Overview

With the rapid advances in Internet and digital technologies, communication and networking have expanded vastly. E-mail and cell phones, for example, have decreased geographic dispersion. Social networking sites such as Facebook have afforded people the opportunity to share ideas, network, and connect or re-connect with others. Despite the overall benefits of these technologies, domestic violence victims and their family members must be aware of the increased risk these technologies can pose, as abusers may use these mechanisms to control and monitor domestic violence victims' movements. This course will provide practical strategies for educating domestic violence victims and identifying online resources to halt the use of digital technology as a tool of abuse.

Education Category: Ethics - Human Rights
Release Date: 06/01/2018
Expiration Date: 05/31/2021

Audience

This course is designed for physicians, nurses, social workers, and mental health counselors and therapists in contact with victims of domestic violence.

Accreditations & Approvals

In support of improving patient care, NetCE is jointly accredited by the Accreditation Council for Continuing Medical Education (ACCME), the Accreditation Council for Pharmacy Education (ACPE), and the American Nurses Credentialing Center (ANCC), to provide continuing education for the healthcare team. NetCE has been approved by NBCC as an Approved Continuing Education Provider, ACEP No. 6361. Programs that do not qualify for NBCC credit are clearly identified. NetCE is solely responsible for all aspects of the programs. NetCE, #1092, is approved as a provider for social work continuing education by the Association of Social Work Boards (ASWB) www.aswb.org through the Approved Continuing Education (ACE) Program. NetCE maintains responsibility for the program. ASWB Approval Period: 03/13/2016 to 03/13/2019. Social workers should contact their regulatory board to determine course approval for continuing education credits. NetCE is accredited by the International Association for Continuing Education and Training (IACET). NetCE complies with the ANSI/IACET Standard, which is recognized internationally as a standard of excellence in instructional practices. As a result of this accreditation, NetCE is authorized to issue the IACET CEU. This course is approved by the Association of Social Work Boards - ASWB NJ CE Course Approval Program Provider #14 Course #1126. NetCE SW CPE is recognized by the New York State Education Department's State Board for Social Work as an approved provider of continuing education for licensed social workers #0033. This course is considered self-study, as defined by the New York State Board for Social Work. NetCE is recognized by the New York State Education Department's State Board for Mental Health Practitioners as an approved provider of continuing education for licensed mental health counselors. #MHC-0021.This course is considered self-study by the New York State Board of Mental Health Counseling. Social workers will receive the following type and number of credit(s): General Social Work Practice 3 for the approval period starting 06/01/2018 and ending 12/22/2018. Materials that are included in this course may include interventions and modalities that are beyond the authorized practice of licensed master social work and licensed clinical social work in New York. As a licensed professional, you are responsible for reviewing the scope of practice, including activities that are defined in law as beyond the boundaries of practice for an LMSW and LCSW. A licensee who practices beyond the authorized scope of practice could be charged with unprofessional conduct under the Education Law and Regents Rules. NetCE is recognized by the New York State Education Department's State Board for Mental Health Practitioners as an approved provider of continuing education for licensed marriage and family therapists. #MFT-0015.This course is considered self-study by the New York State Board of Marriage and Family Therapy.

Designations of Credit

This activity was planned by and for the healthcare team, and learners will receive 3 Interprofessional Continuing Education (IPCE) credit(s) for learning and change. NetCE designates this enduring material for a maximum of 3 AMA PRA Category 1 Credit(s)™. Physicians should claim only the credit commensurate with the extent of their participation in the activity. NetCE designates this continuing education activity for 3 ANCC contact hour(s). NetCE designates this continuing education activity for 3.6 hours for Alabama nurses. NetCE designates this continuing education activity for 1.5 NBCC clock hour(s). Successful completion of this CME activity, which includes participation in the evaluation component, enables the participant to earn up to 3 MOC points in the American Board of Internal Medicine's (ABIM) Maintenance of Certification (MOC) program. Participants will earn MOC points equivalent to the amount of CME credits claimed for the activity. It is the CME activity provider's responsibility to submit participant completion information to ACCME for the purpose of granting ABIM MOC credit. Completion of this course constitutes permission to share the completion data with ACCME. Social workers participating in this intermediate to advanced course will receive 3 Clinical continuing education clock hours. Successful completion of this CME activity, which includes participation in the activity with individual assessments of the participant and feedback to the participant, enables the participant to earn 3 MOC points in the American Board of Pediatrics' (ABP) Maintenance of Certification (MOC) program. It is the CME activity provider's responsibility to submit participant completion information to ACCME for the purpose of granting ABP MOC credit. AACN Synergy CERP Category B. NetCE is authorized by IACET to offer 0.3 CEU(s) for this program.

Individual State Nursing Approvals

In addition to states that accept ANCC, NetCE is approved as a provider of continuing education in nursing by: Alabama, Provider #ABNP0353, (valid through November 21, 2017); California, BRN Provider #CEP9784; California, LVN Provider #V10662; California, PT Provider #V10842; District of Columbia, Provider #50-2405; Florida, Provider #50-2405; Georgia, Provider #50-2405; Iowa, Provider #295; Kentucky, Provider #7-0054 through 12/31/2019; South Carolina, Provider #50-2405.

Individual State Behavioral Health Approvals

In addition to states that accept ASWB, NetCE is approved as a provider of continuing education by the following state boards: Alabama State Board of Social Work Examiners, Provider #0515; Florida Board of Clinical Social Work, Marriage and Family Therapy and Mental Health Counseling, CE Broker Provider #50-2405; Illinois Division of Professional Regulation for Social Workers, License #159.001094; Illinois Division of Professional Regulation for Licensed Professional and Clinical Counselors, License #197.000185; Illinois Division of Professional Regulation for Marriage and Family Therapists, License #168.000190; Texas State Board of Social Worker Examiners, Approval #3011; Texas State Board of Examiners of Professional Counselors, Approval #1121; Texas State Board of Examiners of Marriage and Family Therapists, Approval #425.

Special Approvals

This activity is designed to comply with the requirements of California Assembly Bill 1195, Cultural and Linguistic Competency.

Course Objective

Because power, intimidation, and control are key dimensions to abuse, both online and offline technologies have become new vehicles for abusers. Consequently, the purpose of this course is to increase health and mental healthcare providers' awareness of how Internet and digital technologies can place victims at risk so that they can better educate their patients.

Learning Objectives

Upon completion of this course, you should be able to:

  1. Define domestic violence, dating violence, and the dynamics of abuse.
  2. Describe the scope of Internet and digital technologies and electronic communications.
  3. Analyze how Internet and digital technologies have been used to perpetrate domestic violence.
  4. Discuss the role of digital technology in providing services to victims and survivors of domestic violence.
  5. Identify interventions and educational measures targeted to victims of intimate partner violence affected by online abuse.

Faculty

Alice Yick Flanagan, PhD, MSW, received her Master’s in Social Work from Columbia University, School of Social Work. She has clinical experience in mental health in correctional settings, psychiatric hospitals, and community health centers. In 1997, she received her PhD from UCLA, School of Public Policy and Social Research. Dr. Yick Flanagan completed a year-long post-doctoral fellowship at Hunter College, School of Social Work in 1999. In that year she taught the course Research Methods and Violence Against Women to Masters degree students, as well as conducting qualitative research studies on death and dying in Chinese American families.

Previously acting as a faculty member at Capella University and Northcentral University, Dr. Yick Flanagan is currently a contributing faculty member at Walden University, School of Social Work, and a dissertation chair at Grand Canyon University, College of Doctoral Studies, working with Industrial Organizational Psychology doctoral students. She also serves as a consultant/subject matter expert for the New York City Board of Education and publishing companies for online curriculum development, developing practice MCAT questions in the area of psychology and sociology. Her research focus is on the area of culture and mental health in ethnic minority communities.

Faculty Disclosure

Contributing faculty, Alice Yick Flanagan, PhD, MSW, has disclosed no relevant financial relationship with any product manufacturer or service provider mentioned.

