Search results

1 – 10 of 23
Open Access
Book part
Publication date: 4 June 2021

Robert D. Lytle, Tabrina M. Bratton and Heather K. Hudson

Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly…

Abstract

Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly referred to as bystander intervention models (BIMs). More recently, BIMs have been modified to facilitate initiatives to prevent various forms of online victimization. This chapter begins with a review of BIMs and recent applications of bystander intervention research to online environments. We also present several future directions for research along with applications for reducing technology-facilitated violence, including programming recommendations and theoretical development.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Edgar Pacheco and Neil Melhuish

The nature and extent of adults' engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization

Abstract

The nature and extent of adults' engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization. When explored, engagement in online aggression and abuse has centered on children and young people, particularly in school and higher education settings. Drawing on nationally representative data from New Zealand adults aged 18 and over, this chapter explores the overall prevalence of online aggression with a focus on gender and age. Our findings support the need to also understand adult aggressors' behaviors to better address the distress and harm caused to targets through digital communications. The chapter discusses the implications of the results for policy and practice and proposes some directions for future research.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Bronwyn Carlson and Ryan Frazer

Broadly understood as repeated, intentional, and aggressive behaviors facilitated by digital technologies, cyberbullying has been identified as a significant public health concern…

Abstract

Broadly understood as repeated, intentional, and aggressive behaviors facilitated by digital technologies, cyberbullying has been identified as a significant public health concern in Australia. However, there have been critical debates about the theoretical and methodological assumptions of cyberbullying research. On the whole, this research has demonstrated an aversion to accounting for context, difference, and complexity. This insensitivity to difference is evident in the absence of nuanced accounts of Indigenous people's experiences of cyberbullying. In this chapter, we extend recent critiques of dominant approaches to cyberbullying research and argue for novel theoretical and methodological engagements with Indigenous people's experiences of cyberbullying. We review a range of literature that unpacks the many ways that social, cultural, and political life is different for Indigenous peoples. More specifically, we demonstrate there are good reasons to assume that online conflict is different for Indigenous peoples, due to diverse cultural practices and the broader political context of settler-colonialism. We argue that the standardization of scholarly approaches to cyberbullying is delimiting its ability to attend to social difference in online conflict, and we join calls for more theoretically rigorous, targeted, difference-sensitive studies into bullying.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 5 November 2019

Naruemon Auemaneekul, Arpaporn Powwattana, Emwadee Kiatsiri and Nanthana Thananowan

The purpose of this paper is to examine the etiological model of cyberbullying behaviors among Thai adolescents, testing the hypothesis that the constructs of theory of planned…

4309

Abstract

Purpose

The purpose of this paper is to examine the etiological model of cyberbullying behaviors among Thai adolescents, testing the hypothesis that the constructs of theory of planned behavior (TPB), including self-esteem, will influence and have impact on cyberbullying intention and behaviors.

Design/methodology/approach

Structural equation modeling (SEM) was used to analyze the data. Self-administered questionnaires were used among multi-stage stratified random samples from secondary schools in the Bangkok. The sample size consisting of 354 subjects included those who were victims (44.7 percent), perpetrators (33.1 percent) and witness (67.8 percent).

Findings

The SEM showed subjective norm (SN) to be the most direct influential factor of cyberbullying intention and behaviors, followed by attitude toward cyberbullying (Intention β=0.31, 0.24; p=0.01, Behavior β=0.09, 0.07; p=0.012 and 0.05, respectively). However, the SEM revealed that all variables from TPB including self-esteem in the equation can explain the variation scores of intention and cyberbullying behaviors at 54 and 67 percent levels (adjusted R2=0.54 and 0.67), respectively. The SEM showed that model modification indices indicate a good fit to the data (χ2=0.00, df=0, p>0.05, CMIN/df=0, GFI=1, AGFI=1, CFI=1 and RMSEA=0).

Research limitations/implications

The experiences or witness of family violence and support at school level, which is supposed to mitigate the bullying problems, were neglected from this study.

Practical implications

The preventive measures for cyberbullying behaviors among adolescents should involve activities fostering self-esteem, developing proper attitude and SN to prevent cyberbullying. The initiatives and developed school supportive system for adolescents to understand how to control themselves when engaging in social network are imperative. However, for future research, family violence witness and attempt to lure the cyberbullying victims into offline meeting should be explored more.

Social implications

TPB and the use of social media should be taken into account for planning and designing appropriate intervention to reduce and eliminate cyberbullying among all stakeholders in both public and private sectors in the area of health and educational institutes in order to endeavor and to advocate the anti-cyberbullying policy in Thailand.

Originality/value

TPB and self-esteem explained a substantial portion of and more modest but significant amount of variance in cyberbullying intention and behaviors. However, SN and attitude toward cyberbullying which was found to be most influential factors could be the useful information for designing intervention toward cyberbullying prevention for Thai adolescents and advocate implementing the anti-cyberbullying policy in Thailand.

Details

Journal of Health Research, vol. 34 no. 1
Type: Research Article
ISSN: 2586-940X

Keywords

Open Access
Book part
Publication date: 4 June 2021

Pam Hrick

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory…

Abstract

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory mandates as part of an effort to combat it. This chapter argues that these bodies have the potential to meaningfully further a survivor-centered approach to combatting technology-facilitated violence against women – one that places their experiences, rights, wishes, and needs at its core. It further argues that governments should consider integrating them into a broader holistic response to this conduct.

