Digital violence hurts people

Digital Violence Guide

Information on dealing with digital violence
Digital violence hurts people
Illustration: Shutterstock Illustration/greeny.mm

What is digital violence?

The term "digital violence" encompasses various types of gender-based violence perpetrated with the help of technical devices and digital media such as cell phones, apps, Internet applications and e-mails, for example on online portals or social platforms. Often, digital violence does not occur in isolation, but is often a continuation or addition to pre-existing violent relationships and dynamics. It is important to emphasize that the person affected is not to blame for what has happened to him or her. There are ways to address it and get support.


Forms of digital violence:

Cyberstalking

Stalking refers to the deliberate, repeated and persistent following and harassment of a person over a long period of time. This occurs against the will of the person concerned and can take the form of harassment, stalking, threats, coercion or blackmail. Cyberstalking is a special form of stalking in which the perpetrators use digital media such as e-mails, messenger messages, chat posts or social networks to harass and stalk their victims.

Image-based sexual violence

Image-based sexual violence refers to the dissemination of intimate images or videos of a person without their consent. This can happen, for example, through the sharing of private recordings or sexting messages. If a person threatens to publish or forward these images to others, this is not only a massive breach of trust, but also a criminal offense.

Cybermobbing

Cyberbullying refers to the harassment, exclusion, insulting or mocking of a person over a long period of time through electronic means of communication such as emails, messages or posts on social networks. However, bullying can also occur as a mixed form which can take place both digitally and offline, e.g. by spreading rumors or lies. Sometimes fake profiles are created to spread untruths about a person and "hate groups" are created on social networks to humiliate a person.

Identity Theft

If someone creates an account under your name and with your picture and uploads or shares inappropriate content there or insults others, this is called identity theft. This can happen, for example, on social networks such as Facebook, Twitter or Instagram, when a false profile is created and the impression is given that you posted these things yourself.

Doxing

Doxing refers to the publication of sensitive data such as email address, phone number, address, job, date of birth, etc.
The publication of a person's personal data is often accompanied by a call to harm that person by threatening or harassing them.

Hatespeech and its intersectional characteristics

Hatespeech refers to public insults, devaluations or threats against people on the Internet or calls for violence. It also includes threats of rape and calls for suicide. When such aggressive messages are sent simultaneously by a large number of people in response to a particular post or article on the net, it is often referred to as a hatstorm.

Consequences of digital violence

People affected by digital violence have the feeling that perpetrators and the threat are omnipresent (in the mailbox, on Facebook, outside the office, etc.). Emotional strain, stress and fear are the consequences. The psychological consequences can manifest themselves in depression and panic attacks, among other things. Digital violence can cause those affected to feel unsafe in their homes, to change their place of residence, to be dismissed and to suffer professional disadvantages. They often withdraw from the Internet to avoid further harassment or data abuse.

Cyber violence thus has effects on social participation. The Internet is an important factor in social participation - this also applies to aspects of education and professional development - if women are pushed out of this space and deliberately kept away, or withdraw themselves as a result of violence, this restricts participation in social life.

Strategies for dealing with digital violence

There are various legal steps that can be taken against digital attacks. Many attacks are criminal offenses such as insult, stalking, identity theft, or coercion. Defending yourself legally can be an important step to protect yourself from further attacks.

For cyberstalking:

If you are being stalked or suspect spy ware, such as apps that can retrieve your location or activate the camera, you can first do the following:

  • Check and disable the location setting on their devices.
  • Check if there are apps on their smartphone that you don't know about and delete them if necessary.
  • Change their passwords to prevent access to their emails and other accounts. New passwords can also be important for sensitive accounts such as their bank account, mobile carrier account, accounts with Amazon and Google, and the like.
  • Use strong passwords and, if necessary, a password manager. A password manager is an application or service that facilitates the management of passwords and credentials. It acts as a secure repository for all your passwords and allows you to create and store strong, unique passwords for various online accounts.
  • If necessary, create new accounts with which you can write emails and use social networks. Important: Use the accounts only on secure devices and not with those that are monitored. You can ask a friend for help.
  • Set up so-called two-factor authentication where possible. This serves as a security mechanism that provides additional protection for your online accounts by requiring a second factor, in addition to the password, to verify their identity. This increases security, as a potential attacker would not only need to know the password, but also have the second factor to gain access to their account.
  • Make sure your webcam and the camera on the smartphone are taped off.

