Please use this identifier to cite or link to this item: https://anrows.intersearch.com.au/anrowsjspui/handle/1/13103
Record ID: fbacfa50-1561-4608-be36-7ed3890521b0
Full metadata record
DC FieldValueLanguage
dc.contributor.authorFraser, Cynthiaen
dc.contributor.authorSouthworth, Cindyen
dc.contributor.authorTucker, Sarahen
dc.contributor.authorCremer, Tobyen
dc.date.accessioned2022-06-30T23:04:17Z-
dc.date.available2022-06-30T23:04:17Z-
dc.date.issued2005en
dc.identifier.citation1 (3), December 2005en
dc.identifier.issn15564827en
dc.identifier.urihttps://anrows.intersearch.com.au/anrowsjspui/handle/1/13103-
dc.languageenen
dc.publisherFamily Violence Prevention Funden
dc.subjectCyberstalking and digital technologyen
dc.subjectPolicyen
dc.subjectStalkingen
dc.titleA high-tech twist on abuseen
dc.title.alternativeFamily violence prevention and health practice [electronic resource] : an [cut]en
dc.typeJournal Articleen
dc.identifier.catalogid5723en
dc.identifier.urlhttp://www.futureswithoutviolence.org/health/ejournal/archive/1-3/Tucker.pdfen
dc.subject.keywordJournal article/research paperen
dc.subject.keywordInternationalen
dc.subject.keywordInvalid URLen
dc.subject.keywordnew_recorden
dc.subject.keywordElectronic publicationen
dc.description.notesThis article looks at Safety Net, a project in the US to advance knowledge and policies on the impact of technology on family violence victim safety, how abusers are using technology against victims and what victims can do with technology to improve safety. It lists the key features of technology which are used by abusers with some case examples: new computer software and hardware to stalk and harass victims, monitoring options to view website browser history or intercept email, SpyWare software and hardware for intelligence; fax header on faxed documents to locate partners; impersonate survivors by using their TTYs to seek information about their activities; emails and instant messages to threaten survivors or impersonate them by changing victim’s email password and sending threatening messages to himself from her email account and asking police to arrest her; websites that threaten survivors or encourage others to contact and/or harass them. Key ways of how to use technology to benefit survivors are provided (illustrated by case examples): a mobile phone number exclusively only to an ex-husband for visitation arrangements and then keeping records of hang-up calls on a phone number only the abuser knew; text messaging feature on mobile phone to alert a friend to call for help from the police; using computers at the library for searching information and help in order to be anonymous; answering machines and voicemail to document harassing messages; installation of security cameras to increase sense of safety and to provide evidence of violations of restraining orders; deaf survivors use web-based video messaging services to converse with service providers in sign language. The Safety Net project is explained, which also trains and educates survivors, advocates and workers to expand safety planning to include technology, and addresses technology policy issues affecting survivors of domestic and sexual violence, and stalking.en
dc.identifier.sourceFamily violence prevention and health practice [electronic resource] : an [cut]en
dc.date.entered2005-12-21en
Appears in Collections:Journal Articles

Files in This Item:
There are no files associated with this item.


Items in ANROWS library are protected by copyright, with all rights reserved, unless otherwise indicated.

Google Media

Google ScholarTM

Who's citing