You are on page 1of 3

commentary

Violence against Women and selfhood inherent in new ICTs


comprise new spaces for information ac-

via Cyberspace cess, empowerment, and solidarity. At the


same time, these very characteristics as-
sociated with online spaces allow perpe-
trators of violence against women to get
Anita Gurumurthy, Niveditha Menon away. Since cyber identities and physical
identities may not necessarily overlap, the

I
A report on a consultation n order to open up a dialogue around former are not necessarily bound to the
on women and the use of the emerging narratives of informa- same social context or rules that the latter
tion and communications technologies might operate under.
information technologies that
(ICTs) and gender-based violence, Jagori Another prominent theme of discussion
addressed how policy choices (Delhi) and Sakhi (Thiruvanantha­ was the use of images in the harassment
need to avoid narratives of puram), two women's organisations, along of women. Images, especially of women,
fear around new technologies, with the Society for Promotion of Alter- have enormous currency in digital spaces,
nate Computing and Employment (SPACE), thanks to their widespread and easy
narratives that can effectively
Thiruvananthapuram, a non-governmen- a­ccess. The porn industry, in this context,
constrain women’s freedom to use tal organisation (NGO) promoting the use has unprecedented reach, both in terms
digital spaces. of alternate technologies, held a consulta- of audience and exploitation, sustained
tion in March 2009 in Thiruvanan- mostly through the images of willing and
thapuram on the “Misuse of Communica- unwilling women. In the Indian context,
tion Technology and Its Linkages with images on the internet or through mobile
­Violence against Women”. telephones have often been used by stalk-
The consultation was, in part, motivat- ers to denigrate, intimidate and harass
ed by the suicides by women victims of women on- and off-line. For example,
online harassment in Kerala, but was also women who are raped are often revictim-
a timely, and perhaps, the first significant, ised when the images of their rape are
public forum in the state to address r­ecorded and used against them to per-
g­ender-based violence and abuse through petuate the cycle of violence.2 Similarly,
ICTs1 and the wider social and policy con- images of rape are often released online
text underpinning the same. The consul- as a tool to further intimidate and silence
tation brought together feminist activists, women victims. The sophistication of new
local women’s groups, educators, govern- technologies enables morphing and the
ment departments implementing pro- construction of fake images or videos
grammes for women, lawyers groups and which are often perceived to be “real” and
bureaucrats. This note builds on the issues “authentic”. In this context, participants
raised at the consultation, with a view to at the consultation also examined why
broaden the parameters defining the and in what ways the internet is seen as a
g­ender and ICTs debate. masculine space (used primarily by and
for heterosexual males). This has several
Cyber Identities and Images implications for the participation of
An important theme at the consultation women in cyberspace. For example, in the
was the construction of identities in cyber­ case of morphed images posted on ex-
space, and the ways in which they are tremely violent pornographic sites, the
implicated in the perpetration of violence violence would not just be contained
against women. New technologies enable within digital spaces, but actually extend
a transgression of the boundaries of to a loss of the free­doms that the internet
“physical” or “real” identities, and in these offers to women.
fluid spaces, individuals forge new rela- The consultation drew attention to how
tionships and networks, navigating new, the Information Technology Act of 2000
and often times, multiple identities. These (henceforth referred to as ITA 2000)
identities become essential to understand primarily aims to provide a legal infra-
social relationships in cyberspace, and structure to promote e-commerce in
Anita Gurumurthy (anita@itforchange.net) consequently, the relationships that can India. G­iven that it has little to do with
and Niveditha Menon (niveditha@itforchange. become abusive and violent. The anonym- individual and personal citizen rights, it
net) are with IT for Change, Bangalore.
ity and forays into new self-expression is silent around the notion of cyber rights
Economic & Political Weekly  EPW   October 3, 2009  vol xliv no 40 19
commentary

