1 Introduction

Social networking and rapid digital evolution have created a brand-new framework of human behaviours and habits. Of course, the majority of them already existed over the centuries but in a different form; as a result, conventional assaults towards legal interests of specific individuals have initially transformed into electronic and then into cyber(-)crimes (p.e. from conventional pornography to internet pornography or cyber/digital pornography including sometimes even virtual pornography via pseudo images and totally AI generated pictures). When discussion comes to gender-based violence, in particular violence against women and domestic violence, we realize that abuses and violations of their fundamental human rights could take place either online or offline; furthermore, both similarities and differences in old and new behaviours, and consequently in crime formations (“actus reus”) and in perpetrators’ “modus operandi” could easily be found. But how Criminal Law faces the new aforementioned behaviours, based on the fundamental theory of legal interest and leading to a justified (extra) standardization? And even more: where does this “plus” in penalties (: aggravation) for behaviours that combine characteristics of digital and gender-based criminality come from?

2 Approaching the Basic Terms

2.1 Digital Violence

2.1.1 Internet, ICT

The adjective “digital” is connected to any recording or storing information as a series of the numbers 1 and 0, to show that a signal is present or absent -and further to anything using or relating to digital signals and to computer technology; in other words to anything relating to computers and internet.Footnote 1

The pre-existing term in European and international legal bibliography was "computer system" (: an automated, electronic, digitally reprogrammable general-purpose system that can process data based on a set of predetermined instructions, the commands collectively called a program). It is a system made mainly of digital electronic circuits and secondarily of electrical and mechanical systems, and its purpose is to process information, while it is also worth noting that every computer system, no matter how big or small, consists of the hardware and the software. Not to mention that nowadays a mobile phone with internet connection is also considered a computer system (therefore not only "smart technology" phones/smart phones). Thus, the use of a computer system that requires the interconnection of computers (through a computer system) in a local network entails essentially the same risks as the internet.Footnote 2

The contemporary term "Information and Communication Technologies" (ICT)Footnote 3 refers to all technologies that provide access to information through telecommunications. It is, therefore, synonymous with the term "Information Technology (IT)" but focuses more on the telecommunications part. It includes the Internet, wireless networks, mobile phones, optical fibers, space systems and of course the various services and applications related to them such as video conferencing services or distance learning, as well as other modern means of communication. It is therefore an "umbrella"Footnote 4 term that refers to all the technology used to handle telecommunications, broadcast media, intelligent building management systems, audiovisual processing and transmission systems, as well as network-based control and monitoring functions.Footnote 5Internet”, on the other hand, is defined as the global system of interconnected computer networks, which use an established set of protocols, often called "TCP/IP" (although not all Internet services use this) to serving millions of users every day all over the world. Interconnected computers around the world, which are located in a common communication network, exchange messages (packets) using various protocols (standard communication rules), which are implemented at the hardware and software level.

Lastly, the choice of the phrase ICT aims to ensure that more means are included in the commission of crimes so that it covers in this way the evolution of technology which constantly provides new means and therefore new ways of doing things. Thus, a further expansion of criminal liability is inevitable.

2.1.2 Necessity of Separate Formalization

There is no doubt that the involvement of information systems in the commission of "traditional" crimes created a number of new extensions to the various actus reus, mainly standardizing distinct forms (separate standardization and stricter punishment) of the conventional form. For instance, the form of digital child pornography has been more clearly defined by the phrase "via information and communication technology" in Directive 2011/93/EU, creating a "non-genuine content related crime"Footnote 6; which means that the specific form describes the infringement of traditional legal interests (infancy, human dignity, personal data), which is carried out using information and communication technology.Footnote 7

Nevertheless, cyber violence is often referred as a new form of violence, grounded in the increased use of new digital technologies and maximised by the constant connectivity of Web 2.0.Footnote 8 In addition to this, it is often considered to be less harmful due to its remote nature. This is an absolute fallacy since it is more of an old problem. Thus, it can start online and continue offline or start offline and continue onlineFootnote 9; so, it can also come from or lead directly to physical harm. It reflects forms of abuse and victimisation in the physical world that are depicted via digital means, or it may be a precursor to abuse that will be pursued in the physical world.Footnote 10 Moreover, according to theory, a perspective grounded in a continuum thinking helps address the harm caused by cyber violence,Footnote 11 while this duration of violenceFootnote 12 and the relation between gender-based violence perpetrated online and offlineFootnote 13 has been underlined by GREVIOFootnote 14 and EU.Footnote 15

