A ROUTINE ACTIVITY APPROACH TO UNDERSTANDING THE REASONS FOR TECHNOLOGY-FACILITATED HARASSMENT AGAINST WOMEN IN INDIA
DOI:
https://doi.org/10.31436/iiumlj.v31i2.851Keywords:
Technology-Facilitated Harassment, India, Routine Activity Theory, Women HarassmentAbstract
The rapid increase in technologies is forcing more people to be online, which is offering perpetrators to commit technology-facilitated harassment (TFH). This paper explores various reasons associated with the rise of TFH cases against women in India by employing routine activity theory (RAT). A conceptual framework is proposed to understand the reasons for technology facilitated- harassment against women (TFHW) in India. This paper adopted a qualitative methodology and observed that accessibility, anonymity, anger, revenge, and political agenda were the vital sources of motivation among perpetrators. The sharing of personal data, underreporting, lack of awareness of laws, negligence, less awareness of technology, gender perception in using the technology, and patriarchal society made women in India suitable targets. Lastly, a lack of effective laws, careless enforcement agencies, and no privacy settings materialised in the absence of a capable guardian. Thus, this paper provides a new perspective on RAT by utilising it on TFHW in India. Further, it will serve as a platform to locate how TFH incidents can be minimised by addressing the reasons in the context of a motivated offender, a suitable target, and a capable guardian.
Metrics
References
Abaido, Ghada M. “Cyberbullying on Social Media Platforms among University Students in the United Arab Emirates,” International journal of adolescence and youth 25, no. 1 (September 2019): 413, accessed May 2, 2023, https://doi.org/10.1080/02673843.2019.1669059.
Abdul Aziz, Zarizana. Online Violence against Women in Asia: A Multicountry Study (UN Women: Ministry of Gender Equality and Family, 2020), 25, https://www.aidsdatahub.org/sites/default/files/resource/unwomen-online-violence-against-women-asia-2020.pdf.
Abdul Manap, Nazura and Hossein Taji, “Cyber crime: Lesson from the Legal Position of Malaysia and Iran,” International Journal of Information and Electronic Engineering 2, no. 3 (May 2012): 404, accessed April 13, 2023.
Afrouz, Rojan. “The Nature, Patterns and Consequences of Technology-Facilitated Domestic Abuse: A Scoping Review,” Trauma, Violence, & Abuse (September, 2021), accessed April 17, 2023, https://doi.org/10.1177/15248380211046752.
Bailey, Jane, Nicola Henry and Asher Flynn, “Technology-Facilitated Violence and Abuse: International Perspectives and Experiences,” in The Emerald International Handbook of Technology-Facilitated Violence and Abuse, eds. Jane Bailey, Nicola Henry and Asher Flynn (Bingley: Emerald Publishing Limited, 2021), 1.
Balabantaray, Subhra Rajat, Mausumi Mishra, Upananda Pani “A Sociological Study of Cybercrimes against Women in India: Deciphering the Causes and Evaluating the Impact of the Victims,” 19, no. 1 (January 2023): 28, accessed November 23, 2023.
Bansal, Vaiddehi, Erin Leasure, Connor Roth, Mayumi Rezwan, Mithila Iyer, Poulomi Pal, and Laura Hinson. "Help-seeking behaviours of those experiencing technology-facilitated GBV in Asia: implications for policy and programming", Journal of Gender-Based Violence 7, 2 (2023): 352-363, accessed August 8, 2023, https://doi.org/10.1332/239868021X16697232129517
Basuroy, Tanushree. “Internet Usage in India: Statistics & Facts,” Statista, October 27, 2023, https://www.statista.com/topics/2157/internet-usage-in-india/#topicOverview.
Bb Amaral, Inês, Rita Basílio-Simões, and Gabriela Poleac. "Technology Gap and Other Tensions in Social Support and Legal Procedures: Stakeholders’ Perceptions of Online Violence Against Women during the Covid-19 Pandemic." Profesional de la información 31, no. 4 (2022): 8. accessed August 8, 2023, https://doi.org/10.3145/epi.2022.jul.13.
Bennett, Richard R. “Routine Activities: A Cross-National Assessment of a Criminological Perspective,” Social Forces 70, no. 1 (September 1991): 148, accessed April 24, 2023, https://doi.org/10.2307/2580066.
Blackwell, Lindsay, Jill Dimond, Sarita Schoenebeck, and Cliff Lampe “Classification and its Consequences for Online Harassment: Design Insights from Heartmob.” Proceedings of the ACM on Human-Computer Interactions, 1 (2) (2017): 24.