For Image-Based Sexual Violence:

  • Take screenshots of chat histories and document who uploaded or redistributed the recordings.
  • Contact the website operators. They are obligated to remove the images that were uploaded against the will of the person depicted. Here are instructions on how to report content on different networks.External link
  • Claim your right. Even if you have consented to intimate photos or videos being taken, or you have sent recordings of yourself: These may not be forwarded or published without your consent.
  • The disclosure of recordings against the will of the person depicted is punishable by law and both in the Kunsturhebergesetz (§33 KUGExternal link) as well as regulated in the Criminal Code (§ 201 StGBExternal link). Consent to recording never automatically includes permission to share.

For cyberbullying:

  • It is generally advisable not to respond to cyberbullying attacks, otherwise the perpetrator(s) may be motivated to continue bullying.
  • It is important not to remain alone, but to turn to a trusted person and, with their help, establish a support group. The group can get involved online and comment on or report offensive pictures or videos. Of course, you can also report to the Equal Opportunity Office.
  • Report the cyberbullying attack. It is important here to give reasons why the content should be removed, e.g. insult, unauthorized depiction of yourself or violation of personal rights.

For identity theft:

Creating accounts in the name of others to harm or hurt you is illegal and can even have criminal consequences. If your online identity has been stolen or your account has been hacked, you can fight back.

Before you file a complaint with the police, it makes sense to seek legal advice. This is often associated with costs. At a counseling center, you can get information on how to obtain legal advice at low cost, for example, by applying for counseling assistance. For this, you can contact the legal advice service of the Studierendenwerk ThüringenExternal link or the Verbraucherzentrale JenaExternal link.

For doxing:

If the data has already been published and this is followed by insults and threats, or someone calls for violence to be used against you, legal action may be taken against the perpetrator. Legal action can also be taken against the authors of the insults and threats for insult, defamation or slander, among other things.

  • Before taking legal action, it is always advisable to contact legal counsel first.
  • Ask the platform operators to delete the content. Remember to make a screenshot beforehand and to secure further evidence so that proof is available in the event of a later complaint.

For hatespeech:

  • Seek support. In such a situation, it is relieving not to remain alone and to build up a circle of supporters;
  • Block people who spread hate speech;
  • Support others and show solidarity with those affected.
  • Use one of the counseling services linked below.

However, for reporting and prosecution, it is important to document the messages or content. You can learn how to document properly here  External link.

Consulting services and contact persons

Other points of contact


Psychosocial counseling of the Studienwerk  ThüringenExternal link

Legal counseling of the Studierendenwerk ThüringenExternal link

Women's Center TOWANDA Jena e.V. External link

Hate on the NetExternal link

HateaidExternal link

Anti-Stalking-ProjectExternal link

 

Current publications

UNFPA: Technology-facilitated Gender-based Violence: Making All Spaces Safe (2021)External link

BFF: Bundesverband Frauenberatungsstellen und Frauennotrufe,
Nivedita Prasad (Hg.) (2021): Geschlechtsspezifische Gewalt in Zeiten der Digitalisierung External link

Döring, Nicola; Rohangis Mohseni, M. (2020): Digitale interpersonale Gewalt und Aggression: Forschungsstand und medienpädagogische HerausforderungenExternal link

Flyer: BFF: Sicher mit SmartphoneExternal link
Broschüre: Digitale Welten - Digitale Medien - Digitale GewaltExternal link

Source: Text based on the offer of Frauen Gegen Gewalt e.V. Adapted to the situation at university level by the Equal Opportunity Office 2023.