ESSENTIAL Empowering adult women against technology-facilitated violence
2023-2-BG01-KA210-ADU-000174481
https://erasmus-plus.ec.europa.eu/projects/search/details/2023-2-BG01-KA210-ADU-000174481
This handbook is developed as part of the Erasmus+ project "Empowering Adult Women Against Technology-Facilitated Violence" (project code: 2023-2-BG01-KA210-ADU-000174481). Implemented by three organizations—Solidarity Works (Bulgaria), Menas ir inovacijos (ART+INN) (Lithuania), and 7HUB (Italy)— he project tackles the rapidly growing issue of technology-facilitated violence, which disproportionately affects women and other vulnerable groups in the digital space. Technology-facilitated violence encompasses various harmful acts, including cyberstalking, online harassment, and the non-consensual sharing of private images, all of which pose significant threats to women's physical and mental well-being, reputation, and professional lives. While younger generations may have a stronger familiarity with navigating digital landscapes, adult women, particularly those aged 35-50, often encounter unique challenges when dealing with these forms of digital abuse, largely due to a lack of specialized resources and tailored support.
This handbook is specifically designed to fill this gap by providing adult women with the tools, strategies, and knowledge necessary to recognize, prevent, and respond to technology-facilitated violence. The project’s objectives emphasize practical empowerment: to educate women on securing their digital identities, to guide them through privacy measures, to outline legal recourses available, and to offer coping strategies to handle online abuse effectively. The handbook not only serves as an educational tool but also as a supportive guide that can be revisited whenever challenges arise. Featuring interactive elements such as infographics, quizzes, and reflective exercises, the handbook encourages readers to actively engage with the material and apply the learning in real-world situations.
In addition to empowering individual women, the handbook has been crafted with educators, counsellors, and community leaders in mind, equipping these professionals with resources to support women affected by technology-based violence. The ESSENTIAL project also fosters a sense of community through local support networks, helping women and their advocates to connect, share experiences, and reinforce each other’s resilience. By bridging knowledge, support, and action, this handbook stands as a vital resource in promoting digital safety and ensuring women’s right to navigate the digital world free from violence and intimidation.
As digital technology becomes integral to our daily lives, it simultaneously facilitates new, intensified forms of gender-based violence. Online violence against women and girls, though not a new phenomenon, has escalated rapidly in recent years, posing significant threats to women’s safety and well-being both online and offline. This underscores the urgent need to protect and uphold women's rights in the digital era.
Traditionally, Gender-Based Violence (GBV) has been defined as any threat or act resulting in physical, sexual, or psychological harm to women. However, in the digital age, the scope of GBV has expanded to include Technology-Facilitated Gender-Based Violence (TFGBV), reflecting how modern technologies are being exploited to perpetuate and amplify violence against women.
Technology-based violence against women refers to acts of gender-based violence that are committed, assisted, or aggravated by the use of internet communication technologies. These technologies include mobile devices, the internet, social media platforms, and email. Such violence is targeted at women because of their gender and often affects them disproportionately. Examples include cyberstalking, distribution of sexual images without consent, gender-based hate speech, and online facilitation of sexual assault.
Technology plays a critical role in perpetuating and amplifying GBV. It allows perpetrators to reach their victims anytime and anywhere, creating a constant sense of threat and intrusion. The anonymity provided by the internet can embolden abusers, as they may feel less accountable for their actions. Furthermore, technology enables the formation of online communities where like-minded individuals can share harmful ideologies and tactics, creating an echo chamber that reinforces violent narratives.
Moreover, technology reproduces offline socio-cultural inequalities, further embedding and exacerbating the existing disparities that contribute to GBV. Online platforms can diffuse moral or legal responsibility among group members, allowing individuals to perpetuate gendered violence without individual accountability. This networked nature of online connectivity can significantly enhance the potential for harm, as it allows for the rapid spread and escalation of violent content and behavior. Understanding the influence of technology on gender-based violence is crucial for developing effective strategies to combat it.
While technologies provide us with numerous opportunities, they also introduce various types of threats, especially in the realm of gender-based violence. Common forms of Technology-Facilitated Gender-Based Violence (TFGBV) include harassment, networked harassment, image-based sexual abuse, public disclosure of private information, defamation, stalking, impersonation, threats, and hate speech. Each form has unique characteristics, but many behaviours overlap. For instance, an individual might harass someone by creating a nude image and posting it on a fake profile along with the victim’s contact information. This act combines image-based sexual abuse, disclosure of private information, impersonation, and harassment. Below, we review the most common forms of technology-facilitated gender-based violence.
Harassment includes unwanted digital communication, ranging from isolated racist or sexist insults to prolonged, organized attacks such as the Gamergate campaign, where sexist gamers targeted female developers and critics with discreditation, death threats, and gamified harassment. Such large-scale, coordinated attacks are referred to as "networked harassment."
Online harassment causes mental distress and fear, especially among women and girls who are frequently targeted. Women with intersecting marginalities, such as those with LGBTQ+ identity, disability, or minority ethnic backgrounds, face heightened rates of harassment.
Harassment can originate from known individuals or strangers. Abusive partners often use technology to harass during and after relationships. Meanwhile, unknown individuals may harass through methods like "wrong number" calls, social media messages, or comments, which frequently involve gendered and sexualized content.
The non-consensual sharing of private images by former partners, commonly referred to as “revenge porn,” receives extensive media coverage and is a focal point in discussions on image-based sexual abuse and its regulation. However, image-based sexual abuse encompasses a wide spectrum of harmful behaviours. The term includes not only the unauthorized creation and distribution of private sexual images but also threats related to their dissemination. There are various forms of image-based sexual abuse, including:
Non-consensual distribution of intimate images, commonly labelled as "revenge porn," occurs when someone's sexual images are shared with a broader audience without the individual's consent.
Voyeurism is defined as secretly taking photos or recording videos of another person for a sexual purpose.
Sexploitation, or sexual exploitation, refers to the commercial use and manipulation of sex or sexual content in the media.”
Sexual extortion, or "sextortion," occurs when an individual has, or claims to have, a sexual image of another person and uses it to coerce them into doing something they do not want to do.
In cases of documenting or broadcasting sexual assault, the images of the assault are recorded and sometimes disseminated, resulting in additional forms of sexual violence against the victim.
Synthetic media technology allows for the manipulation of images, making it appear as though people are engaging in sexual activity they never participated in.
Public disclosure of private information involves unauthorized sharing of personal details that can cause significant harm. While the focus often centers on private sexual material, other forms of personal information can also inflict damage if distributed online. Perpetrators of gender-based violence use tactics such as publishing private information to harass and damage their targets' reputations. In conservative or patriarchal communities sharing details like screenshots of private conversations or images depicting social situations can lead to severe repercussions for women. For LGBTQ+ individuals, outing their sexual orientation or birth sex online can expose them to discrimination and danger due to societal prejudices and legal restrictions in some countries. Thus, non-sexual disclosures can be as harmful, if not more so, than sexual ones.
One of the most perilous forms of revealing private information is referred to as doxing. Doxing entails the unauthorized publication of personal details such as legal names, addresses, phone numbers, contact information, driver's license details, workplace information, and private documents or correspondence.
Stalking and monitoring involve using technology to track and observe individuals without their consent. This can include actions such as monitoring social media activity, tracking location through GPS, or installing spyware on devices. Abusers often exploit proximity or technological access to monitor and control their victims using apps like Find My iPhone or stalkerware. Additionally, advanced technologies such as smart home devices and drones have been used to surveil and restrict women’s movements, severely impacting their safety and privacy. Stalking typically involves repeated unwanted surveillance or threatening behaviour that induces fear in the victim.
Impersonation involves creating false identities online to damage someone's reputation or endanger their safety. Abusers frequently use fake social media accounts and websites to disseminate false information about their victims. They may pretend to be the victim and send harmful messages to disrupt personal and professional relationships. This tactic disproportionately affects marginalized groups and can include a sexual component. In domestic scenarios, former partners have used fake profiles or advertisements to lure victims into hazardous situations, resulting in harassment and violence, including sexual exploitation and human trafficking.
Hate speech incites violence against individuals or groups based on identifiable characteristics like religion, gender, ethnicity, or disability. Women, especially those with intersecting identities, are often targeted: for instance, Muslim women face higher rates of online hate crimes than Muslim men. Social media platforms have been criticized for enabling white-supremacist, Islamophobic, anti-Semitic, anti-LGBTQ+, and misogynistic groups to propagate discriminatory beliefs, sometimes leading to real-world violence. Hate speech perpetuates systemic inequalities, discourages marginalized groups from online participation, and can escalate to physical violence offline.
In Bulgaria, gender-based violence (GBV) remains a significant issue, with troubling statistics highlighting its prevalence. Recent data from a 2021 national survey showed that:
11.9% of women aged 18-74 have experienced at least one act of physical or sexual violence during their adult life, regardless of the perpetrator.
20.5% have suffered intimate partner violence, which includes psychological, sexual, and physical abuse. The highest-risk group is young women aged 18-29, where 36.3% have been abused by a partner.
9.5% of women reported experiencing physical or sexual violence from household members.
12.2% of women have faced sexual harassment in the workplace.
An estimated 70 to 80% of cases of violence against women still go unreported. Yearly, between 20-30 women die in domestic or intimate partner violence incidents.
Bulgaria has a specific law against domestic violence, known as the Protection Against Domestic Violence Act (PADVA), first enacted in 2005. Criminal offenses like physical assault, threats, and stalking are also addressed through the Criminal Code, but the Protection Act provides a more immediate and specific legal framework for victims. A 2024 amendment to the Law on Protection Against Domestic Violence established a National Council for Prevention and Protection Against Domestic Violence, a permanent body that includes representatives from government, judiciary, and non-profit organizations involved in domestic violence prevention. Bulgaria has not ratified the Istanbul Convention, which aims to combat violence against women and domestic violence, due to widespread opposition and concerns about its definition of gender.
Currently, technology-facilitated gender-based violence (TFGBV) in Bulgaria is under-researched, and there are no comprehensive national statistics specifically dedicated to TFGBV.
There is no official statistical data nor research on technology-facilitated gender-based violence in Lithuania. However, gender-based violence, particularly domestic violence against women, is a pervasive issue in the country. In 2023, there were 4,019 recorded cases of women over the age of 18 who suffered domestic crimes in Lithuania. Most of the cases involved non-severe health impairments and threats. Yet, 16 women over the age of 18 were murdered through acts of domestic violence. Despite the enforcement of the Law on Protection against Domestic Violence for over a decade, domestic violence remains prevalent, with opinion polls indicating that one in five adults in Lithuania has experienced it. The 2022 update to this law aims to provide more immediate and effective response and support for victims while emphasizing prevention. Additionally, while Lithuania signed the Istanbul Convention on June 7, 2013, it has yet to be ratified by the Lithuanian Parliament (Seimas). This delay highlights ongoing challenges in addressing and preventing gender-based violence, including technology-facilitated violence, on national legislative level.
Italy is grappling with Technology-Facilitated Gender-Based Violence (TFGBV), a growing issue with over 17,000 reports of violence against women in 2022. The country has implemented laws to combat domestic violence, such as Law No. 154/2001 on Measures Against Violence in Family Relations and the "Codice Rosso" Law No. 69/2019, but enforcement and cultural attitudes often hinder progress.
TFGBV is addressed through Law No. 38/2009 and the "Codice Rosso" Law, particularly when it comes to stalking and revenge porn. Non-governmental organizations like Telefono Rosa and D.i.Re are providing resources and advocacy for victims.
The Istanbul Convention, ratified in 2013, emphasizes comprehensive measures to prevent violence, protect victims, and prosecute offenders. However, challenges persist in implementing these measures and ensuring they extend to the digital realm. Cultural shifts and continuous education are crucial for creating a safer environment for women both online and offline.
Technology-facilitated gender-based violence (TFGBV) exacts a severe toll on victims, inflicting relentless and pervasive harm through digital means that offer no escape. This form of abuse leverages the pervasive reach of technology to harass, intimidate, and control victims around the clock, often extending the impact of violence far beyond physical spaces and into every aspect of their daily lives. This violence leaves victims accessible via social media, text, or digital devices, perpetuating fear, exhaustion, and severe mental health impacts such as PTSD and suicidal thoughts.
Severe forms of online harassment, such as threats, stalking, and sexual harassment, have profound effects on victims' offline relationships and mental health. Young women and girls worldwide frequently report experiencing emotional distress, anxiety, and depression due to TFGBV. Specific acts of TFGBV, like the non-consensual sharing of images, can cause psychological distress similar to that of sexual assault, leading to trust issues, anxiety, depression, PTSD, and suicidal thoughts.
The psychological toll of online harassment disrupts women's daily lives, affecting their ability to concentrate on tasks like school and work. Additionally, victims often conform to patriarchal norms to avoid further violence, highlighting the deep psychological and emotional impacts of TFGBV.
Beyond the immediate physical and psychological toll, technology-facilitated gender-based violence (TFGBV) encompasses a spectrum of impacts that extend into various facets of victims' lives. These repercussions, often overlooked, underscore the multifaceted nature of TFGBV and its profound influence on individuals and communities. From privacy violations and safety concerns to the silencing of voices and economic hardships, TFGBV manifests in ways that disrupt personal autonomy, social well-being, and economic stability.
Privacy violations are a significant facet of TFGBV, disproportionately impacting marginalized groups such as women, LGBTQ+ individuals, indigenous, and people of colour. These communities face heightened risks, including the non-consensual distribution of intimate images and the unauthorized outing of LGBTQ+ identities. The fear of personal information being exposed limits women's digital expression and content sharing. Once private information is online, it becomes difficult to retract, potentially subjecting individuals to ongoing harassment. Privacy intrusions also curtail autonomy and freedom of movement, particularly for women who are targets of online stalking. The release of private sexual images can undermine personal integrity and autonomy, leading to feelings of surveillance, compromising safety, limiting freedom of expression, and disrupting the formation of personal identity.
