MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_NextPart_01D1A4B0.2F9A0F40" This document is a Single File Web Page, also known as a Web Archive file. If you are seeing this message, your browser or editor doesn't support Web Archive files. Please download a browser that supports Web Archive, such as Windows® Internet Explorer®. ------=_NextPart_01D1A4B0.2F9A0F40 Content-Location: file:///C:/2B65B229/6.MeenaPriyaDharshini.htm Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset="us-ascii"
Pr
atidhwani the Echo
A Peer-Reviewed International Journal of
Humanities & Social Science
=
=
IS=
SN: 2278-5=
264 (Online) 2321=
-=
93=
19 (Print)
=
=
Im=
pact Factor: 6.=
28 =
(=
I=
ndex Copernicus
International)
=
=
Volume=
-IV,
Issue-IV, April
2016, Page No.
46-50
P=
=
u=
blished by Dept.
of Bengali, Karimganj College, Karimganj,
Assam, India<=
span
lang=3DEN-IN style=3D'font-family:"Cambria","serif";mso-fareast-font-family=
:"Times New Roman";
mso-bidi-font-family:Cambria;mso-bidi-language:BN-BD'>
=
&nb=
sp; =
Website=
: http://www.thecho.in<=
span
lang=3DEN-IN style=3D'font-size:14.0pt;mso-bidi-font-size:11.0pt;font-famil=
y:"Times New Roman","serif";
mso-bidi-language:BN-BD'>
Is
Technology A Bless or Blight for Women Security?-Case Study
Dr. S. Mee=
na Priya
Dharshini
Assistant Professor, Department of
Women’s, Studies, Mother Teresa Women’s University
Abstract
The
world has become in our single hand. Science and technology spread its wing=
s to
cover the world like that. As science and technology grows today, it has tw=
o sides
advantage and disadvantage. It is the right time for women to know both sid=
es
of technology in order to protect them from hazards. The two major technolo=
gies
which make women security as well as drop in danger. This paper focuses on these two major technologies=
, it's
consequences and the steps need to be taken to prevent the security issues
related to them.
K=
ey Words:
women security, security issues and cyber-crimes on women.
Women are known =
as
'Shakthi ' which means 'Meta Power' capable of doing anything and
everything. The female child
exhibits its power in the form of glory from the day of born to the day of
dawn. The angel brings =
all sorts
of goodness and happiness to the family where she gets into. As she grows, the blossoms also gr=
own in
the family which constitutes father, mother, siblings and elders. Later she magnifies the laurels to=
the
new family where she steps into. From the term kid, girl, women, she turns =
into
wife and mother. Whatever nam=
e, she
is being called; it means the light of the home which showers caring & =
kindness
to the family. Several security issues exist which affects women throughout=
the
life. The world has become in our single hand. Science and technology spread
its wings to cover the world like that. As science and technology grows tod=
ay,
it has two sides advantage and disadvantage. It is the right time for women=
to
know both sides of technology in order to protect them from hazards. The two
major technologies which make women security as well as drop in danger. The two major technologies that ma=
ke the
security of women, a very big question mark are cameras and Internet.
Veiled
Camera: Cameras play a very important role in
today's technologies world. I=
t used
to store pleasant movements for future and as proof for crime. The futures of camera goes without end=
. The
hidden camera is used to catch the unknown happening from seat. Apart from =
the
above good purposes mentioned above, now a days cameras are used for illegal
activities. Especially women =
are the
target of these cowards. In o=
lden
days, cameras means it will be a square at least palm length, so photos can=
not
be taken without showing it to anybody.&nb=
sp;
But now cameras less than a centimetre are available, which are know=
n as
hidden cameras. The size of the hidden cameras will be one inc=
h or
lesser, even a pen dot size is also available. The places where the hidden camera=
s are
stored will not be assumed easily. <=
/span>They
may be placed in the tip of pen cap, button hole, shower and wrist watch et=
c.
The
target of hidden camera: Who is the main target of the=
se
hidden cameras? Of course, &q=
uot;Women". Women are caught in these hidden c=
ameras
which is kept in their home, relatives home or friend's home. Other than the
private homes, the hidden cameras are kept in Hotel rooms and wash rooms, Dressing roo=
ms of
Textile show rooms, Ladies hostels, Guest houses and Travellers bungalow.
While taking bat=
h or
changing dress unknowingly, they are caught in the cameras and these pictur=
es
are sold, circulated illegally.
Several cases were filed in this regard, but after the black things
happened though the police cases were given and action are taken the proble=
ms
faced by the women in the family and the society cannot be stopped. These illegal things happen =
without
the knowledge of the women but the view words of the neighbours cut the hea=
rt
of the women into pieces. In =
most
cases this happens inside the family i.e. family members themselves tortures
the women in this regard. I c=
an
point out two cases in which women faced serious consequences due to this
hidden cameras.
