Mapping Study on Cyberviolence (Draft)

Total Page:16

File Type:pdf, Size:1020Kb

Mapping Study on Cyberviolence (Draft) Version 15 June 2018 T-CY(2017)10 Strasbourg, France Cybercrime Convention Committee (T-CY) Working Group on cyberbullying and other forms of online violence, especially against women and children (CBG) Mapping study on cyberviolence (Draft) prepared by the CBG for consideration by the T-CY at its 19th Plenary (9 July 2018) Note: Parties and observers are invited to send further comments, if any, by 29 June. It is suggested that the T-CY take note of the study and consider adoption of the recommendations (section 4.2) and follow up (section 4.3). www.coe.int/cybercrime T-CY mapping study on cyberviolence Contents 1 Introduction ............................................................................................................ 4 2 Mapping the phenomena .......................................................................................... 5 2.1 Overview of cyberviolence .................................................................................................. 5 2.1.1 Defining cyberviolence ................................................................................................ 5 2.1.2 Types of cyberviolence ............................................................................................... 6 2.2 Statistics ........................................................................................................................ 14 2.2.1 Data on cyberviolence against children ....................................................................... 14 2.2.2 Data on cyberviolence against women ........................................................................ 16 2.3 Challenges to the investigation and prosecution of cyberviolence ........................................... 18 2.4 Cyberviolence against women and children as addressed by Istanbul and Lanzarote Conventions ..................................................................................................................................... 20 2.4.1 “Lanzarote” Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse (CETS 201) ............................................................................................................... 20 2.4.2 Istanbul Convention on violence against women and domestic violence (CETS 210) ......... 23 2.5 Review of other national and international responses ........................................................... 24 2.5.1 Prevention .............................................................................................................. 25 2.5.2 Protection ............................................................................................................... 28 2.5.3 Prosecution ............................................................................................................. 30 2.5.4 Criminalisation of cyberviolence ................................................................................. 31 3 Cyberviolence against women and children: the role of the Budapest Convention ... 35 3.1 Substantive law ............................................................................................................... 35 3.1.1 Articles with a more-direct connection to cyberviolence ................................................ 35 3.1.2 Articles with a facilitating connection to cyberviolence .................................................. 35 3.2 Procedural law ................................................................................................................. 36 3.3 International cooperation .................................................................................................. 36 3.3.1 Preservation ............................................................................................................ 37 3.3.2 General cooperation principles ................................................................................... 37 3.3.3 Mutual assistance in accessing of stored data .............................................................. 37 3.3.4 Mutual assistance in the real-time collection of traffic data and mutual assistance in the interception of content data .................................................................................................. 37 3.4 The question of a Guidance Note ....................................................................................... 38 4 Findings and recommendations .............................................................................. 38 4.1 Findings (gaps and issues) ................................................................................................ 38 4.1.1 On the concept of cyberviolence ................................................................................ 38 4.1.2 Cyberviolence: Scope, impact and issues .................................................................... 38 4.1.3 National and international responses to cyberviolence .................................................. 39 4.1.4 Types of cyberviolence addressed or not addressed in international agreements .............. 40 4.1.5 Role of the Budapest Convention ............................................................................... 41 4.2 Recommendations ........................................................................................................... 41 4.3 Follow up ........................................................................................................................ 42 5 Appendix ............................................................................................................... 43 5.1 References/sources/bibliography ....................................................................................... 43 5.2 Websites ......................................................................................................................... 48 5.3 Links to references provided by Parties and Observers ......................................................... 48 5.3.1 Austria ................................................................................................................... 48 5.3.2 France .................................................................................................................... 48 5.3.3 Italy ....................................................................................................................... 48 5.3.4 Mauritius ................................................................................................................ 48 5.3.5 Norway ................................................................................................................... 49 5.4 Relevant international instruments ..................................................................................... 49 5.4.1 Binding instruments ................................................................................................. 49 2 T-CY mapping study on cyberviolence 5.4.2 Soft law/non-binding instruments .............................................................................. 50 5.5 Examples of domestic legislation and policies on cyberviolence .............................................. 53 5.5.1 Andorra .................................................................................................................. 53 5.5.2 Austria ................................................................................................................... 55 5.5.3 Canada ................................................................................................................... 56 5.5.4 Chile ...................................................................................................................... 57 5.5.5 Czech Republic ........................................................................................................ 58 5.5.6 Estonia ................................................................................................................... 63 5.5.7 France .................................................................................................................... 64 5.5.8 Finland ................................................................................................................... 69 5.5.9 Germany................................................................................................................. 70 5.5.10 Israel ..................................................................................................................... 72 5.5.11 Italy ....................................................................................................................... 73 5.5.12 Japan ..................................................................................................................... 75 5.5.13 Liechtenstein ........................................................................................................... 77 5.5.14 Mauritius ................................................................................................................ 82 5.5.15 Mexico .................................................................................................................... 82 5.5.16 Moldova .................................................................................................................. 85 5.5.17 Norway ................................................................................................................... 85 5.5.18 Slovakia.................................................................................................................. 88 5.5.19 Spain ....................................................................................................................