The special legislative interest in the separate standardization of digital crimes (otherwise those carried out “via information and communication technology”) could be explained both empirically and legally. First of all, empirically, the phenomenon of cybercrime has alarmingly large dimensions in the synchronous electronic environment.Footnote 16 Furthermore, the standardization as well as the different criminal treatment of digital forms is based on the special technological characteristics of computers and the Internet: easy and fast access to an infinite amount of information in any part of the planet and at any time, without financial cost and effort but with anonymityFootnote 17 and privacy for the user-offender, possibility of creating on-line communities between groups (such as pedophiles) which allow the user to obtain a personal environment of expression of his sexual fantasies, direct communication and exchange of material with high digital quality, possibility of sexual pleasure in real time with on-line monitoring, ease of finding pages with relevant content through hyperlinks -links, using different cyberspaces, including social media platforms, messaging applications and discussion sites. The ease of data reproduction, as well as the technical possibilities of their transmission and processing, give many of these acts a different qualitative content. In addition, they pose a greater risk, since minors may be more easily confronted (intentionally or unintentionally) with such material while online.

From a criminological point of view, the minor or less educated/technologically qualified internet user is mainly a vulnerable target ("website trapping") appearing as a "potential" victim. The perpetrators of these crimes undoubtedly attract more criminological interest; that is why many categories of online criminals are mentioned with various psychological analyzes of their profile.Footnote 18 In addition, procedurally, they can easily hide their identity making it difficult for them to be arrested by the police authorities and ultimately making it even more difficult to apply common legal principles in the context of achieving cyber security.

Despite undisputable it is questionable though if the increased indecency of electronic / digital performance should be "charged" equally to all behaviours (a classic problem of criminal liability attributed to mere possession/viewing in some cases of crimes, i.e., without any connection to sale /trading). It would probably be preferable for the provision of the special characteristics of information and communications technology to only concern the field of trafficking and the ways of doing it that this includes, as in these cases, mainly, there is undoubtedly the greatest insult to legal interests.

2.2 Gender-Based Violence (GBV)

World Health OrganizationFootnote 19 is pointing out that women and girls face unacceptable rates of violence at the hands of their intimate partners, across the world, while pandemic and post pandemic era have definitely increased the phenomenon.Footnote 20 Not to mention that the most probable perpetrators are their intimate partners, regardless of their nationality. Additionally, according to EU, gender-based violence (GBV) is an abuse of power and constitutes one of the most serious human rights violations within all societiesFootnote 21; UNHCR refers to acts of maltreatment that are directed toward an individual or community because of their gender. It is rooted in gender inequality and reflects harmful norms and practices.Footnote 22 GBV as violence that affects persons of a particular gender disproportionately. Today, GBV includes all the forms of violence that are harmful to an individual based on their gender, gender identity or gender expression. Critical feminist considers GBV as a symptom of the unequal power distribution between men and women driven by hierarchical social constructions of masculinity and femininity and perpetrated by men against women in intimate, familial, community and institutional relationships.Footnote 23 Besides, the methodological dedication to this specific group of people does not undermine the fact that anyone can experience violence; on the other hand, statistical numbersFootnote 24 depict the sad truth that the majority of victims are women and girls. In addition, the abuse that women experience is often repeated, systematic, more severe and more likely to result in injury or death. For this reason, the terms GBV and VAW (: Violence Against Women (VAW) are often used interchangeably.Footnote 25

Institutionally, tackling with gender-based violence -in particular violence against women and domestic violence- consists one of the main contemporary concerns of every politically liberal state. CoE’s contribution to it -through Council of Europe Convention on preventing and combating violence against women and domestic violence (‘the so-called Istanbul Convention’)Footnote 26 and Convention on the Elimination of All Forms of Discrimination against Women (CEDAW) but even via ECHR’s case law- is indisputable. At the same time, European Union deals with gender issues and the assurance of gender equality in all fields of regulation. In particular, it is trying to end gender-based violence through its member states by becoming the 38th Party to the Convention on Preventing and Combating Violence against Women and Domestic Violence in 2023 and with a new legal instrument, the proposal for a Directive on combating violence against women and domestic violenceFootnote 27 of the European Parliament and of the Council on combating violence against women and domestic violence whose results are expected to be more direct and -hopefully- more effective.Footnote 28