Case
1: A newly married couple from Vellore went to Ooty=
for
celebrating their honey moon. They
stayed in a 4 star hotel near the lake for a week. After 3 months, their friend infor=
med
them that video clip in the YouTube contains their privacy. With the extreme
shock, they watched the video and came to know that it was taken in the Ooty
hotel where they stayed for honey moon. They made the complaint to the
police. Police told that the =
case
comes under cyber crime. The =
couple
proceed to cyber crime and filed a case against the Hotel.
Initially the Ho=
tel
authorities told that their hotel is a reputed hotel such crime occurrences
were not possible. The cyber =
crime
police started investigation and searched the Hotel room; at last they foun=
d 4
hidden cameras in the switch board opposite to the cot in the room. They enquired all employees in the=
hotel
and finally caught the culprits as 2 young room boys. They fix the hidden camera in the =
switch
boards of the honey moon suits, after the couples left the room; they unscr=
ew
the hidden cameras and make the copy of the recording. They upload the videos in the YouT=
ube
and got money for this. In the
enquiry, they accepted that they were during this for the past 2 years. Since nobody had made complaint in=
this
regard, they were continuing the illegal activity. This is what happens in several is=
sues,
the affected people are not r=
eady
to go to police, as this is a sensational issue which will affects the fami=
ly
status in this society.
Though the culpr=
its
were found and the illegal activity was stopped, the consequences the women=
faced
in this issue are intolerable. She
has to overcome the word arrows shoot on her by her own family, relatives, =
neighbours
and even unknown persons i.e. public.
Since the consequences faced after the crime occurrences are intoler=
able,
the better way it to prevent us from such activities.
How to come from these problems?
Case
2: A teenage girl in Chennai went to a textile show
room with her friends for her birthday dress purchase. After selecting 2 or 3 dresses, sh=
e wished
to try them and went to the trial room.&nb=
sp;
The very next day, she got an anonymous call which told her to watch=
the
video received in her mobile phone.
The video was taken, when she changed the dress in the trial room of=
the
textiles the day before.
The girl burst i=
nto
crying and doesn’t know what to do?&=
nbsp;
Her family is very orthodox and she cannot convey this to anybody. The second call came from the unkn=
own
person who compelled her to meet him in person in a hotel next day or else =
he
will upload that video in the internet.&nb=
sp;
The teenage girl cannot bare the black mailer's torture and committed
suicide. She wrote a letter t=
o her
parents and police by stating the reason, why she committed suicide.
The police start= ed investigation, with the anonymous mobile number, they catch the person he w= as the son of the textile show room’s owner. In the enquiry, he accepted the il= legal activity and he had misused several girls and ladies like this. Though the culprit was found, a yo= ung girl's life came to an end due to this.&nb= sp; It also affects the family very much, as it is a sensational issue.<= o:p>
Here also the better solution will be
taking preventive measures as follows,
v=
Better
not try the dresses in the trial rooms of the showrooms
v=
If
you feel, it is necessary to try the dress, then try the dress above the dr=
ess
already you are wearing.
The above two ca=
ses
shows the disadvantages of the technology development i.e cameras in the fo=
rm
of hidden camera and how it creates security problem to women along with the
preventive measures that can be taken to protect them.
Internet:
The
next important technology that affects women is internet. Internet may be a "boon or th=
orn",
depends on the usage. When it=
is
used in a good and proper way it is boon for women, unless and otherwise wh=
en
it is used for illegal activities, it is a thorn for women. Internet can be taken as "pin=
ch of
fire" as such created by a match stick. Either it can be used to light a l=
amp to
read a book in the dark or burn a book to black.
The user gives h=
er
request to the internet server, then the request is processed in fraction of
second and the response is given to the user through the browser. The main
applications of Internet are email, Online Shopping, Net Banking and Social=
Networks.
Among these application the young women use internet for E-mail, chat, on-l=
ine
shopping, searching information,
watching movies & music.
While searching information of watching movies & music they are =
not
going to give their personal data.
But during chat or E-mail and on-line shopping, they will be providi=
ng
their personal data such as name, qualification, designation, address, and
confidential data such as mobile number, pan card number, credit card numbe=
r.
Among these
applications the young women use internet for E-mail, chat, on-line shoppin=
g,
searching information, watching movies & music. While searching information of wat=
ching
movies & music they are not going to give their personal data. But during chat or E-mail and on-l=
ine
shopping, they will be providing their personal data such as name,
qualification, designation, address, and confidential data such as mobile
number, pan card number, credit card number.
Such sensitive d=
ata
are at risk, when it is transmitted through the network not only the person=
al data;
the teenage girls were sharing their photos through social network such as =
face
book, twitter and whatsup. Th=
ere are
several illegal persons who involves in cyber crimes to hack these personal
data. The crime related to In=
ternet
is called as cyber crime. The person who tries to access other's information
without permission is called as hackers.&n=
bsp;
Such immoral fellows after accessing the confidential data of young
women, they use them for illegal activities let us have a case study on this
serious issue "HACKING".
