Sexual Abuse & Harassment Of Women

The increasing reach of the Internet, the rapid spread of mobile information, and the widespread use of social media, has led to cyber violence against women and girls.

This has become a growing global problem with potentially significant economic and societal consequences.

Research by the World Health Organisation shows that one in three women will have experienced a form of violence in their lifetime. Despite the relatively new and growing phenomenon of Internet connectivity, it is estimated that many have already experienced a form of cyber violence since the age of fifteen.

Access to the Internet is fast becoming an economic necessity and is increasingly viewed as a fundamental human right. It is therefore vital to ensure that this digital public space is a safe for everyone, especially women and girls.

Digital Platforms Exacerbate Violence Against Women 

First:    Social media networks can scale up the harassment. With in-person interactions, a single abuser is accurately perceived as one single person; on the Internet, the same individual can create multiple accounts to target the victim.  

Second:    Digital applications have design features that may facilitate cyber violence. Through Snapchat’s map feature, for example, abusers are able to track their victims in great detail. 

Third:   The anonymity provided by social media platforms emboldens users to make abusive comments, and recent studies have shown that women with visible accounts in particular are disproportionately targeted. 

According to recent research, the current trend of cyber crime is largely dominated by crime against the individual - these kinds of crime include cyber stalking, fake ID, nude pictures/videos, email hacking and women are generally more vulnerable to cyber attacks of these kinds. 

The most common forms of social media cyber crime against women are stalking and cyber pornography, distributing images and videos of women engaged in intimate acts, as well as online trolling, bullying, blackmailing, and threats or intimidation, as well as impersonation. One recent study shows that many underaged girls and other female victims committed suicide after their private photos and videos were uploaded on the Internet.

Cyber Security Industry

Sexual harassment is rife in the cyber security industry, with women often reporting being groped at events and or receiving inappropriate content online. According to research by the IN Security Movement, one in four women (26%) have experienced sexual harassment at a cyber security conference, with 12% reporting multiple incidents. The perpetrators of sexual harassers are often hiding in plain sight and work in high-profile positions. Some 35% say their harasser was a senior manager or executive, the global survey of 2,157 women found.

When alerting event organisers of sexual harassment or inappropriate behaviour, 44% were unhappy with how it was handled. Worse, attempts to report harassment are often dismissed. 

Council of Europe:   Jane Frankland:     JIPIRS:     ITPro:    SSRN:   EIGE:   EIGE:    HG.org:   Middle East Inst

You Might Also Read: 

Black Women Comprise Less Than 1% Of The IT Workforce:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Perfectly Coded APIs Can Be Susceptible To Attack
The Advantages Of Using A VPN  »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cleafy

Cleafy

Cleafy are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers. Our purpose is to make people’s life easier and free from the threats in the digital ecosystem.

Identillect Technologies

Identillect Technologies

Identillect Technologies provide a user-friendly secure email solution to protect critical information, with an emphasis on simplicity.

BeDefended

BeDefended

BeDefended is an Italian company operating in IT Security and specialized in Cloud and Application Security with years of experience in penetration testing, consulting, training, and research.

Bureau Veritas

Bureau Veritas

Bureau Veritas are a world leader in Testing, Inspection and Certification. We provide certification and training services in areas including cybersecurity and data protection.

CloudOak

CloudOak

CloudOak is a cloud channel provider for hybrid cloud Backup as a Service (BaaS), Disaster Recovery as a Service (DRaaS) and Archiving to Small to Medium Business (SMB).

Seavus Accelerator

Seavus Accelerator

Seavus Accelerator's goal is to create an enabling and stimulating environment for start-ups growth and provide continuous high quality acceleration and investment support.

Abion

Abion

At Abion (formerly BRANDIT), we empower your business by providing comprehensive brand protection and web security services.

FraudLabs Pro

FraudLabs Pro

FraudLabs Pro detects fraud and helps merchants to reduce e-commerce chargebacks by identifying high risk transactions.

CWSI

CWSI

CWSI provide a full suite of enterprise mobility, security and productivity solutions to many of Ireland and the UK’s most respected organisations across a wide range of industry and public sectors.

Node4

Node4

Node4 provide advanced, cloud-led digital transformation solutions, delivered with technical expertise, innovation and exceptional service to drive your business forwards.

Telstra

Telstra

Telstra is one of the world's leading telecommunications and technology companies, offering a wider range of services from networks and cloud solutions to mobility and enterprise collaboration tools.

Progress Partners

Progress Partners

Progress Partners is a corporate advisory firm that works with buyers and sellers of emerging growth companies to complete M&A or private placement transactions. Our sectors include cybersecurity.

443ID

443ID

443ID brings OSINT data to Identity Security professionals on any digital platform.

CI-ISAC Australia

CI-ISAC Australia

CI-ISAC has been designed to support and promote existing legislation and Government initiatives that are working to uplift cyber resilience across critical infrastructure sectors.

EPAM Systems

EPAM Systems

Since 1993, EPAM Systems has leveraged its advanced software engineering heritage to become a leading global digital transformation services provider.

Symbiotic Security

Symbiotic Security

Symbiotic Security revolutionizes code security by integrating an AI-driven security coach directly within developers' IDEs.