Skip to main content

The Dark Side of the Virtual World

Towards a Digital Sexual Ethics

  • Chapter
Preventing Sexual Violence

Abstract

Information and communication technologies (ICTs)1 have unequivocally transformed contemporary life with profound and monumental effects. These sophisticated technologies provide a tantalising array of opportunities, a reservoir of information and an ever-expanding ‘imagined community’ with unparalleled freedoms beyond a conventional state-centric configuration. Accessible to literally millions of users across the globe, ICTs have traversed and fused public and private life in radically new ways. In particular, social networking sites (such as Facebook and Twitter) and mobile phones have enabled dramatically fresh, modern and constantly changing identities, encounters and communications among diverse individuals, producing a ‘postmodernisation of intimacy’ (Plummer, 2001, p.98). And yet there is a dark side to the virtual world — a world which has also become a ‘breeding ground’ for both offensive and criminal conduct (Levmore & Nussbaum, 2010). This chapter focuses on one such example: technology-facilitated sexual violence (TFSV) against adult women. Behaviours include the sending of sexually explicit material via a mobile phone, email or the Internet without the consent of the subject; the use of Facebook groups to promote rape-supportive attitudes; the doctoring of photographs to create sexually explicit images; threats of sexual violence, including publicly posting the names and addresses of women who ‘deserve to be raped’ the posting of degrading, sexually based comments about female students and teachers; the threat, or actual distribution, of sexually explicit material to family members, friends and colleagues in intimate partner violence situations; and the use of online dating sites to procure a sexual assault.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  • Albury, K. and Crawford, K. (2012) ‘Sexting, Consent and Young People’s Ethics: Beyond Megan’s Story’, Continuum: Journal of Media and Cultural Studies, 26(3), 463–473.

    Article  Google Scholar 

  • Associated Press-MTV (2009) ‘Digital Abuse Survey’, Knowledge Networks, retrieved at http://surveys.ap.org/data/RnowledgeNetworks/AP_Digital_Abuse_Topline_092209.pdf.

  • Barak, A. (2005) ‘Sexual Harassment on the Internet’, Social Science Computer Review, 23, 77–92.

    Article  Google Scholar 

  • Bates, L. (2013) ‘Does Facebook Have a Problem with Women?’, The Guardian, 19 February 2013, retrieved at http://www.theguardian.com/lifeandstyle/2013/feb/19/facebook-images-rape-domestic-violence.

  • Bernstein, A. (2012) ‘Social Networks and the Law: Real Remedies for Virtual Injuries’, North Carolina Law Review, 90, 1457–1807.

    Google Scholar 

  • Boyd, C. (2009) ‘Virtual Violence’, retrieved at http://www.aifs.gov.au/acssa/pubs/newslett er/n2 lpdf /n2 lc.pdf.

  • Brown, S. (2006) ‘Integration by Way of the Criminology of Hybrids’ in G. Barak (ed.) Criminology: An Integrated Approach (Plymouth: Rowman St Littlefield).

    Google Scholar 

  • Brownlee, J. (2012) ‘This Creepy App Isn’t Just Stalking Women Without Their Knowledge, It’s a Wake-Up Call about Facebook Privacy’, Cult of Mac, 30 March 2012, retrieved at http://www.cultofmac.com/157641/this-creepy-app-isnt-just-stalking-women-without-their-knowledge-its-a-wake-up-call-about-facebook-privacy/.

  • Browrrmiller, S. (1976) Against Our Will: Men, Women and Rape (London: Penguin).

    Google Scholar 

  • Buchwald, E., Fletcher, P. R. and Roth, M. (eds.) (1993) Transforming a Rape Culture (Minneapolis: Milkweed Editions).

    Google Scholar 

  • Burt, M. (1980) ‘Cultural Myths and Supports for Rape’, Journal of Personality and Social Psychology, 38(2), 217–230.

    Article  Google Scholar 

  • Carmody, M. (2008) Sex and Ethics, Vol. 1 (Melbourne, VIC: Palgrave Macmillan).

    Google Scholar 

  • Carmody, M., Evans, S., Rrogh, C, Flood, M., Heenan, M. and Ovenden, G. (2009) Framing Best Practice: National Standards for the Primary Prevention of Sexual Assault Through Education: National Sexual Assault Prevention Education Project for NASASV (Australia: University of Western Sydney).

    Google Scholar 

  • Chemaly S. (2013) ‘Facebook’s Big Misogyny Problem’, The Guardian, 18 April 2013, retrieved at http://www.theguardian.com/commentisfree/2013/apr/18/facebook-bi g-mi s o gyny-pr obi em.

