Search results

1 – 10 of 74
Open Access
Book part
Publication date: 4 June 2021

Robert D. Lytle, Tabrina M. Bratton and Heather K. Hudson

Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly…

Abstract

Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly referred to as bystander intervention models (BIMs). More recently, BIMs have been modified to facilitate initiatives to prevent various forms of online victimization. This chapter begins with a review of BIMs and recent applications of bystander intervention research to online environments. We also present several future directions for research along with applications for reducing technology-facilitated violence, including programming recommendations and theoretical development.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Olga Marques

Media attention on nonconsensual intimate image dissemination has led to the relatively recent proliferation of academic research on the topic. This literature has focused on many…

Abstract

Media attention on nonconsensual intimate image dissemination has led to the relatively recent proliferation of academic research on the topic. This literature has focused on many areas including victimization and perpetration prevalence rates, coerced sexting, legal and/or criminal contexts, sexual violence in digital spaces, gendered constructions of blame and risk, and legal analysis of high-profile cases and legislation. Despite this research, several gaps exist, including a lack of empirical research with service providers. Informed by in-depth interviews with 10 sexual violence frontline professionals in Southern Ontario (Canada), this chapter focuses on their perspectives of the additive role of technology. With respect to nonconsensual intimate image dissemination, technology acts as a digital “layer” that operates in addition to the commission of physical acts of sexual violence, and compounds the harms experienced by the victim by adding a virtual – and indelible – “permanent remembering” of the violence. Nuancing the contours of consent in a digital age, this chapter concludes by considering what consent means in a technological context.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Kristen Thomasen and Suzie Dunn

Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse…

Abstract

Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse. Whether this be monitoring movements through stalkerware, using drones to nonconsensually film or harass, or manipulating and distributing intimate images online such as deepfakes and creepshots, invasions of privacy have become a significant form of gender-based violence. Accordingly, our normative and legal concepts of privacy must evolve to counter the harms arising from this misuse of new technology. Canada's Supreme Court recently addressed technology-facilitated violations of privacy in the context of voyeurism in R v Jarvis (2019) . The discussion of privacy in this decision appears to be a good first step toward a more equitable conceptualization of privacy protection. Building on existing privacy theories, this chapter examines what the reasoning in Jarvis might mean for “reasonable expectations of privacy” in other areas of law, and how this concept might be interpreted in response to gender-based technology-facilitated violence. The authors argue the courts in Canada and elsewhere must take the analysis in Jarvis further to fully realize a notion of privacy that protects the autonomy, dignity, and liberty of all.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Bronwyn Carlson and Ryan Frazer

Broadly understood as repeated, intentional, and aggressive behaviors facilitated by digital technologies, cyberbullying has been identified as a significant public health concern…

Abstract

Broadly understood as repeated, intentional, and aggressive behaviors facilitated by digital technologies, cyberbullying has been identified as a significant public health concern in Australia. However, there have been critical debates about the theoretical and methodological assumptions of cyberbullying research. On the whole, this research has demonstrated an aversion to accounting for context, difference, and complexity. This insensitivity to difference is evident in the absence of nuanced accounts of Indigenous people's experiences of cyberbullying. In this chapter, we extend recent critiques of dominant approaches to cyberbullying research and argue for novel theoretical and methodological engagements with Indigenous people's experiences of cyberbullying. We review a range of literature that unpacks the many ways that social, cultural, and political life is different for Indigenous peoples. More specifically, we demonstrate there are good reasons to assume that online conflict is different for Indigenous peoples, due to diverse cultural practices and the broader political context of settler-colonialism. We argue that the standardization of scholarly approaches to cyberbullying is delimiting its ability to attend to social difference in online conflict, and we join calls for more theoretically rigorous, targeted, difference-sensitive studies into bullying.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Samantha Keene

Mainstream pornography is popular, freely accessible, and infused with themes of male dominance, aggression, and female subservience. Through depicting sex in these ways…

Abstract

Mainstream pornography is popular, freely accessible, and infused with themes of male dominance, aggression, and female subservience. Through depicting sex in these ways, mainstream pornography has the potential to influence the further development of harmful sexual scripts that condone or endorse violence against women and girls. These concerns warrant the adoption of a harms-based perspective in critical examinations of pornography's influence on sexual experiences. This chapter reports on findings from interviews with 24 heterosexual emerging adults living in Aotearoa/New Zealand about how pornography has impacted their lives. Despite a shared awareness among participants of mainstream pornography's misogynistic tendencies, and the potential for harm from those displays, men's and women's experiences were profoundly gendered. Men's reported experiences were often associated with concerns about their own sexual behaviors, performances, and/or abilities. Conversely, women's experiences were often shaped by how pornography had affected the way that men related to them sexually. Their experiences included instances of sexual coercion and assault which were not reported by the men. These findings signal the need for a gendered lens, situated within a broader harms-based perspective, in examinations of pornography's influence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 30 June 2007

Charles-Henri Fredouet

Organizations, would they be individual companies or large multi-firm networks, face a wide variety of potential risks requiring dedicated keen management. It all the better…

Abstract

Organizations, would they be individual companies or large multi-firm networks, face a wide variety of potential risks requiring dedicated keen management. It all the better applies to supply-chains as risk, related to both physical and information flows, pervades the whole logistics network and has acquired a new and growing security dimension since 9/11. More specifically, as they are now under the permanent threat of terrorism, and because offering sufficient security levels is bound to become a necessary condition for global supply-chain membership, seaports need to adjust their risk management strategy and processes accordingly. In such a context, this paper aims at describing the project of a decision-support system, dedicated to container transit security-wise decision making and which features an expert-system architecture.

