{"id":564,"date":"2026-03-08T15:45:19","date_gmt":"2026-03-08T19:45:19","guid":{"rendered":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/?post_type=chapter&#038;p=564"},"modified":"2026-04-20T14:22:46","modified_gmt":"2026-04-20T18:22:46","slug":"chapter-3-different-forms-of-tfgbv","status":"publish","type":"chapter","link":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-3-different-forms-of-tfgbv\/","title":{"raw":"Chapter 3: Forms of TFGBV","rendered":"Chapter 3: Forms of TFGBV"},"content":{"raw":"<p style=\"text-align: right\"><a id=\"quick-exit-btn\" href=\"https:\/\/google.ca\" title=\"Quick Exit\">EXIT SITE<\/a><\/p>\r\n\r\n<h1>Chapter 3: Forms of TFGBV<\/h1>\r\nIn this chapter, we will focus on the <strong><em>forms of TFGBV.<\/em><\/strong> This means, the actual behaviours and tactics that perpetrators use. The same harmful behaviours can appear across many different platforms, and that the same platform can be misused in several different ways. Separating the forms of TFGBV from potential places where TFGBV can occur makes it easier to <strong>recognise patterns, understand risks, and connect what you learn to real\u2011life situations.<\/strong>\r\n\r\nWhen we listed platforms and devices in <a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-2\/\">Chapter 2<\/a>, our goal was to help you understand where tech\u2011facilitated gender\u2011based violence can take place. People use many different apps, websites, and digital tools every day, and any of them can be misused. But knowing the platforms alone doesn\u2019t give the big picture story.\r\n\r\n<hr \/>\r\n\r\n<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Learning Objectives<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul>\r\n \t<li>Learn how TFGBV can be committed in different forms and with different tactics.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n\r\n<hr \/>\r\n\r\nThis chapter builds on the foundation from <a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-2\/\">Chapter\u202f2<\/a> by showing <strong>how digital spaces can be used to harm someone.<\/strong> It gives you a clearer picture of what TFGBV can look like in practice, no matter which platform or device is involved.\r\n\r\nThere are hundreds of recognized forms of TFGBV, and TFGBV is constantly evolving. As a result, this list is not totally comprehensive. However, <span style=\"text-decoration: underline\"><strong>we will discuss the following common categories of TFGBV forms: <\/strong><\/span>\r\n<ul>\r\n \t<li><a href=\"#3.1\">Control-based abuse<\/a><\/li>\r\n \t<li><a href=\"#3.2\">Cyber-grooming<\/a><\/li>\r\n \t<li><a href=\"#3.3\">Economic and financial abuse<\/a><\/li>\r\n \t<li><a href=\"#3.4\">Hacking and account takeovers<\/a><\/li>\r\n \t<li><a href=\"#3.5\">Hate speech<\/a><\/li>\r\n \t<li><a href=\"#3.6\">Image-based abuse<\/a><\/li>\r\n \t<li><a href=\"#3.7\">Impersonation and identity theft<\/a><\/li>\r\n \t<li><a href=\"#3.9\">Online harassment and cyberbullying<\/a><\/li>\r\n \t<li><a href=\"#3.10\">Stalking, tracking, and digital surveillance<\/a><\/li>\r\n \t<li><a href=\"#3.11\">Threats and intimidation<\/a><\/li>\r\n<\/ul>\r\n\r\n<hr \/>\r\n\r\n<h1><a id=\"3.1\"><\/a>Control-Based Abuse<\/h1>\r\nControl\u2011based abuse happens when someone <strong>restricts your<\/strong> ability to use phones, computers, the internet, or other technology. This can isolate someone from support or limit their independence. <strong style=\"text-align: initial;font-size: 1em\">This may look or sound like:<\/strong>\r\n<ul>\r\n \t<li>Taking away devices without consent or permission.<\/li>\r\n \t<li>Logging into accounts to monitor or restrict communication.<\/li>\r\n \t<li>Controlling devices under the excuse of \u201chelping\u201d or saying things like: \u201cyou don\u2019t understand technology.\u201d<\/li>\r\n \t<li>Limiting access to assistive technology needed for independence.<\/li>\r\n \t<li>Discouraging online presence with statements such as: \u201cYou\u2019ll embarrass yourself online.<\/li>\r\n<\/ul>\r\n[caption id=\"attachment_888\" align=\"aligncenter\" width=\"564\"]<img src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-10.png\" alt=\"A woman is distressed while a man in the background holds his phone angrily. In the middle is a drawing of the woman as a puppet, with strings binding her arms and controlling her movement.\" width=\"564\" height=\"264\" class=\"wp-image-888\" \/> Control-based TFGBV can occur by the control of access to technology, or through controlling actions committed via technology.