Search results

1 – 10 of 71
Content available
Book part
Publication date: 19 December 2017

Karin Klenke

Abstract

Details

Women in Leadership 2nd Edition
Type: Book
ISBN: 978-1-78743-064-8

Open Access
Book part
Publication date: 4 June 2021

Kristen Thomasen and Suzie Dunn

Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse…

Abstract

Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse. Whether this be monitoring movements through stalkerware, using drones to nonconsensually film or harass, or manipulating and distributing intimate images online such as deepfakes and creepshots, invasions of privacy have become a significant form of gender-based violence. Accordingly, our normative and legal concepts of privacy must evolve to counter the harms arising from this misuse of new technology. Canada's Supreme Court recently addressed technology-facilitated violations of privacy in the context of voyeurism in R v Jarvis (2019) . The discussion of privacy in this decision appears to be a good first step toward a more equitable conceptualization of privacy protection. Building on existing privacy theories, this chapter examines what the reasoning in Jarvis might mean for “reasonable expectations of privacy” in other areas of law, and how this concept might be interpreted in response to gender-based technology-facilitated violence. The authors argue the courts in Canada and elsewhere must take the analysis in Jarvis further to fully realize a notion of privacy that protects the autonomy, dignity, and liberty of all.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Suzie Dunn

When discussing the term “technology-facilitated violence” (TFV) it is often asked: “Is it actually violence?” While international human rights standards, such as the United…

Abstract

When discussing the term “technology-facilitated violence” (TFV) it is often asked: “Is it actually violence?” While international human rights standards, such as the United Nations' Convention on the Elimination of All Forms of Discrimination against Women (United Nations General Assembly, 1979), have long recognized emotional and psychological abuse as forms of violence, including many forms of technology-facilitated abuse (United Nations, 2018), law makers and the general public continue to grapple with the question of whether certain harmful technology-facilitated behaviors are actually forms of violence. This chapter explores this question in two parts. First, it reviews three theoretical concepts of violence and examines how these concepts apply to technology-facilitated behaviors. In doing so, this chapter aims to demonstrate how some harmful technology-facilitated behaviors fit under the greater conceptual umbrella of violence. Second, it examines two recent cases, one from the British Columbia Court of Appeal (BCCA) in Canada and a Romanian case from the European Court of Human Rights (ECtHR), that received attention for their legal determinations on whether to define harmful technology-facilitated behaviors as forms of violence or not. This chapter concludes with observations on why we should conceptualize certain technology-facilitated behaviors as forms of violence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Content available
Book part
Publication date: 18 December 2016

Abstract

Details

The Crisis of Race in Higher Education: A Day of Discovery and Dialogue
Type: Book
ISBN: 978-1-78635-710-6

Content available
Book part
Publication date: 27 October 2021

Abstract

Details

Advances in Group Processes
Type: Book
ISBN: 978-1-80071-677-3

Open Access
Book part
Publication date: 4 June 2021

Samantha Keene

Mainstream pornography is popular, freely accessible, and infused with themes of male dominance, aggression, and female subservience. Through depicting sex in these ways…

Abstract

Mainstream pornography is popular, freely accessible, and infused with themes of male dominance, aggression, and female subservience. Through depicting sex in these ways, mainstream pornography has the potential to influence the further development of harmful sexual scripts that condone or endorse violence against women and girls. These concerns warrant the adoption of a harms-based perspective in critical examinations of pornography's influence on sexual experiences. This chapter reports on findings from interviews with 24 heterosexual emerging adults living in Aotearoa/New Zealand about how pornography has impacted their lives. Despite a shared awareness among participants of mainstream pornography's misogynistic tendencies, and the potential for harm from those displays, men's and women's experiences were profoundly gendered. Men's reported experiences were often associated with concerns about their own sexual behaviors, performances, and/or abilities. Conversely, women's experiences were often shaped by how pornography had affected the way that men related to them sexually. Their experiences included instances of sexual coercion and assault which were not reported by the men. These findings signal the need for a gendered lens, situated within a broader harms-based perspective, in examinations of pornography's influence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Content available
Article
Publication date: 7 June 2022

Mary Ashley Stanton, Jason Anderson, John M. Dickens and Lance Champagne

The purpose of this research is to explore the utility of autonomous transport across two independent airframe maintenance operations at a single location.

Abstract

Purpose

The purpose of this research is to explore the utility of autonomous transport across two independent airframe maintenance operations at a single location.

Design/methodology/approach

This study leveraged discrete event simulation that encompassed real-world conditions on a United States Air Force flight line. Though the Theory of Constraints (TOC) lens, a high-demand, human-controlled delivery asset is analyzed and the impact of introducing an autonomous rover delivery vehicle is assessed. The authors’ simulations explored varying numbers and networks of rovers as alternative sources of delivery and evaluated these resources’ impact against current flight line operations.

Findings

This research indicates that the addition of five autonomous rovers can significantly reduce daily expediter delivery tasks, which results in additional expertise necessary to manage and execute flight line operations. The authors assert that this relief would translate into enhancements in aircraft mission capable rates, which could increase overall transport capacity and cascade into faster cargo delivery times, systemwide. By extension, the authors suggest overall inventory management could be improved through reduction in transportation shipping time variance, which enhances the Department of Defense’s overall supply chain resilience posture.

Originality/value

When compared against existing practices, this novel research provides insight into actual flight line movement and the potential benefits of an alternative autonomous delivery system. Additionally, the research measures the potential savings in the workforce and vehicle use that exceeds the cost of the rovers and their employment.

Details

Journal of Defense Analytics and Logistics, vol. 6 no. 1
Type: Research Article
ISSN: 2399-6439

Keywords

Content available
Book part
Publication date: 14 October 2022

Päivi Rasi-Heikkinen

Abstract

Details

Older People in a Digitalized Society
Type: Book
ISBN: 978-1-80382-167-2

Open Access
Article
Publication date: 6 June 2016

Ashley D. Lloyd, Mario Antonioletti and Terence M. Sloan

China is the world’s largest user market for digital technologies and experiencing unprecedented rates of rural-urban migration set to create the world’s first “urban billion”…

4650

Abstract

Purpose

China is the world’s largest user market for digital technologies and experiencing unprecedented rates of rural-urban migration set to create the world’s first “urban billion”. This is an important context for studying nuanced adoption behaviours that define a digital divide. Large-scale studies are required to determine what behaviours exist in such populations, but can offer limited ability to draw inferences about why. The purpose of this paper is to report a large-scale study inside China that probes a nuanced “digital divide” behaviour: consumer demographics indicating ability to pay by electronic means but behaviour suggesting lack of willingness to do so, and extends current demographics to help explain this.

Design/methodology/approach

The authors report trans-national access to commercial “Big Data” inside China capturing the demographics and consumption of millions of consumers across a wide range of physical and digital market channels. Focusing on one urban location we combine traditional demographics with a new measure that reflecting migration: “Distance from Home”, and use data-mining techniques to develop a model that predicts use behaviour.

Findings

Use behaviour is predictable. Most use is explained by value of the transaction. “Distance from Home” is more predictive of technology use than traditional demographics.

Research limitations/implications

Results suggest traditional demographics are insufficient to explain “why” use/non-use occurs and hence an insufficient basis to formulate and target government policy.

Originality/value

The authors understand this to be the first large-scale trans-national study of use/non-use of digital channels within China, and the first study of the impact of distance on ICT adoption.

Details

Information Technology & People, vol. 29 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Content available
Book part
Publication date: 27 October 2022

Abstract

Details

Advances in Group Processes
Type: Book
ISBN: 978-1-80455-153-0

1 – 10 of 71