International Conference on Digital Abuse of Women in Intimate Relationships Director Margaret Martin.

Slides:



Advertisements
Similar presentations
Cyber Stalking By Matthew Hall. What is cyber stalking? According to techarget.com, it is defined as a crime in which the attacker harasses a victim using.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Dating Violence Mrs. Gennaro.
“Cyber bullying is when someone uses different types of technology, like mobile phones, games consoles (PS3 or XBOX 360) and computers to threaten,
Don’t be bullied, or be a bully.
Internet Online Safety How to have FUN and Stay in Control.
Domestic violence Research with Teenagers in the UK.
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
Cyberbullying Bullying with Technology. What is Cyberbullying??? Using , instant messaging, chat rooms, or other forms of information technology.
Cyber Bullying: Not a Pretty Picture! By: Baylee Reller.
Forms of Cyberbullying
BELL WORK Why do you think people are bullies?.
Cyberbullying When good technology goes bad…….. Stay safe in cyberspace.
Internet Safety & Cyber Bullying
This week is anti-bullying week.
The Internet is Forever
e-safety and cyber bullying
Cyber bullying Lara Climer and Michele Fesenbek. Interesting Tidbits  Over 87% of teens age use the internet  95% of parents do not understand.
How many of these icons do you recognise?. Year 7 Guidance Manager CEOP Ambassador.
Growing up Digital Opportunities and challenges for parents.
Cyberbullying Kassie McAninch.
Where does bullying occur? OFSTED Report % at school 55% at school 24% at home 24% at home 18% around where children live 18% around where children.
S TOP CYBERBULLYING ! This is our project on cyberbullying. This will teach you different types of cyberbullying and stories of victims. We will tell you.
Cyberbullying By: Kayla Banks EDF 204 Spring 2015.
Awareness raising session for Parents and Carers.
By Yevgeniy Zubkov.  Cyber bullying Cyber bulling is very serious if cyber bulling is happing to you, you should tell a trusted adult.
Welcome to our E-Safety
Use kind words, help when you can, share and take turns, listen to what others have to say, be honest and truthful, think before you speak out, remember.
By: Jules Romani Summer Horchem Bailey Moore. Time Spent on Facebook The large amount of time teenagers spend on Facebook seems to continually result.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
SEAL Say no to bullying.
E-Safety Challenge College. Learning Objectives Understanding the definition of ‘cyber’ bullying and the affect it can have on the victim.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Anti- bullying week Year 4.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
As of 8/31/15 Cyberbullying. Learning Target: I can learn how to protect myself from cyberbullies. Success Criterion: I can identify 3 types of cyberbullying.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
 FOOD, WATER, SLEEP, AIR  SAFETY FROM THREATS AND VIOLENCE  LOVE OF FRIENDS AND FAMILY  RESPECT.
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
Do pictures always give truthful information? Can publishing it be hurtful??
By Kira Hall and Iliesa Sevudredre Do you guy’s know what Cyber Safety means? Well we are going to tell a story so you guys can understand what Cyber.
STOP CYBERBULLYING By Brandon Tremblay “Suicide does not end the chances of life getting worse, it simply eliminates the chances of it getting better”
By Tyanna Paling and Manpreet Gill
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
Online Safety Parent Workshop Helping to keep your children safe online.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Cyberbullying Activity 4: Advice Quiz. Ask an Internet Expert These people need help from someone who knows how to be safe online... YOU! What advice.
Healthy relationships and keeping safe. being healthy.
Will Howard 8 th Grade. I am presenting this because I want people to learn the causes about sexting.
Social Networks are a website or other application which enables users to communicate with each other by posting information, comments, messages, images,
By Konrad keller. People who have a phone are “cool” and people who don’t are considered not cool so the people with the phone exclude others that are.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
By: Delaney Syme and Megan Eglin.. When there is a very intense argument going on in a chat room or over texts it is called flaming. The bullies that.
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
Cyber Bullying Anti-bullying Week Cyber Bullying What does it mean? What does it mean? Cyber bullying is when cruel messages or pictures are sent.
Internet Safety Mrs. Lijó. Some Names for the Internet Cyberspace The Web The Net The Information Highway The World Wide Web.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
Digital Footprints By: Devon Nicholson. What is a digital footprint? A digital footprint is an online footprint in which people can look at what you have.
Sarah Manuel Final Presentation MCO435-Social Media.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
Social Media Smarts. Yep! That’s Me! I have had a cell phone since 5 th Grade I just got a cell phone this year I wish I had a cell phone I have an IPAD.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
Domestic abuse It is never OK. By the end of the lesson you will… Know …what domestic abuse is Understand …why it is unacceptable Be able to …avoid abusive.
Communicating safely and appropriately online
Cyberbullying project
Issues In media studies: Cyberbullying
Anti bullying Week VMG What does bullying mean to you?
Online Safety! Created by Educational Technology Network
Session 5: Sexting.
Online Safety Assembly.
Presentation transcript:

