Search results
1 – 10 of 47Bridget Harris and Delanie Woodlock
Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical…
Abstract
Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical framework for technology-facilitated harms in heterosexual relationships which we characterize as digital coercive control. Here, we include behaviors which can be classified as abuse and stalking and also individualized tactics which are less easy to categorize, but evoke fear and restrict the freedoms of a particular woman. Drawing on their knowledge of a victim/survivor's experiences and, in the context of patterns and dynamics of abuse, digital coercive control strategies are personalized by perpetrators and extend and exacerbate “real-world” violence.
Digital coercive control is unique because of its spacelessness and the ease, speed, and identity-shielding which technology affords. Victim/survivors describe how perpetrator use of technology creates a sense of omnipresence and omnipotence which can deter women from exiting violent relationships and weakens the (already tenuous) notion that abuse can be “escaped.” We contend that the ways that digital coercive control shifts temporal and geographic boundaries warrant attention. However, spatiality more broadly cannot be overlooked. The place and shape in which victim/survivors and perpetrators reside will shape both experiences of and response to violence. In this chapter, we explore these ideas, reporting on findings from a study on digital coercive control in regional, rural, and remote Australia. We adopt a feminist research methodology in regard to our ethos, research processes, analysis, and the outputs and outcomes of our project. Women's voices are foreground in this approach and the emphasis is on how research can be used to inform, guide, and develop responses to domestic violence.
Details
Keywords
Julia Slupska and Leonie Maria Tanczer
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…
Abstract
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.
Details
Keywords
Alison J. Marganski and Lisa A. Melander
While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology…
Abstract
While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology demands that we pay attention to not only harms associated with interconnectivity, but also the potential for technology to counter offenses and “do good.” This chapter discusses technology as both a weapon and a shield when it comes to violence against women and girls in public spaces and private places. First, we review the complex and varied manifestations of technological gender violence, ranging from the use of technology to exploit, harass, stalk, and otherwise harm women and girls in communal spaces, to offenses that occur behind closed doors. Second, we discuss justice-related responses, underscoring how women and girls have “flipped the script” when their needs are not met. By developing innovative ways to respond to the wrongs committed against them and creating alternate systems that offer a voice, victims/survivors have repurposed technology to redress harms and unite in solidarity with others in an ongoing quest for justice.
Details
Keywords
Ellen Ernst Kossek, Brenda A. Lautsch, Matthew B. Perrigino, Jeffrey H. Greenhaus and Tarani J. Merriweather
Work-life flexibility policies (e.g., flextime, telework, part-time, right-to-disconnect, and leaves) are increasingly important to employers as productivity and well-being…
Abstract
Work-life flexibility policies (e.g., flextime, telework, part-time, right-to-disconnect, and leaves) are increasingly important to employers as productivity and well-being strategies. However, policies have not lived up to their potential. In this chapter, the authors argue for increased research attention to implementation and work-life intersectionality considerations influencing effectiveness. Drawing on a typology that conceptualizes flexibility policies as offering employees control across five dimensions of the work role boundary (temporal, spatial, size, permeability, and continuity), the authors develop a model identifying the multilevel moderators and mechanisms of boundary control shaping relationships between using flexibility and work and home performance. Next, the authors review this model with an intersectional lens. The authors direct scholars’ attention to growing workforce diversity and increased variation in flexibility policy experiences, particularly for individuals with higher work-life intersectionality, which is defined as having multiple intersecting identities (e.g., gender, caregiving, and race), that are stigmatized, and link to having less access to and/or benefits from societal resources to support managing the work-life interface in a social context. Such an intersectional focus would address the important need to shift work-life and flexibility research from variable to person-centered approaches. The authors identify six research considerations on work-life intersectionality in order to illuminate how traditionally assumed work-life relationships need to be revisited to address growing variation in: access, needs, and preferences for work-life flexibility; work and nonwork experiences; and benefits from using flexibility policies. The authors hope that this chapter will spur a conversation on how the work-life interface and flexibility policy processes and outcomes may increasingly differ for individuals with higher work-life intersectionality compared to those with lower work-life intersectionality in the context of organizational and social systems that may perpetuate growing work-life and job inequality.
Details
Keywords
Aysel Sultan, Doris Bühler-Niederberger and Nigar Nasrullayeva
Smartphones play an integral part in many children's lives. Their constant presence in various contexts and the multitude of affordances they present have a tremendous effect on…
Abstract
Smartphones play an integral part in many children's lives. Their constant presence in various contexts and the multitude of affordances they present have a tremendous effect on how childhoods are lived today. One important aspect is the way children's interaction with smartphones can affect relationships and particularly generational relations. In this explorative study, we investigated Azerbaijani children's interaction with smartphones in the family and at school using the sociomaterial and relational approaches. Thinking relationally, we followed children's stories to unravel how smartphones can mediate different types of behavior and assist children in negotiating their place in generational order with the adults in their lives. Analyses suggest that smartphones can both present children with bargaining power to negotiate pleasure and fun as well as means to reinforce the generational order by children themselves. The findings point out that children often transfer social norms and expectations placed on them to the ways they use smartphones.
Details