Search results

1 – 10 of 38

Abstract

Details

Attaining the 2030 Sustainable Development Goal of Gender Equality
Type: Book
ISBN: 978-1-80455-835-5

Open Access
Book part
Publication date: 4 June 2021

Samantha Keene

Mainstream pornography is popular, freely accessible, and infused with themes of male dominance, aggression, and female subservience. Through depicting sex in these ways…

Abstract

Mainstream pornography is popular, freely accessible, and infused with themes of male dominance, aggression, and female subservience. Through depicting sex in these ways, mainstream pornography has the potential to influence the further development of harmful sexual scripts that condone or endorse violence against women and girls. These concerns warrant the adoption of a harms-based perspective in critical examinations of pornography's influence on sexual experiences. This chapter reports on findings from interviews with 24 heterosexual emerging adults living in Aotearoa/New Zealand about how pornography has impacted their lives. Despite a shared awareness among participants of mainstream pornography's misogynistic tendencies, and the potential for harm from those displays, men's and women's experiences were profoundly gendered. Men's reported experiences were often associated with concerns about their own sexual behaviors, performances, and/or abilities. Conversely, women's experiences were often shaped by how pornography had affected the way that men related to them sexually. Their experiences included instances of sexual coercion and assault which were not reported by the men. These findings signal the need for a gendered lens, situated within a broader harms-based perspective, in examinations of pornography's influence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 29 July 2019

Isabel Fróes

Abstract

Details

Young Children’s Play Practices with Digital Tablets
Type: Book
ISBN: 978-1-78756-705-4

Open Access
Book part
Publication date: 29 September 2023

Asuncion Fresnoza-Flot

The literature on ‘mixed’ families (in which members are socially viewed as ‘different’ due to their varying ethnicities and/or nationalities) identifies several stakes of…

Abstract

The literature on ‘mixed’ families (in which members are socially viewed as ‘different’ due to their varying ethnicities and/or nationalities) identifies several stakes of mixedness. One of them arises from childbirth, after which parents need to give name(s) to their offspring. How does the parent–child dyad understand the giving of names in their mixed family? What does naming children unveil regarding interpersonal interactions and the value of children within this social unit? The chapter delves into these questions through a case study of forenaming children in Filipino-Belgian families in Belgium. Interview data analysis reveals two modes of forenaming in these families: individualisation through single forenames and reinforcement of collective affiliation through compound forenames. Through the analytical framework of social relatedness, this chapter uncovers the way the act of naming a child bridges families based on biological and social ties, generations, and parents' nations of belonging in their transnational spaces. The complex process of naming reflects the power dynamics not only within the parental couple but also within the wider set of social relations. Although the use of forename(s) in everyday life and in legal terms differ, the value of children in the mixed families studied lies in their symbolic role as social bridges linking generations and non-biological relationships, the then and now, and the here and there.

Details

The Emerald Handbook of Childhood and Youth in Asian Societies
Type: Book
ISBN: 978-1-80382-284-6

Keywords

Open Access
Book part
Publication date: 9 December 2021

David J. Harper, Darren Ellis and Ian Tucker

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented…

Abstract

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented which highlight different types of surveillance and different ethical concerns. The first case concerns the use of undercover police to infiltrate political activist groups over a 40-year period in the UK. The second case study examines a joint operation by US and Australian law enforcement agencies: the FBI’s operation Trojan Shield and the AFP’s Operation Ironside. This involved distributing encrypted phone handsets to serious criminal organisations which included a ‘backdoor’ secretly sending encrypted copies of all messages to law enforcement. The third case study analyses the use of emotional artificial intelligence systems in educational digital learning platforms for children where technology companies collect, store and use intrusive personal data in an opaque manner. The authors discuss similarities and differences in the ethical questions raised by these cases, for example, the involvement of the state versus private corporations, the kinds of information gathered and how it is used.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Book part
Publication date: 4 June 2021

