Sexual Abuse & Harassment Of Women

The increasing reach of the Internet, the rapid spread of mobile information, and the widespread use of social media, has led to cyber violence against women and girls.

This has become a growing global problem with potentially significant economic and societal consequences.

Research by the World Health Organisation shows that one in three women will have experienced a form of violence in their lifetime. Despite the relatively new and growing phenomenon of Internet connectivity, it is estimated that many have already experienced a form of cyber violence since the age of fifteen.

Access to the Internet is fast becoming an economic necessity and is increasingly viewed as a fundamental human right. It is therefore vital to ensure that this digital public space is a safe for everyone, especially women and girls.

Digital Platforms Exacerbate Violence Against Women 

First:    Social media networks can scale up the harassment. With in-person interactions, a single abuser is accurately perceived as one single person; on the Internet, the same individual can create multiple accounts to target the victim.  

Second:    Digital applications have design features that may facilitate cyber violence. Through Snapchat’s map feature, for example, abusers are able to track their victims in great detail. 

Third:   The anonymity provided by social media platforms emboldens users to make abusive comments, and recent studies have shown that women with visible accounts in particular are disproportionately targeted. 

According to recent research, the current trend of cyber crime is largely dominated by crime against the individual - these kinds of crime include cyber stalking, fake ID, nude pictures/videos, email hacking and women are generally more vulnerable to cyber attacks of these kinds. 

The most common forms of social media cyber crime against women are stalking and cyber pornography, distributing images and videos of women engaged in intimate acts, as well as online trolling, bullying, blackmailing, and threats or intimidation, as well as impersonation. One recent study shows that many underaged girls and other female victims committed suicide after their private photos and videos were uploaded on the Internet.

Cyber Security Industry

Sexual harassment is rife in the cyber security industry, with women often reporting being groped at events and or receiving inappropriate content online. According to research by the IN Security Movement, one in four women (26%) have experienced sexual harassment at a cyber security conference, with 12% reporting multiple incidents. The perpetrators of sexual harassers are often hiding in plain sight and work in high-profile positions. Some 35% say their harasser was a senior manager or executive, the global survey of 2,157 women found.

When alerting event organisers of sexual harassment or inappropriate behaviour, 44% were unhappy with how it was handled. Worse, attempts to report harassment are often dismissed. 

Council of Europe:   Jane Frankland:     JIPIRS:     ITPro:    SSRN:   EIGE:   EIGE:    HG.org:   Middle East Inst

You Might Also Read: 

Black Women Comprise Less Than 1% Of The IT Workforce:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Perfectly Coded APIs Can Be Susceptible To Attack
The Advantages Of Using A VPN  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BGD E-GOV CIRT

BGD E-GOV CIRT

BGD e-GOV CIRT's mission is to support government efforts to develop ICT programs by establishing incident management capabilities within Bangladesh.

Nation-E

Nation-E

Nation-E offers innovative cyber security solutions for industrial installations, critical infrastructure and smart grids.

FinlayJames

FinlayJames

FinlayJames supports cyber security companies to meet the increasing demand and pressure on them by finding top talent within the industry for their sales, marketing and technical teams.

Cygilant

Cygilant

Cygilant is a SOC2 certified service provider that combines MSSP and Incident Detection and Response (IDR) capabilities managed by global SOCs staffed with trained security engineers.

ecsec

ecsec

ecsec is a specialized vendor of security solutions including information security management, smart card technology, identity management, cloud computing and electronic signature technology.

Conviso

Conviso

Conviso is a consulting company specialized in Application Security and Security Research.

Czech Accreditation Institute

Czech Accreditation Institute

Czech Accreditation Institute is the national accreditation body for the Czech Republic. The directory of members provides details of organisations offering certification services for ISO 27001.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

OffSec

OffSec

OffSec have defined the standard of excellence in penetration testing training. Elite security instructors teach our intense training scenarios and exceptional course material.

SecureLogix

SecureLogix

SecureLogix deliver a unified voice network security and call verification solution. Protect against call attacks & fraud.

CyberSheath Services International

CyberSheath Services International

CyberSheath integrates your compliance and threat mitigation efforts and eliminates redundant security practices that don’t improve and in fact might probably weaken your security posture.

Cognyte

Cognyte

Cognyte are a market leader in security analytics software that empowers governments and enterprises with Actionable Intelligence for a safer world.

Virtual Technologies Group (VTG)

Virtual Technologies Group (VTG)

Virtual Technologies Group is a single source, IT product and services provider for SMBs and IT departments, delivering reliable, cost-efficient service, maintenance and support solutions.

Cipher Net Shield

Cipher Net Shield

Cipher Net Shield specializes in secure E-wallet solutions with a strong focus on blockchain and cybersecurity, prioritizing both transaction security and the recovery of lost capital.

Interlynk

Interlynk

Interlynk's #SBOM and # VEX-powered platform automates and continuously monitors first-party and vendor software supply chains and helps meet #FDA, #CRA, #GSA, and #DoD compliance obligations.

3DOT Solutions

3DOT Solutions

3DOT Solutions is an established UK cybersecurity consultancy focused on delivering end-to-end cyber security solutions for private and public sector customers.