{"id":16855,"date":"2026-01-07T14:01:27","date_gmt":"2026-01-07T19:01:27","guid":{"rendered":"https:\/\/experience.syracuse.edu\/bewell\/?page_id=16855"},"modified":"2026-03-12T11:39:25","modified_gmt":"2026-03-12T15:39:25","slug":"tech-facilitated-abuse-and-online-safety","status":"publish","type":"page","link":"https:\/\/experience.syracuse.edu\/bewell\/sexual-violence\/tech-facilitated-abuse-and-online-safety\/","title":{"rendered":"Tech-Facilitated Abuse and Online Safety"},"content":{"rendered":"\n<p>You are not alone. If you experience discomfort, coercion, harassment or harm\u2014online or offline\u2014<a href=\"https:\/\/experience.syracuse.edu\/bewell\/sexual-violence\/\">reach out for support<\/a>. <a href=\"https:\/\/titleix.syracuse.edu\/resources\/resource-guide\/confidential-resources\/\" target=\"_blank\" rel=\"noreferrer noopener\">Confidential<\/a>, <a href=\"https:\/\/titleix.syracuse.edu\/resources\/resource-guide\/#private-resources\" target=\"_blank\" rel=\"noreferrer noopener\">non-confidential<\/a> and <a href=\"https:\/\/titleix.syracuse.edu\/resources\/resource-guide\/#off-campus-resources\" target=\"_blank\" rel=\"noreferrer noopener\">off-campus resources<\/a> are available.<\/p>\n\n\n\n<p>Tech-facilitated or digital abuse refers to the use of technology\u2014such as phones, social media, apps or AI tools\u2014to monitor, control, harass, impersonate or violate someone\u2019s boundaries. It mirrors other forms of relationship and sexual violence, but is carried out through digital means, using technology as an extension of power and control.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Related Terms and Definitions<\/h2>\n\n\n<div role=\"region\" class=\"accordion\">\n      <div class=\"accordion-item border border-gray-light\">\n      <div class=\"accordion-header-text\">\n        <h3 class=\"margin-bottom-0\">\n          <button class=\"accordion-header full-width background-gray-light-30 border-0 margin-0 padding-top-2 padding-bottom-2 padding-left-3 padding-right-3\" aria-expanded=\"false\">\n            Cyberstalking            <div class='accordion-toggle icon-right' class=''>\n              <i class='icon-chevron-right'><\/i>\n            <\/div>\n          <\/button>\n        <\/h3>\n      <\/div>\n      <div class='accordion-content'>\n        <p>Cyberstalking occurs when electronic media such as the internet, social networks, blogs, cell phones, texts or other similar devices or forms of contact are used for <a href=\"https:\/\/titleix.syracuse.edu\/learn\/university-policy\/definitions\/\"><strong>stalking<\/strong><\/a>.<\/p>\n<p><strong>Stalking<\/strong> occurs when a person engages in a <strong>course of conduct<\/strong> directed at a specific person under circumstances that would cause a reasonable person to fear for their own safety or the safety of others, or suffer <strong>substantial emotional distress<\/strong>.<\/p>\n<p><strong>Course of conduct<\/strong> means two or more instances including but not limited to unwelcome acts in which an individual directly, indirectly or through third parties, by any action, method, device or means, follows, monitors, observes, surveils, threatens or communicates to or about a person, or interferes with a person\u2019s property. <strong>Substantial emotional distress<\/strong> means significant mental suffering or anguish.<\/p>\n      <\/div>\n    <\/div>\n      <div class=\"accordion-item border border-gray-light\">\n      <div class=\"accordion-header-text\">\n        <h3 class=\"margin-bottom-0\">\n          <button class=\"accordion-header full-width background-gray-light-30 border-0 margin-0 padding-top-2 padding-bottom-2 padding-left-3 padding-right-3\" aria-expanded=\"false\">\n            Deepfakes            <div class='accordion-toggle icon-right' class=''>\n              <i class='icon-chevron-right'><\/i>\n            <\/div>\n          <\/button>\n        <\/h3>\n      <\/div>\n      <div class='accordion-content'>\n        <p>Deepfakes are realistic, AI-generated videos, images or audio that falsely depicts a real person saying or doing something they did not do. In the context of sexual harm, deepfakes are often used to create fake sexual or nude images of someone without their consent.<\/p>\n      <\/div>\n    <\/div>\n      <div class=\"accordion-item border border-gray-light\">\n      <div class=\"accordion-header-text\">\n        <h3 class=\"margin-bottom-0\">\n          <button class=\"accordion-header full-width background-gray-light-30 border-0 margin-0 padding-top-2 padding-bottom-2 padding-left-3 padding-right-3\" aria-expanded=\"false\">\n            Doxing            <div class='accordion-toggle icon-right' class=''>\n              <i class='icon-chevron-right'><\/i>\n            <\/div>\n          <\/button>\n        <\/h3>\n      <\/div>\n      <div class='accordion-content'>\n        <p>Doxing is the act of collecting and publicly sharing someone\u2019s personal, private or identifying information, such as their home address, phone number, school, workplace or social media accounts, often to intimidate, harass or cause harm. This information can come from private sources but is often obtained from public records.