Pushing Back Sexism - A New Era For Women In Technology.

A growing movement of women is challenging global technology companies and empowering themselves and each other to be safer online.

At the end of 2014, Facebook, Twitter and YouTube were all given an ‘F’ grade for the way they dealt with – or rather, didn’t deal with – online violence against women. Sexism, abusive language and death threats were all included.

The social media platforms were found to be lacking in transparency and accused of only taking such issues seriously when media picked up on the situation. But a growing movement of women is challenging global technology companies and empowering themselves and each other to be safer online.

Take Back the Tech! (TBTT) is an expanding group of women active in 16 countries. They are set on reclaiming online space, making the net safer and more representative, as well as a place for women to thrive and change the world.

They’re making progress in a number of areas. Facebook and Twitter agreed to offer more protection for women’s freedom of speech, and freedom from violence, TBTT’s Pakistan partner Bytes for All has become a Twitter safety partner. Small but significant wins for TBTT, founded by the Association of Progressive Communications. Social media and the opportunities it offers for revenge pornography, cyberstalking and surveillance, are only one part of the problem, however.

Across the world there are 200 million fewer women online than men, meaning men have more chance to present their own perspective online and hold even more power over women, according to the group.

Part of TTBT’s work is to get more women online and trained in new technologies so they can have a louder voice. It also seeks recognition for women’s achievements in ICT and in all areas of life, and for these achievements to be fairly documented on Wikipedia history pages.

Over 16 days of campaigning in 2015, TBTT’s Latin American campaign reached 1.5 million people on Twitter to raise awareness of tech-related violence against women.

At the same time, 70 women took digital rights and online security workshops in Colombia and 26 women took the first Women Rock IT five-day training on technology and violence against women in Bosnia and Herzegovina.

In the Democratic Republic of the Congo, nearly 5,000 students were trained in privacy and tech-related gender violence.

There is a huge amount of work to plough on with. In particular, it will next deepen its work in Latin America. The organisation will be seeking positive cultural change in societies where violence and disrespect for women are ingrained. El Salvador, for example, has the highest femicide rate of every country in the world according to a report in 2012.

TBTT will work with La Sandia Digital, which runs popular weekly feminist internet TV program Luchadoras, and supports women in Latin America to produce their own films documenting experiences around sexism. Films such as Living in Darkness which show how women are criminalised for not fulfilling oppressive roles around marriage and motherhood.

TBTT has urgent work to do to get women equipped and ready to create a more inclusive, fairer and peaceful future. The internet is shaped constantly by making and sharing content. Occupying this from a feminist perspective amplifies women’s narratives, according to La Sandia.

“Violence against women and girls online is increasing,” says Lulú V. Barrera, founder of Luchadoras. “We want to break down stereotypes of women.” Sarah Baker, TBTT coordinator is buoyed to see social media platforms starting to listen, but they’re only just scratching the surface, she says. “Simply expressing an intention to make changes is often followed very, very slowly by actual policy or mechanism changes. And then some seem to move backwards. Google, for example has recently hired the founder of 4chan, a site that is notorious for online abuse.”

As technology changes by the second, there is a long and persistent journey ahead, but knowing that such organizations are relentless in their efforts to free girls and women from oppression can offer some comfort. It is essential that this peace-building work continues with full speed.

TechCrunch:
 

« CyberScape – The Growing Influence of Cyber Threats (£)
No Phone Is Safe from Hackers & Spies »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Digital Detective

Digital Detective

Digital Detective offer a range of products and services for digital forensic analysis and advanced data recovery.

Insta Group

Insta Group

Insta are a trusted cyber security partner for security-critical companies and organizations.

Security Onion Solutions

Security Onion Solutions

Security Onion Solutions is the creator and maintainer of Security Onion, a free and open platform for threat hunting, network security monitoring, and log management.

Norwegian Center for Information Security (NorSIS)

Norwegian Center for Information Security (NorSIS)

NorSIS) is an independent organization that works to increase knowledge and understanding of information security for businesses and individuals.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

Pixalate

Pixalate

Pixalate is an omni-channel fraud intelligence company that works with brands and platforms to prevent invalid traffic and improve ad inventory quality.

Recruit.net

Recruit.net

Recruit.net allows job seekers to instantly find millions of jobs from thousands of web sites with a single search.

Document Security Systems (DSS)

Document Security Systems (DSS)

DSS anti-counterfeit, authentication, and brand protection solutions are deployed to prevent attacks which threaten products, digital presence, financial instruments, and identification.

Human Security

Human Security

Human (formerly White Ops) Bot Mitigation Platform enables complete protection from sophisticated bot attacks across advertising, marketing and cybersecurity.

Hazy

Hazy

Hazy specialises in financial services, helping some of the world’s top banks and insurance companies reduce compliance risk.

Phakamo Tech

Phakamo Tech

Phakamo Tech offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

Bechtle

Bechtle

Bechtle is one of Europe’s leading IT service providers offering a blend of direct IT product sales and extensive systems integration services.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

Intrepid Solutions & Services

Intrepid Solutions & Services

Intrepid Solutions and Services provides technology solutions and professional services to key components of the intelligence and national security communities.

BlockAPT

BlockAPT

BlockAPT, empowering you with an advanced, intelligent cyber defence platform. We protect our customers digital assets by unifying operational technologies against advanced persistent threats.

Cufflink

Cufflink

Cufflink makes your business more secure, compliant and trusted. We limit the likelihood and impact of a data breach by controlling exactly what can and can't be done with personal data.