Search results

1 – 10 of 116
Open Access
Book part
Publication date: 16 August 2023

Ross Coomber, Andrew Childs, Leah Moyle and Monica Barratt

The online sourcing, supply, and purchase of illicit drugs is fast transforming drug markets worldwide. Although the long-term development of simple communications technology over…

Abstract

The online sourcing, supply, and purchase of illicit drugs is fast transforming drug markets worldwide. Although the long-term development of simple communications technology over time (from pagers to mobile phones) continues to impact and extend local drug supply dynamics, it is the recent developments of dark web cryptomarkets, social media applications (like Instagram), encrypted messaging applications (like WhatsApp), and surface web platforms, such as LeafedOut, that are changing the drug supply landscape online. The use of technology in drug supply has tended to go hand in hand with improving the efficiency of supply and opportunities to reduce exchange-related risks for both buyers and sellers. In relation to app-mediated supply, for example, the use of encrypted messaging provides enhanced security for arranging purchases beyond the lurking surveillance of law enforcement. Despite the perception of improved safety, however, the use of social media apps and other online platforms can expose both buyers and sellers to risk scenarios they may not fully appreciate. Drawing on two recent studies on the use of social media apps and the online platform LeafedOut as mediators of drugs supply, this chapter will consider how these mid-range (between cryptomarkets and traditional telecommunications such as basic texting/calling and material ‘street’ markets) virtual spaces are being utilised for drug supply and the extent to which this is ‘just more of the same’ or provides new structures and experiences for those engaging with it and in what ways. Consideration will also be given to contradictions in the mid-range market space where the broad perception of reduced risk from the use of encrypted messaging can in fact produce greater levels of risk for some buyers and sellers depending on how they engage with the process/es.

Details

Digital Transformations of Illicit Drug Markets: Reconfiguration and Continuity
Type: Book
ISBN: 978-1-80043-866-8

Keywords

Open Access
Book part
Publication date: 4 June 2021

Christopher Dietzel

Rape culture, described as when “violence is seen as sexy and sexuality as violent” (Buchwald, Fletcher, & Roth, 1993, p. vii), exists online and offline (Henry & Powell, 2014)…

Abstract

Rape culture, described as when “violence is seen as sexy and sexuality as violent” (Buchwald, Fletcher, & Roth, 1993, p. vii), exists online and offline (Henry & Powell, 2014). Much of the research on rape culture focuses on the experiences of heterosexual women, and few studies have explored rape culture in the context of dating apps. This chapter explores how men who have sex with men (MSM) understand and experience rape culture through their use of Grindr and similar dating apps. A thematic analysis of interviews with 25 MSM dating app users revealed problematic user behavior as well as unwanted sexual messages and images as common manifestations of rape culture on dating apps. Participants explained that rape culture extends beyond in-app interactions to in-person encounters, as evident by incidents of sexual violence that several participants had experienced and one participant had committed. Participants were unsure about the extent to which MSM dating apps facilitate rape culture but asserted that some apps enable rape culture more than others. This chapter demonstrates the importance of investigating sexual violence against people of diverse gender and sexual identities to ensure their experiences are not minimized, ignored, or rendered invisible.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access

Abstract

Details

Young Children’s Play Practices with Digital Tablets
Type: Book
ISBN: 978-1-78756-705-4

Open Access
Book part
Publication date: 4 June 2021

Elena Cama

In recent years, the use of dating and hook up apps has become an increasingly socially acceptable and commonly used method of seeking romantic and sexual partners. This has seen…

Abstract

In recent years, the use of dating and hook up apps has become an increasingly socially acceptable and commonly used method of seeking romantic and sexual partners. This has seen a corresponding rise in media and crime reports of sexual harms facilitated through these services, including sexual harassment, unsolicited sexual imagery, and sexual assault. Emerging empirical research shows that experiences of sexual harms in this context are common and predominantly impact women and girls. The aim of this chapter is to examine the sociocultural and sexual norms that underpin online dating and which perpetuate a “rape culture” within which sexual harms become both possible and normalized. This chapter also considers how the discourses that minimize and legitimize sexual harms are encoded within the responses undertaken by dating and hook up apps to sexual harms. It is argued that together these norms and discourses may act to facilitate and/or prevent sexual harms, and may normalize and excuse these harms when they occur.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Abstract