Boethius, Susanne, Malin Åkerström and Margareta Hydén, “The Double-Edged Sword- Abused Women’s Experiences of Digital Technology,” European Journal of Social Work, (2022): 10, accessed November 22, 2023,
Bowen, Glenn A. "Document Analysis as a Qualitative Research Method," Qualitative Research Journal 9, no. 2 (2009): 29, accessed March 18, 2023.
Braun, Virginia and Victoria Clarke, "Using Thematic Analysis in Psychology," Qualitative Research in Psychology 3, no. 2 (2006): 79, accessed March 18, 2023.
Cohen, Lawrence E. and Marcus Felson, “Social Change and Crime Rate Tends: A Routine Activity Approach,” American Sociological Review 44, no. 4 (August 1979): 604, accessed April 21, 2023.
Cohen, Lawrence E., James R. Kluegel and Kenneth C. Land, “Social Inequality and Predatory Victimization: An Exposition and Test of a Formal Theory”, American Sociological Review 46, no. 24 (October 1981): 507, accessed May 2, 2023, https://doi.org/10.2307/2094935.
"Cybercrime Against Women," ClearIAS, accessed August 9, 2023, https://www.clearias.com/cybercrime-against-women
Davidson, Julia, Sonia Livingstone, Sam Jenkins, Anna Gekoski, Clare Choak, Tarela Ike, Kirsty Phillips. Adult Online Hate, Harassment and Abuse: A Rapid Evidence Assessment, (UK Council of Child Internet Saftey, 2019), 17, Adult Online Hate, Harassment and Abuse: A rapid evidence assessment : UEL Research Repository.
Deibert, Ronald J., Lex Gill, Tamir Israel, Chelsey Legge, Irene Poetranto, Amitpal Singh, Submission of the Citizen Lab (Munk School of Global Affairs, University of Toronto) to the United Nations Special Rapporteur on the Violence Against Women, its Causes and Consequences, Ms. Dubravka Šimonović (The Citizen Lab: Munk School of Global Affairs, 2017), 3, https://citizenlab.ca/wp-content/uploads/2017/11/Final-UNSRVAG-CitizenLab.pdf.
Dorokhova, Eugenia, hvale vale, Vasilika Laçí, Aida Mahmutovic. Cyber Violence against women and Girls in the Western Balkans: Selected Case Studies and a Cybersecurity Governance Approach (Switzerland 2021),
https://www.dcaf.ch/sites/default/files/publications/documents/CyberVAWG_in_WB.pdf.
“Eighty eight percent of households in India have a mobile phone,” Ice 360 Insights, March 10, 2021, https://www.ice360.in/media/88-percent-of-households-in-india-have-a-mobile-phone/.
Felson, Marcus and Lawrence E. Cohen, “Human Ecology and Crime: A Routine Activity Approach,” Human Ecology 8, no. 4 (December 1980): 392, accessed April 21, 2023, https://doi.org/10.1007/BF01561001.
Garrido V., Mariateresa. Mapping Online Gender-Based Violence (Costa Rica: P. Digital, 2022), 60.
GSMA Development Foundation, Connected Women: The Mobile Gender Gap Report (2021), 21, https://www.gsma.com/r/wp-content/uploads/2021/06/The-Mobile-Gender-Gap-Report-2021.pdf. T.
Halder, Debarati and Karuppannan Jaishankar, “Cyber Socializing and Victimization of Women,” Temida 12, no. 3 (September 2009): 6, accessed May 2, 2023.
Halder, Debarati and Karuppannan Jaishankar, “Patterns of Sexual Victimization of Children and Women in the Multipurpose Social Networking Sites,” in Social Networking as a Criminal Enterprise, eds. Catherine Marcum and George Higgins (USA: CRC Press, 2014), 129.
Henry, Nicola and Anastasia Powell, “Technology-Facilitated Sexual Violence: A Literature Review of Empirical Research,” Trauma, Violence & Abuse 19, no. 2 (June 2016): 1, accessed April 13, 2023, https://doi.org/10.1177/1524838016650189.
Human Rights Council, Report of the Special Rapporteur on Violence Against Women, its Causes and Consequences on Online Violence Against Women and Girls from a Human Rights Perspective (Geneva: UN, 2018), 5, https://digitallibrary.un.org/record/1641160?ln=en
Human Rights Council, The Promotion, Protection and Enjoyment of Human Rights on the Internet: Resolution/Adopted by the Human Right Council on 5 July 2018 (Geneva: UN, 2018), 3, G1821567.pdf (un.org).