Technology-based violence against women significantly impacts their offline safety, creating a pervasive sense of fear and vulnerability. Online harassment often extends beyond the digital realm, leading to real-world threats and stalking, which can disrupt daily activities and routines. Women targeted online may face threats of physical harm, causing them to take extra precautions, such as changing their routes to work, altering their daily schedules, or even relocating. Fear of offline repercussions from online abuse can severely limit women's freedom of movement and overall sense of security, affecting their mental well-being and ability to engage in everyday life.
TFGBV severely impacts women's online voices, causing many to censor their speech or step back from digital spaces and leadership positions out of fear of harassment or violence. This silencing reinforces patriarchal norms, discourages civic participation and advocacy, and limits content creation on women's issues. TFGBV also deters female contributions on platforms like Wikipedia, with hostility from male editors hindering inclusion. Other research indicates that many women who experience harassment tend to censor themselves and change their online behaviour, which impacts their use of social media and efforts in advocacy. The pervasive nature of TFGBV among women leads to digital exclusion and obstructs progress towards gender equality and leadership roles.
Reputational harm inflicted through technology-facilitated gender-based violence (TFGBV) takes various forms of discrediting and defaming women, especially journalists, politicians, and other public figures. These tactics include creating fake social media profiles, manipulating images into sexual montages, posting intimate photos on pornographic sites, and spreading offensive or false comments across online platforms. The case of Colombian journalist Camila Zuluaga illustrates the severity of such attacks, whereby she was falsely accused of corruption through coordinated online campaigns. This led to mass defamation using hashtags and automated attacks designed to discredit her without evidence, highlighting TFGBV's damaging impact on women's reputations and credibility in digital spaces.
Economic consequences of TFGBV can be both direct and indirect, significantly affecting victims' financial well-being. Some perpetrators deliberately seek to inflict financial harm by jeopardizing their victims' employment or making them unemployable. Others face economic repercussions due to damaged reputations resulting in fewer job opportunities, and increased stress leading to reduced work productivity. Unauthorised sharing of intimate images has resulted in victims losing their jobs or being expelled from school. Coping with TFGBV also involves emotional labour and financial expenses for mental health care, legal fees, or replacing compromised technology. Women might miss out on job opportunities by minimizing their online activity to avoid harassment.
Technology-facilitated gender-based violence against women can lead to a range of mental health issues with different severity.
One of the most common outcomes of technology-facilitated violence is anxiety which can stem from reoccurring fear of being harassed, stalked, or having private information exposed. Anxiety can lead to hypervigilance, sleep disturbances, and panic attacks. Victims may become overly cautious and develop a persistent sense of dread, impacting their ability to engage in everyday activities and maintain relationships.
Depression is another significant mental health issue that can arise from technology-facilitated violence. The persistent harassment and violation of privacy can lead to feelings of helplessness, worthlessness, and despair. Victims might withdraw from social interactions and experience a loss of interest in activities they once enjoyed. The emotional toll can be exacerbated by the stigma and shame often associated with such violence, leading to isolation and a deterioration in overall well-being. In severe cases, this depression can result in suicidal thoughts or behaviours.
Post-traumatic stress disorder (PTSD) is also a potential consequence. The intrusive nature of technology-facilitated violence can be deeply traumatizing, leaving victims with long-lasting psychological scars. Symptoms of PTSD may include flashbacks, nightmares, severe anxiety, and uncontrollable thoughts about the event. The chronic stress and fear associated with PTSD can significantly impact daily functioning and quality of life, making it crucial for victims to seek professional mental health support.
Managing mental health issues stemming from technology-facilitated violence against women requires a comprehensive and sensitive approach, starting with acknowledging the trauma and its impact. Victims should seek professional support from therapists, as therapy offers a safe space to process experiences and build coping mechanisms. Legal advice and support from organizations dedicated to protecting women's rights online can also be crucial in navigating the legal avenues for recourse and protection.
Engaging in offline activities and nurturing real-world connections can offer respite and reinforce a sense of safety, while building a supportive community is essential for recovery and mental health. Friends, family, and support groups, both online and offline, provide crucial emotional support, validation, and solidarity.
Resilience is the capacity to adapt, recover, and thrive when facing adversity, stress, or trauma. It goes beyond merely bouncing back from challenges; it involves growing and improving despite difficulties. Key elements of resilience include:
1
Emotional Regulation
Managing intense emotions healthily involves recognizing, understanding, and using coping strategies effectively. Practicing mindfulness and relaxation techniques like deep breathing, meditation, or yoga can improve emotional regulation by helping you stay calm and cantered.
2
Optimism and Positive Thinking
This involves not ignoring problems but concentrating on solutions and trusting in your ability to overcome obstacles. Cultivate optimism by viewing challenges as opportunities for growth.
3
Support Systems
Having strong, supportive relationships with friends, family, and community members. These connections provide emotional support, practical help, and a sense of belonging. Don’t hesitate to reach out to others for support and be willing to support them in return.
4
Problem-Solving Skills
The ability to think critically and creatively to find solutions to problems. Enhance your problem-solving skills by approaching challenges by breaking them down into manageable parts, brainstorming potential solutions, and taking decisive action.
5
Self-Efficacy
Confidence in one's abilities and competence to handle situations and achieve goals. This belief in oneself is crucial for taking on challenges and persisting despite setbacks. Build confidence in your abilities by setting and achieving small, manageable goals. Each success, no matter how small, can increase your belief in your ability to handle future challenges. Reflect on past successes and how you overcame difficulties to remind yourself of your resilience.
Resilience is not a fixed trait but a dynamic process that can be developed and strengthened over time. Individuals can build resilience through self-reflection, learning new coping strategies, seeking social support, and maintaining physical and mental health. A few more strategies to boost your emotional resilience include:
1
Maintaining Physical Health
Take care of your body by getting regular exercise, eating a balanced diet, and ensuring you get enough sleep. Physical well-being significantly impacts mental health and can improve your ability to handle stress.
2
Practicing Self-Care
Engage in activities that bring you joy and relaxation. This could be hobbies, spending time in nature, or any activity that helps you unwind and recharge. Self-care is essential for maintaining your overall well-being and resilience.
3
Seeking Professional Help if Needed
Sometimes, building resilience requires professional support. Therapists or counsellors can provide valuable tools and strategies to help you cope with stress and build resilience. Don’t hesitate to seek professional help if you’re struggling to manage on your own.
Resilience is about finding the strength to reclaim one’s life and sense of security, utilizing available resources, and transforming a traumatic experience into an opportunity for personal growth and empowerment.
Women affected by technology-facilitated violence can receive support and protection from a variety of professionals and organizations, including:
1
Law Enforcement Officers can help adult women navigate the legal system, file reports of online harassment or abuse, and obtain protective orders or restraining orders against perpetrators.
2
Legal aid organizations can provide legal advice, representation, and advocacy for women seeking protection from technology-facilitated violence.
3
Mental health professionals can offer emotional support, counselling, and trauma-informed care.
4
Social Workers can provide holistic support and assistance, connecting them with community resources, and providing ongoing case management.
5
Victim Advocates and victim services organizations can provide information, resources, and support, including assistance with safety planning, accessing support services, and understanding their rights.
6
Employer Human Resources Departments: In cases where technology-facilitated violence occurs in the context of employment, human resources departments can provide support, accommodations, and workplace safety measures for affected adult women.
These professionals and organizations play essential roles in supporting and protecting adult women against technology-facilitated violence, and it's important for women to know that help and resources are available to them.
Identifying and avoiding harmful situations online can be empowering for adult women. Here are some strategies to use:
1
Recognize Warning Signs: Be aware of common tactics used in online abuse, such as harassment, threats, coercion, and manipulation. Pay attention to any red flags or gut feelings that something is wrong.
2
Trust Your Instincts: Trust your instincts and intuition when interacting with others online. If something feels uncomfortable or suspicious, it's okay to disengage or seek support.
3
Guard Personal Information: Be cautious about sharing personal information, such as your full name, address, phone number, or financial details, online. Limit the amount of personal information you share on social media and other platforms.
4
Verify Identities: Verify the identities of people you interact with online, especially if you're considering meeting them in person or sharing personal information. Look for consistent information across different platforms and conduct online searches if necessary.
5
Set Privacy Settings: Take advantage of privacy settings on social media and other online platforms to control who can see your posts, photos, and personal information. Review and adjust your privacy settings regularly.
6
Use Secure Communication Channels: Use secure communication channels, such as encrypted messaging apps or email services, when sharing sensitive information or having private conversations online.
7
Be Mindful of Online Behaviour: Pay attention to the behaviour of others online, including any signs of aggression, manipulation, or boundary-crossing. Trustworthy individuals will respect your boundaries and treat you with respect.
8
Seek Support: Don't hesitate to seek support from trusted friends, family members, or professionals if you encounter harmful situations online. They can offer guidance, validation, and assistance in navigating challenging situations.
9
Report and Block: Familiarize yourself with the reporting and blocking features available on online platforms. If you experience harassment, abuse, or other harmful behaviour, report it to the platform's moderators and consider blocking the individual involved
10
Educate Yourself: Stay informed about online safety best practices and resources available for dealing with tech-based violence. Take advantage of educational materials, workshops, and online resources to enhance your digital literacy and empowerment online.
By being proactive, vigilant, and informed, adult women can reduce their risk of encountering harmful situations online and protect their safety and well-being in digital spaces.
Recognizing warning signs of potential online abuse is crucial for staying safe online. Some common warning signs include:
1
Excessive Control: The person may try to control your online activities, such as monitoring your social media accounts, demanding access to your passwords, or insisting on knowing your whereabouts at all times.
2
Isolation: The person may try to isolate you from your friends, family, or support network by discouraging or preventing you from interacting with them online, or by spreading rumors or lies about them.
3
Manipulation: The person may use manipulation tactics to gain your trust, such as love bombing (excessive flattery and attention), gaslighting (denying or minimizing abusive behavior), or guilt-tripping.
4
Intimidation: The person may use threats, coercion, or intimidation to control your behavior or silence you, such as threatening to share private or embarrassing information about you online.
5
1Jealousy and Possessiveness: The person may display excessive jealousy or possessiveness, becoming angry or suspicious if you interact with others online or have online friendships or connections.
6
Unwanted Contact: The person may repeatedly contact you online, even after you've asked them to stop, or use multiple accounts or platforms to continue contacting you if you've blocked them.
7
Cyberstalking: The person may engage in cyberstalking behaviours, such as monitoring your online activity, tracking your location through social media posts, or sending harassing or threatening messages.
8
Pressure for Sexual Content: The person may pressure you to send sexual images or engage in sexual conversations online, or use sextortion tactics to coerce you into sending explicit material.
9
Financial Exploitation: The person may try to exploit you financially, such as by asking for money or financial assistance, or by pressuring you to share your financial information or make purchases on their behalf.
10
Signs of Aggression or Violence: The person may display signs of aggression, anger, or violence in their online communications, including using aggressive language, making threats, or expressing violent fantasies.
If you notice any of these warning signs in your online interactions, it's important to take them seriously and seek support from trusted friends, family members, or professionals. Trust your instincts and prioritize your safety and well-being above all else.
For adult women who have experienced tech-based violence, a digital detox can offer several significant benefits. Firstly, it provides a much-needed break from the digital world, allowing them to reclaim a sense of control and autonomy over their online experiences. By disconnecting from digital devices and platforms, women can create a safe space to process their experiences, reduce feelings of anxiety or trauma triggers associated with online interactions, and prioritize their mental and emotional well-being. Additionally, a digital detox can foster a greater sense of empowerment and self-care, empowering women to set boundaries, assert their rights, and re-establish a healthier relationship with technology.
A digital detox refers to a period of time during which a person refrains from using digital devices and technology, such as smartphones, computers, and social media platforms, in order to reduce stress, increase mindfulness, and promote overall well-being. It typically involves unplugging from digital screens and activities, and instead focusing on offline activities, such as spending time outdoors, reading books, practicing mindfulness, or engaging in face-to-face interactions with others. Digital detoxes are often undertaken as a conscious effort to break away from constant connectivity and screen time, allowing individuals to recharge and reconnect with themselves and the world around them.
Doing a digital detox involves intentionally reducing or eliminating your use of digital devices and technology for a certain period of time. Here are some steps you can take to do a digital detox effectively:
Set Clear Goals: Determine why you want to do a digital detox and what you hope to achieve from it. Whether it's reducing screen time, improving sleep quality, or increasing mindfulness, having clear goals will help you stay motivated.
Plan Alternative Activities: Fill your time with alternative activities that don't involve digital devices. This could include reading books, spending time outdoors, practicing mindfulness or meditation, exercising, cooking, or engaging in hobbies.
Establish Boundaries: Decide on the duration and extent of your digital detox. You may choose to completely disconnect for a certain period, such as a day, weekend, or week, or you may prefer to limit your digital usage to specific times of the day.
Create a Supportive Environment: Remove digital temptations from your environment by turning off notifications, setting up "do not disturb" modes, or even temporarily deleting apps from your devices.
Notify Others: Let your friends, family, and colleagues know that you'll be offline during your digital detox period. This will manage expectations and prevent any concerns about your sudden lack of responsiveness.
Practice Mindfulness: Be present and mindful during your digital detox. Pay attention to your thoughts, feelings, and surroundings, and embrace the opportunity to fully engage with offline activities and experiences.
Identify Triggers: Identify the digital devices, apps, and activities that you want to avoid during your detox. This may include social media, email, streaming services, gaming, or internet browsing.
Reflect and Evaluate: Take time to reflect on your digital detox experience and evaluate how it has impacted your well-being. Consider what habits you want to maintain or change moving forward.
