{"id":1029,"date":"2015-01-29T09:18:42","date_gmt":"2015-01-29T09:18:42","guid":{"rendered":"https:\/\/www.kvinnojouren-ada.nu\/en\/internet-security\/hotochvaldmedteknikenshjalp\/"},"modified":"2017-04-20T09:59:21","modified_gmt":"2017-04-20T09:59:21","slug":"threats-and-abuse-using-technology","status":"publish","type":"page","link":"https:\/\/www.kvinnojouren-ada.nu\/en\/internet-security\/threats-and-abuse-using-technology\/","title":{"rendered":"Threats and abuse using technology"},"content":{"rendered":"<p>As technology develops, it creates new ways to control, intimidate and abuse. With the help of modern technology, your abuser can not only monitor and find you but also sabotage you in different ways. If you suspect that your abuser has had access to your computer, mobile phone, etc. and knows how to use such technology, you may need to replace your computer, tablet or mobile phone. You should also learn about what technology can be used for control, monitoring and threats. Please contact Ada for more information and to talk about how you can protect yourself.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As technology develops, it creates new ways to control, intimidate and abuse. With the help of modern technology, your abuser can not only monitor and find you but also sabotage you in different ways. If you suspect that your abuser has had access to your computer, mobile phone, etc. and knows how to use such [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1023,"menu_order":0,"comment_status":"open","ping_status":"open","template":"page-templates\/inner-page.php","meta":{"footnotes":""},"class_list":["post-1029","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Threats and abuse using technology - Kvinno- och tjejjouren Ada<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kvinnojouren-ada.nu\/en\/internet-security\/threats-and-abuse-using-technology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threats and abuse using technology - Kvinno- och tjejjouren Ada\" \/>\n<meta property=\"og:description\" content=\"As technology develops, it creates new ways to control, intimidate and abuse. With the help of modern technology, your abuser can not only monitor and find you but also sabotage you in different ways. If you suspect that your abuser has had access to your computer, mobile phone, etc. and knows how to use such [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kvinnojouren-ada.nu\/en\/internet-security\/threats-and-abuse-using-technology\/\" \/>\n<meta property=\"og:site_name\" content=\"Kvinno- och tjejjouren Ada\" \/>\n<meta property=\"article:modified_time\" content=\"2017-04-20T09:59:21+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.kvinnojouren-ada.nu\\\/en\\\/internet-security\\\/threats-and-abuse-using-technology\\\/\",\"url\":\"https:\\\/\\\/www.kvinnojouren-ada.nu\\\/en\\\/internet-security\\\/threats-and-abuse-using-technology\\\/\",\"name\":\"Threats and abuse using technology - Kvinno- och tjejjouren Ada\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.kvinnojouren-ada.nu\\\/#website\"},\"datePublished\":\"2015-01-29T09:18:42+00:00\",\"dateModified\":\"2017-04-20T09:59:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.kvinnojouren-ada.nu\\\/en\\\/internet-security\\\/threats-and-abuse-using-technology\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.kvinnojouren-ada.nu\\\/en\\\/internet-security\\\/threats-and-abuse-using-technology\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.kvinnojouren-ada.nu\\\/en\\\/internet-security\\\/threats-and-abuse-using-technology\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.kvinnojouren-ada.nu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\\\/\\\/www.kvinnojouren-ada.nu\\\/en\\\/internet-security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Threats and abuse using technology\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.kvinnojouren-ada.nu\\\/#website\",\"url\":\"https:\\\/\\\/www.kvinnojouren-ada.nu\\\/\",\"name\":\"Kvinno- och tjejjouren Ada\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.kvinnojouren-ada.nu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Threats and abuse using technology - Kvinno- och tjejjouren Ada","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kvinnojouren-ada.nu\/en\/internet-security\/threats-and-abuse-using-technology\/","og_locale":"en_US","og_type":"article","og_title":"Threats and abuse using technology - Kvinno- och tjejjouren Ada","og_description":"As technology develops, it creates new ways to control, intimidate and abuse. With the help of modern technology, your abuser can not only monitor and find you but also sabotage you in different ways. If you suspect that your abuser has had access to your computer, mobile phone, etc. and knows how to use such [&hellip;]","og_url":"https:\/\/www.kvinnojouren-ada.nu\/en\/internet-security\/threats-and-abuse-using-technology\/","og_site_name":"Kvinno- och tjejjouren Ada","article_modified_time":"2017-04-20T09:59:21+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.kvinnojouren-ada.nu\/en\/internet-security\/threats-and-abuse-using-technology\/","url":"https:\/\/www.kvinnojouren-ada.nu\/en\/internet-security\/threats-and-abuse-using-technology\/","name":"Threats and abuse using technology - Kvinno- och tjejjouren Ada","isPartOf":{"@id":"https:\/\/www.kvinnojouren-ada.nu\/#website"},"datePublished":"2015-01-29T09:18:42+00:00","dateModified":"2017-04-20T09:59:21+00:00","breadcrumb":{"@id":"https:\/\/www.kvinnojouren-ada.nu\/en\/internet-security\/threats-and-abuse-using-technology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kvinnojouren-ada.nu\/en\/internet-security\/threats-and-abuse-using-technology\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.kvinnojouren-ada.nu\/en\/internet-security\/threats-and-abuse-using-technology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.kvinnojouren-ada.nu\/en\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.kvinnojouren-ada.nu\/en\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Threats and abuse using technology"}]},{"@type":"WebSite","@id":"https:\/\/www.kvinnojouren-ada.nu\/#website","url":"https:\/\/www.kvinnojouren-ada.nu\/","name":"Kvinno- och tjejjouren Ada","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kvinnojouren-ada.nu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.kvinnojouren-ada.nu\/en\/wp-json\/wp\/v2\/pages\/1029","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kvinnojouren-ada.nu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kvinnojouren-ada.nu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kvinnojouren-ada.nu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kvinnojouren-ada.nu\/en\/wp-json\/wp\/v2\/comments?post=1029"}],"version-history":[{"count":4,"href":"https:\/\/www.kvinnojouren-ada.nu\/en\/wp-json\/wp\/v2\/pages\/1029\/revisions"}],"predecessor-version":[{"id":1521,"href":"https:\/\/www.kvinnojouren-ada.nu\/en\/wp-json\/wp\/v2\/pages\/1029\/revisions\/1521"}],"up":[{"embeddable":true,"href":"https:\/\/www.kvinnojouren-ada.nu\/en\/wp-json\/wp\/v2\/pages\/1023"}],"wp:attachment":[{"href":"https:\/\/www.kvinnojouren-ada.nu\/en\/wp-json\/wp\/v2\/media?parent=1029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}