Abusers can use internet and ICT means in order to a to harm the victim in different forms of privacy violation, the most common forms being:
- Intimate image abuse (Revenge pornography) i.e. publishing videos of sexually explicit content online without consent - violence that consists of accessing, using and spreading private videos or photographs of intimate content without the consent of the person.
- Doxing – collecting, manipulating and/or publishing the victim's private data on social networks, specialized portals or chat groups, without her consent, with the aim of causing harm. In some cases abusers use doxing as a leverage in order blackmail them to get in touch with the victim live – in order to continue the abuse in other forms.
- Impersonation - stealing someone's identity in order to threaten or intimidate, as well as to discredit or damage the reputation of the person being abused.
- Hacking or unauthorized intrusion - refers to the act of intercepting private communications and data and can specifically target women, most often in the form of camera hacking
- Voyeurism –recording and/or publication of photographs or videos of women's intimate areas or acts without the consent of the victim