Remember that a digital detox is a personal journey, and it's important to find what works best for you. It's okay to start small and gradually increase the duration or intensity of your detox over time. The key is to prioritize self-care and create a healthier balance between digital technology and real-life experiences.
Essential Aspects of a Digital Detox:
1
Flexibility: Be forgiving with yourself; progress is more important than perfection.
2
Social Support: Surround yourself with supportive friends and family to stay motivated.
3
Gradual Transition: Start small by setting specific offline times or reducing device usage.
4
Self-Care: Use the extra time for activities that promote your well-being, like exercise or hobbies.
5
Reflection: Assess how technology affects your life and make intentional choices about usage.
6
Long-Term Habits: Integrate healthier digital habits, set boundaries, and practice mindfulness.
7
Professional Support: Seek help from a mental health professional if digital use negatively impacts your well-being.
Mindfulness is a practice that involves focusing on the present moment with openness, curiosity, and non-judgment. It involves being fully aware of thoughts, feelings, and surroundings without trying to change or interpret them. Mindfulness is not about emptying the mind of thoughts or achieving calmness, but about observing experiences, accepting them without resistance, and cultivating deeper awareness of oneself and the world.
1
Body Scan: Slowly move your attention through different parts of your body, starting from your toes and moving up to your head. Notice any sensations, tension, or areas of relaxation.
2
Five Senses Exercise: Take a moment to notice five things you can see, four things you can feel, three things you can hear, two things you can smell, and one thing you can taste.
3
Mindful Breathing: Focus on your breath as it goes in and out. Notice the sensations of breathing without trying to change your breathing pattern. This can be done for just a few minutes at a time.
4
Mindful Eating: Pay full attention to the experience of eating. Notice the colors, textures, smells, and flavors of your food. Eat slowly and savor each bite.
5
Mindful Listening: When listening to someone speak, give them your full attention. Notice the tone of their voice, the words they use, and their body language without planning your response.
6
Mindful Stretching: Incorporate gentle stretches into your routine, paying attention to the sensations in your muscles and joints as you move.
7
Mindful Journaling: Spend a few minutes writing about your thoughts and feelings. Focus on the act of writing and the emotions you are experiencing without judging or analysing them.
8
Mindful Observation: Choose an object in your environment and observe it carefully for a few minutes. Notice its shape, colour, texture, and any other details.
9
Walking Meditation: As you walk, focus on the sensation of your feet touching the ground, the movement of your legs, and the rhythm of your breath. Walk slowly and deliberately.
10
Gratitude Practice: At the end of the day, take a few moments to reflect on three things you are grateful for. Focus on the feelings of gratitude and appreciation as you think about each one.
Incorporating these simple mindfulness practices into your daily routine can help enhance your awareness, reduce stress, and improve overall well-being.
1
Flexibility: Be forgiving with yourself; progress is more important than perfection.
2
Social Support: Surround yourself with supportive friends and family to stay motivated.
3
Gradual Transition: Start small by setting specific offline times or reducing device usage.
4
Self-Care: Use the extra time for activities that promote your well-being, like exercise or hobbies.
5
Reflection: Assess how technology affects your life and make intentional choices about usage.
6
Long-Term Habits: Integrate healthier digital habits, set boundaries, and practice mindfulness.
7
Professional Support: Seek help from a mental health professional if digital use negatively impacts your well-being.
Here are some specific ideas for practicing mindfulness while being online:
1
Intentional Social Media Use: Before logging into social media, set a clear intention, like connecting with friends or finding inspiration. As you scroll, pay attention to how each post makes you feel and take breaks to check in with your emotions.
2
Mindful Email Management: When checking emails, take a moment to breathe deeply before opening your inbox. Read each email fully before responding, focusing on one email at a time without multitasking.
3
Focused Browsing: Choose a specific time for browsing the web and stick to it. Avoid aimless surfing by setting a clear purpose for your online activity. Notice your thoughts and feelings as you navigate different sites.
4
Mindful Typing: While typing, whether it’s a document or a chat message, pay attention to the tactile sensations of your fingers hitting the keys and the sound they make. This helps keep you present in the moment.
5
Mindful Online Meetings: Before starting a video call, take a few deep breaths. During the meeting, stay present by actively listening to the speaker and resisting the urge to multitask. Focus on the conversation and your responses.
6
Digital Journaling: Use an online journaling tool to write about your thoughts and feelings. Focus on the process of writing itself, paying attention to your typing rhythm and the words forming on the screen.
7
Mindful Breaks: Set reminders to take regular breaks from the screen. During these breaks, practice a few minutes of mindful breathing or stretching. Apps like MindBell can help remind you to pause.
Incorporating these mindfulness practices into your online activities can help you maintain a balanced and focused digital presence.
Stress management involves using a variety of techniques and strategies to control and reduce stress levels. The goal is to improve overall well-being, increase productivity, and enhance quality of life. Effective stress management can help individuals cope with daily pressures and prevent the negative physical and mental health effects of chronic stress.
Key components of stress management include:
1
Identifying Stressors: Recognizing the sources of stress, whether they are external (like work, relationships, or financial issues) or internal (such as negative self-talk or unrealistic expectations).
2
Developing Healthy Coping Mechanisms: Using techniques like mindfulness, meditation, deep breathing exercises, and progressive muscle relaxation to manage stress responses.
3
Time Management: Prioritizing tasks, setting realistic goals, and breaking larger tasks into manageable steps to prevent feeling overwhelmed.
4
Physical Activity: Engaging in regular exercise, which can reduce stress hormones and trigger the release of endorphins, the body's natural mood enhancers.
5
Healthy Lifestyle Choices: Maintaining a balanced diet, getting adequate sleep, and avoiding excessive caffeine, alcohol, and nicotine, which can exacerbate stress.
6
Social Support: Building and maintaining a strong support network of friends, family, and colleagues to provide emotional support and practical assistance.
7
Relaxation Techniques: Practicing yoga, tai chi, or other relaxation activities that combine physical movement with mental focus to reduce stress.
8
Hobbies and Leisure Activities: Engaging in activities that bring joy and relaxation, which can provide a healthy distraction from stressors.
9
Positive Thinking and Resilience Building: Cultivating a positive outlook and developing resilience by focusing on strengths and past successes in overcoming challenges.
10
Professional Help: Seeking support from therapists or counsellors when stress becomes unmanageable or leads to significant anxiety or depression.
Effective stress management is an ongoing process that involves regularly assessing stress levels and adjusting strategies to maintain balance and well-being.
Managing stress while online is crucial, given the amount of time many of us spend connected to digital devices. Here are several strategies to help reduce and manage stress in an online environment:
1
Set Boundaries: Establish clear boundaries for online time. Schedule specific periods for work, social media, and leisure activities, and stick to them to prevent digital overload.
2
Take Regular Breaks: Implement the Pomodoro Technique or similar methods to ensure you take regular breaks. For example, work for 25 minutes and then take a 5-minute break away from the screen.
3
Limit Notifications: Turn off non-essential notifications to reduce distractions and interruptions. Check emails and social media at designated times instead of responding to every alert.
4
Ergonomic Setup: Ensure your workspace is ergonomically sound to avoid physical strain. A comfortable chair, appropriate screen height, and good lighting can reduce physical stress.
5
Manage Information Intake: Be selective about the information you consume. Too much negative news or overwhelming information can increase stress. Curate your news sources and limit exposure to distressing content.
6
Practice Deep Breathing: When you feel overwhelmed, take a few moments to practice deep breathing exercises. Inhale deeply for a count of four, hold for four, and exhale for four. This can help reduce immediate stress.
7
Stay Organized: Use digital tools like calendars, to-do lists, and project management apps to stay organized. A clear plan can reduce the stress of juggling multiple tasks and deadlines.
8
Seek Support: If online interactions are causing stress, talk to friends, family, or a therapist about your feelings. Online support groups and forums can also provide a sense of community and shared experience.
By implementing these strategies, you can create a healthier and less stressful online environment, improving both your digital experience and overall well-being.
5-Finger Meditation
5-Finger Meditation is a simple and effective technique that combines breathing with focusing on touch to promote relaxation and mindfulness. To practice, sit comfortably and extend one hand in front of you. With the index finger of your other hand, start tracing the outline of your extended hand. As you trace up each finger, inhale deeply, and as you trace down each finger, exhale slowly. Continue this pattern, focusing on the sensation of your finger moving along the edges of your hand and synchronizing your breath with the tracing motion. This method helps by grounding your awareness in the present moment, engaging both the senses and breath, which calms the mind, reduces stress, and activates the parasympathetic nervous system, promoting a state of relaxation.
Visualization
Close your eyes and imagine a peaceful scene, like a beach or a forest. Engage all your senses to make the scene as vivid as possible. Visualization can create a mental escape from stress and induce a state of relaxation.
Deep Breathing
Begin by sitting or lying down in a comfortable position. Inhale deeply through your nose for a count of four, hold your breath for a count of four, then exhale slowly through your mouth for a count of four. Repeat this process several times, focusing on the rhythm of your breath and the sensation of air moving in and out of your body. This technique is beneficial because it activates the parasympathetic nervous system, which helps to calm both the body and mind, reducing stress and promoting relaxation.
Progressive Muscle Relaxation (PMR)
PMR involves systematically tensing and relaxing different muscle groups in your body. Start at your toes and gradually work your way up to your head. For each muscle group, tense the muscles for a few seconds, then release and allow them to relax completely. This practice can effectively reduce physical tension and promote a sense of overall relaxation, helping you to feel more at ease and less stressed.
Tension & Trauma Releasing Exercises (TRE)
TRE are a set of simple exercises designed to induce neurogenic tremors in the body, which help release deep-seated tension and stress. Developed by Dr. David Berceli, TRE aims to restore the body's natural balance and promote relaxation and recovery from trauma. TRE involves a series of exercises designed to release deep tension and stress through neurogenic tremors. Here’s a brief guide:
Prepare Your Space: Find a quiet, comfortable space where you can lie down.
Warm-Up Exercises: Perform gentle stretches, such as toe touches, lunges, and squats, to fatigue your leg muscles.
Lie Down: Lie on your back with your knees bent and feet flat on the floor.
Begin Tremoring: Allow your knees to fall open gently to the sides, initiating the tremors. You might start to feel a shaking or vibration in your legs.
Observe and Relax: Let the tremors move through your body without trying to control them. Relax and observe the sensations.
Gradual Ending: After 10-15 minutes, gradually slow down the tremors by bringing your knees together. Lie still for a few minutes to integrate the experience.
End the Session: Slowly get up and take a few moments to reflect on how you feel.
Neurographic art
Neurographica is a therapeutic method and artistic technique that combines elements of psychology, neuroscience, and art. Developed by Russian psychologist Pavel Piskarev in the early 21st century, Neurographica aims to help individuals overcome psychological barriers, manage stress, and tap into their creative potential through drawing.
The practice involves creating abstract drawings using simple shapes, lines, and patterns, guided by specific principles and techniques. These drawings are believed to activate neural pathways in the brain, facilitating emotional release, problem-solving, and personal transformation. Neurographica practitioners often use the method to explore and express emotions, visualize goals, and promote self-discovery and healing.
Here’s a step-by-step guide to get you started:
Materials Needed:
Blank paper (any size)
Black marker or pen
Coloured markers, pencils, or crayons
Steps to Practice Neurographica:
1. Create a Comfortable Environment:
Find a quiet and comfortable place where you won’t be disturbed.
Prepare your materials and make sure you have enough space to draw freely.
2. Set an Intention:
Take a moment to relax and breathe deeply.
Think about the issue, feeling, or situation you want to work on. It can be anything from stress, a personal goal, or a creative block.
3. Start with the Initial Drawing:
Using the black marker, draw a series of random, curving lines that cross over each other on the paper. These lines represent the initial neural pathways.
Let your hand move freely without overthinking the process.
4. Identify Nodes and Crossings:
Where the lines intersect, draw small circles or nodes. These intersections symbolize points of connection in your brain.
5. Round the Corners:
Go over the intersections and round the corners where the lines meet. This softening process is crucial as it represents the harmonizing of neural connections.
Take your time with this step, ensuring each intersection is smoothly rounded
6. Add Additional Lines:
Add more curving lines to the drawing, connecting different parts of your initial drawing.
Ensure these lines flow naturally and intersect with the existing lines, creating new nodes and intersections.
7. Enhance with Colours:
Choose colours intuitively and start filling in different sections of the drawing. Use colours that resonate with your feelings or intentions.
Pay attention to how the colours make you feel and allow the process to be meditative.
Reflect and Observe:
Once you feel your drawing is complete, take a step back and observe it.
Reflect on the process and any emotions or thoughts that arose while drawing.
Consider journaling about your experience to deepen your understanding.
Closure:
End the session with a few deep breaths.
Thank yourself for taking the time to engage in this self-reflective process.
Tips for Practicing Neurographica:
Stay Present: Focus on the act of drawing and stay in the moment.
Be Patient: Allow the process to unfold naturally without rushing.
Practice Regularly: The more you practice, the more you'll benefit from the process.
Personalize the Practice: Feel free to adapt the steps to what feels right for you.
The Thought Sunglasses
The Thought Sunglasses exercise is a way to notice and change how you view difficult situations. Find yourself a pair of big, silly sunglasses. Put the sunglasses on when you are struggling with letting go of a negative thought and observe how everything around you seems influenced by that thought. Then, remove the sunglasses and imagine viewing the world without that thought affecting your perception. Even though the sunglasses remain in sight, notice how it feels to see them and recognize that you don't have to accept the thought as true. Pay attention to how your body feels when you wear the sunglasses (believing the thought) versus when you take them off (letting go of the thought).
Your toes don’t mind exercise
Remember how you used to wiggle your toes as a kid? Try wiggling one foot, then the other. Do you notice any differences between them? Feel the stretchiness between your toes and the sensation of your socks or the carpet against your skin. Can you feel your foot moving against the floor or inside your shoes when you wiggle your toes? Our toes are usually just toes, doing their thing no matter our mood!
