Search results

1 – 10 of 218
Open Access
Article
Publication date: 5 September 2018

Caroline Marchant and Stephanie O’Donohoe

Young people’s attachment to their smartphones is well-documented, with smartphones often described as prostheses. While prior studies typically assume a clear human/machine…

3271

Abstract

Purpose

Young people’s attachment to their smartphones is well-documented, with smartphones often described as prostheses. While prior studies typically assume a clear human/machine divide, this paper aims to build on posthuman perspectives, exploring intercorporeality, the blurring of human/technology boundaries, between emerging adults and their smartphones. The paper aims to discuss these issues.

Design/methodology/approach

Drawing on assemblage theory, this interpretive study uses smartphone diaries and friendship pair/small group discussions with 27 British emerging adults.

Findings

Participants in this study are characterized as homo prostheticus, living with and through their phones, treating them as extensions of their mind and part of their selves as they navigated between their online and offline, private and social lives. Homo prostheticus was part of a broader assemblage or amalgamation of human and non-human components. As these components interacted with each other, the assemblage could be strengthened or weakened by various technological, personal and social factors.

Research limitations/implications

These qualitative findings are based on a particular sample at a particular point in time, within a particular culture. Further research could explore intercorporeality in human–smartphone relationships among other groups, in other cultures.

Originality/value

Although other studies have used prosthetic metaphors, this paper contributes to understanding of smartphones as a prostheses in the lives of emerging adults, highlighting intercorporeality as a key feature of homo prostheticus. It also uses assemblage theory to contextualize homo prostheticus and explores factors strengthening or weakening the broader human–smartphone assemblage.

Details

Information Technology & People, vol. 32 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access

Abstract

Details

Gerontechnology
Type: Book
ISBN: 978-1-78743-292-5

Open Access
Book part
Publication date: 4 June 2021

Laura Vitis

Technology-facilitated violence against women (TFVW) is readily becoming a key site of analysis for feminist criminologists. The scholarship in this area has identified online…

Abstract

Technology-facilitated violence against women (TFVW) is readily becoming a key site of analysis for feminist criminologists. The scholarship in this area has identified online sexual harassment, contact-based harassment, image-based abuse, and gender-based cyberhate – among others – as key manifestations of TFVW. It has also unpacked the legal strategies available to women seeking formal justice outcomes. However, much of the existing empirical scholarship has been produced within countries like the United States, United Kingdom, and Australia, and there has been limited research on this phenomenon within South East Asia. As such, this chapter maps how technology is shaping Singaporean women's experiences of gendered, sexual, and domestic violence. To do so, it draws upon findings from a research project which examined TFVW in Singapore by utilizing semistructured interviews with frontline workers in the fields of domestic and sexual violence and LGBT services. Drawing from Dragiewicz et al.’s (2018) work on technology-facilitated coercive control (TFCC), I argue that victims-survivors of dating, domestic, and family violence need to be provided with support that is TFCC informed and technically guided. I also suggest that further research is needed to fully understand the prevalence and nature of TFVW in the Singaporean context.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Olusesan Ayodeji Makinde, Emmanuel Olamijuwon, Nchelem Kokomma Ichegbo, Cheluchi Onyemelukwe and Michael Gboyega Ilesanmi

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly…

Abstract

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly attention has been given to the nature of technology-facilitated violence and abuse (TFVA) across sub-Saharan Africa (SSA) despite an explosion in the use of various technologies. We conducted a literature review to identify and harmonize available data relating to the types of TFVA taking place in SSA. This was followed by an online survey of young adults through the SHYad.NET forum to understand the nature of TFVA among young adults in SSA. Our literature review revealed various types of TFVA to be happening across SSA, including cyberbullying, cyberstalking, trolling, dating abuse, image-based sexual violence, sextortion, and revenge porn. The results of our online survey revealed that both young men and women experience TFVA, with the most commonly reported TFVA being receiving unwanted sexually explicit images, comments, emails, or text messages. Female respondents more often reported repeated and/or unwanted sexual requests online via email or text message while male respondents more often reported experiencing violent threats. Respondents used various means to cope with TFVA including blocking the abuser or deleting the abused profile on social media.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Kristen Thomasen and Suzie Dunn

Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse…

Abstract

Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse. Whether this be monitoring movements through stalkerware, using drones to nonconsensually film or harass, or manipulating and distributing intimate images online such as deepfakes and creepshots, invasions of privacy have become a significant form of gender-based violence. Accordingly, our normative and legal concepts of privacy must evolve to counter the harms arising from this misuse of new technology. Canada's Supreme Court recently addressed technology-facilitated violations of privacy in the context of voyeurism in R v Jarvis (2019) . The discussion of privacy in this decision appears to be a good first step toward a more equitable conceptualization of privacy protection. Building on existing privacy theories, this chapter examines what the reasoning in Jarvis might mean for “reasonable expectations of privacy” in other areas of law, and how this concept might be interpreted in response to gender-based technology-facilitated violence. The authors argue the courts in Canada and elsewhere must take the analysis in Jarvis further to fully realize a notion of privacy that protects the autonomy, dignity, and liberty of all.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 24 April 2020

Nagaraj Samala, Bharath Shashanka Katkam, Raja Shekhar Bellamkonda and Raul Villamarin Rodriguez

The purpose of the present article is to highlight the role of Artificial Intelligence (AI) and Robotics in the tourism industry. The various technologies being integrated to…

59340

Abstract

Purpose

The purpose of the present article is to highlight the role of Artificial Intelligence (AI) and Robotics in the tourism industry. The various technologies being integrated to improve the service and customer experience in tourism. The expected changes and challenges in tourism in the future are focused in this paper.

Design/methodology/approach

A systematic study on the emerging technologies of AI and Robotics applied in the tourism sector is presented in the form of a viewpoint.

Findings

AI certainly enhances tourism experiential services however cannot surpass the human touch which is an essential determinant of experiential tourism. AI acts as an effective complementary dimension to the future of tourism. With the emergence of artificial travel intelligence, it is simpler to make travel arrangements. AI offers travel services that are automated, customized and insightful. AI allows travelers to learn about their behaviors, interests to inclinations and provide a personalized experience. Gone are the days to consult a travel agent, meet him physically and indulge in an endless chain of troubling phone calls to inquire about travel arrangements.

Practical implications

Tourism marketing to see a positive and improved change that will enhance the tourists’ overall experience due to the application of AI and Robotics. New emerging technologies like chatbots, virtual reality, language translators, etc. can be effectively applied in Travel, Tourism & Hospitality industry.

Originality/value

The present viewpoint discusses the application and role of AI and Robotics with the help of relevant industry examples and theory. The present paper highlights the different technologies being used and will be used in the future.

Details

Journal of Tourism Futures, vol. 8 no. 1
Type: Research Article
ISSN: 2055-5911

Keywords

Open Access
Article
Publication date: 28 February 2022

Andrea Renda

This paper aims at discussing the options available to governments when it comes to the use of technology to contain the spread of the COVID-19 virus.

Abstract

Purpose

This paper aims at discussing the options available to governments when it comes to the use of technology to contain the spread of the COVID-19 virus.

Design/methodology/approach

This is an opinion piece, based on very recent developments (COVID-19), and based on a well-known trade-off between privacy and state surveillance, especially in times of crisis that threaten the survival of a nation.

Findings

The main finding is that technology alone will not help, and there are several reasons to doubt that the recently proposed European system to track the contagion in a privacy-preserving way (pan-European privacy preserving proximity tracing [PEPP-PT]) would be a fully effective solution.

Research limitations/implications

This is a short paper, which is very dependent on current developments. It was written in a very short time, so the level of depth in the references to the literature and the caselaw is limited. The main implication is that this paper is very far from the final word in the analysis of the interplay between technology and society, especially in democratic countries.

