The Open Access Publisher and Free Library
09-victimization.jpg

VICTIMIZATION

VICTIMIZATION-ABUSE-WITNESSES-VICTIM SURVEYS

Posts tagged cyber violence
Gender approaches to cybersecurity: design, defence and response

By Katherine Millar, James Shires, and Tatiana Tropina

Multilateral processes on cybersecurity have recently begun to include official statements drawing attention to its gendered dimensions. Several delegations participating in the United Nations Open Ended Working Group (OEWG) on developments in the field of information and telecommunications in the context of international security have stated the need for gender mainstreaming into cyber norm implementation and gender-sensitive capacity building, as well as a better understanding of the linkages between cybersecurity and gender equality frameworks. However, questions remain about the overall application of gender perspectives to cybersecurity, as well as what kinds of action are needed to effectively implement a gender approach to cybersecurity and turn those goals into reality. To tackle this knowledge gap, this report outlines the relevance of gender norms to cybersecurity. It draws on existing research, supplemented by stakeholder and expert interviews, to assess gender-based differences in the social roles and interaction of women, men and non-binary people of all ages reflected in the distribution of power (e.g. influence over policy decisions and corporate governance), access to resources (e.g. equitable access to education, wages or privacy protections), and construction of gender norms and roles (e.g. assumptions regarding victims and perpetrators of cyber-facilitated violence). Overall, gender norms inform cybersecurity in two ways. First, gender constructs individual identities, roles and expectations within cybersecurity and broader society, such as the frequent association of technical expertise with men and masculinity. Second, gender operates as a form of hierarchical social structure. This means that activities and concepts associated with masculinity, such as technical expertise, are often, but not always, valued over those associated with women and femininity, such as communications expertise or equality, diversity and inclusion initiatives. To understand how gender shapes specific cybersecurity activities, this report proposes a new cyber-centric framework based on the three pillars of design, defence and response, aligned with prevalent perspectives among cybersecurity practitioners and policymakers. In each of these three pillars, the research identifies distinct dimensions of cyber-related activities that need to be considered from a gender perspective.

Geneva, Switzerland: United Nations Institute for Disarmament Research , 2021. 80p.

The Continued (in)visibility of Cyber Gender Abuse

By Danielle Keats Citron

For too long, cyber abuse has been misunderstood and ignored. The prevailing view is that cyber abuse is not “really real,” though in rare cases authorities take it seriously. Justices of the U.S. The Supreme Court, for instance, demanded and received extra protection for themselves after facing online threats, but, in oral argument, dismissed a woman as “overly sensitive” for reporting hundreds of threatening texts to law enforcement. In other words, protection for me (the powerful) but not for thee. For everyday women and minorities, cyber abuse is unseen and unredressed, due to invidious stereotypes and gender norms. Empirical proof now exists that makes non-recognition difficult to justify. Studies show that cyber abuse is widespread, the injuries profound, and disproportionately borne by women, who often have intersecting disadvantaged identities. (Hence, the moniker cyber gender abuse). After years of advocacy and scholarship, it pains me to acknowledge the continued invisibility of cyber gender abuse, but progress is possible if we recognize our failings and commit to structural reform. Internet exceptionalism must end for the businesses best situated to prevent destructive cyber gender abuse. Congress should condition the immunity afforded content platforms on a duty of care to address cyber gender abuse and eliminate the legal shield for platforms whose business is abuse. Companies must commit to safety by design as a core principle.

Yale Law Journal Forum, Forthcoming. Virginia Public Law and Legal Theory Research Paper No. 2023-57

Combating Cyber Violence against Women and Girls

By EIGE -  European Institute for Gender Equality

The recent COVID-19 pandemic has contributed to increasing our reliance on digital technologies in our everyday activities, consolidating internet access as a new fundamental human right. Digital platforms have often been celebrated for allowing equal opportunities for public self expression, regardless of one’s identity and status. Yet, not everyone is welcome in the cyberspace. The digital arena has become a breeding ground for a range of exclusionary and violent discourses and beliefs, expressed and disseminated in a context of anonymity and impunity. Both women and men can be victims of cyber violence. However, evidence shows that women and girls are highly exposed to it. Not only are they more likely to be targeted by cyber violence; they can also suffer from serious consequences, resulting in physical, sexual, psychological or economic harm and suffering. Women and girls often end up withdrawing from the digital sphere, silencing and isolating themselves and eventually losing opportunities to build their education, professional career and support networks. Cyber violence against women and girls (CVAWG) is often dismissed as an insignificant and virtual phenomenon. However, as digital (online) and face-to-face (offline) spaces become more and more integrated, CVAWG often amplifies (or is a precursor for) violence and victimisation in the physical world. CVAWG is not a private problem and does not exist in a vacuum: it is an integral part of the continuum of violence against women and girls. Just like any other form of gender-based violence, CWAWG is deeply rooted in the social inequality between women and men that persists in our world. CVAWG is an intersectional form of violence with different patterns and levels of vulnerability and risk among specific groups of women and girls. It can be exacerbated when it is committed on the grounds of gender in combination with other factors, including age, ethnic or racial origin, sexual orientation, gender identity, disability, religion or belief. Combating CVAWG: aims and scope of this report The aim of this report is to provide an in-depth investigation into the phenomenon of cyber violence and to examine how it affects women and girls specifically.  

Vilnius LITHUANIA: EIGE, 2022. 110p.