of increasing TF(GB)V on feminist mobilization, 22 interviews with Costa Rican and Colombian, female feminists advocating for feminist issues, such as reproductive rights, were conducted. All interviewees, advocating for often perceived controversial topics within patriarchal societies, have experienced forms of TF(GB)V, including misogynistic hate speech. In reaction to this violence, interviewees respond in varying ways – some reduce their social media activity, while others develop personal coping strategies. In fact, most interviewees engage in both chilling and resistance mechanisms concurrently. Increased awareness of potential consequences and coping mechanisms of female feminists when experiencing TF(GB)V helps to develop gender-sensitive mechanisms to protect (female) activists and foster a safer online environment. While measures such as IT security training for activists, enhanced content moderation on platforms, and gender-sensitive design approaches are crucial, addressing the underlying issue – the targeting of feminists with violence – is imperative. Without such efforts, there is a risk that affected individuals withdraw from digital spaces, thereby limiting the diversity of narratives that shape public discourse online.
1 Introduction
Worldwide, including in Latin America, feminists involved in reproductive rights advocacy, the fight against gender-based-violence (GBV), and feminicides, among others, frequently use Information and Communication Technologies (ICTs), especially social media, to advance feminist causes and campaigns. The hashtag #NiUnaMenos (Not One Less), which originated in Argentina in 2015, for instance, has since gained global recognition and is now widely used by feminist groups around the world to raise awareness about feminicides. 1 Due to the contentious nature of these issues, many feminists advocating for these rights face targeting from various (misogynistic) actors. 2 , 3 , 4 , 5 , 6 The migration of public discourse to digital platforms, 7 coupled with the intersectional discrimination faced by women[1] and LGBTQAI+ individuals, heightens their risk of experiencing (technology-facilitated) violence 8 , 9 .[2] Jane 10 and Lewis et al. 11 (p. 125), contend that gendered hate online mirrors “traditional” misogynistic ideologies, reinforcing narratives of women’s inferiority and echoing patterns commonly found in “offline violence against women” (VAW). Gender-based violence is particularly frequent in patriarchal societies with misogynistic attitudes, such as in Latin America. While GBV is intensively studied, technology-facilitated GBV, especially on social media platforms, is still emerging as a research field. According to a large-scale study conducted by the Economist Intelligence Unit 12 in 51 countries, 91 % of women in Latin America and the Caribbean have either experienced or witnessed technology-facilitated GBV (TF(GB)V),[3] including hate speech, astroturfing, image- and video-based abuse, and stalking. This figure highlights the widespread and systemic nature to of TFGBV, underscoring that it constitutes a structural problem rather than a collection of isolated incidents. Nevertheless, TFGBV is still not widely systematically recognized as a legitimate form of GBV. 13
Within Latin America, Colombia warrants particular attention because of their notably high rates of GBV and their significant Black, Indigenous, and People of Color (BIPoC) populations, who are disproportionately impacted by technology-facilitated violence (TFV) due to persistent systemic racism and other forms of discrimination. 9 , 14 Colombia holds the third-largest Afro-descendant population share (10.6 %) in Latin America after Brazil and Venezuela. 15 In Costa Rica (CR), despite its reputation as a relatively safe country, the country has high rates of violence, including GBV, and a notable Afro-descendant population (8 %). 16 , 17 In light of the high incidence of GBV and the prevalence of feminist activism in these two countries, they represent pertinent cases for investigation into the phenomenon of TF(GB)V and its consequences. Despite the pervasive forms of TF(GB)V across Latin America, 12 , 18 Latin America has also emerged as a powerful and globally recognized site for feminist resistance and mobilization. 19 To date, there is limited research specifically examining the experiences of feminist and grassroots activists, particularly from the Global South. This is especially striking given that the prevalence of TF(GB)V is alarmingly high in the Global South. Latin America and the Caribbean are among the most affected regions in the world, second only to the Middle East, where 98 % of women report having experienced TFV, according to the Economist Intelligence Unit. 12 Existing studies on TF(GB)V, like the one by the Economist Intelligence Unit, often tend to focus on the “general” female population or high-profile public figures, such as politicians, while frequently overlooking those engaged in local activism. A 2023 study by Rutgers, 20 based on 50 interviews with women from seven countries in the Global South, found that online activism for gender equality and women’s rights significantly increases the vulnerability to TFGBV. Feminists and female human rights defenders, in particular, are among the primary targets of such violence (p. 44).
Moreover, while feminist Human-Computer Interaction (HCI) has long emphasized the role of technology in shaping and reinforcing gendered power structures and emphasizing values like pluralism, advocacy, and context-sensitivity, it has paid limited empirical attention to how grassroots female feminists,[4] particularly those from patriarchal contexts, experience and respond to TF(GB)V. In regions such as Latin America, where persistent sociopolitical challenges (e.g., high levels of (gender-based) violence, criminalized reproductive rights) intersect with infrastructural constraints (e.g., limited internet access, inadequate digital governance), these interactions with ICTs are characterized by specific features. So far, we know little about how female feminists from Latin America actively respond to TF(GB)V, including through self-censorship, withdrawal from digital spaces, and collective resistance. These forms of flight and fight, as conceptualized by Jane 8 , remain insufficiently explored in terms of their situated meanings and broader implications. Specifically, there is a lack of understanding around how these responses inform or challenge prevailing assumptions in platform design, shape users’ digital agency, and highlight the need for feminist-aligned infrastructures that are responsive to the realities of those most affected by TF(GB)V. This gap is crucial to address, as it has direct implications for civic participation and democratic processes. Consequently, our study attempts to address this by posing the following research question: How do female feminists in Colombia and Costa Rica, advocating for feminist topics, respond to and cope with incidents of technology-facilitated (gender-based) violence?
To address the observation that the effects of TF(GB)V on female feminists in Latin America are so far neglected in previous (HCI) research, our empirical study contributes to bridging this gap by providing situated, empirical insights. 21
In 2023, we conducted 22 in-depth interviews with Costa Rican and Colombian female feminists. The interviews were guided by relevant studies on TF(GB)V, 4 , 22 the chilling effect on activism, 7 , 23 , 24 and strategies of resistance (e.g., Warford et al.). 25 This study provides a critical reflection on the multifaceted responses to and consequences of TF(GB)V, with a particular focus on how such violence seeks to silence feminist voices and influence which narratives gain visibility in digital spaces. At the same time, it introduces the resilience and strategies of female feminist actors, who resist these forms of oppression and continue to advocate for gender justice. The study emphasizes the urgency of situating TF(GB)V within broader socio-political debates, drawing attention to the gendered power structures that sustain such violence. Rather than approaching these incidents as isolated or individual experiences, the analysis underscores their systemic and structural dimensions. From a HCI perspective, the integration of critical and feminist HCI approaches (e.g., Ref. 26]) is vital for meaningfully addressing and understanding these forms of technology-facilitated violence against female feminists. Thereby, intersectional frameworks are important in identifying prevailing values that frequently exert influence on technological evolution, and in directing attention towards the needs of marginalized users that are often overlooked. 27
2 The forms of and responses to technology-facilitated (gender-based) violence
The following section introduces relevant literature on TF(GB)V and its impacts on individuals and communities, thereby focusing on research on (anti-) chilling effects. Key topics include the psychological and social consequences, such as self-censorship and the chilling effect, and the strategies individuals employ to resist and cope with these challenges.
2.1 Forms of technology-facilitated (gender-based) violence: misogynistic hate speech, doxing, and beyond
The rapid advancement of ICTs and the affordances offered by social media, including visibility, scalability, and anonymity, have supported female feminists to engage in activism, mobilize support, amplify their voices, and advance their agendas in public discourse. 22 , 28 , 29 Nevertheless, as Suárez et al. (2022) argue, 30 the use of ICTs for both personal expression and feminist activism has also intensified intersecting forms of violence, which serve to curtail women’s participation in political and public sphere. Misogynistic narratives, which are deeply ingrained in the sociocultural mindset, 10 fuel gendered TFV as a vehicle to uphold hegemonic masculinity, branding any attempt from women to gain public visibility and active participation as a transgression of traditional gender norms, thereby making them targets for violent reprisal. 22 , 31 As Esposito 32 (p. 463), mentioned “all forms of gender-based violence have been working as fairly effective gate-keeping practices, fostering the silencing and exclusion from the public and political arena (…)”. Since the onset of the COVID-19 pandemic, cases of GBV have increased significantly, 16 and considering the following social distancing measures, there has been a notable shift towards online interactions. 33 These circumstances have increased the “toxicity of online communities” and the likelihood of experiencing TF(GB)V (p. 7). 34 Hinson et al. 35 have defined TFGBV as the action perpetrated by one or more individual(s) that harm others based on their gender or sexual identity or by enforcing harmful gender norms using mobile technology or the internet. Additionally, Vaughan et al. 36 (p. 5), identify TFGBV as “[…] any act that is committed, assisted, aggravated, or amplified by the use of [ICTs] or other digital tools, that results in or is likely to result in physical, sexual, psychological, social, political, or economic harm or other infringements of rights and freedoms”. It includes bullying, stalking, defamation, sexual harassment, exploitation, and hate speech in digital spaces. 4 So far, the study of TFGBV is characterized by conceptual ambiguity and inconsistent terminology. 33 Scholars employ a range of term, including gendered TFV, gendered cyberhate, cyber violence against women and girls (VAWG), cyber misogyny, 8 and technology-facilitated sexual violence and abuse (TFSVA). 33 While some terms are applied consistently, others, like gendered cyberhate, are used to draw attention to specific forms of violence such as hate speech. Building upon these definitions and trying to navigate the conceptual ambiguity, we understand the term TF(GB)V as the intersection of technology-facilitated violence, defined as harm enabled or facilitated by technological tools, 37 and gender-based violence, defined as acts of violence directed at individuals based on their gender identity (Aghtaie and Gangoli 2015) (see Figure 1). 38 The term technology-facilitated points to the blurred line between digital and physical violence, meaning that while TFV always has a digital component, its manifestation often spills into the physical realm. 20 , 39 Still, as Chen et al. highlight, TF(GB)V “isn’t just the same old sexual violence wrapped in a shiny technological coat, it presents unique challenges to prevention and mitigation”, 40 (p. 2772).

Overview of context factors influencing technology-facilitated (gender-based) violence, the various forms it takes, the female actors affected, and their responses. Source: Own depiction.
Drawing from Vlahakis’ 9 report on TFGBV against women’s rights activists in Zimbabwe, Nepal, and Kenya, factors such as gender identity, socioeconomic status, sexual orientation, ethnic belonging, and age underpin women’s experiences with TF(GB)V. Generally, a significantly higher proportion of BIPoC and LGBTQAI+ individuals report instances of TF(GB)V due to (intersecting) identity attributes. 27 A study conducted by Posetti et al. 34 with 901 female journalists from across the world reveals that TFV is often closely linked to the journalists’ gender and frequently contains sexist remarks. Not only are (publicly known) women disproportionately affected by TFV, but the topics with which they are frequently engaged – such as domestic violence, feminicides, sexual harassment, queer rights, and reproductive rights (especially abortion) – are often perceived as controversial in many (patriarchal) societies and serve as triggers for attacks. These forms of violence are not only perpetrated by external actors, like right-wing conservative groups, but can also arise from within families and communities. 18 An additional factor identified as being significantly associated with the increase of TF(GB)V is the surge in disinformation, which seems intricately intertwined with TF(GB)V. It has been observed that disinformation tactics are frequently repurposed to perpetrate misogynistic attacks and that reporting on such disinformation can itself become a trigger for coordinated pile-on attacks. 34 Digital platforms, through their specific affordances, such as anonymity, interactivity, and the ability to amplify content rapidly, often function as amplifiers of violence by perpetuating and reinforcing longstanding systems of domination, exclusion, and discrimination. 14 , 29 , 41 Affordance theory provides a useful analytical tool to understand how specific platform features mediate users’ experiences. When viewed through a feminist lens, as in Salamoun et al., 42 affordances like anonymity or virality are not neutral but deeply entangled with power, culture, and gendered violence. For instance, several affordances enable perpetrators to harass, threaten, and manipulate victims with minimal accountability: The anonymity offered by platforms enables perpetrators to hide their identity, making it harder to trace or prosecute them, while the ability to share content quickly and widely can increase, amongst others, the reach of harmful messages. 33 Furthermore, Im et al. 4 and Treem and Leonardi 43 identify “persistence” as a key affordance of social media platforms; one that, in the context of TF(GB)V, can contribute to an environment where TF(GB)V endures and potentially escalates over time, intensifying the emotional and psychological impact on those targeted. In the context of TF(GB)V, the lack of transparency, inadequate reporting mechanisms, and the frequent emphasis on virality over safety reflect design decisions that neglect feminist HCI principles of reflexivity, advocacy, and contextual awareness. 26 , 44
As Fal-Dutra Santos and Pourmalek 45 (p. 85) state, “terms like ‘cyber violence’ and ‘technology-facilitated violence’ frame technology as the cause of violence and obscure the structural causes”. Furthermore, they highlight that “GBV does not occur in isolation but rather is a part and result of a web of structural inequalities and institutional discrimination” and thus TF(GB)V can be seen as a “continuum” of direct physical violence. Consequently, it is imperative to bear in mind that technology itself does not inherently cause GBV, but it can be used as a tool to facilitate, amplify, or perpetuate it. Thus, GBV perpetrated online and through technology is largely a reflection of underlying, deeply entrenched patriarchal structures. Thus, it is difficult to differentiate between the impacts and consequences of the violence/abuse that are initiated in digital spaces from offline realities and vice versa. 46 Examining these issues in isolation without a concomitant understanding of the wider problems they give rise to is misleading.