<\/p>\n      <\/div>\n    <\/div>\n      <div class=\"accordion-item border border-gray-light\">\n      <div class=\"accordion-header-text\">\n        <h3 class=\"margin-bottom-0\">\n          <button class=\"accordion-header full-width background-gray-light-30 border-0 margin-0 padding-top-2 padding-bottom-2 padding-left-3 padding-right-3\" aria-expanded=\"false\">\n            Image-Based Sexual Abuse (IBSA)            <div class='accordion-toggle icon-right' class=''>\n              <i class='icon-chevron-right'><\/i>\n            <\/div>\n          <\/button>\n        <\/h3>\n      <\/div>\n      <div class='accordion-content'>\n        <p>Image-based sexual abuse (IBSA) is a term used to describe situations where intimate or sexual images or videos are taken, created, shared or threatened to be shared without someone\u2019s consent. This can include pressuring or coercing someone to send intimate images, threatening to share private images to control or harm someone (sometimes called sextortion), sharing explicit images that are unwanted or unsolicited, or using artificial intelligence (AI) to create fake or altered sexual images of someone.<\/p>\n      <\/div>\n    <\/div>\n      <div class=\"accordion-item border border-gray-light\">\n      <div class=\"accordion-header-text\">\n        <h3 class=\"margin-bottom-0\">\n          <button class=\"accordion-header full-width background-gray-light-30 border-0 margin-0 padding-top-2 padding-bottom-2 padding-left-3 padding-right-3\" aria-expanded=\"false\">\n            Sextortion            <div class='accordion-toggle icon-right' class=''>\n              <i class='icon-chevron-right'><\/i>\n            <\/div>\n          <\/button>\n        <\/h3>\n      <\/div>\n      <div class='accordion-content'>\n        <p>Sextortion is a combination of the words &#8220;sex&#8221; and &#8220;extortion.&#8221; It is a non-physical form of coercion where a perpetrator threatens to send out someone&#8217;s private or sensitive materials or intimate pictures if they do not provide them with more sexual images, sexual favors or money.<\/p>\n      <\/div>\n    <\/div>\n  <\/div>\n\n\n<h2 class=\"wp-block-heading\">Online Safety Harm Reduction Strategies<\/h2>\n\n\n\n<p>Experiencing harm online or in digital relationships is never your fault. Responsibility always lies with the person who chooses to cross boundaries, manipulate, harass or abuse\u2014not with you for using technology, trusting someone or trying to connect.<\/p>\n\n\n\n<p>Harm reduction strategies are about supporting choice and safety, not preventing harm perfectly. If something happens, it does not mean you did anything wrong.<\/p>\n\n\n<div role=\"region\" class=\"accordion\">\n      <div class=\"accordion-item border border-gray-light\">\n      <div class=\"accordion-header-text\">\n        <h3 class=\"margin-bottom-0\">\n          <button class=\"accordion-header full-width background-gray-light-30 border-0 margin-0 padding-top-2 padding-bottom-2 padding-left-3 padding-right-3\" aria-expanded=\"false\">\n            AI and Relationships            <div class='accordion-toggle icon-right' class=''>\n              <i class='icon-chevron-right'><\/i>\n            <\/div>\n          <\/button>\n        <\/h3>\n      <\/div>\n      <div class='accordion-content'>\n        <p>Remember: AI cannot consent, set boundaries, protect your privacy or prioritize your well-being.<\/p>\n<ul>\n<li>Be cautious about sharing intimate details, images or emotional vulnerabilities with AI chatbots or virtual companions\u2014content may be stored, used to train systems or shared with third parties.<\/li>\n<li>Avoid relying on AI for emotional validation or relationship advice in place of trusted humans or professionals.<\/li>\n<li>Do not send photos, voice recordings or identifying information to AI tools that claim to simulate romantic or sexual relationships.<\/li>\n<li>If AI is used for exploration or curiosity, set clear personal boundaries around time, emotional investment and disclosure.