2.3 A combination: Cyber Violence Against Women -and Girls (CVAWG)

Digital technologies have simplified well-known abusive behaviours by providing convenient tools for abusers to access their targets; they are simultaneously opening the door to new forms of abuse that require technology, such as the non-consensual creation of sexual images of women through artificial intelligence.Footnote 29 So, how is cyber violence “gendered”? Both women and men may experience incidents of interpersonal violence and abuse (including online): men can be victims too, and women can be perpetrators. However, evidence at EU, international and national levels show that women and girls are highly exposed to cyber violence and are particularly affected by this phenomenonFootnote 30 and more likely to experience repeated and severe forms of physical, psychological or emotional abuse and to suffer from severe consequences.Footnote 31

CVAWG includes a range of different forms of violence perpetrated by ICT means on the grounds of gender or a combination of gender and other factors (e.g. race, age, disability, sexuality, profession or personal beliefs). In fact, there is a great variety of criminal behaviours that contain digital violence vs women (analytically below) and even more forms of cyber violence (e.g. impersonation and identity theft, doxing, flaming, trolling and body shaming) that are still not taken into consideration as they were not frequently defined in the majority of Member States, or were deemed “as either too generic (e.g. online threats), too specific (e.g. impersonation) or falling under the general provisions on other forms of violence, like cyber harassment”.Footnote 32 Cyber violence against women and girls (CVAWG) is indisputably both a new and the greater new dimension of gender-based violence.

At UN level,Footnote 33 the Special Rapporteur on VAW clearly defined gender-based cyber violence as: any act of gender-based violence against women that is committed, assisted or aggravated in part or fully by the use of ICT, such as mobile phones and smartphones, the Internet, social media platforms or email, against a woman because she is a woman, or affects women disproportionately.Footnote 34 Council of Europe (CoE), in its monitoring of the implementation of the legally binding Istanbul ConventionFootnote 35 -and specifically the CoE Expert group on action against violence against women and domestic violenceFootnote 36- identified that national-level laws and policies often overlook the digital dimension of VAWG, underlying “that there is no universal typology/definition of behav- iours or action that is considered to group together all forms of violence against women perpetrated online or through technology”.Footnote 37

In EU level, there is no harmonised legal definition of CVAWG except for the following that emerges from a non-containing criminal provisions (and consequently a non binding) text, according to which: “Cyberviolence against women is an act of gender-based violence perpetrated directly or indirectly through information and communication technologies that results in, or is likely to result in, physical, sexual, psychological or economic harm or suffering to women and girls, including threats of such acts, whether occurring in public or private life, or hin- drances to the use of their fundamental rights and freedoms. Cyber-violence against women is not limited to but includes violations of privacy, stalking, harassment, gender-based hate speech, personal content sharing with- out consent, image-based sexual abuse, hacking, identity theft, and direct violence. Cyberviolence is part of the continuum of vio- lence against women: it does not exist in a vacuum; rather, it both stems from and sus- tains multiple forms of offline violence”.Footnote 38

3 The Crimes’ Categorization

3.1 The Criterion: Legal Interest

Given the aforementioned conclusions, general necessity of punishing behaviours that meet the criteria of CVAWG is almost clear. Nevertheless, the answer to the crucial question of necessity (or not) to criminalize a behaviour should be based on the existence of a specific legal interest that has to be protected by the specific behaviour.Footnote 39 The special need to address these phenomena on a common basis stems from the serious impacts of them on the core EU values enshrined in Article 2 of the TEU. There is no doubt, after all, that EU framework supports such criminalization via Article 83(1) of the TFEUFootnote 40 as long as targeted persons are selected based on their real or perceived connection, attachment, affiliation with, support or membership of a community or a group sharing a protected characteristic while the perpetrator’s motive is key in distinguishing these offences from other crimes and in determining their greater gravity having regard to the specific impact that these offences have on the individual victim, on communities and on society at large. Lastly, the umbrella of CVAWG includes crimes (some of them versus human dignity) that belong to an area of particularly serious crime as long as they oppose to tolerance and equal dignity of all human beings that constitute the foundations of a democratic, pluralistic society.Footnote 41

