Confronting Domestic Violence Series - originally published on LosAltosOnline.com

 

How technology is used to hurt women

August 5, 2015 by Ruth Patrick

This is the first in a six-part series on domestic violence and technological abuse. Names, professions, histories and other personal identifying information have been changed to create a composite character to protect confidentiality.

What’s one of the perks of living in Silicon Valley? The instant access we have to all the latest toys and gadgets. In most cases, we are only a keystroke…

 

How abusive husband seemed omnipotent and drove wife to edge of sanity

August 12, 2015 by Ruth Patrick

This is the second in a six-part series on domestic violence and technological abuse. Names, professions, history and other personal identifying features have been changed to create a composite character to protect confidentiality. In Part 1, after leaving Ed, her abusive husband, Beth discovers that he has been using technology to stalk, frighten, control and discredit her.

 

How abusive husband turned wife's own technology against her

August 26, 2015 by Ruth Patrick

This is the third in a six-part series on domestic violence and technological abuse. Names, professions, history and other personal identifying features have been changed to create a composite character to protect confidentiality. After leaving her abusive husband, Beth discovers that he has been using technology to stalk, frighten, control and discredit her and then learns what to do about it.

 

Abuser systematically isolates victim from supporters

September 2, 2015 by Ruth Patrick

This is the fourth in a six-part series on domestic violence and technological abuse. Names, professions, history and other personal identifying features have been changed to create a composite character to protect confidentiality.

 

Abuse victim builds a support network

September 16, 2015 by Ruth Patrick

This is the final installment in a six-part series on domestic violence and technological abuse. Names and other personal identifying features have been changed to create a composite character to protect confidentiality.

 

Victim protects herself from technological abuse

September 9, 2015 by Ruth Patrick

This is the fifth in a six-part series on domestic violence and technological abuse. Names, professions, history and other personal identifying features have been changed to create a composite character to protect confidentiality.