Sexual Abuse & Harassment Of Women

The increasing reach of the Internet, the rapid spread of mobile information, and the widespread use of social media, has led to cyber violence against women and girls.

This has become a growing global problem with potentially significant economic and societal consequences.

Research by the World Health Organisation shows that one in three women will have experienced a form of violence in their lifetime. Despite the relatively new and growing phenomenon of Internet connectivity, it is estimated that many have already experienced a form of cyber violence since the age of fifteen.

Access to the Internet is fast becoming an economic necessity and is increasingly viewed as a fundamental human right. It is therefore vital to ensure that this digital public space is a safe for everyone, especially women and girls.

Digital Platforms Exacerbate Violence Against Women 

First:    Social media networks can scale up the harassment. With in-person interactions, a single abuser is accurately perceived as one single person; on the Internet, the same individual can create multiple accounts to target the victim.  

Second:    Digital applications have design features that may facilitate cyber violence. Through Snapchat’s map feature, for example, abusers are able to track their victims in great detail. 

Third:   The anonymity provided by social media platforms emboldens users to make abusive comments, and recent studies have shown that women with visible accounts in particular are disproportionately targeted. 

According to recent research, the current trend of cyber crime is largely dominated by crime against the individual - these kinds of crime include cyber stalking, fake ID, nude pictures/videos, email hacking and women are generally more vulnerable to cyber attacks of these kinds. 

The most common forms of social media cyber crime against women are stalking and cyber pornography, distributing images and videos of women engaged in intimate acts, as well as online trolling, bullying, blackmailing, and threats or intimidation, as well as impersonation. One recent study shows that many underaged girls and other female victims committed suicide after their private photos and videos were uploaded on the Internet.

Cyber Security Industry

Sexual harassment is rife in the cyber security industry, with women often reporting being groped at events and or receiving inappropriate content online. According to research by the IN Security Movement, one in four women (26%) have experienced sexual harassment at a cyber security conference, with 12% reporting multiple incidents. The perpetrators of sexual harassers are often hiding in plain sight and work in high-profile positions. Some 35% say their harasser was a senior manager or executive, the global survey of 2,157 women found.

When alerting event organisers of sexual harassment or inappropriate behaviour, 44% were unhappy with how it was handled. Worse, attempts to report harassment are often dismissed. 

Council of Europe:   Jane Frankland:     JIPIRS:     ITPro:    SSRN:   EIGE:   EIGE:    HG.org:   Middle East Inst

You Might Also Read: 

Black Women Comprise Less Than 1% Of The IT Workforce:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Perfectly Coded APIs Can Be Susceptible To Attack
The Advantages Of Using A VPN  »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cloud Security Alliance (CSA)

Cloud Security Alliance (CSA)

The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing

Tanium

Tanium

Tanium delivers Autonomous Endpoint Management (AEM) with the industry’s only true real-time platform for AI.

Data Shepherd

Data Shepherd

Data Shepherds primary focus is to protect your business. We achieve this by offering extensive and unique expertise in innovative IT and Cyber security solutions.

Terranova Security

Terranova Security

Terranova is dedicated to providing information security awareness programs customized to your internal policies and procedures.

Cyacomb

Cyacomb

Cyacomb (formerly Cyan Forensics) provides digital forensics software to help police forces find evidence on computers many times faster than before.

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

BwCIRT

BwCIRT

BwCIRT is the Computer Incident Response Team (CIRT) for Botswana and provides an official point of contact for dealing with computer security incidents.

CyFIR

CyFIR

CyFIR is a network investigation and Incident Response tool for performing live computer investigations across any size enterprise.

NetApp Excellerator

NetApp Excellerator

NetApp Excellerator is NetApp’s global start-up program that aims to fuel innovation by partnering with deep-tech start-ups.

MillenniumIT ESP (MIT ESP)

MillenniumIT ESP (MIT ESP)

MillenniumIT ESP provides solutions and services around Core Infrastructure, Cloud, Cyber Security, Enterprise Applications, Intelligent Automation and Data, Smart Buildings, and Managed Services.

Liminal

Liminal

Liminal is a boutique strategy advisory firm serving digital identity, fintech, and cybersecurity clients, and the private equity / venture capital community.

AArete

AArete

AArete is a global management and technology consulting firm specializing in strategic profitability improvement, digital transformation, and advisory services.

Systal Technology Solutions

Systal Technology Solutions

Systal is a global managed network and security service and transformation specialist. We help enterprise-level businesses maximise the security and business value of their complex IT infrastructure.

Dropzone AI

Dropzone AI

Dropzone AI are creating a generational leap in SecOps by using AI to automate cyber expertise and tooling.

Staley Technologies

Staley Technologies

Staley Technologies is a US nationwide structured cabling, technology integrator, and Managed IT & Cyber Security provider.

CNNECT

CNNECT

CNNECT are specialists in cloud, collaboration and cybersecurity, constantly evolving the way in which we understand, advise and deploy these technologies