<span style=\"text-align: initial;font-size: 1em\"><\/span>[\/caption]\r\n<h1><a id=\"3.2\"><\/a>Cyber\u2011Grooming<\/h1>\r\nCyber\u2011grooming occurs when someone builds trust online to exploit another person sexually, financially, or emotionally. Grooming usually happens over time and often involves someone older or in a position of power (for example, a teacher, caregiver, or community leader). <strong>Cyber-grooming can include:<\/strong>\r\n<ul>\r\n \t<li>Pretending to be a friend, romantic partner, or supportive figure.<\/li>\r\n \t<li>Using trust to pressure someone into harmful or abusive behaviour.<\/li>\r\n \t<li>Manipulating someone into giving money or access to financial resources.<\/li>\r\n<\/ul>\r\n<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-3-different-forms-of-tfgbv\/immediate-safety-actions-digital-12\/\" rel=\"attachment wp-att-891\"><img src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-12-e1773196154813.png\" alt=\"\" width=\"669\" height=\"214\" class=\"wp-image-891 aligncenter\" \/><\/a>\r\n<h1><a id=\"3.3\"><\/a>Economic and Financial Abuse<\/h1>\r\nDigital platforms can be used to control or <strong>exploit someone\u2019s finances<\/strong>. <strong>Examples of financial abuse may include:<\/strong>\r\n<ul>\r\n \t<li>Accessing online banking without permission.<\/li>\r\n \t<li>Threatening harm unless money is sent.<\/li>\r\n \t<li>Offering \u201chelp\u201d with finances as a way to gain control.<\/li>\r\n \t<li>Controlling disability payments or benefits.<\/li>\r\n \t<li>Forcing mobile money transfers.<\/li>\r\n \t<li>Locking someone out of financial or work\u2011related apps.<\/li>\r\n<\/ul>\r\n<h1><a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-3-different-forms-of-tfgbv\/immediate-safety-actions-digital-11\/\" rel=\"attachment wp-att-889\"><img src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-11.png\" alt=\"\" width=\"509\" height=\"238\" class=\"wp-image-889 aligncenter\" \/><\/a>\r\nHacking and Account Takeovers<\/h1>\r\n<strong>Hacking<\/strong> involves <strong>accessing someone\u2019s accounts, devices, or personal information without permission.<\/strong> This can include guessing passwords, using saved logins, or exploiting security weaknesses.\u00a0<strong>Once inside an account, they may:<\/strong>\r\n\r\n<!--StartFragment -->\r\n<ul>\r\n \t<li>Read private messages.<\/li>\r\n \t<li>Lock someone out.<\/li>\r\n \t<li>Impersonate them.<\/li>\r\n \t<li>Monitor activity.<\/li>\r\n<\/ul>\r\nHacking often leads to other harms, such as financial abuse or impersonation.<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/what-is-technology-facilitated-gender-based-violence\/person-who-uses-computer-malicious-260nw-2373192089\/\" rel=\"attachment wp-att-117\"><img src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/person-who-uses-computer-malicious-260nw-2373192089-e1769014386779.jpeg\" alt=\"\" width=\"195\" height=\"188\" class=\" wp-image-117 aligncenter\" \/><\/a>\r\n\r\n<!--EndFragment -->\r\n<h1><a id=\"3.5\"><\/a>Hate Speech<\/h1>\r\n<strong>Hate speech<\/strong> <strong>targets someone\u2019s identity<\/strong>, like their gender, disability, sexuality, or race. Hate speech can be used to shame, intimidate, or silence them. It can happen in online comments, messages, posts, gaming chats, or group discussions. Because it spreads quickly and publicly, it can cause significant emotional harm and reinforce discrimination.\r\n\r\n<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/what-is-technology-facilitated-gender-based-violence\/download\/\" rel=\"attachment wp-att-197\"><img src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/download-e1773196983488.jpeg\" alt=\"\" width=\"265\" height=\"137\" class=\"wp-image-197 aligncenter\" \/><\/a>\r\n<h1><a id=\"3.6\"><\/a>Image\u2011Based Abuse<\/h1>\r\n<strong>Image\u2011based abuse<\/strong> involves creating, sharing, or threatening to share intimate or personal images without consent. <strong>Image-based abuse can include:<\/strong>\r\n<ul>\r\n \t<li>Sharing someone\u2019s intimate images without permission.<\/li>\r\n \t<li>Threatening to release personal images to coerce or control.<\/li>\r\n \t<li>Pressuring someone to send sexual images.<\/li>\r\n \t<li>Creating manipulated or deepfake images to shame or intimidate (\"deepfakes\").<\/li>\r\n \t<li>Sending unwanted sexual images.<\/li>\r\n<\/ul>\r\nIf you have experienced image based abuse, the <a href=\"https:\/\/stopncii.org\/\">StopNCII.org<\/a> is a site that specifically provides resources and information for people who have experienced Non-Consensual Intimate Image abuse. For resources specific to South Africa, you can check our <a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/front-matter\/support-and-resources-page\/\">Support and Resources Page.