and individual protection under the law. ­ ersonhood is gendered in digital spaces.
p solidarity. So how do we grasp the chang-
For e­xample, the ITA 2000 does not ad- This not only has implications for debates ing public sphere?
dress consent and free will. Therefore, if around women’s privacy and anonymity Furthermore, corporatised governance
women engage online in sexual acts of on the Internet, but also for the examina- regimes in digital spaces – such as of
their own volition, they can still be tion of ontological shifts in digital spaces Facebook Inc, which defines the rules and
booked under the ITA 2000, because the that are empowering. Feminist interpreta- norms of the Facebook social networking
consent of the parties involved is not tions of new ICTs also call for a rigorous space – not only represent the paradoxes
considered. The only provision that con- unravelling of the normative structures of what we know to be an egalitarian in-
siders consent is the matter of images and processes through which paternalism ternet, but has also recast social and legal
taken via phone. The lacunae in the law and patriarchal discourses are repro- discourse in emphatic ways. As an exam-
also relate to the owner­ship of images. duced, and also, challenged in digital ple of this growing trend of the influence,
For example, if a woman has consented to spaces – how, for instance, notions of recently, Google disallowed advertise-
her pictures being taken, but does not womanhood, modesty, shame, honour are ments for abortion clinics in several
want them to be publicised, what are the reconstructed in the relationship architec- n­ations, some of which do not prohibit
rules of ownership involved in these de- tures of digital spaces and how these given abortions.3 A more grounded, southern
bates, and how can these rules of owner- categories may also be subverted. Essen- information society perspective would
ship be legislated and enforced? Such tially, an institutional-relational analysis lead us to a crucial insight: that “non-
issues are especially relevant in the con- is of foundational value in framing a gen- users” of new ICTs are impacted by the
text of the queer movement in India, der and ICT discourse. Such an analysis, changing i­nstitutional order as much
where the Internet has provided a visible using an “information society” lens, would as “users”. In the emerging institutional
and vibrant space for sexual minorities to underscore a new techno-social reality order that is scaffolded by ICTs, the net-
communicate and network. where relationships and institutions are work society creates new exclusions that
One of the primary objectives of the being reconfigured. can exacerbate the structural disadvan-
consultation was to discuss how policy Gender and development theory, by and tages of those on the peripheries, while
choices need to avoid narratives of fear large, looks at ICTs as tools that can be used strengthening the power of local elites,
around new technologies that can effec- or misused. But the transformatory social totalitarian states, and the transnational
tively constrain women’s freedom to use paradigm of the information society needs hold of corporate capitalism. Women’s
digital spaces. The consultation debated to be understood distinctly from the tech- access to ICTs is thus not only a question
the tendency to characterise women nological artefacts that represent this radi- about access to tools that can be appropri-
victims of cybercrime as “emotionally cal transformation. The meaning of social ated for individual change, rather, more
weak or unstable” and the paternalism change in the contemporary context lies in importantly, their disenfranchisement
prevalent in policies, implementing the changing public sphere, analysing the in the new g­lobal polity where voice and
­institutions, and the justice system that various phenomena that can provide new participation and the very enjoyment
­imposes restrictions on women’s avenues for feminist inquiry. The slippages of many rights depends on their digital
freedoms    online in the name of safety between the private and the public that citizenship.
and security. The consultation also em- have come to fundamentally reconfigure
phasised the ­urgency to build a wider the spatialities of social transactions and A Feminist Response
­dialogue around the interface of techno­ communications characterising contempo- How can a feminist analysis shape policy
logy with culture, institutions of family rary life dislodge the basic conceptions of frameworks in respect of ICTs? New ICTs
and marriage, sexuality, body, ­privacy feminist thought around the public and provide radical choices for empowerment
and freedom of expression. private. For example, private communica- and new pathways to citizenship, espe-
tion on the Internet actually occurs on cially for marginalised women. For in-
Changing Public Sphere platforms that are essentially public (such stance, in respect of the Right to Informa-
This commentary uses the Sakhi-Jagori as chat rooms or Facebook). On one hand, tion Act (RTI) or the National Rural
consultation for a broader reflection concerns about digital dangers are born ­Employment Guarantee Act (NREGA),
around ICTs and women’s rights. The dis- as a result of the nebulous nature of ­information architectures supported by
course of technology abuse to perpetrate ­spatial boundaries in defining relation- ICTs catalyse a push for institutional trans-
violence against women is no doubt a use- ships in the information society. And on parency and accountability. Yet, as deve­
ful point of departure for a feminist un- the other hand, it is precisely the trans- lopment interventions increasingly adopt
packing of technologies, but it is only a formatory nature of these slippages that ICTs to democratise information, the
partial and hence, inadequate strategy to allow for new kinds of publics to a­ssemble techno­logical architectures supporting
grasp the totality of the relationship be- momentarily, which in turn, can redefine these processes also have to provide safe-
tween new ICTs, gender and development. the meaning of social protest (as we saw guards for privacy. Information society-
Feminist constructs need a wider kaleido- in the sms-based protest against the court related policies to protect and further
scope that problematises “digital person- verdict in the Jessica Lal murder case) women's rights must address both
hood”, and the ways in which such and for building global communities of ­negative and positive rights, protecting
20 October 3, 2009  vol xliv no 40  EPW   Economic & Political Weekly
commentary