Michael Salter and Elly Hanson

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the…

Abstract

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the absence of adequate intervention by internet service providers, social media platforms, and government. The chapter discusses the history of online CSE, focusing on regulatory stances over time in which online risks to children have been cast as natural and inevitable by the hegemony of a “cyberlibertarian” ideology. We illustrate the success of this ideology, as well as its profound contradictions and ethical failures, by presenting key examples in which internet users have taken decisive action to prevent online CSE and promote the removal of CSAM. Rejecting simplistic characterizations of “vigilante justice,” we argue instead that the fact that often young internet users report feeling forced to act against online CSE and CSAM undercuts libertarian claims that internet regulation is impossible, unworkable, and unwanted. Recent shifts toward a more progressive ethos of online harm minimization are promising; however, this ethos risks offering a new legitimizing ideology for online business models that will continue to put children at risk of abuse and exploitation. In conclusion, we suggest ways forward toward an internet built in the interests of children, rather than profit.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 29 November 2023

Abstract

Details

The Emerald Handbook of Research Management and Administration Around the World
Type: Book
ISBN: 978-1-80382-701-8

Open Access
Book part
Publication date: 4 May 2018

Subhani, Ahmad Yani, Awaludin Arifin, Ti Aisyah, Kamaruddin and Teuku Alfiady

Purpose – This study aimed to explore what the Islamic boarding school does to protect their students from radicalism, violence, and fundamentalism.Approach – For this research…

Abstract

Purpose – This study aimed to explore what the Islamic boarding school does to protect their students from radicalism, violence, and fundamentalism.

Approach – For this research, both a qualitative approach and a phenomenological method were used to get the accurate results.

Findings – The study was conducted from April 2016 to December 2016. The Islamic Boarding School of Jabal Nur was taken up as a case for this study. The school has a lot of strategies to protect its students from radicalism, violence, and fundamentalism ideology. Those ideologies might damage their health mental and behavior. This research found that the strategies are: (1) applying the curriculum of the study according to the Ministry of Religious Affairs (Kementerian Agama); (2) religious education based on the salafi method (al kitab alasfar) which contains the deradicalization concept, and by this method, the students were trained to be a obedient; (3) foster care system or parenting done for 24 hours. The tutor was responsible for paying attention to their development, listening to their complaints, taking care of their mental and physical health, and guiding them at all times; and (4) the student (santri) was occupied by various extracurricular activities, such as Arabic caligraphy learning, language department center, sport activities, etc. Prevention efforts should also be based on the agreement between the students and their teacher. With these efforts, this study concludes that the radical ideology potential for santri (student) will not occur.

Originality/Value – The study of radicalism becomes an important discussion today, given the rise of terrorist threats in almost all countries.

Details

Proceedings of MICoMS 2017
Type: Book
ISBN:

Keywords

Open Access
Book part
Publication date: 12 June 2023

Peter Robinson

Abstract

Details

How Gay Men Prepare for Death
Type: Book
ISBN: 978-1-83909-587-0

Open Access
Book part
Publication date: 30 April 2019

S. J. Oswald A. J. Mascarenhas

Leadership cannot exist without followership. The phenomenon of direction and guidance, coaching and mentoring, has at least three components: the leader, leadership, and…

Abstract

Executive Summary

Leadership cannot exist without followership. The phenomenon of direction and guidance, coaching and mentoring, has at least three components: the leader, leadership, and followers. With each component, the composition of purpose and goals, ethics and morals, rights and duties, and skills and talents is critically important. While the leader is the central and the most important part of the leadership phenomenon, followers are important and necessary factors in the leadership equation. Leaders and followers are engaged in a common enterprise: they are dependent upon each other; their fortunes rise and fall together. Relational qualities define the leadership–followership phenomenon. A major component of such a relationship is how the leaders create and communicate new meaning to followers, perceive themselves relative to followers, and how the followers, in turn, perceive their leader. This mutual perception has serious ethical and moral implications – how leader uses or abuses power, and how followers are augmented or diminished. This chapter features the essentials of ethical and moral, corporate executive leadership in two parts: (1) the Theory of Ethical and Moral Leadership and (2) the Art of Ethical and Moral Leadership. Several contemporary cases such as inspirational leadership of JRD Tata, Crisis of Leadership at Infosys, and Headhunting for CEOs will illustrate our discussions on the ethics and morals of corporate executive leadership.

Details

Corporate Ethics for Turbulent Markets
Type: Book
ISBN: 978-1-78756-192-2

Access

Only Open Access

Year

Content type

Book part (38)
1 – 10 of 38