<\/a>\r\n\r\n[caption id=\"attachment_158\" align=\"aligncenter\" width=\"670\"]<img src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/10-1-e1769114786165.png\" alt=\"\" width=\"670\" height=\"266\" class=\"wp-image-158\" \/> See <a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/case-study-2a-mayas-experience-of-image-based-abuse\/\">Case Study 2<\/a> to learn about Maya's experience with image-based abuse.[\/caption]\r\n<h1><a id=\"3.7\"><\/a>Impersonation and Identity Theft<\/h1>\r\nOnline impersonation occurs when someone pretends to be another person online, often to harm, deceive, or exploit them. <strong>Impersonation or identity theft may look like:<\/strong>\r\n<ul>\r\n \t<li>Creating fake accounts using someone\u2019s name or photos.<\/li>\r\n \t<li>Posting harmful or offensive content while pretending to be them.<\/li>\r\n \t<li>Messaging a target's family or friends to request money under false pretenses.<\/li>\r\n \t<li>\u201cCatfishing\u201d by pretending to be someone else for romantic or financial gain.<\/li>\r\n<\/ul>\r\n<img src=\"https:\/\/www.adoorn.com\/cdn\/shop\/articles\/AdobeStock_578653187.jpg?v=1749470455&amp;width=5760\" alt=\"How To Protect Against Identity Theft\" width=\"693\" height=\"261\" class=\"aligncenter\" \/>\r\n<h1><a id=\"3.8\"><\/a>Online Harassment and Cyberbullying<\/h1>\r\n<strong>Online harassment<\/strong> includes repeated or targeted behaviour intended to cause emotional, social, or psychological harm. Cyberbullying often involves individuals or groups using their power to target someone. <strong>Examples include:<\/strong>\r\n<ul>\r\n \t<li>Threatening or harassing messages.<\/li>\r\n \t<li>Disability\u2011based hate speech and ableism.<\/li>\r\n \t<li>Gendered hate speech, misogyny, homophobia, or transphobia.<\/li>\r\n \t<li>Spreading false information to damage reputation or cause distress.<\/li>\r\n<\/ul>\r\nSee <a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/case-study-1-is-thandi-being-cyberbullied\/\">Case Study 1<\/a>, to learn about Thandi's experience with cyberbullying and harassment.\r\n\r\n<img src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/9-e1768848230700.png\" alt=\"\" width=\"652\" height=\"270\" class=\"wp-image-58 aligncenter\" \/>\r\n<h1><a id=\"3.9\"><\/a>Stalking, Tracking, and Digital Surveillance<\/h1>\r\nDigital tools can be misused to <strong>monitor someone\u2019s movements, communications, or daily activities.<\/strong> These behaviours often involve repeated, unwanted contact or observation that causes fear or distress. <strong>Examples of surveillance or stalking include:<\/strong>\r\n<ul>\r\n \t<li>Installing spyware under the guise of \u201chelping.\u201d<\/li>\r\n \t<li>Tracking location through phones, apps, or social media features.<\/li>\r\n \t<li>Monitoring home cameras, doorbell cameras, or other connected devices.<\/li>\r\n \t<li>Using vehicle GPS systems to follow someone\u2019s movements.<\/li>\r\n \t<li>Justifying surveillance with statements such as \u201cI need to keep an eye on you.\u201d<\/li>\r\n<\/ul>\r\n[caption id=\"\" align=\"aligncenter\" width=\"444\"]<img src=\"https:\/\/cyberbullying.org\/wp-content\/uploads\/2018\/03\/cyberstalking.jpg\" alt=\"A woman is using her computer at the kitchen counter. From outside, a person wearing a black mask covering their face is watching her. The woman does not notice that she is being watched.\" width=\"444\" height=\"262\" class=\"\" \/> Cyberstalking can lead to in-person threats and stalking behaviour. (Cyberbullying Research Center, 2025)[\/caption]\r\n\r\n[caption id=\"\" align=\"aligncenter\" width=\"456\"]<img src=\"https:\/\/static01.nyt.com\/images\/2020\/01\/19\/fashion\/18RING-PREVIEW-IMAGE\/18RING-PREVIEW-IMAGE-videoSixteenByNineJumbo1600-v4.png?year=2020&amp;h=900&amp;w=1600&amp;s=0fb1295bfbbe501f5dfd07bd9c7027401cfe4049e907aba965329a7c5c594771&amp;k=ZQJBKqZ0VN&amp;tw=1\" alt=\"Image of front door camera footage, showing a view of a neighborhood.\" width=\"456\" height=\"257\" class=\"\" \/> Front door cameras give a view of a whole neighbourhood, and might be used as a way to monitor and control people. (The New York Times, 2020)[\/caption]\r\n\r\n[caption id=\"\" align=\"aligncenter\" width=\"456\"]<img src=\"https:\/\/d177u6cr05yfp1.cloudfront.net\/media\/W1siZiIsIjIwMjQvMDcvMzEvMjMvMjMvMzUvYTNlMDkzYTgtOGRmOS00N2E0LWEwODgtNzA0YTc0NDg0YWQ5L3N0YWxrZWQtdGhyb3VnaC1HUFMuanBnIl0sWyJwIiwidGh1bWIiLCIxMjQweDY0MCMiXSxbInAiLCJlbmNvZGUiLCJ3ZWJwIl1d\/file.webp?basename=Abusers+Are+Monitoring+and+Spying+on+Victims+Through+Their+Cars&amp;sha=a22492276ff1f185\" alt=\"Image of a car's built-in GPS. A woman is clicking a button on the GPS screen.