Division Planners

John M. Leonard, MD

Jane C. Norman, RN, MSN, CNE, PhD

Division Planners Disclosure

The division planners have disclosed no relevant financial relationship with any product manufacturer or service provider mentioned.

About the Sponsor

The purpose of NetCE is to provide challenging curricula to assist healthcare professionals to raise their levels of expertise while fulfilling their continuing education requirements, thereby improving the quality of healthcare.

Our contributing faculty members have taken care to ensure that the information and recommendations are accurate and compatible with the standards generally accepted at the time of publication. The publisher disclaims any liability, loss or damage incurred as a consequence, directly or indirectly, of the use and application of any of the contents. Participants are cautioned about the potential risk of using limited knowledge when integrating new techniques into practice.

Disclosure Statement

It is the policy of NetCE not to accept commercial support. Furthermore, commercial interests are prohibited from distributing or providing access to this activity to learners.

Table of Contents

Technical Requirements

Supported browsers for Windows include Microsoft Internet Explorer 9.0 and up, Mozilla Firefox 3.0 and up, Opera 9.0 and up, and Google Chrome. Supported browsers for Macintosh include Safari, Mozilla Firefox 3.0 and up, Opera 9.0 and up, and Google Chrome. Other operating systems and browsers that include complete implementations of ECMAScript edition 3 and CSS 2.0 may work, but are not supported. Supported browsers must utilize the TLS encryption protocol v1.1 or v1.2 in order to connect to pages that require a secured HTTPS connection. TLS v1.0 is not supported.

#97492: Digital Technology and Domestic Violence

  • Back to Course Home
  • Participation Instructions

INTRODUCTION

In most jurisdictions in the United States, the term of "domestic violence" is used to describe intimate partner violence as well as family violence, such as child abuse [8]. Domestic violence is characterized by a cluster of behaviors that an individual in an intimate relationship uses to control and maintain power over his or her partner [1]. These behaviors include physical, psychologic, verbal, sexual, and economic/financial actions to threaten, assault, and ultimately control the victim. Power, intimidation, and control are key dimensions to abuse, and advances in online and offline technology offer a new arsenal of tools for abusers. Cell phones, video cameras, and global positioning systems (GPS) are examples of offline technologies domestic violence perpetrators may use to harass, intimidate, and locate victims. Perpetrators may call victims' cell phones or text message incessantly asking where they are, what they are doing, and who they are with. Abusers also utilize Internet tools like e-mail and social networking sites to threaten and intimidate. Ultimately, in this new age of technology, abusers use these tools to create a sense of their omnipotence in order to control and demean their victims [9]. The purpose of this course is to increase healthcare professionals' awareness of how Internet and digital technologies can place victims at risk, allowing for better patient education. Practitioners are encouraged to familiarize themselves with these new technologic tools, reformulate ways of thinking about safety planning, and consider about how to best educate the general public on how technology has changed the face of intimate partner violence.

DEFINITIONS OF DOMESTIC VIOLENCE

The World Health Organization (WHO) defines violence broadly to encompass a wide range of behaviors. The formal WHO definition is [2]:

The intentional use of physical force or power, threatened or actual, against oneself, another person, or against a group or community, that either results in or has a high likelihood of resulting in injury, death, psychologic harm, maldevelopment, or deprivation.

The WHO defines intimate partner violence as "any behavior within an intimate relationship that causes physical, psychologic, or sexual harm to those in the relationship" [15].

In their definition of violence, the WHO utilizes the term "power" to communicate that abuse can go beyond physical acts of violence and includes behaviors that emanate from a power relationship, such as threats and intimidation, as well as acts of omission and neglect [2]. Furthermore, the concept of intentionality is used to convey that abuse does not necessarily mean that there is an intent to cause injury; a perpetrator may employ force with no intention of physically hurting or injuring the victim. However, the consequences of psychologic, emotional, or financial abuse can have tremendous short- and long-term implications without being physically injuring [2].

Some have argued that the WHO definition is not always culturally specific. In India, domestic violence can involve other family members and not just an intimate partner [16]. Types of abuse or violence may also encompass behaviors that reflect the cultural norms. The abuse of infertile women or women who have not delivered any sons, for example, is common in India [16].

The Centers for Disease Control and Prevention defines domestic violence or intimate partner violence as a continuum ranging from a single episode to ongoing episodes of abuse that may include physical violence, sexual violence, stalking, and psychologic aggression used by one individual on another party within the context of an intimate relationship [3]. The perpetrator or victim can be male or female, and the abuse can be perpetrated within a dating relationship or marital dyad or within a heterosexual or homosexual context. Table 1 summarizes the types of abuse or violence that can occur.

TYPES OF DOMESTIC VIOLENCE

Physical AbusePsychologic AggressionSexual AbuseFinancial/Economic Abuse
Kicking, punching, biting, slapping, strangling, choking, restraining, abandoning in unsafe places, burning with cigarettes, throwing acid, beating with fists, throwing objects, refusing to help when sick, stabbing, shootingIntimidation, verbal abuse, humiliation, put-downs, ridiculing, control of victim's movement, stalking, threats, threatening to hurt victim's family and children, social isolation, ignoring needs or complaints, online stalking, accessing intimate partner's social media accounts or email without permissionRape, forms of sexual assault such as forced masturbation, oral sex, sexual humiliation, groping, refusal to use contraceptives, coerced abortions, posting sexually explicit pictures of an intimate partner online, secretly recording sexual encounters, texting private sexual mediaWithholding of money, refusing to allow victim to open bank account, placing all property in perpetrator's name, not allowing victim to work

In this course, the terms "domestic violence" and "intimate partner violence" are used interchangeably, as are the terms "abuser," "batterer," and "perpetrator." It is acknowledged that there are distinct differences and political ramifications in how these terms are utilized; however, it is beyond the scope of this curriculum to address this issue.

DYNAMICS OF DOMESTIC VIOLENCE: POWER AND CONTROL

Studies show that there appear to be two major patterns of domestic violence [2]. The first is a more severe type of abuse that encompasses multiple and various forms of abusive behaviors. In this classification, the abuse and violence escalates and the perpetrator increasingly attempts to control, monitor, and intimidate the victim. The second is a more moderate form of abuse whereby physical violence is occasionally perpetrated [2]. Some domestic violence victims do not experience any physical or sexual abuse for many years; rather, they regularly experience non-physical forms of abuse, such as emotional, psychologic, social, and economic abuse [4]. The terms emotional and psychologic abuse are often used interchangeably; however, they are distinct entities [4]. Emotional abuse consists of behaviors that are meant to gradually deteriorate the victim's dignity, self-respect, and self-worth. These behaviors might involve insults, put-downs, name-calling, and public humiliation. On the other hand, psychologic abuse is meant to gradually diminish a victim's rational perceptions, to make one feel "crazy." The underlying intention in all types of abuse is power and control [4]. Although there is no consensus operational definition for the term "coercive control," most agree that it can exist without the use of physical or sexual violence [17]. Rather, previous incidences of partner violence can result in the victim feeling threatened and intimidated [17,51]. Understanding these dynamics provides a context in how technology can be used by perpetrators to reinforce power and control.

PREVALENCE OF INTIMATE PARTNER VIOLENCE

Most victims of inter-relationship sexual violence are women who were assaulted by their male partners; 99% of perpetrators of rape against women are men [5]. As of 2011 in the United States, 9% of women have been raped by an intimate partner in their lifetime and an additional 16% have been subjected to other forms of sexual violence by a partner [5]. Approximately 0.5% of men have been raped by an intimate partner (predominantly by a male partner) in their lifetime and 9.5% experienced other forms of sexual violence [5]. In a 2016 systematic review examining immigrant women's experiences with intimate partner violence, researchers found that, in the United States, 3.58% of immigrant women experienced intimate partner violence in the previous 12 months [52]. However, one survey found a higher prevalence (19.7%) among immigrant Latina women.