2.2 Responding to technology-facilitated (gender-based) violence
How individuals navigate and respond to TF(GB)V is influenced by a combination of social, economic, political, and contextual factors and is thus inherently personal. Therefore, it is important to recognize emotional, physical, and situated experiences. 47 As Higson et al. 48 elucidate, in situations where human beings encounter threats, a predominantly instinctual reaction is typically observed. In violent situations, this often leads them to act based on their intuition, on fear, or a drive to fight back and “destroy the aggressor” (p. 27). In relation to TF(GB)V, the literature commonly differentiates between two main responses to TF(GB)V: (1) self-censorship and self-regulation (chilling effect), where targets limit their online activity to avoid further harm; and (2) active resistance mechanisms. Jane labels these as flight or fight, noting that individual responses “can involve both flight and fight modes” simultaneously, 8 (p. 58). Liang 49 (p. 1473) highlights that “personal factors” (e.g., privacy concerns), “platform factors” (e.g., unclear platform policies), and “social factors” (e.g., fear of political retribution) can manifest in (1) self-censorship, (2) self-restraint, (3) switching platform, and (4) camouflaging. While (1) and (2) can lead to varying levels of chilling, (3) and (4) may cause anti-chilling. This section briefly introduces these strategies and reviews existing empirical research.
The first response frequently highlighted by scholars is self-censorship, meaning that individuals affected by TF(GB)V reduce their engagement to minimize the actual and potential risks linked to their online participation. 50 – 54 The study by the Economist Intelligence Unit 12 shows that one in three women think twice before they post something on the internet. Violent online threats, such as insults, intimidation, shaming, and discrediting, are powerful forces often triggering deep psychological states of fear, anxiety, and severe emotional distress that then, in turn, amplify social conformity. 12 , 27 This phenomenon is frequently termed the chilling effect, 55 , 56 with self-censorship and self-regulation being typical manifestations. 49 The term chilling effect was first introduced in the US to denote the discouragement or suppression of free speech due to the fear of legal repercussions or government action. 57 Now, it broadly describes how laws, policies, or social conditions can discourage or force individuals from exercising their (constitutional) rights and activities due to fear of legal, social, economic, or professional repercussions. It is commonly influenced by the intensity, proximity, and perceived likelihood of swift punishment inherent to threats. 24 Within patriarchal societies raising voice against men, who are often the perpetrators of TF(GB)V, is often challenging and women are often blamed and delegitimized. 58
Nadim et al. (2021), in an analysis of online harassment in Norway, argue that personal threats directed at the target’s being instead of its ideas or thoughts are more likely to trigger self-censorship. Along the same lines, Penney, 56 looking at the chilling effect caused by online regulation and surveillance, argues that more personal regulatory actions (e.g., individualized legal threats) lead to a strong chilling effect by evoking fear of penalty and prosecution, whereas impersonal regulations provoke a weaker form of the chilling effect. In the context of state-led prosecution in autocratic regimes in Southeast Asia, Ong 59 argues that “social media self-censorship occurs when the expected pay-off for expressing one’s political opinion online is negative” (p. 143). Schauer 57 similarly states that the occurrence and extent of the chilling effect is a question of benefit-risk assessment by saying that individual risk aversion is a decisive factor. In short, this means that individuals affected by TF(GB)V subjectively seem to weigh the benefits of their online engagement, such as wide outreach and easy networking, against actual and potential risks linked to TFV. These limited and heterogeneous findings support the notion that the chilling effect and other response mechanisms are influenced by social, economic, political, and contextual factors and are thus inherently personal and context-dependent. 49
Employing a gender-sensitive lens, the large-scale study with 901 journalists by Posetti et al. 34 shows that TF(GB)V against women journalists is meant “to humiliate […] and chill their active participation (along with that of their sources, colleagues, and audiences) in public debate” (p. 6). The study reveals that 30 % of respondents admitted to self-censoring on social media, while 20 % withdrew from all online interactions without reporting or publicizing experiences (ibid). The findings demonstrate that TF(GB)V is intended not only to silence individuals directly affected by it, since individuals who may not have personally experienced TF(GB)V can still be deeply affected by its chilling effect, leading them to self-censor or avoid public discourse. They observe how others in similar positions face severe repercussions, such as physical and sexual violence or death threats, which are intentionally used as warnings to silence dissent. As a result, TF(GB)V not only harms direct targets but also discourages broader participation, reinforcing systemic suppression of marginalized voices. 7 , 22 , 60
While extensive research has investigated the impact of TF(GB)V on female journalists, scholars, and politicians in the Global North, comparatively fewer studies have focused on this phenomenon among (female) activists and in the Global South, particularly Latin America, 4 , 18 , 61 despite these groups and regions being particularly affected. 62 One exception is the survey conducted by Soto and Sanchez’, 63 who found that 71.2 % of surveyed Chilean feminists and activists (n = 163) faced TF(GB)V, mostly misogynistic verbal attacks leading to self-censorship. Benítez 64 and Barrios and Miller 65 examine tendencies towards self-censorship among journalists, focusing on Colombia and Central America, concluding that this practice is more prevalent when covering contentious issues such as forced displacement and illegal mining. They also note that journalists in rural regions are more prone to self-censorship due to the extensive territorial dominance maintained by illegal armed groups, which amplifies the visibility of their work and renders them more vulnerable to physical threats. In 2023, the Constitutional Court of Colombia published a report shedding light on the issue of TF(GB)V against female journalists, highlighting the lack of reporting mechanisms and legal mechanisms for action. 66 This is more generally an issue since solely some forms of TF(GB)V, such as cyberporn, can be treated as criminal or civil offenses; many other types are neither legally criminal nor unlawful. 67 One reason for limited research is, according to Bedi, 68 the difficulty of measuring the chilling effect “for reasons of data collection, data analysis, causal events, and confounding factors” (p. 270). Especially the human behaviors underlying the chilling effect – i.e., what triggers self-censorship in response to TFV – are rarely researched.
Besides chilling, distancing (e.g., ignoring, blocking, muting, and deleting content and users), improving one’s own digital hygiene, and limiting internet use (e.g., avoiding interactions with strangers, disengaging from contentious debates, and removing or greatly restricting access to personal information, privatizing accounts, etc.) are often identified coping strategies women seem to employ when being targeted with TF(GB)V 8 , 12 , 58 . Liang 49 elucidates that social media content creators (from China) occasionally switch platforms and evade sensitive terms, e.g., circumventing the platform’s algorithm and mitigating the risk of encountering TFV. These coping mechanisms reflect the highly individualized ways in which people respond to TF(GB)V: A reality also shaped by the frequent trivialization of such violence and the lack of awareness or competence among official institutions, including law enforcement. 20 When individuals persist in their online engagement despite being targeted, their continued presence can be read as a form of resistance and feminist mobilization. As Jane’s 8 analysis of TF(GB)V indicates, a “women’s response to gendered cyberhate cannot always be neatly categorized as one thing or another” (p. 54). She observed that numerous women use both strategies such as retreating by modifying their writing style and content (flight), while simultaneously maintaining active participation in overt feminist activism (fight). Nah 69 found that some activists persist in their resistance and solidarity, feeling responsible for addressing their hostile realities, regardless of the risks involved. Within this trend, female feminists have demonstrated greater readiness to engage in discussions regarding emotional well-being and advocate for both personal and collective care within human rights defense. Similarly, Jane’s 8 concept of fight responses encompasses individual and collective dimensions, ranging from personal behavioral adaptations in using ICTs to coordinated campaigns to combat TF(GB)V. Hashtag feminism has paved the way for amplifying narratives countering violence from intersectional viewpoints, 70 , 71 while restoring agency to targets of TF(GB)V. Beyond shedding light on persisting forms of oppression, hashtag feminism promotes proactive engagement to address present and future social challenges. 72 , 73 Hence, collective self-defense against TF(GB)V has consolidated as a political practice articulating women’s political struggles beyond Latin America. 6 This has sparked feminist social mobilization and collaboration, extending to activities such as awareness-raising, advocating for policy reforms related to TF(GB)V, and providing support to women who have experienced TF(GB)V. Jane has further outlined that feminists have increasingly resorted to practices like digilantism, which involves extrajudicial actions like exposing perpetrators to ensure they are held accountable. Some individuals also seem to directly engage with attackers (e.g., confronting perpetrators privately or publicly, responding humorously to attacks).
In summary, the literature illustrates a spectrum of responses to TF(GB)V, ranging from self-censorship and total disengagement to active resistance and a combination of both. All forms of TF(GB)V violate basic human and democratic rights, such as the right to express one’s opinion, free speech, and live free from violence. 57 Thus, individuals affected by TF(GB)V are deprived of their basic democratic and human rights, and their consequent withdrawal from social media platforms leads to a democratic deficit with voices being silenced.
3 Research context, sampling, and data analysis
The following section outlines the research context and details the methodological approaches employed in this study.
3.1 Case selection
The decision to concentrate on Latin American countries, i.e., Costa Rica and Colombia, was influenced by several factors, including personal connections, active feminist movements, high rates of individuals identifying as BIPoC, and high numbers of TF(GB)V. Female feminist activists in all three countries use social media to communicate content related to their activism and to raise awareness, such as through Facebook pages dedicated to targets of GBV. Numbers of social media users exceed 60 % of the population in each country, with Colombia at 70.3 % and CR at 73.8 %. 74 Costa Rica and Colombia exhibit elevated levels of violence, including high homicide and feminicide rates, with Colombia having 0.7 femicides per 100.000 inhabitants and Costa Rica 0.9. It is evident that Latin America exhibits a prevalence of GBV that is among the highest globally – partly due to “deep historical and structural roots of patriarchal, discriminatory and violent cultural patterns” that “have proven among the most difficult to dismantle” (p. 2). 75 Despite existing action plans and legislation addressing GBV (e.g., Ley de Penalización de la Violencia Contra las Mujeres in Costa Rica (INAMU 2013), 76 GBV in digital spaces remains largely unaddressed in these countries. In February 2024, for instance, the Congress of the Republic of Colombia intensified the discussion on measures that could be adopted to prevent, protect, and penalize TF(GB)V (Congreso de la República de Colombia 2024). 77 Despite these efforts, or conceivably by reason of these efforts being so limited in scope, the rates of TF(GBV) remain high and those affected are neither safeguarded from the experience of violence in the first instance, nor assisted in managing it. 12
3.2 Data collection
To gain profound insights into the experiences of female feminists with TF(GB)V and their coping mechanisms, 23 in-depth interviews were conducted. Prior to conducting the interviews, risk assessments were carried out and the first author’s personal devices were encrypted to ensure data security. The participants (I0–I22) were female feminist activists who all self-identified as cis-women. The interviews were conducted in Spanish between June and August 2023. The sample comprised 16 participants from Colombia and six from Costa Rica. The interviewees represent organizations and social movements specializing in various subject matters.[5] Their agendas revolve around the defense of Indigenous rights and territories, the monitoring and reporting of femicides, global awareness rising regarding GBV, the advocacy for sexual and reproductive rights, social mobilization for gender issues, and the psychological support of individuals who have experienced TF(GB)V. The interviewees largely reflect the diversity of feminist causes championed in Latin America, although they may not fully capture the entire spectrum of grassroots feminist groups in their contexts. Their multifaceted advocacy efforts and activism unfold in urban and rural areas, engaging individuals from diverse backgrounds, including Afro-descendant, Indigenous, peasant, migrant, and mestiza women. While some groups have a long history spanning decades, others have emerged more recently in response to the ongoing challenges faced by women in their countries.