\" width=\"456\" height=\"235\" class=\"\" \/> Abusers may be monitoring and spying on victims through their car GPS system. (DomesticShelters.org, 2024)[\/caption]\r\n<h1><a id=\"3.10\"><\/a>Threats and Intimidation<\/h1>\r\n<strong>Threats can be sent through any digital channel.<\/strong> They may involve threats of physical harm, threats to release personal information, or threats to damage someone\u2019s reputation. Even without physical contact, digital threats can create fear, isolation, and ongoing emotional distress.\r\n<div class=\"textbox textbox--key-takeaways\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\" style=\"text-align: center\">Reflection<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n\r\nHave you heard these forms of TFGBV before? Have you ever experienced them?\r\nWhich form of TFGBV do you think is most hidden for disabled women?\r\n\r\n<\/div>\r\n<\/div>\r\n<div class=\"csl-bib-body\">\r\n\r\n<hr \/>\r\n\r\n<h2>Resources<\/h2>\r\n<ul>\r\n \t<li class=\"csl-entry\">Herrman, J. (2020, January 19). Who\u2019s Watching Your Porch? <i>The New York Times<\/i>. <a href=\"https:\/\/www.nytimes.com\/2020\/01\/19\/style\/ring-video-doorbell-home-security.html\">https:\/\/www.nytimes.com\/2020\/01\/19\/style\/ring-video-doorbell-home-security.html.<\/a><\/li>\r\n \t<li class=\"csl-entry\"><span style=\"font-size: 1em\">Hinduja, S. (2025, December 29). Cyberstalking. <\/span><i style=\"font-size: 1em\">Cyberbullying Research Center<\/i><span style=\"font-size: 1em\">. <\/span><a href=\"https:\/\/cyberbullying.org\/cyberstalking\" style=\"font-size: 1em\">https:\/\/cyberbullying.org\/cyberstalking.<\/a><\/li>\r\n \t<li>\r\n<div class=\"csl-bib-body\">\r\n<div class=\"csl-bib-body\">\r\n<div class=\"csl-entry\">Fontes, L. A. (2024, August 7). <i>Abusers Are Monitoring and Spying on Victims Through Their Cars<\/i>. DomesticShelters.Org; DomesticShelters.org. <a href=\"https:\/\/www.domesticshelters.org\/articles\/identifying-abuse\/abusers-are-monitoring-and-spying-on-victims-through-their-cars\">https:\/\/www.domesticshelters.org\/articles\/identifying-abuse\/abusers-are-monitoring-and-spying-on-victims-through-their-cars.<\/a><\/div>\r\n<\/div>\r\n<\/div><\/li>\r\n<\/ul>\r\n<\/div>","rendered":"<p style=\"text-align: right\"><a id=\"quick-exit-btn\" href=\"https:\/\/google.ca\" title=\"Quick Exit\">EXIT SITE<\/a><\/p>\n<h1>Chapter 3: Forms of TFGBV<\/h1>\n<p>In this chapter, we will focus on the <strong><em>forms of TFGBV.<\/em><\/strong> This means, the actual behaviours and tactics that perpetrators use. The same harmful behaviours can appear across many different platforms, and that the same platform can be misused in several different ways. Separating the forms of TFGBV from potential places where TFGBV can occur makes it easier to <strong>recognise patterns, understand risks, and connect what you learn to real\u2011life situations.<\/strong><\/p>\n<p>When we listed platforms and devices in <a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-2\/\">Chapter 2<\/a>, our goal was to help you understand where tech\u2011facilitated gender\u2011based violence can take place. People use many different apps, websites, and digital tools every day, and any of them can be misused. But knowing the platforms alone doesn\u2019t give the big picture story.<\/p>\n<hr \/>\n<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li>Learn how TFGBV can be committed in different forms and with different tactics.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<hr \/>\n<p>This chapter builds on the foundation from <a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-2\/\">Chapter\u202f2<\/a> by showing <strong>how digital spaces can be used to harm someone.<\/strong> It gives you a clearer picture of what TFGBV can look like in practice, no matter which platform or device is involved.<\/p>\n<p>There are hundreds of recognized forms of TFGBV, and TFGBV is constantly evolving. As a result, this list is not totally comprehensive. However, <span style=\"text-decoration: underline\"><strong>we will discuss the following common categories of TFGBV forms: <\/strong><\/span><\/p>\n<ul>\n<li><a href=\"#3.1\">Control-based abuse<\/a><\/li>\n<li><a href=\"#3.2\">Cyber-grooming<\/a><\/li>\n<li><a href=\"#3.3\">Economic and financial abuse<\/a><\/li>\n<li><a href=\"#3.4\">Hacking and account takeovers<\/a><\/li>\n<li><a href=\"#3.5\">Hate speech<\/a><\/li>\n<li><a href=\"#3.6\">Image-based abuse<\/a><\/li>\n<li><a href=\"#3.7\">Impersonation and identity theft<\/a><\/li>\n<li><a href=\"#3.9\">Online harassment and cyberbullying<\/a><\/li>\n<li><a href=\"#3.10\">Stalking, tracking, and digital surveillance<\/a><\/li>\n<li><a href=\"#3.11\">Threats and intimidation<\/a><\/li>\n<\/ul>\n<hr \/>\n<h1><a id=\"3.1\"><\/a>Control-Based Abuse<\/h1>\n<p>Control\u2011based abuse happens when someone <strong>restricts your<\/strong> ability to use phones, computers, the internet, or other technology. This can isolate someone from support or limit their independence. <strong style=\"text-align: initial;font-size: 1em\">This may look or sound like:<\/strong><\/p>\n<ul>\n<li>Taking away devices without consent or permission.