Search results
1 – 10 of 22Mobile dating apps are widely used in the queer community. Whether for sexual exploration or dating, mobile and geosocial dating apps facilitate connection. But they also bring…
Abstract
Mobile dating apps are widely used in the queer community. Whether for sexual exploration or dating, mobile and geosocial dating apps facilitate connection. But they also bring attendant privacy risks. This chapter is based on original research about the ways gay and bisexual men navigate their privacy on geosocial dating apps geared toward the LGBTQI community. It argues that, contrary to the conventional wisdom that people who share semi-nude or nude photos do not care about their privacy, gay and bisexual users of geosocial dating apps care very much about their privacy and engage in complex, overlapping privacy navigation techniques when sharing photos. They share semi-nude and nude photos for a variety of reasons, but generally do so only after building organic trust with another person. Because trust can easily break down without supportive institutions, this chapter argues that law and design must help individuals protect their privacy on geosocial dating apps.
Details
Keywords
Lee E. Bird, Tawny Taylor and Kevin M. Kraft
With the rise of social networking and the immediacy of electronic communication, the potential for harassment, threats, cyberbullying, perceived defamation, and general…
Abstract
With the rise of social networking and the immediacy of electronic communication, the potential for harassment, threats, cyberbullying, perceived defamation, and general incivility is greater than ever before. First Amendment issues create legal, philosophical and practical problems for administrators. In this chapter, the authors examine the intersection of First Amendment protections and student Internet conduct and provide practical information that student conduct administrators can readily apply in their daily work. Included are First Amendment definitions and concepts, an overview of policy considerations to protect the rights of both the individuals involved and the institution, a discussion of the distinctions between public and private institutions, investigation strategies, and a case study to walk readers through an examination of the issues and decision-making best practices for student conduct administrators.
The information superhighway has also been a vehicle for bullies to harass targets in K-12, college, corporate sectors, and higher education (Long, 2008; Tu, 2002). While…
Abstract
The information superhighway has also been a vehicle for bullies to harass targets in K-12, college, corporate sectors, and higher education (Long, 2008; Tu, 2002). While technology is useful, the public shaming component makes cyberbullying an indelible emotional assault that remains on the Internet years after the initial aggression. By reflecting on theoretical elements of public shaming discussed by Gilbert and Proctor (2006), and Dzurec et al. (2014), this conceptual essay will use descriptive statistics in a secondary analysis to document occurrences of cyberbullying in community colleges and reveal that people of color (56%) are more likely to be the target of cyberbullying than their white counterparts (41%). The contents of this chapter might be of interest to diversity officers and personnel considering acceptable use policies for technology on their respective campuses.
Details
Keywords
This paper aims to disseminate results from research into three forms of online abuse: text messages, picture messages and online stalking.
Abstract
Purpose
This paper aims to disseminate results from research into three forms of online abuse: text messages, picture messages and online stalking.
Design/methodology/approach
Using a mixed methods design, qualitative and quantitative datasets were derived from an online anonymous questionnaire to identify themes associated with incidents of online abuse.
Findings
Women of all ages have experienced online abuse from men and other women. Men have also been targets of online abuse from other men and women.
Research limitations/implications
Researchers should strive to include mature-aged cohorts.
Practical implications
Researchers should not limit themselves to education settings for their sampling. Online abuse may meet the legal definition of “psychic assault”. The recent legislation against online abuse needs to extend beyond protecting young people and children. Social media owners must take more responsibility for the content on their platforms.
Social implications
The results from this research strongly suggest that gender alone is no longer pivotal to ones’ vulnerability to online abusers.
Originality/value
This research uses a more age-inclusive sample to include the experiences of people aged 25–75, who have largely been excluded from previous studies that have concentrated on the 18–25 age group.
Details
Keywords
Raida Abu Bakar, Rosmawani Che Hashim, Sharmila Jayasingam, Safiah Omar and Norizah Mohd Mustamil
Joanne C. Jones and Sandra Scott
In this chapter, we explore an actual incident of cyberbullying that occurred at a large Canadian university. In our analysis, we frame cyberbullying as part of the more general…
Abstract
In this chapter, we explore an actual incident of cyberbullying that occurred at a large Canadian university. In our analysis, we frame cyberbullying as part of the more general phenomena of classroom incivility. We focus on the sociocultural context and demonstrate how the structures and processes within the classroom environment can enable incivility as well as cyberbullying.
Jane Bailey, Nicola Henry and Asher Flynn
While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as…
Abstract
While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as technology-facilitated violence and abuse (TFVA). TFVA includes a spectrum of behaviors perpetrated online, offline, and through a range of technologies, including artificial intelligence, livestreaming, GPS tracking, and social media. This chapter provides an overview of TFVA, including a brief snapshot of existing quantitative and qualitative research relating to various forms of TFVA. It then discusses the aims and contributions of this book as a whole, before outlining five overarching themes arising from the contributions. The chapter concludes by mapping out the structure of the book.
Details
Keywords
Jaquelyn Osborne, Emma Kavanagh and Chelsea Litchfield
Social media provides a space for female athletes to create their own media (and advertising) in order to share their lives through stories presented online – a phenomenon, that…
Abstract
Social media provides a space for female athletes to create their own media (and advertising) in order to share their lives through stories presented online – a phenomenon, that to date has been ignored in traditional media spaces. Research suggests that athletes more broadly can take a more active role in their public presentation across a wide variety of platforms (Lebel & Danylchuk, 2012) and share more aspects of their identity than typically portrayed in mainstream media coverage (Sanderson, 2013, 2014). More specifically, virtual worlds have created platforms through which female athletes can share content and present themselves to fans or followers of sport in their own way and with relative freedom (Litchfield & Kavanagh, 2018). While it is acknowledged that social media can empower the female user, simultaneously, these spaces have proven to be hostile and can serve to oppress or marginalise individuals and groups (Kavanagh et al., 2016; Litchfield et al., 2018). An intersectional, third-wave feminist lens will be adopted in this chapter in order to examine such a dichotomy (Bruce, 2016). This approach will analyse the disjunction between the rise of the female ‘@thlete’ and their adoption of contemporary digital sporting spaces and the presence of a darker narrative permeating digital environments through highlighting the presence of online vitriol and intersectional abuse (racist, sexist, homophobic, etc.) that athletes may face while navigating lives online.