Open Access Publisher and Free Library
09-victimization.jpg

VICTIMIZATION

VICTIMIZATION-ABUSE-WITNESSES-VICTIM SURVEYS

Posts tagged sex in cyberspace
Gender approaches to cybersecurity: design, defence and response

By Katherine Millar, James Shires, and Tatiana Tropina

Multilateral processes on cybersecurity have recently begun to include official statements drawing attention to its gendered dimensions. Several delegations participating in the United Nations Open Ended Working Group (OEWG) on developments in the field of information and telecommunications in the context of international security have stated the need for gender mainstreaming into cyber norm implementation and gender-sensitive capacity building, as well as a better understanding of the linkages between cybersecurity and gender equality frameworks. However, questions remain about the overall application of gender perspectives to cybersecurity, as well as what kinds of action are needed to effectively implement a gender approach to cybersecurity and turn those goals into reality. To tackle this knowledge gap, this report outlines the relevance of gender norms to cybersecurity. It draws on existing research, supplemented by stakeholder and expert interviews, to assess gender-based differences in the social roles and interaction of women, men and non-binary people of all ages reflected in the distribution of power (e.g. influence over policy decisions and corporate governance), access to resources (e.g. equitable access to education, wages or privacy protections), and construction of gender norms and roles (e.g. assumptions regarding victims and perpetrators of cyber-facilitated violence). Overall, gender norms inform cybersecurity in two ways. First, gender constructs individual identities, roles and expectations within cybersecurity and broader society, such as the frequent association of technical expertise with men and masculinity. Second, gender operates as a form of hierarchical social structure. This means that activities and concepts associated with masculinity, such as technical expertise, are often, but not always, valued over those associated with women and femininity, such as communications expertise or equality, diversity and inclusion initiatives. To understand how gender shapes specific cybersecurity activities, this report proposes a new cyber-centric framework based on the three pillars of design, defence and response, aligned with prevalent perspectives among cybersecurity practitioners and policymakers. In each of these three pillars, the research identifies distinct dimensions of cyber-related activities that need to be considered from a gender perspective.

Geneva, Switzerland: United Nations Institute for Disarmament Research , 2021. 80p.

The Continued (in)visibility of Cyber Gender Abuse

By Danielle Keats Citron

For too long, cyber abuse has been misunderstood and ignored. The prevailing view is that cyber abuse is not “really real,” though in rare cases authorities take it seriously. Justices of the U.S. The Supreme Court, for instance, demanded and received extra protection for themselves after facing online threats, but, in oral argument, dismissed a woman as “overly sensitive” for reporting hundreds of threatening texts to law enforcement. In other words, protection for me (the powerful) but not for thee. For everyday women and minorities, cyber abuse is unseen and unredressed, due to invidious stereotypes and gender norms. Empirical proof now exists that makes non-recognition difficult to justify. Studies show that cyber abuse is widespread, the injuries profound, and disproportionately borne by women, who often have intersecting disadvantaged identities. (Hence, the moniker cyber gender abuse). After years of advocacy and scholarship, it pains me to acknowledge the continued invisibility of cyber gender abuse, but progress is possible if we recognize our failings and commit to structural reform. Internet exceptionalism must end for the businesses best situated to prevent destructive cyber gender abuse. Congress should condition the immunity afforded content platforms on a duty of care to address cyber gender abuse and eliminate the legal shield for platforms whose business is abuse. Companies must commit to safety by design as a core principle.

Yale Law Journal Forum, Forthcoming. Virginia Public Law and Legal Theory Research Paper No. 2023-57

Sex in Cyberspace: Men Who Pay for Sex

By Sarah Earle and Keith Sharp

Sex in Cyberspace offers a bold and provocative, yet sensitively written, account of an under-investigated area of sociological enquiry. While there is a considerable amount of research documenting the experiences of sex workers, very little data exists on their male clientele. The first empirically-based volume on the experiences of men who pay for sex, this work presents a significant new source of data. The book is based upon an extensive study of on-line forums in which both the purchasers of sexual services and the workers themselves can exchange information and views - information which is otherwise extremely difficult to obtain. Sarah Earle and Keith Sharp argue that such sites represent a significant change in the social organization of sex work and those who seek and use the services of sex workers. Shedding new light on men's sexual identity, Sex in Cyberspace makes a major contribution to the study of sexuality.

London; New York: Routledge, 2007. 144p.