Search results
1 – 10 of 45Katharine McGowan and Sean Geobey
When complex social-ecological systems collapse and transform, the possible outcomes of this transformation are not set in stone. This paper aims to explore the role of social…
Abstract
Purpose
When complex social-ecological systems collapse and transform, the possible outcomes of this transformation are not set in stone. This paper aims to explore the role of social imagination in determining possible futures for a reformed system. The authors use a historical study of the Luddite response to the Industrial Revolution centred in the UK in the early-19th century to explore the concepts of path dependency, agency and the distributional impacts of systems change.
Design/methodology/approach
In this historical study, the authors used the Luddites’ own words and those of their supporters, captured in archival sources (n = 43 unique Luddite statements), to develop hypotheses around the effects on political, social and judicial consequences of a significant systems transformation. The authors then scaffolded these statements using the heuristics of panarchy and basins of attraction to conceptualize this contentious moment of British history.
Findings
Rather than a strict cautionary tale, the Luddites’ story illustrates the importance of environmental fit and selection pressures as the skilled workers sought to push the English system to a different basin of attraction. It warns us about the difficulty of a just transition in contentious economic and political conditions.
Social implications
The Luddites’ story is a cautionary tale for those interested in a just transition, or bottom-up systems transformation generally as the deep basins of attraction that prefer either the status quo or alternate, elite-favouring arrangements can be challenging to shift independent of shocks. While backward looking, the authors intend these discussions to contribute to current debates on the role(s) of social innovation in social and economic policy within increasingly charged or polarized political contexts.
Originality/value
Social innovation itself is often predicated on the need for just transitions of complex adaptive systems (Westley et al., 2013), and the Luddite movement offers us the opportunity to study the distribution effects of a transformative systems change – the Industrial Revolution – and explore two fundamental questions that underpin much social innovation scholarship: how do we build a just future in the face of complexity and what are likely forms those conversations could take, based on historical examples?
Details
Keywords
Seonaid Stevenson-McCabe and Sarai Chisala-Tempelhoff
Technology-facilitated violence and abuse including image-based sexual abuse (IBSA) is a phenomenon affecting women and girls around the world. Abusers misuse technology to attack…
Abstract
Technology-facilitated violence and abuse including image-based sexual abuse (IBSA) is a phenomenon affecting women and girls around the world. Abusers misuse technology to attack victims and threaten their safety, privacy, and dignity. This abuse is gendered and a form of domestic and sexual violence. In this article, the authors compare criminal law approaches to tackling IBSA in Scotland and Malawi. We critically analyze the legislative landscape in both countries, with a view to assessing the potential for victims to seek and obtain redress for IBSA. We assess the role criminal law has to play in each jurisdiction while acknowledging the limits of criminal law alone in terms of providing redress.
Details
Keywords
This article considers how digital technologies are informed by, and implicated in, the systematic and interlocking oppressions of colonialism, misogyny, and racism, all of which…
Abstract
This article considers how digital technologies are informed by, and implicated in, the systematic and interlocking oppressions of colonialism, misogyny, and racism, all of which have been identified as root causes of the missing and murdered Indigenous women crisis in Canada. The authors consider how technology can facilitate multiple forms of violence against women including stalking and intimate partner violence, human trafficking, pornography and child abuse images, and online hate and harassment and note instances where Indigenous women and girls may be particularly vulnerable. The authors also explore some of the complexities related to police use of technology for investigatory purposes, touching on police use of social media and DNA technology. Without simplistically blaming technology, the authors argue that technology interacts with multiple factors in the complex historical, socio-cultural environment that incubates the national crisis of missing and murdered Indigenous women and girls. The article concludes with related questions that may be considered at the impending national inquiry.
Details
Keywords
Technology-facilitated violence against women (TFVW) is readily becoming a key site of analysis for feminist criminologists. The scholarship in this area has identified online…
Abstract
Technology-facilitated violence against women (TFVW) is readily becoming a key site of analysis for feminist criminologists. The scholarship in this area has identified online sexual harassment, contact-based harassment, image-based abuse, and gender-based cyberhate – among others – as key manifestations of TFVW. It has also unpacked the legal strategies available to women seeking formal justice outcomes. However, much of the existing empirical scholarship has been produced within countries like the United States, United Kingdom, and Australia, and there has been limited research on this phenomenon within South East Asia. As such, this chapter maps how technology is shaping Singaporean women's experiences of gendered, sexual, and domestic violence. To do so, it draws upon findings from a research project which examined TFVW in Singapore by utilizing semistructured interviews with frontline workers in the fields of domestic and sexual violence and LGBT services. Drawing from Dragiewicz et al.’s (2018) work on technology-facilitated coercive control (TFCC), I argue that victims-survivors of dating, domestic, and family violence need to be provided with support that is TFCC informed and technically guided. I also suggest that further research is needed to fully understand the prevalence and nature of TFVW in the Singaporean context.
