SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

Sexual Harassment Online: Shaming and Silencing Women in the Digital Age

Tania G. Levey

1 min read
in Book, Cyber Citizens, Learning, Women

Women who use social media are often subjected to blatant sexual harassment, facing everything from name calling to threats of violence. Aside from being disturbing, what does this abuse tell us about gender and sexual norms? And can we use the Internet to resist, even transform, destructive misogynistic norms? Exploring the language of shaming and silencing women in the cybersphere, Tania Levey addresses these questions and also considers how online attempts to regulate women’s behavior intersect with issues of race, ethnicity, and class.

CONTENTS:
•Gender and Sexual Norms in the Digital Age.
•Slut: Shaming Sexual Activity.
•Whore: Judging “Bad” Girls.
•Dyke: Enforcing Heterofeminine Standards.
•Bitch: Controlling Gender Performances.
•Cunt: Silencing Women in Public. •Transformation and Dissent on Social Media.
•Appendixes.

 

GET BOOK

*Disclaimer: As an Amazon Associate we earn from qualifying purchases.

Related

Tags: CybersecurityCyberstalkingSexual Harassment OnlineTania G. LeveywomenWomen Books
9
VIEWS
ADVERTISEMENT

Related Posts

Law & Order: Criminal Intent(2001–2011) Boots on the Ground

Law & Order: Criminal Intent(2001–2011) Boots on the Ground

May 9, 2022
Cyberterrorism A Complete Guide

Cyberterrorism A Complete Guide

May 9, 2022
Cyber Crime and Cyber Terrorism Investigator’s Handbook

Cyber Crime and Cyber Terrorism Investigator’s Handbook

May 9, 2022
Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities

Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities

May 9, 2022

More Articles

Alerts

Red Lion security advisory

April 14, 2022
Course

SOC for Cybersecurity Certificate

April 11, 2022
Course

Networking in Google Cloud: Defining and Implementing Networks

March 25, 2022

Vulnerability Scanning

November 23, 2021
Course

Shift Left, Shift Right: The DevSecOps Hokey Pokey

March 30, 2022
Book

Secure Software Development

February 17, 2022
Alerts

Adobe Releases Security Updates for Multiple Products 

July 21, 2021
Entertainment

Terminal Error (2002)

October 17, 2020
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials
  • Cyber Opportunities

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....