Search results
1 – 10 of 20Robert D. Lytle, Tabrina M. Bratton and Heather K. Hudson
Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly…
Abstract
Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly referred to as bystander intervention models (BIMs). More recently, BIMs have been modified to facilitate initiatives to prevent various forms of online victimization. This chapter begins with a review of BIMs and recent applications of bystander intervention research to online environments. We also present several future directions for research along with applications for reducing technology-facilitated violence, including programming recommendations and theoretical development.
Details
Keywords
Edgar Pacheco and Neil Melhuish
The nature and extent of adults' engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization…
Abstract
The nature and extent of adults' engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization. When explored, engagement in online aggression and abuse has centered on children and young people, particularly in school and higher education settings. Drawing on nationally representative data from New Zealand adults aged 18 and over, this chapter explores the overall prevalence of online aggression with a focus on gender and age. Our findings support the need to also understand adult aggressors' behaviors to better address the distress and harm caused to targets through digital communications. The chapter discusses the implications of the results for policy and practice and proposes some directions for future research.
Details
Keywords
Bronwyn Carlson and Ryan Frazer
Broadly understood as repeated, intentional, and aggressive behaviors facilitated by digital technologies, cyberbullying has been identified as a significant public health concern…
Abstract
Broadly understood as repeated, intentional, and aggressive behaviors facilitated by digital technologies, cyberbullying has been identified as a significant public health concern in Australia. However, there have been critical debates about the theoretical and methodological assumptions of cyberbullying research. On the whole, this research has demonstrated an aversion to accounting for context, difference, and complexity. This insensitivity to difference is evident in the absence of nuanced accounts of Indigenous people's experiences of cyberbullying. In this chapter, we extend recent critiques of dominant approaches to cyberbullying research and argue for novel theoretical and methodological engagements with Indigenous people's experiences of cyberbullying. We review a range of literature that unpacks the many ways that social, cultural, and political life is different for Indigenous peoples. More specifically, we demonstrate there are good reasons to assume that online conflict is different for Indigenous peoples, due to diverse cultural practices and the broader political context of settler-colonialism. We argue that the standardization of scholarly approaches to cyberbullying is delimiting its ability to attend to social difference in online conflict, and we join calls for more theoretically rigorous, targeted, difference-sensitive studies into bullying.
Details
Keywords
Naruemon Auemaneekul, Arpaporn Powwattana, Emwadee Kiatsiri and Nanthana Thananowan
The purpose of this paper is to examine the etiological model of cyberbullying behaviors among Thai adolescents, testing the hypothesis that the constructs of theory of planned…
Abstract
Purpose
The purpose of this paper is to examine the etiological model of cyberbullying behaviors among Thai adolescents, testing the hypothesis that the constructs of theory of planned behavior (TPB), including self-esteem, will influence and have impact on cyberbullying intention and behaviors.
Design/methodology/approach
Structural equation modeling (SEM) was used to analyze the data. Self-administered questionnaires were used among multi-stage stratified random samples from secondary schools in the Bangkok. The sample size consisting of 354 subjects included those who were victims (44.7 percent), perpetrators (33.1 percent) and witness (67.8 percent).
Findings
The SEM showed subjective norm (SN) to be the most direct influential factor of cyberbullying intention and behaviors, followed by attitude toward cyberbullying (Intention β=0.31, 0.24; p=0.01, Behavior β=0.09, 0.07; p=0.012 and 0.05, respectively). However, the SEM revealed that all variables from TPB including self-esteem in the equation can explain the variation scores of intention and cyberbullying behaviors at 54 and 67 percent levels (adjusted R2=0.54 and 0.67), respectively. The SEM showed that model modification indices indicate a good fit to the data (χ2=0.00, df=0, p>0.05, CMIN/df=0, GFI=1, AGFI=1, CFI=1 and RMSEA=0).
Research limitations/implications
The experiences or witness of family violence and support at school level, which is supposed to mitigate the bullying problems, were neglected from this study.
Practical implications
The preventive measures for cyberbullying behaviors among adolescents should involve activities fostering self-esteem, developing proper attitude and SN to prevent cyberbullying. The initiatives and developed school supportive system for adolescents to understand how to control themselves when engaging in social network are imperative. However, for future research, family violence witness and attempt to lure the cyberbullying victims into offline meeting should be explored more.
Social implications
TPB and the use of social media should be taken into account for planning and designing appropriate intervention to reduce and eliminate cyberbullying among all stakeholders in both public and private sectors in the area of health and educational institutes in order to endeavor and to advocate the anti-cyberbullying policy in Thailand.
Originality/value
TPB and self-esteem explained a substantial portion of and more modest but significant amount of variance in cyberbullying intention and behaviors. However, SN and attitude toward cyberbullying which was found to be most influential factors could be the useful information for designing intervention toward cyberbullying prevention for Thai adolescents and advocate implementing the anti-cyberbullying policy in Thailand.
Details
Keywords
As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory…
Abstract
As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory mandates as part of an effort to combat it. This chapter argues that these bodies have the potential to meaningfully further a survivor-centered approach to combatting technology-facilitated violence against women – one that places their experiences, rights, wishes, and needs at its core. It further argues that governments should consider integrating them into a broader holistic response to this conduct.
