Abstract
Gender Violence is one of the most dreaded forms of violence that is inflicted on the basis of gender. Earlier it was considered to be against women but in the current day, gender violence is just not limited to only women. There have been many cases who have been abused, humiliated, and exploited irrespective of their gender. What meant to be so much user-friendly created a pathway of destruction for them in their lives. Some were blackmailed and threatened after being abused and humiliated. Therefore, technology was the only means to come out of this deadly trap and lead a normal life again. Therefore, this paper is an attempt to study the implication of technology and explore ways and means to stop the digital violence which takes place among the users who are students and are much prone to using social media.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gender based violence and unwanted sexual behavior in Canada, 2018. Available at https://www150.statcan.gc.ca/n1/daily-quotidien/191205/dq191205b-eng.htm ii. European Union (2018). Cyber violence and hate speech online against women. Available at https://www.europarl.europa.eu/RegData/etudes/STUD/2018/604979/IPOL_STU(2018)604979_EN.pdf iii. Pew Research Center (2017). Online Harassment 2017. Available at https://www.pewresearch.org/internet/2017/07/11/online-harassment-2017/iv.European Union Agency for Fundamental Rights (2014). Violence against women: an EU-wide survey. Available at https://fra.europa.eu/sites/default/files/fra_uploads/fra-2014-vaw-survey-main-results-apr14_en.pdfv. Digital Rights Foundation (2017). Measuring Pakistan Women’s Experiences of Online Violence. Available at https://digitalrightsfoundation.pk/wp-content/uploads/2017/05/Hamara-Internet-Online-Harassment-Report.pdf
African Development Bank Group. (2016). Minding the gaps: Identifying strategies to address gender-based cyberviolence in Kenya.
https://www.afdb.org/fileadmin/uploads/afdb/Documents/Generic-Documents/Policy_Brief_on_Gender_Based_Cyber_Violence_in_ Kenya.pdf. 2 Burton, P.
Mutongwizo, T. (2009). Inescapable violence: Cyber bullying and electronic violence against young people in South Africa. Centre for Justice and Crime Prevention., 8, 1–12.
De Lange, M., & von Solms, R. (2012). An e-safety educational framework in South Africa. In Southern Africa Telecoms and Network Applications Conference (SATNAC).
http://www.satnac.org.za/proceedings/2012/papers/3.Internet_Services_End_User_Applications/53.pdf. Duggan, M. Online Harassment. Pew Research Center. 2014.
http://www.pewinternet.org/2014/10/22/online-harassment/. Ojanen, T. T., Boonmongkon, P., Samakkeekarom, R., Samoh, N., Cholratana, M., & Guadamuz, T. E. (2015). Connections between online harassment and offline violence among youth in Central Thailand. Child Abuse & Neglect, 44, 159–69.
Temple, J. R., Choi, H. J., Brem, M., Wolford-Clevenger, C., Stuart, G. L., Peskin, M. F., & Elmquist, J. (2016). The temporal association between traditional and cyber dating abuse among adolescents. Journal of Youth and Adolescence, 45(2), 340–349.
Yahner, J., Dank, M., Zweig, J. M., & Lachman, P. (2015). The co-occurrence of physical and cyber dating violence and bullying among teens. Journal of Interpersonal Violence, 30(7), 1079–1089.
Zweig, J. M., Dank, M., Yahner, J., & Lachman, P. (2013). The rate of cyber dating abuse among teens and how it relates to other forms of teen dating violence. Journal of Youth and Adolescence, 42(7), 1063–1077.
Citron, D. K. (2009). Law’s expressive value in combating cyber gender harassment. Michigan Law Review, 373–415.
Mantilla, K. (2015). Gendertrolling: How misogyny went viral. ABC-CLIO.
Bauman, S., Toomey, R. B., & Walker, J. L. (2013). Associations among bullying, cyberbullying, and suicide in high school students. Journal of Adolescence, 36(2), 341–350.
Jakobsson, M. (Ed.) (2016). Understanding Social Engineering Based Scams (pp. 103–113) https://doi.org/10.1007/978-1-4939-6457-4_10; and Rege, A. (2009). What’s love got to do with it? Exploring online dating scams and identity fraud. International Journal of Cyber Criminology, 3(2). https://www.cybercrimejournal.com/aunshulregedec2009.htm
Shires, J. (2018). Enacting expertise: Ritual and risk in cybersecurity. Politics and Governance, 6(2), 31–40. https://doi.org/10.17645/pag.v6i2.1329
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Mishra, D., Sain, M. (2024). Implication of Technology to Curb Digital Violence Among Women on Social Media Platforms. In: Mishra, D., Ngoc Le, A., McDowell, Z. (eds) Communication Technology and Gender Violence. Signals and Communication Technology. Springer, Cham. https://doi.org/10.1007/978-3-031-45237-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-45237-6_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-45236-9
Online ISBN: 978-3-031-45237-6
eBook Packages: EngineeringEngineering (R0)