Recommended publications
  • Silenced by Free Speech: How Cyberabuse Affects Debate and Democracy
    Silenced by Free Speech: How cyberabuse affects debate and democracy Chapter in: Rethinking Cybercrime, Palgrave Macmillan. In press, publication date January 2017 Editors: Tim Owen, Wayne Noble, Faye Speed The early days of the internet promised much. Posting online seemed to offer a freedom from expectation and prejudice. In the words of the New Yorker cartoon, on the internet, nobody knows you’re a dog. We believed nobody knew your gender, age or race either. Your beauty or lack of it was of no account, your mind was disembodied, pure spirit, freed from the hidebound judgements of society. You could remove the mask you wear every day, revealing your true nature online to other disembodied spirits in a way that you never could to your family or colleagues. Perhaps you would find a new community to live in online, a community that thinks and feels as you do. Or instead of revealing yourself, you could create a new self. You could play with your identity more easily than playing with your hair colour, you could have a whole wardrobe of new selves if you want them. The internet offered freedom from the space constraints and word counts of newspapers, as well as from their gatekeepers, political stances and editorial guidelines. Here, anyone could be their own publisher for free, and could be heard all over the world without having their opinions edited down to fit a hole at the bottom of a column or a gap in a 90-second feature. You can’t fill the internet, so you could say everything you always wanted to say, as many times as you like.
    [Show full text]
  • Civility, Safety & Interaction Online
    Civility, Safety & Interaction Online February 2020 1 Study Methodology Adults 18-74, Teens 13-17 The 2019 report is based on the views of 12,520 14-minute Web survey adults and teens questioned across 25 countries Interviews conducted May 1-31, 2019 Argentina 502 Belgium 501 Brazil 502 Canada 500 Chile 503 Colombia 502 France 502 Germany 501 Hungary 500 India 502 Indonesia 501 Ireland 500 Italy 500 Malaysia 500 Mexico 500 Netherlands 504 Peru 500 Poland 500 Russia 500 Singapore 500 South Africa 500 Turkey 500 United Kingdom 500 Countries in Bold United States 500 new in 2019 Vietnam 500 2 42,000+ Interviews since 2016 25 Countries 21 Online Risks 2019 22 Countries 21 Online Risks 2018 23 Countries 2017 20 Online Risks 14 Countries 17 Online Risks 2016 3 3 Key Research Questions Core Trends New questions Digital Civility Index Current & future state of digital civility Sources of online risk Consumer’s aspirations for digital civility Pain caused by online risks Topics that generate uncivil behavior Consequences & Actions taken The number of times a risk has occurred Know where to find help 4 The Rising Tide of Incivility Pessimism and Hope The Digital Civility Index increased 4-points to 70%. About half of the twenty-five country DCI scores rose significantly, with fifteen countries registering their worst DCI since the study began in 2016. Many countries in the study have seen a rise of populist movements or politicians who employ incendiary rhetoric, fueling confrontational discourse that extends into the online world. Nearly four in ten adults said politics was at the center of rude, uncivil or abusive interactions online.
