Sexual Abuse & Harassment Of Women

The increasing reach of the Internet, the rapid spread of mobile information, and the widespread use of social media, has led to cyber violence against women and girls.

This has become a growing global problem with potentially significant economic and societal consequences.

Research by the World Health Organisation shows that one in three women will have experienced a form of violence in their lifetime. Despite the relatively new and growing phenomenon of Internet connectivity, it is estimated that many have already experienced a form of cyber violence since the age of fifteen.

Access to the Internet is fast becoming an economic necessity and is increasingly viewed as a fundamental human right. It is therefore vital to ensure that this digital public space is a safe for everyone, especially women and girls.

Digital Platforms Exacerbate Violence Against Women 

First:    Social media networks can scale up the harassment. With in-person interactions, a single abuser is accurately perceived as one single person; on the Internet, the same individual can create multiple accounts to target the victim.  

Second:    Digital applications have design features that may facilitate cyber violence. Through Snapchat’s map feature, for example, abusers are able to track their victims in great detail. 

Third:   The anonymity provided by social media platforms emboldens users to make abusive comments, and recent studies have shown that women with visible accounts in particular are disproportionately targeted. 

According to recent research, the current trend of cyber crime is largely dominated by crime against the individual - these kinds of crime include cyber stalking, fake ID, nude pictures/videos, email hacking and women are generally more vulnerable to cyber attacks of these kinds. 

The most common forms of social media cyber crime against women are stalking and cyber pornography, distributing images and videos of women engaged in intimate acts, as well as online trolling, bullying, blackmailing, and threats or intimidation, as well as impersonation. One recent study shows that many underaged girls and other female victims committed suicide after their private photos and videos were uploaded on the Internet.

Cyber Security Industry

Sexual harassment is rife in the cyber security industry, with women often reporting being groped at events and or receiving inappropriate content online. According to research by the IN Security Movement, one in four women (26%) have experienced sexual harassment at a cyber security conference, with 12% reporting multiple incidents. The perpetrators of sexual harassers are often hiding in plain sight and work in high-profile positions. Some 35% say their harasser was a senior manager or executive, the global survey of 2,157 women found.

When alerting event organisers of sexual harassment or inappropriate behaviour, 44% were unhappy with how it was handled. Worse, attempts to report harassment are often dismissed. 

Council of Europe:   Jane Frankland:     JIPIRS:     ITPro:    SSRN:   EIGE:   EIGE:    HG.org:   Middle East Inst

You Might Also Read: 

Black Women Comprise Less Than 1% Of The IT Workforce:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Perfectly Coded APIs Can Be Susceptible To Attack
The Advantages Of Using A VPN  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

RISA

RISA

RISA solutions help to secure networks, improve overall network security, and achieve government regulatory compliance.

Altius IT

Altius IT

Altius IT reviews your website for security vulnerabilities and provides a report identifying vulnerabilities and recommendations to make secure.

CISPA Helmholtz Center for Information Security

CISPA Helmholtz Center for Information Security

The CISPA Helmholtz Center for Information Security is a German national Big Science Institution within the Helmholtz Association. Our research encompasses all aspects of Information Security.

Cyjax

Cyjax

Cyjax monitors the Internet to identify the digital risks to your organisation, including cyber threats, reputational risks and the Darknet.

Danish Maritime Cybersecurity Unit

Danish Maritime Cybersecurity Unit

The Danish Maritime Cybersecurity Unit is tasked with delivering the initiatives set out in the Cyber and Information Security Strategy for the Maritime Sector.

IP Twins

IP Twins

IP Twins offer a wide range of services related to domain names and online brand protection.

QuoLab

QuoLab

QuoLab empowers security professionals to analyze, investigate and respond to threats within an integrated ecosystem.

Datenschutz Schmidt

Datenschutz Schmidt

Datenschutz Schmidt is a service provider with many years of experience, we support you in complying with numerous data protection guidelines, requirements and laws.

1Password

1Password

1Password combines industry-leading security with award-winning design to bring private, secure, and user-friendly password management to everyone.

Wickr

Wickr

Wickr's mission is to secure the world's most critical communications. Wickr provides the highest standard of encryption trusted by millions worldwide.

Conseal Security

Conseal Security

Mobile app security testing done well. Conseal Security are specialists in mobile app penetration testing. Our expert-led security analysis quickly finds security vulnerabilities in your apps.

Singtel Innov8

Singtel Innov8

Singtel Innov8, the venture capital arm of the Singtel Group, invests in and partners with innovative technology start-ups globally.

Mondoo

Mondoo

Mondoo is a powerful security, compliance, and asset inventory tool that helps businesses identify vulnerabilities, track lost assets, and ensure policy compliance across their entire infrastructure.

63 Moons Technologies (63MT)

63 Moons Technologies (63MT)

63 Moons Technologies is a world leader in providing next-generation technology ventures, innovations, platforms, and solutions.

Ampsight

Ampsight

Ampsight specializes in enabling cloud integration, securing data, and navigating complications that drive critical-mission success.

OrbiSky Systems

OrbiSky Systems

OrbiSky Systems is a British tech startup specializing in data management and cybersecurity solutions.