Details

Journal of International Logistics and Trade, vol. 5 no. 1
Type: Research Article
ISSN: 1738-2122

Keywords

Open Access
Article
Publication date: 9 May 2022

Osku Torro, Henri Pirkkalainen and Hongxiu Li

The purpose of the paper is to examine how media synchronicity facilitates the emergence of social exchange (i.e. trust and reciprocity) in organizations’ information and…

2309

Abstract

Purpose

The purpose of the paper is to examine how media synchronicity facilitates the emergence of social exchange (i.e. trust and reciprocity) in organizations’ information and communication technology (ICT)-mediated interactions. A model of media synchronicity in organizational social exchange (MSiOSE) is proposed.

Design/methodology/approach

The paper has a design and review approach. The theoretical analysis is based on social exchange theory (SET) and media synchronicity theory (MST).

Findings

The authors propose that, in general, social exchange benefits from both asynchronous and synchronous communication processes. However, media synchronicity has different boundary conditions (i.e. pros and cons) in relation to the emergence of social exchange, determined in accordance with the mutually interacting patterns of trust and reciprocity predicted by SET. The authors provide testable theoretical propositions to support the analysis.

Originality/value

Social exchange is a critical business factor for organizations due to its well-known positive outcomes, such as the strengthening of social ties. The need for successful social exchange in remote work conditions is particularly emphasized. However, with regard to the communication and behavioral patterns that lead to social exchange via ICT, the theoretical understanding is limited. The study reveals previously unmapped heuristics between social exchange and physical media capabilities. Thus, the study's propositions can be used to study and analyze social exchange in the ever-changing media landscape. As a practical contribution, the study helps organizations to improve their communication strategies and use of ICT.

Details

Information Technology & People, vol. 35 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 29 February 2024

Mehroosh Tak, Kirsty Blair and João Gabriel Oliveira Marques

High levels of child obesity alongside rising stunting and the absence of a coherent food policy have deemed UK’s food system to be broken. The National Food Strategy (NFS) was…

Abstract

Purpose

High levels of child obesity alongside rising stunting and the absence of a coherent food policy have deemed UK’s food system to be broken. The National Food Strategy (NFS) was debated intensely in media, with discussions on how and who should fix the food system.

Design/methodology/approach

Using a mixed methods approach, the authors conduct framing analysis on traditional media and sentiment analysis of twitter reactions to the NFS to identify frames used to shape food system policy interventions.

Findings

The study finds evidence that the media coverage of the NFS often utilised the tropes of “culture wars” shaping the debate of who is responsible to fix the food system – the government, the public or the industry. NFS recommendations were portrayed as issues of free choice to shift the debate away from government action correcting for market failure. In contrast, the industry was showcased as equipped to intervene on its own accord. Dietary recommendations made by the NFS were depicted as hurting the poor, painting a picture of helplessness and loss of control, while their voices were omitted and not represented in traditional media.

Social implications

British media’s alignment with free market economic thinking has implications for food systems reform, as it deters the government from acting and relies on the invisible hand of the market to fix the system. Media firms should move beyond tropes of culture wars to discuss interventions that reform the structural causes of the UK’s broken food systems.

Originality/value

As traditional media coverage struggles to capture the diversity of public perception; the authors supplement framing analysis with sentiment analysis of Twitter data. To the best of our knowledge, no such media (and social media) analysis of the NFS has been conducted. The paper is also original as it extends our understanding of how media alignment with free market economic thinking has implications for food systems reform, as it deters the government from acting and relies on the invisible hand of the market to fix the system.

Details

British Food Journal, vol. 126 no. 13
Type: Research Article
ISSN: 0007-070X

Keywords

Open Access
Article
Publication date: 15 October 2015

Zahra Ladhan, Henal Shah, Ray Wells, Stacey Friedman, Juanita Bezuidenhout, Ben van Heerden, Henry Campos and Page S. Morahan

The health workforce of the 21st century has enormous challenges; health professionals need to be both experts in their field and equipped with leadership and managerial skills…

Abstract

The health workforce of the 21st century has enormous challenges; health professionals need to be both experts in their field and equipped with leadership and managerial skills. These skills are not part of the regular curriculum, so specific programs bridging this gap are required. Since 2001, FAIMER®, with eight centers across the globe, has worked to create health professions education leaders through transformational learning experiences, developing a global community of practice encompassing over 40 countries. We describe the design, implementation, evaluation, and evolution of the leadership and management curriculum component of the global Institute over 15 years. The curriculum is developed and updated through practices that keep faculty and fellows connected, aligned, and learning together. The article highlights the unique features, challenges faced, and sustainability issues. With a robust mixed methods evaluation, there are substantial reasons to believe that the model works, is adaptable and replicable to meet local needs. The program is playing an important role of answering the call for training positive, strengths-based, collaborative leaders who are socially accountable and embrace the challenges for high quality equitable health care around the globe

Details

Journal of Leadership Education, vol. 14 no. 4
Type: Research Article
ISSN: 1552-9045

Open Access
Book part
Publication date: 29 November 2023

Abstract

Details

The Emerald Handbook of Research Management and Administration Around the World
Type: Book
ISBN: 978-1-80382-701-8

1 – 10 of 74