<\/li>\n<li>Logging into accounts to monitor or restrict communication.<\/li>\n<li>Controlling devices under the excuse of \u201chelping\u201d or saying things like: \u201cyou don\u2019t understand technology.\u201d<\/li>\n<li>Limiting access to assistive technology needed for independence.<\/li>\n<li>Discouraging online presence with statements such as: \u201cYou\u2019ll embarrass yourself online.<\/li>\n<\/ul>\n<figure id=\"attachment_888\" aria-describedby=\"caption-attachment-888\" style=\"width: 564px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-10.png\" alt=\"A woman is distressed while a man in the background holds his phone angrily. In the middle is a drawing of the woman as a puppet, with strings binding her arms and controlling her movement.\" width=\"564\" height=\"264\" class=\"wp-image-888\" srcset=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-10.png 1920w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-10-300x141.png 300w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-10-1024x480.png 1024w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-10-768x360.png 768w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-10-1536x720.png 1536w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-10-65x30.png 65w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-10-225x105.png 225w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-10-350x164.png 350w\" sizes=\"auto, (max-width: 564px) 100vw, 564px\" \/><figcaption id=\"caption-attachment-888\" class=\"wp-caption-text\">Control-based TFGBV can occur by the control of access to technology, or through controlling actions committed via technology.<span style=\"text-align: initial;font-size: 1em\"><\/span><\/figcaption><\/figure>\n<h1><a id=\"3.2\"><\/a>Cyber\u2011Grooming<\/h1>\n<p>Cyber\u2011grooming occurs when someone builds trust online to exploit another person sexually, financially, or emotionally. Grooming usually happens over time and often involves someone older or in a position of power (for example, a teacher, caregiver, or community leader). <strong>Cyber-grooming can include:<\/strong><\/p>\n<ul>\n<li>Pretending to be a friend, romantic partner, or supportive figure.<\/li>\n<li>Using trust to pressure someone into harmful or abusive behaviour.<\/li>\n<li>Manipulating someone into giving money or access to financial resources.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-3-different-forms-of-tfgbv\/immediate-safety-actions-digital-12\/\" rel=\"attachment wp-att-891\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-12-e1773196154813.png\" alt=\"\" width=\"669\" height=\"214\" class=\"wp-image-891 aligncenter\" srcset=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-12-e1773196154813.png 1920w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-12-e1773196154813-300x96.png 300w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-12-e1773196154813-1024x327.png 1024w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-12-e1773196154813-768x246.png 768w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-12-e1773196154813-1536x491.png 1536w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-12-e1773196154813-65x21.png 65w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-12-e1773196154813-225x72.png 225w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-12-e1773196154813-350x112.png 350w\" sizes=\"auto, (max-width: 669px) 100vw, 669px\" \/><\/a><\/p>\n<h1><a id=\"3.3\"><\/a>Economic and Financial Abuse<\/h1>\n<p>Digital platforms can be used to control or <strong>exploit someone\u2019s finances<\/strong>. <strong>Examples of financial abuse may include:<\/strong><\/p>\n<ul>\n<li>Accessing online banking without permission.<\/li>\n<li>Threatening harm unless money is sent.<\/li>\n<li>Offering \u201chelp\u201d with finances as a way to gain control.<\/li>\n<li>Controlling disability payments or benefits.<\/li>\n<li>Forcing mobile money transfers.<\/li>\n<li>Locking someone out of financial or work\u2011related apps.