  • Citron, D. K. and Franks, M. A. (2014) ‘Criminalizing Revenge Pom’, Wake Forest Law Review, 49, 345–392.

    Google Scholar 

  • Citron, D. K. and Norton, H. L. (2011) ‘Intermediaries and Hate Speech: Fostering Digital Citizenship for Our Information Age’, Boston University Law Review, 91, 1435–1484.

    Google Scholar 

  • Clark, L. M. G. and Lewis, D. J. (1977) Rape: The Price of Coercive Sexuality (Toronto: Women’s Press).

    Google Scholar 

  • Davies, L. (2011) ‘Facebook Refuses to Take Down Rape Joke Pages’, The Guardian, 1 October 2011, retrieved at http://www.theguardian.com/technology/2011/sep/30/facebook-refuses-pull-rape-jokepages.

  • Dibbell, J. (1993) ‘A Rape in Cyberspace: How an Evil Clown, a Haitian Trickster Spirit, Two Wizards, and a Cast of Dozens Turned a Database into a Society’, The Village Voice, 23 December 1993.

    Google Scholar 

  • Elliott, C. (2011) ‘Facebook Is Fine with Hate Speech, as Long as It’s Directed at Women’, The Guardian, 4 October 2011, retrieved at http://www.theguardian.com/commentisfree/2011/oct/04/facebook-hate-speech-women-rape.

  • Eskola, M. (2012) ‘From Risk Society to Network Society: Preventing Cybercrimes in the 21st Century’, Journal of Applied Security Research, 7(1), 122–150.

    Article  Google Scholar 

  • Felson, M. (2002) ‘Those Who Discourage Crime’, Crime Prevention Studies, 4, 53–66.

    Google Scholar 

  • Finn, J. and Banach, M. (2000) ‘Victimization Online: The Downside of Seeking Human Services for Women on the Internet’, CyberPsychology & behavior, 3(5), 785–796.

    Article  Google Scholar 

  • Frankenfeld, P. J. (1992) ‘Technological Citizenship: A Normative Framework for Risk Studies’, Science, Technology & Human Values, 17(4), 459–484.

    Article  Google Scholar 

  • Furness, H. (2012) ‘Online Dating Warning after Woman Raped and Beaten’, The Telegraph, 19 March 2012, retrieved at http://www.telegraph.co.uk/women/sex/online-dating/9153332/Online-dating-warning-after-woman-raped-and-beaten.html.

  • Gidycz, C. A., Rich, C. L. and Marioni, N. L. (2002) ‘Interventions to Prevent Rape and Sexual Assault’, inj. Petrak and B. Hedge (eds.) The Trauma of Sexual Assault: Treatment, Prevention, and Practice (Somerset, NJ: John Wiley & Sons, Ltd).

    Google Scholar 

  • Grabosky, P. N. (2001) ‘Virtual Criminality: Old Wine in New Bottles?’, Social Legal Studies, 10(2), 243–249.

    Google Scholar 

  • Guichard, A. (2009) ‘Hate Crime in Cyberspace: The Challenges of Substantive Criminal Law’, Information and Communications Technology Law, 18(2), 201–234.

    Article  Google Scholar 

  • Gupta, A. (2013) ‘Oriental Feminism Rears its Head in India’, Jadaliyya, 2 January 2013, retrieved at http://www.jadaliyya.com/pages/index/9371/orientalist-feminism-rears-its-head-in-india.

  • Hand, T., Chung, D. and Peters, M. (2009) ‘Use of Information and Communication Technologies to Coerce and Control in Domestic Violence and Following Separation’, Stakeholder Paper 6, retrieved at http://www.adfvc.unsw.edu.au/.

  • Henry, N. and Powell, A. (in press, 2014a) ‘Embodied Harms: Gender, Shame and Technolog)’’ Facilitated Sexual Violence in Cyberspace’, Violence Against Women.

    Google Scholar 

  • Henry, N. and Powell, A. (2014b) ‘Beyond the Sext: Technology Facilitated Sexual Violence and Harassment Against Adult Women’, Australian and New Zealand Journal of Criminology. Published online before print. DOI: 10.1177/0004865814524218.

    Google Scholar 

  • Hooks, b. (2000) Feminist Theory: From Margin to Center (2nd edn) (Cambridge, MA: South End Press).

    Google Scholar 

  • Inman, M. (2013) ‘Guilty Verdict in ADFA Skype Sex Case’, Canberra Times, 28 August 2013, retrieved at http://www.canberratimes.com.au/act-news/guilty-verdict-in-adfa-skype-sex-case-20130828–2sq7v.html.

  • Kee, J. (2005) ‘Cultivating Violence Through Technology: Exploring the Connections Between Information and Communication Technologies (ICT) and Violence Against Women (VAW)’, APC WNSP Issues Paper, retrieved at http://www.genderit.org/resources/VAW_ICTs_EN.pdf.