The prevalence of physical violence in relationships is high, and rates are similar among women and men. The lifetime prevalence of physical violence by an intimate partner is 31.5% among women, with about two-thirds of instances involving severe physical violence [5]. Physical violence by an intimate partner has been experienced by 27.5% of men in their lifetime, with about half of instances being acts of severe violence. However, the physical toll on women is typically more severe and with much greater consequences. Sexual, physical, emotional, and psychologic abuse of women overlaps in many instances, and abuse (often ongoing) can escalate to accidental or intentional murder. Violence perpetrated by current or former boyfriends or husbands accounts for 40% to 70% of all female homicides each year [2].

Intimate partner violence affects all areas of life, including the workplace. In a quantitative survey study involving 32 different companies, more than half of the female respondents and one-quarter of the male respondents disclosed having experienced some form of intimate partner violence during their lifetime. Of these respondents, violence affected their work in terms of missed days, tardiness, and abuser visits to the workplace [53].

Episodes of psychologic aggression appear to be common in the United States. One or more acts of psychologic aggression by an intimate partner have been experienced by 47% of women and 46.5% of men in their lifetime [5]. This is not limited to the United States. In a study with 661 Portuguese college students, 75% of men and 72% women reported having experienced psychologic abuse by a partner during their lifetime [54]. In addition, 9.25% of women and 2.5% of men have been stalked by an intimate partner or former intimate partner.

In societies/cultures rigidly bound by traditional gender roles, abuse of wives is often considered a husband's right. When women in these groups do not conform to social and cultural expectations, their husbands are expected to use violence to regain obedience and respect from their wives [2]. Not surprisingly, the rates of coercive control are higher among countries with low levels of gender equality [17]. Women in such societies/cultures often fear that if they seek help from the violence, they will be ostracized from their family and the community. Because their identities are bound to marriage, these women feel they have no choice but to tolerate the abuse [55]. Studies highlighted by the WHO show that intimate partner violence is highly prevalent in Nicaragua, Papua New Guinea, Turkey, Egypt, and Ethiopia. Acceptance of domestic violence may play a role. In Vietnam, for example, although the overall prevalence of acceptance of domestic violence had declined between 2006 and 2011 (from 65.1% to 36.1%), age and educational attainment influenced overall acceptance. For example, women who were younger and had lower educational attainment were more likely to condone domestic violence [56].

Many first, second, or later generations of individuals from these cultures living in the United States experience and/or perpetrate the violence typical of their society of origin. Throughout the world, when physical abuse occurs in a marriage, psychologic aggression almost always occurs and sexual assault occurs in one-quarter to one-half of instances [2]. However, in many countries (including the United States) studies are not conducted and/or intimate partner violence is hidden or not reported out of fear. In the United States, the prevalence of intimate partner violence varies among various ethnic/racial groups (Table 2) [5].

PREVALENCE OF INTIMATE PARTNER VIOLENCE AMONG VARIOUS ETHNIC/RACIAL GROUPS—UNITED STATES, 2014

Types of Violence Prevalence By Race
Asian/Pacific Islander American Indian/Alaskan Native Hispanic Non-Hispanic Black Non-Hispanic White Multiracial
Women raped by an intimate partner during their lifetimeNANA6.2%8.8%9.6%11.4%
Women experienced sexual violence other than rape by an intimate partner during their lifetimeNANA9.9%17.4%17.1%26.8%
Women experienced physical violence by an intimate partner during their lifetime15.3%51.7%29.7%41.2%30.5%51.3%
Men experienced physical violence by an intimate partner during their lifetime11.5%43%27.1%36.3%26.6%39.3%
NA: Data not available.

DATING VIOLENCE

Dating violence is a distinct type of intimate partner violence, characterized by abusive behaviors that occur in a dating relationship. In a 2017 meta-analysis, the rate of physical dating violence among teens was 20%; the rate of sexual dating violence was 9% [57]. In a Midwestern study on adolescent health and welfare, researchers found that 35% of girls and 36% of boys disclosed being victims of physical violence in a dating relationship [6]. The study also found that 73% of girls and 66% of boys experienced psychologic aggression in a dating relationship in high school. Additionally, 64% of girls and 45% of boys had engaged in verbal emotional abuse toward a dating partner. Up to 25% of girls and 14% of boys expressed that they had been sexually coerced in a teen dating relationship [6].

The term "digital dating abuse" has been used to describe the use of technology by abusers to victimize dating partners [58]. Other terms include cyber dating abuse, electronic aggression/violence/victimization/dating violence, and computer-mediated or communication-based teen dating violence/harassment/abuse/victimization [58]. Because adolescents are more likely to use technology, they are also more likely to experience digital dating abuse compared with adults. In fact, teens are three times more likely to be a victim of digital partner abuse than adults [59]. A New England study on teen violence and abuse found that 26% of adolescents had been the victims of some form of cyber abuse in a dating relationship in the 12-month period before the study [7]. Girls were twice as likely as boys to experience sexual cyber abuse in a dating relationship. Teen cyber abuse victims are also likely (84%) to experience in-person psychologic dating abuse, and a large proportion experience violence and sexual abuse in the dating relationship [7]. Cyber abuse perpetrators are often perpetrators of physical, sexual, and psychologic aggression; 52% also perpetrate psychologic dating abuse, 55% perpetrate physical dating violence, and 11% perpetrate sexual coercion [7]. This study found that all forms of teen dating abuse are common, but not as common as in the previous study. It is unclear if there is a regional pattern to dating violence, or if study design accounts for the variations; the Midwestern study's sample size was significantly smaller.

USE OF INTERNET AND ELECTRONIC TECHNOLOGIES

In order to understand the pervasive social, psychologic, and cultural impact of the Internet on the lives of individuals, it is important to obtain a brief glimpse of Internet and digital technology usage and consumption. In 2014, the U.S. Census reported that 75% of all households had Internet access [10]. Pew Internet Research Center reports that 86% of men and women 18 years of age and older use the Internet [11]. Individuals 18 to 29 years of age are the most likely to utilize the Internet (98%), while adults 65 years of age and older are the least likely (59%) [11]. As of 2018, 89% of adults in the United States have Internet access [11]. In general, individuals 65 years and older continue to remain less connected compared with other age groups [60]. There is no doubt that Internet technology has become a ubiquitous part of the American landscape. Although data published in the last several years is among the most current, the Internet landscape changes so rapidly that obtaining accurate data is nearly impossible.

CELL PHONE USE

Mobile devices are also an integral part of the fabric of individuals' lives. As of 2016, 95% Americans have cell phones, and 77% have smartphones. An estimated 12% of adult Americans use smartphones rather than Internet-connected computers at home [61]. Overall, use of the smartphone for Internet access is correlated with being younger, non-white, and from lower income brackets [61]. The phone has become more than just a means to connect with other people. According to the Pew Internet and American Life Survey, 39% of adults in the United States, 70% of adolescents, and 72% of young adults (18 to 29 years of age) indicated that the phone is a way to deal with boredom [12]. In a focus group study of Australian adolescents and their use of cell phones, interesting themes emerged [13]. While it is not surprising they were attached to their cell phones, these adolescents expressed that the number of calls or texts they received on their cell phone was associated with how valued or loved they felt. When they could not use their cell phones, they felt disconnected. This speaks to how cell phones have become entrenched in individuals' social and personal lives.

Texting remains the most commonly used feature on the smartphone. The majority of people who own a smartphone (97%) have texted at least once [62]. In general, adolescents are the largest consumers of text messaging on cell phones, and a Pew Internet survey showed that 38% of teens texted friends on a daily basis in 2008; this increased to 54% by 2009 [14]. As of 2015, 90% of teens with phones text every day [15]. Adolescents (14 to 17 years of age) who text frequently send and receive 30 to more than 100 texts daily [14,15]. These texts are not only sent via telephones' text feature, but are shared through messaging apps such as Facebook Messenger, Kik, Snapchat, or WhatsApp. In 2014, 88% of adolescents 13 to 17 years of age had their own cell phones or access to cell phones [15]. About 95% of teens with mobile web access go online at least once per day and about 25% say they are "constantly online."