Next time you feel upset, imagine sending your attention down into your feet, all the way to your toes. Wiggle them and notice how they feel—usually, they're not upset at all. Taking this little break can help you feel better and calmer. When you return your focus to what you were doing before, you might find that your mood has improved. This simple exercise can be really helpful whenever you're feeling upset.
Explore the Here & Now Questions
Using questions to notice our current experience is a powerful mindfulness practice. By asking ourselves questions like "What am I feeling right now?" or "What thoughts are running through my mind?" we can bring awareness to our present moment without judgment. This can help us observe our emotions, thoughts, and physical sensations in a curious and non-reactive way.
A list of questions to help you explore the here and now:
What emotions do I feel right now?
What physical sensations am I aware of?
What thoughts are passing through my mind?
Can I fully accept and stay present in this moment?
How does my current emotion affect my body?
Do I notice any tension or discomfort in my body?
Am I reacting or responding to this situation?
Am I engaged in this moment or lost in thought?
Can I notice my breath right now?
How does my state of mind affect my perspective?
Am I making judgments about my experience?
Can I focus fully on the task at hand?
Am I actively listening to the person speaking to me?
Can I observe my thoughts without getting caught up in them?
How am I treating myself mentally right now?
Can I recognize the emotions behind my thoughts?
How does my body feel when I take a deep breath?
Can I allow my thoughts to come and go without holding onto them?
Am I being kind to myself right now?
Am I appreciating the present moment?
Reflection
Consider the following list of reflection questions. If you’d like you can write down your answers. These questions can serve as a starting point for deeper conversations with a therapist or counsellor. It's important to approach these inquiries with curiosity, compassion, and openness to uncovering new insights and possibilities for personal growth.
General Wellbeing Reflection questions:
How would you describe your overall sense of wellbeing at the moment?
Can you identify any patterns or triggers associated with your fears?
What activities or practices help you maintain or improve your wellbeing?
In what areas of your life do you feel limited or constrained?
How do your fears impact your daily life and decision-making?
Are there any internal beliefs or narratives that reinforce your sense of limitation?
Are there any areas of your life where you feel particularly fulfilled or satisfied?
What aspects of your life contribute to your sense of wellbeing?
How do your fears and constraints intersect with your overall sense of wellbeing?
What fears or anxieties do you currently struggle with?
The issue of technology-facilitated gender-based violence in the European Union (EU) represents a critical area of concern within the broader context of digital rights and gender equality. As the EU grapples with this increasing threat, a multifaceted approach that includes legal, educational, and technological strategies is being deployed to ensure a safer online environment for women.
Research and data collection within the EU indicate a troubling prevalence of technology-facilitated gender-based violence. The European Institute for Gender Equality (EIGE) regularly publishes data that highlight the widespread nature of this issue. For example, EIGE's reports show that cyber harassment affects a substantial proportion of women in Europe, with many experiencing threats, harassment, and privacy invasions online. These statistics not only underscore the pervasiveness of the problem but also help in shaping targeted interventions (European Institute for Gender Equality).
On the technological front, several EU-based initiatives are leveraging technology to prevent and combat technology-facilitated gender-based violence. Applications and platforms are being developed to provide women with tools to report incidents, block harassers, and access support services quickly. For example, initiatives like the INHOPE network of internet hotlines enable the reporting and removal of illegal content, including content related to cyber harassment and sexual abuse online. Additionally, community engagement programs are crucial in fostering an environment where cyber violence is actively condemned and counteracted. These programs often involve collaborations between non-governmental organizations (NGOs), tech companies, law enforcement agencies, and community leaders to create a unified front against cyber violence.
Globally, the legal protection against cyber harassment varies significantly. Only about 30% of economies worldwide have enacted specific laws to combat cyber harassment. This includes more comprehensive legislation in high-income countries, whereas regions like the Middle East and Africa lag behind with only 20-25% of economies having such laws (World Bank Blogs). Furthermore, special legal provisions for cyber-sexual harassment are rare, with significant gaps in countries across South Asia and the Pacific.
In response to the growing threats of technology-facilitated violence, particularly against women, the European Union has implemented a robust set of strategies, laws, and initiatives to secure digital devices and safeguard individuals within its digital environment. Central to these efforts is the European Union Agency for Cybersecurity (ENISA), which plays a pivotal role in enhancing the EU’s cybersecurity capabilities. Each year, ENISA publishes a comprehensive Threat Landscape report that assesses the state of cyber threats, including those related to harassment and digital violence against women, offering detailed analyses and mitigation strategies to address these issues. This report is instrumental in shaping the EU’s cybersecurity policies and practices by providing up-to-date information on emerging threats and recommended security measures (ENISA).
The EU advocates for secure software development practices which require that software developers integrate security at every stage of the development process. This practice, known as 'security by design', ensures that devices are protected from cyber threats right from the initial design phase.
Encryption is a vital technology for protecting data stored on or transmitted by digital devices. The EU promotes the use of robust encryption protocols to safeguard communications and personal data from interceptors, thereby preventing potential cyber harassment.
To further secure devices against unauthorized access, the EU supports the widespread implementation of Multi-factor Authentication (MFA). This adds a critical layer of security, making it significantly harder for attackers to gain unauthorized access to devices and accounts.
The EU has also enacted significant legislative measures such as the Cyber Resilience Act (CRA), which establishes stringent cybersecurity requirements for all digital products within the market. This legislation is crucial for preventing devices from becoming tools for cyber harassment or avenues for digital violence. The CRA emphasizes the importance of incident reporting and the disclosure of vulnerabilities, ensuring that products remain secure throughout their lifecycle and that any potential risks are managed proactively.
Training and capacity building are also key components of the EU's strategy. Initiatives like the European Cybersecurity Skills Framework (ECSF) and various ENISA-sponsored training programs aim to enhance the skills of cybersecurity professionals. These efforts ensure that the EU has a well-prepared workforce capable of responding effectively to cyber incidents, including those that may involve harassment or violence. The strengthening of these skills is essential for maintaining a high level of cybersecurity across the EU (ENISA).
Furthermore, the EU promotes a strong culture of incident reporting and response. Through the CSIRTs Network, the EU has developed a robust mechanism for the detection, reporting, and management of cybersecurity incidents. This network enables a coordinated and efficient response to cyber threats, significantly enhancing the EU's capacity to handle incidents of cyber harassment swiftly and effectively (ENISA).
As digital threats continue to evolve, the EU remains committed to adapting and refining its strategies to better secure digital devices and protect its citizens from cyber threats, including cyber harassment and digital violence. This ongoing commitment is reflected in the continuous updates and refinements to policies like the Cyber Resilience Act and the proactive efforts of entities such as ENISA. Through these comprehensive and evolving strategies, the EU aims to foster a safe and inclusive digital environment for all its citizens, underscoring its dedication to combating cyber threats on all fronts.
technology-facilitated gender-based violence in the EU demand a comprehensive solution that prioritises personal and systemic cybersecurity. Creating secure passwords and using effective authentication techniques is crucial. Improving cyber safety protocols is crucial due to European studies revealing a high prevalence of online abuse against women (World Bank Blogs). Password management and MFA are essential for online identity and data security. The General Data Protection Regulation (GDPR) requires secure authentication to protect data from unauthorised breaches, minimising cyber mishaps.
In our increasingly interconnected world, digital device security is crucial, especially for cyber harassment and cyber violence prevention. The 2011 EDPACS article "Good Practice for Strong Passwords" by Kevin Curran et al. and the latest European Union directives on cyber security inform this handbook section's advanced password and authentication methods.
Creating strong passwords is essential for cybersecurity and protecting digital data and services. Data breaches are commonly linked to poor password practices, where simplicity creates security risks. These threats have prompted the European Union to tighten digital security standards that encourage complicated passwords and enhanced authentication.
Password generation and maintenance must incorporate many fundamental practices to improve security:
Ideal Password Length and Complexity: Passwords should be over 12 characters and include uppercase, lowercase, digits, and special characters. Complex passwords prevent brute-force assaults, which try to decipher simpler passwords.
Passphrase Use: Passphrases, a string of random words or a memorable sentence, boost password length and complexity while maintaining memorability. The phrase "Winter is coming" might become a secure passphrase like "W1nt3r!sC0m1ng."
Update Passwords Regularly: Regular password updates improve security, especially after a compromise. The EU recommends updating passwords every three to six months, depending on data sensitivity.
Passwords with dictionary terms, sequential characters, or personal information are easier to crack. Users should choose random, non-identifiable combinations.
Multifactor Authentication (MFA) enhances security by requiring multiple verifications before accessing an account or system.
A password or PIN is a knowledge factor.
Possession Factors: A security token or mobile device for OTP verification.
Biometrics like fingerprint scans or facial recognition show the user's inherent qualities.
To ensure all users understand password best practices and authentication, ongoing education is essential. The EU funds educational resources and public awareness efforts to teach individuals about cybersecurity and internet safety.
Cybersecurity threats change, so must countermeasures. The EU leads this adaptive strategy by revising its cybersecurity directives to reflect new technologies and threats. Biometric systems, AI-driven security, and worldwide cybersecurity standards cooperation may improve in the future.
To prevent unauthorized access, a strong password uses a mix of letters, numbers, and symbols in a complicated and unique arrangement. Multi-factor authentication adds security by requiring additional verification procedures, such as a mobile device for obtaining a one-time code and knowledge-based passwords. The EU is dedicated to a safer online environment through strong security measures and legal protections. This environment allows women to participate freely and securely, setting a global digital safety benchmark and proactively combatting online harassment and violence against women.
1. When setting up a new online account, what is a critical step for enhancing your privacy and security?
A
Choosing a username that includes your real name and location.
B
Enabling privacy settings to limit who can view your profile and posts.
C
Only connecting with users who have a large number of followers.
D
Using a profile picture that clearly shows your face.
2. How often should you update your passwords to maintain account security?
A
Once a year.
B
Every three to six months.
C
Only when you forget them.
D
Passwords do not need updates if they are strong.
3. Which of the following is a safe practice when creating or maintaining social media accounts to prevent stalking?
A
Regularly check and tighten account privacy settings.
B
Accept all friend requests to appear sociable.
C
Always tag your location in posts to keep friends informed.
D
Use a commonly known nickname as your username.
4. Scenario: "Laura discovers that someone has created a fake profile using her photos and name on a social media platform. What should be her first course of action?"
A
Create a public post explaining the situation to her friends.
B
Ignore the profile, assuming it will not have a significant impact.
C
Report the fake profile to the social media platform for immediate action.
D
Contact friends and ask them to report the profile as well.
Correct Answers:
1
Correct Answer: B - Activating privacy settings helps control who can see your content and interact with you, providing a first line of defence against potential harassers.
2
Correct Answer: B - Regularly updating passwords, especially every three to six months, is a recommended practice to secure online accounts from unauthorized access and potential harassment.
3
Correct Answer: A - Keeping privacy settings checked and tightened helps prevent unauthorized access to personal information and reduces the risk of stalking.
4
Correct Answer: C - The immediate step should be to report the fake profile to the platform to initiate its removal and prevent misuse of her identity.
Protecting personal information on social media is crucial in safeguarding against technology-facilitated gender-based violence (TFGBV). Each major social media platform offers privacy settings that allow users to control who can view their content and interact with them. Here’s a guide to managing privacy settings on Facebook, Instagram, Twitter, YouTube, and WhatsApp.
1
Privacy Checkup: Use Facebook’s Privacy Checkup tool to review and adjust key settings.
2
Profile Visibility: Adjust who can see your posts and personal information under the "Privacy" tab in settings. Set your profile to "Friends" or "Only Me" for increased privacy.
3
Friend Requests and Followers: Limit who can send you friend requests and follow you by adjusting the "How People Find and Contact You" settings.
4
Tagging: Manage who can tag you in posts and who can see posts you're tagged in under the "Timeline and Tagging" settings.
5
Location Settings: Turn off location services or adjust who can see your location.
1
Private Account: Switch to a private account under "Settings" > "Privacy" > "Account Privacy". Only approved followers will see your posts.
2
Story Controls: Customize who can see and reply to your stories under "Privacy" > "Story".
3
Comments and Tags: Control who can comment on your posts and who can tag you in photos under "Privacy" > "Comments" and "Tags".
4
Direct Messages: Restrict who can send you direct messages under "Privacy" > "Messages".
5
Activity Status: Turn off your activity status to hide when you’re active on Instagram under "Privacy" > "Activity Status".
1
Protect Your Tweets: Make your account private by enabling "Protect your Tweets" under "Settings and Privacy" > "Privacy and Safety". Only followers you approve can see your tweets.
2
Tagging: Disable photo tagging or limit it to people you follow under "Privacy and Safety" > "Photo tagging".
3
Direct Messages: Restrict who can send you direct messages under "Privacy and Safety" > "Direct Messages".
4
Mute and Block: Use the mute and block functions to control who can interact with you.
5
Location Information: Turn off location information for your tweets under "Privacy and Safety" > "Location Information".
1
Privacy Settings: Adjust privacy settings under "Settings" > "Privacy". Set your liked videos, saved playlists, and subscriptions to private.
2
Comment Settings: Moderate who can comment on your videos under "Settings" > "Community" > "Defaults".
3
Blocking Users: Block users who are abusive or harassing through their profile or comment section.
4
Personal Information: Limit the amount of personal information shared in your channel’s "About" section.
1
Profile Privacy: Adjust who can see your profile photo, about, and status under "Settings" > "Account" > "Privacy".
2
Last Seen and Online Status: Control who can see your last seen and online status under "Settings" > "Account" > "Privacy".
3
Group Privacy: Restrict who can add you to groups under "Settings" > "Account" > "Privacy" > "Groups".
4
Read Receipts: Turn off read receipts under "Settings" > "Account" > "Privacy" if you don’t want others to see when you’ve read their messages.
