To see country or technology platform specific data download the fulltext version of this article under 'Attachment' below.



Gender-based violence
is still one of the most under-reported crimes. Reasons include shame
that is associated with being a victim of gender-based violence,
normalisation or daily tolerance and acceptance of violence against
women, and that perpetrators are rarely brought to justice –
epitomised in the case of Iraqi teenager Rand whose father murdered
her for talking to a British soldier. The father says that not only
does he not face prosecution, he was congratulated by police
for his actions. This goes beyond impunity for murder.





Technology
aiding abuse


In
Argentina, a 16 year old girl faced a year of harassment from her
teacher. The girl's mother had unsuspectingly invited the teacher
into their home to give extra tuition. The teacher pressed sexual
advances on the child, and began a series of harssing mobile phone
calls and texts. It was only after a year of torment that the girl
showed the messages to her mother and action was taken against the
abuser.





Technology presents a
powerful tool for ending gender-based violence, by allowing access to
resources and support both online and offline. It helps to publicise
abuses, which can bring pressure to bear on the authorities to take
action. However, the anonymity of the web, and its ability to shrink
distances, also mean that perpetrators can use it to harass, stalk
and find victims. Technology also heightens problems of privacy,
evidence and recompense evident in traditional gender-based violence.





Take
Back the Tech! (TBTT)
is a campaign that aims to empower
users to use new information technologies for ending violence against
women. One important step in this is mapping the intersection between
gender-based violence and technology. This allows campaigners and
policy-makers to get a sense of the scale of gender-based violence
online, see which are the most prevalent abuses and come up with
strategies for addressing the problem.





On 25 November 2011,
TBTT has developed an
interactive map
based on Ushahidi that allows internet
users to share their stories, local news and personal experiences of
gender-based violence using technology. This map was launched on the
first day of the 16 Days of Activism Against Violence Against Women,
which also marks the International Day on the Elimination of Violence
Against Women. As of 7 December, it has recorded 103 stories from
across the globe, with the majority of stories coming from Africa,
Latin America and Asia.





What is monitored





The
TBTT! map organised technology-related violence against women into 5
broad categories. They are:





1)
Culturally justified violence against women
which includes cases
where culture or religion is used as a reason to justify, ignore or
accept acts of violence against women, or when technology plays a
role in creating a culture of violence against women.




2)
Online harassment and cyberstalking
which constitutes one of the
most visible forms of technology-related VAW





3)
Intimate partner violence
where technology is used in acts of
violence and abuse in intimate or spousal relationships





4)
Rape and sexual assault
where technology plays a role in tracking
the movement and activities of the victim, to provide location
information, posting of false solicitation for sexual violence or
when the violence continues because of digital recording and
distribution of the violence.





5)
Violence targeting communities
includes cases where communities
face targeted online attacks and harassment because of their gender
or sexual identity and political stand.





Aside
from the types of violence against women, the map also monitors 4
other broad categories:





1)
Act of violation, or what the abuser or violator did


2)
Harm faced, ranging from physical harm to inability to participate
meaningfully in online spaces


3)
Technology platform which was implicated or used in the incidence of
VAW


4)
Abuser or violator, which range from known and unknown persons, to
state and non-state actors.





A snapshot of the
stories so far





The
TBTT map allows users to select multiple answers for each category.
So, for example, a story was shared about marriage practices from the
Karamajong people of Uganda which was flagged as involving three
types of harm: emotional or psychological harm, sexual harm and
limiting mobility. This means that each column will add up to more
than 103, though based on 103 stories shared.





Type of
technology-related VAW































































































































































Type of VAW



Total cases



Violation



Other



80







Online harassment & cyberstalking



39



Repeated harassment (24)



Threats of violence/ blackmail (12)



Monitoring & tracking (9)



Taking photos/ video without consent (6)



Faking personal information (6)



Sharing private information (6)



Accessing private data (4)



Stealing identity/ money/ property (4)



Other (3)



Sexual assault & rape



29



Repeated harassment (12)



Other (9)



Monitoring & tracking (5)



Sharing personal information (5)



Taking photo/ video without consent (5)



Threats of violence/ blackmail (4)



Accessing private data (3)



Faking personal information (2)



Stealing identity/ money/ property



Intimate partner violence



17



Sharing private information (5)



Other (5)



Repeated harassment (5)



Monitoring & tracking (3)



Taking photo/ video without consent (3)



