Skip to main content
Top

2024 | Book

Communication Technology and Gender Violence

insite
SEARCH

About this book

This book presents a compilation of case studies from practitioners, educators, and researchers working in the area of digital violence, along with methodologies to prevent it using cyber security. The book contains three basic sections namely: the concept of digital violence in policy and practice; the impact of digital violence; and the implication of cyber security to curb such violence. The intention of this book is to equip researchers, practitioners, faculties, and students with critical, practical, and ethical resources to use cyber security and related technologies to help curb digital violence and to support victims. It brings about the needs of technological based education in order to combat gendered crimes like cyberbullying, body-shaming, and trolling that are a regular phenomenon on social media platforms. Topics include societal implications of cyber feminism; technology aided communication in education; cyber security and human rights; governance of cyber law through international laws; and understanding digital violence.

Table of Contents

Frontmatter
Chapter 1. Technology and Gender Violence: Victimization Model, Consequences and Measures
Abstract
The evolution of technology is playing a very vital role in the development of every sphere of life. This technical evolution is also contributing significantly to improving the quality of human life. On the one side, technology is causing enormous benefits, on the other hand, it is also facilitating violence. Women, girls, transgender, etc. are expected to be highly targeted in online violence, e.g., sex trolling, physical threats, stalking, sexual harassment, exploitation, and bullying. It has been analyzed those women and girls are at high risk of gender-specific technology-supported violence.
In this work, the authors reviewed the literature and presented a technology-dependent gender violence model focusing on types of abuse, victim population, and technologies used. Different initiatives to avoid and manage technology-dependent gender violence are also presented in this work.
Sita Rani, Jaskiran Kaur, Pankaj Bhambri
Chapter 2. Implication of Technology to Curb Digital Violence Among Women on Social Media Platforms
Abstract
Gender Violence is one of the most dreaded forms of violence that is inflicted on the basis of gender. Earlier it was considered to be against women but in the current day, gender violence is just not limited to only women. There have been many cases who have been abused, humiliated, and exploited irrespective of their gender. What meant to be so much user-friendly created a pathway of destruction for them in their lives. Some were blackmailed and threatened after being abused and humiliated. Therefore, technology was the only means to come out of this deadly trap and lead a normal life again. Therefore, this paper is an attempt to study the implication of technology and explore ways and means to stop the digital violence which takes place among the users who are students and are much prone to using social media.
Deepanjali Mishra, Mangal Sain
Chapter 3. Cybersecurity Analysis and Phishing Attack
Abstract
The paper deals with exponentially growing technology—the Internet of Things (IoT) in the field of healthcare. It discusses networked healthcare and medical architecture. Healthcare data has significant value as a potential target for hackers. Attention is given to the analysis of international regulations on medical and healthcare cybersecurity. A developed normative hierarchical model of the international cybersecurity standards is provided for building a trustworthy healthcare IoT solution. Phishing is a method of exploitation for malicious reasons using targeted communications (email and messaging). This study reports on an internal evaluation targeting hospital staff and summarizes peer-reviewed literature regarding phishing and healthcare. For cybersecurity assessment of such systems, the case-oriented technique, which includes Advanced Security Assurance Cases (ASAC) and an example of a wireless insulin pump, is provided.
Bhaswati Sahoo, Prasant Kumar Pattnaik
Chapter 4. Sentimental Analysis of Quarantine Fears Among Women Through NVIVO
Abstract
The chapter confers about the sentimental analysis of quarantine fears of the working women. The qualitative data of 30 individuals working in the Education sector has been collected. The major results of the chapter dealt with how the educators are coping with the challenges of quarantine in order to accomplish their job and duties during Covid-19, which affect their mental well-being as well. The chapter offers a result analysis with the assistance of word cloud and sentimental analysis, thematic analysis through NVIVO-12. The major implications of the chapter suggest that during quarantine period, individual should behave mentally strong dealing with his/her own fears in the Indian context.
Shivani Agarwal, Vijender Kumar Solanki, Gloria Jeanette Rincón Aponte
Chapter 5. Leveraging OSINT and Artificial Intelligence, Machine Learning to Identify and Protect Vulnerable Sections of Society
Abstract
The internet today is the global hub for immeasurable amounts of data storage and sharing. But certain sections of society are extremely vulnerable to cyberbullying, harassment, and cyberstalking on this massive information-sharing forum. Due to these psychological attacks, laws are being made and modified to better protect these vulnerable sections of the society against these attacks which also fall under the purview of cyberthreats. Open-Source Intelligence (OSINT) is the publicly available data like newspaper clipping and social media posts that can processed using tools to gather information. Artificial intelligence and machine learning (AI and ML) is a technology that aims to make computers more human like by making them learn human behavior. In this paper, we analyze the various possible solutions available and proposed to tackle cyberthreats against women and children. The prospects involve the open-source intelligence technology along with artificial intelligence to detect and tackle cases of breach in cybersecurity to protect the vulnerable sections of society.
Smriti Panda, Oorja Rungta