  • Kigerl, A. (2012) ‘Routine Activity Theory and the Determinants of High Cybercrime Countries’, Social Science Computer Review, 30(4), 470–486.

    Article  Google Scholar 

  • Knaus, C. (2013)’ skype Sex Victim “Had to Go Public” ‘, The Age, 20 August 2013, retrieved at http://www.canberratimes.com.au/act-news/skype-sex-victim∼had∼to∼go-public-20130820–2s8is.html.

  • Lee, E. and Leets, L. (2002) ‘Persuasive Storytelling by Hate Groups Online: Examining Its Effects on Adolescents’, American Behavioral Scientist, 45(6), 927–957.

    Article  Google Scholar 

  • Levmore, S. and Nussbaum, M. C. (eds.) (2010) The Offensive Internet: Speech, Privacy, and Reputation (Cambridge, MA: Harvard University Press).

    Google Scholar 

  • Lonsway, K. A., Banyard, V L., Berkowitz, A. D., Gidycz, C. A., Katz, J. T, Koss, M. P. and Ullman, S. E. (2009) ‘Rape Prevention and Risk Reduction: Review of the Research Literature for Practitioners’, Applied Research Forum: National Online Resource Center on Violence Against Women, 1–20, retrieved at: http://new.vawnet.org/Assoc_Files_VAWnet/AR_RapePrevention.pdf.

  • Marcus, S. (1992) ‘Fighting Bodies, Fighting Words: A Theory and Politics of Rape Prevention’ in J. Butler and J. W. Scott (eds.) Feminists Theorize the Political (New York: Routledge).

    Google Scholar 

  • Mardorossian, C. (2002) ‘Toward a New Feminist Theory of Rape’, Signs, 27(3), 743–775.

    Article  Google Scholar 

  • Masters, S. (2013) ‘Twitter Threats: Man Arrested over Rape-Threat Tweets Against Campaigner Caroline Cri ado-Perez’, The Independent, 6 September 2013, retrieved at http://wivw.independent.co.uk/news/uk/crime/twitter∼threats∼man∼anested-over∼rapethreat-tweets-against∼campaigner-caroline-criadoperez∼8735594.html.

  • Meyer, E. (2012) ‘Sexual Predators Turn to Web to Snare Victims’, Chicago Tribune, 22 November 2012, retrieved at http://articles.chicagotribune.com/2012-ll-22/news/ ct-met-online-dating∼20121122_l_spark∼networks∼true∼com∼online∼relationship-site.

  • Mitchell, K. J., Finkelhor, D., Jones, L. M. and Wolak, J. (2012) ‘Prevalence and Characteristics of Youth Sexting: A National Study’, Pediatrics, 129, 13–20.

    Article  Google Scholar 

  • Mohney C. (2006) ‘Second Life: Rape for Sale’, Valleywag, 15 December 2006, retrieved at http://gawker.com/news/second-life/second-liferape-for-sale-222099.php.

  • Morahan-Martin, J. (2000) ‘Women and the Internet: Promise and Perils’, Cyber-Psychology & behavior, 3(5), 683–691.

    Article  Google Scholar 

  • Noonan, A. (2011) ‘Women Allegedly Sexually Assaulted by Man She Met Through Online Dating Site’, News.com, 21 July 2011, retrieved at http://www.Avww.news.com.au/breaking-news/woman-allegedly-sexually-assaulted-by-man-she-met-thro ugh-online-dating-site/story-e6frfkp9-1226098380974#ixzz2bFP71KWe.

  • Paglia, C. (1991) ‘Rape: A Bigger Danger Than Feminists Know’, New York Newsãay, retrieved at http://www.sgmhs.org/ourpages/auto/2011/ll/16/45868174/Paglia-l.pdf.

  • Plummer, K. (2001) “The Square of Intimate Citizenship: Some Preliminary Proposals’, Citizenship Studies, 5(3), 237–253.

    Article  Google Scholar 

  • Plummer, K. (2003) Intimate Citizenship: Private Decisions and Public Dialogues (Seattle: University of Washington Press).

    Google Scholar 

  • Pollard, R. (2009) ‘Elite College Students Proud of “Pro-rape” Facebook Page’, Sydney Morning Herald, 9 November 2009, retrieved at http://www.smh.com.au/technology/elite-college-students-proud-of-prorape-facebook-page-20091108-i3is.html.

  • Powell, A. (2010) ‘Configuring Consent: Emerging Technologies, Unauthorised Sexual Images and Sexual Assault’, Australian and New Zealand Journal of Criminology, 43(1), 76–90.

