Threats for Women in Cyberspace: Be Protected Using Internet

被引:0
|
作者
Radionova-Girsa, Elina [1 ]
机构
[1] Daugavpils Univ, Daugavpils, Latvia
关键词
cyberspace; cybercrime; women protection;
D O I
暂无
中图分类号
D58 [社会生活与社会问题]; C913 [社会生活与社会问题];
学科分类号
摘要
Often, women are vulnerable in their daily lives, so many activists nowadays are trying to influence the society in order to understand how to deal with different situations and how to deal with women in those situations. However, it should not be forgotten that additional threats and problems appeared with the advent of technology. It's hard to trace criminals and perpetrators in cyberspace, because there is no border here, and it takes just a few clicks to reach the victim. On a daily basis using the Internet, various websites and social networks are faced with various threats, such as cyberbullying, sexting, bossing, etc. Especially vulnerable are women here. Often women are shy to reveal to others that there is something bad or has already occurred, they do not want to be publicly embarrassed, so still a very large number of women who are subject to attacks in cyberspace are unidentified. The author wants to see various cyber threats and crimes happening in the Internet environment both in the world and in Europe. Preventive measures that will allow women and Internet users to feel safe in this environment will also be addressed. The article is to present the main threats to the Internet among women and to offer opportunities for how to be safe. The main tasks are to identify among all threats in cyberspace direct threats against women, to find the opportunity to protect women and raise their awareness of issues. The paper mainly uses empirical methods, as well as analysis of literature and scientific research, legal aspects of different countries. The results can be used both theoretically and practically. They will help women around the world become aware of the dangers of cyberspace and protect themselves.
引用
收藏
页码:742 / 748
页数:7
相关论文
共 50 条
  • [41] Study of Internet Threats and Attack Methods Using Honeypots and Honeynets
    Sochor, Tomas
    Zuzcak, Matej
    COMPUTER NETWORKS, CN 2014, 2014, 431 : 118 - 127
  • [42] Study of Internet Threats and Attack Methods Using Honeypots and Honeynets
    Sochor, Tomas
    Zuzcak, Matej
    Communications in Computer and Information Science, 2014, 431 : 118 - 127
  • [43] An assessment of threats to terrestrial protected areas
    Schulze, Katharina
    Knights, Kathryn
    Coad, Lauren
    Geldmann, Jonas
    Leverington, Fiona
    Eassom, April
    Marr, Melitta
    Butchart, Stuart H. M.
    Hockings, Marc
    Burgess, Neil D.
    CONSERVATION LETTERS, 2018, 11 (03):
  • [44] Ecotourism in protected areas - Chances and threats
    Kurczewski, R
    EKOLOGIA-BRATISLAVA, 2001, 20 : 403 - 407
  • [45] STUDY ON THE MODELING AND ANALYZING OF THE ROLE-BASED THREATS IN THE CYBERSPACE
    Hao, Yeli
    Guo, Shize
    Zhao, Hong
    Chen, Zhe
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 1302 - 1306
  • [46] The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
    Lehto, Martti
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 1 - 18
  • [47] Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World
    Patron, Brett J.
    NAVAL WAR COLLEGE REVIEW, 2013, 66 (01) : 129 - +
  • [48] Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World
    Stevens, Tim
    CONTEMPORARY SECURITY POLICY, 2013, 34 (01) : 254 - 256
  • [49] Anatomy of Threats to the Internet of Things
    Makhdoom, Imran
    Abolhasan, Mehran
    Lipman, Justin
    Liu, Ren Ping
    Ni, Wei
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1636 - 1675
  • [50] LEGAL SNARLS FOR WOMEN IN CYBERSPACE
    KRAMARAE, C
    KRAMER, J
    INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY, 1995, 5 (02): : 14 - &