Search results

1 – 10 of 45
Open Access
Article
Publication date: 9 February 2022

Katharine McGowan and Sean Geobey

When complex social-ecological systems collapse and transform, the possible outcomes of this transformation are not set in stone. This paper aims to explore the role of social…

1496

Abstract

Purpose

When complex social-ecological systems collapse and transform, the possible outcomes of this transformation are not set in stone. This paper aims to explore the role of social imagination in determining possible futures for a reformed system. The authors use a historical study of the Luddite response to the Industrial Revolution centred in the UK in the early-19th century to explore the concepts of path dependency, agency and the distributional impacts of systems change.

Design/methodology/approach

In this historical study, the authors used the Luddites’ own words and those of their supporters, captured in archival sources (n = 43 unique Luddite statements), to develop hypotheses around the effects on political, social and judicial consequences of a significant systems transformation. The authors then scaffolded these statements using the heuristics of panarchy and basins of attraction to conceptualize this contentious moment of British history.

Findings

Rather than a strict cautionary tale, the Luddites’ story illustrates the importance of environmental fit and selection pressures as the skilled workers sought to push the English system to a different basin of attraction. It warns us about the difficulty of a just transition in contentious economic and political conditions.

Social implications

The Luddites’ story is a cautionary tale for those interested in a just transition, or bottom-up systems transformation generally as the deep basins of attraction that prefer either the status quo or alternate, elite-favouring arrangements can be challenging to shift independent of shocks. While backward looking, the authors intend these discussions to contribute to current debates on the role(s) of social innovation in social and economic policy within increasingly charged or polarized political contexts.

Originality/value

Social innovation itself is often predicated on the need for just transitions of complex adaptive systems (Westley et al., 2013), and the Luddite movement offers us the opportunity to study the distribution effects of a transformative systems change – the Industrial Revolution – and explore two fundamental questions that underpin much social innovation scholarship: how do we build a just future in the face of complexity and what are likely forms those conversations could take, based on historical examples?

Details

Social Enterprise Journal, vol. 18 no. 2
Type: Research Article
ISSN: 1750-8614

Keywords

Open Access
Book part
Publication date: 4 June 2021

Seonaid Stevenson-McCabe and Sarai Chisala-Tempelhoff

Technology-facilitated violence and abuse including image-based sexual abuse (IBSA) is a phenomenon affecting women and girls around the world. Abusers misuse technology to attack…

Abstract

Technology-facilitated violence and abuse including image-based sexual abuse (IBSA) is a phenomenon affecting women and girls around the world. Abusers misuse technology to attack victims and threaten their safety, privacy, and dignity. This abuse is gendered and a form of domestic and sexual violence. In this article, the authors compare criminal law approaches to tackling IBSA in Scotland and Malawi. We critically analyze the legislative landscape in both countries, with a view to assessing the potential for victims to seek and obtain redress for IBSA. We assess the role criminal law has to play in each jurisdiction while acknowledging the limits of criminal law alone in terms of providing redress.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Jane Bailey and Sara Shayan

This article considers how digital technologies are informed by, and implicated in, the systematic and interlocking oppressions of colonialism, misogyny, and racism, all of which…

Abstract

This article considers how digital technologies are informed by, and implicated in, the systematic and interlocking oppressions of colonialism, misogyny, and racism, all of which have been identified as root causes of the missing and murdered Indigenous women crisis in Canada. The authors consider how technology can facilitate multiple forms of violence against women including stalking and intimate partner violence, human trafficking, pornography and child abuse images, and online hate and harassment and note instances where Indigenous women and girls may be particularly vulnerable. The authors also explore some of the complexities related to police use of technology for investigatory purposes, touching on police use of social media and DNA technology. Without simplistically blaming technology, the authors argue that technology interacts with multiple factors in the complex historical, socio-cultural environment that incubates the national crisis of missing and murdered Indigenous women and girls. The article concludes with related questions that may be considered at the impending national inquiry.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Laura Vitis

Technology-facilitated violence against women (TFVW) is readily becoming a key site of analysis for feminist criminologists. The scholarship in this area has identified online…

Abstract

Technology-facilitated violence against women (TFVW) is readily becoming a key site of analysis for feminist criminologists. The scholarship in this area has identified online sexual harassment, contact-based harassment, image-based abuse, and gender-based cyberhate – among others – as key manifestations of TFVW. It has also unpacked the legal strategies available to women seeking formal justice outcomes. However, much of the existing empirical scholarship has been produced within countries like the United States, United Kingdom, and Australia, and there has been limited research on this phenomenon within South East Asia. As such, this chapter maps how technology is shaping Singaporean women's experiences of gendered, sexual, and domestic violence. To do so, it draws upon findings from a research project which examined TFVW in Singapore by utilizing semistructured interviews with frontline workers in the fields of domestic and sexual violence and LGBT services. Drawing from Dragiewicz et al.’s (2018) work on technology-facilitated coercive control (TFCC), I argue that victims-survivors of dating, domestic, and family violence need to be provided with support that is TFCC informed and technically guided. I also suggest that further research is needed to fully understand the prevalence and nature of TFVW in the Singaporean context.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Anne Cheung

