Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 27 February 2024

Mehmet Emin Bakir, Tracie Farrell and Kalina Bontcheva

The authors investigate how COVID-19 has influenced the amount, type or topics of abuse that UK politicians receive when engaging with the public.

Abstract

Purpose

The authors investigate how COVID-19 has influenced the amount, type or topics of abuse that UK politicians receive when engaging with the public.

Design/methodology/approach

This work covers the first year of COVID-19 in the UK, from March 2020 to March 2021 and analyses Twitter abuse in replies to UK MPs. The authors collected and analysed 17.9 million reply tweets to the MPs. The authors present overall abuse levels during different key moments of the pandemic, analysing reactions to MPs by gender and the relationship between online abuse and topics such as Brexit, the government’s COVID-19 response and policies, and social issues.

Findings

The authors have found that abuse levels towards UK MPs were at an all-time high in December 2020. Women (particularly those from non-White backgrounds) receive unusual amounts of abuse, targeting their credibility and capacity to do their jobs. Similar to other large events like general elections and Brexit, COVID-19 has elevated abuse levels, at least temporarily.

Originality/value

Previous studies analysed abuse levels towards MPs in the run-up to the 2017 and 2019 UK General Elections and during the first four months of the COVID-19 pandemic in the UK. The authors compare previous findings with those of the first year of COVID-19, as the pandemic persisted, and Brexit was forthcoming. This research not only contributes to the longitudinal comparison of abuse trends against UK politicians but also presents new findings, corroborates, further clarifies and raises questions about the previous findings.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-07-2022-0392

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

Open Access
Book part
Publication date: 4 June 2021

Chandell Gosse

Online environments have become a central part of our social, private, and economic life. The term for this is “digital existence,” characterized as a new epoch in mediated…

Abstract

Online environments have become a central part of our social, private, and economic life. The term for this is “digital existence,” characterized as a new epoch in mediated experience. Over the last decade, there has been a growing interest in how online abuse impacts one's digital existence. Drawing on 15 interviews with women, this chapter demonstrates a type of labor—which I call “ontological labor”—that women exercise when processing their own experiences of online abuse, and when sharing their experiences with others. Ontological labor is the process of overcoming a denial of experience. In the case of online abuse, this denial stems partly from the treatment of online and offline life as separate and opposing. This division is known as digital dualism, which I argue is a discourse that denies women the space to have their experiences of online abuse recognized as such.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 October 2023

Petra Filistrucchi, Patrizia Bucarelli, Giuseppe Aversa and Donata Bianchi

This chapter focuses on ways of giving voice to the survivors of institutional abuse and how their contribution can be capitalised in raising community awareness of this…

Abstract

This chapter focuses on ways of giving voice to the survivors of institutional abuse and how their contribution can be capitalised in raising community awareness of this phenomenon. The collection of testimonies demonstrates that institutional abuse is a common and widespread phenomenon that in most cases remains unrevealed throughout the life course. The participatory research process we describe is part of an important social and clinical intervention developed in the framework of two projects. The chapter illustrates outputs and outcomes related to disclosure of institutional abuse and its long-term consequences, as well as the meaning and implications of collective trauma. Results confirm the need to promote the voice of survivors to build a new professional and community culture and sensitisation towards children's right to be heard as an essential instrument to prevent and detect institutional ill treatment. Participatory processes can overcome the resistance of individuals, professional communities and politicians to recognising the phenomenon, emphasising institutional responsibilities and the specific effects of a serious form of maltreatment that requires extraordinary and specific interventions in terms of intensity and flexibility. This chapter describes a fieldwork and research experience made possible thanks to a strong alliance with survivors who engaged in a process of reflection and theoretical elaboration that generated both social and clinical impacts.

