Sexual Abuse & Harassment Of Women

The increasing reach of the Internet, the rapid spread of mobile information, and the widespread use of social media, has led to cyber violence against women and girls.

This has become a growing global problem with potentially significant economic and societal consequences.

Research by the World Health Organisation shows that one in three women will have experienced a form of violence in their lifetime. Despite the relatively new and growing phenomenon of Internet connectivity, it is estimated that many have already experienced a form of cyber violence since the age of fifteen.

Access to the Internet is fast becoming an economic necessity and is increasingly viewed as a fundamental human right. It is therefore vital to ensure that this digital public space is a safe for everyone, especially women and girls.

Digital Platforms Exacerbate Violence Against Women 

First:    Social media networks can scale up the harassment. With in-person interactions, a single abuser is accurately perceived as one single person; on the Internet, the same individual can create multiple accounts to target the victim.  

Second:    Digital applications have design features that may facilitate cyber violence. Through Snapchat’s map feature, for example, abusers are able to track their victims in great detail. 

Third:   The anonymity provided by social media platforms emboldens users to make abusive comments, and recent studies have shown that women with visible accounts in particular are disproportionately targeted. 

According to recent research, the current trend of cyber crime is largely dominated by crime against the individual - these kinds of crime include cyber stalking, fake ID, nude pictures/videos, email hacking and women are generally more vulnerable to cyber attacks of these kinds. 

The most common forms of social media cyber crime against women are stalking and cyber pornography, distributing images and videos of women engaged in intimate acts, as well as online trolling, bullying, blackmailing, and threats or intimidation, as well as impersonation. One recent study shows that many underaged girls and other female victims committed suicide after their private photos and videos were uploaded on the Internet.

Cyber Security Industry

Sexual harassment is rife in the cyber security industry, with women often reporting being groped at events and or receiving inappropriate content online. According to research by the IN Security Movement, one in four women (26%) have experienced sexual harassment at a cyber security conference, with 12% reporting multiple incidents. The perpetrators of sexual harassers are often hiding in plain sight and work in high-profile positions. Some 35% say their harasser was a senior manager or executive, the global survey of 2,157 women found.

When alerting event organisers of sexual harassment or inappropriate behaviour, 44% were unhappy with how it was handled. Worse, attempts to report harassment are often dismissed. 

Council of Europe:   Jane Frankland:     JIPIRS:     ITPro:    SSRN:   EIGE:   EIGE:    HG.org:   Middle East Inst

You Might Also Read: 

Black Women Comprise Less Than 1% Of The IT Workforce:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Perfectly Coded APIs Can Be Susceptible To Attack
The Advantages Of Using A VPN  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

InfoWatch

InfoWatch

InfoWatch solutions allow you to protect data and information assets that are critically important to your business.

CodeOne

CodeOne

CodeOne provides solutions for website and web app security.

MadSec Security

MadSec Security

MadSec Security is a leading consulting company whose expertise are information and cyber security.

Optiv

Optiv

Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives.

Sift

Sift

The Sift Digital Trust Platform protects your business and customers from all vectors of fraud and abuse through our Live Machine Learning, global trust network and automation technologies.

Authomize

Authomize

Authomize aggregates identities and authorization mechanisms from any applications around your hybrid environment into one unified platform so you can easily and rapidly manage and secure all users.

Security Risk Management (SRM)

Security Risk Management (SRM)

SRM provide a comprehensive security risk management service encompassing people, processes, technology, governance, compliance and risk management.

Raiven Capital

Raiven Capital

Raiven Capital is a global early-stage technology venture capital fund. We focus on founder-led, driven companies on the leading edge of disruption.

Votiro

Votiro

Votiro is an award-winning cybersecurity company that specializes in file sanitization, ensuring every organization is safe from zero-day and undisclosed attacks.

ThreatDefence

ThreatDefence

ThreatDefence provides innovative SIEM, SOC-as-a-Service, and proactive cyber defence solutions to MSP’s and Enterprises.

Hexiosec

Hexiosec

Hexiosec (formerly Red Maple Technologies) is a technical consultancy and product company founded and run by engineers from the UK Intelligence and Defence communities.

Secure Halo

Secure Halo

Secure Halo has been protecting the intellectual assets and sensitive information of the federal government and private sector for 20+ years, through our proactive approach to risk and cybersecurity.

Center for Cyber Security Studies & Research (CFCS2R)

Center for Cyber Security Studies & Research (CFCS2R)

CFCS2R's mission is to empower individuals, organizations, and governments with the knowledge and tools necessary to protect against cyber threats.

OrbiSky Systems

OrbiSky Systems

OrbiSky Systems is a British tech startup specializing in data management and cybersecurity solutions.

rThreat

rThreat

rThreat is a cloud-based SaaS solution that challenges your cyber defenses using real-world and custom threats in a secure environment, ensuring your readiness for attacks.

PlanNet 21 Communications

PlanNet 21 Communications

PlanNet 21 Communications is Ireland most specialised technology solution provider.