Cybersexual violence
Cybersexual violence
There is no universally-accepted definition of cybersexual violence. However, it can be described as using social media and communication technologies for the following:
Sexual comments or advances
Attempts to obtain a sexual act
Unwanted sexual acts
Sexual coercion
It can also be spreading rumours online, sending damaging messages, photos or videos, impersonation and much more. All these behaviours aim to damage a person’s feelings, self-esteem, reputation and mental health. (Definition: uOttawa)
Cyberbullying is a form of bullying that takes place in a virtual space and is at times of a sexual nature.
Cybersexual violence, on the other hand, primarily targets girls and women in a sexual manner. It’s tied, among other things, to sexism and misogyny.
Nevertheless, the two behaviours have common features:
Accessibility and relentlessness
The attacks may be experienced at any hour of any day in typically “safe” locations such as home.
Anonymity
Perpetrators can use deception or anonymity to undertake their activities.
Audience
The online realm has a potentially huge audience.
Loss of inhibitions
Perpetrators feel less empathy and find it easier to be cruel when they cannot see or be seen by their target.
Cybersexual violence can take many forms.
The following are just a few examples:
Cyber-harassment and cyber-stalking: monitoring or disruption online communications, making threats, stealing personal information or spreading false accusations
Distributing sexual recordings, images or messages without consent in order to harass or shame the targeted individual
Luring and online exploitation of minors by adults who establish contact with children over the Internet for the purpose of committing a sexual offence
Online sexual assault: constant threats of sexual assault
Sextorsion: “sexual blackmail” in which a person is threatened with the electronic distribution of sexual images or information
Online sexual exploitation and sexual abuse of children
Children seem to represent a primary group of victims of cyberviolence, in particular with respect to online sexual violence.
While the “online sexual exploitation and sexual abuse of children” are not necessarily new and distinct forms of sexual exploitation and sexual abuse of children, ICTs have increased the accessibility to children by persons looking to sexually abuse and exploit them. ICTs facilitate the sharing of images and videos of the sexual abuse and thus reinforce the long-lasting harmful impact of the abuse of children. ICTs also contribute to making commercial gains from sexual exploitation of children easier. ICTs however do not, in and by themselves, give rise to distinct types of sexual offences against children.
Online sexual exploitation and sexual abuse of children includes the behaviour listed in articles 18 to 23 of the Lanzarote Convention and in article 9 of the Budapest Convention in an online environment or otherwise involving computer systems:
Sexual abuse (article 18), that is, “a) engaging in sexual activities with a child who, according to the relevant provisions of national law, has not reached the legal age for sexual activities; or b) engaging in sexual activities with a child where:
use is made of coercion, force or threats; or
abuse is made of a recognised position of trust, authority or influence over the child, including within the family; or
abuse is made of a particularly vulnerable situation of the child, notably because of a mental or physical disability or a situation of dependence.“
Child prostitution (article 19), that is, “a) recruiting a child into prostitution or causing a child to participate in prostitution; b) coercing a child into prostitution or profiting from or otherwise exploiting a child for such purposes; or c) having recourse to child prostitution.”
Child pornography (article 20), that is, “a) producing child pornography; b) offering or making available child pornography; c) distributing or transmitting child pornography; d) procuring child pornography for oneself or for another person; e) possessing child pornography; f) knowingly obtaining access, through information and communication technologies, to child pornography”. “Child pornography” shall mean any material that visually depicts a child engaged in real or simulated sexually explicit conduct or any depiction of a child’s sexual organs for primarily sexual purposes.
Corruption of children (article 22), that is, “the intentional causing, for sexual purposes, of a child who has not reached the age [below which it is prohibited to engage in sexual activities with a child] to witness sexual abuse or sexual activities, even without having to participate”.
Solicitation of children for sexual purposes (article 23) – also called “grooming” – that is, “the intentional proposal, through information and communication technologies, of an adult to meet a child who has not reached the age set [below which it is prohibited to engage in sexual activities with a child] for the purpose of committing any of the offences established in accordance with article 18, paragraph 1.a [engaging in sexual activity with a child], or article 20, paragraph 1.a [producing child pornography], against him or her, where this proposal has been followed by material acts leading to such a meeting”.
Online sexual exploitation and sexual abuse are major forms of cyberviolence targeting children.
Computer systems may be used in connection to rape and other acts of sexual violence, or extortion.
Many forms of cyberviolence represent or are related to a violation of victims’ privacy.
This may include computer intrusions to obtain, steal, reveal or manipulate intimate data, the researching and broadcasting of personal data (“doxing”), or acts such as “cyberstalking” or “sextortion/revenge porn”.
Online distribution of sexually graphic photographs or videos without the consent of the individual in the images. The perpetrator is often an ex-partner who obtains images or videos in the course of a prior relationship, and aims to publicly shame and humiliate the victim, in retaliation for ending a relationship. However, perpetrators are not necessarily partners or ex-partners and the motive is not always revenge.
Images can also be obtained by hacking into the victim’s computer, social media accounts or phone, and can aim to inflict real damage on the target’s ‘real-world’ life (for example, intending to cause a person to be fired from their job, or in some cases causing suicide).
An estimated one in eight people 18 years or older in the United States has experienced sexually explicit image-based abuse, also known as non-consensual pornography.
An alarming 3 in 5 Australians have experienced digital harassment and 1 in 10 had a nude image of them distributed without their consent.
Cyber Harassment
What is Cyber Harassment?
source Trent University
Definition
According to the Royal Canadian Mounted Police, cyber harassment “involves the use of communication technologies such as the Internet, social networking sites, websites, email, text messaging and instant messaging to repeatedly intimidate or harass others.”
Things to look for:
Insulting or threatening emails, text messages, or posts
Spreading embarrassing or private photos online
Impersonating an individual on social media
Creating a website, forum, or group to insult or demean others
Blackmailing an individual with private information
Tricking someone into revealing personal information
Ways to Prevent and Intervene
For Survivors (you know what’s best, these are suggestions and they may not work in your situation):
It’s not your fault
Leave the online conversation
Keep evidence of the harassment through screenshots or written information
Report harassment on the social media site used
Inform the police if harassment involves criminal offences such as threats of violence, sexual exploitation, identity theft, or defamation
If within an education setting, contact school administrators
Block contact from the perpetrator
For Friends, Family, and Co-Workers of Cyber Harassment Victims
Talk to the victim, and let them know they do not have to deal with cyber harassment alone
Support them in documenting the harassment and reporting to the police
Provide opportunities for the victim and allow them to choose how they address the cyber harassment
If someone you know is perpetrating cyber harassment, speak with them about how their behaviour is harmful
If someone you know continues to perpetrate cyber harassment, consider reporting their actions to the police, school administrators, or workplace supervisors.