SOCIAL NETWORKING

A huge number of individuals are using online social networking sites like Facebook, Instagram, Pinterest, Twitter, and Snapchat. As of 2016, an estimated 79% of Americans 18 years of age and older used Facebook; 32% used Instagram; 31% used Pinterest; 29% reported using LinkedIn; and 24% used Twitter [63]. Among adolescents 13 to 17 years of age, 71% report using more than one social networking site, with Facebook being the most popular, followed by Instagram [64].

People, and teens in particular, are sharing much more personal information online now than in the past, despite valid privacy and safety concerns. More than 90% of teens post their real name and photo online, and 82% post their birthdate [50]. Other personal information, such as the school they attend (71%), the city or town in which they live (71%), e-mail address (53%), and phone number (20%), are freely posted online by teens. Posting personal information online has been a growing trend; in 2006, only 2% of teens posted their phone number online compared with 20% in 2012 [50]. However, 60% of teen Facebook users keep their profiles private.

Parental supervision of Internet use is not as strict as one might think. According to one source, 20% of parents do not supervise their children's Internet use at all, 52% moderately supervise their use, and 71% stop supervision after age 14 [18]. This is in spite of the fact that 60% of 10 to 17 year olds have received an e-mail or instant message from a stranger (50% respond) and 20% have been sexually solicited online.

PATTERNS OF ELECTRONIC INTIMATE PARTNER VIOLENCE

DOMESTIC VIOLENCE

It is difficult to assess the prevalence of domestic violence that has been perpetrated using some type of technology. Most available information regarding these behaviors is from small studies or extrapolated data. For example, one study of 339 college students found that 10% to 15% of participants had received repeated e-mails or text messages from a spouse, boy/girlfriend, or partner that were insulting, threatening, or harassing [19]. Another survey study of 256 victims of abuse indicated that 30% reported the harassment began with e-mails and an additional 30% reported the harassment began on Facebook [20]. The majority of the respondents in this study (60%) were female, and 53% had engaged in a prior relationship with the harasser [20]. In a survey study involving 479 victims who had received services, 25% of the women reported having their Internet browser history monitored, 23.6% stated that they had received threatening e-mails repeatedly, and 18% indicated that someone had monitored their e-mails [21]. Intimate partner abuse perpetrated using technology may be just as dangerous as face-to-face abuse [65]. The online environment may promote less inhibition, and abusers may do things that they may not normally do in person. Furthermore, deleterious information disseminated via e-mail, websites, blogs, and social media is relatively permanent and widely available.

DATING VIOLENCE

Dating violence has also been transformed in the cyberage. In a 2018 review of studies involving digital dating abuse, prevalence rates ranged from 6% to 73% [58]. Much of the variation in these rates is a function of how digital dating abuse is defined and measured. In some studies, a positive response to one item in a questionnaire constitutes digital dating abuse, while other instruments are multidimensional and encompass a range of aggressive behaviors. A separate study of high school students in the Midwest found that 53.8% disclosed being psychologically victimized in the form of digital monitoring and controlling [66]. For example, victims reported to being pressured to respond quickly to their partners' calls and texts, having their contacts monitored, and being pressured to send sexually explicit messages or pictures ("sext"). In a large-scale survey study, with a random sample of approximately 4,400 children and adolescents between 11 and 18 years of age, the researchers found that 10% of the adolescents had a romantic partner who would not allow them to use their cell phone or computer [22]. Approximately 10.4% of the boys and 9.8% of the girls disclosed that they received a threatening message on their cell phone from their boy/girlfriend. Less than 10% stated their romantic partner posted embarrassing or humiliating information or photos in an online forum or via a cell phone.

A smaller study of adolescent dating violence victims uncovered patterns in technology use, particularly the use of cell phones to monitor victims' activities and who they were with [23]. Furthermore, threatening, insulting, or disparaging messages that were meant to humiliate or intimidate were regularly left on voicemail accounts. Some participants reported that their partners used social networking sites to post hurtful messages. One young woman reported that her boyfriend at the time posted messages that he never loved her but only used her for sex. Another woman's boyfriend had developed a website titled "I Hate [Participant's Name]" and invited others to post hurtful messages about her. Some abusers even controlled who the victim could interact with on social networking sites. Demanding that victims "unfriend" certain individuals on social networking site(s) was relatively common [24]. An emerging behavior involves tagging pictures posted on sites like Facebook and Instagram with insulting, shaming, or hurtful tags. Sexual forms of digital dating abuse may include pressuring the victim to pose sexually and send the photos via e-mail or social network sites, forcing the victim to engage in sexual acts via the Internet, or sending sexually explicit photos to the victim regardless of how often the victim says he/she does not want to be the recipient of such messages [67].

CYBERSTALKING

In many domestic violence cases, stalking is an integral component of the abuser's arsenal of behaviors to intimidate the victim. Stalking is defined as repeated harassing, threatening, and/or intimidating behaviors used by an individual on another party [25]. Stalkers are often perceived as being unknown to the victim; however, this is often not the case. One study found that 60% of female stalking victims are stalked by an intimate partner, and 80% of women stalked by a current or former intimate partner are also physically assaulted by that partner [5]. A 2010 report to Congress published by the U.S. Department of Justice showed that 97% of stalking victims knew their stalker in some manner [48]. Specifically, 55% of the stalkers were a current or former intimate partner, 17% were an acquaintance, and 15% were a current or former dating partner [48]. In a study that examined the different types of stalking methods using technology, 78% of victims indicated that the abuser called or texted them to ridicule and harass and 56% reported their abuser used mobile technology to track their whereabouts [9].

Cyberstalking is a term coined to describe using computers or electronic communications to harass and intimidate. Harassers might use the following electronic communication methods to harass their victims [26; 68]:

  • Flooding the victim's e-mail box with e-mails so as to disrupt the ability to receive incoming e-mails

  • Sending intimidating e-mail, texts, or instant messages

  • Monitoring the victim's computer communications through the use of software programs such as spyware or keystroke logging programs

  • Taking on the victim's identity to send false messages or to purchase goods on the Internet

  • Using the Internet to obtain personal information about the victim

  • Impersonating the victim through e-mail and social networking sites

Generally, men and boys are more likely to cyberstalk by logging into their partners' e-mail and social media accounts [68]. The laws for cyberstalking vary from state to state, and the laws often have a difficult time keeping up with technology. To obtain information about the state laws regarding stalking and cyberstalking, visit the Working to Halt Online Abuse website at http://www.haltabuse.org/resources/laws/index.shtml.

HOW DIGITAL TECHNOLOGY IS USED BY PERPETRATORS

In general, Internet and electronic technology may be used by perpetrators to determine victims' plans and movements. If a victim is not technologically sophisticated, she or he can inadvertently provide more information than intended to the abuser. When domestic violence or dating violence is perpetrated using technology, victims may be pressured by their partners to share passwords, usernames, or pin codes as a symbol of love [67]. The following sections will explore specific ways technologic tools have been used by perpetrators of intimate partner violence to stalk, control, and abuse their victims.

SOCIAL NETWORKING SITES

Social networking is a form of online communication that is comprised of "web-based services that allow individuals to construct a public or semi-public profile within a bounded system, articulate a list of other users with whom they share a connection, and view and traverse their list of connections and those made by others within the system" [27]. As noted, examples of social networking sites include Facebook, Instagram, LinkedIn, Google+, and Pinterest.

Although social networking sites have reduced geographic dispersion, connected family and friends with each other, and made the world "smaller," these sites can also be used by domestic violence perpetrators to track and locate victims and to inflict psychologic abuse. Perpetrators can easily glean information from profiles, uploaded photos, and comments from others to make inferences about where the victim is located. Using such information, perpetrators can not only track a victim but can also send terrifying and abusive messages to continue the emotional and psychologic abuse and reinforce the established dynamic of fear, power, and control; this is referred to as online obsessive relational intrusion [26; 69]. Even if the victim does not have an account with a social networking site, perpetrators can trace family members, friends, work colleagues, and other individuals who may know the victim [9,26]. This makes the victim feel that he or she is being monitored constantly [9]. Some abusers will contact employers and colleagues in an attempt to ruin the victim's reputation and credibility [70]. Many people, for example, are very detailed about where they work in their profiles, in part because they use these sites for networking purposes. Consequently, it is not inconceivable to envision a perpetrator showing up at the victim's workplace in order to obtain some personal information. Furthermore, abusers may create fake profiles in order to befriend a victim or the victim's family members and friends, all for the purpose of extrapolating enough information to stalk the victim [26].

