{"id":48240,"date":"2019-06-12T14:09:53","date_gmt":"2019-06-12T04:09:53","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=48240"},"modified":"2019-06-14T13:36:56","modified_gmt":"2019-06-14T03:36:56","slug":"cyber-technology-and-gender-what-are-we-missing","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-technology-and-gender-what-are-we-missing\/","title":{"rendered":"Cyber, technology and gender: what are we missing?"},"content":{"rendered":"
<\/figure>\n

As humans develop increasingly smarter machines, we may be building in a dangerous bias, to society\u2019s detriment. The technology sector, in areas such as cybersecurity development and STEM (science, technology, engineering and maths) in general, is overwhelmingly male. That gender imbalance inevitably limits diversity of thinking and means that cyber technology, both in its design and in the analytical output produced, are likely to mirror the biases that prevail in the world in which we live. And this brings consequences that will become more profound as time passes, particularly in the national security realm.<\/p>\n

In March, Australian Signals Directorate chief Mike Burgess gave an address<\/a> at ASPI outlining some of the work his agency has done to address threats to Australia\u2019s security. He noted the importance of the work done at ASD by women. Though they make up just over a third of the agency\u2019s workforce, it\u2019s notable that women fill 54% of management positions.<\/p>\n

Yet the number of women involved in the cyber field overall remains incredibly low. It\u2019s estimated that the global shortage of cybersecurity workers is likely to reach 1.8 million by 2022, and governments and the private sector are missing out on a significant source of potential talent and diversity in thinking if they don\u2019t engage substantively in efforts to recruit women.<\/p>\n

But hiring more women is not enough. There\u2019s another dimension that doesn\u2019t get mentioned nearly enough in the context of cybersecurity\u2014and that is the role of gender perspectives. It\u2019s not enough to just have more women participating; there\u2019s also a need to consider the roles of men and women (and non-binary-identifying individuals) operating in the cyber domain.<\/p>\n

There\u2019s considerable evidence that technology has a significant role in perpetuating inequality across society. Women are far more likely to be victims<\/a> of cyber bullying and shaming through online platforms than men. A few weeks ago, \u2018a female diplomat<\/a> faced a barrage of anti-abortion text messages from an advocacy group, disrupting a major UN summit on women\u2019s rights\u2019.\u00a0Incidents like this highlight the low threshold for gender-focused harassment. What\u2019s most problematic is that decision-makers can be harassed online by anyone with a computer, often anonymously.<\/p>\n

The fact that women, according<\/a> to a 2015 UN report, are 27 times more likely than men to be harassed online\u00a0is simply a reflection of a larger societal problem<\/a>, now enabled by technology. Metadata and the information gathered for geolocation services can enable abusers to track partners or harass individuals through multiple mediums, meaning that technology acts as a less visible enabler for domestic abuse. Practical resources, tools and government responses need to consider these threats to women\u2019s security.<\/p>\n

What\u2019s more, technology can be misused by the state as a tool to supress women\u2019s rights. Saudi Arabia\u2019s\u00a0mobile app\u00a0Absher\u00a0<\/a>is an example of this. The app was developed by the Saudi government as a portal for citizens to access government services. However, alongside the ability to lodge licence applications and view documents, the app also allows male guardians to approve or withdraw permissions for women to travel internationally. While some have argued that this may have positive effects because lenient guardians can grant women more autonomy, it also demonstrates how technology can act as a tool to perpetuate violations of women\u2019s rights. It also raises significant questions about the ethics<\/a> of platforms like Google and Apple that facilitate apps that can be used to oppress women.<\/p>\n

In addition to misuse and abuse, there\u2019s also potential for technology to perpetuate existing biases\u2014particularly<\/a> in the domain of artificial intelligence. Male and female patterns of behaviour are often different, so more diverse thinking is required to prevent societal inequalities from being built into a machine\u2019s \u2018abilities\u2019 from the start.<\/p>\n

Already there are concerns that AI and the devices that form part of the internet of things are being dominated by women\u2019s voices in service roles<\/a> (like Apple\u2019s Siri and Amazon\u2019s Alexa). The machine-learning processes that many AI tools rely on may result in more discriminatory practices, if data and processes don\u2019t address some inherent biases that already exist in society, based on perceptions of what constitute traditionally feminine and masculine roles. Having more diverse participation in the cyber workforce is one way to reduce these risks, but it also requires more coherent policies that proactively address inequality in the platforms, from their earliest stages of development.<\/p>\n

Much of what people do is based on assumptions, many of them unconscious. Female networks often function and communicate differently to male networks. Yet assuming that offline gender norms and perceptions carry over to online platforms can present a wider security risk when it comes to issues such as violent extremism and terrorism, because people\u2019s offline behaviour may differ from their behaviour in online communities<\/a>. The different ways that men and women use online platforms needs to be factored more comprehensively into analysis on issues related to terrorism, for instance.<\/p>\n

