The Use of Security Technology to Protect Battered Women Lisa Growette Bostaph Cynthia Hamilton Shannon Santana a a This article was published in the Security Journal, 2004, 17(4), 35-51.