Practical implications

There is a need to ensure that the temporary measures that will be adopted during the pandemic do not extend to the post-COVID-19 period.

Originality/value

To the best of the author’s knowledge, this is a very fresh debate; the paper is thus original and proposes one of the first structured comments to the PEPP-PT and DP-3T conceptual designs.

Details

Digital Policy, Regulation and Governance, vol. 24 no. 2
Type: Research Article
ISSN: 2398-5038

Keywords

Open Access
Article
Publication date: 17 January 2022

Emmanuel Eze, Rob Gleasure and Ciara Heavin

The implementation of mobile health (mHealth) in developing countries seems to be stuck in a pattern of successive pilot studies that struggle for mainstream implementation. This…

1825

Abstract

Purpose

The implementation of mobile health (mHealth) in developing countries seems to be stuck in a pattern of successive pilot studies that struggle for mainstream implementation. This study addresses the research question: what existing health-related structures, properties and practices are presented by rural areas of developing countries that might inhibit the implementation of mHealth initiatives?

Design/methodology/approach

This study was conducted using a socio-material approach, based on an exploratory case study in West Africa. Interviews and participant observation were used to gather data. A thematic analysis identified important social and material agencies, practices and imbrications which may limit the effectiveness of mHealth apps in the region.

Findings

Findings show that, while urban healthcare is highly structured, best practice-led, rural healthcare relies on peer-based knowledge sharing, and community support. This has implications for the enacted materiality of mobile technologies. While urban actors see mHealth as a tool for automation and the enforcement of responsible healthcare best practice, rural actors see mHealth as a tool for greater interconnectivity and independent, decentralised care.

Research limitations/implications

This study has two significant limitations. First, the study focussed on a region where technology-enabled guideline-driven treatment is the main mHealth concern. Second, consistent with the exploratory nature of this study, the qualitative methodology and the single-case design, the study makes no claim to statistical generalisability.

Originality/value

To the authors' knowledge, this is the first study to adopt a socio-material view that considers existing structures and practices that may influence the widespread adoption and assimilation of a new mHealth app. This helps identify contextual challenges that are limiting the potential of mHealth to improve outcomes in rural areas of developing countries.

Details

Information Technology & People, vol. 35 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Abstract

Details

Gender and the Violence(s) of War and Armed Conflict: More Dangerous to Be a Woman?
Type: Book
ISBN: 978-1-78769-115-5

Open Access
Article
Publication date: 13 September 2022

Oliver Disney, Mattias Roupé, Mikael Johansson and Alessio Domenico Leto

Building information modeling (BIM) is mostly limited to the design phase where two parallel processes exist, i.e. creating 2D-drawings and BIM. Towards the end of the design…

4273

Abstract

Purpose

Building information modeling (BIM) is mostly limited to the design phase where two parallel processes exist, i.e. creating 2D-drawings and BIM. Towards the end of the design process, BIM becomes obsolete as focus shifts to producing static 2D-drawings, which leads to a lack of trust in BIM. In Scandinavia, a concept known as Total BIM has emerged, which is a novel “all-in” approach where BIM is the single source of information throughout the project. This paper's purpose is to investigate the overall concept and holistic approach of a Total BIM project to support implementation and strategy work connected to BIM.

Design/methodology/approach

Qualitative data were collected through eight semi-structured interviews with digitalization leaders from the case study project. Findings were analyzed using a holistic framework to BIM implementation.

Findings

The Total BIM concept was contingent on the strong interdependences between commonly found isolated BIM uses. Four main success factors were identified, production-oriented BIM as the main contractual and legally binding construction document, cloud-based model management, user-friendly on-site mobile BIM software and strong leadership.

Originality/value

A unique case is studied where BIM is used throughout all project phases as a single source of information and communication platform. No 2D paper drawings were used on-site and the Total BIM case study highlights the importance of a new digitalized construction process.

Details

Smart and Sustainable Built Environment, vol. 13 no. 3
Type: Research Article
ISSN: 2046-6099

Keywords

1 – 10 of 218