SPYWARE PROGRAMS

Abusers can monitor victims' activities online (e.g., websites visited, sent and received e-mails) by simply looking at browser histories and reading deleted e-mails [28]. Browser history refers to an archive of websites that are visited; the pages are usually organized chronologically. This history can be stored in the computer's memory, making it difficult to completely erase. Perpetrators can also access victims' e-mails by opening the "deleted" e-mail folder or by reviewing the "sent" folder.

With increasingly sophisticated and easily accessible software, hardware, and spyware programs, which are typically marketed for parents to monitor their children's Internet activity, abusers have additional tools to monitor and control victims' online activities. For example, abusers can install spyware (also referred to as malware or stalkware) on victims' computers and gain the ability to take screenshots of the computer, record passwords and personal identification codes, track websites visited, and record incoming and outgoing e-mails, text messages, and chats [30,58,70]. Whenever the computer is used, e-mails reporting the computer activity are then sent to the abuser [26,28]. Other abusers have used keystroke loggers, a hardware device that is plugged into the keyboard and the computer and records everything typed, including e-mails, passwords, and URLs [28].

E-MAILS AND TEXT MESSAGES

E-mail and text messaging are forms of electronic communication that involve sending messages over the Internet or cell phones. They are some of the most commonly used applications, allowing messages to be sent to another person or to a group of individuals rapidly, conveniently, and without incurring any long distance charges [31]. One study with college students explored how Internet technology influenced intimate partner violence and what this abuse or violence might look like in the new age of cybertechnology [32]. Study participants were asked to provide an example of a form of intimate terrorism, defined as the use of a range of tactics, such as threats, intimidation, physical violence, and financial barriers, to control another person [33,34]. Participants recounted partners who would go into online banking accounts and change banking records or go to the post office's website and redirect the victim's mail so the mail came to them. These actions can be accomplished with knowledge of the victim's username and password, information that allows access to almost every arena of the victim's life.

Another form of intimate violence is minor violence or situational couple violence [33,34]. Minor forms of violence that occur within a specific context and rarely escalate to severe violence fall under this category. Within the online technology context, this could include abusers monitoring text messages on cell phones or reading incoming or outgoing text archives. Jealousy and the desire to control are the underlying motives of these behaviors. Even if a victim maintains a physical distance from an abusive situation, it can be difficult to maintain a psychologic distance [9].

GPS AND WIRELESS VIDEO CAMERAS

GPS and wireless video cameras are now being used by perpetrators to control and monitor victims' movements [32]. GPS may be used to track victims' exact positions, where abusers would then continually show up. Web cameras, extremely small devices that can be strategically installed by the abuser, have also been used to perpetrate abuse. The images are transmitted to a web page, where the perpetrator can watch every movement [30]. Eventually, victims are paralyzed by fear and anxiety from being constantly watched [9].

PHONES AND FAX MACHINES

It is not uncommon for a victim of domestic violence to receive an inordinate number of harassing phone calls from the abuser. In some cases, the perpetrator will purchase prepaid cell phones or calling cards in order to eliminate any evidence linking the calls back to him or her [35]. Other abusers will monitor whom the victim has called by looking through bills, phone records, or the cell phone's internal record of incoming and outgoing calls [35]. Cell phones can also be utilized as a form of eavesdropping [30]. Settings may be manipulated in such a way that the phone does not ring but automatically answers, allowing the perpetrator to listen while the victim is unaware [30]. Depending on the phone's settings, it could also silently pick up sounds within certain proximity.

Faxes often include sender information (e.g., telephone number), and if faxes are used, this can aid the abuser in locating the victim [35]. Many of these "trace evidences" are taken for granted, but it may put victims' lives at-risk and/or minimize their chances of successfully leaving domestic violence situations.

CHATROOMS AND BLOGS

A chatroom is a virtual community in which a group of individuals "dialogue" and share information with each other. Blogs, on the other hand, are analogous to website journals, with entries ranging from commentary and information about events to graphics or videos posted by an individual and viewed in chronologic order. Perpetrators might post lies about the victim in a chatroom, blog, or bulletin in order to humiliate the victim or encourage others to send humiliating e-mails or post degrading messages [36]. Because it is difficult for information to be deleted, attempting to do so may result in retraumatization [70].

WEBSITES

With the many free software programs and online hosting platforms, it is easy for people to create their own websites. Domestic violence perpetrators may create websites and post false information about victims or encourage others to harass the victim [35]. Similarly, there have been reports of perpetrators using websites as "tributes" to victims, with graphic details of fantasies and obsessions [36]. Abusers may post contact information and/or explicit images of the victim on pornography websites and encourage others to harass the victim or ask for sexual favors, also referred to as revenge porn [70].

Overall, the underlying themes of power, intimidation, and control are common denominators of intimate partner violence perpetrated both face-to-face and via online technology. However, the ease, relative speed, and public nature of aggression performed using Internet technologies present new problems in caring for victims of domestic violence. In this new Internet environment, individuals can respond immediately regardless of time or geographic distance. Similarly, individuals can easily make a private matter public and involve other parties who are not integral to the relationship [32].

INTERNET AND ELECTRONIC COMMUNICATION TOOLS: BENEFITS FOR VICTIMS

Although this course focuses on increasing practitioners' awareness of how technology can be used by abusers to harm victims of domestic violence, it is important to briefly review how the Internet and other forms of electronic technology have positively changed the landscape of the counseling, social service, mental health, and health arenas, particularly for victims of violence. In a study exploring how Internet technology was used by domestic violence organizations, seven types of direct online services were identified [37]:

  • Online assessments of violent relationships

  • Education targeted to survivors

  • Information and referrals for domestic violence victims and survivors

  • Direct e-mail services

  • Online monitored chatrooms

  • Online support groups

  • Art and stories shared by survivors

Empowerment is a recurrent theme in the use of technology by domestic violence victims. First, victims are able to easily access information. Being able to easily retrieve information and communicate with practitioners using multiple communication vehicles can promote patient/client autonomy, increasing victims' sense of confidence, self-efficacy, and empowerment in terms of making decisions that promote their well-being and safety. For example, all 50 states have a domestic violence coalition, with a website for the public to access information about domestic violence, resources, shelters, and safety planning. Victims of intimate partner violence can also research information about restraining orders, shelters, and employment opportunities [38]. In a study by the Technology Safety Project of the Washington State Coalition Against Domestic Violence, a project designed to promote awareness of how technology can increase the risk of domestic violence, participants indicated that the Internet was an important tool when researching strategies to promote safety, allowing victims to play an active role in their own care [21,39]. Internet technology has also been used to provide education regarding general life skills for domestic violence victims, such as job training, money management, and practical survival skills. Victims have reported using the Internet to help search for housing, obtain assistance in creating a résumé, and enhance their skills in order to get a job [21]. Internet technology may also be used to help raise awareness about domestic violence and to educate the public about intimate partner violence, how to obtain services, and how to protect oneself [71].

Domestic violence victims often feel psychologically isolated, with overwhelming feelings of shame and worthlessness. They may also be physically isolated, given that abusers monitor victims' movements and/or restrict interaction with friends and family members. However, the Internet has opened opportunities for individuals to obtain social support. Online support groups, such as online self-help groups and discussion forums, can create communities for individuals to connect with each other based on common experiences. Victims and survivors of domestic violence share their stories in these online communities and through various Internet tools, including online social networking sites, video conferencing, and e-mail, to derive support from others with similar experiences [26,38]. Victims may feel more empowered and able to open up regarding domestic violence experiences online due to the relative anonymity and lack of stigma [71,72].