individual privacy, while enabling highest policy processes in respect of information expositions of a contemporary feminist
transparency in government. At the same society realities, the implications of such grand theory) have urged a disruption of
time, the ­protection of women’s rights to governance deficits are obvious. The lack thinking that can bring the symbolic and
information and communication empha- of territorial jurisdiction over the Internet material together in interpretations of
sises the need to balance concerns of self- makes it difficult for countries in the present realities. These evolutions are no
expression with concerns of protection d­eveloping world to identify the abusers doubt exciting but also beseech a ground-
from exploitation. While there is no doubt and prosecute the guilty. For example, ing in third world feminist practice. In the
that policies are needed to address online lack of cooperation from foreign-based emerging techno-social milieu of the
violence, the boundaries of state involve- web sites is one of many hindrances to the third world, the “troubling” of given cate-
ment in effecting such protection becomes resolution of cyber crime cases. gories is especially significant to discours-
critical. While the government should be Among the greatest challenges to a es of r­esistance, agency and empower-
able to prosecute those engaged in vio- strong feminist response to issues of vio- ment. Southern feminist interpretations
lence against women, a right to surveil- lence against women and ICTs is the fact – a r­eimagining of the female techno-so-
lance in general, without adequate basis is that feminist analytical frameworks have cial subject – are, therefore, critical both
likely to infringe on women’s privacy. The to coherently address the changing reali- for a­ppropriating the emancipatory con-
state's duty to intervene and prosecute ties restructuring gender relations in res­ tent of the emerging technological para-
­v iolence when it happens online should ponse to the advent of new information digm and to interrogate its patriarchal
not become an excuse for surveillance and communication technologies. Piece- and capitalist systems, institutions and
over the Internet. Thus, policy approaches meal efforts to tinker with policy domains representations.
need to r­ecognise both women's “public”, like employment, education or crime may
political rights as well as “private”, indi- fail to add up to a cogent national response Notes
vidual rights, especially in the context of to the opportunities and challenges pre- 1 Including cyber-stalking, cyber-defamation,
c­yber-pornography, and harassment via emails,
violence against women. sented by new technologies, especially for morphing of images, and email spoofing, among
transformatory change that privileges the others.
Neoliberal View marginalised. Also, feminist engagement 2 Recently, a woman who was raped by two police
constables in Andhra Pradesh was also forced to
By and large, ICT policies in developing with policies needs to approach rights perform sexual favours to other individuals on
the threat that an MMS of her rape would be dis-
countries, including India, have adopted from the vantage of an alternative ICT dis- closed widely throughout the community.
a neoliberal, market view of ICTs and course. Policies are needed to promote ap- 3 http://www.cathnews.com/article.aspx?aeid=14968
their default definition as market infra- propriate technologies that can create se- 4 http://www.genderit.org/en/index.shtml?apc=
a--e96159-1
structure and have thus marginalised cure and empowering online spaces. Fem- 5 http://www.uri.edu/artsci/wms/hughes/new_
the   larger s­ocial significance of ICTs. inist engagement with such policies is part tech.pdf

Therefore, what we find is that existing of the imperative that can and should
legal and policy frameworks usually ad- shape the emerging technological para- References
dress the ICT “eco­nomy”. As was flagged digm. By far the most urgent feminist res­ Braidotti, Rosi (1994): Nomadic Subjects: Embodiment
and Sexual Difference in Contemporary Feminist
earlier from the proceedings of the con- ponse that is required is to stop seeing dig- Theory (New York, USA: Columbia University
sultation, an attack against the image or ital and online spaces as a different realm Press).
Haraway, Donna J (1990): Simians, Cyborgs, and
private life of a person is still not viewed confined to technology users, but an Women: The Reinvention of Nature (New York,
as a form of cyber crime4 in many coun- i­mportant site of power that requires a USA: Routledge).
Stanley, Autumn (1995): Mothers and Daughters of In-
tries, including India. Since most viola- feminist intervention. vention: Notes for a Revised History of Technology
tions involving sexual content online are Feminist thought about technology (New Brunswick, USA: Rutgers University Press).
directed against w­omen, the gaps in binds together some distinct lines of in-
­policy and law implicitly compromise quiry – explorations of identity, subjec­
women’s rights. tivity, and the complex representations of
Permission for Reproduction of
Additionally, newer technologies are the self; critiques of technology and glo-
Articles Published in EPW
being employed by the sex industry not balisation, and the relationship between
only to create more violent forms of porno­ gender identity, body and desire. From No article published in epw or part thereof
graphic material, but they are also used theoretical forays that have examined the should be reproduced in any form without
actively to circumvent the law; companies ways in which new technologies reshape prior permission of the author(s).
simply locate servers in countries where dominant taxonomies and cate­gories of
A soft/hard copy of the author(s)’s approval
they will not be prosecuted.5 The absence gender and sexuality (Stanley 1995), and
should be sent to epw.
of a global governance framework in rela- identity (Haraway 1990) to critiques
tion to ICTs (and as discussed, the usurpa- of capitalism that problematise the em- In cases where the email address of the
tion of technology governance by corpo- bodied and embedded experiences of author has not been published along
rates) often works to the disadvantage of women in the context of globalisation and with the articles epw, can be contacted for
developing countries. In the background the information society (Braidotti 1994), help.
of poor institutional maturity of legal and newer arenas of enquiry (or rather, new
Economic & Political Weekly  EPW   October 3, 2009  vol xliv no 40 21

You might also like