    [Show full text]
  • Systematic Review of Academic Bullying in Medical Settings: Dynamics and Consequences
    Open access Original research BMJ Open: first published as 10.1136/bmjopen-2020-043256 on 12 July 2021. Downloaded from Systematic review of academic bullying in medical settings: dynamics and consequences Tauben Averbuch ,1 Yousif Eliya,2 Harriette Gillian Christine Van Spall1,2,3 To cite: Averbuch T, Eliya Y, ABSTRACT Strengths and limitations of this study Van Spall HGC. Systematic Purpose To characterise the dynamics and consequences review of academic bullying of bullying in academic medical settings, report factors in medical settings: dynamics ► This systematic review is comprehensive, including that promote academic bullying and describe potential and consequences. BMJ Open 68 studies with 82 349 consultants and trainees, 2021;11:e043256. doi:10.1136/ interventions. across several countries and including all levels of bmjopen-2020-043256 Design Systematic review. training. We searched EMBASE and PsycINFO for Data sources ► We defined inclusion criteria a priori and used es- ► Prepublication history and articles published between 1 January 1999 and 7 February additional supplemental material tablished tools to assess the risk of bias of included for this paper are available 2021. studies. online. To view these files, Study selection We included studies conducted in ► The included studies varied in their definitions of please visit the journal online academic medical settings in which victims were bullying, sampling bias was noted among the sur- (http:// dx. doi. org/ 10. 1136/ consultants or trainees. Studies had to describe bullying veys and intervention studies were suboptimally bmjopen- 2020- 043256). behaviours; the perpetrators or victims; barriers or designed. facilitators; impact or interventions. Data were assessed Received 29 July 2020 independently by two reviewers.
    [Show full text]
  • The Legal 'Face' of Mobbing
    SEE - A Fortnight in Review February 13th legal | by Milica Janković Milica Janković specialises in targeting the victim’s congenital or ac- Labour Law at Belgrade's JPM - quired traits which are irrelevant to the Janković, Popović & Mitić Law Firm (www.jpm.rs). She may be reached performance of a specific job, since that The Typology at [email protected]. would constitute discrimination. Serbian jurisprudence, because of the insufficient level of professional expertise and difficulties in obtaining proof, is still With some variations, the following typology of behaviours has been adopted by several steps behind in this field, both as a number of academic researchers. The typology uses five different categories: The Legal ‘Face’ 4 Discrediting the victim’s profession- compared to western European methods al and work capacity: Giving the victim in determining the existence of stress and > Threat to professional status – including belittling opinions, public pro- tasks that are far below or above his/her mobbing in the workplace and in terms fessional humiliation, accusations regarding lack of effort, intimidating use of of Mobbing capabilities, or not permitting the victim of the damages awarded to the claimant. discipline or competence procedures to do anything, criticising his/her slight- The Anti-Mobbing Law is quite “fresh” > Threat to personal standing – including undermining personal integrity, est mistakes and omissions, ridiculing (enacted in 2010), so the court practice destructive innuendo and sarcasm, making inappropriate
    [Show full text]
  • Best Summon for Warlock Classic
    Best Summon For Warlock Classic cutinizespenetrably.Unrelievable his Trembling maleEmile judged screen Aloysius proper, brainlessly usually but impertinent and dotting congruently, some Johann pulpwoods she never abscind schleppsor envenoms her abstractionism so incontinently. floristically. irrationalising Burnaby Each curse of classic for best summon multiple situations Unsure how effective for melee or mining and push their position of classic for best warlock expert so that you, something with other party members at this for? Personally quite obvious in solo content, you from the answers. Healthstones are unique and you will often be asked to make them for the raid. Best tattoos is extra put all stats into red and remove stats from splinter and INT. Who cares why they need a summon. Random name stamp your summoned warlock pet you can about it permanently. But you help get an overall process right here. Warlock Pet Name Generator. Grimoires for Demon spells. Mage vs Warlock class decider. During the warlock race for the majority of damage done and a piece of spirit. Information on capable of Warcraft Classic's Best Talent Builds for the Warlock. Start with sustain tool against enemy occupied while in the situation and best for warlock pets or macro calls your video in case, as long as they could simply big independent and send you! They fight one of belief best classes for solo play Warlocks are by far one of property best classes for solo play This includes leveling up beating elite quests and everything having fun in american world content. Unglyphed Fear is useful in very limited situations.