For the interviews, a semi-structured questionnaire was utilized, incorporating inquiries regarding participants’ engagement in activism, the impact of ICTs on their activism efforts, challenges encountered in their digital activism endeavors, and strategies employed to mitigate instances of TF(GB)V. We want to acknowledge that given the evolving nature of digital platforms, sociopolitical conditions, and activist strategies, both the forms of TF(GB)V and responses to it are subject to change over time. The insights presented here reflect the realities and perceptions captured during the period of data collection and may shift in future contexts. Access to interview participants was established through a combination of local NGOs, academic networks, personal contacts, and referrals, employing purposive and snowball sampling techniques. 78 , 79 All participants granted verbal informed consent and did not receive compensation for their involvement, ensuring voluntary participation and minimizing the risk of creating undue incentives. Ethical clearance was obtained from our university’s Institutional Review Board before the study, and ethical considerations were paramount throughout the research process. The study adhered to the principles of do-no-harm and the ethical guidelines outlined in the Belmont Report, given the sensitive nature of the topic. 80 The interviews were recorded via a secure recording device and transcribed offline and locally using Open AI Whisper (a speech-to-text model in Python), with corrections applied manually during the process. Upon completion of the transcription process, anonymized transcripts, free of any personal identifiers, were securely stored in encrypted form and are accessible only to the research team, ensuring the confidentiality and privacy of participants.
3.3 Data analysis
The study was based on the methodology[6] of Grounded Theory (GT), building upon its theoretical underpinnings and core principles. Particularly GT’s emphasis on openness to emergent themes, iterative coding, and context-sensitive analysis informed the data analysis of this study. The analytical process (i.e., the method) used GT techniques, such as the different stages of coding (open, axial, and selective), as a flexible guide rather than a rigid framework, following Charmaz’ 81 approach of constructivist GT. This allowed for both a structured process of data analysis and the flexibility to work iteratively and cyclically, meaning that the stages could inform each other. While this study’s primary aim was not to develop a new formal theory, the tools offered by GT were used to sensitize the analysis, allowing for emergent patterns and context-specific interpretations grounded in the interviewee’s experiences. Thus, it enables a greater sensitivity to contextual factors (of which the analysis might go beyond strict GT procedures) and enhanced reflexivity of the researcher’s positionality, thereby prioritizing analytical richness over procedural purity. 81 Our coding process via the data-secure software MAXQDA began with detailed coding, followed by creating sub-categories, including “types of TF(GB)V”, “potential perpetrators”, and “chilling effect”, through code grouping (see excerpt in Appendix, Table 2). Guided by concepts from prior research, such as forms of TF(GB)V (e.g., doxing, cyberstalking), chilling effects (e.g., self-censorship), and resistance strategies, initial coding categories were shaped. Through inductive engagement with the data, additional grounded categories emerged, such as distrust in official institutions, perceived impunity, generalized societal violence, infrastructural deficits, and the vulnerability of female feminists.
The initial categorization was collaboratively discussed by the first two authors, and the agreed-upon approach served as the foundation for the subsequent stages of analysis. Through an iterative process, additional codes were identified and organized into overarching thematic categories. In total, we have identified 12 main categories, including 2.381 codes. Throughout the coding process, we engaged in a constant comparison between our data and relevant literature. Through this iterative analytical process, data excerpts were continuously organized and reorganized to uncover patterns, relationships, and emergent themes grounded in the participants’ narratives. 81 Recognizing that our positionality influences both the interpretation and coding of data, we find it important to be transparent about our identities as researchers. Both researchers identify as cis-gendered women, one from Colombia and one from Germany. The two researchers critically reflected on their positionalities throughout the coding process. This involved acknowledging how their personal identities, cultural backgrounds, and lived experiences might shape their interpretations of the data, thereby fostering a more thoughtful and reflexive approach to the research. While the study’s findings are not intended to be representative, they aim to offer profound, contextually specific insights into how Costa Rican and Colombian female feminists encounter TF(GB)V.
4 Empirical insights into patterns and responses to technology-facilitated (gender-based) violence from Latin American female feminists
Based on the data analysis, the following section presents the most relevant (sub-)categories used to address our research question. We focus on three key aspects: (1) technology-facilitated (gender-based) violence, (2) the chilling effect, and (3) resistance – all of which are directly connected to participants’ responses and the broader implications of their experiences. To further contextualize these reactions, we also introduce selected contextual factors – derived from one of the main categories (context factors) – that offer insight into the conditions shaping how and why interviewees responded in particular ways. Generally, it is important to consider that these insights reflect only the period when the interviews were conducted. The interviewees’ reactions and coping strategies may have evolved or changed since then.
4.1 Technology-facilitated (gender-based) violence
Before addressing TF(GB)V, all interviewees emphasized that both gender-based violence and violence against activists are alarmingly prevalent in their respective countries. This broad context of “normalized” violence forms the backdrop against which their digital experiences unfold. When using social media, all interviewees have reported having experienced at least one incident of TF(GB)V, with instances including (misogynistic) hate speech, bot attacks, doxing, hacking, and death threats (e.g., I1, I4, I13, I22). The indication that most female feminists have received threatening calls, texts, WhatsApp messages, and pamphlets suggests that their private information was accessible to different actors, including illegal armed ones, who are believed to utilize ICTs to target and surveil them. I9 shared: “We know that different armed actors may also be, let’s say, using technologies for tracking and so on”. Similarly, I8 and I0 reported feeling persecuted and under surveillance due to their efforts to publicly denounce alleged perpetrators of GBV at their work. This sense of pervasive surveillance is closely tied to how TF(GB)V is experienced differently from physical violence by some interviewees. I15 reflected on this distinction, stating that one of the most unsettling aspects of TFV is the anonymity of the perpetrators:
When it’s anonymous, when you don’t know who it is – it’s terrifying. when you don’t know who’s behind it, it’s overwhelming because you don’t know what’s happening. Psychologically and consciously, your mind creates an image – it can be the worst-case scenario, like thinking someone is already following you. You develop paranoia, the feeling of being watched. It becomes all-encompassing. In that sense, it can be even worse – a deep psychological impact.
The interviewees illustrate that these incidents have frequently targeted their physical appearance and employed derogatory language to discredit their public image and activism. Furthermore, numerous interviewees shared that they have received threatening messages intruding upon the most intimate aspects of their lives, including death threats, threats of sexual violence, and violence against their families (I9, I12–13, I19–21).[7] For example, I4 shared: “I have received messages containing humiliating language about the way I look, comments about my body, my family, and my partner. […] These constant attacks are different from those directed at men. They reflect sexualized violence rooted in patriarchal society and machismo. That’s why I believe there are threats specifically targeting women’s bodies”. The interviewees explained that they are targeted by TF(GB)V because of their activism and causes that are often perceived as controversial in their home countries, where conservatives and patriarchal traditions prevail. I22 mentioned, “we do post things in support of women. We work in communities on women’s empowerment, right? But when it comes to visibility, we don’t like to expose ourselves, you know? Because of that same fear of digital violence – where just one comment can get you targeted, and it’s like … let’s say, it’s like being marked, stained with the mark of the devil”.
According to most interviewees, the fact of being a woman personalizes the threats they face, often manifesting as identity-based attacks. I9 shared that she had received numerous messages containing threats of sexual violence, including “threats to be raped”. Furthermore, I9 noted that traditional gender roles, which portray women as caregivers and mothers, make threats against their children particularly common and effective. Furthermore, in relation to intimate aspects of their personal lives, I9 further emphasized that attacks on female feminists target their
intimacy and bodies. And another aspect that we could say is a constant, differentiated attack from men is the issue of sexual violence, also by patriarchal society and macho violence. So, I believe there is a specific threat regarding the attack on women’s bodies. The messages are of this type of threat of being raped, of not being able to travel certain territories, certain spaces at certain times, about the control and life of women’s bodies that add to, let’s say, this patriarchal structure of violence against women, they add up or become visible in the digital scenario.
In addition to misogynistic discourses deeming women inadequate for assuming leadership roles and vocal positions in public discourse, entrenched racism has solidified into enduring sociocultural beliefs, contributing to heightened violence against women and BIPoCs in social media platforms:
[…] in the comments, one can perceive that they are more offensive […] when it comes to people with diverse bodies, when it comes to people with diverse sexualities, when it comes to black or Afro-descendant individuals. We see a greater attack when […] the diversity is accentuated (I20).
In essence, deeply ingrained racism and sexism, combined with longstanding socioeconomic disparities and institutional neglect, have exacerbated the marginalization of, amongst others, ethnic communities. In the Colombian context, regions rich in natural resources hold significant geostrategic importance for the territorial dominance of illegal armed groups, such as the National Liberation Army (ELN), and economic pursuits of extractive industries. 82 This creates fertile ground for female feminists to confront disproportionate levels of structural violence as they strive to transform the material realities of their territories from a gender-sensitive standpoint. While doing so, the provision of official support, for example by the government, appears to be limited, thereby engendering feelings of distrust in official institutions. I13 disclosed that the level of violence within her territory is at an alarming level and that there are a significant number of armed groups operating in the area. However, there is an absence of any form of early warning from the government, and the government is not taking any action. Furthermore, I9 shared that while the government’s protective measures are ineffective, they are particularly deficient in safeguarding women.
Now, it must be said that when it comes to protection, what we encounter in most cases with women is…let’s say, an inefficient government when it comes to responding to the protection needs of women. So, the entire government infrastructure is not adequately prepared to protect all women defenders, considering all the conditions that exist in the territories. […] It’s a very high level of distrust and a very high level of insecurity that also manifests in the digital sphere.
These testimonies exemplify the broader pattern of institutional distrust expressed by many interviewees. Furthermore, interviewee 11 noted that even some NGOs had proposed implementing panic buttons as a protective measure. While such tools were acknowledged as potentially useful in theory, she questioned their practical value due to widespread skepticism toward law enforcement. As she put it, activating a panic button seemed pointless: “What for?” – underscoring her belief that police intervention was either unlikely to occur or ineffective when it did.
4.2 Examples of chilling
Most interviewees described how such experiences of TF(GB)V impacted their everyday lives and that as a result they took measures to mitigate the associated harm. During the interviewees it became clear, that the lines between TFV and physical violence are frequently blurred and that individuals who experience TF(GBV) also often experience physical violence and vice versa. In instances where the danger of physical harm was present, interviewees reported having to relocate. For instance, I12 reported having to move multiple times after receiving online threats, driven by concerns pertaining to her own safety and that of her family. In other instances, interviewees decided to leave digital spaces or reduce their online activity to avoid experiencing further digital violence and to prevent this violence spilling into the physical world. For example, in two instances where interviewees decided to leave digital spaces, potential physical risks appear to have deterred them from maintaining the same level of online engagement as before. Despite the harassment occurring on social media, the threats extended to their inner circles, compelling them to take additional security measures and adopt self-censorship tactics to avoid being in the spotlight: “Even our female [colleague] would tell us not to meet on [location] or would tell us not to work on gender issues anymore” (I8).
In general, surveillance was identified as a potential factor contributing to some of the interviewees’ re-evaluation of their online activity. Another aspect that has led I13 to abstain from social media for several weeks was the emotional distress caused by a deepfake depicting her as being armed. Despite her consistent and peaceful opposition to extractive economies in the region, she received numerous messages labelling her as a “murderer” after the publication of the deepfake. Other reasons for disengaging from social media for several months were a series of racist and misogynist insults on Facebook (I19, I21). I21 shared:
About a month and a half ago, we had a case of harassment from a woman that started as a form of false exposure against the media, but mainly against me, in a very violent manner, and I think that changed my life forever with Twitter […]. I absolutely do not want to be public about anything […] I feel like I cannot do it as this woman took away that right from me.
This example illustrates that, in certain instances, activists may receive violent messages for a comparatively brief period before deciding to abstain from specific social media platforms. Conversely, in other cases, interviewees have reportedly received threats over an extended duration, ranging from months to years, before temporarily suspending their online engagement. This observation shows that the frequency or duration of threats made is not an objectively determining factor in the outcomes observed. The interviews do not indicate a clear trend but instead highlight that these decisions are highly individual, influenced by various external and internal factors, including the availability of support and whether close family members are also targeted.
The deterrent effects of TF(GB)V similarly affected female feminists who have not personally experienced threats to their physical integrity or that of their relatives. In this sense, some have opted to engage cautiously in online spaces, often adopting anonymous profiles due to the fear of encountering technology-facilitated (gender-based) violence and stigmatization and showing reluctance to express certain viewpoints. This hesitancy is rooted not only in the fear of TFV and stigmatization (I1, I4, I10, I13, I22), but also, for instance, in the context of Costa Rica, where abortion remains criminalized, in concerns about potential legal repercussions for guiding pregnant individuals seeking to interrupt their pregnancies. Overall, this apprehension makes it difficult to find women willing to assume prominent spokesperson roles: “[…] often people do not want to be spokespersons, they do not want to speak publicly about a topic, which is completely understandable due to the risk involved”.
As demonstrated by these example, certain incidents of TF(GB)V have resulted in analog consequences, such as relocation and the rejection of high-level positions, while others have opted to disengage from online spaces, seeking professional support (e.g., after a doxing incident (I10)), and increased skepticism toward certain (especially unfamiliar) social media platforms and digital technologies. For instance, I9 expressed a general distrust toward newer technologies due to a “general sense of distrust, especially toward social networks”. Following their exposure to TF(GB)V, most interviewees demonstrated some level of self-censorship and reduced their social media activity, particularly on platforms where they faced increased harassment. I19 mentioned: “because of the violence, I just withdrew from social media for at least four months. I censored myself”. Furthermore, three interviewees reported completely discontinuing the use of a specific platform (I0, I8, I10). For instance, I10 described how the violence she experienced on Twitter profoundly impacted her, stating that it “changed [her] relationship with Twitter”. She explained: “I absolutely do not want to be public about anything anymore. In fact, I was on a trip at the time, and sometimes when you’re traveling, you post pictures of where you are, but I haven’t posted anything at all since then.”
