Search results
1 – 10 of 57Violence against women and girls is globally prevalent. Overcoming it is a prerequisite for attaining gender equality and achieving sustainable development. The United Nation's…
Abstract
Violence against women and girls is globally prevalent. Overcoming it is a prerequisite for attaining gender equality and achieving sustainable development. The United Nation's 2030 Agenda for Sustainable Development considers technology as a means to combat violence against women and girls, and there is ample evidence on the positive impact of technology in combating violence. At the same time, however, technology can promote and perpetrate new forms of violence. Research shows that more than 70% of women and girls online are exposed to forms of cyber violence. Most of these cases remain unreported.
This chapter argues that technology contributes to increasing cyber violence against women and girls which in turn leads to severe social and economic implications affecting them. It also argues that legislative and policy reforms can limit this type of violence while enabling women and girls to leverage technology for empowerment. It highlights cases of cyber violence in the Arab region and provides an overview of applicable legislative frameworks. The chapter concludes with recommended policy reforms and measures to strengthen and harmonize efforts to combat cyber violence against women and girls in the Arab region.
Details
Keywords
Kuldeep Singh Kaswan, Jagjit Singh Dhatterwal, Sanjay Kumar and Sandeep Lal
Purpose: A cyber insurance policy’s purpose is to help in the recovering of a person or corporation following a cyber breach and to compensate for civil suit expenses stemming…
Abstract
Purpose: A cyber insurance policy’s purpose is to help in the recovering of a person or corporation following a cyber breach and to compensate for civil suit expenses stemming from first- and third-party responsibility claims.
Methodology: The usage of cybersecurity spending has forecast a variety of security categories using F&S projection methodology. Each of these is suited to the end-user organisations of in-scope security mechanisms, as well as the particular market circumstances. Critical national infrastructure (CNI), immigration control, big events, first responding, executive branch, infrastructure, and transportation security are among the worldwide forecast categories. This segmentation is further subdivided into 16 subsegments, each with its own security forecasting system. F&S protection marketplaces are anticipated using a bottom-up technique for each nation, which adds up to worldwide market penetration. This covers 177 nations spread throughout seven zones.
Findings: The cybersecurity insurer industry was valued at USD 7.36 billion in 2020 and is predicted to be worth USD 27.83 billion by 2026, growing at a compound annual growth rate (CAGR) of 24.30% during the forecast time frame (2021–2026). The expanding use of digitalisation innovations such as the cloud, big data, mobile computing, internet of things (IoT), and artificial intelligence (AI) across more lines of employment and society, as well as improved connectivity, have enhanced the burden of already overburdened information technology (IT) staff.
Practical implications: Accepted the innovative Insurance Data Security Model Law (#668), which necessitates insurance providers and other agencies registered by government insurance agencies to advance, integrate, and establish an information security management system; start investigating any cybersecurity events; and advise the private insurance superintendent of such happenings. Too far, the approach has been embraced by governorates.
Details
Keywords
Farrokh Farrokhnia and Cameron Keith Richards
Purpose – Because businesses conducting e-commerce are often able to set up off-shore to avoid regulation, taxation, and other aspects of corporate responsibility, the…
Abstract
Purpose – Because businesses conducting e-commerce are often able to set up off-shore to avoid regulation, taxation, and other aspects of corporate responsibility, the developed-developing divide which tends to inform World Trade Organization (WTO) policies is especially an impediment to future global e-commerce. This chapter explores the particular accountability challenges represented by WTO e-commerce policies.Design/methodology/approach – The framework of inquiry focuses on a policy research study of relevant WTO e-commerce policy documents, especially the ones related to the negotiations under the WTO Work Program on Electronic Commerce and the GATS Agreement.Findings – The virtual nature of e-commerce interactions means that businesses are often able to circumvent the national boundaries and controls of conventional commerce. Because of this, the WTO and its e-commerce policy are crucial to the responsible and accountable development of future global e-commerce. Such policies need to be significantly improved as a matter of urgency to overcome current omissions and inadequacies.Research implications – Accountability gaps within WTO’s e-commerce policies provide a basis for companies from developed countries to set up off-shore to avoid their corporate social responsibilities. A constructive critique of international agency policy documents is able to provide a basis for recommending change and improvement to the overall WTO framework.Practical and social implications – Companies should profess genuine rather than merely surface commitment to global as well as local corporate social responsibilities. Likewise the WTO should also aim to practice deep rather than “shallow” accountability by aiming to rectify omissions and inequities in its e-commerce policies.
Details
Keywords
Seonaid Stevenson-McCabe and Sarai Chisala-Tempelhoff
Technology-facilitated violence and abuse including image-based sexual abuse (IBSA) is a phenomenon affecting women and girls around the world. Abusers misuse technology to attack…
Abstract
Technology-facilitated violence and abuse including image-based sexual abuse (IBSA) is a phenomenon affecting women and girls around the world. Abusers misuse technology to attack victims and threaten their safety, privacy, and dignity. This abuse is gendered and a form of domestic and sexual violence. In this article, the authors compare criminal law approaches to tackling IBSA in Scotland and Malawi. We critically analyze the legislative landscape in both countries, with a view to assessing the potential for victims to seek and obtain redress for IBSA. We assess the role criminal law has to play in each jurisdiction while acknowledging the limits of criminal law alone in terms of providing redress.
Details
Keywords
Eileen M. Decker, Matthew Morin and Eric M. Rosner
This chapter explores the laws and unique challenges associated with the investigation and prosecution of cybercrime. Crimes that involve the misuse of computers (e.g., hacking…
Abstract
This chapter explores the laws and unique challenges associated with the investigation and prosecution of cybercrime. Crimes that involve the misuse of computers (e.g., hacking, denial of service, and ransomware attacks) and criminal activity that uses computers to commit the act are both covered (e.g., fraud, theft, and money laundering). This chapter also describes the roles of the various federal agencies involved in investigating cybercrime, common cybercrime terms and trends, the statutes frequently used to prosecute cybercrimes, and the challenges and complexity of investigating cybercrime.
Details