Because domestic violence situations are intense and manifest as crises to victims, Internet and electronic technologies can quickly connect victims to helping professionals. For example, victims can e-mail their counselors to obtain support during crisis situations. Providers can also more readily provide victims with information about potential options and resources, instead of having to wait for office visits [36]. In one research project, funds were provided for healthcare providers to use personal digital assistants (PDAs) to screen for abuse [40]. When the practitioner determined that an individual was at-risk, information was transmitted as quickly as possible to social workers to follow-up, mobilize resources, and electronically file mandatory reports of domestic violence [40]. Ultimately, this could improve the practitioner/patient relationship through the provision of more seamless services, which can increase patient satisfaction and reduce attrition.

Just as perpetrators of domestic violence can use electronic tools to harass their victims, victims can use technology to increase their sense of security. Victims may install cameras in their homes for additional security and in order to obtain evidence if the abuser is violating a restraining order. Others use text messages as a way to let friends and family members know they may be in danger and to reach out for help [38]. However, it is always important for victims to remain vigilant regarding possible monitoring by their abusers. Victims who know or suspect that their online activities are being monitored should avoid visiting domestic violence sites or contacting triggering individuals unless an escape plan is in place.

REFORMULATING SAFETY PLANNING IN THE INTERNET AGE

Traditionally, safety planning has involved identifying practical approaches for lessening the risk of harm, including a plan of action if the victim decides to leave the abusive relationship such as having a bag packed with all the necessary documents; this is still advisable [73]. However, safety planning should also be supplemented with extra precautions that ensure victims understand how electronic communication tools can place them at risk and further steps to protect their safety. Practitioners serve a vital role in educating their patients or clients.

Many domestic violence organizations disseminate a message of fear in their communications about Internet safety [41]. Although fear can initially invoke safety behaviors, fear tactics tend to actually prevent the behavior that one is trying to promote over time. In other words, while a low amount of fear may not trigger any safety behaviors because individuals do not perceive the threat as real, employing a tremendous amount of fear in education and communications can also prove ineffective if individuals perceive there are no viable options to mitigate the fear. In these cases, victims may merely suppress the fear and not engage in any safety behavior [41]. As a result, practitioners must strike a balance in providing both education and support. The following precautions can promote technologic safety for victims and survivors of intimate partner violence [42,43,44,45,70]:

  • Practitioners should encourage victims to Google themselves to see what personal information is available online.

  • If a perpetrator is harassing the victim by cell phone, the practitioner should discuss with the victim potential reactions and responses the abuser may have to changing the phone number. Would this enrage the perpetrator and place the victim in further danger? If the same number is retained, should the phone company be contacted to track calls? If the victim eventually decides to take legal action, having an archive of text and voice messages could be beneficial.

  • Practitioners should recommend that victims check account and privacy settings on social networking sites and ensure that the information on their profiles is private. Explain to patients/clients how personal information posted about activities and schedules can be used by the abuser.

  • It is easy to believe computers and online accounts are secure when they are not. Victims should be reminded that their computers and phones are not secure. Using a public computer (e.g., at a library) is a safer option than accessing information from a personal computer or cell phone.

  • Practitioners should recommend that victims clear browser histories, temporary Internet files from downloads, and saved passwords on online accounts every time they use a computer.

  • Victims should be encouraged to keep their accounts password-protected.

  • Victims should change their passwords and identification numbers frequently and avoid selecting passwords or numbers that perpetrators could easily guess (e.g., important dates, nicknames, relatives' names).

  • Victims should be advised to always log out of e-mail, social network accounts, and other personal accounts when not in use.

  • E-mail addresses should be similarly anonymous. If an e-mail address contains names or other common terms to the victim, the perpetrator will be more likely to figure it out.

  • Victims may also be encouraged to set up multiple e-mail accounts. Incoming and outgoing e-mails that the victim does not necessarily want the abuser to see can be sent from one specific account accessed only from a public computer. Free e-mail accounts can be established through a variety of online hosts.

  • When working with victims to make an escape plan, consider obtaining a donated cell phone for the victim to use instead of a personal one. An abuser can easily access personal phone records to view incoming and outgoing calls, potentially determining when and where the victim is planning to leave.

  • Victims should be encouraged to look into their health records, as many are electronically based. There are no guarantees about privacy and security.

  • Education should be provided to victims detailing how software programs can be used to monitor computer activities. If a victim suspects such a program being used, he or she should not attempt to research the software or attempt to remove it, as this could be dangerous.

INTERVENTIONS AND EDUCATION

Many adults may be categorized as what is termed "digital immigrants," meaning they did not grow up in the digital world and are trying to learn and adapt to this new environment [46]. Digital immigrants may employ technology and acknowledge its importance for some tasks, but tend to be less familiar with its potential [47]. On the other hand, adolescents and young adults are generally considered "digital natives," as they were raised using digital technology and have no difficulty speaking about and utilizing new technologic mediums with ease and familiarity [46]. Digital natives tend to use technology for numerous tasks and adapt as the tools change [47]. It is likely that the majority of health and mental health practitioners fall into the category of "digital immigrants," and many patients/clients, particularly adolescents and young adults, are "digital natives." Consequently, practitioners must quickly build their knowledge of new technology and how it is being used by their potentially younger patients or clients [47]. Unfortunately, this includes the need to understand how Internet technologies are being used to perpetuate abuse.

In order for practitioners to effectively educate patients/clients about the role of technology in intimate partner violence, they must understand the capacity of available programs and applications. Fortunately, there is a tremendous amount of information available online (Resources). These resources can be used to obtain a foundational knowledge in order to more effectively educate patients and clients.

Organizations and facilities share some responsibility in training professionals to become more computer and Internet savvy in general, especially in educating practitioners in how intimate partners can use the Internet and other forms of electronic communications to threaten, abuse, and intimidate their victims. It is important to identify cyberstalking and cyberabuse as crimes and respond accordingly, providing immediate services to protect victims [48]. When victims indicate that they feel they are being watched or that an abuser appears to know every movement made by the victim, practitioners should acknowledge and validate the experience [48].

To address the emotional turmoil and fear that victims of intimate partner violence experience, a variety of interventions can be offered [48]:

  • Crisis intervention and emotional support

  • Review and formulation of safety plans (both traditional domestic violence safety plans and plans that include Internet and electronic communications safety)

  • Assessment of victims' level of risk as well as their children's safety

  • Advising victims to keep logs and copies of threatening e-mails, phone calls, chatroom postings, etc.

Community partnerships are vital, as it is often impossible for one organization or agency to provide multilevel services to meet all the needs of victims [48]. If Internet/technologic safety is an issue, collaborations with technology experts, legal professionals familiar with laws pertaining to stalking (particularly cyberstalking), and/or businesses that are willing to donate cell phones to victims can all be valuable.

Practitioners should also familiarize themselves with the Violence Against Women Act (VAWA). VAWA, enacted in 1994 and reauthorized in 2000, 2005, and 2013, was the first federal legislation that addressed domestic violence and other forms of violence against women. Since the first enactment, the legislation has been updated to touch on relevant issues such as privacy, the role of the Internet, and cyberstalking. Before anyone or any court can obtain private information, agencies funded by VAWA must make every reasonable effort to obtain permission and releases from victims [49]. Furthermore, VAWA restricts the online publication of filings for orders of protection as this could place victims at risk for discovery by perpetrators [49]. The 2005 reauthorization of VAWA updated stalking laws to reflect the use of Internet and electronic communications for the purposes of monitoring and harassing [49]. Finally, the 2013 reauthorization helped to ensure that services are available to persons of all sexual/gender identities, all races/ethnicities, college students, young adults, and immigrants [29].

CULTURALLY SENSITIVE ASSESSMENT

During the assessment process, a practitioner must be open and sensitive to the client's/patient's worldview, cultural belief systems, and how he/she views the injury or situation. Professionals should be willing to acknowledge that they do not possess enough or adequate knowledge in health beliefs and practices among the different ethnic and cultural groups they come in contact with. Reading and becoming familiar with medical anthropology is a good first step. Culturally sensitive assessment involves a dynamic framework whereby the practitioner engages in a continual process of questioning. By incorporating cultural sensitivity into the assessment of individuals with a history of being victims or perpetrators of domestic violence, it may be possible to intervene and offer treatment more effectively.