4.3 Examples of resistance
In this study, none of the interviewees mentioned withdrawing completely from participation within their activist group, they described solely a temporary decrease in participation and thoroughly examined long-term prevention and coping strategies at individual and collective levels. Despite the imminent risks inherent in their activism and the resulting physiological repercussions, some interviewees have forged alliances and campaigned for greater social mobilization, as their struggles are intimately tied to securing liveable conditions for their communities (I12–13). “Life goes on, life continues with or without threats; it is something we must deal with. We must continue defending rights. We must keep reporting and keep shedding light on what is truly happening in our territory” (I12). According to the interviewees, in the absence of effective institutional protection mechanisms and prevalent impunity, certain feminist groups within Colombia and CR have united in solidarity to establish preventive measures and capacity-building mechanisms for digital security customized to the needs of high-risk activism in these poorly connected regions (I7–8, I15, I17). For instance, the NGO to which I17 belongs has provided digital security workshops to female feminists, considering their available economic and infrastructural resources for implementing basic protective measures. Acknowledging these feminists’ strong reliance on free messaging services like WhatsApp, the workshops focused on enhancing security settings on the messaging app to prevent the unintentional sharing of sensitive information. Furthermore, female feminists within ethnic communities have shown a firm commitment to empowering their communities in their pursuit of social justice. Despite facing multiple racist attacks, I19 has launched campaigns and workshops to raise awareness about racism as a colonial legacy, aiming to gradually dismantle stereotypes surrounding Indigenous women and prioritize narratives that dignify Indigenous identity over those that exoticize the realities of these territories.
In short, the chilling effects of TF(GB)V have not occurred without evident resilience and resistance. Regardless of the context surrounding their activism, eleven interviewees have established partnerships with grassroots feminist groups and institutions advocating for gender issues at local, national, and international levels. I6 shared: “we are very much connected with [other feminist groups] all over Latin America. We are in numerous group chats with feminists from the south and the north”. These alliances encompass various activities, spanning from sharing information from other groups and forging media alliances (I0, I3, I10, I20) to coordinating joint demonstrations (I3, I14), collectively monitoring and mapping feminicides across the continent (I1, I12, I15), and engaging in political advocacy (I16, I17, I20). For instance, I16 describes her involvement in developing a TFV barometer during electoral campaigns, aiming to advance legislation on TFV. Additionally, this organization provides political guidance to empower community female leaders, who, according to their research, are particularly vulnerable to encountering insults and threats that aim to undermine their intellectual capacities and physical appearance with racist and misogynistic undertones. For many interviewees, these alliances hold profound significance, offering emotional support and solidarity amidst the shared challenges women face in Latin America. Partnerships with local women’s groups play a pivotal role in establishing comprehensive mapping systems for feminicides and GBV, amplifying the voices and experiences of Afro-descendant, Indigenous, and peasant women. This is particularly crucial in regions where mainstream and centralized media lack records of feminicide cases (I15, I20). Moreover, these networks facilitate capacity-building through close collaboration and knowledge exchange, aiding in preventing further violence in the face of widespread impunity (I8–9, I17). For example, one interviewee mentioned the development of technological safeguards to combat GBV in Bogotá (Colombia). This includes a mapping application designed to pinpoint high-risk areas for women, and a video game aimed at promoting awareness of street harassment.
The prevalence of impunity significantly contributes to the reliance of female feminists on individual self-care and collective coping strategies over institutional mechanisms. I19 both emphasized the role of protecting other women defenders, their territories, lives, and dignity, while also raising the question: “But then – who protects us?” This deficiency stems from various yet interconnected factors, as revealed in the interviews. Firstly, the interviewees highlight that there is a lack of state recognition regarding the extent of TF(GB)V. Consequently, no specific legal framework addressing TF(GB)V seems to typify its diverse forms and results in adequate legal approaches. Secondly, reports of TF(GB)V often seem fail to prompt thorough investigations due to insufficient technical infrastructure and capacity within public prosecutor’s offices. Additionally, personnel lack adequate sensitivity and training to grasp the seriousness of potential risks, leading to the dismissal of reports and further victimization. Thirdly, there seems to be insufficient accountability among media platforms regarding measures to identify and counteract content that may incite violence.
While the geographical context does not seem to determine whether female feminists form feminist solidarity alliances, it does appear to influence their ability to develop large-scale technological safeguards for enhancing digital security. The interviews reveal that there are often significant disparities between rural and urban areas. These are exemplified by extensive infrastructure and connectivity gaps, digital illiteracy and language barriers, and inadequate technological equipment among populations residing outside major urban centers. In line with this observation, capacity-building efforts, including digital security education and workshops in rural areas, are overwhelmingly undertaken by urban-based feminist organizations to bridge this gap. I16 shared: “We had to do a huge amount of digital literacy for the women who only knew how to use messenger chats and answer phone calls. Nothing else. Then you start dealing with other things, other platforms like Instagram. Also to understand the dangers of that.” Despite this tendency, the interview findings also highlight the readiness of female feminists, irrespective of their geographical context, to adopt individual self-care strategies using the resources available to them. Twelve of the interviewees implemented digital security measures at an individual level. These encompassed limiting discussions of sensitive topics to face-to-face interactions, controlling access to WhatsApp groups, using nicknames, declining calls from unknown numbers, refraining from sharing personal information, ignoring, and deleting offensive messages and opting for more secure platforms. Moreover, I13 mentioned constantly reporting offensive comments and messages on social media platforms and to official institutions: “I report. I always take screenshots and say ‘this happened to me this way’”. In addition to personal reporting, I19 described seeking assistance from an NGO to address violent messages she had received. However, the reporting of such incidents remains rare, largely due to fears of escalating violence, skepticism, the uncertainty of whom to denounce since many perpetrators remain anonymous (I21), and prior negative experiences. As I2 explained: “We are experiencing outrageous acts where trolls and men deliberately publish photos of feminists’ children – photos that reveal which school they attend. Even when this content is removed, nothing changes”. Furthermore, I2 shared that the social media platforms have not taken any measures to protect and defend her, nor to provide her with tools that could be useful in dealing with her “aggressor”. These testimonies highlight a pervasive sense of impunity: although specific harmful content may be taken down, there are no meaningful consequences or protective measures following reports. Such experiences contribute to ongoing frustration and reluctance to report incidents, underscoring the profound distrust in official institutions previously discussed in Section 4.1.
5 Discussion
While our findings resonate with broader theoretical frameworks, such as TF(GB)V, chilling effects, and feminist resistance, their grounding in the specific sociopolitical realities of Colombia and Costa Rica offers important contributions. Drawing from these localized understandings, we offer a set of considerations for the HCI community grounded in a critical, feminist perspective.
5.1 Contextualizing technology-facilitated (gender-based) violence against female feminists from Latin America
Social media platforms are often celebrated for fostering participation and serving as vital spaces for feminist advocacy and mobilization. 83 However, our findings in line with earlier work by Bernal Sarmiento et al. 41 and Brydolf-Horwitz, 14 also reveal that these platforms can simultaneously function as sites of exclusion and (gender-based) violence. The rise of TF(GB)V and the reproduction of misogynistic structures online challenges the often rather optimistic view that social media “empowers” women to engage more actively. Empirical studies reveal that women and other frequently marginalized individuals are disproportionately targeted by TF(GB)V. 13 , 27 The prevalence of (misogynistic) hate speech, doxing, and death threats across the interviews suggest that TF(GB)V operates not as an isolated incident but as part of a broader, systemic pattern of online gendered repression aimed at silencing dissent and feminist advocacy. Interestingly, the interviews revealed no clear differences in the types of TF(GB)V or responses. However, this was not the primary focus of the study, and the findings should not be considered highly conclusive due to the limited sample size; they intended to provide an initial impression of the phenomenon and to lay the groundwork for future research. Numerous interviews noted that topics such as reproductive rights – including access to abortion, the fight against GBV – including feminicides, and queer rights are often seen as controversial and frequently provoke both online and physical attacks. The persistent levels of violence, along with ongoing public debates and restrictive legal frameworks, such as the criminalization of abortion in Costa Rica, reflects the continued influence of patriarchal and conservative structures across the region. While the specific laws and degrees of restriction vary, numerous Latin American countries share broader struggles against gendered power dynamics embedded in institutional and cultural systems. Overall, the prevalence of widespread misogyny and high levels of physical violence often intensify incidents of TF(GB)V, reinforcing Jane’s 10 assertions. The interviewees emphasized that the experience of TF(GB)V, as well as the responses to it are shaped by numerous context factors, which can be specific to the country but may also be more nuanced, relating to regional, communal, or even individual circumstances. Important influences to consider are, amongst others: (1) socio-political conditions (e.g., distrust in official institutions and social exclusion (e.g., Ref. 84]), (2) technological access and infrastructure (e.g., limited internet connectivity or digital literacy (e.g., Ref. 85]), (3) cultural norms (e.g., the persistence of strong traditional gender norms (e.g., Ref. 86]), and (4) legal frameworks (e.g., insufficient or poorly enforced regulations addressing TF(GB)V). For instance, widespread lack of trust in state institutions often discourages individuals from reporting incidents of TF(GB)V (e.g., I2). Many interviewees described their countries as having long-standing histories of state violence, impunity for crimes against women, and systemic patterns of institutional neglect (e.g., I4, I9, I19). Participants expressed concerns about victim-blaming, police inaction, and the perception that TF(GB)V is not treated as a serious offense by legal authorities. This institutional distrust is not only rooted in personal experiences but also reflects broader social patterns of discrimination and exclusion. Within such patriarchal structures, the normalization of TF(GB)V appears to be both a symptom and a consequence of this systemic failure to protect. Moreover, numerous interviewees stated that reporting can potentially increase the risk of harm.
Another important finding is that female feminist activists seem to especially prone to TF(GB)V due to the intersection of their activism and their gender identity. While engagement in (online) activism in general increases the vulnerability of individuals by increasing their public visibility, the controversy of feminist topics that feminist activists work on elevates this vulnerability even further. Numerous interviews noted that topics such as reproductive rights – including access to abortion, the fight against GBV – including feminicides, and queer rights are often seen as controversial and frequently provoke both online and physical attacks. Furthermore, however, some interviewees noted being targeted not only because of their activism and the topics they are fighting for but also due to their gender, or more specifically, the intersection of both factors. Explicit gender-related hate was demonstrated to be highly personalized (e.g., I9), targeted the female identity or the bodies of the activists, but also close family members, abusing the females’ roles as caregivers. This aligns with other empirical studies, which show that individuals advocating for or reporting on issues perceived as controversial are frequently targeted. 34 , 64 , 65 Additionally, numerous studies have highlighted that often marginalized individuals and groups, such as women and BIPoC, are often more affected by digital and physical violence. 45 , 67 , 87 This highlights the importance of recognizing the intersectional threats associated with TF(GB)V, such as racism and homophobia. Due to these intersecting forms of violence, it can sometimes be difficult to definitively determine whether a person is targeted because of their identity or the cause they are advocating for or because of both.
Additionally, as sometimes hinted at in the literature, this study strongly underlines the notion of the line between technology-facilitated and physical violence being blurred. 88 Several interviews recounted experiencing TFV in the form of threats of physical assault. In some cases, those threats led not only to reactions in the digital sphere (e.g. blocking, chilling, etc.) but also to far-reaching consequences in the physical sphere, including relocation. Emotional reaction to digital violence, such as fear and distrust, have also been reported to stretch beyond the digital sphere, affecting those targeted in their everyday lives. This interconnectivity between the digital and physical sphere requires further attention in future research. As Chen et al. 40 indicate, digital and physical violence should not be treated as one and the same in different spheres, as they present different challenges and require different methods of prevention and mitigation. Still, both forms seem to strongly inform each other and gaining a better understanding of this bilateral influence can help reduce violence in the future.
5.2 Shrinking secure spaces: consequences for political and social participation and responses to TF(GB)V
Building on previous (empirical) research on TF(GB)V and its consequences (see Section 2), our findings provide insights into how Costa Rican and Colombian female feminists respond to and cope with TF(GB)V. So far, this topic has received little (academic) attention, reflecting a broader gap in the literature, which often overlooks (female) activists – particularly female feminists and those from Latin America. Research on TF(GB)V targeting female feminists is crucial for understanding whether, as Jane 8 puts it, they are fighting, by e.g., developing coping strategies to resist TF(GB)V, remaining active online, and continuing their activism, or fleeing by consciously distancing themselves from certain digital spaces to protect their well-being,[8] or engaging in both approaches simultaneously. In cases of self-censorship and withdrawal, digital engagement will be reduced. Over time, this constrained participation not only (further) minimizes feminist voices in online discourse but also undermines broader democratic processes by narrowing the diversity of perspectives in online public debate. In contrast to many other actors, activists typically operate in a rather personal capacity and rely on grassroots, peer-led support networks, such as feminist collectives, for, amongst others, solidarity and protection. This reliance reflects a broader systemic issue: the inadequacy of institutional and platform-level responses to TF(GB)V, which forces activists to assume responsibility for their own safety in the absence of formalized support.