Case
3: In the year 2010 an 18 years old girl from Bombay got anonymous phone calls da=
ily,
in which the persons spoke immorally.
After a month, the torture was worst day by day and she informed thi=
s to
her parents. They made a comp=
laint
to the cyber crime police. The
investigation started, the cyber crime police trapped the mobile number and
trapped the person. They came=
to
know that he have hacked her personal data by hacking the e-mail account
through breaking password. Th=
is
happens in several cases and only few are going to the knowledge of cyber c=
rime
and the remaining are ignored by changing the mobile number. When the complaint is made, the ro=
ot
cause is found and punished which will be a warning for other hackers and
lesson for the society.
Case
4: The above said case had not created any serious
issues, but this is worst-case filed in 2012. A thirty years old lady from =
Vijayawada
spent most of her time in Internet.
She is interested in social networks. She shares her photos and videos
regularly. On one doom day, s=
he got
call from an unknown person who asks her rate and place.
The lady was ver=
y much
afraid and cut the call. But =
within
two or three days, these kinds of phone calls came very frequent and at last
she switched off her mobile phone. &n=
bsp; The
lady was totally upset and informed her husband about this. He doesn’t want to take the =
issue
to the police, he felt that, then it will be known to the public when it co=
mes
in media. In the mean time his
friend called him and asked him to browse a website immediately.
Then the couple =
opened
the website and was shocked, as they are about to see the lady's photo in t=
he
prostitution list along with her phone number. Now only, they knew the seriousnes=
s of
the problem and made the complaint to the cyber crime police. After the
investigation, they found the culprit, who hacked the lady's photo from the
social media and misused in the illegal website.
Then the cyber c=
rime
police take action against him and removed the lady's photo and other relat=
ed
data from the illegal website.
The lady and her family are mentally disturbed and couldn't answer t=
he
neighbours and relatives regarding this occurrence. The solution for the ab=
ove
said 2 problems will be, at any cast women should not share the following
through e-mail, chat or social networks, Photo, Videos, Phone number, Addre=
ss
and other Details.
When these kind =
of
personal data and confidential data are shared through the network, they ar=
e at
risk. The hackers may hack the
details and misused it, which will create financial losses and affects the
social status of the family. =
In the
above two cases, the personal data of women are hacked without the knowledg=
e of
them. But let us see one more case, in which the photos=
and
videos are taken with the knowledge of the girl, but uploaded in the Intern=
et
without her knowledge.
Case
5: A NRI female candidate from Burma who studied in=
an
leading engineering college in Chennai had lost her life due to her habit of
taking selfis. The burmian gi=
rl got
a Apple mobile from her father as a gift.&=
nbsp;
She stayed in the college hostel.&n=
bsp;
After getting the apple mobile her main hoppy becomes selfi.
Daily, at her le=
isure
time she took several selfis and sent to her parents and her friends. One of the photos sent to her clas=
s mate
was seen by her brother. he
got attracted towards her and proposed his love to her. But the Burmian girl refused his
affair. He got angry with her
refusal and took and revenge against her.&=
nbsp;
He morphed her photos with nude photographs of XXX video models and
shared the photographs with his contacts.&=
nbsp;
Even her college mates got the photos shared and she came to know
this.
The students vie=
w was
totally different and she was not able to face them. She jumped from the third floor of=
the
college building and committed suicide.&nb=
sp;
The police who have investigated the case, later found the truth and=
the
boy was arrested. This case t=
eaches
a lesson, unnecessarily girl’s photos should not reach other's hand, =
and
it may lead to serious issues as explained above.
Instead of using
Technology in an innovative way to improve their studies and extracurricular
activities, today the youngsters are using it for illegal things. They are not aware of its conseque=
nces. The
above mentioned cases may be come to the light, but each and every day, many
occurrences happen in this digitalised world. It is very much necessary to create
awareness on the digital security. Women should be cautious about digital
security, otherwise it causes mental, life and social issues.
Bibliography:
1.&n=
bsp;
Aganval, Anil, The Challenge Of The Balance.
Environmental Economies In India, (New Delhi, 1997)
2.&n=
bsp;
Agarwal, Anil; D'Monte, Danyl'; Smarth, Ujwala.,
The Fight for Survival - People's Action for Environment (New Ilelhi, 1987)=
3.&n=
bsp;
Alam, Sahabat., Directory of Environmental NGOS=
in
the Pacific Region -Asia- Pacific Peoples environment network (Malaysia, 19=
83)
4.&n=
bsp;
Balachandran. A, et.al, “Characterizing User
Behavior and Network Performance in a Public Wireless LAN”, Proceedin=
gs
of ACM SIGMETRICS, Marina Del Rey, CA, pp. 195-205, June 2002
Is
Technology A Bless or Blight for Women Security?-Case Study &=
nbsp; &nbs=
p; S. Meena Priya Dharshini