香港六合彩中特网

XClose

香港六合彩中特网 Department of Science, Technology, Engineering and Public Policy

Home
Menu

Updated 鈥淕ender and IoT鈥 resource list launched on International Women鈥檚 Day 2019

8 March 2019

A new publication offers much-needed advice and guidance on technology-facilitated forms of abuses.

Image of a woman with a smart device

鲍颁尝鈥檚 Gender and IoT (G-IoT) has launched its latest resource list to better inform and guide victims and survivors of technology-facilitated abuse (鈥渢ech abuse鈥) as well as those working with them. The publication coincides with (#IWD2019), the annual global day that calls to action for accelerating gender equality and aims to celebrate the political, social, economic, and cultural achievements of women.

Why Tech Abuse?

Domestic violence and abuse continue to affect primarily women and girls, with more than in England and Wales having reported to experience domestic abuse ending March 2018. In recent years, forms of online harassment and sexual abuse facilitated through information and communication technologies (ICT) emerged. These technology-facilitated abuse cases describe the subversion of technological systems such as physical objects or network-enabled devices to coerce, control, and harm a person or groups of individuals.

Tech abuse stretches across an array of applications and platforms and encompasses a diversity of actions, tools, and tactics. As technologies, especially digital technologies, are continuously evolving, so are their forms of exploitation and misapplication. In light of the increasing number of 鈥渟mart鈥, Internet-connected devices, 鲍颁尝鈥檚 G-IoT research team has started to examine the gender-based implications of 鈥淚nternet of Things鈥 (IoT) systems. The latter includes smart meters, locks, and cameras, with a G-IoT policy leaflet offering information on the full extent of these IoT systems in our households.

The Resource List

The updated resource list brings together new links to organisations which produce guidelines and advice on tech abuse and serves as a reference point for victims and survivors as well as statutory and voluntary support services. The original version of the resource list was released in July 2018 and has since then been widely used to inform on common cybersecurity practices and privacy risks. The resource list includes an IoT-specific section, general resources on digital security for women, and points to digital security best practices for children.

You can freely access and download the resource list here.