CONCLUSION

Technology is a tool, and as with any tool, it can be used for positive means or abused to manipulate and exploit others. The solution is not to restrict access to technology but to educate consumers regarding its safe use. In addition to educating consumers, social service agencies, mental health organizations, and other helping organizations play a vital role in raising awareness among key stakeholders about how technology can be used by abusers to place domestic violence victims at risk. Furthermore, domestic violence advocates and practitioners can advocate for the formulation of new laws to protect victims of technology-based abuse. As more organizations use various forms of Internet technologies as part of their models of service delivery, it has become vital to incorporate security systems to protect the privacy of patients and clients, particularly victims of abuse.

RESOURCES

Electronic Privacy Information Center
https://epic.org
Founded in 1994, this public interest research center focuses on emerging civil liberties and privacy issues. They address the impact of the Internet on privacy issues in the area of domestic violence, medical records, and civil liberties.
Love is Respect
http://www.loveisrespect.org/resources/love-is-digital
The mission of this organization is to educate and provide services to young people and parents about abusive relationships.
Microsoft Safety and Security Center
https://www.microsoft.com/en-us/security
National Center for Victims of Crime
http://victimsofcrime.org
National Network to End Domestic Violence
Technology Safety
https://nnedv.org/resources/?mdocs-cat=mdocs-cat-8#content
National Online Resource Center on Violence Against Women
Safety and Privacy in a Digital World
https://vawnet.org/sc/safety-privacy-digital-world
This special collection includes a categorized and annotated listing of selected articles, fact sheets, papers, reports, and other materials regarding the use of technology as it impacts and intersects with violence against women and children.
Privacy Rights Clearinghouse
https://www.privacyrights.org
Founded in 1992, this nonprofit consumer organization provides the general public with information about privacy and advocates for consumers.
Technology Safety
Tech Safety App
https://techsafetyapp.org
This app contains information that can help someone identify technology-facilitated harassment, stalking, or abuse and includes tips on what can be done.
Working to Halt Online Abuse (WHOA)
http://www.haltabuse.org
Founded in 1997, this volunteer organization provides targeted education to the general public, victims, and professionals about online harassment.

Works Cited

1. Ganley AL, Schecter S. Domestic Violence: A National Curriculum for Children's Protective Services. San Francisco, CA: Family Violence Prevention Fund; 1996.

2. World Health Organization. World Report on Violence and Health. Available at http://apps.who.int/iris/bitstream/handle/10665/42495/9241545615_eng.pdf;jsessionid=FE6045F0DE97F4455D83BC3AEE5319F6?sequence=1. Last accessed May 14, 2018.

3. Centers for Disease Control and Prevention. Understanding Intimate Partner Violence: Fact Sheet, 2014. Available at https://www.cdc.gov/violenceprevention/pdf/ipv-factsheet.pdf. Last accessed May 14, 2018.

4. Outlaw M. No one type of intimate partner abuse: exploring physical and non-physical abuse among intimate partners. J Fam Violence. 2009;24(4):263-272.

5. Breiding MJ, Smith SG, Basile KC, Walters ML, Chen J, Merrick MT. Prevalence and characteristics of sexual violence, stalking, and intimate partner violence victimization—national intimate partner and sexual violence survey, United States, 2011. MMWR. 2014;63(8):1-18.

6. Espelage DL, Low SK, Anderson C, De La Ru L. Bullying, Sexual, and Dating Violence Trajectories From Early to Late Adolescence. Available at https://www.ncjrs.gov/pdffiles1/nij/grants/246830.pdf. Last accessed May 14, 2018.

7. Zweig JM, Dank M, Lachman P, Yahner J. Technology, Teen Dating Violence and Abuse, and Bullying. Available at https://www.ncjrs.gov/pdffiles1/nij/grants/243296.pdf. Last accessed May 14, 2018.

8. Barocas B, Emery D, Mills L. Changing the domestic violence narrative: aligning definitions and standards. J Fam Violence. 2016;31(8):941-947.

9. Woodlock D. The abuse of technology in domestic violence and stalking. Violence Against Women. 2017;23(5):584-602.

10. U.S. Census Bureau. Computer and Internet Use in the United States: November 2014. Available at https://www.census.gov/content/dam/Census/library/publications/2014/acs/acs-28.pdf. Last accessed May 14, 2018.

11. Pew Internet. Internet/Broadband Fact Sheet. Available at http://www.pewinternet.org/fact-sheet/internet-broadband. Last accessed May 14, 2018.

12. Lenhart A. Adult Attitudes Towards the Cell Phone. Available at http://www.pewinternet.org/2010/09/02/part-three-adult-attitudes-towards-the-cell-phone. Last accessed May 14, 2018.

13. Walsh SP, White KM, Young RM. Over-connected? A qualitative phenomenon of the relationship between Australian youths and their mobile phones. J Adolesc. 2008;31(1):77-92.

14. Lenhart A, Ling R, Campbell S, Purcell K. Teens and Mobile Phones. Available at http://www.pewinternet.org/2010/04/20/teens-and-mobile-phones. Last accessed May 14, 2018.

15. World Health Organization. Understanding and Addressing Violence Against Women. Available at http://www.who.int/reproductivehealth/topics/violence/vaw_series/en. Last accessed May 14, 2018.

16. Kalokhe AS, Potdar RR, Stephenson R, et al. How well does the World Health Organization definition of domestic violence work for India? PLoS One. 2015;10(3):1-16.

17. Nevala S. Coercive control and its impact on intimate partner violence through the lens of an EU-wide survey on violence against women. J Interpers Violence. 2017;32(12):1792-1820.

18. San Diego County District Attorney. Protecting Children Online. Available at http://www.sdcda.org/preventing/protecting-children-online/facts-for-parents.html. Last accessed May 14, 2018.

19. Finn J. A survey of online harassment at a university campus. J Interpers Violence. 2004;19(4):468-483.

20. Working to Halt Online Abuse. 2013 Cyberstalking Statistics. Available at http://www.haltabuse.org/resources/stats/2013Statistics.pdf. Last accessed May 14, 2018.

21. Finn J, Atkinson T. Promoting the safe and strategic use of technology for victims of intimate partner violence: evaluation of the technology safety project. J Fam Violence. 2009;24(1):53-59.

22. Hinduja S, Patchin JW. Cyberbullying Research Summary: Bullying, Cyberbullying, and Sexual Orientation. Available at https://cyberbullying.org/cyberbullying_sexual_orientation_fact_sheet.pdf. Last accessed May 14, 2018.

23. Draucker CB, Martsolf DS. The role of electronic communication technology in adolescent dating violence. J Child Adolesc Psychiatr Nurs. 2010;23(3):133-142.

24. Gatti J. 2009 AP-MTV Digital Abuse Study Executive Summary. Available at http://www.athinline.org/MTV-AP_Digital_Abuse_Study_Executive_Summary.pdf. Last accessed May 14, 2018.

25. Privacy Rights Clearinghouse. Fact Sheet: Are You Being Stalked? Available at https://www.privacyrights.org/consumer-guides/online-harassment-cyberstalking. Last accessed May 14, 2018.

26. Baughman LL. Friend request or foe? Confirming the misuse of Internet and social networking sites by domestic violence perpetrators. Widener Law Journal. 2010;19(3):933-966.

27. Boyd DM, Ellison NB. Social networking sites: definition, history and scholarship. J Comput Mediat Commun. 2007;13(1):210-230.

28. Southworth C, Finn J, Dawson S, Fraser C, Tucker S. Intimate partner violence, technology, and stalking. Violence Against Women. 2007;13(8):842-856.

29. U.S. Congress. The Violence Against Women Reauthorization Act of 2013. Available at https://www.gpo.gov/fdsys/pkg/PLAW-113publ4/pdf/PLAW-113publ4.pdf. Last accessed May 14, 2018.

30. Kranz AL, Nakamura K. Helpful or Harmful? How Innovative Communication Technology Affects Survivors of Intimate Violence. Available at http://victimsofcrime.org/docs/Information%20Clearinghouse/Helpful_or_Harmful.pdf?sfvrsn=4. Last accessed May 14, 2018.