Details

Participatory Research on Child Maltreatment with Children and Adult Survivors
Type: Book
ISBN: 978-1-80455-529-3

Keywords

Open Access
Book part
Publication date: 4 June 2021

Nicola Henry and Alice Witt

The nonconsensual taking or sharing of nude or sexual images, also known as “image-based sexual abuse,” is a major social and legal problem in the digital age. In this chapter, we…

Abstract

The nonconsensual taking or sharing of nude or sexual images, also known as “image-based sexual abuse,” is a major social and legal problem in the digital age. In this chapter, we examine the problem of image-based sexual abuse in the context of digital platform governance. Specifically, we focus on two key governance issues: first, the governance of platforms, including the regulatory frameworks that apply to technology companies; and second, the governance by platforms, focusing on their policies, tools, and practices for responding to image-based sexual abuse. After analyzing the policies and practices of a range of digital platforms, we identify four overarching shortcomings: (1) inconsistent, reductionist, and ambiguous language; (2) a stark gap between the policy and practice of content regulation, including transparency deficits; (3) imperfect technology for detecting abuse; and (4) the responsibilization of users to report and prevent abuse. Drawing on a model of corporate social responsibility (CSR), we argue that until platforms better address these problems, they risk failing victim-survivors of image-based sexual abuse and are implicated in the perpetration of such abuse. We conclude by calling for reasonable and proportionate state-based regulation that can help to better align governance by platforms with CSR-initiatives.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Kim Barker and Olga Jurasz

The ideal of an open, all-inclusive, and participatory internet has been undermined by the rise of gender-based and misogynistic abuse on social media platforms. Limited progress…

Abstract

The ideal of an open, all-inclusive, and participatory internet has been undermined by the rise of gender-based and misogynistic abuse on social media platforms. Limited progress has been made at supranational and national levels in addressing this issue, and where steps have been taken to combat online violence against women (OVAW), they are typically limited to legislative developments addressing image-based sexual abuse. As such, harms associated with image-based abuse have gained recognition in law while harms caused by text-based abuse (TBA) have not been conceptualized in an equivalent manner.

This chapter critically outlines the lack of judicial consideration given to online harms in British courts, identifying a range of harms arising from TBAs which currently are not recognized by the criminal justice system. We refer to non-traditional harms recognized in cases heard before the British courts, assessing these in light of traditionally recognized harms in established legal authorities. This chapter emphasizes the connection between the harms suffered and the recognition of impact on the victims, demonstrated through specific case studies. Through this assessment, this chapter advocates for greater recognition of online harms within the legal system – especially those which take the forms of misogynistic and/or gendered TBA.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Eva PenzeyMoog and Danielle C. Slakoff

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this…

Abstract

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this chapter, we discuss three unique types of technological abuse: (1) financial abuse via banking websites and apps; (2) abuse via smart home devices (i.e., “Internet of Things” abuse); and (3) stalking via geo-location or GPS. We also argue pregnancy and wellness apps provide an opportunity for meaningful intervention for pregnant victims of domestic violence.

While there is no way to ensure users' safety in all situations, we argue thoughtful considerations while designing and building digital products can result in meaningful contributions to victims' safety. This chapter concludes with PenzeyMoog's (2020) “Framework for Inclusive Safety,” which is a roadmap for building technology that increases the safety of domestic violence survivors. This framework includes three key points: (1) the importance of educating technologists about domestic violence; (2) the importance of identifying possible abuse situations and designing against them; and (3) identifying user interactions that might signal abuse and offering safe interventions.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 16 November 2022

Elsie Yan, Haze K.L. Ng, Rongwei Sun, Daniel W.L. Lai, Sheung-Tak Cheng, Vivian W.Q. Lou, Daniel Y.T. Fong and Timothy Kwok

This study aims to explore the risk and protective factors of abuse on older adults by family caregivers, with a special focus on the protective role of caregiver resilience in…

1752

Abstract

Purpose

This study aims to explore the risk and protective factors of abuse on older adults by family caregivers, with a special focus on the protective role of caregiver resilience in elder abuse.

Design/methodology/approach

This cross-sectional survey was conducted on a purposive sample of 600 family caregivers of community-dwelling older adults in Hong Kong (mean age = 71.04 and female = 67.2%). Caregivers reported in a guided interview about elder abuse behaviours, caregiver burden, care recipients’ agitated behaviours, caregiver resilience, self-efficacy, social support and basic demographic characteristics. Hierarchical linear regression analyses were conducted to examine the predictors of different forms of elder abuse.