By the time of the interview, social media and posting behaviors were often influenced by the TF(GB)V they had experienced, with some individuals withdrawing more than others. The interviews reveal that many participants have adopted both fighting and flighting mechanisms over time, with some even adopting both simultaneously (see Figure 1).
This supports the notion that fight and flight mechanisms are not mutually exclusive binary opposites but can instead, as Jane 8 demonstrated, coexist, inform each other and evolve over time. This observation is in alignment with the tenets of feminist HCI, which advocate for pluralism and the challenging of binary response models. 26 The coexistence of both chilling and resistance responses demonstrates that female feminists are not a homogenous group but that they navigate incidents of TF(GB)V with nuanced, context-dependent strategies, building upon individual cost-benefit evaluations. Feminist HCI also acknowledges the complexity of digital agency and underscores the importance of reflecting on local circumstances. 26 Notably, none of the interviewees mentioned completely disconnecting from their group, showing that, despite restricting their online behavior, they remained connected to other feminist group members, offering support. This suggests that collective identity and solidarity play an important role in this regard, as support networks function as both emotional anchors and political instruments, thereby facilitating the sustenance of resistance in the face of adversity. 89 Moreover, the interviewees highlighted that resistance if often a reaction not only to the direct threat, rather is part of an ongoing historically rooted struggle against patriarchy, state neglect, and colonial power structures.
Some influencing factors mentioned were the personalization of threats, fear of surveillance and that someone closely related gets attacked (e.g., I15), the rural-urban divide, controversial topics, lacking regulation, and subjective emotionality. Drawing on Liang’s 49 influencing factors, our results (illustrated in Figure 1) indicate that personal factors were the most frequently cited and that they have substantial impact on the interviewees’ reactions following incidents of TF(GBV). In comparison, social and platform factors elicited comparatively less attention. Thus, whether an individual continues to be vocal online depends on a range of individual psychological, social, and economic factors, leading to a subjective analysis of perceived risk to oneself and one’s friends and family. Interviewees consistently mentioned that they personally evaluate the costs and benefits to determine whether to maintain, adjust, or withdraw from their online presence. The degree of visibility and the issues they champion have been shown to influence the risks of violence that female feminist activists face, making them particularly susceptible to violent attacks and death threats. Additionally, regardless of context and geographical setting, personal (often embodied) threats and those directed at family members particularly provoke feelings of paranoia, persecution, fear, and helplessness (I12), often leading to stronger chilling effects, including self-censorship. This aligns with Nadim et al. (2021) and Penney, 56 who posited that when threats are perceived as more personal, they are more likely to evoke feelings of fear and elicit behaviors such as avoidance, influencing how public discourse is accessed and who gets to speak. At the same time, these incidents have compelled some of our interviewees to adopt additional security measures irrespective of their specific circumstances, recognizing the potential for digital threats to escalate into physical violence and the concurrency of self-silencing and resistance mechanisms. The decision by some interviewees to partially or fully withdraw from (certain) online spaces or to engage in self-censorship, consistent with findings from prior studies with female (journalists) has significant implications for democratic engagement and activist participation. 12 , 34 The withdrawal of individual or communities, especially among marginalized groups undermines efforts to e.g., challenge oppressive systems and advance gender equality. 28 Furthermore, it can facilitate the rapid dissemination of misogynistic and anti-democratic narratives. In instances where interviewees reported to continue being present online, the connection of their activism to personal stories (e.g., because someone close has experienced GBV) seem to have motivated them to take greater risks.
The ease with which TF(GB)V can be replicated, go viral, and remain anonymous compared to offline contexts (I21) causes profound mental and physiological harm, while also complicating efforts to proper accountability and reparation. Echoing Jane’s 8 fight responses, numerous female feminists resorted to individual protection mechanisms to navigate the risks associated with their activism, as the lack of support and protection from e.g., digital platforms and government compelled them to take measures for their own safety. Thereby, this study supports empirical findings revealing that many female feminists lack trust in institutional action, leading them to prioritize “personal and collective protective measures” over relying on “state-led safeguards” (p. 23) 18 . Concerning the collective sphere, our findings show that many interviewees generated an understanding of collective security and fostered alliances and partnerships with other feminist groups to join forces aimed at addressing common challenges. In his context, the strategic structures that many activists move within offer an advantage over less organized targets of violence. Networks and structures originally established for activist reasons thereby serve the additional function of a support and security network. Vice versa, newly formed support alliances in response to TF(GB)V can additionally be used for activist reasons. In accordance with Pedraza Bucio 22 and Abascal Mena and Pedraza Bucio, 90 especially feminist groups based in urban areas particularly championed initiatives for digital capacity-building among rural-based activist networks. These efforts contributed to bridging the digital literacy gap and provided context-sensitive good practices and tools to enhance their digital security. Moreover, some of them engaged in digilantism practices to publicly expose alleged aggressors of GBV, particularly within work settings, as discussed by Jane. 8 Notably, the reactions were marked by relentless intimidation and harassment.
5.3 Reflections for HCI
While the interviewees already use various coping and security strategies, we argue that they should not bear the greater responsibility for ensuring their digital security and privacy: Social media platforms also play a critical role in reducing TF(GB)V and adopting an intersectional approach that recognizes how individuals with different identities, including gender, race, sexuality, or disability, experience TF(GB)V in unique ways. Instead of meeting this responsibility, misogynistic discourses that trigger or normalize GBV are often solidified into platform’s structures and institutional cultures, thereby overlooking the disproportionate challenges faced by female feminists in Colombia and Costa Rica, as they consistently advocate for feminist causes. This persistence of TF(GB)V reveals a systemic failure, amongst others by social media platforms, to address gendered violence (I2). On social media numerous affordances do not operate in isolation – they gain meaning through how people use them within specific social contexts. 29 , 42 , 43 , 91 Whilst numerous platform affordances, such as anonymity, visibility, communication, sharing, and automation, are frequently perceived as rather positive in HCI, the present findings demonstrate how these same affordances can be co-opted to sustain or intensify gender-based power imbalances. For instance, anonymity might enable users to harass women without accountability, while visibility and virality can be manipulated to shame or silence those who speak out. These technological features, when actualized in settings where misogyny and gender inequality is normalized, can facilitate various forms of TF(GB)V, such as cyberstalking or image-based abuse. Therefore, understanding affordances as socially and culturally situated helps explain why and how certain technologies may disproportionately harm often marginalized users, including women and gender-diverse individuals in patriarchal contexts. 48 , 92 , 93 Salamoun et al., 42 drawing on both feminist and affordance theory, stress the importance of considering the cultural, historical, political, and gendered dimensions of users’ lived contexts. They argue that affordances need to be analyzed not solely in terms of their technical functionality, but also in relation to the social power structures they both reflect and reinforce. In line with this, numerous critical and feminist HCI scholars underscore the importance of centering the experiences and needs of those most frequently excluded, such as women, queer communities, and other marginalized individuals across diverse contexts, including Latin America. 19 , 26 , 44 , 94 , 95 Thereby, they call for solutions that are not only technically effective but also addressing the users’ material and social realities. In relation to this, Sultana et al. 95 explain that meaningful and responsible design in deeply patriarchal contexts requires working within existing power structures, rather than seeking to immediately overturn them, by enabling situated, context-sensitive interventions that respect local realties while still opening space for transformation. They propose ways to design within the patriarchal system, even if they wish to subvert it.
In sum, effectively addressing TF(GB)V requires a holistic approach, moving beyond technical solutions and towards systemic accountability, including platform-level responsibility. The failure to adopt intersectional and gender-sensitive design strategies reflects a broader pattern of exclusion in technological development. 96 Although dismantling such discourses requires profound social changes, institutional and political reforms are essential to gradually transform the culture of impunity and recognize TFV as a critical issue. Suzor et al. 97 argue that based on the United Nations Guiding Principles on Business and Human Rights (UNGPs), the platforms have responsibilities to prevent and counter TF(GB)V actively (provider responsibility). They list several steps platforms should follow in this regard: increasing transparency of internal processes, identifying impacts on human rights, developing policies to respond to abuse, and mitigating harm by enacting these policies. Additionally, they advocate for “social pressure” and “binding legal obligations” to hold the platforms accountable (p. 87), ensuring that they don’t merely “defuse the tensions without any real impact” on their daily business (p. 92). So far, some forms of TFV, such as hate speech, have been addressed through the application of natural language processing (NLP) and machine learning techniques aimed at classifying and automatically detecting abusive language. While these approaches show potential, they often fall short by overlooking critical contextual factors, socio-cultural dynamics, and linguistic nuances that shape how violence is enacted and perceived. 27 Therefore, platforms should implement robust, multilingual and multimodal content moderation – a topic that is still highly discussed: While many urge for stricter content moderation and control, others, including Meta CEO Mark Zuckerberg, 98 argue for loser content moderation policies, with a view to preserving “free speech” without restrictions. 98 Several studies have demonstrated that a lack of fact-checking and insufficient content moderation increase (gender-based) violence, potentially causing individuals to withdraw from online spaces. 99 , 100 Besides this, it is important to acknowledge that content moderation practices on social media platforms have the potential to disproportionately impact marginalized groups, since “treating content and users as equal entities falsely presumes that their underlying identities and experiences are equitable” (p. 2) 4 . For instance, these practices may involve the censorship of representations of women’s bodies, or the misclassification of reclaimed language used by feminist or queer communities as hate speech. This is because automated moderation tools often lack the context to understand that some terms are used in empowering ways and not as attacks: For example, the word “slut” is commonly recognized as a derogatory term and flagged as hate speech by automated systems. But in some contexts, this term has been reclaimed and thus used intentionally by individuals or communities to challenge and subvert its negative connotation, transforming it into a symbol of sexual agency or resistance. Furthermore, sometimes, individuals who have encountered harmful content re-post it to raise awareness and draw attention to the problem. Subsequently, these posts are frequently removed because they violate platform content policies designed to limit harmful material. 4 , 101
Given that certain threats are conveyed through images, sometimes containing text that is not easily processed by automated tools like bots, it is crucial to develop effective strategies for handling such incidents. This challenge is particularly significant because the content often lacks overt abusive language, making detection more difficult. 102 In relation to content moderation, the question of what is classified as “harmful” emerges, as well as the extent to which largely automated moderation systems can address this, especially given the fact that moderation policies are commonly shaped within patriarchal structures. Given the prevalence of misogynistic narratives in our society, it is highly probable that numerous of instances of TF(GBV) go unreported or unflagged. Current community guidelines, which form the basis for moderation, need to be developed with greater sensitivity to GBV. Furthermore, as these guidelines are typically applied globally, they tend to overlook crucial differences across cultural, linguistic, and regional contexts. It is therefore recommended that platforms localize their guidelines, employ a feminist and culturally sensitive lens, and increase transparency around moderation decisions. The rationale behind takedowns or inaction should be clearly communicated to foster trust and accountability. 102 Moreover, inequalities in content moderation are often fueled by the absence of financial incentives for social media companies in less “profitable markets”. 103 Here, we agree with Suzor et al. 97 that the supposed conflict between free speech and preventing abuse online is a false dilemma. It overlooks how power dynamics, systemic discrimination, and abuse limit the agency and participation of affected individuals, making it impossible to engage in online spaces fully.
Empirical evidence demonstrates that numerous existing approaches are so far ineffective, underscoring the pressing need for policy overhaul and the development of new legal, legislative, and normative solutions that adhere to international standards of free speech and privacy protection. 34 Existing efforts (e.g., the Online Safety Act 2021 in Australia) demonstrate that such gender-sensitive legislation on TFV holds promise for restoring trust in institutions and holding social media platforms accountable for either fueling hate speech, disinformation, and other forms of TF(GB)V, or for failing to prevent and address them promptly. 104 In this regard, big tech companies bear significant responsibility for creating safe online spaces that foster women’s participation online. 4
In sum, as demonstrated throughout this section, addressing TF(GB)V requires coordinated, multi-level responses that engage diverse actors and strategies in parallel (see examples in Table 1). Only through intersectional, participatory, and contextually grounded approaches digital spaces can be made safer and more inclusive.