Threats of violence/ blackmail



Accessing private data



Faking personal information



Violence targeting communities



14



Other (7)



Threats of violence/ blackmail (6)



Repeated harassment (4)



Taking photo/ video without consent (3)



Monitoring & tracking (2)



Sharing private information (2)



Faking personal information



Stealing identity/ money/ property



Accessing private data



Culturally-justified VAW



11



Other (4)



Repeated harassment (4)



Accessing private data (2)



Threat of violence/ blackmail (2)



Stealing identity/ money/ property



Faking personal data



Taking photo/ video without consent



Monitoring & tracking





Of
all the cases listed, the most common violation is repeated
harassment, with a total of 43 cases compared with 19 threats of
violence or blackmail. The anonymity and burden of proof can
potentially make repeated harassment easier online than offline.
However, though as the case in the text box reveals this is not
always the case – the large number of people who have access to an
individual's private data also makes it easier for abusers to find
loop-holes in security systems.





Online
harm: A continuation of harm offline



A woman in South Africa was abused by the
man she had come to love and rely on after finding that she was HIV
positive. Nok'bekezela (pseudonym) was abandoned by her son's father
after he discovered she was HIV positive, and thought she had found
her 'true love' online through Facebook. But her lover read
conversations between Nok'bekezela and her friends, accusing her of
having affairs, publishing private information and pictures, and
abusing her both physically and emotionally. Even after they no
longer lived in the same town, he continued the abuse over Facebook.
Nok'bekezela felt she had no choice but to wait until he tired of her
– which he eventually did.





What
is worrying from this table is the prevalence of sexual assault and
rape, forming almost a third of all cases. This amply demonstrates
the 'real-world' implications of what happens online – what starts
online doesn't necessarily end there. It's also interesting to note
the high correlation between sexual assault and rape and repeated
harassment , suggesting a potential escalation of sexual violence
beginning from repeated harassment. This indicates the need to pay
serious attention to the prevalence of online harassment, and to take
concrete measures in responding to these situation. One of the main
considerations is greater protection and awareness on the issue of
right to privacy.





What did the
violators do





The
most common offence was repeated harassment, which as noted above
often coincided with emotional, physical or sexual harm. There were a
total of 44 cases of repeated harassment. The second most common was
threatening violence or blackmail, with 20 cases. Identity theft was
the least common of the offences that TBTT offered as a choice to
users.





Repeated
harassment: A case from Malaysia



P was in the process of leaving her abusive
husband when she received an SMS from him stating he had her phone
records and accusing her of having an affair. P was very disturbed as
she had not given him her new phone number. When she asked him how he
had obtained her number, her husband refused to tell her.
Eventually
she discovered that her husband had bribed someone at her mobile
phone service provider. Using her private details, he had managed to
secure a print out of all the calls she had made and received. He
then proceeded to threaten all the people whose numbers were on the
record.



When P found this out, she wrote to the
service provider and demanded they change her number and make her
records private. This ended the harassment and she proceeded with the
divorce.





Harm faced

















































Type of harm



Total cases



Emotional or psychological harm



73



Harm to reputation



45



Physical harm



36



Sexual harm



26



Loss of identity



9



Mobility limited



6



Censorship



6



Loss of property



1









It
is clear from these figures that the harm that is happening to women
online is generally not the harm that is being addressed by
international conventions on internet rights and related issues –
censorship and identity loss form a small fraction of the cases
reported.





Far
more prevalent is harm that falls under more widely known areas of
violence against women – emotional, physical or sexual harm. This
suggests that despite the online nature of the violation, the harm
that is faced has serious offline repercussions. Attention is
urgently needed to address physical, emotional or sexual harm faced
by women that is perpetrated through new technologies - an area that
still receives relatively little attention in
policy discourse around cybercrime
or internet rights issues.





The
other area of harm which is significant is harm to reputation.





Technology platform





The
most common technology platform where the violence took place, or the
ICT tool which was used to perpetrate harm is the mobile phone – 67
of the above cases, compared to 50 for Facebook and 51 other. "Other"
is a category that was used mainly on reports of violence against
women that was not related to ICT. This points to both the value of
an accessible and open mapping platform to monitor and document cases
of violence against women where women can report violence and harm
anonymously, as well as a need for it, which the TBTT map addressed
although this was not the focus of the platform. These cases were
primarily from Congo and Bosnia Herzegovina.