Findings

Caregiver resilience was predictive of lower levels of verbal abuse, physical abuse, injury and financial exploitation but not potentially harmful behaviour (PHB). Social support was independent with all forms of elder abuse, while self-efficacy predicted greater physical abuse after the adjustment of confounding variables. Caregiver burden and agitated behaviours by care recipients remained as significant risk factors in the final models when protective factors were considered.

Research limitations/implications

This study extends current knowledge on the protecting role of resilience in elder abuse in family caregiving. Mixed findings revealed on social support and self-efficacy also highlight the complexity of the prediction of caregiver abuse. Further research should address this area.

Practical implications

The findings of this study warrant the inclusion of caregiver resilience as a key component in developing interventions to prevent elder abuse. Addressing caregiver burden and agitated behaviours have the potential in preventing elder abuse.

Social implications

The findings raise awareness of the importance of supporting caregivers in the community to prevent elder abuse.

Originality/value

Research concerning the protective factors of elder abuse is in a preliminary stage. To the best of the authors’ knowledge, this study is among the first which successfully demonstrates the protective role of resilience in caregiver abuse on older adults. The findings shed invaluable light on the design of effective interventions.

Details

The Journal of Adult Protection, vol. 24 no. 5/6
Type: Research Article
ISSN: 1466-8203

Keywords

Open Access
Article
Publication date: 9 April 2018

Steve Moore

The purpose of this paper is to present findings from face-to-face interviews undertaken with 16 care and nursing home managers employed in homes situated in two English local…

1782

Abstract

Purpose

The purpose of this paper is to present findings from face-to-face interviews undertaken with 16 care and nursing home managers employed in homes situated in two English local authorities. The research sought to explore managers’ perceptions of the role of contract monitoring in the prevention of abuse.

Design/methodology/approach

Semi-structured interviews were undertaken with 16 care and nursing home managers.

Findings

Though personnel employed by the local authority who conducted contract monitoring were generally thought of positively by care home managers on a personal level, their effectiveness was perceived to be limited as a result of their lack of experience and knowledge of providing care, and the methods that they were required to use.

Research limitations/implications

Though the research draws upon the experiences of only 16 care and nursing home managers in two local authorities, data suggest that current contract monitoring activity is of limited utility in determining the true nature of care and the presence of abuse.

Originality/value

Unusually, the paper explores care and nursing home managers’ perceptions of contract monitoring processes in terms of how they perceive their effectiveness in preventing abuse.

Open Access
Article
Publication date: 30 January 2012

Anne Leena Marika Kauppi, Tuija Vanamo, Kari Karkola and Juhani Merikanto

A parent who continuously physically abuses her/his child doesn't aim to kill the child but commits an accidental filicide in a more violent outburst of anger. Fatal abuse deaths…

744

Abstract

A parent who continuously physically abuses her/his child doesn't aim to kill the child but commits an accidental filicide in a more violent outburst of anger. Fatal abuse deaths are prevented by recognition of signs of battering in time. Out of 200 examined intra-familial filicides, 23 (12%) were caused by child battering and 13 (7%) by continuous battering. The medical and court records of the victim and the perpetrator were examined. The perpetrator was the biological mother and the victim was male in 69 per cent of the cases. The abused children were either younger than one year or from two-and-a-half to four years old. Risk factors of the victim (being unwanted, premature birth, separation from the parent caused by hospitalization or custodial care, being ill and crying a lot) and the perpetrator (personality disorder, low socioeconomic status, chaotic family conditions, domestic violence, isolation, alcohol abuse) were common. The injuries caused by previous battering were mostly soft tissue injuries in head and limbs and head traumas and the battering lasted for days or even an year. The final assault was more violent and occurred when the parent was more anxious, frustrated or left alone with the child. The perpetrating parent was diagnosed as having a personality disorder (borderline, narcissistic or dependent) and often substance dependence (31%). None of them were psychotic. Authorities and community members should pay attention to the change in child's behavior and inexplicable injuries or absence from daycare. Furthermore if the parent is immature, alcohol dependent, have a personality disorder and is unable to cope with the demands the small child entails in the parent's life, the child may be in danger.

Details

Mental Illness, vol. 4 no. 1
Type: Research Article
ISSN: 2036-7465

Keywords

1 – 10 of over 1000