Im, Jane, Sarita Yardi Schoenebeck, Marilyn Iriarte, Gabriel Grill, Daricia Wilkinson, Amna Batool, Rahaf Alharbi, Audrey Funwie, Tergel Gankhuu, Eric Gilbert and Mustafa Naseem. “Women's Perspectives on Harm and Justice after Online Harassment.” Proceedings of the ACM on Human-Computer Interaction 6 (2022): 4.
IT for Change, Technology-Mediated Violence against Women in India, (2017), 5, https://itforchange.net/Technology-mediated-VAW-in-India-draft-ITforChange.pdf.
Johari, Aarefa. “Facebook Policies Allow Trolls to Target Women, says Group Fighting Sexist Online Abuse,” Scroll.in, August 24, 2015, accessed May 2, 2023, https://scroll.in/article/750357/facebook-policies-allow-trolls-to-target-women-says-group-fighting-sexist-online-abuse.
K Roy, Prasanto. “Why Online Harassment goes Unpunished in India,” BBC News, July 17, 2015, accessed May 11, 2023, https://www.bbc.com/news/world-asia-india-33532706.
Kemp, Simon. “Digital 2021: India,” DataReportal, last modified 2021, https://datareportal.com/reports/digital-2020-india.
Krahé, B., Schuster, I., & Tomaszewska, P. "Prevalence of Sexual Aggression Victimization and Perpetration in a German University
Student Sample." Archives of Sexual Behavior 50, no. 6 (2021): 2109, accessed August 8, 2023, https://doi.org/10.1007/s10508-021-01963-4.
Lingam, Lakshmi, Isha Bhallamudi, and Neomi Rao, Adolescent Subcultures and Smartphones: Exploring Implications for Gender, Sexuality and Rights, (Mumbai, 2018), https://www.researchgate.net/publication/326557312_Adolescent_Subcultures_and_Smartphones_Exploring_Implications_for_Gender_Sexuality_and_Rights.
Marcum, Catherine D., Melissa L. Ricketts, and George E. Higgins, “Assessing Sex Experiences of Online Victimization: An Examination of Adolescent Online Behaviors Using Routine Activity Theory,” Criminal Justice Review 35, no. 4 (April 2010): 414, accessed August 8, 2023, https://doi.org/10.1177/0734016809360331.
Marganski, Alison J. and Lisa A. Melander, “Technology-Facilitated Violence against Women and Girls in Public and Private Spheres: Moving from Enemy to Ally,” in The Emerald International Handbook of Technology-Facilitated Violence and Abuse, eds. Jane Bailey, Nicola Henry and Asher Flynn (Bingley: Emerald Publishing Limited, 2021), 632.
Marwick, Alice E. “Morally motivated networked harassment as normative reinforcement,” Social Media + Society, (June 2021): 2, accessed November 22, 2023.
Mukherjee, Mitali, Aditi Ratho, and Shruti Jain. "Unsocial Media: Inclusion, Representation, and Safety for Women on Social Networking Platforms." ORF Occasional Paper No. 312, May 2021. Observer Research Foundation.
National Commission for Women, Annual report 2018-19 (India, 2019), http://ncw.nic.in/sites/default/files
NORC at the University of Chicago and the International Center for Research on Women. 2022. Case Study: Technology-facilitated Gender Based Violence in India, 2.
Nordin, Rohaida and Abdul Rahman Abdullah, “Human Rights, its Scope and Application: An Empirical Analysis of Future Human Rights Advocated in Malaysia,’’ Pertanik Journal of Social Sciences & Humanities 25, no. 2 (June 2017): 747, accessed March 2, 2023.
Oksanen, Atte, Monika Celuch, Riikka Latikka, et al. "Hate and Harassment in Academia: The Rising Concern of the Online Environment." High Education 84, no. 4 (2022): 558, accessed August 8, 2023, https://doi.org/10.1007/s10734-021-00787-4.
“Online Harassment and Cyber Crimes against Women: An Insidious Menace,” Center for Advanced Research in Digital Forensics & Cyber Security, accessed January 24, 2023, https://www.ardcindia.org/online-harassment-and-cyber-crimes-against-women/.
Pasricha, Japleen, Violence Online in India: Cybercrimes against Women & Minorities on Social Media (India, 2016), https://feminisminindia.com/wpcontent/uploads/2016/05/FII_cyberbullying_report_website.pdf.
