Overview on Cyber Violence Against Women in Iraq

Related Activities

Cyber Security Training for Women

Objectives

This research paper will address three different main aspects in regards to cyber-violence against women in Iraq, the technical, the legal, and the social aspects which essentially affect women in Iraq in current circumstances, with the aim of building the capacity on social inclusion and freedom of expression in Iraq

Activity civic goals

Yes

Narrative summary

This research paper is one of TATHEER activities, a program under the Innovation for Change in Middle East and South Africa (I4C MENA) that is implemented by The Station foundation for Entrepreneurship with the aim of building the capacity on social inclusion and freedom of expression in Iraq under the MENA Hub’s pillars of digital security and advocacy with the objective to establish a collaboration model between civil society and technologists in areas related to human rights, digital security, advocacy, and accountability. In this research paper, we are going to tackle and talk about cyber-violence against women in Iraq. We will commence this research with some technical terms and their definitions, as we’re going to briefly go through some types of cyber-violence with global statistics regarding cyber-violence against women. We also will look over some of the data that has been collected using an online survey filled out by more than 500 Iraqi women and three focus groups with more than 50 participants from all Iraqi governorates. After going through the data collected we will try to reveal the problem and highlight the causes, reasons, and probable outcomes and put those data in numbers, percentages, and visual charts to come up with findings and insights to better help us frame the phenomenon. This research paper will address three different main aspects in regards to cyber-violence against women in Iraq, the technical, the legal, and the social aspects which essentially affect women in Iraq in current circumstances, then the conclusion to be followed, to sum up what we have reached collecting and analyzing data from those targeted segment to put forward a set of recommendations we find crucial for limiting and preventing such phenomenon in the near future.