<\/li>\n<\/ul>\n<h1><a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-3-different-forms-of-tfgbv\/immediate-safety-actions-digital-11\/\" rel=\"attachment wp-att-889\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-11.png\" alt=\"\" width=\"509\" height=\"238\" class=\"wp-image-889 aligncenter\" srcset=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-11.png 1920w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-11-300x141.png 300w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-11-1024x480.png 1024w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-11-768x360.png 768w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-11-1536x720.png 1536w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-11-65x30.png 65w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-11-225x105.png 225w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/03\/Immediate-safety-actions-digital-11-350x164.png 350w\" sizes=\"auto, (max-width: 509px) 100vw, 509px\" \/><\/a><br \/>\nHacking and Account Takeovers<\/h1>\n<p><strong>Hacking<\/strong> involves <strong>accessing someone\u2019s accounts, devices, or personal information without permission.<\/strong> This can include guessing passwords, using saved logins, or exploiting security weaknesses.\u00a0<strong>Once inside an account, they may:<\/strong><\/p>\n<p><!--StartFragment --><\/p>\n<ul>\n<li>Read private messages.<\/li>\n<li>Lock someone out.<\/li>\n<li>Impersonate them.<\/li>\n<li>Monitor activity.<\/li>\n<\/ul>\n<p>Hacking often leads to other harms, such as financial abuse or impersonation.<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/what-is-technology-facilitated-gender-based-violence\/person-who-uses-computer-malicious-260nw-2373192089\/\" rel=\"attachment wp-att-117\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/person-who-uses-computer-malicious-260nw-2373192089-e1769014386779.jpeg\" alt=\"\" width=\"195\" height=\"188\" class=\"wp-image-117 aligncenter\" srcset=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/person-who-uses-computer-malicious-260nw-2373192089-e1769014386779.jpeg 260w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/person-who-uses-computer-malicious-260nw-2373192089-e1769014386779-65x63.jpeg 65w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/person-who-uses-computer-malicious-260nw-2373192089-e1769014386779-225x217.jpeg 225w\" sizes=\"auto, (max-width: 195px) 100vw, 195px\" \/><\/a><\/p>\n<p><!--EndFragment --><\/p>\n<h1><a id=\"3.5\"><\/a>Hate Speech<\/h1>\n<p><strong>Hate speech<\/strong> <strong>targets someone\u2019s identity<\/strong>, like their gender, disability, sexuality, or race. Hate speech can be used to shame, intimidate, or silence them. It can happen in online comments, messages, posts, gaming chats, or group discussions. Because it spreads quickly and publicly, it can cause significant emotional harm and reinforce discrimination.<\/p>\n<p><a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/what-is-technology-facilitated-gender-based-violence\/download\/\" rel=\"attachment wp-att-197\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/download-e1773196983488.jpeg\" alt=\"\" width=\"265\" height=\"137\" class=\"wp-image-197 aligncenter\" srcset=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/download-e1773196983488.jpeg 296w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/download-e1773196983488-65x34.jpeg 65w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/download-e1773196983488-225x116.jpeg 225w\" sizes=\"auto, (max-width: 265px) 100vw, 265px\" \/><\/a><\/p>\n<h1><a id=\"3.6\"><\/a>Image\u2011Based Abuse<\/h1>\n<p><strong>Image\u2011based abuse<\/strong> involves creating, sharing, or threatening to share intimate or personal images without consent. <strong>Image-based abuse can include:<\/strong><\/p>\n<ul>\n<li>Sharing someone\u2019s intimate images without permission.<\/li>\n<li>Threatening to release personal images to coerce or control.<\/li>\n<li>Pressuring someone to send sexual images.<\/li>\n<li>Creating manipulated or deepfake images to shame or intimidate (&#8220;deepfakes&#8221;).<\/li>\n<li>Sending unwanted sexual images.<\/li>\n<\/ul>\n<p>If you have experienced image based abuse, the <a href=\"https:\/\/stopncii.org\/\">StopNCII.org<\/a> is a site that specifically provides resources and information for people who have experienced Non-Consensual Intimate Image abuse. For resources specific to South Africa, you can check our <a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/front-matter\/support-and-resources-page\/\">Support and Resources Page.