A story without technology: Why more
spaces are needed for online sharing



From the Congo, the story of Mamie



When she was 10 years old, Mamie was sent to
the shops to buy drinks for some family friends who were visiting. On
the way, a man – a friend of her father's – waylaid her, forced
her into his car and took her to an isolated spot – the city
cemetary. There, he slapped her and forced himself onto her. She was
later found, in tears, by a family who came to the cemetary. They
took her to hospital, where her family found her. The abuser was
prosecuted and received a two-year sentence, while Mamie continues to
live with shame and the inability to engage in loving sex well into
her adult life.





Perpetrator/Violator














































































































































Abuser



Total cases



Type of violation



A group of people



21



Repeated harassment (9)



Other (7)



Taking photo/ video without consent (6)



Sharing private information (4)



Threats of violence/ blackmail (3)



Accessing private data (2)



Stealing identity, money, etc



Faking personal data



Monitoring & tracking



Government/ State



10



Other (6)



Repeated harassment (3)



Threats of violence/ blackmail (2)



Taking photo/ video without consent



Internet platform



8



Repeated harassment (5)



Sharing private information (3)



Monitoring & tracking (3)



Accessing private data



Other



Taking photo/ video without consent



Faking personal information



Threats of violence/ blackmail



Someone known



53



Repeated harassment (28)



Other (11)



Monitoring & tracking (11)



Threats of violence/ blackmail (9)



Sharing private information (9)



Taking photo/ video without consent (9)



Accessing private information (5)



Faking personal information (2)



Stealing identity/ money/ property



Someone unknown



31



Repeated harassment (10)



Threats of violence/ blackmail (9)



Other (8)



Sharing private information (5)



Monitoring & tracking (5)



Taking photo/ video without consent (4)



Faking personal data (4)



Stealing identity/ money/ property (3)



Accessing private data (3)






From
this table, we find that the abuser or violator is consistent with
what is reported in offline violence against women: the person you're
most likely to be abused by is someone known to you, not the stranger
lurking on Facebook.





In
cases where the abusers were a group of people, the cases were split
between groups of people known to the victim (schoolmates, family,
friends) and strangers. Often when abusers were a group not known to
the victim, the abusers were targeting women due to their opinions,
for example, journalists who have faced sexual abuse as a result of
their work, or Eygptian bloggers who have been assaulted.





It
is interesting to note that out of all the cases reported, 10 cited
the government as the abuser/violator, while 8 named internet service
or platform providers are being responsible for the violation. Most
of these stories point to the failure by authorities to take action
despite reports, ranging from reports to the police that were not
followed up, to internet platforms like YouTube and Facebook lack of
response when their platform is being used to publish and disseminate
images, video or content that constituted an act of violence. This
indicates that greater clarity and commitment is needed to establish
proper accountability models to ensure that survivors of
technology-related VAW are able to seek adequate redress and justice.





Conclusion





The
picture that is emerging from the stories and experiences reported
through the TBTT mapping platform provides invaluable insight into
the dimensions of technology-related violence against women.





They
provide a sense of what is the scope of the issue, the linkages
between online and offline violence, the real and material harm faced
by survivors and the need for greater measures to first, recognise
the gravity of the issue, and secondly, measures to ensure that
survivors are able to gain support and access to justice.





It
also indicates that ICT and online spaces have become a significant
component and extension of the reality of violence against women, and
thus far, insufficient attention has been paid to it by state,
non-state and civil society actors who are committed to addressing
and eliminating violence against women, as well as who are engaged in
debates around internet rights and policy.





The
TBTT map is a pilot effort to provide a collaborative monitoring
platform that focuses on the role and connection between ICT and
violence against women. It is made possible through the commitment,
engagement and participation of the campaign partners in Asia, Latin
America and Africa who work on issues of violence against women as
well as internet rights from feminist perspectives. Campaigners
provided translation into their local languages, organised trainings
and discussions on the issue and brought the mapping platform to
their communities and partners through their Take Back the Tech! 16
days campaign activities.





Beyond
this year's campaign, it is hoped that the map will continue to grow
and become a sustainable and useful platform for the documentation,
monitoring and surfacing of experiences of technology-related VAW
that women and girls face in different parts of the world, and stand
also as a testimony to their stories of survival.



To see country or technology platform specific data download the fulltext version of this article under 'Attachment' below.

Add new comment

Plain text

  • Lines and paragraphs break automatically.
  • Allowed HTML tags: <br><p>