TY - JOUR
T1 - The Use of Security Technology to Protect Battered Women
AU - Growette Bostaph, Lisa
AU - Hamilton, Cynthia
AU - Santana, Shannon A.
PY - 2004/10/1
Y1 - 2004/10/1
N2 - Intimidation and threats of future victimisation are obstacles battered women often face when attempting to leave abusive relationships. Thus, all possible means of protecting battered women at this most dangerous time should be employed. This paper presents findings from a study in the US designed to determine the nature and extent to which domestic violence programs use security technology to protect battered women. Security technology includes panic alarms, cellular phones, home security devices, electronic monitoring of the offender and/or the property surrounding the victim's home, and surveillance or closed circuit cameras. The data collected through this survey will assist in determining whether domestic violence programs are utilizing the advances made in security technology. The findings are used to discuss the relationships between demographic variables, primary funding sources, type of program, and the use of security technology.
AB - Intimidation and threats of future victimisation are obstacles battered women often face when attempting to leave abusive relationships. Thus, all possible means of protecting battered women at this most dangerous time should be employed. This paper presents findings from a study in the US designed to determine the nature and extent to which domestic violence programs use security technology to protect battered women. Security technology includes panic alarms, cellular phones, home security devices, electronic monitoring of the offender and/or the property surrounding the victim's home, and surveillance or closed circuit cameras. The data collected through this survey will assist in determining whether domestic violence programs are utilizing the advances made in security technology. The findings are used to discuss the relationships between demographic variables, primary funding sources, type of program, and the use of security technology.
KW - battered women
KW - domestic violence
KW - protection
KW - security technology
KW - surveillance
UR - https://scholarworks.boisestate.edu/crimjust_facpubs/31
UR - https://doi.org/10.1057/palgrave.sj.8340182
M3 - Article
JO - Criminal Justice Faculty Publications and Presentations
JF - Criminal Justice Faculty Publications and Presentations
ER -