Types of Abuse: Domestic, Financial and Technological

1128 words (5 pages) Essay in Psychology

12/09/17 Psychology Reference this

Disclaimer: This work has been submitted by a student. This is not an example of the work produced by our Essay Writing Service. You can view samples of our professional work here.

Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of UK Essays.

Abuse occurs when people mistreat or misuse other people. Abusive behaviors are used to manipulate others. But the uncommon types of abuse are just as important as the common ones. They include economic, academic, and psychological abuse.

Economic abuse is a form of abuse when one intimate partner has control over the other partner’s access to economic resources, which diminishes the victim’s capacity to support him/herself and forces him/her to depend on the perpetrator financially. Economic and financial abuse. “Examples of economic abuse are removing or keeping property without consent, dispasing of property against another person’s wishes and without lawful excuse, preventing access to joint financial assets, such as a joint bank account for the purposes of meeting normal household expenses. Economic abuse can include an abuser preventing victims from working and accessing bank accounts, credit cards or transportation among other isolating tactics as mentioned before.

“Money gives us a voice but most survivors of abuse already feel silenced by their experience. Lack of money intensifies feelings of being trapped, developed and alone. People living below the poverty line are the most vulnerable to economic abuse. For those manage to escape the abuse and survive initially, they often face overwhelming odds in obtaining long term security and safety, ruined credit scores, sporadic employment histories and legal issues caused by the battering make it extremely difficult to gain independence safety and long term security”. Getting out of economic abuse involves opening separate bank accounts from the abuser. Creating a private account or find a safe place to store cash since saving up in and itself can trigger abuse, victims are tasked with finding ways to make and save money without the abuser finding out. Dean emphasizes that someone’s ability to save money will depend on the degree to which their adviser exerts control over them. For someone who is being watched 24/7 the money saving process may be much slower. As with any abusive relationship victims must consider their safety after they’ve left. Stopping economic abuse is an extremely complicated task because each family’s financial situation and relationship is different. Economic abuse is rarely talked about and misunderstood by people but we simply can’t afford to talk about it anymore.”.

Technology abuse is digital partner violence when technology is used such as cell-phones, computers, and location technologies to bully, harass, stalk or intimidate a partner. Often this behavior is a form verbal or emotional abuse perpetrated online, through texts, calls & Etc. The internet is one of the most popular dynamics shaping our social, intellectual and moral spheres. The internet empowers individuals with immediate information to collaborate, engage, and participate. Technology abuse is extremely common in abusive relationships. Abusers often misuse technology as a way to control and monitor, or human’s victims. Many states have responded to this misuse of technology by passing specific laws to address the behaviors. In other states these acts can come under criminal laws such as harassment, stalking, eavesdropping, unlawful surveillance, etc. There are different types of technology abuse such as sexting, which is the act of sending and receiving sexually explicit text messages, photographs or videos mainly through a mobile device.

There Is always a risk that a “sext” could be shared or distributed with additional people electronically without your consent. Another is impersonation, impersonation generally refers to when someone uses a false identity and commits acts that will result in personal gain or that will deceive or harm another person. Some states have laws that criminize impersonating another person with the intent to defraud someone. One more example of technology abuse is Electronic surveillance. Electronic surveillance is a broad term used to describe when someone watches another person actions or monitors a person’s conversations without his/her knowledge or consent by using one or more electronic device. Electronic surveillance can be done by misusing cameras, recorders, wiretaps, social media, or email. It can also be done by the misuse of monitoring software (Known as Spyware) which can be installed on a computer, tablet, or smartphone to secretly monitor the activity without user’s knowledge.

Young people are increasingly being subjected to technology abuse. Teen violence prevention organization day one says half of the people ages 14-24 have experienced it. Lesbians, gays & bisexual’s users are more than twice as likely than straight user’s, to experience abuse online. The study found that also men and women are subject to similar levels of abuse, the attacks on women were often of a more serious nature of the 20 categories of harassment the researchers looked at. Men were most likely to report being called names and being embarrassed online.

Psychological abuse (also referred as psychological violence, emotional abuse or mental abuse) is a form of abuse, characterized by a person subjecting, or exposing another person to behavior that may result in psychological trauma, including anxiety, chronic depression or post-traumatic stress disorder. Psychological abuse is common and yet few understand the psychological abuse definition enough to spot it without the visible signs of physical abuse can stay hidden for years.

Psychological abuse though can be just as worse as physical abuse. psychological abuse can affect your inner thoughts and feelings as well as exert control over your life. You feel uncertain of the world around you, and unsafe in your own home, physiological abuse can destroy intimate relationship with yourself psychological abuse also applies to children and may impair their development into a healthy adult. The abuse signs and symptoms may start small at first as the abuser” test the waters to see what the other person will accept, but before long the psychological abuse builds into something that can be frightening and threating. Signs include name calling, yelling, insulting the person, threating the person or something that is important to them, ignoring, isolating the excluding them from meaningful events.

CITATIONS

Campbell, Rebecca. “Code to Inspire: Bitcoin Gives Afghan Women Financial Freedom.” Bitcoin Magazine. N.p., 14 Apr. 2016. Web. 23 Mar. 2017.

Written by Britni De La Cretaz.Britni Has Also Written: How Budgeting Improved My Relationship, Making Financial Amends in Alcoholics Anonymous and My Shopping Addiction Nearly Destroyed My Life More from This Author. “How to Rebuild After Escaping Financial Abuse.” Daily Worth. N.p., 28 Jan. 2017. Web. 23 Mar. 2017.

“Technological Abuse, Harassment on the Rise for Teens.” CBS News. CBS Interactive, 22 Oct. 2016. Web. 23 Mar. 2017.

Tracy, Natasha. “Psychological Abuse: Definition, Signs and Symptoms.” Healthy Place. N.p., July-Aug. 2012. Web. Mar.-Apr. 2017.

Soong, Jennifer. “When Technology Addiction Takes Over Your Life.” WebMD. WebMD, 12 Nov. 2011. Web. 23 Mar. 2017.

Get help with your essay today, from our professional essay writers!

Qualified writers in the subject of psychology are ready and waiting to help you with your studies.

Get help with your essay today

from our professional essay writers!

Visit www.ukessays.com to see how we can help you!

Cite This Work

To export a reference to this article please select a referencing stye below:

Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.

Related Services

View all

DMCA / Removal Request

If you are the original writer of this essay and no longer wish to have the essay published on the UK Essays website then please.

McAfee SECURE sites help keep you safe from identity theft, credit card fraud, spyware, spam, viruses and online scams Prices from
£28

Undergraduate 2:2 • 250 words • 7 day delivery

Order now

Delivered on-time or your money back

Rated 4.6 out of 5 by
Reviews.co.uk Logo (116 Reviews)

We can help with your essay