<\/a><\/p>\n<figure id=\"attachment_158\" aria-describedby=\"caption-attachment-158\" style=\"width: 670px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/10-1-e1769114786165.png\" alt=\"\" width=\"670\" height=\"266\" class=\"wp-image-158\" srcset=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/10-1-e1769114786165.png 1920w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/10-1-e1769114786165-300x119.png 300w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/10-1-e1769114786165-1024x406.png 1024w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/10-1-e1769114786165-768x305.png 768w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/10-1-e1769114786165-1536x610.png 1536w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/10-1-e1769114786165-65x26.png 65w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/10-1-e1769114786165-225x89.png 225w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/10-1-e1769114786165-350x139.png 350w\" sizes=\"auto, (max-width: 670px) 100vw, 670px\" \/><figcaption id=\"caption-attachment-158\" class=\"wp-caption-text\">See <a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/case-study-2a-mayas-experience-of-image-based-abuse\/\">Case Study 2<\/a> to learn about Maya&#8217;s experience with image-based abuse.<\/figcaption><\/figure>\n<h1><a id=\"3.7\"><\/a>Impersonation and Identity Theft<\/h1>\n<p>Online impersonation occurs when someone pretends to be another person online, often to harm, deceive, or exploit them. <strong>Impersonation or identity theft may look like:<\/strong><\/p>\n<ul>\n<li>Creating fake accounts using someone\u2019s name or photos.<\/li>\n<li>Posting harmful or offensive content while pretending to be them.<\/li>\n<li>Messaging a target&#8217;s family or friends to request money under false pretenses.<\/li>\n<li>\u201cCatfishing\u201d by pretending to be someone else for romantic or financial gain.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.adoorn.com\/cdn\/shop\/articles\/AdobeStock_578653187.jpg?v=1749470455&amp;width=5760\" alt=\"How To Protect Against Identity Theft\" width=\"693\" height=\"261\" class=\"aligncenter\" \/><\/p>\n<h1><a id=\"3.8\"><\/a>Online Harassment and Cyberbullying<\/h1>\n<p><strong>Online harassment<\/strong> includes repeated or targeted behaviour intended to cause emotional, social, or psychological harm. Cyberbullying often involves individuals or groups using their power to target someone. <strong>Examples include:<\/strong><\/p>\n<ul>\n<li>Threatening or harassing messages.<\/li>\n<li>Disability\u2011based hate speech and ableism.<\/li>\n<li>Gendered hate speech, misogyny, homophobia, or transphobia.<\/li>\n<li>Spreading false information to damage reputation or cause distress.<\/li>\n<\/ul>\n<p>See <a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/case-study-1-is-thandi-being-cyberbullied\/\">Case Study 1<\/a>, to learn about Thandi&#8217;s experience with cyberbullying and harassment.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/9-e1768848230700.png\" alt=\"\" width=\"652\" height=\"270\" class=\"wp-image-58 aligncenter\" srcset=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/9-e1768848230700.png 1920w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/9-e1768848230700-300x124.png 300w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/9-e1768848230700-1024x423.png 1024w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/9-e1768848230700-768x318.png 768w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/9-e1768848230700-1536x635.png 1536w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/9-e1768848230700-65x27.png 65w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/9-e1768848230700-225x93.png 225w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/9-e1768848230700-350x145.png 350w\" sizes=\"auto, (max-width: 652px) 100vw, 652px\" \/><\/p>\n<h1><a id=\"3.9\"><\/a>Stalking, Tracking, and Digital Surveillance<\/h1>\n<p>Digital tools can be misused to <strong>monitor someone\u2019s movements, communications, or daily activities.<\/strong> These behaviours often involve repeated, unwanted contact or observation that causes fear or distress. <strong>Examples of surveillance or stalking include:<\/strong><\/p>\n<ul>\n<li>Installing spyware under the guise of \u201chelping.\u201d<\/li>\n<li>Tracking location through phones, apps, or social media features.<\/li>\n<li>Monitoring home cameras, doorbell cameras, or other connected devices.<\/li>\n<li>Using vehicle GPS systems to follow someone\u2019s movements.<\/li>\n<li>Justifying surveillance with statements such as \u201cI need to keep an eye on you.\u201d<\/li>\n<\/ul>\n<figure style=\"width: 444px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cyberbullying.org\/wp-content\/uploads\/2018\/03\/cyberstalking.jpg\" alt=\"A woman is using her computer at the kitchen counter. From outside, a person wearing a black mask covering their face is watching her. The woman does not notice that she is being watched.