Power and control wheel: on technology and abuse
This diagram illustrates some ways abusers might misuse technology in the context of stalking, domestic and sexual violence. Perpetrators might try to misuse any technology if it enables them to monitor, impersonate, control or harm. Examples of technology abusers misuse include phone interceptors, listening devices and bugs; caller ID spoof and unblock; email, text and instant messages; computer and phone spyware and monitoring; fax machines; assistive devices and relay services; location tracking devices (e.g. GPS) and services; cameras and other recording devices; mobile phones and tablets; social networking and media sites, websites and more.
This wheel is based on Duluth’s Domestic Abuse Intervention Project mode.