So, which is the specific legal interest that is harmed or at stake by committing crimes that are included to CVAWG term? The theory of legal interests could help as by grouping the relevant actions. The crimes that fall under the CVAWG “umbrella” could be categorized in the following categories:

3.2 Crimes Versus Human Dignity

3.2.1 Non-consensual Intimate Image Abuse

As long as pornography is usually related to adult pornography, contemporary academic literature seems to substitute the terms of child pornographyFootnote 42 with child sexual abuse material and revenge porn or even non-consensual pornography with non-consensual intimate images; that’s why non—consensual intimate image abuses is considered more appropriate to be used as an “umbrella” term. First of all, the criminalization of consensual indecent images that come from adultsFootnote 43 could be justified on a legal interest beyond sexual order or moralsFootnote 44 –but focused on the sexual self-determination of minors and the protection of youth/infancy. On the other hand, child sexual abuse material or the so-called child pornography is not just a kind of pornography but an extremely complicated crime in terms of substantive criminal law. Not only because of the various forms of the crime but also because of the different legal interests that are hidden behind every aspectFootnote 45 and a highly protective rationale behind its criminalization that leads sometimes to punishment even if there is not direct harm to children -or even in abstracto. Not to mention than consensus (: consent) could not be conceived in this place since minors could not provide a valid consent, lacking the right of sexual self-determination.

Non-consensual intimate image abuse refer to any type of audio-visual archive (images/videos) that could be obtained non-consensually, manipulated non-consensually, or obtained consensually but distributed non-consensually; furthermore non-consensual intimate image abuse involves the distribution through ICT means or the threat of distribution through ICT means of intimate or private images/videos without the consent of the subject (usually of a woman or girl). Most frequently recurring types of conduct are the dissemination, the publishing online non-authorised intimate archives, the online grooming or even voyeurism/creepshots. Common motivations include sexualising the victim, inflicting harm on the victim or negatively affecting the life of the victim. The acts can: a. start online and continue offline; b. start offline and continue online; c. be perpetrated by an unknown person to the victim; d. be perpetrated by someone who is/was in an (intimate) relationship with the victim. Besides, it is crystal clear that the (non) consent is the basis of standardization.

Consent is one of the most crucial notions in the field of criminal law; it is also very important in the field of legal methodologyFootnote 46 at many different levels.Footnote 47 Besides, feminist theory has contributed not only to realizing the importance of consent but also to the understanding of its complexity.Footnote 48 The non-consensual sharing of intimate and sexual images covers a wide variety of abusive digital practices. Sexual images can be circulated on secret online fora, shared in private messages, uploaded to commercial porn sites and social media, or even used to create fake dating and escort profiles. The pictures and videos can be produced with consent or coercion; they can be taken without the victim’s knowledge, they can be edited to show a sexual situation that never actually happened, or they can even document a physical sexual assault. Regardless of the origin and distribution history of an assaulting image, sharing of the image constitutes a type of gendered sexual violence that has specific mediated impacts on victims’ lives and consequently requires specific coping methods and interventions.Footnote 49

3.2.1.1 Criminalizing Fake/Virtual Intimate Images

There is a great discussion on criminalizing the behaviours (from production to mere possession) that relate to non—real images as well as to the criteria that should be used.Footnote 50 For the reasons of this paper, it is necessary to distinguish the following categoriesFootnote 51:

  1. 1)

    Nonrealistic pictures, e.g., cartoons, anime, manga, hentai etc.

  2. 2)

    Realistic pictures, which came from modification of a picture depicted at least one real person –that is the so-called procedure of “morphing” (through photoshop, photopaint, apecture, adobe premiere, adobe aftereffects etc.). For instance: deep fakes.

  3. 3)

    Computer generated imageryFootnote 52 (digitally manufactured realistic picturesFootnote 53). For instance: ideograms.

The ratio in criminalizing acts of material which belongs to the second category is obviousFootnote 54: the protection of depicted person’ s human dignity as he/she seems to participate in sexual activities as a protagonist. Not to mention that even AI ActFootnote 55 deals with deep fakes in general, while the VAW-DV Directive explicitly criminalises the non-consensual sharing of material that make it appear someone is engaged in sexually explicit activities. The VAW- DV Directive also foresees prompt removal and disabling access to illegal material tackling further “algorithmic bias” (including gender bias) and propose transparent approaches and best practices at various stages of the algorithm development process, in the training of datasets and in AI-generated decision-making.

However, criminalizing the other forms of virtual material is neither obvious nor indisputableFootnote 56 -since there is not a real protagonist whose interests are in jeopardy.Footnote 57 As a result, searching deeply for “harm” (in two fundamental dimensionsFootnote 58 emerging from relevant discussion in the field of (de)criminalization of child pornographyFootnote 59) is a “conditio sine qua non”; otherwise, the foundations of criminalization will be weak.

3.2.2 Online, gender-Based, Hate Speech and Hate Crime

Hate crimeFootnote 60 is a crime committed against one or more persons whose victimization is chosen precisely because of their specific characteristics, which constitute their unchanging identity by making them members of a specific group. As a rule, the foundational characteristics of the particular category of crimes, and those which in practice were first introduced into the law, are race, national origin and nationality, while religion follows. Other fundamental characteristics in the individual national legislations are gender, age, mental or physical disability, and sexual orientation while rarely occurring characteristics such as ideology, relationship with politicians’ organizations, gender identity, marital status, social status, etc.Footnote 61

In general, hate crime include any behaviour that depicts opposition to any form of someone’s particularity, from opposition to a different race and other biological characteristics to the different manifestations of a person's cultural and sexual identity; in other words as the ideology or practice aimed at selectively discriminating against a group of people, members of society, on the basis of a set of common characteristics, which the members of the group bear and which, objectively, do not affect the ability of the members of the group to participate in the fundamental functions of society.Footnote 62 Besides, the recipients of racist behaviour are mainly immigrants, but also Roma, Jews, Muslims, transsexuals and LGBTI people in general, etc.; unfortunately, in the majority of the relevant cases, the victims of racist attacks do not resort to the police or justice due to fear of deportation, revenge attacks, etc.Footnote 63

More specifically, online gender-based hate speech is defined as content posted and shared through ICT means targeting mainly women and/or girls because of their gender, or because of a combination of gender and other factors (e.g., race, age, disability, sexuality, ethnicity, nationality, religion or profession).Footnote 64 It can also involve posting and sharing, through ICT means, violent content that consists of portraying women and girls as sexual objects or targets of violence. This content can be sent privately or publicly and is often targeted at women in public-facing roles.Footnote 65

Lastly, according to EIGE,Footnote 66 most frequently recurring types of conduct are inciting discrimination, hostility or violence, condoning, denying or trivialising international crimes while the distinguishing criterion between gender-based online hate speech and other forms of violence is mainly the use of ICT to send demeaning, unwanted, cruel remarks, citing the victim’s gender and spreading hateful language targeted at women and girls.

3.2.3 The Legal Interest of Human Dignity

The legal interest that is primarily affected by hate speech but even by non-consensual images abuse is human dignity as it is harmed in any case where the victim is considered by the perpetrator to be "inferior" to the rest of the people.

Today, human dignity could be considered as a legal interest in criminal law (not only as fundamental constitutional principle). In particular, in Germany for the first time an attempt was made to differentiate the absolutely inviolable core of human dignity (which must enjoy absolute protection) from its periphery. Undoubtedly, the basic concept of human dignity is primarily a constitutional principle and a philosophical basis with very important consequences in general. However, human dignity can also be recognized as a legal interest whenever the capacity for human self-determination is negated to the point where human existence is annihilated. In other words, when a person is used as an object and not as a subject (as typically happens in cases of state action using torture or in cases of slavery of a person), her human dignity is violated—and only with this conceptual content can human dignity be understood as a legal good. So, criminally speaking, human dignity has a much more specific content (in comparison to constitutional law); as a result, we can find an offense towards human dignity when X uses Y as an object (see “InstrumentalisierungFootnote 67”: objectification) and that’ s exactly what happens when X uses pornographic material depicting Y for his sexual satisfaction, for example.

At the same time, the notion of human dignity should not be confused with the legal interest of honor or reputation. The first is related to the existence of any human as a self-defined being that is not allowed to be treated as an object, while the second is a social attribute to any human individualized in his (social) appearance. The legal interest of honor does it have its own semantic content; furthermore, honor is secondarily offended in each of the crimes this paper deals with (and in the majority of crimes against personal legal interests, except for crimes against property/financial crimes).

3.3 Crimes Versus Personal Freedom

3.3.1 Cyber Stalking

Cyber stalking against women and girls involves intentional repeated acts against women and/ or girls because of their gender, or because of a combination of gender and other factors (e.g. race, age, disability, sexuality, profession or beliefs). It is committed through the use of ICT means, to harass, intimidate, persecute, spy or establish unwanted communication or contact, engaging in harmful behaviours that make the victim feel threatened, distressed or unsafe in any way. Most frequently recurring types of conduct are: threatening, intimidating, harassing, establishing unwanted communication, monitoring, spying, pursuing, following, sharing intimate photos without consent with obsessive intent, sending/posting offensive messages, insults, slander, denigration.

3.3.2 Cyber Harassment

Cyber harassment against women and girls involves one or more acts against victims because of their gender, or because of a combination of gender and other factors (e.g. race, age, dis- ability, profession, personal beliefs or sexual orientation). It is committed by one or more people in a “network”Footnote 68 through the use of ICT means to harass, impose or intercept communication, with the purpose or effect of creating an intimidating, hostile, degrading, humiliating or offensive environment for the victim. Most frequently recurring types of conduct are harassing, tracking, pursuing, intercepting, abusing personal data, sending/posting offensive messages, sexual comments, defamation.Footnote 69 In addition to this, sending abusive text messages, sending unwanted gifts, making frequent, unwanted communications, such as telephone calls, text messages or other online contact, for example via social networking sites, making hang-up telephone calls, stealing or reading mail are considered as cyber harassment in literature.

Notwithstanding the importance of its criminalization, cyber harassment seems less severe to cyber stalking in terms of frequency, aggressiveness, obsess of perpetrators since the last one (: cyber stalking) contains repetition of stalker’s behaviour and the creation of continuous threat or unsafety to the victim in any way.

3.3.3 Cyber Bullying

Cyber ​​bullying is defined as sending or publishing offensive/malicious material or engaging in other forms of social aggression via the Internet or other digital technologies. In traditional bullying, we observe “the deliberate and conscious desire to harm another and put him/her in a situation of pressure”. Therefore, the victim simply happens to be there, "repeatedly exposed, when negative acts occur," as Olweus aptly observes.Footnote 70 The difference between traditional bullying and cyberbullying is that its effects have a greater impact because the Internet is accessed by a particularly large number of people, so it is more public than traditional bullying. Nevertheless, the reasons for the manifestation of this behaviour are focused on the educational context (disagreements between students, playful mood, strictness and negative grading of teachers, parents' dissatisfaction with their children's friends and anonymous expression of threats). So, cyberbullying generally comprises sending threatening or otherwise nasty messages or other communications to people via social media, gaming sites, text or email, posting embarrassing or humiliating video on hosting sites such as YouTube or Vimeo, or harassing through repeated texts, instant messages or chats,Footnote 71 trolling, sending threatening, disturbing messages, ridiculing, teasing, offending, insulting, impersonating.Footnote 72

Although cyber bullying is -in general termsFootnote 73- considered significantly more harmless to the aforementioned “cyber-behaviours”, its effects range from annoyance and mild distress to—in the most extreme cases—self-harm and suicide. This can be a reality for vulnerable people, or indeed anybody made to feel vulnerable through cyberbullying or other personal circumstances.

3.3.4 The Legal Interest of Personal Freedom

3.3.4.1 Personal Freedom as Generic Legal Interest

The legal interest that is primarily affected by behaviours like cyber stalking/harassment/bulling -that deprive the victim of the right to self-determination as well as from the feeling of security- is personal freedom.

Personal freedom is one of the fundamental human rights, the most important after the right to life, since the rest of the individual rights, public and private, are derived from it, and their exercise also depends on it. The right to freedom is inalienable and each individual cannot waive it, i.e., he cannot be deprived of his freedom or remain without it. It was established in the Constitutions of all liberal and democratic societies -contrary to totalitarian ones- as one of the most important human rights directly intertwined with the Rule of Law. Personal freedom is a natural property of the human being. In liberal and democratic systems, personal freedom is a supreme social value and a necessary condition (sine qua non) for the existence and maintenance of the structure of society. Therefore, due to the important social role it performs, it has been reduced to a size worthy of criminal protection, i.e., a legal interest.

In theory, many views have been expressed regarding the definition of personal freedom. A common characteristic of most of them is that, on the one hand, they describe personal freedom as a multidimensional legal interest with more than one aspect and, on the other hand, that they reduce all its individual aspects to freedom of will and the freedom to exercise it. Any expression made without the individual's own will, i.e., with external intervention, cannot be characterized as free, by default. As its first characteristic is concerned, it is crucial to say that the right to privacy (see also personal data) and self-determination consists one of personal freedom’s fundamental aspects.

3.3.4.2 Privacy—Personal Data

The concept of personal data is perceived as part of somebody’s personal freedom to maintain a strictly private information space, to which only he/she can allow access (informatics self-determination). Besides, the protection of citizens' private life (the content of which includes, among other things, personal data) is constitutionally guaranteed—as a (relatively) inviolable individual right, while the criminal protection of privacy has also increased in recent years.

As "personal data" is defined any information that refers to a natural person, whose identity is known and can be ascertained, i.e., an identified—identifiable person while as "sensitive data" (with increased protection) are considered, among other things, the sexual life of persons. The disclosure of information, which falls under the category of sensitive personal data, entails increased risks for the individual, affects the sphere of the privacy of his private life and thus more strongly infringes on his privacy, i.e., the privacy of his private life. The protection of personal data seems to have been a particularly popular subject (and) of scientific interest in recent years—and indeed by authors of various legal branches, as the provisions of the relevant law concern both administrative and civil and of course also in the criminal field. The result of this is the adoption of various definitions, the content of which several times overlaps, and the corresponding design of legal interest (privacy, private life in the form of informational self-determination, self-determination of personal information), which are often confused with constitutionally guaranteed individual rights (the right to informational self-determination) and with primary values for a rule of law. Criticism, however, of the above opinions does not fall within the framework of the development of this specific work.

Information related to the person's love—sexual life—are highly personal and for this reason constitute by law sensitive personal data, while furthermore their disclosure by a third party seriously infringes the private life of the person. Even if someone's sexual life does not present particularities, the disclosure of its individual aspects implies an invasion of his private life, as in the context of their social interaction, individuals do not reveal these details. Thus, the publication of private sexual material during acts or events of their love life -in other words any public disclosure of private information- is a violation of privacy (whether the subject of the material is a minor or an adult). The aforementioned practices are common in the circle of gender-based violence by perpetrators in order to harass, embarrass and harm the reputation of their targets (R. v. Fox). In fact, the violation of personal data should be understood as damage to the privacy of each individual—regardless of whether this damage also endangers other traditional individual legal interests of citizens.

4 Conclusion

The identification of the legal interests protected simultaneously with the highlighting of the particular similarities of specific criminal behaviours -and its relevant categorization—can help not only to a clearer delimitation of criminal offenses but also to an adequate justification of the very need for a diversified criminalization. As emphasised by GREVIO, ignoring the gender pattern associated with cyber violence risks missing the social reality of CVAWG stemming from stereotyped gender roles and the presupposed inferiority of specific group of people (women and girls) versus another. In fact, gender is a strong predictor of exposure to abuse on digital media while the coexistence with other vulnerable characteristics (e.g. race and ethnicity, body characteristics -especially wage and fat-, sexual orientation, disability or profession) could multiply the chances of being victimized.

Today, at national level, most EU Member States recognise some form of cyber violence following one of the following schemesFootnote 74: 1. cyber violence is covered by general offences with no reference of any kind to ICT or other means; 2. cyber violence is covered by general offences but with reference to ICT or other means; 3. cyber violence is considered an aggravating circumstance of general offences; 4. cyber violence is covered by specific legal pro- visions. However, only a few Member States have legal provisions specific to cyber violence and, when these exist, they tend to be gender neutral, with no reference to CVAWG -or even to GBV.

As long as criminalization consists the ultimum ratio and ultimum refugium in the fight of crimes, every suggestion for criminalization or increasing of penalty should be based on a “plus” in criminal behaviour that stems from an “added demerit” of the action or of the perpetrator. A common approach to the criminalisation of every aspect of CVAWG (for example introducing aggravating factor of general offense) can ensure a consistent protection of the victims of such acts across the EU.Footnote 75