An overview is provided of the operations of New Zealand's Netsafe, the eSafety Commissioner in Australia, Nova Scotia's Cyberscan Unit, and the Canadian Centre for Child Protection in Manitoba. These types of centralized bodies have demonstrated an ability to advance survivor-centered approaches to technology-facilitated violence against women through direct involvement in resolving instances of violence, education, and research. However, these bodies are not a panacea. This chapter outlines critiques of their operations and the challenges they face in maximizing their effectiveness.

Notwithstanding these challenges and critiques, governments should consider creating such bodies or empowering existing bodies with a statutory mandate as one aspect of a broader response to combatting technology-facilitated violence against women. Some proposed best practices to maximize their effectiveness are identified.

Open Access
Book part
Publication date: 4 June 2021

Jane Bailey, Nicola Henry and Asher Flynn

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as…

Abstract

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as technology-facilitated violence and abuse (TFVA). TFVA includes a spectrum of behaviors perpetrated online, offline, and through a range of technologies, including artificial intelligence, livestreaming, GPS tracking, and social media. This chapter provides an overview of TFVA, including a brief snapshot of existing quantitative and qualitative research relating to various forms of TFVA. It then discusses the aims and contributions of this book as a whole, before outlining five overarching themes arising from the contributions. The chapter concludes by mapping out the structure of the book.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Alison J. Marganski and Lisa A. Melander

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology…

Abstract

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology demands that we pay attention to not only harms associated with interconnectivity, but also the potential for technology to counter offenses and “do good.” This chapter discusses technology as both a weapon and a shield when it comes to violence against women and girls in public spaces and private places. First, we review the complex and varied manifestations of technological gender violence, ranging from the use of technology to exploit, harass, stalk, and otherwise harm women and girls in communal spaces, to offenses that occur behind closed doors. Second, we discuss justice-related responses, underscoring how women and girls have “flipped the script” when their needs are not met. By developing innovative ways to respond to the wrongs committed against them and creating alternate systems that offer a voice, victims/survivors have repurposed technology to redress harms and unite in solidarity with others in an ongoing quest for justice.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Olga Marques

Media attention on nonconsensual intimate image dissemination has led to the relatively recent proliferation of academic research on the topic. This literature has focused on many…

Abstract

Media attention on nonconsensual intimate image dissemination has led to the relatively recent proliferation of academic research on the topic. This literature has focused on many areas including victimization and perpetration prevalence rates, coerced sexting, legal and/or criminal contexts, sexual violence in digital spaces, gendered constructions of blame and risk, and legal analysis of high-profile cases and legislation. Despite this research, several gaps exist, including a lack of empirical research with service providers. Informed by in-depth interviews with 10 sexual violence frontline professionals in Southern Ontario (Canada), this chapter focuses on their perspectives of the additive role of technology. With respect to nonconsensual intimate image dissemination, technology acts as a digital “layer” that operates in addition to the commission of physical acts of sexual violence, and compounds the harms experienced by the victim by adding a virtual – and indelible – “permanent remembering” of the violence. Nuancing the contours of consent in a digital age, this chapter concludes by considering what consent means in a technological context.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 2 October 2017

Tuija Muhonen, Sandra Jönsson and Martin Bäckström

The purpose of this paper is to explore health- and work-related outcomes of cyberbullying behaviour and the potential mediating role of social organisational climate, social…

9098

Abstract

Purpose

The purpose of this paper is to explore health- and work-related outcomes of cyberbullying behaviour and the potential mediating role of social organisational climate, social support from colleagues and social support from superiors.

Design/methodology/approach

Altogether 3,371 respondents participated in a questionnaire study.

Findings

The results of this study indicate that social organisational climate can have a mediating role in the relationship between cyberbullying behaviour and health, well-being, work engagement and intention to quit. Contrary to earlier face-to-face bullying research, the current study showed that cyberbullying behaviour had stronger indirect than direct relationships to health, well-being, work engagement and intention to quit.

Practical implications

Communication through digital devices in work life is becoming more prevalent, which in turn increases the risk for cyberbullying behaviour. Organisations need therefore to develop occupational health and safety policies concerning the use of digital communication and social media in order to prevent cyberbullying behaviour and its negative consequences.

Originality/value

Cyberbullying behaviour among working adults is a relatively unexplored phenomenon and therefore this study makes valuable contribution to the research field.

Details

International Journal of Workplace Health Management, vol. 10 no. 5
Type: Research Article
ISSN: 1753-8351

Keywords

Open Access
Book part
Publication date: 4 June 2021

Olusesan Ayodeji Makinde, Emmanuel Olamijuwon, Nchelem Kokomma Ichegbo, Cheluchi Onyemelukwe and Michael Gboyega Ilesanmi

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly…

Abstract

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly attention has been given to the nature of technology-facilitated violence and abuse (TFVA) across sub-Saharan Africa (SSA) despite an explosion in the use of various technologies. We conducted a literature review to identify and harmonize available data relating to the types of TFVA taking place in SSA. This was followed by an online survey of young adults through the SHYad.NET forum to understand the nature of TFVA among young adults in SSA. Our literature review revealed various types of TFVA to be happening across SSA, including cyberbullying, cyberstalking, trolling, dating abuse, image-based sexual violence, sextortion, and revenge porn. The results of our online survey revealed that both young men and women experience TFVA, with the most commonly reported TFVA being receiving unwanted sexually explicit images, comments, emails, or text messages. Female respondents more often reported repeated and/or unwanted sexual requests online via email or text message while male respondents more often reported experiencing violent threats. Respondents used various means to cope with TFVA including blocking the abuser or deleting the abused profile on social media.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 10 of 23