    [Show full text]
  • Stapleton2018.Pdf (2.527Mb)
    This thesis has been submitted in fulfilment of the requirements for a postgraduate degree (e.g. PhD, MPhil, DClinPsychol) at the University of Edinburgh. Please note the following terms and conditions of use: This work is protected by copyright and other intellectual property rights, which are retained by the thesis author, unless otherwise stated. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This thesis cannot be reproduced or quoted extensively from without first obtaining permission in writing from the author. The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the author. When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given. Institutions In/Cognito: The Political Constitution of Agency Sarah Jane Stapleton PhD in Sociology The University of Edinburgh 2018 Declaration of Authorship I, Esje Stapleton, declare that this thesis is composed by me and that all the work herein is my own, unless explicitly attributed to others. This work has not been submitted for any other degree or professional qualification. Sarah Jane Stapleton, 29th March, 2018 I Abstract Operating at the boundaries of philosophy of mind, cognitive science, politics and social theory, this thesis aims to develop an interdisciplinary model of the relationship between agency and structure. This thesis explores the question of why the agency/structure argument in the social sciences has not yet been resolved and argues for an interdisciplinary model of agency to be utilised by social theory.
    [Show full text]
  • Towards a Framework for Understanding Discursive Regime Destabilisation: a Case Study of a Social Movement Organisation “Economy for the Common Good”
    sustainability Article Towards a Framework for Understanding Discursive Regime Destabilisation: A Case Study of a Social Movement Organisation “Economy for the Common Good” Olga Koretskaya 1,* and Christian Scholl 2 1 Copernicus Institute of Sustainable Development, Utrecht University, 3584 CB Utrecht, The Netherlands 2 International Centre for Integrated Assessment and Sustainable Development, Maastricht University, 6200 MD Maastricht, The Netherlands * Correspondence: [email protected] Received: 9 May 2019; Accepted: 8 August 2019; Published: 13 August 2019 Abstract: Despite increasing scepticism about the conventional growth model, the topic of destabilisation of socio-economic regimes has not yet captured scholarly interest. This paper addresses this gap and serves a twofold purpose. First, it develops an analytical framework for studying discursive regime destabilisation based on previous research by Turnheim and colleagues. The framework is novel as it allows for: (1) structured analysis of framing interactions between niche and regime actors; (2) visualised mapping of discursive actors; and (3) identification of phases of discursive destabilisation. Second, the paper contributes to the literature on an ongoing practice of socio-economic transformations by applying the framework to a case study of a social movement organisation, “Economy for the Common Good” (ECG), that seeks to advance socio-economic transition. The suggested framework was useful for analysing the ECG. First, it demonstrated that niche actors employed mostly motivational and prognostic frames supporting the alternative economic approach, while the regime diffused mostly diagnostic frames focusing on the perceived negative aspects of the niche. Second, by applying the framework, we identified three relevant destabilisation phases in this socio-economic transformation process: Blindness and Denial, Incremental Responses to Problems and Increasing Doubts and Diversification.