International Conference on Digital Abuse of Women in Intimate Relationships Director Margaret Martin

Social Media Use in Ireland 80% of adults in Ireland use social networking 78% of adults are on Facebook and about 80% of Facebook users use a smartphone, tablet or laptop 1.8m people in Ireland use Facebook every single day with about 29% of the audience between years 32% use Twitter 0.7m log onto Twitter every day in Ireland with about 53% of the Audience between years

STIR (Safeguarding Teenage Intimate Relationships) 5 country study (Bulgaria, Cyprus, England, Italy and Norway) Connecting online and offline contexts and risks Findings on the incidence and impact in young people’s intimate relationships (aged years) Sending and receiving sexual images

STIR Findings on Incidence Rates and Impact FindingYoung WomenYoung Men Experienced interpersonal violence and abuse ranged 50% - 66% 33% - 66% Experienced negative impact only following sexual violence 81% - 96% Experienced positive or no impact % - 75% In all countries, young people were at least twice as likely to have sent a sexual image or message compared to young people who had not been victimised; and in the UK being asked for a sexual image was accepted as ‘normal’ by young people.

STIR Quotes from Teenagers Quote from Carlo, 17, Italy: If a naked picture of mine goes around the web, no problem…. for a girl it is different…. Her reputation would be in trouble… Quote from Erika, 17, Norway: He walks along with her ‘whole life’ in his mobile phone, ready to share it with anyone at any time

STIR Findings In all 5 countries, young people experienced control and surveillance including: Online ControlOffline Control Being instructed not to chat with specific people or delete contacts Limiting contact with friends Being pressurised or forced to give passwords for online accounts Telling partners what to wear Text conversations monitored or receiving constant phone calls Turning up uninvited and getting upset, annoyed and angry if partner wanted to do take part in activities without them

‘feeling controlled as not even my parents had ever done…’ STIR Quote

Statistical Context: Domestic Violence and Digital Abuse EU FRA Survey 12% of women experienced some form of stalking 5% experienced cyber stalking 50% of perpetrators were partners or ex-partners Women’s Aid Survey (UK) 41% of domestic violence victims that had been helped by Women’s Aid had been tracked or harassed using electronic devices Digital Trust (2015) More than 50% of abusive partners used spyware or some other form of electronic surveillance to stalk their victims The reality is that women in Ireland are more likely to be stalked by a partner or ex than by anybody else.

Digital Abuse Methods

Cumulative Abusive Behaviours for 2 Women Woman A  Her abusive partner sends her/family/friends s/texts/instant messages that were offensive/threatening  He posted offensive comments about her on internet  He shared intimate photos/videos on the internet or by mobile phone  He spread lies and rumours about her on the internet  She reported to Gardai along with other serious abuse and she also tried civil remedy

Woman B  Her abusive partner sends her/family/friends s/texts/instant messages that were offensive/threatening  He tracked her by installing electronic spyware/surveillance on her computer/mobile phone  She had to stop using her phone and got a very simple one so she can communicate with her family and friends safely  He continues to bombard her with texts

Quotes from Testimonies Project - ELLEN Offline:  For a long while, I believed what he said about me; that I wasn’t attractive, that I was stopping him from enjoying his life. Online:  He would text me, saying that I was old, fat and used up. That I wasn’t able to take care of our son, and he could take him away from me. Impact:  He constantly hacked away at my self-esteem. It gave me a hole in my stomach that I thought would never leave me.

Quotes from Testimonies Project - LISA Offline:  He stalked me after I left him. Sometimes in the dark, I’d see him in the back garden. Online:  I was getting texts saying things like ‘get back to work, you bitch’ or ‘don’t go out tonight bitch’ and calling me a ‘slut’ and a ‘cunt’ and a ‘whore’. Impact:  He was still trying to control me. I used to think he was under my bed and that he was going to pounce and finish me off.  I had this feeling that he wanted to kill me and that he wasn’t happy that he hadn’t before things ended.

Remembering Stolen Lives

Thank You