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual…

Abstract

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual concerned. Intuitively, it is tempting to condemn doxing as a crude form of cyber violence that weaponizes personal data. When it is used as a strategy of resistance by the powerless to hold the powerful accountable, however, a more nuanced understanding is called for. This chapter focuses on the doxing phenomenon in Hong Kong, where doxing incidents against police officers and their family members have skyrocketed since 2019 (a 75-fold increase over 2018). It contends that doxing for political purposes is closely related to digital vigilantism, signifying a loss of confidence in the ruling authority and a yearning for an alternative form of justice. The chapter therefore argues that public interest should be recognized as a legal defense in doxing cases when those discharging or entrusted with public duty are the targets. Equally, it is important to confine the categories of personal data disclosed to information necessary to reveal the alleged wrongdoer or wrongdoing. Only in this way can a fair balance be struck between privacy, freedom of expression, and public interest.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 19 November 2020

Abstract

Details

The Impact of Global Drug Policy on Women: Shifting the Needle
Type: Book
ISBN: 978-1-83982-885-0

Open Access
Book part
Publication date: 1 May 2019

David Hearne and Alex de Ruyter

Abstract

Details

Regional Success After Brexit: The Need for New Measures
Type: Book
ISBN: 978-1-78756-736-8

Open Access
Article
Publication date: 14 April 2020

Joel Rudin, Tejinder Billing, Andrea Farro and Yang Yang

This study aims to test bigenderism, a universalistic theory that purports to explain why trans men employees enjoy greater organizational acceptance and superior economic…

3797

Abstract

Purpose

This study aims to test bigenderism, a universalistic theory that purports to explain why trans men employees enjoy greater organizational acceptance and superior economic outcomes compared to trans women employees.

Design/methodology/approach

Respondents were presented with one of two case studies in which they had to choose whether or not to respect the right of a trans employee to use the restroom of their choice at work. The only difference between the two case studies was the gender of the trans employee. In one case, the employee was a trans man and in the other case, the employee was a trans woman.

Findings

The gender of the trans employee had no impact on the choices of the respondents.

Research limitations/implications

The chief research implication is that heightened discrimination against trans men may better be explained by situational theories of transphobia rather than the universalistic theory that was tested in this paper. The primary research limitation was the use of American undergraduate business students as respondents.

Practical implications

Organizations need to be especially vigilant in protecting the restroom rights of their transgender employees, which may entail eliminating gender-segregated restrooms.

Originality/value

This paper is original in that it uses an experimental design to test the theory of bigenderism. It adds value by encouraging experimental research that examines situational theories of transphobia.

Details

Organization Management Journal, vol. 17 no. 2
Type: Research Article
ISSN: 1541-6518

Keywords

Open Access
Book part
Publication date: 4 June 2021

Pam Hrick

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory…

Abstract

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory mandates as part of an effort to combat it. This chapter argues that these bodies have the potential to meaningfully further a survivor-centered approach to combatting technology-facilitated violence against women – one that places their experiences, rights, wishes, and needs at its core. It further argues that governments should consider integrating them into a broader holistic response to this conduct.

An overview is provided of the operations of New Zealand's Netsafe, the eSafety Commissioner in Australia, Nova Scotia's Cyberscan Unit, and the Canadian Centre for Child Protection in Manitoba. These types of centralized bodies have demonstrated an ability to advance survivor-centered approaches to technology-facilitated violence against women through direct involvement in resolving instances of violence, education, and research. However, these bodies are not a panacea. This chapter outlines critiques of their operations and the challenges they face in maximizing their effectiveness.

Notwithstanding these challenges and critiques, governments should consider creating such bodies or empowering existing bodies with a statutory mandate as one aspect of a broader response to combatting technology-facilitated violence against women. Some proposed best practices to maximize their effectiveness are identified.

Open Access
Book part
Publication date: 4 June 2021

Eva PenzeyMoog and Danielle C. Slakoff

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this…

Abstract

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this chapter, we discuss three unique types of technological abuse: (1) financial abuse via banking websites and apps; (2) abuse via smart home devices (i.e., “Internet of Things” abuse); and (3) stalking via geo-location or GPS. We also argue pregnancy and wellness apps provide an opportunity for meaningful intervention for pregnant victims of domestic violence.

While there is no way to ensure users' safety in all situations, we argue thoughtful considerations while designing and building digital products can result in meaningful contributions to victims' safety. This chapter concludes with PenzeyMoog's (2020) “Framework for Inclusive Safety,” which is a roadmap for building technology that increases the safety of domestic violence survivors. This framework includes three key points: (1) the importance of educating technologists about domestic violence; (2) the importance of identifying possible abuse situations and designing against them; and (3) identifying user interactions that might signal abuse and offering safe interventions.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 10 of 45