31. Guterman JT, Kirk MA. Mental health counselors and the Internet. J Ment Health Couns. 1999;21(4):309-325.

32. Melander LA. College students' perceptions of intimate partner cyber harassment. CyberPsychol Behav Soc Netw. 2010;13(3):263-268.

33. Johnson MP. Patriarchal terrorism and common couple violence: two forms of violence against women. J Marriage Fam. 1995;57(2):283-294.

34. Johnson MP. Conflict and control: gender symmetry and asymmetry in domestic violence. Violence Against Women. 2006;12(11): 1003-1018.

35. Southworth C, Dawson S, Fraser C, Tucker S. A High-Tech Twist on Abuse: Technology, Intimate Partner Stalking, and Advocacy. Available at https://nnedv.org/mdocs-posts/high-tech-twist-on-abuse-technology-intimate-partner-stalking-and-advocacy/. Last accessed May 14, 2018.

36. Spence-Diehl E. Stalking and technology: the double-edged sword. J Technol Hum Serv. 2003;22(1):5-18.

37. Finn J. A survey of domestic violence organizations on the World Wide Web. J Technol Hum Serv. 2000;17(1):83-102.

38. Tucker S, Cremer T, Fraser C, Southworth C. A High-Tech Twist on Abuse. Available at https://nnedv.org/mdocs-posts/high-tech-twist-on-abuse-technology-intimate-partner-stalking-and-advocacy. Last accessed May 14, 2018.

39. Lo B, Parham L. The impact of Web 2.0 on the doctor-patient relationship. J Law Med Ethics. 2010;38(1):17-26.

40. Hawkins JW, Pearce CW, Skeith J, Dimitruk B, Roche R. Using technology to expedite screening and intervention for domestic abuse and neglect. Pub Health Nurs. 2009;26(1):58-69.

41. LaRose R, Rifon NJ, Enbody R. Promoting personal responsibility for Internet safety. Commun ACM. 2008;51(3):71-76.

42. Technology Safety. Online Privacy and Safety Tips. Available at https://www.techsafety.org/onlineprivacyandsafetytips. Last accessed May 14, 2018.

43. Technology Safety. Technology Safety Plan. Available at https://www.techsafety.org/resources-survivors/technology-safety-plan. Last accessed May 14, 2018.

44. Technology Safety. Who's Spying on Your Computer? Spyware, Surveillance, and Safety for Survivors. Available at https://www.techsafety.org/computerspyware. Last accessed May 14, 2018.

45. Teen Dating Violence Technical Assistance Center. Technology and Teen Dating Violence. Issue Brief No. 4. Available at https://www.breakthecycle.org/sites/default/files/pdf/ta-issue-brief-12-08.pdf. Last accessed May 14, 2018.

46. Prensky M. Digital natives, digital immigrants. On the Horizon. 2001;9(5):1-6.

47. Herther NK. Digital natives and immigrants: what brain research tells us. Online. 2009;33(6):15-22.

48. U.S. Department of Justice. The Office on Violence Against Women's Grant Funds Used to Address Stalking: 2010 Report to Congress. Available at https://www.justice.gov/sites/default/files/ovw/legacy/2012/09/18/2010-stalking-rpt.pdf. Last accessed May 14, 2018.

49. Electronic Privacy Information Center. VAWA and Privacy. Available at https://epic.org/privacy/dv/vawa.html. Last accessed May 14, 2018.

50. Madden M, Lenhart A, Cortesi S, et al. Teens, Social Media, and Privacy. Available at http://www.pewinternet.org/2013/05/21/teens-social-media-and-privacy. Last accessed May 14, 2018.

51. Candela K. Protecting the invisible victim: incorporating coercive control in domestic violence statutes. Fam Court Rev. 2016;54(1):112-125.

52. Gonçalves M, Matos M. Prevalence of violence against immigrant women: a systematic review of the literature. J Fam Violence. 2016;31(6):697-710.

53. Blodgett C, Lanigan JD. The prevalence and consequences of intimate partner violence intrusion in the workplace. J Aggress Maltreat Trauma. 2018;27(1):15-34.

54. Começanha R, Basto-Pereira M, Maia Â. Clinically speaking, psychological abuse matters. Compr Psychiatry. 2017;73:120-126.

55. Tonsing JC. Domestic violence: intersection of culture, gender and context. J Immigr Health. 2016;18(2):442-446.

56. Trinh OT, Oh J, Choi S, To KG, Van Do D. Changes and socioeconomic factors associated with attitudes towards domestic violence among Vietnamese women aged 15 to 49: findings from the Multiple Indicator Cluster Surveys, 2006–2011. Glob Health Action. 2016;9.

57. Wincentak K, Connolly J, Card N. Teen dating violence: a meta-analytic review of prevalence rates. Psychol Violence. 2017;7(2):224-241.

58. Brown C, Hegarty K. Digital dating abuse measures: a critical review. Aggress Violent Behav. 2018;40:44-59.

59. Ybarra M, Price-Feeney M, Lenhart A, Zickuhr K. Intimate Partner Digital Abuse. New York, NY: Data and Society Research Institute, Center for Innovative Public Health Research; 2017.

60. Pew Research Center. Digital Divides: Feeding America. Available at http://www.pewinternet.org/2017/02/09/digital-divides-feeding-america. Last accessed May 14, 2018.

61. Pew Research Center. Mobile Fact Sheet. Available at http://www.pewinternet.org/fact-sheet/mobile. Last accessed May 14, 2018.

62. Pew Research Center. U.S. Smartphone Use in 2015. Available at http://www.pewinternet.org/2015/04/01/us-smartphone-use-in-2015. Last accessed May 14, 2018.

63. Pew Research Center. Social Media Update 2016. Available at http://www.pewinternet.org/2016/11/11/social-media-update-2016. Last accessed May 14, 2018.

64. Pew Research Center. Teens, Social Media and Technology Overview 2015. Available at http://www.pewinternet.org/2015/04/09/teens-social-media-technology-2015. Last accessed May 14, 2018.

65. Watkins LE, Maldonado RC, DiLillo D. The Cyber Aggression in Relationships Scale: a new multidimensional measure of technology-based intimate partner aggression. Assessment. 2016; [Epub ahead of print].

66. Reed LA, Tolman RM, Ward LM. Gender matters: experiences and consequences of digital dating abuse victimization in adolescent dating relationships. J Adolesc. 2017;59:79-89.

67. Van Ouytsel J, Walrave M, Ponnet K, Temple JR. Digital forms of dating violence: what school nurses need to know. NASN Sch Nurse. 2016;31(6):348-353.

68. Marcum C, Higgins G, Nicholson J. I'm watching you: cyberstalking behaviors of university students in romantic relationships.Am J Crim Justice. 2017;42(2):373-388.

69. Marganski A, Melander L. Intimate partner violence victimization in the cyber and real world: examining the extent of cyber aggression experiences and its association with in-person dating violence. J Interpers Violence. 2018;33(7):1071-1095.

70. Lee K, Anderson J. The Internet and intimate partner violence. Crim Justice. 2016;31(2):28-33.

71. Tarzia L, Iyer D, Thrower E, Hegarty K. "Technology doesn't judge you:" Young Australian women's views on using the Internet and smartphones to address intimate partner violence. J Technol Hum Serv. 2017;35(3):199-218.

72. Bacchus LJ, Buller AM, Bullock L, et al. Infusing technology into perinatal home visitation in the United States for women experiencing intimate partner violence: exploring the interpretive flexibility of an mHealth intervention. J Med Internet Res. 2016;18(11):37-53.

73. Kahraman MS, Bell K. Safety planning: a vital preliminary step for professionals working with intimate partner violence victims. Bilişsel Davranışçı Psikoterapi Araştırmalar Dergisi. 2017;6(3):141-150.


Copyright © 2018 NetCE, P.O. Box 997571, Sacramento, CA 95899-7571
Mention of commercial products does not indicate endorsement.