An overview is provided of the operations of New Zealand's Netsafe, the eSafety Commissioner in Australia, Nova Scotia's Cyberscan Unit, and the Canadian Centre for Child Protection in Manitoba. These types of centralized bodies have demonstrated an ability to advance survivor-centered approaches to technology-facilitated violence against women through direct involvement in resolving instances of violence, education, and research. However, these bodies are not a panacea. This chapter outlines critiques of their operations and the challenges they face in maximizing their effectiveness.
Notwithstanding these challenges and critiques, governments should consider creating such bodies or empowering existing bodies with a statutory mandate as one aspect of a broader response to combatting technology-facilitated violence against women. Some proposed best practices to maximize their effectiveness are identified.
Details
Keywords
Jane Bailey, Nicola Henry and Asher Flynn
While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as…
Abstract
While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as technology-facilitated violence and abuse (TFVA). TFVA includes a spectrum of behaviors perpetrated online, offline, and through a range of technologies, including artificial intelligence, livestreaming, GPS tracking, and social media. This chapter provides an overview of TFVA, including a brief snapshot of existing quantitative and qualitative research relating to various forms of TFVA. It then discusses the aims and contributions of this book as a whole, before outlining five overarching themes arising from the contributions. The chapter concludes by mapping out the structure of the book.
Details
Keywords
Alison J. Marganski and Lisa A. Melander
While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology…
Abstract
While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology demands that we pay attention to not only harms associated with interconnectivity, but also the potential for technology to counter offenses and “do good.” This chapter discusses technology as both a weapon and a shield when it comes to violence against women and girls in public spaces and private places. First, we review the complex and varied manifestations of technological gender violence, ranging from the use of technology to exploit, harass, stalk, and otherwise harm women and girls in communal spaces, to offenses that occur behind closed doors. Second, we discuss justice-related responses, underscoring how women and girls have “flipped the script” when their needs are not met. By developing innovative ways to respond to the wrongs committed against them and creating alternate systems that offer a voice, victims/survivors have repurposed technology to redress harms and unite in solidarity with others in an ongoing quest for justice.
Details
Keywords
Media attention on nonconsensual intimate image dissemination has led to the relatively recent proliferation of academic research on the topic. This literature has focused on many…
Abstract
Media attention on nonconsensual intimate image dissemination has led to the relatively recent proliferation of academic research on the topic. This literature has focused on many areas including victimization and perpetration prevalence rates, coerced sexting, legal and/or criminal contexts, sexual violence in digital spaces, gendered constructions of blame and risk, and legal analysis of high-profile cases and legislation. Despite this research, several gaps exist, including a lack of empirical research with service providers. Informed by in-depth interviews with 10 sexual violence frontline professionals in Southern Ontario (Canada), this chapter focuses on their perspectives of the additive role of technology. With respect to nonconsensual intimate image dissemination, technology acts as a digital “layer” that operates in addition to the commission of physical acts of sexual violence, and compounds the harms experienced by the victim by adding a virtual – and indelible – “permanent remembering” of the violence. Nuancing the contours of consent in a digital age, this chapter concludes by considering what consent means in a technological context.
Details
Keywords
Tuija Muhonen, Sandra Jönsson and Martin Bäckström
The purpose of this paper is to explore health- and work-related outcomes of cyberbullying behaviour and the potential mediating role of social organisational climate, social…
Abstract
Purpose
The purpose of this paper is to explore health- and work-related outcomes of cyberbullying behaviour and the potential mediating role of social organisational climate, social support from colleagues and social support from superiors.
Design/methodology/approach
Altogether 3,371 respondents participated in a questionnaire study.
Findings
The results of this study indicate that social organisational climate can have a mediating role in the relationship between cyberbullying behaviour and health, well-being, work engagement and intention to quit. Contrary to earlier face-to-face bullying research, the current study showed that cyberbullying behaviour had stronger indirect than direct relationships to health, well-being, work engagement and intention to quit.
Practical implications
Communication through digital devices in work life is becoming more prevalent, which in turn increases the risk for cyberbullying behaviour. Organisations need therefore to develop occupational health and safety policies concerning the use of digital communication and social media in order to prevent cyberbullying behaviour and its negative consequences.
Originality/value
Cyberbullying behaviour among working adults is a relatively unexplored phenomenon and therefore this study makes valuable contribution to the research field.
Details
Keywords
Olusesan Ayodeji Makinde, Emmanuel Olamijuwon, Nchelem Kokomma Ichegbo, Cheluchi Onyemelukwe and Michael Gboyega Ilesanmi
Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly…
Abstract
Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly attention has been given to the nature of technology-facilitated violence and abuse (TFVA) across sub-Saharan Africa (SSA) despite an explosion in the use of various technologies. We conducted a literature review to identify and harmonize available data relating to the types of TFVA taking place in SSA. This was followed by an online survey of young adults through the SHYad.NET forum to understand the nature of TFVA among young adults in SSA. Our literature review revealed various types of TFVA to be happening across SSA, including cyberbullying, cyberstalking, trolling, dating abuse, image-based sexual violence, sextortion, and revenge porn. The results of our online survey revealed that both young men and women experience TFVA, with the most commonly reported TFVA being receiving unwanted sexually explicit images, comments, emails, or text messages. Female respondents more often reported repeated and/or unwanted sexual requests online via email or text message while male respondents more often reported experiencing violent threats. Respondents used various means to cope with TFVA including blocking the abuser or deleting the abused profile on social media.
Details