\" width=\"444\" height=\"262\" class=\"\" \/><figcaption class=\"wp-caption-text\">Cyberstalking can lead to in-person threats and stalking behaviour. (Cyberbullying Research Center, 2025)<\/figcaption><\/figure>\n<figure style=\"width: 456px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/static01.nyt.com\/images\/2020\/01\/19\/fashion\/18RING-PREVIEW-IMAGE\/18RING-PREVIEW-IMAGE-videoSixteenByNineJumbo1600-v4.png?year=2020&amp;h=900&amp;w=1600&amp;s=0fb1295bfbbe501f5dfd07bd9c7027401cfe4049e907aba965329a7c5c594771&amp;k=ZQJBKqZ0VN&amp;tw=1\" alt=\"Image of front door camera footage, showing a view of a neighborhood.\" width=\"456\" height=\"257\" class=\"\" \/><figcaption class=\"wp-caption-text\">Front door cameras give a view of a whole neighbourhood, and might be used as a way to monitor and control people. (The New York Times, 2020)<\/figcaption><\/figure>\n<figure style=\"width: 456px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d177u6cr05yfp1.cloudfront.net\/media\/W1siZiIsIjIwMjQvMDcvMzEvMjMvMjMvMzUvYTNlMDkzYTgtOGRmOS00N2E0LWEwODgtNzA0YTc0NDg0YWQ5L3N0YWxrZWQtdGhyb3VnaC1HUFMuanBnIl0sWyJwIiwidGh1bWIiLCIxMjQweDY0MCMiXSxbInAiLCJlbmNvZGUiLCJ3ZWJwIl1d\/file.webp?basename=Abusers+Are+Monitoring+and+Spying+on+Victims+Through+Their+Cars&amp;sha=a22492276ff1f185\" alt=\"Image of a car's built-in GPS. A woman is clicking a button on the GPS screen.\" width=\"456\" height=\"235\" class=\"\" \/><figcaption class=\"wp-caption-text\">Abusers may be monitoring and spying on victims through their car GPS system. (DomesticShelters.org, 2024)<\/figcaption><\/figure>\n<h1><a id=\"3.10\"><\/a>Threats and Intimidation<\/h1>\n<p><strong>Threats can be sent through any digital channel.<\/strong> They may involve threats of physical harm, threats to release personal information, or threats to damage someone\u2019s reputation. Even without physical contact, digital threats can create fear, isolation, and ongoing emotional distress.<\/p>\n<div class=\"textbox textbox--key-takeaways\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\" style=\"text-align: center\">Reflection<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p>Have you heard these forms of TFGBV before? Have you ever experienced them?<br \/>\nWhich form of TFGBV do you think is most hidden for disabled women?<\/p>\n<\/div>\n<\/div>\n<div class=\"csl-bib-body\">\n<hr \/>\n<h2>Resources<\/h2>\n<ul>\n<li class=\"csl-entry\">Herrman, J. (2020, January 19). Who\u2019s Watching Your Porch? <i>The New York Times<\/i>. <a href=\"https:\/\/www.nytimes.com\/2020\/01\/19\/style\/ring-video-doorbell-home-security.html\">https:\/\/www.nytimes.com\/2020\/01\/19\/style\/ring-video-doorbell-home-security.html.<\/a><\/li>\n<li class=\"csl-entry\"><span style=\"font-size: 1em\">Hinduja, S. (2025, December 29). Cyberstalking. <\/span><i style=\"font-size: 1em\">Cyberbullying Research Center<\/i><span style=\"font-size: 1em\">. <\/span><a href=\"https:\/\/cyberbullying.org\/cyberstalking\" style=\"font-size: 1em\">https:\/\/cyberbullying.org\/cyberstalking.<\/a><\/li>\n<li>\n<div class=\"csl-bib-body\">\n<div class=\"csl-bib-body\">\n<div class=\"csl-entry\">Fontes, L. A. (2024, August 7). <i>Abusers Are Monitoring and Spying on Victims Through Their Cars<\/i>. DomesticShelters.Org; DomesticShelters.org. <a href=\"https:\/\/www.domesticshelters.org\/articles\/identifying-abuse\/abusers-are-monitoring-and-spying-on-victims-through-their-cars\">https:\/\/www.domesticshelters.org\/articles\/identifying-abuse\/abusers-are-monitoring-and-spying-on-victims-through-their-cars.<\/a><\/div>\n<\/div>\n<\/div>\n<\/li>\n<\/ul>\n<\/div>\n","protected":false},"author":554,"menu_order":3,"comment_status":"open","ping_status":"closed","template":"","meta":{"pb_show_title":"","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[48],"contributor":[],"license":[],"class_list":["post-564","chapter","type-chapter","status-publish","hentry","chapter-type-standard"],"part":33,"_links":{"self":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/564","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/users\/554"}],"replies":[{"embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/comments?post=564"}],"version-history":[{"count":26,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/564\/revisions"}],"predecessor-version":[{"id":1022,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/564\/revisions\/1022"}],"part":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/parts\/33"}],"metadata":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/564\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/media?parent=564"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapter-type?post=564"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/contributor?post=564"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/license?post=564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}