Computer Privacy
Computer use can be monitored and is impossible to completely clear. A safer computer may be one in a public library, at a community technology center (CTC) www.ctcnet.org (national directory), a trusted friend’s house, a university computer lab, or an Internet café.

 

RESOURCES

Brochures
PDF Are You Walking on Eggshells in Your Relationship?

PDF Counseling Services – Jersey Center for Non-Violence

PDF Information for Teens – Dating Abuse Prevention

Handouts
PDF Power and Control Wheel

PDF Equality Wheel

Books
Bancroft, Lundy, Why Does He Do That? Inside the Minds of Angry and Controlling Men, The Berkeley Publishing Group, 2002.

Dolan-Del Vecchio, Ken, Making Love, Playing Power, Soft Skull Press, 2008.

Evans, Patricia, The Verbally Abusive Relationship, Adams Media 1992.

Evans, Patricia, The Verbally Abusive Man, Can He Change?, Adams Media, 2006.

Weitzman, Suzanne, Not to People Like Us: Hidden Abuse in Upscale Marriages, Basic Books, 2000.

Web sites
www.jbws.org