    Article  Google Scholar 

  • Quadara, A. and Wall, L. (2012) ‘What is Effective Primary Prevention in Sexual Assault? Translating the Evidence for Action’, ACSSA Wrap, No. 11 (Melbourne, VIC: Australian Institute of Family Studies).

    Google Scholar 

  • Ralston, N. (2013) ‘Upskirting Accused Needs Compassion, Says Principal’, Sydney Morning Herald, 9 August 2013, retrieved at http://www.smh.com.au/nsw/upskirting-accused-needs-compassion-says-principal-20130808–2rkpe.html.

  • Reyns, B. W., Henson, B. and Fisher, B. S. (2011) ‘Being Pursued Online Applying Cyberlifestyle-Routine Activities Theory to Cyberstalking Victimization’, Criminal Justice and behavior, 38(11), 1149–1169.

    Article  Google Scholar 

  • Sacco, D., Argudin, R., Maguire, J. and Talion, K. (2010) ‘Sexting: Youth Practices and Legal Implications’, Berkman Center Research Publication No. 2010–2018, retrieved at http://dx.doi.org/10.2139/ssrn.1661343.

  • SECASA (2011) ‘Online Dating’, retrieved at http://www.secasa.com.au/assets/Documents/online-dating.pdf.

  • Smart, C. (1989) Feminism and the Power of Law (London: Routledge).

    Book  Google Scholar 

  • Sommers, C. H. (1994) Who Stole Feminism? How Women Have Betrayed Women (New York: Simon and Schuster).

    Google Scholar 

  • Southworth, C. (2003) ‘Technology’s Dark Side’, Washington Post, 8 June 2003, retrieved at http://www.ncdsv.org/images/TechnologyDarkSide.pdf.

  • Southworth, C. and Tucker, S. (2007) ‘Technolog)’’, Stalking and Domestic Violence Victims’, Mississippi Law Journal, 76, 667–675.

    Google Scholar 

  • Spitzberg, B. H. and Hoobler, G. (2002) ‘Cyberstalking and the Technologies of Interpersonal Tenorism’, New Media & Society, 4(1), 71–92.

    Article  Google Scholar 

  • Strassberg, D., McKinnon, R., Sustaita, M. and Rullo, J. (2013) ‘Sexting by High School Students: An Exploratory and Descriptive Study’, Archives of Sexual behavior, 42(1), 15–21.

    Article  Google Scholar 

  • Sutton, A., Cherney, A. and White, R. (2008) Crime Prevention: Principles, Perspectives and Practices (Melbourne, VIC: Cambridge University Press).

    Book  Google Scholar 

  • Take Back the Tech (2013) retrieved at http://www.takebackthetech.net/.

  • Ullman, S. E. (1997) ‘Review and Critique of Empirical Studies of Rape Avoidance’, Criminal Justice and behavior, 24(2), 177–204.

    Article  Google Scholar 

  • Wallace, B. (2000) ‘Stalkers Find a New Tool: The Internet/Email Is Increasingly Used to Threaten and Harass, Authorities Say’, San Francisco Chronicle, 10 July 2000, retrieved at http://www.sfgate.com/news/article/Stalkers-Find-a-New-Tool-the-Intemet-E-mail-2714253.php.

  • Wairen, I. and Palmer, D. (2010) ‘Crime Risks of Three-Dimensional Virtual Environments’, Trends and Issues in Crime and Criminal Justice, No. 388.

    Google Scholar 

  • Williams, M. E. (2013) ‘Facebook Finally Addresses Its Rape Culture’, Salon, 30 May 2013, retrieved at http://www.salon.com/2013/05/29/facebook_finally_addresses_its_rape_culture/.

  • Yar, M. (2005) “The Novelty of “Cybercrime”: An Assessment in Light of Routine Activity’, European Journal of Criminology, 2(4), 407–427.

    Article  Google Scholar 

  • Young, G. and Whitty M. T. (2010) ‘Games Without Frontiers: On the Moral and Psychological Implications of Violating Taboos within Multi-player Virtual Spaces’, Computers in Human Behaviour, 26(6), 1228–1236.

    Article  Google Scholar 

  • Youngs, G. (2005) ‘Ethics of Access: Globalization, Feminism and Information Society’, Journal of Global Ethics, 1(1), 69–84.

    Article  Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2014 Nicola Henry and Anastasia Powell

About this chapter

Cite this chapter

Henry, N., Powell, A. (2014). The Dark Side of the Virtual World. In: Henry, N., Powell, A. (eds) Preventing Sexual Violence. Palgrave Macmillan, London. https://doi.org/10.1057/9781137356192_5

Download citation

Publish with us

Policies and ethics