Press Trust of India, “Need to Recognise Emerging Forms of Cybercrimes against Women: CBI Officer,” Business Standard, October 22, 2020, accessed March 3, 2023, https://www.business-standard.com/article/current-affairs/need-to-recognise-emerging-forms-of-cyber-crimes-against-women-cbi-officer-120102201515_1.html.
Ramani, Priya. “Why Everybody Loves to Hate Barkha Dutt,” LiveMint, April 23, 2016, accessed May 2, 2023.
Reynald, Danielle M. “Guardians on Guardianship: Factors Affecting the Willingness to Monitor, the Ability to Detect Potential Offenders and the Willingness to Intervene,” Journal of Research in Crime & Delinquency 47, no. 3 (April 2010): 362, accessed April 25, 2023, https://doi.org/10.1177/0022427810365904.
Sambasivan, Nithya, Amna Batool, Nova Ahmed, Tara Matthews, Kurt Thomas, Laura Sanely Gaytán-Lugo, David Nemer, Elie Bursztein, Elizabeth Churchill, and Sunny Consolvo ’They don’t leave us alone anywhere we go”: Gender and digital abuse in South Asia’ CHI’19: Proceedings of the 2019 CHI Conference on Human Factors in Computer System, Glasgow, Scotland, UK, 2019, p 2.
Sarkar, Sahana and Rajan, Benson. "Materiality and Discursivity of Cyber Violence against Women in India." Journal of Creative Communications 18, no. 1 (2023): 109–123, accessed August 9, 2023, https://doi.org/10.1177/0973258621992273
Shalhoub-Kevorkian, Nadera and Tamar Berenblum, “Panoptical Web: Internet and Victimization of Women,” International Review of Victimology 17, no. 1, (January 2010): 73, accessed May 11, 2023, https://doi.org/10.1177/026975801001700105.
“Technology-Facilitated Gender-Based Violence,” International Center for Research on Women, accessed March 2, 2023, https://www.icrw.org/issues/tech-gbv/.
Trong Van Nguyen, “Cybercrime in Vietnam: An Analysis Based on Routine Activity Theory,” International Journal of Cyber Criminology 14, no. 1 (June 2020): 160, accessed May 2, 2023.
UN Broadband Commission, Cyber Violence against Women and Girls: A World-Wide Wake-Up Call (2015), 2, https://en.unesco.org/sites/default/files/genderreport2015final.pdf.
UN Women, Convention on the Elimination of Discrimination Against Women (1992), 1, https://tbinternet.ohchr.org/Treaties/CEDAW/Shared%20Documents/1_Global/INT_CEDAW_GEC_3731_E.pdf
United Nations, General Recommendation No. 35 on Gender-Based Violence Against Women, Updating General Recommendation No. 19 (New York: UN, 2017), 1, https://digitallibrary.un.org/record/1305057?ln=en
Vakhitova, Zarina I., Danielle M. Reynald, and Michael Townsley, “Toward the Adaptation of Routine Activity and Lifestyle Exposure Theories to Account for Cyber Abuse Victimization,” Journal of Contemporary Criminal Justice 32, no. 2 (December 2015): 6, accessed April 24, 2023, https://doi.org/10.1177/1043986215621379.
World Wide Web, Advancing Women’s Rights Online: Gaps and Opportunities in Policy and Research (2018), 5, http://webfoundation.org/docs/2018/08/Advancing-Womens-Rights-Online_Gaps-and-Opportunities-in-Policy-and-Research.pdf.
Xingan, Li, “A Review of Motivations of Illegal Cyber Activities,” Criminology & Social Integration Journal 25, no. 1 (February 2017): 111, accessed May 2, 2023.
Yar, Majid “The Novelty of Cyber Crime: An Assessment in Light of Routine Activity Theory,” European Journal of Criminology 2, no. 4, (October 2005): 411, accessed April 24, 2023.
Downloads
Published
How to Cite
Issue
Section
License
- Consent to publish: The Author(s) undertakes that the article named above is original and consents that the IIUM Press publishes it.
- Previous publication: The Author(s) guarantees that the article named above has not been published before in any form, that it is not concurrently submitted to another publication, and that it does not infringe anyone’s copyright. The Author(s) holds the IIUM Press and Editors of IIUM Law Journal harmless against all copyright claims.
- Transfer of copyright: The Author(s) hereby transfers the copyright of the article to the IIUM Press, which shall have the exclusive and unlimited right to publish the article in any form, including on electronic media. The Journal in turn grants the Author(s) the right to reproduce the article for educational and scientific purposes, provided the written consent of the Publisher is obtained.