Learn to fight the new tools of intimate partner violence
- Detect the use of online violence by men in your programme
- Understand the link between coercive control and cyberviolence
- Strategically work on online violence with perpetrators
The training gave a clear understanding of what cyberviolence is, including its complicated nuances. This is valuable when working with perpetrators, but also victims. The training gave ideas about how to assess and intervene, which is applicable and very needed.
- Heldi McCaskill (Renouncing Violence Support Service, EE)
Technology-facilitated abuse is probably the fastest evolving field in intimate partner violence and the use and misuse of tech create endless ways to commit it. Additionally, ambiguous definitions and legal loopholes make cyberviolence hard to track and tackle. This training supplied me with tools and knowledge to be equipped for addressing the many shades of tech-facilitated abuse.
- Helina Metsik
Session 1. What is cyberviolence? Forms of cyberviolence (part 1)
- Understand cyberviolence and its connection with offline violence
- Different types of cyberviolence (cyberharassment, cyberstalking, non-consensual sharing of images)
- Prevalence of cyberviolence and it’s impact on different levels of society
Session 2: Forms of cyberviolence (part 2), legal aspects of cyberviolence
- In depth: non-consensual sharing of images and cyberharassment
- Existing European legal framework around cyberviolence and gaps
Session 3: Psychological aspects of cyberviolence
- Link between coercive control and cyberviolence
- Impact on and psychological consequences for victims of cyberviolence
- Characteristics of perpetrators who use cyberviolence
Session 4: Assessment of cyberviolence
- Incorporating assessments of cyberviolence in your every-day work with perpetrators
- Modern tools for assessment developed within the Destalk project
Session 5: Tackling cyberviolence in individual interviews and group work with perpetrators
- Key elements of cyberviolence assessment on real-life case studies
- Working on cyberviolence in group work
- Suggestions for structures of group sessions
Session 6: Protecting survivors from cyberviolence
- Risk assessment with focus on cyberviolence in work with survivors
- Safety planning with survivors in cases of identified cyberviolence
- Tools for ensuring safety of cyberviolence survivors developed within the Destalk project
Cyber violence in relationships is not a separate phenomenon from "real world" violence. It often follows the same patterns as offline violence and is associated with negative psychological and social consequences, as well as worsening quality of life and, often, physical, psychological and sexual violence. Indeed, with the help of social media and smartphones, perpetrators can make their partners feel paranoid and instil in them a constant sense of fear. This two-day practice-based and interactive training is designed for perpetrator work professionals of all levels of experience. The trainers will address challenging questions, such as:
- What are the mechanisms and forms of online violence?
- How can you detect online violence with perpetrators?
- How can you effectively work on online violence with perpetrators?