Search results
1 – 10 of 166Bronwyn Carlson and Ryan Frazer
Broadly understood as repeated, intentional, and aggressive behaviors facilitated by digital technologies, cyberbullying has been identified as a significant public health concern…
Abstract
Broadly understood as repeated, intentional, and aggressive behaviors facilitated by digital technologies, cyberbullying has been identified as a significant public health concern in Australia. However, there have been critical debates about the theoretical and methodological assumptions of cyberbullying research. On the whole, this research has demonstrated an aversion to accounting for context, difference, and complexity. This insensitivity to difference is evident in the absence of nuanced accounts of Indigenous people's experiences of cyberbullying. In this chapter, we extend recent critiques of dominant approaches to cyberbullying research and argue for novel theoretical and methodological engagements with Indigenous people's experiences of cyberbullying. We review a range of literature that unpacks the many ways that social, cultural, and political life is different for Indigenous peoples. More specifically, we demonstrate there are good reasons to assume that online conflict is different for Indigenous peoples, due to diverse cultural practices and the broader political context of settler-colonialism. We argue that the standardization of scholarly approaches to cyberbullying is delimiting its ability to attend to social difference in online conflict, and we join calls for more theoretically rigorous, targeted, difference-sensitive studies into bullying.
Details
Keywords
The purpose of this paper is to explore what characterizes cyberbullying when it is performed in digital space and in an increasingly boundary blurred working life context.
Abstract
Purpose
The purpose of this paper is to explore what characterizes cyberbullying when it is performed in digital space and in an increasingly boundary blurred working life context.
Design/methodology/approach
Cyberbullying is explored through the lens of Erving Goffman’s theories on everyday life interaction and social media scholars understanding of social life on the internet today. The empirical material for the study is grounded in eight in-depth interviews with individuals who have been subjected to cyberbullying behavior in their professional life. The interview data were analyzed by means of thematic analysis.
Findings
Three key themes were identified: spatial interconnectedness, colliding identities and the role of the audience. The empirical data indicate that in order to understand cyberbullying in working life, it is necessary to consider the specific context that emerges with social network sites and blogs. Moreover, this study shows how social network sites tend to blur boundaries between the private and the professional for the targeted individual.
Originality/value
Cyberbullying in working life is a relatively under-researched area. Most existing research on cyberbullying follows the tradition of face-to-face bullying by addressing the phenomenon with quantitative methods. Given the limited potential of this approach to uncover new and unique features, this study makes an important contribution by exploring cyberbullying with a qualitative approach that provides in-depth understanding of the new situations that emerge when bullying is performed online.
Details
Keywords
Tuija Muhonen, Sandra Jönsson and Martin Bäckström
The purpose of this paper is to explore health- and work-related outcomes of cyberbullying behaviour and the potential mediating role of social organisational climate, social…
Abstract
Purpose
The purpose of this paper is to explore health- and work-related outcomes of cyberbullying behaviour and the potential mediating role of social organisational climate, social support from colleagues and social support from superiors.
Design/methodology/approach
Altogether 3,371 respondents participated in a questionnaire study.
Findings
The results of this study indicate that social organisational climate can have a mediating role in the relationship between cyberbullying behaviour and health, well-being, work engagement and intention to quit. Contrary to earlier face-to-face bullying research, the current study showed that cyberbullying behaviour had stronger indirect than direct relationships to health, well-being, work engagement and intention to quit.
Practical implications
Communication through digital devices in work life is becoming more prevalent, which in turn increases the risk for cyberbullying behaviour. Organisations need therefore to develop occupational health and safety policies concerning the use of digital communication and social media in order to prevent cyberbullying behaviour and its negative consequences.
Originality/value
Cyberbullying behaviour among working adults is a relatively unexplored phenomenon and therefore this study makes valuable contribution to the research field.
Details
Keywords
Naruemon Auemaneekul, Arpaporn Powwattana, Emwadee Kiatsiri and Nanthana Thananowan
The purpose of this paper is to examine the etiological model of cyberbullying behaviors among Thai adolescents, testing the hypothesis that the constructs of theory of planned…
Abstract
Purpose
The purpose of this paper is to examine the etiological model of cyberbullying behaviors among Thai adolescents, testing the hypothesis that the constructs of theory of planned behavior (TPB), including self-esteem, will influence and have impact on cyberbullying intention and behaviors.
Design/methodology/approach
Structural equation modeling (SEM) was used to analyze the data. Self-administered questionnaires were used among multi-stage stratified random samples from secondary schools in the Bangkok. The sample size consisting of 354 subjects included those who were victims (44.7 percent), perpetrators (33.1 percent) and witness (67.8 percent).
Findings
The SEM showed subjective norm (SN) to be the most direct influential factor of cyberbullying intention and behaviors, followed by attitude toward cyberbullying (Intention β=0.31, 0.24; p=0.01, Behavior β=0.09, 0.07; p=0.012 and 0.05, respectively). However, the SEM revealed that all variables from TPB including self-esteem in the equation can explain the variation scores of intention and cyberbullying behaviors at 54 and 67 percent levels (adjusted R2=0.54 and 0.67), respectively. The SEM showed that model modification indices indicate a good fit to the data (χ2=0.00, df=0, p>0.05, CMIN/df=0, GFI=1, AGFI=1, CFI=1 and RMSEA=0).