5
Two-Step Verification: Enable two-step verification for an extra layer of security under "Settings" > "Account" > "Two-step verification".
By carefully managing these privacy settings, users can better protect their personal information and reduce the risk of becoming targets of TFGBV. Regularly reviewing and updating these settings is essential as platforms often update their privacy policies and features.
Safe online communication is essential to protect oneself from technology-facilitated gender-based violence (TFGBV). By adopting secure practices, individuals can safeguard their personal information, maintain their privacy, and reduce the risk of online harassment and abuse. Here are key strategies for practicing safe online communication:
1
Be Mindful of Sharing Personal Information
Limit Personal Details: Avoid sharing sensitive information such as home addresses, phone numbers, and personal schedules on public platforms.
Use Nicknames: When possible, use nicknames or pseudonyms to protect your real identity.
2
Secure Passwords
Strong Passwords: Create strong, unique passwords for each account using a combination of letters, numbers, and symbols.
Two-Factor Authentication (2FA): Enable 2FA to add an extra layer of security, requiring a second form of verification to access your accounts.
3
Adjust Privacy Settings
Social Media Privacy: Regularly review and update privacy settings on all social media accounts to control who can view your content and interact with you.
Profile Visibility: Set profiles to private or limit visibility to friends and trusted contacts.
4
Use Encrypted Communication Tools
Encryption: Use messaging apps that offer end-to-end encryption, such as Signal or WhatsApp, to ensure that only the intended recipient can read your messages.
Secure Platforms: Prefer secure communication platforms that prioritize user privacy and data security.
5
Beware of Phishing and Scams
Suspicious Links: Do not click on links or download attachments from unknown or untrusted sources.
Verification: Verify the authenticity of messages or emails that request personal information or seem suspicious.
6
Manage Digital Footprint
Regular Audits: Regularly check and clean up your digital footprint by deleting old accounts and removing unnecessary personal information.
Search Engine Visibility: Be aware of what personal information is available through search engines and take steps to remove or limit it.
7
Practice Safe Social Interactions
Trust Your Instincts: If an online interaction feels uncomfortable or suspicious, trust your instincts and disengage.
Report and Block: Report abusive behaviour and block users who engage in harassment or threaten your safety.
8
Educate and Inform
Stay Informed: Stay updated on the latest online safety practices and educate yourself about new threats and vulnerabilities.
Share Knowledge: Educate friends and family about safe online practices to create a safer online community.
9
Use Secure Devices
Software Updates: Keep your devices and software updated to protect against security vulnerabilities.
Antivirus and Anti-Malware: Use reliable antivirus and anti-malware programs to safeguard your devices.
Virtual Private Network (VPN): Use a VPN to encrypt your internet connection and protect your online activities from being tracked or intercepted. A VPN can provide an additional layer of security, especially when using public Wi-Fi networks.
10
Handle Sensitive Content Carefully
Sensitive Photos and Documents: Store sensitive photos and documents securely and consider using encrypted storage solutions.
Consent and Sharing: Only share sensitive content with trusted individuals and ensure you have their consent before sharing their information.
Practicing these safe online communication strategies can significantly reduce the risk of experiencing TFGBV. It is crucial to remain vigilant and proactive in protecting your digital presence to ensure a safer online environment.
Browsing the internet safely is crucial to protect yourself from various online threats, including technology-facilitated gender-based violence (TFGBV). Here are essential practices to ensure your safety while browsing the internet:
1
Use Secure and Updated Browsers
Choose Secure Browsers: Use reputable browsers that prioritize security and privacy features.
Keep Browsers Updated: Regularly update your browser to patch vulnerabilities and protect against security threats.
2
Enable Browser Security Features
Pop-up Blocker: Enable the pop-up blocker feature in your browser settings to prevent malicious pop-ups.
Privacy Settings: Adjust browser privacy settings to control how your information is collected and shared.
3
Avoid Risky Websites
Verify Website Security: Look for HTTPS in the URL and a padlock icon in the address bar to ensure the website uses encryption for secure communication.
Avoid Suspicious Links: Do not click on suspicious links or visit unfamiliar websites that may contain malware or phishing attempts.
4
Use Search Engines Safely
Evaluate Search Results: Be cautious of search results and avoid clicking on links from unfamiliar or unreliable sources.
Safe Search Settings: Enable safe search settings on search engines to filter out explicit content and potentially harmful websites.
5
Be Cautious of Online Ads
Ad Blockers: Use ad blocker extensions to minimize exposure to potentially malicious or misleading advertisements.
Avoid Clicking Ads: Exercise caution when interacting with online ads, as they may lead to unsafe websites or phishing attempts.
6
Protect Personal Information
Limit Sharing: Avoid sharing personal information unnecessarily on websites or forums.
Use Pseudonyms: When possible, use pseudonyms or usernames instead of your real name to maintain anonymity.
7
Secure Your Wi-Fi Connection
Password Protection: Secure your home Wi-Fi network with a strong password to prevent unauthorized access.
Use VPN: When using public Wi-Fi networks, use a Virtual Private Network (VPN) to encrypt your internet connection and protect your browsing activity from eavesdropping.
8
Monitor Online Activities
Regularly Check Accounts: Regularly review your online accounts and activity logs for any unauthorized access or suspicious activity.
Enable Account Notifications: Enable notifications for login attempts and account changes to detect potential security breaches early.
By following these practices, you can significantly reduce the risk of encountering TFGBV and other online threats while browsing the internet. It is essential to remain vigilant and proactive in protecting your online privacy and security.
Technology-facilitated gender-based violence (TFGBV) represent significant and growing challenges within the European Union (EU). These forms of violence encompass a range of behaviours, including cyberstalking, non-consensual sharing of intimate images (often referred to as revenge porn), online threats, and harassment. This module aims to provide a comprehensive overview of the legal rights and protections available to women in the EU, highlighting relevant legislation, initiatives, and statistical data.
The EU has developed a robust legal framework to combat cyber harassment and digital violence against women. Key legislative measures and initiatives include:
1
The Istanbul Convention: The Council of Europe Convention on preventing and combating violence against women and domestic violence, commonly known as the Istanbul Convention, is a cornerstone in the fight against gender-based violence, including its digital forms. Article 3 of the Convention defines violence against women as all acts of gender-based violence resulting in, or likely to result in, physical, sexual, psychological, or economic harm or suffering to women, including threats of such acts, coercion, or arbitrary deprivation of liberty, whether occurring in public or private life.
2
Directive on Combating Violence Against Women and Domestic Violence: Adopted by the European Commission in 2022, this directive aims to criminalize specific forms of cyber violence, including cyberstalking, cyber harassment, and the non-consensual sharing of intimate images. The directive also sets out minimum standards for the rights of victims and the responsibilities of Member States to provide support services.
3
Digital Services Act (DSA): The DSA, which came into force in 2024, includes provisions to enhance the transparency and accountability of online platforms. It mandates the removal of illegal content and provides mechanisms for users to report abuse. The DSA emphasizes the importance of addressing gender-based online violence and improving digital safety for women.
4
Directive on Victims' Rights (2012/29/EU): This directive ensures that victims of crime, including digital violence, receive appropriate information, support, and protection. It mandates that Member States provide legal aid and assistance to victims.
The prevalence of cyber violence against women is significant. According to a report by EIGE, about one in ten women in the EU has experienced some form of cyber harassment since the age of 15. Additionally, the EU Fundamental Rights Agency (FRA) conducted a survey in 2014 which revealed that 11% of women had experienced inappropriate advances or cyberstalking, with younger women (aged 18-29) being particularly at risk.
Despite existing laws and initiatives, challenges remain in effectively combating cyber violence against women. These include:
*
Enforcement: Ensuring that existing laws are enforced consistently across Member States.
*
Awareness and Education: Increasing awareness among women about their rights and the available legal protections. Educational campaigns can also target men and boys to change harmful attitudes and behaviours.
*
Technological Measures: Encouraging technology companies to develop and implement tools that prevent cyber harassment and protect users' privacy and safety.
*
Support Services: Enhancing support services for victims, including psychological support and legal assistance.
When a woman experiences cyber harassment or digital violence, reporting the incident to law enforcement is crucial for seeking justice and protection. The reporting process generally involves several steps:
1
Documentation: Victims should document all instances of harassment, including screenshots, messages, and any other relevant evidence. This documentation is vital for substantiating claims.Victims should ensure that they capture time stamps, URLs, and other identifying details to support their case.
2
Contacting Law Enforcement:
Local Police Stations: Victims can report incidents at their local police station. Many countries have specialized cybercrime units equipped to handle such cases.
Online Reporting Platforms: Several Member States provide online platforms for reporting cybercrime, which can be more accessible and less intimidating for victims.
Filing a Complaint: Victims need to file a formal complaint, detailing the incidents and providing documented evidence. The complaint can be made in person or online, depending on the country and it should include personal details, a description of the incidents, evidence, and information about the perpetrator if known.
3
Legal Support: Many Member States offer legal assistance to victims. Organizations such as Women Against Violence Europe (WAVE) provide support, advocacy, and resources for navigating legal processes.
In addition, various non-governmental organizations (NGOs) and victim support groups offer counselling, legal advice, and assistance throughout the reporting process.
Despite the available legal frameworks, several barriers hinder effective reporting of cyber harassment and digital violence:
1
Lack of Awareness: Many victims are unaware of their rights and the procedures for reporting cyber violence. Educational campaigns are essential to increase awareness.
2
Inadequate Law Enforcement Response: Inconsistent enforcement of laws and insufficient training of law enforcement personnel can discourage victims from reporting incidents.
3
Fear of Retaliation: Victims often fear further harassment or retaliation from perpetrators, especially when the perpetrator is known to them.
4
Societal Attitudes: Stigmatization and victim-blaming can also deter women from seeking help.
Enhanced training for law enforcement is crucial. Regular training sessions focusing on cyber harassment and digital violence can equip law enforcement officers with the necessary skills to handle such cases effectively. Collaboration between cybercrime experts, psychologists, and legal professionals can provide comprehensive training for law enforcement. Improving reporting mechanisms is another key area. Developing intuitive and accessible online reporting platforms can encourage more victims to come forward, and establishing dedicated hotlines and support services can provide immediate assistance to victims.
Public awareness campaigns play a significant role in encouraging reporting. Educational campaigns can educate people about the legal rights and protections against cyber harassment and encourage reporting. Engaging communities in discussions about cyber harassment can help reduce stigma and promote a supportive environment for victims. A supportive legal framework is also essential. Regular updates to the legal framework can ensure it remains relevant to new forms of digital violence and strengthening laws that protect the identity and safety of victims during and after the reporting process is crucial.
Technology-facilitated gender-based violence presents significant challenges in the European Union (EU). Legal actions and civil remedies are critical tools for protecting victims and ensuring accountability.
Victims of digital violence can seek several civil remedies and take legal action to protect themselves and hold perpetrators accountable:
1
Restraining Orders and Protective Orders: Victims can file for restraining or protective orders through local courts. These orders can prohibit the abuser from contacting the victim and mandate the removal of harmful online content. The enforcement of these orders varies across Member States but generally involves law enforcement agencies ensuring compliance.
2
Compensation Claims: Victims can claim compensation for the harm suffered due to digital violence. This can include damages for psychological distress, loss of income, and other related costs. Compensation mechanisms are supported by the Victims' Rights Directive, which mandates Member States to provide victims with access to compensation.
3
Civil Litigation: Victims can initiate civil lawsuits against perpetrators for defamation, invasion of privacy, and other torts related to digital violence. Successful litigation can result in monetary damages and injunctions to prevent further abuse.
Several initiatives and support mechanisms are in place to assist victims of digital violence:
1
Daphne Program: Part of the Citizens, Equality, Rights and Values Programme, the Daphne initiative funds projects aimed at preventing and combating violence against women and children, including digital violence.
2
EU Network on the Prevention of Gender-Based and Domestic Violence: Established by the European Commission, this network facilitates the exchange of best practices among Member States and stakeholders to improve responses to gender-based violence.
3
Support Services: Various non-governmental organizations (NGOs) and support services provide legal aid, counselling, and advocacy for victims of digital violence. These services are crucial in helping victims navigate the legal system and access necessary protections.
EU victims of digital assault can seek protective orders through the judicial system. The petitioner must list dates and details of digital violence events in a local court. Court clerks and advocates help fill out this paperwork correctly (WomensLaw.org, 2024).
Request temporary protective orders concurrently for immediate protection pending a court hearing. These ex parte orders provide quick relief without the abuser present. A hearing to grant a permanent protection order is then scheduled by the court. Hearing witnesses and evidence are presented by both parties.
The abuser must get the temporary protective order and court hearing notification. This informs the abuser of court orders and prohibitions. Law enforcement or court-appointed officials serve process (The Hotline, 2024). If digital violence is proven, the court will impose a permanent protective order restricting the abuser's contact and acts.
The European Union Agency for Fundamental Rights (FRA) found that cyber harassment is more common among younger women, especially those aged 18–29, with 20% of respondents in an FRA study reporting such incidents. This generation is vulnerable due to their greater use of technology and social media. Digital violence has serious psychological and emotional effects. According to the FRA (2014), victims experience anxiety, despair, and decreased feelings of safety. Cyber harassment caused 55% of women to feel scared, and 26% experienced panic attacks or anxiety.
Protective orders for digital violence face various obstacles despite legal remedies. Victims' ignorance of their legal rights and protection processes is a serious obstacle. Women need educational campaigns on their options and the legal process (Heinrich Böll Stiftung, 2024).
Protective order enforcement varies widely between EU countries. Some countries have stronger systems, while others lack equipment and training for law enforcement to enforce these orders. This inconsistency can weaken legal protections (Springer 2023).
Another issue is retaliation anxiety. Abusers typically threaten victims with more harassment or violence, especially if digital violence is part of a larger pattern. Protection and anonymity in the judicial process can reduce these fears (WomensLaw.org, 2024).