Chapter 6. Cyber Risk and Gender Violence in Fashion Advertising
Abstract
In the present India, women are facing violence in each and every sector. As per the report of National Heath and Family Survey (NHFS-4), in our country 30% of women of 15–49 years age group are suffering physically as well as mentally, they are being harassed and exploited in every sector; sexual violence is also common in this age group which is found to be around 6%. No doubt at legislative level our country is making progress but the discrimination in gender and violence is continuously growing every year both publicly and in private spaces. These cases are hidden from the outside world in most sectors and under-reported due to the barriers in our society and its various stumbling blocks. An equivalent picture can be seen globally too. The need of the hour is to find ways to end this social evil named gender discrimination. We can socially communicate among us in terms of frequency as well as volume through advertising: Our morals, basic idea, viewpoint, and perception of the world around us. One of the vital areas of spreading awareness about gender discrimination is through marketing. Advertising and fashion world has created the awareness about the discrimination women face in our society and encouraged the different public organization to speak up against it. Forums of International fashion organizations have initiated dialogues on the harms gendered advertising brings to women and society. The United Nations-Women Organization has come forward with the data that around 35% of women all over the world have experienced physical/sexual violence by a partner or a non-partner at least once in their lifetime. The enormous difference based on gender our country is undergoing is clear from these figures. Fashion world through media has also shown our understanding of gender and their roles in society as media performs a vital role in the construction or deconstruction of gender equality. The discriminatory tendency against women can also be viewed in the fashion world.
Sarita Tripathy
Chapter 7. Trolls to Cyber Mob: Reasons of Trolling on Women
Abstract
When the entire world is shrinking into the internet, real-life misogyny is also spilling into the virtual world. From verbal abuse to obscene videos and morphed photos, there are many ways in which men harass women in cyberspace. This research intends to throw light on the reasons of gender-based trolls on women. It draws a link between gender trolling, cyber violence, cyber victimization, and psychological well-being of the respondents. The study uses qualitative methods. The responses were collected from three focus group discussion to find the impact of gender trolling on women in Kerala. The samples will be identified using purposive and convenient sampling methods. The names of the respondents will not be revealed to guarantee anonymity. There were 101 participants in total, with women accounting for more than half of them.
C. Karthika
Chapter 8. Gender Biasness – A Victim of Artificial Intelligence-Based Development
Abstract
In the machine learning process, sometimes due to vague assumptions, an algorithm that produces results that are prejudiced systematically is called an Algorithm Bias, Artificial Intelligence Bias, or Machine Learning Bias. There are several forms of Artificial Intelligence bias that promote gender biases. Machine learning models and training data sets are influenced by human developers’ cognitive biases. An algorithm gets hardcoded by such biases and incomplete data produces gender biases as well. If any information retrieved from a dataset is omitted by a cognitive bias, it brings biases. Thus, it is very important to ensure that the Artificial Intelligence data set should represent the complete population, and built-in biases must be overcome. In the present scenario, people’s behavior and opinions are very much influenced by Artificial Intelligence knowingly and unknowingly. In the design pattern of technologies, gender inequality has crept in due to the over-representation of men in the system. The present chapter focuses on the role of Artificial Intelligence and biased algorithms in the models of the Artificial Intelligence-based decision-making process. It is essential to understand as now Artificial Intelligence and HR/higher management are going together to manage human resources to enable organizations to achieve long-term goals.
Sonal Pathak, Vijender Kumar Solanki, Nguyen Thi Dieu Linh
Chapter 9. A Comparative Analysis of Pornography Detection Models to Prevent Gender Violence
Abstract
Globalization of technology has brought about a huge revolution in the field of social media due to which the world has come closer. Social media is also a platform which makes communication easier and much accessible. It enables users to interact in a more informal manner irrespective of place, time, and situation. Apart from that, there are many platforms like YouTube, etc. which allow netizens to upload their videos for various purposes. Some users upload videos that are educative and informative in nature. However, it is not always that the videos uploaded are educative and informative. Internet is flooded with videos that are very sensitive and are impermissible in nature. For example, Porn videos, which are not only impermissible but also contain such contents that it cannot be viewed by users of all ages. It is very important to control the distribution of sensitive content such as pornography which has become necessary with the ever-growing accessibility to the internet in order to restrict viewers from viewing them. There are various technological innovations like Deep learning, Artificial Intelligence, etc., which have derived many pornography detection models and they are successful in their objective fulfillment to some extent. Therefore, this paper is an attempt to study the different pornography detection models and then understand how do they prevent gender violence.
Deepanjali Mishra, Smriti Panda
Chapter 10. Framing the Landscape of Technological Enhancements: Artificial Intelligence, Gender Issues, and Ethical Dilemmas
Abstract
