Search results

1 – 10 of 49
Content available
Book part
Publication date: 7 June 2024

Abstract

Details

From Local to Global: Eco-entrepreneurship and Global Engagement with the Environment
Type: Book
ISBN: 978-1-83549-277-2

Content available
Book part
Publication date: 20 June 2017

David Shinar

Abstract

Details

Traffic Safety and Human Behavior
Type: Book
ISBN: 978-1-78635-222-4

Content available
Article
Publication date: 1 August 1998

30

Abstract

Details

Pigment & Resin Technology, vol. 27 no. 4
Type: Research Article
ISSN: 0369-9420

Content available
Book part
Publication date: 12 April 2019

Abstract

Details

Traffic Safety Culture
Type: Book
ISBN: 978-1-78714-617-4

Content available
Article
Publication date: 1 October 2000

276

Abstract

Details

Disaster Prevention and Management: An International Journal, vol. 9 no. 4
Type: Research Article
ISSN: 0965-3562

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 1 December 2022

Julie A. Kmec, Lindsey T. O’Connor and Shekinah Hoffman

Building on work that explores the relationship between individual beliefs and ability to recognize discrimination (e.g., Kaiser and Major, 2006), we examine how an adherence to…

Abstract

Building on work that explores the relationship between individual beliefs and ability to recognize discrimination (e.g., Kaiser and Major, 2006), we examine how an adherence to beliefs about gender essentialism, gender egalitarianism, and meritocracy shape one’s interpretation of an illegal act of sexual harassment involving a male supervisor and female subordinate. We also consider whether the role of the gendered culture of engineering (Faulkner, 2009) matters for this relationship. Specifically, we conducted an online survey-experiment asking individuals to report their beliefs about gender and meritocracy and subsequently to evaluate a fictitious but illegal act of sexual harassment in one of two university research settings: an engineering department, a male-dominated setting whose culture is documented as being unwelcoming to women (Hatmaker, 2013; Seron, Silbey, Cech, and Rubineau, 2018), and an ambiguous research setting. We find evidence that the stronger one’s adherence to gender egalitarian beliefs, the greater one’s ability to detect inappropriate behavior and sexual harassment while gender essentialist beliefs play no role in their detection. The stronger one’s adherence to merit beliefs, the less likely they are to view an illegal interaction as either inappropriate or as sexual harassment. We account for respondent knowledge of sexual harassment and their socio-demographic characteristics, finding that the former is more often associated with the detection of inappropriate behavior and sexual harassment at work. We close with a discussion of the transferability of results and policy implications of our findings.

Details

Diversity and Discrimination in Research Organizations
Type: Book
ISBN: 978-1-80117-959-1

Keywords

Content available
Article
Publication date: 1 September 2006

92

Abstract

Details

Library Hi Tech News, vol. 23 no. 8
Type: Research Article
ISSN: 0741-9058

Content available
Book part
Publication date: 19 May 2015

Abstract

Details

Inquiry-Based Learning for Multidisciplinary Programs: A Conceptual and Practical Resource for Educators
Type: Book
ISBN: 978-1-78441-847-2

Content available
Book part
Publication date: 19 December 2017

Karin Klenke

Abstract

Details

Women in Leadership 2nd Edition
Type: Book
ISBN: 978-1-78743-064-8

1 – 10 of 49