Cyber Security And Gender Inequality

Superior Essays
The advent of the so-called “Internet of Everything” has dramatically changed the concepts of information, knowledge, and, most importantly, security. Security has been defined in primarily militaristic terms by the prominent realist theorists of the past. However, the issue of cyber security must be considered to fully understand the contemporary era of security. Furthermore, there is a distinct gender gap in the field of cyber security, which is relevant in the context of standpoint feminism, constructivism, realism. First of all, the security of states is usually thought to be concerned with material resources, military strength, and self-protection. But, as mentioned earlier, the breakthrough of the Internet has revolutionized the idea …show more content…
This is of paramount concern, as the Internet is notoriously open, ubiquitous, and easy to access, making not only governance difficult, but also the enforcement of any laws and restrictions enacted. However, global and national peace is also threatened by another aspect of cyber security, its gender gap. The unequal gender ratio is already evident in the populations of China, South Korea, India, and other prominent nations. Despite the fact that men outnumber women biologically in these states, women do not receive equal pay, rights, or benefits. This logical disconnect is also found in cyber security, in which “only 10-15% of the workforce is female” (LeClair, et. al). To better understand the disparity in the gender ratio in cyber security, states must consider the application of international relations theories and critical approaches, particularly realism, standpoint feminism, and constructivism. Realism is not appropriate as it does not concern itself with the main issue in gender gaps: gender. Realism is on a larger scale - that of statewide security, security dilemmas, interstate struggles, and so forth. Several strands of …show more content…
Due to the globalization of radical Islam and anti-feminism, the former of which is distinctly misogynistic, the gender gap in cyber security may widen even further and cause international conflicts. On the other hand, pro-female movements might help minimize or even close the gender disparity apparent in the cyber domain. Celebrities like Emma Watson and Tom Hiddleston have brought the gender equality issue to the global limelight by campaigning for the “HeForShe” solidarity campaign, which was established by UN Women. Another solution would be to help establish equity for men and women interested in cyber security. States should create scholarships and incentives for women to enter the cyber security field. They should write and implement more comprehensive, specific, and strict laws prohibiting gender discrimination (and gender related wage disparities), which would further the advancement of women in all fields and protect them from future suppression. Additionally, the creation of programs, scholarships, internships, and public schools focusing on the STEM fields would help stimulate female interest in the cyber domain and cyber

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Bayard de Volo’s (2016) methodological approach entails using the feminist international relations lens to several major pieces of evidence, including examining the nature of drone warfare, and a transcription between a drone crew on the 2010 US attack in central Afghanistan that killed 23 civilians. Using gender and the feminist international relations lens to understand the implications of war and gender relations, her analysis focuses on the shift of meanings about masculinity, militarization, and war at the state and individual level of…

    • 743 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    9/11 Turning Point

    • 298 Words
    • 2 Pages

    September 11, 2001, was a terrible tragedy by any measure, but it was not a historical turning point. It herald a new era of international relations in which terrorists with a global agenda prevailed, or in which such spectacular terrorist attacks became commonplace. On the contrary, 9/11 has not replicated. Despite the attention devoted to the “Global War on Terrorism,” the most important developments of the last ten years have been the introduction and spread of innovative information technologies, globalization, the wars in Iraq and Afghanistan, and the political disruptions in the Middle East.…

    • 298 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    "In this day of age, we have dedicated large portions of our lives to the internet and staying connected. This allows a wide variety of knowledge and entertainment to be brought into every home. However, the vast amount of resources available online can possibly be a bad thing. Countless organizations of crime and terrorism roam the online world with a sense of anonymity and the resources to mass spread their ideologies across the world. This has led to the creation of governmental organizations such as the National Security Agency (NSA) that hold the main goal of trying to prevent terrorist and crime organizations from carrying out evil and violent attacks on the people of the United States and the world.…

    • 523 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Academic Search Premier. Web. 24 Feb. 2015. http://web.b.ebscohost.com.ezproxy1.lib.asu.edu/ehost/detail/detail?vid=14&sid=59fa9ad9-2c8c-4d6d-9ad4-14cae4591c9d%40sessionmgr4003&hid=128&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=aph&AN=98905897 Soraya Chemaly, a media critic and activist for Time, writes about how hacking is a hate crime. The majority of the celebrity hackings in 2014 were women and there hasn’t been a discussion in terms of gender-based hate, and why there aren’t pictures of men involved in the hackings.…

    • 1953 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    And that feminist view this idea as essential in that for there to be international peace that women have to play a large role in the state of National Security as men do because they can bring benefits to the debate and solution that many would not expect. The feminist view on National Security is that the conflictual view is only a portion and that one must also see how countries act in cooperation…

    • 1310 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Terrorism is the most popular headline in Media in the present situation. From past few decades’ world’s leading countries have been attacked by terrorist groups. Cyber terrorism is an act of terrorism used by many terrorist groups in order to steal highly classified from opponent countries or disrupt countries operations like nuclear generation, gas supplies etc. Cyber Terrorism is also known to be a way leading countries could show their dominance on other enemy countries. Cyber terrorism became a global threat right from its initial stages.…

    • 1484 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    By reading through the traditional approach to security and its flaws, and progressing to human centred approaches, Booth allows the reader to understand how all human related concerns of emancipation are matters of security that should be heavily analysed, just as much, and if not more than the traditional approaches of security. Booth’s arguments about human security and emancipation allows the reader to look beyond the classic argument made by traditional security thinkers that security studies should not become so broad, and realize that there is no problem in doing so. Doing so only allows for issues to be tackled at their core. A concern one might have with Booth’s article is that it does not put enough emphasis on women’s issues. He does mention siding with the women at the Greenham March , but does not place enough emphasis on the rights of women, and their emancipation from a patriarchal society.…

    • 1801 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    After this event, our security became a top priority for us Americans living the United States. Meanwhile, human conflict and war security concerns are at the core of international studies. Our military power played a key role that day. Many argue that women shouldn’t be a part of any kind of military power. Reading 13 discuss seeing sex, gender, and sexuality in international security.…

    • 523 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Superior Essays

    Lawmakers could not possibly anticipate how cyber-technology would develop. In the last three decades, it has played such a pivotal role in expanding how we communicate and share information on a global scale – a world of smart phones and Internet-of-Things (IoT) devices. But computers and the internet are also used for illegitimate purposes. The government must have adequate enforcement measures in place for maintaining cyber-security.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Next the paper will examine whether the national organizational structure tasked with cyber operations needs to be reorganized and subsequently require a change to the United States Code (USC). Finally, the paper will discuss that if a reorganization is required, which agency should be in charge of cyber security for the United States. Cyber Geography The emergence of the cyber domain has been uniquely different than the traditional domains of air, land, and maritime. Theories about both the cyber and space domains have at times been very similar, treating the domains and purely functional rather than having a physical geography.…

    • 1692 Words
    • 7 Pages
    Great Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays