{"id":30,"date":"2026-01-03T12:23:27","date_gmt":"2026-01-03T17:23:27","guid":{"rendered":"https:\/\/lightgoldenrodyellow-mule-638612.hostingersite.com\/?page_id=30"},"modified":"2026-01-12T21:39:33","modified_gmt":"2026-01-13T02:39:33","slug":"tipologia","status":"publish","type":"page","link":"https:\/\/ciberfiloginia.online\/index.php\/tipologia\/","title":{"rendered":"Tipolog\u00eda"},"content":{"rendered":"\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center animated bounce has-large-font-size\"><strong>Tipos de violencia de g\u00e9nero en los entornos digitales<\/strong><\/h1>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity animated bounce\"\/>\n\n\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"animated fadeIn\">Reconocer la violencia de g\u00e9nero en los entornos digitales es un primer paso para combatirla; ya que el ciberespacio y la vida fuera de internet est\u00e1n cada vez m\u00e1s interrelacionadas. La violencia contra las mujeres ha llegado al mundo digital como una extensi\u00f3n m\u00e1s de una serie continua de sucesos de violencia que se presentan en la vida diaria de mujeres y ni\u00f1as. A continuaci\u00f3n, hacemos una tipificaci\u00f3n de las mismas para identificarlas.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image animated bounce\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"258\" height=\"289\" src=\"https:\/\/ciberfiloginia.online\/wp-content\/uploads\/2026\/01\/ciberviolencia.png\" alt=\"\" class=\"wp-image-1104\"\/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-text-align-center h2 {color:black;} animated fadeIn\"><a href=\"https:\/\/ciberfiloginia.online\/index.php\/violencia-digital\/\" data-type=\"page\" data-id=\"1118\"><strong>Violencia digital<\/strong><\/a><\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image animated bounce\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"258\" height=\"289\" src=\"https:\/\/ciberfiloginia.online\/wp-content\/uploads\/2026\/01\/seguridad.png\" alt=\"\" class=\"wp-image-1167\"\/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-text-align-center animated fadeIn\"><a href=\"https:\/\/ciberfiloginia.online\/index.php\/ataques-a-la-identidad-e-intimidad-de-las-mujeres\/\" data-type=\"page\" data-id=\"1148\"><strong>Ataque a la identidad<\/strong><\/a><\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image animated bounce\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"258\" height=\"289\" src=\"https:\/\/ciberfiloginia.online\/wp-content\/uploads\/2026\/01\/Ciberostigamiento.png\" alt=\"\" class=\"wp-image-1280\"\/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-text-align-center animated fadeIn\"><strong><a href=\"https:\/\/ciberfiloginia.online\/index.php\/ciberhostigamiento\/\" data-type=\"link\" data-id=\"https:\/\/ciberfiloginia.online\/index.php\/ciberhostigamiento\/\">Ciberhostigamiento<\/a><\/strong><\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image animated bounce\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"258\" height=\"289\" src=\"https:\/\/ciberfiloginia.online\/wp-content\/uploads\/2026\/01\/Ciberacoso.png\" alt=\"\" class=\"wp-image-1284\"\/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-text-align-center h2 {color:black;} animated fadeIn\"><a href=\"https:\/\/ciberfiloginia.online\/index.php\/violencia-digital\/\" data-type=\"page\" data-id=\"1118\"><strong><strong><a href=\"https:\/\/ciberfiloginia.online\/wp-admin\/post.php?post=1211&amp;action=edit\">Ciberacoso<\/a><\/strong><\/strong><\/a><\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image animated bounce\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"258\" height=\"289\" src=\"https:\/\/ciberfiloginia.online\/wp-content\/uploads\/2026\/01\/ciberbulling.png\" alt=\"\" class=\"wp-image-1278\"\/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-text-align-center animated fadeIn\"><strong><strong><a href=\"https:\/\/ciberfiloginia.online\/index.php\/ciberbullying\/\" data-type=\"link\" data-id=\"https:\/\/ciberfiloginia.online\/index.php\/ciberbullying\/\">Ciberbullying<\/a><\/strong><\/strong><\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image animated bounce\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"258\" height=\"289\" src=\"https:\/\/ciberfiloginia.online\/wp-content\/uploads\/2026\/01\/trata.png\" alt=\"\" class=\"wp-image-1290\"\/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-text-align-center animated fadeIn\"><strong><a href=\"https:\/\/ciberfiloginia.online\/index.php\/ciberhostigamiento\/\" data-type=\"link\" data-id=\"https:\/\/ciberfiloginia.online\/index.php\/ciberhostigamiento\/\"><strong><a href=\"https:\/\/ciberfiloginia.online\/index.php\/abuso-explotacion-y-o-trata-de-mujeres-y-ninas-por-medio-de-las-tecnologia\/\">Abuso, explotaci\u00f3n y\/o trata<\/a><\/strong><\/a><\/strong><\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image animated bounce\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"258\" height=\"289\" src=\"https:\/\/ciberfiloginia.online\/wp-content\/uploads\/2026\/01\/stalking.png\" alt=\"\" class=\"wp-image-1406\"\/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-text-align-center h2 {color:black;} animated fadeIn\"><a href=\"https:\/\/ciberfiloginia.online\/wp-admin\/post.php?post=1232&amp;action=edit\" data-type=\"page\" data-id=\"1118\"><strong><strong><a href=\"https:\/\/ciberfiloginia.online\/wp-admin\/post.php?post=1211&amp;action=edit\"><strong><a href=\"https:\/\/ciberfiloginia.online\/wp-admin\/post.php?post=1232&amp;action=edit\">Stalking digital<\/a><\/strong><\/a><\/strong><\/strong><\/a><\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image animated bounce\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"258\" height=\"289\" src=\"https:\/\/ciberfiloginia.online\/wp-content\/uploads\/2026\/01\/niunamenos.png\" alt=\"\" class=\"wp-image-1405\"\/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading has-text-align-center animated fadeIn\"><strong><strong><a href=\"https:\/\/ciberfiloginia.online\/index.php\/feminicidios-digitales\/\" data-type=\"link\" data-id=\"https:\/\/ciberfiloginia.online\/index.php\/ciberbullying\/\"><strong><a href=\"https:\/\/ciberfiloginia.online\/index.php\/feminicidios-digitales\/\">Feminicidios Digitales<\/a><\/strong><\/a><\/strong><\/strong><\/h3>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Tipos de violencia de g\u00e9nero en los entornos digitales Reconocer la violencia de g\u00e9nero en los entornos digitales es un primer paso para combatirla; ya que el ciberespacio y la vida fuera de internet est\u00e1n cada vez m\u00e1s interrelacionadas. La violencia contra las mujeres ha llegado al mundo digital como una extensi\u00f3n m\u00e1s de una serie continua de sucesos de violencia que se presentan en la vida diaria de mujeres y ni\u00f1as. A continuaci\u00f3n, hacemos una tipificaci\u00f3n de las mismas para identificarlas. Violencia digital Ataque a la identidad Ciberhostigamiento Ciberacoso Ciberbullying Abuso, explotaci\u00f3n y\/o trata Stalking digital Feminicidios Digitales<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-30","page","type-page","status-publish","hentry"],"_hostinger_reach_plugin_has_subscription_block":false,"_hostinger_reach_plugin_is_elementor":false,"_links":{"self":[{"href":"https:\/\/ciberfiloginia.online\/index.php\/wp-json\/wp\/v2\/pages\/30","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ciberfiloginia.online\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ciberfiloginia.online\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ciberfiloginia.online\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ciberfiloginia.online\/index.php\/wp-json\/wp\/v2\/comments?post=30"}],"version-history":[{"count":55,"href":"https:\/\/ciberfiloginia.online\/index.php\/wp-json\/wp\/v2\/pages\/30\/revisions"}],"predecessor-version":[{"id":1543,"href":"https:\/\/ciberfiloginia.online\/index.php\/wp-json\/wp\/v2\/pages\/30\/revisions\/1543"}],"wp:attachment":[{"href":"https:\/\/ciberfiloginia.online\/index.php\/wp-json\/wp\/v2\/media?parent=30"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}