Social stigma can also dissuade women from seeking protective orders. Victim-blaming and social stigma can deter digital abuse victims. Law enforcement should be trained in cultural sensitivity to handle instances without bias.
Law enforcement needs better training to handle internet violence. Officers can handle internet harassment and digital violence situations with regular training. Cybercrime experts, psychologists, and lawyers might train together to comprehend these challenges (WomensLaw.org, 2024).
Reporting systems must also be improved. Online services that make reporting digital violence easy can encourage victims to come forward. These platforms should provide clear instructions and support for filing complaints and seeking protective orders (Heinrich Böll Stiftung, 2024).
Legal rights and digital violence protections must be promoted through public awareness initiatives. Community talks regarding digital violence and reporting can minimize stigma and support victims (European Commission, 2024).
A supportive legal framework is needed. Legal changes keep it current with digital violence. Strengthening regulations to protect victims' identity and safety during and after reporting is essential (European Commission, 2024).
Cyber harassment and digital violence against women represent critical issues within the European Union (EU), as they impede gender equality and infringe upon women's rights. The EU has actively pursued legal and policy measures to combat these forms of violence, which are often perpetuated through the internet and digital platforms. This essay examines the legal resources and support organizations available in Bulgaria, Lithuania, and Italy, and evaluates EU-wide initiatives aimed at addressing these challenges.
In Bulgaria, the legal framework against cyber violence is integrated within broader laws against domestic violence and gender-based violence. The Bulgarian government has implemented specific measures to address cybercrimes, including harassment and stalking online. Support organizations in Bulgaria provide legal assistance, psychological counselling, and support groups for victims. They work closely with EU frameworks to ensure compliance with broader European standards and benefit from EU funding for victim support programs.
Lithuania has shown commitment to enhancing its national legislation to align with the EU's standards concerning cyber violence. The country has developed educational programs aimed at raising awareness about the dangers of cyber harassment. Lithuanian law enforcement agencies are equipped with the tools to tackle cybercrimes effectively, ensuring that victims can receive timely and effective assistance. Support organizations in Lithuania are vital in offering services tailored to the needs of women facing digital violence, facilitating access to justice and recovery.
Italy has enacted robust legislation to address cyber harassment and digital violence. The Italian Penal Code includes provisions that specifically address acts of digital intrusion, unauthorized data dissemination, and harassment online. Italy also emphasizes the importance of victim support through governmental and non-governmental organizations that provide comprehensive services, including legal advice, psychological support, and advocacy for victims' rights. These organizations are instrumental in ensuring that women are informed of their rights and the resources available to aid their recovery and justice pursuits.
In Bulgaria, several organizations offer services to help victims of cyber harassment, stalking, and other forms of digital abuse. Here are some key resources available:
Animus Association Foundation – One of Bulgaria’s leading organizations supporting victims of violence, including cyber harassment. They provide a hotline (0800 1 86 76), psychological support, and legal assistance. Animus Association.
Bulgarian Safer Internet Centre – This organization focuses on promoting online safety for children and adults. They offer a hotline for reporting harmful content or cyber abuse and provide educational resources. Safer Internet Centre.
Bulgarian Helsinki Committee (BHC) – BHC offers legal support and advocacy for victims of human rights violations, including those who experience online harassment or abuse. They can assist with legal advice and representation. Bulgarian Helsinki Committee.
Cybercrime Unit – General Directorate for Combating Organized Crime (GDBOP) – This government unit deals with internet-related crimes, including cyber harassment and stalking. They offer an online platform for reporting such incidents. GDBOP Cybercrime Unit.
In Lithuania, several organizations offer comprehensive services to help victims of cyber harassment, stalking, and other forms of digital abuse. Here are some key resources available:
Lietuvos policija or E-policija: Can assist with reporting cyber harassment, stalking, and other forms of digital abuse, ensuring that legal measures are taken against perpetrators.
Pagalbos moterims linija: This helpline provides psychological support, counseling, and advice specifically for women experiencing violence, including technology-facilitated violence.
Vilties linija: Offers emotional support and counseling for individuals in distress, including those affected by digital violence.
Vaiku linija: Provides support and counseling for children and adolescents experiencing cyberbullying and other forms of online abuse.
Specializuotos kompleksinės pagalbos centras: Provides comprehensive support services, including legal advice and psychological counseling, for victims of all forms of violence, including technology-facilitated violence.
Jaunimo linija: Offers psychological support and guidance for young people facing cyber harassment and other digital challenges.
In Italy:
In Italy, several organizations offer comprehensive services to help victims of cyber harassment, stalking, and other forms of digital abuse. Here are some key resources available:
Polizia Postale e delle Comunicazioni (Postal and Communications Police): Can assist with reporting cyber harassment, stalking, and other forms of digital abuse, ensuring that legal measures are taken against perpetrators.
Telefono Rosa: Provides psychological support, counseling, and advice specifically for women experiencing violence, including technology-facilitated violence.
D.i.Re (Donne in Rete contro la violenza): Offers comprehensive support services, including legal advice and psychological counseling, for victims of all forms of violence, including technology-facilitated violence.
Centro Antiviolenza SOS Donna H24: Provides 24/7 support, legal advice, and psychological counseling for women affected by violence, including technology-facilitated violence.
Telefono Azzurro: Provides support and counseling for children and adolescents facing cyberbullying and other forms of online abuse.
WeWorld Onlus: Offers comprehensive support including educational programs, legal support, and psychological counseling to combat violence against women and children, including digital violence.
The digital landscape is continually evolving, posing new challenges in the fight against technology-facilitated gander-based violence. Future legislative efforts will need to address these emerging threats by incorporating advanced technological understanding and flexibility to adapt to new forms of digital abuse. GREVIO’s General Recommendation No.1 is an essential step in this direction, offering a framework that acknowledges the broad and evolving nature of digital violence and suggesting actions for prevention, protection, prosecution, and policy coordination.
One of the ongoing challenges in addressing cyber violence is the need for cross-border cooperation and enforcement of laws in the digital realm, where jurisdiction can often be complex. The EU addresses this through various regulations and directives that mandate cooperation among member states in data sharing, law enforcement, and judicial proceedings.
Moreover, the EU promotes awareness and education initiatives aimed at preventing cyber violence. These programs are targeted not only at potential victims but also at the general public to foster a more respectful and safer online environment.
Beyond legislation, the EU supports sector-specific actions such as safer internet programs for schools, digital literacy campaigns, and training for law enforcement agencies in handling cyber harassment cases. These actions are crucial for creating an inclusive digital environment where women can participate freely and safely.
Through comprehensive legal frameworks, detailed data analysis, and proactive sectoral actions, the European Union is making significant strides in protecting women from cyber harassment and digital violence, ensuring their rights are safeguarded in an increasingly digital world.
1. What is a key component of a personal cyber safety plan?
A
Regularly posting personal updates.
B
Defining and adhering to personal boundaries for online interactions.
C
Ignoring privacy settings.
D
Accepting all friend requests.
2. Where can victims report incidents of cyber harassment?
A
Only at local police stations.
B
Only through social media.
C
Both local police stations and online reporting platforms.
D
Nowhere.
3. What is cyber violence against women?
A
Positive reinforcement online.
B
Gender-based violence perpetrated through electronic communication and the internet.
C
Regular internet usage.
D
Participating in online forums.
4. Which of the following is an effective way to deal with cyber harassment?
A
Retaliating with similar behaviour.
B
Ignoring the harasser.
C
Blocking and reporting the harasser.
D
Deleting your social media account.
5. Scenario: “You receive a message from a stranger making inappropriate comments about your photos”. What steps do you take?
A
Ignore the message.
B
Block the sender.
C
Report the message to the platform.
D
Share the message with friends to laugh about it.
6. Online Reporting Tools
Identify online platforms where you can report cyber harassment (e.g., social media reporting tools, local police websites).
Practice navigating these platforms to understand how to submit a report.
7. Research Protective Orders
Look up the process for obtaining protective orders in your country.
Note the requirements, steps involved, and where to file the application.
Correct Answers:
1
Correct Answer: B) Defining and adhering to personal boundaries for online interactions.
2
Correct Answer: C) Both local police stations and online reporting platforms.
3
Correct Answer: B) Gender-based violence perpetrated through electronic communication and the internet.
4
Correct Answer: C) It stops the harasser from continuing to contact you and alerts the platform to take appropriate actions based on their policies against harassment.
5
Correct Answer: B & C) Blocking the sender immediately stops them from being able to contact you further, which helps protect your personal space. Reporting the message to the platform alerts the service providers about the harassment.
The history of human rights protection on a global scale traces back to the Universal Declaration of Human Rights (UDHR) adopted by the United Nations General Assembly in 1948, establishing a comprehensive framework for fundamental rights and freedoms. This was followed by the development of international treaties and conventions, including the International Covenant on Civil and Political Rights (ICCPR) and the International Covenant on Economic, Social and Cultural Rights (ICESCR), which further codified and expanded human rights protections. In the European Union (EU), the foundation of human rights protection lies in the European Convention on Human Rights (ECHR), established in 1950 by the Council of Europe, supplemented by the Charter of Fundamental Rights of the European Union, which became legally binding with the entry into force of the Lisbon Treaty in 2009.
From the perspective of human rights technology-based violence against adult women encompasses various aspects of rights violations, including privacy, security, and freedom from discrimination and violence. Here are some key points:
Right to Privacy
Technology-based violence often invades privacy through hacking, unauthorized access to personal information, or sharing intimate images without consent. Women's right to privacy, fundamental in international law and human rights, is outlined in Article 12 of the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights (ICCPR). This right protects personal autonomy, intimacy, and confidentiality, safeguarding women against discrimination, exploitation, and violence.
Women have the right to control their personal information, make choices about their bodies and relationships, and maintain autonomy over their identities. Protection from surveillance and unauthorized data access is crucial for their dignity and well-being, ensuring full participation in society without unjust interference or scrutiny.
Technology-based violence can perpetuate discrimination against women, exacerbating existing gender inequalities. For example, online harassment and cyberbullying may target women based on their gender, race, sexual orientation, or other characteristics, violating their right to equality and non-discrimination.
The right to freedom from discrimination for women, as enshrined in international law and human rights instruments, extends to protection from technology-based violence — a pervasive form of gender-based discrimination in the digital age. Rooted in principles outlined by the Convention on the Elimination of All Forms of Discrimination Against Women (CEDAW) and the Universal Declaration of Human Rights, this right safeguards against the use of technology to perpetrate harassment, cyberbullying, and other forms of online violence targeting women. Upholding this right involves implementing effective legal frameworks, promoting digital literacy and empowerment, and holding perpetrators accountable for their actions.
Technology-based violence, including online harassment, cyberstalking, and revenge porn, can cause significant psychological harm and can escalate to physical violence in some cases. This violates women's right to freedom from violence and undermines their safety and security.
Women have the inherent right to live free from fear and harm, both offline and online, and must be safeguarded against the unique threats posed by digital technologies. Efforts to protect women from technology-based violence require robust legal frameworks, effective law enforcement mechanisms, and collaboration between governments, tech companies, and civil society organizations.
Women who experience technology-based violence often face barriers in accessing justice due to factors such as anonymity of perpetrators, jurisdictional challenges, and inadequate legal frameworks. This can result in impunity for perpetrators and further victimization of survivors, denying them their right to effective remedies and redress. This right encompasses the right to a fair and impartial legal process, access to effective remedies, and protection from further harm or retaliation.
In the context of technology-based violence, which often transcends national borders and involves complex digital evidence, ensuring women's access to justice becomes particularly challenging. Women must be provided with adequate support, legal assistance, and digital forensic expertise to navigate the legal system and seek redress for the harms they have endured. Efforts to enhance women's access to justice in cases of technology-based violence require collaboration between governments, law enforcement agencies, tech companies, and civil society organizations.
Technology-based violence can also be used to silence women and restrict their freedom of expression. Threats, harassment, and online abuse can deter women from participating in public discourse, expressing their opinions, or advocating for their rights, undermining their right to freedom of expression.
The right to freedom of expression for women is essential for fostering democratic societies and promoting gender equality. Enshrined in documents such as the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights (ICCPR), this right encompasses the freedom to seek, receive, and impart information and ideas without interference by public authorities or private actors.
Addressing the human rights dimension of technology-based violence against adult women requires a comprehensive approach that involves legal reforms, awareness-raising campaigns, capacity-building for law enforcement and judicial authorities, and collaboration between governments, civil society, and technology companies. Additionally, efforts should focus on promoting digital literacy and empowerment among women to mitigate the risks of technology-based violence and enhance their ability to assert their rights in online space.
Advocacy involves promoting and supporting a particular cause or issue by influencing public opinion, policies, and decision-making processes. It encompasses activities such as raising awareness, lobbying policymakers, and mobilizing communities to bring about social change. Through advocacy, individuals and organizations strive to address systemic injustices, advance human rights, and amplify the voices of marginalized communities.
Advocacy efforts geared towards safeguarding women from and eradicating tech-based violence against them can embrace a variety of tactics aimed at heightening awareness, advocating policy reforms, empowering survivors, and ensuring accountability for perpetrators. Here are some impactful advocacy strategies:
*
Educating the public about technology-based violence against women, challenging stereotypes, and debunking myths.
*
Developing digital Literacy Programs to enhance online safety practices and navigate social media securely.
*
Legal Advocacy: Pushing for legal reforms to address unique forms of technology-based violence experienced by adult women, especially in professional settings.
*
Building capacity through training of law enforcement, judicial authorities, and other stakeholders to respond effectively to cases of technology-based violence, including digital forensics.
*
Engaging the Tech Industry: Collaborating with technology companies to develop user-friendly reporting mechanisms and prioritize user safety.