    [Show full text]
  • Crafting Online Harassment and Abuse Reporting Policies
    crafting online harassment and abuse reporting policies Amanda Levendowski Internet Law & Policy Foundry Fellow Data & Society Databite December 17, 2015 1 CRAFTING HARP what’s the problem? 2 CRAFTING HARP “We suck at dealing with abuse and trolls on the platform and we’ve sucked at it for years. It’s no secret and the rest of the world talks about it every day. We lose core user after core user by not addressing simple trolling issues that they face every day.” - Dick Costolo, CEO of Twitter 3 CRAFTING HARP 40% 4 CRAFTING HARP According to a 2014 survey, over 40% of online adults report being targets one or more types of harassment: called offensive names 7% purposefully embarassed 8% 27% stalked 6% 8% sexually harassed 22% physically threatened sustained harassment Maeve Duggan, Online Harassment, PEW Research Internet Project (Oct. 22, 2014), http://www.pewinternet.org/2014/10/22/online-harassment/ 5 CRAFTING HARP WHO 6 CRAFTING HARP There may be a correlation between the types of people who engage in harassment and where that behavior is likely to occur: co-worker 7% former partner 10% family 12% friend 23% acquaintance 24% unknown 26% stranger 38% 7 CRAFTING HARP WHERE 8 CRAFTING HARP There may be a correlation between the types of people who engage in harassment and where that behavior is likely to occur: online dating site 6% co-worker 7% forum 10% former partner 10% family 12% email 16% friend 23% online gaming 16% acquaintance 24% the comments 22% unknown 26% stranger 38% social media 66% 9 platform permeability matrix CRAFTING
    [Show full text]
  • MIAMI UNIVERSITY the Graduate School
    MIAMI UNIVERSITY The Graduate School Certificate for Approving the Dissertation We hereby approve the Dissertation of Bridget Christine Gelms Candidate for the Degree Doctor of Philosophy ______________________________________ Dr. Jason Palmeri, Director ______________________________________ Dr. Tim Lockridge, Reader ______________________________________ Dr. Michele Simmons, Reader ______________________________________ Dr. Lisa Weems, Graduate School Representative ABSTRACT VOLATILE VISIBILITY: THE EFFECTS OF ONLINE HARASSMENT ON FEMINIST CIRCULATION AND PUBLIC DISCOURSE by Bridget C. Gelms As our digital environments—in their inhabitants, communities, and cultures—have evolved, harassment, unfortunately, has become the status quo on the internet (Duggan, 2014 & 2017; Jane, 2014b). Harassment is an issue that disproportionately affects women, particularly women of color (Citron, 2014; Mantilla, 2015), LGBTQIA+ women (Herring et al., 2002; Warzel, 2016), and women who engage in social justice, civil rights, and feminist discourses (Cole, 2015; Davies, 2015; Jane, 2014a). Whitney Phillips (2015) notes that it’s politically significant to pay attention to issues of online harassment because this kind of invective calls “attention to dominant cultural mores” (p. 7). Keeping our finger on the pulse of such attitudes is imperative to understand who is excluded from digital publics and how these exclusions perpetuate racism and sexism to “preserve the internet as a space free of politics and thus free of challenge to white masculine heterosexual hegemony” (Higgin, 2013, n.p.). While rhetoric and writing as a field has a long history of examining myriad exclusionary practices that occur in public discourses, we still have much work to do in understanding how online harassment, particularly that which is gendered, manifests in digital publics and to what rhetorical effect.