The availability of information on various social media platforms also means there\u2019s a gendered element in the way information and individuals are manipulated. \u2018Honeypots\u2019 are not a new phenomenon in the world of intelligence. However, the use of such approaches through tactics such as \u2018catfishing<\/a>\u2019 (pretending to be someone you\u2019re not on social media) presents a complex security risk for governments, particularly when social media platforms, devices and apps leave crumbs of information about high-profile individuals for enemies to exploit. During a recent military exercise, NATO\u2019s Strategic Communications Centre of Excellence targeted troops through fake social media pages<\/a> and was able obtain intelligence on military operations, demonstrating how easy it can be for a hostile force to get information (for the price of US$60).<\/p>\n

Of course, the challenges presented by cyberspace and technology aren\u2019t new. As technology historian Melvin Kranzberg noted<\/a> more than three decades ago, \u2018Technology is neither good nor bad; nor is it neutral.\u2019 It is a mirror that reflects the society in which it is used. That means that like the rest of our discussions about defence and national security, the conversation about women in cyber also needs to include consideration of their diverse perspectives in the development and use of technology. Otherwise, we are literally missing half the picture.<\/p>\n

This article is part of a series on women, peace and security that\u00a0<\/em>The Strategist\u00a0is publishing in recognition of International Women\u2019s Day 2019.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

As humans develop increasingly smarter machines, we may be building in a dangerous bias, to society\u2019s detriment. The technology sector, in areas such as cybersecurity development and STEM (science, technology, engineering and maths) in general, …<\/p>\n","protected":false},"author":229,"featured_media":48247,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[2138,332,1002,1868],"class_list":["post-48240","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cybersecurity","tag-technology","tag-women","tag-wps","dinkus-wps-2019"],"acf":[],"yoast_head":"\nCyber, technology and gender: what are we missing? | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-technology-and-gender-what-are-we-missing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber, technology and gender: what are we missing? | The Strategist\" \/>\n<meta property=\"og:description\" content=\"As humans develop increasingly smarter machines, we may be building in a dangerous bias, to society\u2019s detriment. The technology sector, in areas such as cybersecurity development and STEM (science, technology, engineering and maths) in general, ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-technology-and-gender-what-are-we-missing\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-12T04:09:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-06-14T03:36:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/06\/1206phone.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"407\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lisa Sharland\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lisa Sharland\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-technology-and-gender-what-are-we-missing\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/06\/1206phone.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/06\/1206phone.jpg\",\"width\":720,\"height\":407},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-technology-and-gender-what-are-we-missing\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-technology-and-gender-what-are-we-missing\/\",\"name\":\"Cyber, technology and gender: what are we missing? | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-technology-and-gender-what-are-we-missing\/#primaryimage\"},\"datePublished\":\"2019-06-12T04:09:53+00:00\",\"dateModified\":\"2019-06-14T03:36:56+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/4a389571a6326e0ac3a6a269587a9187\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-technology-and-gender-what-are-we-missing\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-technology-and-gender-what-are-we-missing\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-technology-and-gender-what-are-we-missing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber, technology and gender: what are we missing?\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/4a389571a6326e0ac3a6a269587a9187\",\"name\":\"Lisa Sharland\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/252280a7b161ae7dac89429c352e306d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/252280a7b161ae7dac89429c352e306d?s=96&d=mm&r=g\",\"caption\":\"Lisa Sharland\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/lisa-sharland\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber, technology and gender: what are we missing? | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-technology-and-gender-what-are-we-missing\/","og_locale":"en_US","og_type":"article","og_title":"Cyber, technology and gender: what are we missing? | The Strategist","og_description":"As humans develop increasingly smarter machines, we may be building in a dangerous bias, to society\u2019s detriment. The technology sector, in areas such as cybersecurity development and STEM (science, technology, engineering and maths) in general, ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-technology-and-gender-what-are-we-missing\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2019-06-12T04:09:53+00:00","article_modified_time":"2019-06-14T03:36:56+00:00","og_image":[{"width":720,"height":407,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/06\/1206phone.jpg","type":"image\/jpeg"}],"author":"Lisa Sharland","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Lisa Sharland","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-technology-and-gender-what-are-we-missing\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/06\/1206phone.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/06\/1206phone.jpg","width":720,"height":407},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-technology-and-gender-what-are-we-missing\/","url":"https:\/\/www.aspistrategist.ru\/cyber-technology-and-gender-what-are-we-missing\/","name":"Cyber, technology and gender: what are we missing? | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-technology-and-gender-what-are-we-missing\/#primaryimage"},"datePublished":"2019-06-12T04:09:53+00:00","dateModified":"2019-06-14T03:36:56+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/4a389571a6326e0ac3a6a269587a9187"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-technology-and-gender-what-are-we-missing\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-technology-and-gender-what-are-we-missing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-technology-and-gender-what-are-we-missing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber, technology and gender: what are we missing?"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/4a389571a6326e0ac3a6a269587a9187","name":"Lisa Sharland","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/252280a7b161ae7dac89429c352e306d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/252280a7b161ae7dac89429c352e306d?s=96&d=mm&r=g","caption":"Lisa Sharland"},"url":"https:\/\/www.aspistrategist.ru\/author\/lisa-sharland\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/48240"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/229"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=48240"}],"version-history":[{"count":8,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/48240\/revisions"}],"predecessor-version":[{"id":48312,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/48240\/revisions\/48312"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/48247"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=48240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=48240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=48240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}