{"id":14499,"date":"2025-02-17T11:26:27","date_gmt":"2025-02-17T17:26:27","guid":{"rendered":"https:\/\/www.theclarion.org\/?p=14499"},"modified":"2025-02-17T11:26:27","modified_gmt":"2025-02-17T17:26:27","slug":"love-shouldnt-hurt-36","status":"publish","type":"post","link":"https:\/\/test.theclarion.org\/?p=14499","title":{"rendered":"Love shouldn\u2019t hurt"},"content":{"rendered":"<p><strong>Technological Abuse<\/strong><br \/>\n<em>by Teresia Smith<\/em><\/p>\n<p>Did you know that 1 in 4 dating teens are harassed or abused through technology? I am sure many of you have heard the old saying, \u201cSticks and stones may break my bones, but words can never hurt me\u201d.<!--more--> That is so wrong. Often when working with clients who have been abused, the mental and emotional aspects take far longer to heal than the physical. Words that an abuser uses are like broken records in a victim\u2019s mind, playing over and over until they burn into their thoughts and become real. Words are powerful weapons. Saying hurtful or demeaning things, swearing at you, threatening to destroy your belongings, and yelling at you constantly are all examples of emotional abuse. It is also emotional abuse to use social media or other technology to degrade, coerce, control, or embarrass someone. Emotional abuse is another type of intimate partner violence. How can this show up in real life? What are some ways people use digital technology to hurt others? <br \/>\nRainne.org lists some of the ways a person can use digital technology in a sexually explicit or violating way.<br \/>\n\u2022Catfishing, or lying about one\u2019s identity online in order to initiate a romantic or sexual relationship<\/p>\n<p>\u2022Cyberbullying, or the \u201cwillful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices\u201d often to threat, harass, or humiliate another<br \/>\n\u2022Cyberstalking by monitoring someone\u2019s whereabouts with GPS or other tracking systems or persistently contacting someone against their will through text, email, social media, or other digital platforms<br \/>\n\u2022Distributing or threatening to distribute sexual or intimate images of someone without their consent, also known as digital sexual assault or revenge porn<br \/>\n\u2022Hacking into someone\u2019s online accounts or devices to steal personal images or information not intended for public sharing<br \/>\n\u2022Posting shaming, embarrassing, sensitive, or otherwise inappropriate information about someone on social media or other public sites, whether it is true or not<br \/>\n\u2022Pressuring you to send explicit images of yourself<\/p>\n<p>\u2022Sending sexually explicit emails, chats, texts, photos, videos, or emojis that are unwelcome or unsolicited<br \/>\nEspecially during the teen years, this type of abuse can be catastrophic. Often this abuse can lead to anxiety, depression, eating disorders, feelings of shame and humiliation, increased stress, panic attacks, PTSD, difficulty concentrating, sleep disorders, and suicidal ideation. So, what can you do? <br \/>\n\u2022First, talk with a trusted adult and engage with your support system. Seek counseling as needed. <br \/>\n\u2022Keep evidence by taking screenshots immediately or printing out text messages, social media posts, or other exchanges. Make sure your screenshots contain the information of the person who is being harmful and the time stamp. Some information is easily deleted\u2014a picture or hard copy can provide evidence that the content was sent.<\/p>\n<p>\u2022If you are in school and the person harassing you goes to your school, you can report to the principal and counselors. <br \/>\n\u2022If you are experiencing the harassment or abuse through a social media platform, app, or online game, you can report through the site. <br \/>\n\u2022If you receive communication that is threatening, part of a pattern of abuse, or consistent with harassment, don\u2019t hesitate to contact law enforcement or a lawyer. Even if you do not wish to pursue a criminal case, you may be able to move forward with a civil case. You may be able to use the evidence you collect to gain an order of protection that includes contact over social media and other digital platforms.<\/p>\n<p>Take necessary steps to protect yourself online. Do not share personal information. Turn off location services on apps. Do not open anything from unknown sources. Be careful what photos you share. Those are just a few ways you can be proactive in protecting yourself. <br \/>\nIf you or a loved one are experiencing intimate partner abuse or sexual abuse, Crisis Services of North Alabama offers free and confidential services. You may contact our Jackson County office at 256.574.5826 for an appointment with an advocate. We also offer a free 24\/7 HELPline, where you can speak with a trained crisis counselor at any time. You may reach that line at 256.716.1000. Please reach out. You are not alone. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Technological Abuse by Teresia Smith Did you know that 1 in 4 dating teens are harassed or abused through technology? I am sure many of you have heard the old saying, \u201cSticks and stones may break my bones, but words can never hurt me\u201d.<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-14499","post","type-post","status-publish","format-standard","hentry","category-love-shouldnt-hurt"],"_links":{"self":[{"href":"https:\/\/test.theclarion.org\/index.php?rest_route=\/wp\/v2\/posts\/14499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/test.theclarion.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/test.theclarion.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/test.theclarion.org\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/test.theclarion.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14499"}],"version-history":[{"count":1,"href":"https:\/\/test.theclarion.org\/index.php?rest_route=\/wp\/v2\/posts\/14499\/revisions"}],"predecessor-version":[{"id":14500,"href":"https:\/\/test.theclarion.org\/index.php?rest_route=\/wp\/v2\/posts\/14499\/revisions\/14500"}],"wp:attachment":[{"href":"https:\/\/test.theclarion.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/test.theclarion.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14499"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/test.theclarion.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}