Reflections on possible strategies to address TF(GB)V.
| Reflections for HCI | Reflections for female feminists and civil societya | Reflections for policymakers |
|---|---|---|
|
|
|
-
Source: Own depiction. aThe following reflections are offered as possible considerations rather than prescriptive recommendations. We acknowledge that those directly affected by TF(GB)V can best determine which strategies, tools and forms of support are most appropriate and effective for their specific contexts. Moreover, we acknowledge that the recommendations offered here do not resolve the deeper, structural issues, such as entrenched patriarchal norms and systemic gender inequalities. Rather, this study aims to contribute to broader efforts of raising awareness and fostering critical reflection among diverse stakeholders, encouraging more contextually informed and gender-sensitive responses.
6 Conclusions
While most studies on TF(GB)V and its consequences, such as the chilling effect, have focused on contexts in the Global North (e.g., Refs. 27],61]), this study centers the lived experiences of female feminists in Colombia and Costa Rica. These women navigate digital spaces shaped by patriarchal norms, infrastructural inequalities, and political repression. By foregrounding their perspectives, the study contributes to existing research on TF(GB)V and its responses, while also enriching the contextual understanding of feminist HCI. While grounded in existing theory, our study provides new empirical insights from a rarely examined use case. 21 Our findings largely confirm existing literature while offering important nuances and contextual refinements: (1) Although social media offers significant benefits for our interviewees, including rapid, cost-effective communication and awareness-raising, they also serve as environments where TF(GB)V can thrive; (2) Female feminists are especially prone to TF(GB)V due to the intersection of their gender identity and their activism, which is often perceived as controversial; (3) The line between digital and physical violence is blurred with both influencing each other; (4) TF(GB)V has diverse impacts, depending on individual context factors and cost-benefit evaluations and ranging from self-censorship and self-regulation to increased resilience and renewed activism; (5) Resistance (fight) and chilling (flight) mechanisms are not to be understood as mutually exclusive but can co-exist; (6) marginalized groups (including women, BIPoC, and queer individuals) face disproportionate impact from TF(GB)V and chilling seems to be more prevalent among these groups; and (7) Female feminists from Colombia and Costa Rica use their activism structures as support and security networks in response to TF(GB)V but mostly lack adequate legal, institutional and platform support to navigate these challenges.
Enhancing our understanding of the various forms of TF(GB)V, the topics that potentially trigger such violence, and the coping strategies of female activists can inform the development of more effective measures, support systems, security tools, and policy interventions to protect feminist voices and ensure their continued participation in online discussions without the fear of violence. Addressing TF(GB)V requires a comprehensive, multi-level approach, since TF(GB)V “is a complex problem that cannot be easily addressed solely by the further criminalization of harmful acts perpetrated by individual users” (p. 86) 97 and because despite its global pervasiveness, its manifestation, impact, and the efficacy of interventions are often shaped by local conditions. A coordinated response should involve multiple actors and strategies. This includes, amongst others, developing localized, inclusive, and gender-sensitive content moderation policies and technological design, strengthening transnational support networks and digital security infrastructures, enacting and enforcing clear legal frameworks, and holding platforms accountable for inaction.
Recognizing the limitations of this study, further research should encompass a broader range of countries to compare intimidation tactics and the impact of TF(GB)V in different contexts. Additionally, future investigations should explore transnational alliances to combat TF(GB)V in more depth, examining the accomplishments and challenges of uniting grassroots organizations, policymakers, technology developers, and academia to create safer online spaces for everyone.
Acknowledgments
We want to express our gratitude to the interviewees for their valuable insights and to Maike Salzmann for her thoughtful feedback. Furthermore, we would like to thank our funders for their financial support.
-
Research ethics: The study received prior approval from our university’s Institutional Review Board (EK58-2022). We followed ethical research principles, including the Belmont Report’s guidelines and the “do no harm” approach, ensuring informed consent from all participants. To protect their identities, we pseudonymized the interviews and refrained from disclosing the groups they belong to. Additionally, all interview data is now encrypted and securely stored.
-
Informed consent: Informed consent was obtained from all individuals included in this study.
-
Author contributions: All authors have accepted responsibility for the entire content of this manuscript and approved its submission.
-
Use of Large Language Models, AI and Machine Learning Tools: We have used Deepl Write for some language edditing.
-
Conflict of interest: The authors state no conflict of interest.
-
Research funding: This study was funded by the German Federal Ministry of Education and Research (BMBF) within the framework of TraCe, the Regional Research Centre on Transformations of Political Violence (01UG2203E), and by the Hessian Ministry of Higher Education, Research, Science, and the Arts as part of its joint support for the National Research Centre for Applied Cybersecurity ATHENE.
-
Data availability: Not applicable.
Table 2 presents an excerpt of the coding scheme, incorporating core categories at level 1, sub-categories at level 2, and codes at level 3. The list is not exhaustive due to the large number of categories and codes. It serves as an example.
Excerpt of the coding scheme.
| Core-category (level 1) | Sub-category (level 2) | Code(s) (level 3) |
|---|---|---|
| Violence experienced | TF(GB)V | Defamation, creation of fake photos, manipulation attempts, data theft, hacking, hate speech, revictimizing comments, threatening messages on social media, threatening messages on messenger, hacking attempt, non-consensual distribution of intimate images, interception of communication, doxing, deep fakes, bot attack, scam, phishing, cyber flashing, personalized threats, extortion |
| Physical violence | Feminicides, police violence, threatening pamphlets, death threats, physical attacks, physical surveillance, home raids, forced confinement | |
| Chilling effect | Deterrent effects of TFV | Reducing online participation, individual dilemmas on digital activism, avoiding certain social media platforms/apps, absolutely withdrawing; behavioral adjustments, loss of visible leadership |
| Resistance | Resilience building | Rapid response measures, (transnational) feminist solidarity, cooperation, protocols for reacting to TF(GB)V, collective coping strategies |
| Digital security | Getting familiar with it; not that important, not aware of digital security strategies, strong privacy settings, threat analysis, using self-deleting messages, using encrypted messaging services, regularly deleting sensitive information, not sharing real-time information, using nickname, keeping a low profile (digital hygiene) | |
| Self-care strategies | Blocking accounts, not opening messages, not answering unknown numbers/messages, using code language, reducing time spent on social media | |
| Potential perpetrators of TF(GB)V | TERF, groups opposing queer rights, unknown who it is, members of (right wing) parties, illegal armed groups, | |
| Polarizing issues that exacerbate TF(GB)V | Sexual and reproductive rights, transgender rights, intersectionality, feminicides, human rights defense, opposition to (national) governance, (political) elections, culture | |
| Context factors | Continuity of inequality, patriarchal society, existing stereotypes, sexism, racism, increasing incidents of TF(GB)V since COVID-19, exacerbated vulnerability, stigmatization of activists, distrust in state/official institutions, neglection of state support, impunity |
-
Source: Own depiction.
References
1. Morón Terrazas, S. Análisis de las movilizaciones tecnopolíticas feministas latinoamericanas en Instagram mediante un estudio de hashtags. J. Comun. Soc. 2023 (17), 69–94. https://doi.org/10.35319/jcomsoc.2023171294.Search in Google Scholar
2. Amnesty International. #ToxicTwitter: Violencia y abuso contra las mujeres en internet; Amnesty International: London, 2018. https://www.amnesty.org/en/documents/act30/8070/2018/en/.Search in Google Scholar
3. Barker, K.; Jurasz, O. Online Misogyny: A Challenge for Digital Feminism? J. Int. Aff. 2019, 72 (2), 95–114.Search in Google Scholar
4. Im, J.; Schoenebeck, S.; Iriarte, M.; Grill, G.; Wilkinson, D.; Batool, A.; Alharbi, R.; Funwie, A.; Gankhuu, T.; Gilbert, E.; Naseem, M. Women’s Perspectives on Harm and Justice After Online Harassment. Proc. ACM Hum.-Comput. Interact. 2022, 6 (CSCW), 1–23; https://doi.org/10.1145/3555775.Search in Google Scholar
5. Piatti-Crocker, A. Diffusion of #NiUnaMenos in Latin America: Social Protests Amid a Pandemic. J. Int. Wom. Stud. 2021, 22 (12), 7–24.Search in Google Scholar
6. Suárez Estrada, M. Feminist Strategies Against Digital Violence: Embodying and Politicizing the Internet. Stud. Soc. Just. 2023, 17 (2), 241–258. https://doi.org/10.26522/ssj.v17i2.3417.Search in Google Scholar
7. Nadim, M.; Fladmoe, A. Silencing Women? Gender and Online Harassment. Soc. Sci. Comput. Rev. 2021, 39 (2), 245–258. https://doi.org/10.1177/0894439319865518.Search in Google Scholar
8. Jane, E. A. Feminist Flight and Fight Responses to Gendered Cyberhate. Gend. Technol. Violence 2017, 45–61. https://doi.org/10.4324/9781315441160-4.Search in Google Scholar
9. Vlahakis, M. Breaking the Silence: Ending Online Violence and Abuse Against Women’s Rights Activists, 2018. https://www.womankind.org.uk/policy-and-campaigns/women’s-rights/violence-against-women.Search in Google Scholar
10. Jane, E. A. Back to the Kitchen, Cunt: Speaking the Unspeakable About Online Misogyny. J. Media Cult. Stud. 2014, 28 (4), 558–570. https://doi.org/10.1080/10304312.2014.924479.Search in Google Scholar
11. Lewis, R.; Rowe, M.; Wiper, C. Online/Offline Continuities: Exploring Misogyny and Hate in Online Abuse of Feminists. In Online Othering. Exploring Digital Violence and Discrimination on the Web; Lumsden, K., Harmer, E., Eds.; Palgrave Macmillan: London, 2019; pp 121–144.10.1007/978-3-030-12633-9_5Search in Google Scholar
12. The Economist Intelligence Unit. Measuring the Prevalence of Online Violence against Women, 2020. https://onlineviolencewomen.eiu.com/.Search in Google Scholar
13. Council of Europe. The Digital Dimension of Violence against Women as Addressed by the Seven Mechanisms of the EDVAW Platform, 2022. https://www.ohchr.org/sites/default/files/documents/hrbodies/cedaw/statements/2022-12-02/EDVAW-Platform-thematic-paper-on-the-digital-dimension-of-VAW_English.pdf.Search in Google Scholar
14. Brydolf-Horwitz, R. Embodied and Entangled: Slow Violence and Harm via Digital Technologies. Environ. Plan. C Politics Space 2022, 40 (2), 391–408. https://doi.org/10.1177/2399654418791825.Search in Google Scholar
15. Congressional Research Service. Indigenous Peoples in Latin America: Statistical Information, 2023. https://www.congress.gov/crs-product/R46225.Search in Google Scholar
16. ECLAC. Femicidal Violence in Figures: Latin America and the Caribbean; Economic Commission for Latin America and the Caribbean, 2023. https://oig.cepal.org/sites/default/files/s2301023_en.pdf/.Search in Google Scholar
17. Manjarrés, J.; Newton, C. InSight Crime’s 2023 Homicide Round-Up, 2023. https://insightcrime.org/news/insight-crime-2023-homicide-round-up/.Search in Google Scholar