The paper aims to contextualise the relevance of technological anxieties around AI (Artificial Intelligence) as significant gender concerns and facilitators of gender-based violence. It examines how gender became a critical concern for AI development and deployment and how it raises ethical issues, thereby effectively questioning the visible and invisible gender violence and biases in AI technology and Machine Learning. Considering the biases of the data set, labelling, and modelling as significant aspects, it looks for methodological solutions to ensure diversity, fairness, individualism, inclusivity, and non-binariness. The paper takes socio-cultural criticism and posthumanist concerns as tools for examining the various components of AI technology and the embedded risks of magnifying gender violence. It argues that the ethical development of technology demands not only a gender-neutral technological development but, more crucially, a gender-sensitive technology that can make human-computer interaction more vivid and humane.
Subhankar Dutta
Chapter 11. English Lecturers’ Digital Resources Use at Universities of Nepal Amidst Unsecured Online Environment
Abstract
This study examines the use of Information Communication Technology (ICT) in Nepali Universities’ English teachers’ tutoring literature. Information collected from 21 preceptors from 12 universities revealed that ICT is relatively common in teaching English, but praxis is limited in smaller aspects. The study aims to assess the effectiveness, challenges, possibilities, pros, and cons of using ICT in the classroom and assess the safety of online tutoring and literacy platforms.
Eak Prasad Duwadi, Siddhant Koirala, Dipin Ale Magar, Susan Shrestha, Saman Adhikari, Ashmita Chapagain
Chapter 12. Cyberfeminism, Gender Dynamics and Women Empowerment
Abstract
Cyberspatial technologies bring forth radical negotiation of gender relations and challenge patriarchal hegemony. The extension of Information and Communication Technologies (ICT) proffers great opportunities to women. ICT empower women, facilitate feminist activism and challenge male dominance. Cyberspace and feminism conjoin to construct a new feminist paradigm. The 1990s usher in the arrival of productive formations crucial for gender equality and women empowerment. Rosi Bradiotti, in her essay, “Cyberfeminism with a Difference” exhorts women to undertake the dance through cyberspace to create a novel discourse. The incredible confluence of women’s involvement in digital technologies across theoretical, critical and activist spheres has generated numerous cyberfeminist discourses. These discourses organize feminist, political and cultural environment on the internet. Despite the gender gap and digital divide, the new-media books penned by women provide models of politically engaged feminist praxis. The formidable feminist projects undertaken since 1997 erode, to use Jennifer Brayton’s words, the patriarchal and alienating structure of technology. While cyberwomanists in the United States and other parts of the world find cyberspace a primary solution, cyberfeminists in Germany did confront problems. The internet in the new millennium, paradoxically, acts as liberating and constraining for women. The paper delves into the emancipatory space created by technology and hindrances in the path of women’s empowerment projects. It also augments the politics of presence with digital reconfigurations of female identity.
Navleen Multani
Chapter 13. Enhancing Digital Leadership Direction: Insight into Empowering Gender Violence Prevention
Abstract
As one of the significant elements of driving factors in continuing the organisation stability mainly in the pandemic age, the digital leadership style arrangement could be delivered in building the strategic coordination through an online competence skill. Through driving the digital shift paradigm towards the organisation, operating the process in order for being more responsive and flexible would lead to have digital professional skills in setting the good process with the expert achievability. This chapter aims to examine the professional soft skills with digital competence in expanding an important element to facilitate the leadership quality mainly in the pandemic age. The finding is focusing on how the driving process could go through an innovative spirit with being more openness and responsiveness towards the operation procedure, mainly on managing the customer relationship. The value of this chapter is arranged to constantly expand the digital competencies transmitted into the employees with the concern of trust and appreciation in such a process.
Miftachul Huda, Syamsul Arifin, Abdul Halim Ali, Abu Zarrin Selamat, Mohd Hairy Ibrahim, Azmil Hashim, Nor Kalsum Mohd Isa, Zaizul Ab Rahman
Chapter 14. Understanding of Digital Ethics for Information Trust: A Critical Insight into Gender Violence Anticipation
Abstract
This chapter aims to examine the demanding needs of digital ethics elaborated as a strategic foundation to expand safety concern amongst digital community and partnership for gender violence anticipation. The literature review was applied from the referred articles from peer-reviewed journals, proceedings, chapters and books related to the topic. The finding reveals that the significant alignment of digital ethics in expanding the digital partnership skills has a core value to expand the digital information trust in the order for gender violence anticipation. Those are continuing digital ethics’ information quality for gender violence anticipation, rebuilding digital ethics’ information trust to prevent gender violence potentials, and promoting digital ethics’ grant on digital safety environment assurance for gender violence anticipation. This chapter may contribute to give insights into developing the outstanding interplay of digital ethics as a safety strategy to achieve digital information trust for gender violence anticipation.
Miftachul Huda, Abdul Halim Ali, Tabrani Za, Roslee Ahmad, Abu Zarrin Selamat, Mohd Hairy Ibrahim, Muhammad Anshari, Moses Glorino
15. Correction to: Communication Technology and Gender Violence
Deepanjali Mishra, Anh Ngoc Le, Zachary McDowell
Backmatter
Metadata
Title
Communication Technology and Gender Violence
Editors
Deepanjali Mishra
Anh Ngoc Le
Zachary McDowell
Copyright Year
2024
Electronic ISBN
978-3-031-45237-6
Print ISBN
978-3-031-45236-9
DOI
https://doi.org/10.1007/978-3-031-45237-6