Details

Young Children’s Play Practices with Digital Tablets
Type: Book
ISBN: 978-1-78756-705-4

Open Access
Book part
Publication date: 4 October 2023

Andrea Rácz and Dorottya Sik

This chapter discusses how to involve children and young people in decisions and encourage them to express their needs and participate in the decision-making process to develop a…

Abstract

This chapter discusses how to involve children and young people in decisions and encourage them to express their needs and participate in the decision-making process to develop a quality intervention. By describing the different aspects of projects involving a participatory approach, it shows how giving voice to children and young people unlocked new perspectives regarding the Hungarian child protection system. Participation of children in research is limited in Hungary, partly due to the challenging legislation and authorisation process. This chapter shows how research to develop child-friendly digital tools can contribute to collecting children's views on their needs related to child protection support, and how the process of listening to children can improve parenting and caregiving responses to the needs of younger and older children living with their families or in the child protection system. The chapter analyses the effect of digital applications on children's and young people's capacity to advance towards autonomy, including applications and a video campaign with short video clips created by young people. These projects gave an opportunity for children and youth in the public care system to describe their lives and wishes for the future. The analysis found: (a) for a functional child protection system and to promote development for children and young people, children's voices need to be amplified; (b) by expressing their voices, children become more autonomous; (c) children's voices contribute to decreasing social prejudices against children and young people in public care; and (d) listening to children and youth who age out of care can help professionals working in the child protection system better understand their beneficiaries.

Details

Participatory Research on Child Maltreatment with Children and Adult Survivors
Type: Book
ISBN: 978-1-80455-529-3

Keywords

Open Access
Book part
Publication date: 4 June 2021

Eva PenzeyMoog and Danielle C. Slakoff

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this…

Abstract

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this chapter, we discuss three unique types of technological abuse: (1) financial abuse via banking websites and apps; (2) abuse via smart home devices (i.e., “Internet of Things” abuse); and (3) stalking via geo-location or GPS. We also argue pregnancy and wellness apps provide an opportunity for meaningful intervention for pregnant victims of domestic violence.

While there is no way to ensure users' safety in all situations, we argue thoughtful considerations while designing and building digital products can result in meaningful contributions to victims' safety. This chapter concludes with PenzeyMoog's (2020) “Framework for Inclusive Safety,” which is a roadmap for building technology that increases the safety of domestic violence survivors. This framework includes three key points: (1) the importance of educating technologists about domestic violence; (2) the importance of identifying possible abuse situations and designing against them; and (3) identifying user interactions that might signal abuse and offering safe interventions.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Abstract

Details

Young Children’s Play Practices with Digital Tablets
Type: Book
ISBN: 978-1-78756-705-4

Abstract

Details

Young Children’s Play Practices with Digital Tablets
Type: Book
ISBN: 978-1-78756-705-4

Open Access
Book part
Publication date: 4 June 2021

Ari Ezra Waldman

Mobile dating apps are widely used in the queer community. Whether for sexual exploration or dating, mobile and geosocial dating apps facilitate connection. But they also bring…

Abstract

Mobile dating apps are widely used in the queer community. Whether for sexual exploration or dating, mobile and geosocial dating apps facilitate connection. But they also bring attendant privacy risks. This chapter is based on original research about the ways gay and bisexual men navigate their privacy on geosocial dating apps geared toward the LGBTQI community. It argues that, contrary to the conventional wisdom that people who share semi-nude or nude photos do not care about their privacy, gay and bisexual users of geosocial dating apps care very much about their privacy and engage in complex, overlapping privacy navigation techniques when sharing photos. They share semi-nude and nude photos for a variety of reasons, but generally do so only after building organic trust with another person. Because trust can easily break down without supportive institutions, this chapter argues that law and design must help individuals protect their privacy on geosocial dating apps.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Access

Only Open Access

Year

Content type

Book part (116)
1 – 10 of 116