18. Stuardo, F.; Amaro, F.; León, L.; Domingo Sagues, J.; Cabezas, G. Online Gender-Based Violence Against Women* Environmental and Human Rights Defenders in Latin America. The Cases of Ecuador, Peru and Colombia; Heinrich Böll Stiftung: Berlin, 2024.Search in Google Scholar
19. Ciolfi Felice, M.; Feldfeber, I.; Glasserman Apicella, C.; Quiroga, Y. B.; Ansaldo, J.; Lapenna, L.; García, M. Doing the Feminist Work in AI: Reflections from an AI Project in Latin America. In Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems; ACM: New York, NY, USA, 2025; pp. 1–18.10.1145/3706598.3713681Search in Google Scholar
20. Rutgers. Decoding Technology-Facilitated Gender-Based Violence: A Reality Check from Seven Countries, n.d. https://rutgers.international/resources/decoding-technology-facilitated-gender-based-violence-a-reality-check-from-seven-countries/.Search in Google Scholar
21. Wobbrock, J. O.; Kientz, J. A. Research Contributions in Human-Computer Interaction. Interactions 2016, 23 (3), 38–44. https://doi.org/10.1145/2907069.Search in Google Scholar
22. Pedraza Bucio, C. Cibermisoginia en las redes sociodigitales: claves para el análisis desde la masculinidad. Cuest. Género: Igual. Difer. 2019, 14, 51–66. https://doi.org/10.18002/cg.v0i14.5814.Search in Google Scholar
23. Büchi, M.; Festic, N.; Latzer, M. The Chilling Effects of Digital Dataveillance: A Theoretical Model and an Empirical Research Agenda. Big. Data. Soc. 2022, 9 (1), https://doi.org/10.1177/20539517211065368.Search in Google Scholar
24. Penney, J. W. Understanding Chilling Effects. Minn. Law Rev. 2022, 1451. https://doi.org/10.2139/ssrn.3855619.Search in Google Scholar
25. Warford, N.; Farber, N.; Mazurek, M. L. How Entertainment Journalists Manage Online Hate and Harassment. In Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), 2024; pp. 279–295.Search in Google Scholar
26. Bardzell, S.; Bardzell, J. Towards a Feminist HCI Methodology: Social Science, Feminism, and HCI. In CHI ’11: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Vancouver, BC, Canada, 7 May–12 May 2011; ACM: New York, NY, USA, 2011; pp. 675–684.10.1145/1978942.1979041Search in Google Scholar
27. Blackwell, L.; Dimond, J.; Schoenebeck, S.; Lampe, C. Classification and its Consequences for Online Harassment. Proc. ACM Hum.-Comput. Interact. 2017, 1 (CSCW), 1–19. https://doi.org/10.1145/3134659.Search in Google Scholar
28. Derechos Digitales América Latina. COVID-19 and the Increase of Domestic Violence Against Women in Latin America: A Digital Rights Perspective, 2023. https://www.ohchr.org/sites/default/files/2022-01/chile-derechos-digitales.pdf.Search in Google Scholar
29. Ronzhyn, A.; Cardenal, A. S.; Batlle Rubio, A. Defining Affordances in Social Media Research: A Literature Review. New Media Soc. 2023, 25 (11), 3165–3188. https://doi.org/10.1177/14614448221135187.Search in Google Scholar
30. Suárez Estrada, M.; Juarez, Y.; Piña-García, C. A. Toxic Social Media: Affective Polarization After Feminist Protests. Soc. Media. Soc. 2022, 8 (2); https://doi.org/10.1177/20563051221098343Search in Google Scholar
31. Santiago Rodríguez, A. Violencia en línea contra mujeres periodistas en Ecuador; FLACSO Ecuador: Quito, 2023.Search in Google Scholar
32. Esposito, E. Cyberviolence Against Women in Politics. In The Routledge Companion to Gender, Media and Violence; Boyle, K.; Berridge, S., Eds.; Routledge: London, 2023; pp. 462–472.10.4324/9781003200871-50Search in Google Scholar
33. Sheikh, M. M. R.; Rogers, M. M. Technology-Facilitated Sexual Violence and Abuse in Low and Middle-Income Countries: A Scoping Review. Trauma Violence Abuse 2024, 25 (2), 1614–1629. https://doi.org/10.1177/15248380231191189.Search in Google Scholar PubMed PubMed Central
34. Posetti, J.; Shabbir, N.; Maynard, D.; Bontcheva, K.; Aboulez, N. The Chilling: Global Trends in Online Violence against Women Journalists; UNESCO: New York, 2021.Search in Google Scholar
35. Hinson, L.; Müller, J.; O’Brien-Milne, L.; Wandera, N. Technology-Facilitated Gender-Based Violence: What is it, and How Do We Measure It?; International Center for Research on Women (ICRW): Washington, 2018.Search in Google Scholar
36. Vaughan, C.; Bergman, S.; Robinson, A.; Mikkelson, S. Measuring Technology-Facilitated Gender-Based Violence: A Discussion Paper, 2023. https://www.unfpa.org/sites/default/files/pub-pdf/UNFPA_Measuring%20TF%20GBV_%20A%20Discussion%20Paper_FINAL.pdf.Search in Google Scholar
37. Mitchell, M.; Wood, J.; O’Neill, T.; Wood, M.; Pervan, F.; Anderson, B.; Arpke-Wales, W. Technology-Facilitated Violence: A Conceptual Review. Criminol. Crim. Justice 2022, 25, 649–669. https://doi.org/10.1177/17488958221140549.Search in Google Scholar
38. Aghtaie, N., Gangoli, G., Eds. Understanding Gender Based Violence: National and International Contexts; Routledge: Oxfordshire, 2015.10.4324/9780203799147Search in Google Scholar
39. Powell, A.; Henry, N. Technology-Facilitated Sexual Violence Victimization: Results From an Online Survey of Australian Adults. J. Interpers. Violence 2019, 34 (17), 3637–3665. https://doi.org/10.1177/0886260516672055.Search in Google Scholar PubMed
40. Chen, Y.; McKay, D.; Anderson, K.; Andrade, R. Inclusive and Accessible Bystander Interventions for Technology Facilitated Sexual Violence. In Companion Proceedings of the ACM Web Conference 2025 (WWW Companion ’25), April 28-May 2, 2025, Sydney, NSW, Australia; Association for Computing Machinery: Sydney, 2025; pp 2772–2775.10.1145/3701716.3716879Search in Google Scholar
41. Bernal Sarmiento, C.; Lorente Acosta, M.; Roth, F.; Zambrano, M. Latin American Model Protocol for the Investigation of Gender-Related Killings of Women (Femicide/Feminicide), 2014. https://oig.cepal.org/en/documents/latin-american-model-protocol-investigation-gender-related-killings-women.Search in Google Scholar
42. Salamoun, R.; Karam, C. M.; Abdallah, C. A Feminist-Affordance Lens: Examining the Power Outcomes of the Actualization of Smartphone Affordances. Inf. Technol. People 2024, 37 (1), 51–80. https://doi.org/10.1108/ITP-06-2020-0434.Search in Google Scholar
43. Treem, J. W.; Leonardi, P. M. Social Media Use in Organizations: Exploring the Affordances of Visibility, Editability, Persistence, and Association. Ann. Int. Commun. Assoc. 2013, 36 (1), 143–189. https://doi.org/10.1080/23808985.2013.11679130.Search in Google Scholar
44. Bardzell, S. Feminist HCI. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems; ACM: New York, NY, USA, 2010; pp. 1301–1310.10.1145/1753326.1753521Search in Google Scholar
45. Fal-Dutra Santos, A.; Pourmalek, P. Preventing Violence in the Digital Age: Women Peacebuilders and Technology-Facilitated Gender-Based Violence. In Mapping Online Gender-Based Violence; Garrido, M., Ed.; UPEACE Press: San José, 2022; pp. 71–92.Search in Google Scholar
46. Mistri, S. Technology-Facilitated Violence and Abuse Against Women Human Rights Defenders: An (In)Visible Threat to Women’s Human Rights and Human Security. In (In)Security: Identifying the Invisible Disruptors of Security; Adlakha-Hutcheon, G.; Kelshall, C., Eds.; Springer Nature Switzerland: Cham, 2024; pp. 15–52.10.1007/978-3-031-67608-6_2Search in Google Scholar
47. de Oliveira Freires, M. I.; Noronha Monteiro, K. R.; Rodrigues de Sena, G.; de Araújo Silva, J. R.; da Silva Pinheiro, V. M.; Marques, A. B. Guidelines for Feminist HCI in Practice: How Far Are We? In Proceedings of the XXIII Brazilian Symposium on Human Factors in Computing Systems; ACM: New York, NY, USA, 2024; pp. 1–12.10.1145/3702038.3702069Search in Google Scholar
48. Higson, C.; Ó Cluanaig, D.; Ravi, A. G.; Steudtner, P. Holistic Security: A Strategy Manual for Human Rights Defenders, 2016. https://holistic-security.org/ckeditor_assets/attachments/61/hs_complete_hires.pdf.Search in Google Scholar
49. Liang, J. “Dancing in Chains”: Chilling Effects of Content Creators on Chinese Social Media. Deviant Behav. 2024, 45 (10), 1468–1481. https://doi.org/10.1080/01639625.2024.2304038.Search in Google Scholar
50. Amnesty International. Women Abused on Twitter Every 30 Seconds – New Study, 2018. https://www.amnesty.org.uk/press-releases/women-abused-twitter-every-30-seconds-new-study.Search in Google Scholar
51. Citron, D. K.; Pasquale, F. The Scored Society: Due Process for Automated Predictions. Wash. Law Rev. 2014, 89, 1–34.Search in Google Scholar
52. Henry, N.; Powell, A. Embodied Harms: Gender, Shame, and Technology-Facilitated Sexual Violence. Violence Against Women 2015, 21 (6), 758–779. https://doi.org/10.1177/1077801215576581.Search in Google Scholar PubMed
53. Olson, C. C.; LaPoe, V. Combating the Digital Spiral of Silence: Academic Activists versus Social Media Trolls. In Mediating Misogyny: Gender, Technology, and Harassment; Vickery, J. R., Everbach, T., Eds.; Palgrave Macmillan: London, 2018; pp 271–291.10.1007/978-3-319-72917-6_14Search in Google Scholar
54. Sobieraj, S. Bitch, Slut, Skank, Cunt: Patterned Resistance to Women’s Visibility in Digital Publics. Inf. Commun. Soc. 2018, 21 (11), 1700–1714. https://doi.org/10.1080/1369118X.2017.1348535.Search in Google Scholar
55. Murray, D.; Fussey, P.; Hove, K.; Wakabi, W.; Kimumwe, P.; Saki, O.; Stevens, A. The Chilling Effects of Surveillance and Human Rights: Insights from Qualitative Research in Uganda and Zimbabwe. J. Hum. Rights Pract. 2024, 16 (1), 397–412. https://doi.org/10.1093/jhuman/huad020.Search in Google Scholar
56. Penney, J. W. Chilling Effects in the Internet Age: Three Case Studies; University of Oxford: Oxford, 2015.Search in Google Scholar
57. Schauer, F. Fear, Risk and the First Amendment: Unraveling the Chilling Effect. Boston Univ. Law Rev. 1978, 685–732.Search in Google Scholar
58. Sultana, S.; Deb, M.; Bhattacharjee, A.; Hasan, S.; Alam, S. M. R.; Chakraborty, T.; Ahmed, S. I. ‘Unmochon’: A Tool to Combat Online Sexual Harassment over Facebook Messenger. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems; ACM: New York, NY, USA, 2021; pp. 1–18.10.1145/3411764.3445154Search in Google Scholar
59. Ong, E. Online Repression and Self-Censorship: Evidence from Southeast Asia. Gov. Oppos. 2021, 56 (1), 141–162. https://doi.org/10.1017/gov.2019.18.Search in Google Scholar
60. Vela, E.; Smith, E. La violencia de género en México y las tecnologías de la información. In Internet En México. Derechos Humanos En El Entorno Digital, 2016; pp. 57–117.Search in Google Scholar
61. HateAid; Koch, L.; Voggenreiter, A.; Steinert, J. Angegriffen & alleingelassen. Wie sich digitale Gewalt auf politisches Engagement auswirkt. Ein Lagebild: Berlin, 2025. https://hateaid.org/wp-content/uploads/2025/01/hateaid-tum-studie-angegriffen-und-alleingelassen-kurzfassung-2025.pdf.Search in Google Scholar
62. Bansal, V.; Rezwan, M.; Iyer, M.; Leasure, E.; Roth, C.; Pal, P.; Hinson, L. A Scoping Review of Technology-Facilitated Gender-Based Violence in Low- and Middle-Income Countries Across Asia. Trauma Violence Abuse 2024, 25 (1), 463–475. https://doi.org/10.1177/15248380231154614.Search in Google Scholar PubMed
63. Soto, C. A. A.; Sánchez, K. D. V. Violencia en Internet contra feministas y otras activistas chilenas. Rev. Estud. Fem. 2019, 27. https://doi.org/10.1590/1806-9584-2019v27n358797.Search in Google Scholar
64. Benítez, J. L. Journalism and Self-Censorship in the Insecure Democracies of Central America. In Journalist Safety and Self-Censorship; Routledge: Oxford, 2020; pp 13–28.10.4324/9780367810139-2Search in Google Scholar
65. Barrios, M. M.; Miller, T. Voices of Resilience: Colombian Journalists and Self-Censorship in the Post-Conflict Period. Journal. Pract. 2020, 15 (10), 1423–1440. https://doi.org/10.1080/17512786.2020.1778506.Search in Google Scholar
66. República de Colombia – Corte Constitucional. Derecho de las mujeres a una vida libre de violencia-violencia digital contra periodistas por razones de género. Sentencia T-087 DE 2023; Corte Constitutcional (República de Colombia): Bogotá, 2023.Search in Google Scholar
67. Dunn, S. Technology-Facilitated Gender-Based Violence: An Overview; Centre for International Governance Innovation: Supporting a Safer Internet Paper No. 1, 2020.Search in Google Scholar