<\/li>\n<\/ul>\n      <\/div>\n    <\/div>\n      <div class=\"accordion-item border border-gray-light\">\n      <div class=\"accordion-header-text\">\n        <h3 class=\"margin-bottom-0\">\n          <button class=\"accordion-header full-width background-gray-light-30 border-0 margin-0 padding-top-2 padding-bottom-2 padding-left-3 padding-right-3\" aria-expanded=\"false\">\n            Dating Apps            <div class='accordion-toggle icon-right' class=''>\n              <i class='icon-chevron-right'><\/i>\n            <\/div>\n          <\/button>\n        <\/h3>\n      <\/div>\n      <div class='accordion-content'>\n        <p>Trust your instincts\u2014if something feels off, you don&#8217;t owe anyone continued conversation or explanation.<\/p>\n<ul>\n<li>Use in-app messaging instead of moving quickly to personal phone numbers or social media.<\/li>\n<li>Avoid sharing details like your class schedule, home address or daily routines early on.<\/li>\n<li>Meet in public places and tell a trusted person where you&#8217;re going.<\/li>\n<li>Use blocking and reporting tools when someone violates boundaries or makes you uncomfortable.<\/li>\n<\/ul>\n      <\/div>\n    <\/div>\n      <div class=\"accordion-item border border-gray-light\">\n      <div class=\"accordion-header-text\">\n        <h3 class=\"margin-bottom-0\">\n          <button class=\"accordion-header full-width background-gray-light-30 border-0 margin-0 padding-top-2 padding-bottom-2 padding-left-3 padding-right-3\" aria-expanded=\"false\">\n            Location Sharing            <div class='accordion-toggle icon-right' class=''>\n              <i class='icon-chevron-right'><\/i>\n            <\/div>\n          <\/button>\n        <\/h3>\n      <\/div>\n      <div class='accordion-content'>\n        <p>Remember: you don&#8217;t owe anyone your location.<\/p>\n<ul>\n<li>Share your location only with people you trust and for a clear purpose (e.g., safety during travel).<\/li>\n<li>Use temporary or time-limited location sharing rather than continuous tracking.<\/li>\n<li>Regularly review who has access to your location in apps and device settings.<\/li>\n<li>Turn off location sharing after dates, breakups or changes in trust.<\/li>\n<li>Be aware that screenshots or saved location data can be used even after sharing is turned off.<\/li>\n<\/ul>\n      <\/div>\n    <\/div>\n      <div class=\"accordion-item border border-gray-light\">\n      <div class=\"accordion-header-text\">\n        <h3 class=\"margin-bottom-0\">\n          <button class=\"accordion-header full-width background-gray-light-30 border-0 margin-0 padding-top-2 padding-bottom-2 padding-left-3 padding-right-3\" aria-expanded=\"false\">\n            Social Media Accounts            <div class='accordion-toggle icon-right' class=''>\n              <i class='icon-chevron-right'><\/i>\n            <\/div>\n          <\/button>\n        <\/h3>\n      <\/div>\n      <div class='accordion-content'>\n        <ul>\n<li>Set accounts to private when possible and review follower lists regularly.<\/li>\n<li>Use different handles\/usernames across platforms.<\/li>\n<li>Use a different email address for social media.<\/li>\n<li>Avoid posting real-time locations or predictable routines.<\/li>\n<li>Be mindful of what personal information can be pieced together from posts, bios or tagged photos.<\/li>\n<li>If harassment occurs, save evidence (e.g., screenshots and messages) before blocking or reporting.<\/li>\n<\/ul>\n      <\/div>\n    <\/div>\n  <\/div>","protected":false},"excerpt":{"rendered":"<p>You are not alone. If you experience discomfort, coercion, harassment or harm\u2014online or offline\u2014reach out for support. Confidential, non-confidential and off-campus resources are available. Tech-facilitated or digital abuse refers to the use of technology\u2014such as phones, social media, apps or AI tools\u2014to monitor, control, harass, impersonate or violate someone\u2019s boundaries. It mirrors other forms of&hellip;<\/p>\n","protected":false},"author":324,"featured_media":0,"parent":15250,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-16855","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/experience.syracuse.edu\/bewell\/wp-json\/wp\/v2\/pages\/16855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/experience.syracuse.edu\/bewell\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/experience.syracuse.edu\/bewell\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/experience.syracuse.edu\/bewell\/wp-json\/wp\/v2\/users\/324"}],"replies":[{"embeddable":true,"href":"https:\/\/experience.syracuse.edu\/bewell\/wp-json\/wp\/v2\/comments?post=16855"}],"version-history":[{"count":7,"href":"https:\/\/experience.syracuse.edu\/bewell\/wp-json\/wp\/v2\/pages\/16855\/revisions"}],"predecessor-version":[{"id":17559,"href":"https:\/\/experience.syracuse.edu\/bewell\/wp-json\/wp\/v2\/pages\/16855\/revisions\/17559"}],"up":[{"embeddable":true,"href":"https:\/\/experience.syracuse.edu\/bewell\/wp-json\/wp\/v2\/pages\/15250"}],"wp:attachment":[{"href":"https:\/\/experience.syracuse.edu\/bewell\/wp-json\/wp\/v2\/media?parent=16855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}