*
Advocating for Support Services: Advocating for increased funding and resources for support services like hotlines, counselling, legal aid, and shelters for survivors.
*
Collaboration with Service Providers such as healthcare professionals, legal aid organizations, and social service agencies to ensure comprehensive support services for adult women affected by technology-based violence.
*
Implementing an intersectional Approach: recognizing and addressing the diverse experiences and vulnerabilities of women, including those facing multiple forms of discrimination.
*
Data Collection and Research: advocating for improved data collection and research to better understand the prevalence and impact of technology-based violence, and to inform evidence-based interventions and policy responses.
*
Establishing Community Support Networks: Establishing community-based support networks and peer-led initiatives for adult women affected by technology-based violence.
*
Developing political advocacy efforts entails advocating for robust legal frameworks at both national and international levels. This advocacy involves pushing for the enactment of laws specifically targeting cyberstalking, online harassment, and the unauthorized sharing of intimate images. Furthermore, policy engagement involves actively collaborating with policymakers to ensure that measures addressing technology-based violence against adult women are effectively incorporated into relevant policy frameworks.
These examples demonstrate the diverse range of advocacy efforts aimed at addressing technology-based violence against adult women and empowering them to assert their rights and access support services.
There are also a few examples of campaigns and initiatives within Bulgaria, Lithuania, and Italy aimed at addressing technology-based violence against adult women:
1
The Association of European Journalists - Bulgaria launched the Online Safety for Women campaign to raise awareness about online harassment, cyberbullying, and other forms of digital violence targeting women in Bulgaria. The campaign provides resources and guidance on staying safe online and advocates for policy changes to protect women's rights in digital spaces.
2
The Lithuanian Centre for Human Rights initiated the #SafeOnlineLithuania campaign to promote online safety and combat technology-based violence against women in Lithuania. The campaign raises awareness about cyberbullying, online harassment, and the non-consensual sharing of intimate images, and provides information on legal remedies and support services available to survivors.
3
Non-Una di Meno, a feminist grassroots movement in Italy, launched the Cyberfemminismo campaign to address technology-based violence against women and promote digital feminism. The campaign advocates for digital literacy, online safety, and accountability for perpetrators of online abuse, and organizes workshops, discussions, and advocacy actions to empower women in digital spaces.
To further illuminate what is possible in relation to advocacy efforts to prevent technology-based violence against women, we compiled a list with some specific examples of campaigns and initiatives within the European Union:
1
#HerNetHerRights Campaign: The European Women's Lobby launched this campaign to raise awareness about online violence against women and advocate for policy changes at the EU level. The campaign focuses on amplifying women's voices, promoting digital literacy, and calling for stronger legal protections.
2
eSafety Label+ Project: Coordinated by European Schoolnet, this project aims to promote online safety and digital citizenship among educators, students, and parents across Europe. The project provides resources, training, and certification for schools to address issues such as cyberbullying and online harassment affecting adult women in educational settings.
3
#NotYourPorn Campaign: Led by the European Digital Rights organization (EDRi), focuses on combating the non-consensual sharing of intimate images online, commonly known as "revenge porn." The campaign raises awareness about the harmful impact of this form of digital abuse and advocates for legal reforms to hold perpetrators accountable.
4
Tech vs Abuse Initiative (SafeLives): SafeLives, a UK-based charity, launched the Tech vs Abuse initiative to address technology-facilitated abuse and domestic violence. The initiative provides training and resources for frontline professionals working with survivors of domestic abuse, including tools to assess and respond to technology-based risks faced by adult women.
5
#TakeBackConTROLL Campaign (European Parliament Intergroup on LGBTQI Rights): The European Parliament Intergroup on LGBTQI Rights launched the #TakeBackConTROLL campaign to combat online harassment and hate speech targeting LGBTQI individuals, including adult women. The campaign calls for legislative measures and digital platform accountability to protect the rights and safety of LGBTQI communities online.
Examples of campaigns from around the world addressing technology-based violence against women:
1
#MeToo Movement: The #MeToo movement, which gained momentum globally through social media, has shed light on the prevalence of sexual harassment and assault, including technology-facilitated abuse. The movement has empowered survivors to share their stories, break the silence surrounding online harassment, and advocate for systemic change.
2
The #TakeBackTheTech campaign, organized by the Association for Progressive Communications - APC, aims to reclaim technology as a space for gender equality and to end violence against women online. The campaign engages activists, organizations, and individuals worldwide in advocacy actions, digital storytelling, and capacity-building initiatives to promote online safety and respect for women's rights.
3
The #TechToo movement focuses on addressing sexual harassment, discrimination, and abuse in the tech industry, including within Silicon Valley and other tech hubs around the world. The movement advocates for workplace reforms, accountability for perpetrators, and greater representation and support for women in tech.
4
The #NoMore campaign, launched by NoMore.org, aims to end domestic violence and sexual assault through public awareness, education, and advocacy efforts. The campaign includes digital initiatives, such as online storytelling and social media campaigns, to raise awareness about technology-based violence and promote prevention and intervention strategies.
5
The #NotOkay campaign, led by Hollaback!, focuses on combating online harassment and street harassment experienced by women and marginalized communities worldwide. The campaign provides resources, training, and support for individuals and communities to address and prevent harassment in digital and physical spaces.
6
The #VAWFreePH campaign, initiated by the Philippine Commission on Women, aims to end violence against women (VAW) in the Philippines, including technology-facilitated abuse. The campaign includes digital advocacy efforts, community outreach programs, and policy advocacy initiatives to raise awareness and promote gender equality and women's rights.
These campaigns illustrate the global efforts to raise awareness, advocate for policy changes, and empower individuals and communities to address technology-based violence against women and promote gender equality in digital spaces.
Technology-based violence against women is often fuelled by cultural norms and attitudes that perpetuate gender inequality, misogyny, and the objectification of women.
Some key cultural norms and attitudes that contribute to tech-based violence include:
*
Gender Stereotypes: Deep-rooted stereotypes that prescribe rigid roles and expectations for women and men can lead to the objectification and devaluation of women in online spaces. These stereotypes may reinforce the notion that women are less capable, less deserving of respect, or defenceless in relation to harassment and abuse.
*
Normalization of Violence: In some cultures, violence against women is normalized or trivialized, both online and offline. This normalization can desensitize individuals to the harm caused by technology-based violence and perpetuate a culture of impunity for perpetrators.
*
Entitlement and Control: Attitudes of entitlement and control over women's bodies and choices can manifest in technology-based violence, such as cyberstalking, harassment, and the non-consensual sharing of intimate images. Perpetrators may believe they have the right to monitor, intimidate, and exert power over women in digital spaces.
*
Victim Blaming and Shaming: Cultural norms that blame and shame victims of violence, rather than holding perpetrators accountable, can discourage women from speaking out about their experiences of tech-based violence. This can perpetuate a culture of silence and further victimization, as survivors may fear judgment, disbelief, or retaliation.
*
Online Misogyny and Hate Speech: Misogynistic attitudes and hate speech targeting women are pervasive in online spaces, contributing to a hostile environment where women are disproportionately targeted for harassment, abuse, and threats. This culture of online misogyny reinforces gender-based violence and discrimination.
*
Lack of Digital Literacy and Awareness: Cultural norms that prioritize traditional gender roles may result in unequal access to digital literacy and awareness about online safety and security. This lack of knowledge and skills can leave women more vulnerable to tech-based violence and less able to protect themselves online.
Addressing technology-based violence against women requires challenging and transforming these cultural norms and attitudes, promoting gender equality, respect for women's rights, and zero tolerance for violence in all its forms. It necessitates comprehensive efforts at the individual, community, and societal levels to promote gender-sensitive education, foster critical thinking, and empower individuals to recognize, resist, and report tech-based violence.
Addressing cultural norms, beliefs, and attitudes to eliminate tech-based violence against women requires a multi-faceted and holistic approach. Here are some strategies:
*
Education and Awareness: Promote education and awareness-raising initiatives that challenge harmful gender stereotypes, promote gender equality, and raise awareness about the prevalence and impact of tech-based violence against women. This includes integrating digital literacy and online safety education into school curricula and community outreach programs.
*
Media Literacy: Foster media literacy skills that enable individuals to critically analyse and challenge media representations of women and gender roles. Provide training and resources to help individuals identify and counteract online misogyny, hate speech, and harmful narratives perpetuated by traditional and social media.
*
Empowerment and Support: Empower women and girls to assert their rights and advocate for themselves in digital spaces. Provide access to resources, support services, and peer networks that offer practical assistance, emotional support, and validation for survivors of tech-based violence.
*
Legal Reforms and Enforcement: Advocate for legal reforms to strengthen protections against tech-based violence and enhance accountability for perpetrators. This includes updating existing laws to address emerging forms of online harassment and abuse, as well as ensuring effective enforcement mechanisms and access to justice for survivors.
*
Community Mobilization: Mobilize communities to challenge and change cultural norms and attitudes that perpetuate gender-based violence. Encourage community dialogue, activism, and collaboration to promote respectful and equitable relationships, foster bystander intervention, and create supportive environments for survivors.
*
Tech Industry Responsibility: Hold technology companies accountable for addressing online misogyny, hate speech, and harassment on their platforms. Advocate for the implementation of robust content moderation policies, user reporting mechanisms, and transparency measures to combat tech-based violence and protect women's rights online.
*
Policy Advocacy: Advocate for comprehensive policies and initiatives at the local, national, and international levels that address the root causes of tech-based violence against women and promote gender equality in digital spaces. This includes lobbying for gender-responsive legislation, funding for prevention and intervention programs, and data collection on tech-based violence.
*
Cultural Shift: Promote a cultural shift towards gender equality, respect, and non-violence in all aspects of society, including in interpersonal relationships, workplaces, educational institutions, and media representations. Encourage positive role modelling, allyship, and collective action to challenge harmful norms and create a more inclusive and equitable society for all.
Promoting digital empathy and respect is essential in creating a positive and supportive online environment. It involves understanding and valuing the experiences and feelings of others while interacting in digital spaces. Here are key practices to foster empathy and respect in online interactions:
1
Practice Active Listening and Understanding
Be Attentive: Pay close attention to what others are saying without interrupting or making assumptions.
Show Genuine Interest: Express interest in others' perspectives and experiences, demonstrating that you value their input.
2
Use Respectful and Inclusive Language
Be Mindful of Words: Choose words carefully to avoid offending or alienating others. Avoid using derogatory, discriminatory, or inflammatory language.
Inclusive Language: Use language that is inclusive and respectful of all genders, ethnicities, and backgrounds.
3
Acknowledge Different Perspectives
Respect Differences: Understand that people come from diverse backgrounds and may have different viewpoints. Respect these differences and avoid imposing your beliefs on others.
Encourage Open Dialogue: Foster an environment where diverse perspectives are welcomed and respected.
4
Address Misunderstandings Constructively
Clarify Intentions: If a misunderstanding occurs, calmly clarify your intentions and seek to understand the other person's viewpoint.
Apologize When Necessary: If you realize that your words or actions have hurt someone, offer a sincere apology and make amends.
5
Stand Against Online Harassment and Bullying
Speak Up: If you witness online harassment or bullying, take a stand against it by supporting the victim and reporting the behaviour.
Support Victims: Offer empathy and support to those who have been targeted by online abuse, showing them that they are not alone.
6
Promote Positive Interactions
Share Positive Content: Share content that uplifts and inspires others, contributing to a positive online atmosphere.
Recognize and Celebrate Achievements: Acknowledge and celebrate the achievements and contributions of others in the digital community.
7
Reflect on Your Online Behaviour
Self-Awareness: Regularly reflect on your online interactions and consider how your words and actions impact others.
Continuous Improvement: Strive to improve your online behaviour by learning from past mistakes and seeking to be more empathetic and respectful.
8
Educate Others About Digital Empathy
Raise Awareness: Educate friends, family, and colleagues about the importance of digital empathy and respect.
Lead by Example: Model empathetic and respectful behaviour in your online interactions, setting a positive example for others.
9
Foster a Safe Online Community
Create Safe Spaces: Work towards creating online communities where members feel safe and supported to express themselves.
Establish Community Guidelines: Develop and enforce community guidelines that promote empathy, respect, and constructive dialogue.
10
Support Mental Well-being
Recognize the Impact of Words: Understand that online interactions can significantly impact mental well-being. Be considerate and supportive in your communications.
Encourage Seeking Help: If you notice someone struggling with their mental health, encourage them to seek professional help and offer your support.
By promoting digital empathy and respect, we can contribute to a more compassionate and understanding online environment. These practices help to reduce the prevalence of technology-facilitated gender-based violence and create a safer, more inclusive digital space for everyone.
Effective advocacy against technology-facilitated gender-based violence (TFGBV) should be guided by three critical pillars: ethical data and measurement practices, responsible business and technology development, and robust legal and policy frameworks.
The collection and analysis of data on technology-facilitated gender-based violence (TFGBV) are crucial for understanding its impact and scope. Although data and research revealing the detrimental effects of TFGBV on survivors and societies are becoming more accessible, standardized tools for safe and ethical data collection remain scarce. This limitation arises from the evolving and context-specific nature of TFGBV, necessitating a consensus on ethical and intersectional approaches in data handling. The core principles for ethical data practices include ensuring data neutrality, contextual understanding, and reflective analysis.
Moreover, ethical data collection must address issues like digital extractivism, which condemns the exploitative practices of technology companies that harvest data for profit without benefiting the communities involved. Ethical data practices should not replicate these exploitative methods but instead empower survivors and protect their data. Ethical data practices should ensure participant safety, authentic consent, and the right to data deletion. Furthermore, data storage and management protocols must include encryption, anonymization, and controlled access to mitigate risks.
Women and feminist voices continue to be sidelined in product development, leading to the creation of unsafe technologies that heighten risks for survivors of gender-based violence (GBV). The pervasive design of technology with a default male user exacerbates these harms as digital interactions become increasingly prevalent.