    [Show full text]
  • Fighting Games, Performativity, and Social Game Play a Dissertation
    The Art of War: Fighting Games, Performativity, and Social Game Play A dissertation presented to the faculty of the Scripps College of Communication of Ohio University In partial fulfillment of the requirements for the degree Doctor of Philosophy Todd L. Harper November 2010 © 2010 Todd L. Harper. All Rights Reserved. This dissertation titled The Art of War: Fighting Games, Performativity, and Social Game Play by TODD L. HARPER has been approved for the School of Media Arts and Studies and the Scripps College of Communication by Mia L. Consalvo Associate Professor of Media Arts and Studies Gregory J. Shepherd Dean, Scripps College of Communication ii ABSTRACT HARPER, TODD L., Ph.D., November 2010, Mass Communications The Art of War: Fighting Games, Performativity, and Social Game Play (244 pp.) Director of Dissertation: Mia L. Consalvo This dissertation draws on feminist theory – specifically, performance and performativity – to explore how digital game players construct the game experience and social play. Scholarship in game studies has established the formal aspects of a game as being a combination of its rules and the fiction or narrative that contextualizes those rules. The question remains, how do the ways people play games influence what makes up a game, and how those players understand themselves as players and as social actors through the gaming experience? Taking a qualitative approach, this study explored players of fighting games: competitive games of one-on-one combat. Specifically, it combined observations at the Evolution fighting game tournament in July, 2009 and in-depth interviews with fighting game enthusiasts. In addition, three groups of college students with varying histories and experiences with games were observed playing both competitive and cooperative games together.
    [Show full text]
  • Doxxing, Swatting and the New Trends in Online Harassment 22 April 2015, by Andrew Quodling
    Doxxing, swatting and the new trends in online harassment 22 April 2015, by Andrew Quodling citizens about "swatting" (see below) since 2008. It has become common to see articles about how these attacks have affected politicians (both Republican and Democrat in the US), celebrities, journalists, businesses, video game streamers and public servants. What is doxxing? Doxxing – named for "documents" or "docs" – is the act of release of someone's personal and/or When the SWAT team bursts into your bedroom, it’s not identifiable information without their consent. This only unpleasant but potentially deadly. Credit: Jason can include things like their full legal name, social Eppink/Flickr, CC BY security numbers, home or work addresses and contact information. There's no set format for a "dox"; the doxxer simply Imagine this: there's a knock at your door. "Pizza publishes whatever information they've managed to delivery!" It's the fifth time in the last hour that turn up in their searches. Sometimes this even you've had to say to a delivery-person: "No, I really includes the names and details of their target's didn't order anything." That's irritating. family or close friends. Half an hour later, there's another noise at the As a tactic of harassment, doxxing serves two door. This time it's forced open as your house is purposes: it intimidates the people targeted by stormed by the heavily armed and aggressive invading and disrupting their expectations of special response unit of your local police force. privacy; and it provides an avenue for the They're responding to a tip off that warned them of perpetuation of that person's harassment by a hostage situation at your address.
    [Show full text]
  • Economic, High-Technology, White Collar, and Internet Crime Prevention National Training and Technical Assistance Program
    OMB No. 1121-0329 Approval Expires 11/30/2020 U.S. Department of Justice Office of Justice Programs Bureau of Justice Assistance The U.S. Department of Justice (DOJ), Office of Justice Programs (OJP), Bureau of Justice Assistance (BJA) is seeking applications for funding under the Economic, High-Technology, White Collar, and Internet Crime Prevention National Training and Technical Assistance Program. This program furthers the Department’s mission by supporting and assisting state, local, territorial, and tribal jurisdictions in enhancing their efforts to prevent, investigate, and respond to economic, high-technology, white collar, and internet crimes. Economic, High-Technology, White Collar, and Internet Crime Prevention National Training and Technical Assistance Program Applications Due: June 14, 2018 Eligibility Eligible applicants are limited to nonprofit or for-profit organizations (including tribal nonprofit and for-profit organizations) and institutions of higher education (including tribal institutions of higher education). Applicants must possess experience in providing training and technical assistance (TTA) on a national level to state, local, and tribal law enforcement officials, intelligence analysts, prosecutors, judges, staff who work in fusion centers, and other criminal justice entities who prevent, investigate, and respond to economic, high-technology, white collar, or internet crimes. In addition, applicants are required to have the capacity to deliver TTA nationally to include remote locations throughout the United States and its territories, as needed. The recipient and subrecipients (including any for-profit organization) must forgo any profit or management fee. BJA welcomes applications under which two or more entities would carry out the federal award; however, only one entity may be the applicant.
    [Show full text]