Details
Keywords
Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual…
Abstract
Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual concerned. Intuitively, it is tempting to condemn doxing as a crude form of cyber violence that weaponizes personal data. When it is used as a strategy of resistance by the powerless to hold the powerful accountable, however, a more nuanced understanding is called for. This chapter focuses on the doxing phenomenon in Hong Kong, where doxing incidents against police officers and their family members have skyrocketed since 2019 (a 75-fold increase over 2018). It contends that doxing for political purposes is closely related to digital vigilantism, signifying a loss of confidence in the ruling authority and a yearning for an alternative form of justice. The chapter therefore argues that public interest should be recognized as a legal defense in doxing cases when those discharging or entrusted with public duty are the targets. Equally, it is important to confine the categories of personal data disclosed to information necessary to reveal the alleged wrongdoer or wrongdoing. Only in this way can a fair balance be struck between privacy, freedom of expression, and public interest.
Details
Keywords
Joel Rudin, Tejinder Billing, Andrea Farro and Yang Yang
This study aims to test bigenderism, a universalistic theory that purports to explain why trans men employees enjoy greater organizational acceptance and superior economic…
Abstract
Purpose
This study aims to test bigenderism, a universalistic theory that purports to explain why trans men employees enjoy greater organizational acceptance and superior economic outcomes compared to trans women employees.
Design/methodology/approach
Respondents were presented with one of two case studies in which they had to choose whether or not to respect the right of a trans employee to use the restroom of their choice at work. The only difference between the two case studies was the gender of the trans employee. In one case, the employee was a trans man and in the other case, the employee was a trans woman.
Findings
The gender of the trans employee had no impact on the choices of the respondents.
Research limitations/implications
The chief research implication is that heightened discrimination against trans men may better be explained by situational theories of transphobia rather than the universalistic theory that was tested in this paper. The primary research limitation was the use of American undergraduate business students as respondents.
Practical implications
Organizations need to be especially vigilant in protecting the restroom rights of their transgender employees, which may entail eliminating gender-segregated restrooms.
Originality/value
This paper is original in that it uses an experimental design to test the theory of bigenderism. It adds value by encouraging experimental research that examines situational theories of transphobia.
Details
Keywords
As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory…
Abstract
As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory mandates as part of an effort to combat it. This chapter argues that these bodies have the potential to meaningfully further a survivor-centered approach to combatting technology-facilitated violence against women – one that places their experiences, rights, wishes, and needs at its core. It further argues that governments should consider integrating them into a broader holistic response to this conduct.
An overview is provided of the operations of New Zealand's Netsafe, the eSafety Commissioner in Australia, Nova Scotia's Cyberscan Unit, and the Canadian Centre for Child Protection in Manitoba. These types of centralized bodies have demonstrated an ability to advance survivor-centered approaches to technology-facilitated violence against women through direct involvement in resolving instances of violence, education, and research. However, these bodies are not a panacea. This chapter outlines critiques of their operations and the challenges they face in maximizing their effectiveness.
Notwithstanding these challenges and critiques, governments should consider creating such bodies or empowering existing bodies with a statutory mandate as one aspect of a broader response to combatting technology-facilitated violence against women. Some proposed best practices to maximize their effectiveness are identified.
Details
Keywords
Eva PenzeyMoog and Danielle C. Slakoff
The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this…
Abstract
The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this chapter, we discuss three unique types of technological abuse: (1) financial abuse via banking websites and apps; (2) abuse via smart home devices (i.e., “Internet of Things” abuse); and (3) stalking via geo-location or GPS. We also argue pregnancy and wellness apps provide an opportunity for meaningful intervention for pregnant victims of domestic violence.
While there is no way to ensure users' safety in all situations, we argue thoughtful considerations while designing and building digital products can result in meaningful contributions to victims' safety. This chapter concludes with PenzeyMoog's (2020) “Framework for Inclusive Safety,” which is a roadmap for building technology that increases the safety of domestic violence survivors. This framework includes three key points: (1) the importance of educating technologists about domestic violence; (2) the importance of identifying possible abuse situations and designing against them; and (3) identifying user interactions that might signal abuse and offering safe interventions.
Details