Advocating for ethical and feminist frameworks is crucial to dismantling these harmful practices. Initiatives like Callisto Vault highlight survivor-cantered technologies that empower individuals to securely document abuse and access legal support anonymously. These innovations challenge traditional tech paradigms by prioritizing transparency, privacy, and accountability as fundamental protections.
Major tech firms such as Apple and Microsoft have also demonstrated efforts to combat TFGBV with tools like Apple's Safety Check, which enables users to manage information sharing securely while safeguarding their privacy. Microsoft's AI-driven solutions focus on anonymizing data and identifying abuse patterns, aiming to enhance digital safety without compromising user privacy.
Effective strategies must integrate survivor-cantered design principles into tech solutions and involve collaborative efforts among stakeholders—NGOs, policymakers, and tech companies—to establish global standards ensuring safety and equity across diverse contexts. Addressing digital literacy disparities and countering exploitative practices by tech monopolies are critical steps toward fostering inclusive and secure digital environments worldwide.
Despite advancements holding perpetrators of TFGBV accountable through legal frameworks remains fraught with challenges. Existing laws often lag behind rapidly evolving technologies and emerging forms of violence. While there is increasing recognition of TFGBV as a human rights violation affecting rights such as access to information, freedom from violence, privacy, and participation in public life, implementation and enforcement gaps persist. Law enforcement frequently fails to enact appropriate measures to address TFGBV effectively .
The need for a coordinated global agenda to combat TFGBV is critical, recognizing disparities between countries in developing robust legal frameworks and influencing global tech giants. A brief situation overview in partner countries could be added.
At the 2022 Global Symposium on TFGBV, participants highlighted the importance of rights-based frameworks in developing legal and policy responses. Speakers, including Nina Jankowicz, an American researcher and writer, shared personal experiences with TFGBV to illustrate its widespread effects on public discourse and democracy. Marcela Hernández Oropa's efforts were pivotal in the creation of Mexico's "Ley Olimpia" (Olimpia Law), which criminalizes the non-consensual sharing of intimate images, setting an important precedent in Latin America in 2021. She is also a feminist activist and expert in public policy and gender studies, co-founding OlimpIA, a platform to support victims of digital violence.
Jan Moolman from the Association for Progressive Communications (APC) warned against focusing too heavily on criminalization in policy measures, advocating for approaches that emphasize transformative justice—an approach that seeks to address the root causes of harm, support healing, and foster accountability outside of punitive systems—while prioritizing the needs of survivors. Nighat Dad from the Digital Rights Foundation highlighted the dangers of overly broad legislation, which can stifle freedom of expression, and emphasized the need for context-specific regulations that protect rights while effectively addressing TFGBV.
Ella Serry, representing Australia's eSafety Commissioner, described comprehensive regulatory frameworks aimed at prevention, protection, and systemic change in online safety. These frameworks emphasize survivor-centered responses and collaboration with technology companies to ensure accountability and secure digital spaces.
Key challenges identified during the symposium included the misuse of regulations against activists, the influence of cultural and local contexts on content moderation, and the necessity for policies that balance privacy and safety. There was a consensus on the need for global standards and international cooperation to tackle TFGBV effectively, advocating for regulatory approaches that respect human rights while holding technology companies accountable.
“Her rights in the digital space” was a training session organized by The Ekaterina Karavelova Foundation in collaboration with Iliana Balabanova, president of the European Women’s Lobby and founder and chairperson of the Bulgarian Platform to the European Women’s Lobby. The goal of the training was to address the issue of online abuse and explore potential solutions. Participants in the training sessions were NGO workers, activists, and political party members.
The "After the Storm: how to recover political dialogue and supportive discourse against gender-based cyber violence in Bulgaria" report was produced by foundation BlueLink, in collaboration with the Media Democracy Foundation and the Gender Alternatives Foundation in 2020. The report explores the challenges of restoring policy dialogue on gender-based violence (GBV) online in Bulgaria, and examines how civil society and state institutions can improve communication strategies to tackle online GBV, such as harassment and hate speech. The study aims to create a more supportive discourse and develop tools for preventing and addressing digital violence against women.
The "Warriors against GBV" project, running from March 2022 to October 2023, aimed to innovatively train and empower youth workers to support young people affected by gender-based violence. A key focus was on the digital world, with the development of the Warriors platform for organizations and individuals. This platform included questionnaires, self-assessment tests, and a secure virtual space for community building and publicizing project activities. The project also involved creating a methodology for safe spaces both online and offline, encouraging youth workers to engage with new approaches and participate in the digital Warriors platform. The initiative aimed to educate, raise awareness, and strengthen efforts to combat gender-based violence through digital tools and community support.
More about the project: https://lygus.lt/projektai/karzygiai-pries-smurta-lyties-pagrindu/
The "#CYBERSMART: digital education for early violence prevention" project was the first initiative in Lithuania to create a digital educational program aimed at the early prevention of gender-based violence, particularly cyber violence. Running from March to December 2021, the project targeted professionals working with youth aged 13-20, educators, parents, and guardians. It aimed to enhance the skills of these professionals in gender equality, gender-based violence prevention, and virtual leadership. Key activities included virtual presentations, the development and piloting of digital tools, training programs for professionals and young trainers, and a social campaign called "Digital Stories" to raise awareness and educate on preventing gender-based cyber violence.
More about the project: www.missing.lt/project/cybersmart-skaitmenine-edukacija-ankstyvajai-smurto-prevencijai/
The "Female Pleasure" project, running from April 1, 2023, to March 31, 2024, aimed to educate, inspire, and empower young people to address the gender gap in the media. This youth exchange brought together 24 participants from Turkey and Lithuania, focusing on examining gender inequalities and stereotypes in media, raising awareness about their societal impacts, and fostering discussions on digital dangers such as sexism and cyber-violence. By encouraging the use of media as a tool for change, the project sought to promote gender equality, social inclusion, and human rights.
More about the project: www.erasmus-plus.ec.europa.eu/projects/search/details/2022-3-LT02-KA152-YOU-000092983
Italy has launched several initiatives to combat Technology-Facilitated Gender-Based Violence (TFGBV) and support victims through innovative digital tools.
The "Against Cyber Violence" project, launched in January 2021, educates young people and professionals about the dangers of cyber violence, providing educational resources, self-assessment tools, and a secure space for victims to seek support.
The "Digital Safety for Women" campaign educates women about online safety and provides resources to protect themselves from TFGBV.
The "Youth Against Digital Abuse" initiative educates and mobilizes young people to combat TFGBV, developing a youth-friendly digital platform and training sessions for young leaders.
The "Safe Online Spaces" project focuses on creating secure digital environments for women and vulnerable groups, offering services like online counseling, legal advice, and educational resources.
The "Empowerment Through Digital Literacy" program focuses on enhancing digital literacy among women to prevent TFGBV, offering courses on digital skills, cybersecurity, and online privacy.
The "Women's Digital Resilience" network connects women affected by TFGBV with support services and resources, including a digital platform for sharing experiences, accessing legal and psychological support, and participating in workshops on digital resilience.
This handbook marks an important step forward in addressing technology-facilitated violence and represents a combined effort by Solidarity Works, Menas ir inovacijos, and 7HUB to offer a tangible response to a pressing issue. By equipping women with critical insights and practical strategies, the ESSENTIAL project addresses the need for accessible tools to confront digital violence confidently and effectively. This handbook is more than a compilation of best practices; it is a call for transformation—inviting women, communities, and society at large to acknowledge and address the widespread impact of online violence.
The ESSENTIAL project’s commitment to digital safety goes beyond individual empowerment. It aims to catalyse a movement that promotes solidarity, digital literacy, and gender equality across different communities. With resources like this handbook, we aspire to create a ripple effect, where educated and empowered women can serve as advocates, mentors, and allies within their own networks. By fostering community-based support, digital resilience, and legal awareness, the ESSENTIAL project seeks to normalize conversations around technology-facilitated violence and inspire a culture of respect and responsibility online.
As you conclude this handbook, remember that you are not alone in this journey. The support community established through ESSENTIAL offers a network of like-minded women and advocates ready to share experiences, advice, and encouragement. We hope this handbook not only provides immediate guidance but also acts as a lasting resource to revisit, share, and use as a foundation for building safer digital spaces for all. Together, we can create a future where every woman feels empowered and safe, both online and offline
Understanding Technology-Facilitated Gender-Based Violence
Van Der Wilk, I. (2018). Gender-based violence: Definitions and context. In Handbook of Gender Studies.
United Nations General Assembly. (2018). Report of the Special Rapporteur on Violence Against Women, its Causes and Consequences. A/HRC/38/47.
Henry, N., & Powell, A. (2018). Technology-facilitated sexual violence: A literature review of empirical research. Trauma, Violence, & Abuse, 19(2), 195-208.
Winter, R. (2019). The impact of technology on gender-based violence. Journal of Gender Studies, 28(1), 1-15.
Massanari, A. (2017). “#Gamergate and the Fappening: How Reddit’s algorithm, governance, and culture support toxic technocultures.” New Media & Society, 19(3), 329–46.
Plan International. (2020). Free to be online? Girls’ and young women’s experiences of online harassment. Surrey, UK: Plan International. Link.
Dunn, S. (2020). Supporting a Safer Internet Paper No. 1: Technology-Facilitated Gender-Based Violence: An Overview. Centre for International Governance Innovation.
Valente, M. G., Neris, N., & Bulgarelli, L. (2015). “Not Revenge, Not Porn: Analysing the Exposure of Teenage Girls Online in Brazil.” Global Information Society Watch.
McGlynn, C., Rackley, E., & Houghton, R. (2017). “Beyond ‘revenge porn’: The continuum of image-based sexual abuse.” Feminist Legal Studies, 25(1), 25–46.
Citron, D. K. (2019). “Sexual Privacy.” Yale Law Journal, 128(7), 1870–1960.
Powell, A., & Henry, N. (2017). Sexual Violence in a Digital Age. London, UK: Palgrave MacMillan.
Wittes, B., Poplin, C., Jurecic, Q., & Spera, C. (2016). Sextortion: Cybersecurity, teenagers, and remote sexual assault. Brookings Institute. Link.
Palmer, T. (2018). “Rape pornography, cultural harm and criminalization.” Northern Ireland Legal Quarterly, 69(1), 37–58.
Chesney, R., & Citron, D. K. (2019). “Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security.” California Law Review, 107, 1753–1819.
eSafety Commissioner. (2019). eSafety for Women from Culturally and Linguistically Diverse Backgrounds. Link.
Citron, D. K. (2014). Hate Crimes in Cyberspace. Cambridge, MA: Harvard University Press.
Awan, I., & Zempi, I. (2016). “The affinity between online and offline anti-Muslim hate crime: Dynamics and impacts.” Aggression and Violent Behavior, 27, 1–8.
Laub, Z. (2019). “Hate Speech on Social Media: Global Comparisons.” Council on Foreign Relations, June 7. Link.
Advocates for Human Rights, the Bulgarian Gender Research Foundation, & Alliance for Protection Against Gender-Based Violence. (2019). Stakeholder Report for the United Nations Universal Periodic Review. Available at theadvocatesforhumanrights.org.
Official Statistics Portal. (2024). People who have experienced violence. Retrieved June 19, 2024. Link.
Bates, S. (2016). “Revenge Porn and Mental Health: A Qualitative Analysis of the Mental Health Effects of Revenge Porn on Female Survivors.” Feminist Criminology, 12(1), 22–42.
Gurumurthy, A., Vasudevan, A., & Chami, N. (2019). Born digital, Born free? A socio-legal study on young women’s experiences of online violence in South India. Bangalore, India: IT for Change. Link.
Parsons, C., Molnar, A., Dalek, J., Knockel, J., Kenyon, M., Haselton, B., Khoo, C., & Deibert, R. (2019). The Predator in Your Pocket: A Multidisciplinary Assessment of the Stalkerware Application Industry. Citizen Lab. Link.
Cuellar, L., & Chaher, S. (2020). Ser periodista en Twitter. Violencia de género digital en América Latina. Fundación Sentiido, Comunicación para la Igualdad Ediciones, UNESCO.
Debarge, C., & Prtorić, J. (2022, February 23). The European-wide battle to crack down on revenge porn. Equal Times. Link.
Contreras, B. (2024). Tougher AI Policies Could Protect Taylor Swift—And Everyone Else—From Deepfakes. Scientific American. Link.
Coping Mechanisms and Strategies
Hanh, T. N. (1975). The Miracle of Mindfulness: An Introduction to the Practice of Meditation.
Kabat-Zinn, J. (1990). Full Catastrophe Living: Using the Wisdom of Your Body and Mind to Face Stress, Pain, and Illness.
Goleman, D. (1995). Emotional Intelligence: Why It Can Matter More Than IQ.
Reivich, K., & Shatte, A. (2002). The Resilience Factor: 7 Keys to Finding Your Inner Strength and Overcoming Life's Hurdles.
Davis, M., Eshelman, E. R., & McKay, M. (2008). The Relaxation and Stress Reduction Workbook.
Brown, B. (2012). Daring Greatly: How the Courage to Be Vulnerable Transforms the Way We Live, Love, Parent, and Lead.
Privacy Measures
James, V. K., & McKay, J. (2018). The Legal Information Needs of Women Who Experience Online Harassment. Link.
Bailey, J. (2015). A Perfect Storm: How the Online Environment, Social Norms and Law Shape Girls' Lives. Link.
Thomas, K., Akhawe, D., & Bailey, M. (2021). SoK: Hate, Harassment, and the Changing Landscape of Online Abuse. Link.
Legal Rights
Sexual Harassment in the European Union: A Pervasive but Still Hidden Form of Gender-Based Violence. Link.
Developments in Italian Criminal Law on Cyber-Violence Against Women. Link.
Steps for obtaining a protective order, WomensLaw.org (2024). Link.