Research limitations/implications
The experiences or witness of family violence and support at school level, which is supposed to mitigate the bullying problems, were neglected from this study.
Practical implications
The preventive measures for cyberbullying behaviors among adolescents should involve activities fostering self-esteem, developing proper attitude and SN to prevent cyberbullying. The initiatives and developed school supportive system for adolescents to understand how to control themselves when engaging in social network are imperative. However, for future research, family violence witness and attempt to lure the cyberbullying victims into offline meeting should be explored more.
Social implications
TPB and the use of social media should be taken into account for planning and designing appropriate intervention to reduce and eliminate cyberbullying among all stakeholders in both public and private sectors in the area of health and educational institutes in order to endeavor and to advocate the anti-cyberbullying policy in Thailand.
Originality/value
TPB and self-esteem explained a substantial portion of and more modest but significant amount of variance in cyberbullying intention and behaviors. However, SN and attitude toward cyberbullying which was found to be most influential factors could be the useful information for designing intervention toward cyberbullying prevention for Thai adolescents and advocate implementing the anti-cyberbullying policy in Thailand.
Details
Keywords
Raida Abu Bakar, Rosmawani Che Hashim, Sharmila Jayasingam, Safiah Omar and Norizah Mohd Mustamil
Robert D. Lytle, Tabrina M. Bratton and Heather K. Hudson
Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly…
Abstract
Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly referred to as bystander intervention models (BIMs). More recently, BIMs have been modified to facilitate initiatives to prevent various forms of online victimization. This chapter begins with a review of BIMs and recent applications of bystander intervention research to online environments. We also present several future directions for research along with applications for reducing technology-facilitated violence, including programming recommendations and theoretical development.
Details
Keywords
As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory…
Abstract
As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory mandates as part of an effort to combat it. This chapter argues that these bodies have the potential to meaningfully further a survivor-centered approach to combatting technology-facilitated violence against women – one that places their experiences, rights, wishes, and needs at its core. It further argues that governments should consider integrating them into a broader holistic response to this conduct.
An overview is provided of the operations of New Zealand's Netsafe, the eSafety Commissioner in Australia, Nova Scotia's Cyberscan Unit, and the Canadian Centre for Child Protection in Manitoba. These types of centralized bodies have demonstrated an ability to advance survivor-centered approaches to technology-facilitated violence against women through direct involvement in resolving instances of violence, education, and research. However, these bodies are not a panacea. This chapter outlines critiques of their operations and the challenges they face in maximizing their effectiveness.
Notwithstanding these challenges and critiques, governments should consider creating such bodies or empowering existing bodies with a statutory mandate as one aspect of a broader response to combatting technology-facilitated violence against women. Some proposed best practices to maximize their effectiveness are identified.
Details
Keywords
Jane Bailey, Nicola Henry and Asher Flynn
While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as…
Abstract
While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as technology-facilitated violence and abuse (TFVA). TFVA includes a spectrum of behaviors perpetrated online, offline, and through a range of technologies, including artificial intelligence, livestreaming, GPS tracking, and social media. This chapter provides an overview of TFVA, including a brief snapshot of existing quantitative and qualitative research relating to various forms of TFVA. It then discusses the aims and contributions of this book as a whole, before outlining five overarching themes arising from the contributions. The chapter concludes by mapping out the structure of the book.
Details
Keywords
Olusesan Ayodeji Makinde, Emmanuel Olamijuwon, Nchelem Kokomma Ichegbo, Cheluchi Onyemelukwe and Michael Gboyega Ilesanmi
Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly…
Abstract
Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly attention has been given to the nature of technology-facilitated violence and abuse (TFVA) across sub-Saharan Africa (SSA) despite an explosion in the use of various technologies. We conducted a literature review to identify and harmonize available data relating to the types of TFVA taking place in SSA. This was followed by an online survey of young adults through the SHYad.NET forum to understand the nature of TFVA among young adults in SSA. Our literature review revealed various types of TFVA to be happening across SSA, including cyberbullying, cyberstalking, trolling, dating abuse, image-based sexual violence, sextortion, and revenge porn. The results of our online survey revealed that both young men and women experience TFVA, with the most commonly reported TFVA being receiving unwanted sexually explicit images, comments, emails, or text messages. Female respondents more often reported repeated and/or unwanted sexual requests online via email or text message while male respondents more often reported experiencing violent threats. Respondents used various means to cope with TFVA including blocking the abuser or deleting the abused profile on social media.
Details
Keywords
Edgar Pacheco and Neil Melhuish
The nature and extent of adults' engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization…
Abstract
The nature and extent of adults' engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization. When explored, engagement in online aggression and abuse has centered on children and young people, particularly in school and higher education settings. Drawing on nationally representative data from New Zealand adults aged 18 and over, this chapter explores the overall prevalence of online aggression with a focus on gender and age. Our findings support the need to also understand adult aggressors' behaviors to better address the distress and harm caused to targets through digital communications. The chapter discusses the implications of the results for policy and practice and proposes some directions for future research.
Details