68. Bedi, S. The Myth of the Chilling Effect. Harv. J. Law Technol. 2021, 35 (1), 267–307.10.2139/ssrn.3794037Search in Google Scholar
69. Nah, A. M. Navigating Mental and Emotional Wellbeing in Risky Forms of Human Rights Activism. Soc. Mov. Stud. 2021, 20 (1), 20–35. https://doi.org/10.1080/14742837.2019.1709432.Search in Google Scholar
70. Berridge, S.; Portwood-Stacer, L. Introduction: Feminism, Hashtags and Violence Against Women and Girls. Fem. Media Stud. 2015, 15 (2), 341. https://doi.org/10.1080/14680777.2015.1008743.Search in Google Scholar
71. Linabary, J. R.; Corple, D. J.; Cooky, C. Feminist Activism in Digital Space: Postfeminist Contradictions in # WhyIStayed. New Media Soc. 2020, 22 (10), 1827–1848. https://doi.org/10.1177/1461444819884635.Search in Google Scholar
72. Clark, R. Hope in a Hashtag”: The Discursive Activism of # WhyIStayed. Fem. Media Stud. 2016, 16 (5), 788–804. https://doi.org/10.1080/14680777.2016.1138235.Search in Google Scholar
73. Kaitlynn, M.; Keller, J.; Ringrose, J. Digitized Narratives of Sexual Violence: Making Sexual Violence Felt and Known Through Digital Disclosures. New Media Soc. 2019, 21 (6), 1290–1310. https://doi.org/10.1177/1461444818820069.Search in Google Scholar
74. Kemp, S. Data Reportal, 2024. https://datareportal.com/ (accessed 2025-02-3).Search in Google Scholar
75. CEPAL. Violencia Feminicida en Cifras: América Latina y el Caribe. La prevención de los femicidios: obligación de los Estados y reto persistente en la región, 2023. https://repositorio.cepal.org/server/api/core/bitstreams/5176486b-d060-4255-ac74-d1dc8eec9bf3/content.Search in Google Scholar
76. INAMU. INAMU (2013): Ley de penalización de la violencia contra las mujeres. Institutio Nacional de las Mujeres (INAMU). ISBN: 978-9968-25-222-5. In Ley de penalización de la violencia contra las mujeres; Institutio Nacional de las Mujeres (INAMU): San Pedro, 2013.Search in Google Scholar
77. Congreso de la República de Colombia. Ley No. 247. Ley de protección integral de violencia de género digital; Congreso de la República de Colombia: Bogotá, 2024. https://www.comisionprimerasenado.com/documentos-pendientes-de-publicacion/ponencias-y-textos-aprobados/4296-ponencia-de-segundo-debate-ley-no-247-de-2024-de-proteccion-integral-de-violencia-de-genero-digital/file.Search in Google Scholar
78. Naderifar, M.; Goli, H.; Ghaljaie, F. Snowball Sampling: A Purposeful Method of Sampling in Qualitative Research. Stride. Dev. Med. Educ. 2017, 14 (3). https://doi.org/10.5812/sdme.67670.Search in Google Scholar
79. Patton, M. Q. Qualitative Research and Evaluation Methods. Integrating Theory and Practice; SAGE Publications Ltd: Thousand Oaks, CA, 2014.Search in Google Scholar
80. xThe National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. Belmont Report; US Department of Human Health and Services: Washington, D.C, 1979. https://www.hhs.gov/ohrp/regulations-and-policy/belmont-report/read-the-belmont-report/index.html.Search in Google Scholar
81. Charmaz, K. Constructing Grounded Theory: A Practical Guide Through Qualitative Analysis; SAGE Publications Ltd: London, 2006.Search in Google Scholar
82. Indepaz. Desafío a la Paz Total. Informe sobre presencia de grupos armados en Colombia 2021–2022, 2022. https://indepaz.org.co/informe-sobre-presencia-de-grupos-armados-en-colombia-2021-2022-1/.Search in Google Scholar
83. Suárez Estrada, M. Traversing Bodies and Territories: Feminist Activism Against Digital Violence. Fem. Media Stud. 2023, 1–15.10.1080/14680777.2023.2285713Search in Google Scholar
84. Parra Saiani, P.; Ivaldi, E.; Ciacci, A.; Di Stefano, L. Broken Trust. Confidence Gaps and Distrust in Latin America. Soc. Indic. Res. 2024, 173 (1), 269–281. https://doi.org/10.1007/s11205-021-02796-3.Search in Google Scholar PubMed PubMed Central
85. Ancheta-Arrabal, A.; Pulido-Montes, C.; Carvajal-Mardones, V. Gender Digital Divide and Education in Latin America: A Literature Review. Educ. Sci. 2021, 11 (12), 804. https://doi.org/10.3390/educsci11120804.Search in Google Scholar
86. Tsapalas, D.; Parker, M.; Ferrer, L.; Bernales, M. Gender-Based Violence, Perspectives in Latin America and the Caribbean. Hisp. Health Care Int. 2021, 19 (1), 23–37. https://doi.org/10.1177/1540415320924768.Search in Google Scholar PubMed PubMed Central
87. Matamoros-Fernández, A. “El Negro de WhatsApp” Meme, Digital Blackface, and Racism on Social Media. First Monday 2020, 25 (1). https://doi.org/10.5210/fm.v25i12.10420.Search in Google Scholar
88. Morales, E. Ecologies of Violence on Social Media: An Exploration of Practices, Contexts, and Grammars of Online Harm. Soc. Media Soc. 2023, 9 (3). https://doi.org/10.1177/20563051231196882.Search in Google Scholar
89. Swank, E.; Fahs, B. Understanding Feminist Activism Among Women: Resources, Consciousness, and Social Networks. Socius: Socio. Res. Dyn. World 2017, 3. https://doi.org/10.1177/2378023117734081.Search in Google Scholar
90. Abascal Mena, R.; Pedraza Bucio, C. Miradas para una ciudadanía emergente: encuentros y desencuentros en el escenario digital, 2021. http://dccd.cua.uam.mx/repositorio/libros.php?libro=Miradas.Search in Google Scholar
91. Karahanna, E.; Xin Xu, S.; Xu, Y.; Zhang, N. (Andy). The Needs-Affordances-Features Perspective for the Use of Social Media. MIS Q. 2018, 42 (3), 737–756. https://doi.org/10.25300/MISQ/2018/11492.Search in Google Scholar
92. Friedman, B.; Kahn, P. H.; Borning, A.; Huldtgren, A. Value Sensitive Design and Information Systems, 2013, 55–95. https://doi.org/10.1007/978-94-007-7844-3_4.Search in Google Scholar
93. Stumpf, S.; Peters, A.; Bardzell, S.; Burnett, M.; Busse, D.; Cauchard, J.; Churchill, E. Gender-Inclusive HCI Research and Design: A Conceptual Review. Found. Trends Hum. Comput. Interact. 2020, 13 (1), 1–69. https://doi.org/10.1561/1100000056.Search in Google Scholar
94. Rode, J. A. A Theoretical Agenda for Feminist HCI. Interact. Comput. 2011, 23 (5), 393–400. https://doi.org/10.1016/j.intcom.2011.04.005.Search in Google Scholar
95. Sultana, S.; Guimbretière, F.; Sengers, P.; Dell, N. Design Within a Patriarchal Society. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems; ACM: New York, NY, USA, 2018; pp. 1–13.10.1145/3173574.3174110Search in Google Scholar
96. Shaban, A. Digitalization and Exclusion – Digital Divides and Development. In Digital Geographies – Theory, Space, and Communities; Springer Nature Singapore: Singapore, 2024; pp. 255–496.10.1007/978-981-97-4734-4_4Search in Google Scholar
97. Suzor, N.; Dragiewicz, M.; Harris, B.; Gillett, R.; Burgess, J.; Van Geelen, T. Human Rights by Design: The Responsibilities of Social Media Platforms to Address Gender‐Based Violence Online. Policy Internet 2019, 11 (1), 84–103. https://doi.org/10.1002/poi3.185.Search in Google Scholar
98. Horvath, B.; Abbruzzese, J.; Goggin, B. Meta is Ending its Fact-Checking Program in Favor of a “Community Notes” System Similar to X’s, 2025. https://www.nbcnews.com/tech/social-media/meta-ends-fact-checking-program-community-notes-x-rcna186468.Search in Google Scholar
99. Mathew, B.; Illendula, A.; Saha, P.; Sarkar, S.; Goyal, P.; Mukherjee, A. Hate Begets Hate: A Temporal Study of Hate Speech. Proc. ACM Hum.-Comput. Interact. 2020, 4 (CSCW2), 1–24. https://doi.org/10.1145/3415163.Search in Google Scholar
100. Sasse, J.; Grossklags, J. Breaking the Silence: Investigating Which Types of Moderation Reduce Negative Effects of Sexist Social Media Content. Proc. ACM Hum.-Comput. Interact. 2023, 7 (CSCW), 1–26. https://doi.org/10.1145/3610176.Search in Google Scholar
101. Register, Y.; Grasso, I.; Weingarten, L. N.; Fury, L.; Chinea, C. E.; Malloy, T. J.; Spiro, E. S. Beyond Initial Removal: Lasting Impacts of Discriminatory Content Moderation to Marginalized Creators on Instagram. Proc. ACM Hum.-Comput. Interact. 2024, 8 (CSCW), 1–28. https://doi.org/10.1145/3637300.Search in Google Scholar
102. Are, C.; Gerrard, Y. Violence and the Feminist Potential of Content Moderation. In The Routledge Companion to Gender, Media and Violence, 1st ed.; Boyle, K.; Berridge, S., Eds.; Routledge: London, 2023; pp. 473–483.10.4324/9781003200871-51Search in Google Scholar
103. de Gregorio, G.; Stremlau, N. Inequalities and Content Moderation. Glob. Policy 2023, 14 (5), 870–879. https://doi.org/10.1111/1758-5899.13243.Search in Google Scholar
104. Jankowicz, N.; Gomez-O’Keefe, I.; Hoffmann, L.; Vidal Becker, A. It’s Everyone’s Problem: Mainstreaming Responses to Technology-Facilitated Gender-Based Violence; Colombia SIPA Institute of Global Politics: New York, 2024.Search in Google Scholar
105. Chivukula, S. S. Feminisms Through Design. Interactions 2020, 27 (6), 36–39. https://doi.org/10.1145/3427338.Search in Google Scholar
106. Schoenebeck, S.; Haimson, O. L.; Nakamura, L. Drawing from Justice Theories to Support Targets of Online Harassment. New Media Soc. 2021, 23 (5), 1278–1300. https://doi.org/10.1177/1461444820913122.Search in Google Scholar
107. Reynolds-Cuéllar, P.; Wong-Villacres, M.; Badillo-Urquiola, K.; Barrera Machuca, M. D.; Cibrian, F. L.; Ciolfi Felice, M.; Lemus, O. A. Para Cima y Pa’ Abajo: Building Bridges Between HCI Research in Latin America and in the Global North. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems; ACM: New York, NY, USA, 2023; pp. 1–19.10.1145/3544548.3581138Search in Google Scholar
108. Kumar, N.; Karusala, N.; Ismail, A.; Wong-Villacres, M.; Vishwanath, A. Engaging Feminist Solidarity for Comparative Research, Design, and Practice. Proc. ACM Hum.-Comput. Interact. 2019, 3 (CSCW), 1–24. https://doi.org/10.1145/3359269.Search in Google Scholar
109. Henry, N.; Powell, A. Sexual Violence in the Digital Age. Soc. Leg. Stud. 2016, 25 (4), 397–418. https://doi.org/10.1177/0964663915624273.Search in Google Scholar
110. Harrington, C. What is “Toxic Masculinity” and Why Does it Matter? Men Masculinities 2021, 24 (2), 345–352. https://doi.org/10.1177/1097184X20943254.Search in Google Scholar
111. Seaborn, K. Interacting with Masculinities: A Scoping Review. In Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems; ACM: New York, NY, USA, 2023; pp. 1–12.10.1145/3544549.3585770Search in Google Scholar
112. Butler, J. Gender Trouble; Routledge: New York, 2002.10.4324/9780203902752Search in Google Scholar
113. Bakker, J. I. (Hans). Grounded Theory Methodology and Grounded Theory Method: Introduction to the Special Issue. Sociol. Focus 2019, 52 (2), 91–106. https://doi.org/10.1080/00380237.2019.1550592.Search in Google Scholar
© 2025 the author(s), published by De Gruyter, Berlin/Boston
This work is licensed under the Creative Commons Attribution 4.0 International License.
Articles in the same Issue
- Frontmatter
- Editorial
- Social media and society
- Research Articles
- The role of social media in constructing meaning in life: a SEM analysis
- Sharing knowledge under pressure
- Social media in crisis communication: insights from peace operations on the African continent
- How to analyze cyberbullying on social media platforms
- Silenced voices: social media polarization and women’s marginalization in peacebuilding during the Northern Ethiopia War
- Chilling or resisting? Exploring the influence of technology-facilitated (gender-based) violence on female feminists in Colombia and Costa Rica
- Brief Report
- What kind of technology transparency do users appreciate? Comparison of textual and graphic cues in app design
Articles in the same Issue
- Frontmatter
- Editorial
- Social media and society
- Research Articles
- The role of social media in constructing meaning in life: a SEM analysis
- Sharing knowledge under pressure
- Social media in crisis communication: insights from peace operations on the African continent
- How to analyze cyberbullying on social media platforms
- Silenced voices: social media polarization and women’s marginalization in peacebuilding during the Northern Ethiopia War
- Chilling or resisting? Exploring the influence of technology-facilitated (gender-based) violence on female feminists in Colombia and Costa Rica
- Brief Report
- What kind of technology transparency do users appreciate? Comparison of textual and graphic cues in app design