Confronting Domestic Violence Series - originally published on LosAltosOnline.com
How technology is used to hurt women
August 5, 2015 by Ruth Patrick
This is the first in a six-part series on domestic violence and technological abuse. Names, professions, histories and other personal identifying information have been changed to create a composite character to protect confidentiality.
What’s one of the perks of living in Silicon Valley? The instant access we have to all the latest toys and gadgets. In most cases, we are only a keystroke…
How abusive husband seemed omnipotent and drove wife to edge of sanity
August 12, 2015 by Ruth Patrick
This is the second in a six-part series on domestic violence and technological abuse. Names, professions, history and other personal identifying features have been changed to create a composite character to protect confidentiality. In Part 1, after leaving Ed, her abusive husband, Beth discovers that he has been using technology to stalk, frighten, control and discredit her.
How abusive husband turned wife's own technology against her
August 26, 2015 by Ruth Patrick
This is the third in a six-part series on domestic violence and technological abuse. Names, professions, history and other personal identifying features have been changed to create a composite character to protect confidentiality. After leaving her abusive husband, Beth discovers that he has been using technology to stalk, frighten, control and discredit her and then learns what to do about it.
Abuser systematically isolates victim from supporters
September 2, 2015 by Ruth Patrick
This is the fourth in a six-part series on domestic violence and technological abuse. Names, professions, history and other personal identifying features have been changed to create a composite character to protect confidentiality.
Abuse victim builds a support network
September 16, 2015 by Ruth Patrick
This is the final installment in a six-part series on domestic violence and technological abuse. Names and other personal identifying features have been changed to create a composite character to protect confidentiality.
Victim protects herself from technological abuse
September 9, 2015 by Ruth Patrick
This is the fifth in a six-part series on domestic violence and technological abuse. Names, professions, history and other personal identifying features have been changed to create a composite character to protect confidentiality.