Safety and Wellbeing Cyber and Technology-facilitated Abuse
Cyber and Technology-facilitated Abuse
- Aboriginals and Torres Strait Islanders in Marine Science
- Courses
- Future Students
- Current Students
- Research and Teaching
- Partners and Community
- About JCU
- Reputation and Experience
- Celebrating 50 Years
- Academy
- Anthropological Laboratory for Tropical Audiovisual Research (ALTAR)
- Anton Breinl Research Centre
- Agriculture Technology and Adoption Centre
- Living on Campus
- Advanced Prawn Breeding Research Hub
- Advanced Analytical Centre
- Applying to JCU
- Alumni
- AMHHEC
- JCU Aquaculture Solutions
- AusAsian Mental Health Research Group
- ARCSTA
- Area 61
- Association of Australian University Secretaries
- Australian/NZ Students
- Australian Lions Stinger Research
- Boating and Diving
- JCU-CSIRO Partnership
- Employability Edge
- Career Ready Plan
- Australian Tropical Herbarium
- Careers at JCU
- Careers and Employability
- Australian Quantum & Classical Transport Physics Group
- Centre for Tropical Bioinformatics and Molecular Biology
- CITBA
- Chancellery
- CMT
- CASE
- College of Business, Law and Governance
- College of Healthcare Sciences
- WHOCC for N&M Education and Research
- College of Medicine and Dentistry
- College of Science and Engineering
- CPHMVS
- COVID-19 Advice
- Centre for Disaster Solutions
- CSTFA
- Cyclone Testing Station
- The Centre for Disaster Studies
- Daintree Rainforest Observatory
- Diploma of Higher Education
- Discover Nature at JCU
- Research Division
- Services and Resources Division
- Education Division
- Division of Tropical Environments and Societies
- Division of Tropical Health and Medicine
- Economic Geology Research Centre
- Elite Athletes
- eResearch
- Environmental Research Complex [ERC]
- Estate
- Financial and Business Services Office
- Fletcherview
- Foundation for Australian Literary Studies
- Gender Equity Action and Research
- GetReady4Uni
- Give to JCU
- Governance
- Information for JCU Cairns Graduates
- Graduate Research School
- Graduation
- Indigenous Education and Research Centre
- Indigenous Engagement
- Indigenous Legal Needs Project
- Inherent Requirements
- IsoTropics Geochemistry Lab
- IT Services
- International Schools
- International Students
- Research and Innovation Services
- JCU Eduquarium
- JCU Events
- JCU Global Experience
- JCU Ideas Lab
- JCU Job Ready
- JCU Motorsports
- JCU Prizes
- JCU Sport
- JCU Turtle Health Research
- Language and Culture Research Centre
- CEE
- LearnJCU
- Library
- Mabo Decision: 30 years on
- National Reconciliation Week
- MARF
- Marine Geophysics Laboratory
- New students
- Off-Campus Students
- Office of the Vice Chancellor and President
- Virtual Open Day
- Orpheus
- Outstanding Alumni
- Parents and Partners
- Pathways to university
- Planning for your future
- Placements
- Policy
- PAHL
- Publications
- Professional Experience Placement
- Queensland Research Centre for Peripheral Vascular Disease
- Rapid Assessment Unit
- RDIM
- Researcher Development Portal
-
Safety and Wellbeing
- JCU Respect Now Always, Commitment and Reviews
- JCU Respect Now Always, Training, Workshops and Events
- Bullying, Discrimination & Harassment
- Sexual Harassment and Sexual Assault
- Cyber and Technology-facilitated Abuse
- Mental Health and Wellness
- Emergencies, Critical incidents and Disasters
- Quick Links - Support Services
- Quick Links - Policy and Procedures
- Scholarships
- Contextual Science for Tropical Coastal Ecosystems
- Staff
- State of the Tropics
- Strategic Procurement
- Student Equity and Wellbeing
- Student profiles
- SWIRLnet
- TARL
- TESS
- TREAD
- TropEco
- TQ Maths Hub
- TUDLab
- Unicare Centre and Unicampus Kids
- UAV
- VAVS Home
- Work Health and Safety
- WHOCC for Vector-borne & NTDs
- Media
- Copyright and Terms of Use
- Australian Institute of Tropical Health & Medicine
Technology-facilitated abuse uses technology to threaten, intimidate, harass or humiliate someone – with the intent to hurt them socially, psychologically or even physically. Also known as cyber-abuse, it includes a range of behaviours such as:
- sending abusive or obscene text messages or emails
- making continuous threatening phone calls
- stalking a person online and hacking into their accounts, such as social media, banking or email accounts (cyberstalking)
- spying on and monitoring victims through the use of tracking systems
- personal attacks through social media sites
- posting someone’s personal information online along with offensive and/or sexual comments
- sharing intimate images of someone without their consent (image-based abuse)
- using technology to control or manipulate home appliances, locks and other connected devices
Technology-facilitated abuse has become a key part of domestic and family violence.
Image-based abuse occurs when intimate, nude or sexual images (including images that have been digitally altered) are distributed via mobile phones or the internet without the consent of those pictured. It can also include the threat to share such images. While it is commonly referred to as ‘revenge porn’ (typically involving a former sexual partner), many cases of image-based abuse are not about revenge or porn; it is actually a betrayal of trust and shows malicious intent to obtain power and control over someone else. There are specific laws that apply to image-based abuse.
Sextortion is a type of image-based abuse. It is a form of blackmail where someone threatens to share intimate images of another person online unless they give in to the demands. These demands are typically for money, additional intimate images or sexual favours. Perpetrators often target people through dating apps, social media, webcams or adult pornography sites. While sextortion can be used by individuals, organised crime is often behind it when the perpetrator demands money. Commonly the perpetrator is not based in Australia.
Cyberstalking is a form of online abuse where someone uses technology to stalk or repeatedly harass another person. A partner or ex-partner may use cyberstalking as a form of power and control. Cyberstalking is often accompanied by offline stalking. It can become dangerous and can develop into physical abuse. Stalking is a crime in all states and territories in Australia.
Sexting involves the sharing of intimate images or text messages. While this may be consensual, it can have serious social consequences including the increased risk of image-based abuse. The sharing of nude/sexual images of people under the age of 18 is a crime (even if it is a nude selfie).It can also be a crime when it involves harassing people of any age.
The e-Safety Commissioner can provide general advice and guidance, including information about when to seek legal advice and where to go for legal assistance. The eSafety cyber abuse response guide may help in identifying appropriate actions, including reporting the abuse to various services and platforms.
You can report image-based abuse, and adult cyber abuse issues to e-Safety. With image-based abuse, e-Safety may be able to take removal action, and in some cases take action against the person who posted, or threatened to post, an intimate image without consent.
Sexual Misconduct Officers
You can talk with a JCU Sexual Misconduct Officer about any matter that is causing you concern - no matter how big or small the issue might seem.
Sexual Misconduct Officers provide a single point of contact at JCU for a person who has been subject to Sexual Harassment or Sexual Assault, or to the manager or person supporting that person.
The safety and wellbeing of the person who has been subjected to sexual harassment or sexual assault are at the centre of all responses. All contact is treated confidentially.