Search results

1 – 10 of 24
Article
Publication date: 1 October 2021

Florina Guadalupe Arredondo-Trapero, José Carlos Vázquez-Parra and Martín De Jesús González-Martínez

The aim of this study is to analyse teachers’ perceptions of information and communication technologies (ICT) and the effect they have on their students, comparing male and female…

Abstract

Purpose

The aim of this study is to analyse teachers’ perceptions of information and communication technologies (ICT) and the effect they have on their students, comparing male and female teachers in rural and urban areas of Mexico.

Design/methodology/approach

This is a quantitative study with a validated questionnaire that records the perception of school teachers from a state in the northeast of Mexico. The questionnaire was designed by interviewing 20 teachers who have had problematic situations in the use of technology by students. The main problems that were perceived in their students were cyberbullying, cyberviolence, online pornography, excessive use of videogames and also lack of ability to use digital technology. Hypothesis testing was applied to identify differences between gender (female or male) and region (rural or urban), considering these problems and the efforts made by the school to address these issues.

Findings

Both the gender of the teaching staff and the region where the school is located are variables that are influencing the willingness to incorporate ICT issues that are affecting the well-being of students into the educational agenda. While teachers are the main actors in preparing their students on how to face these challenges, students in schools with mostly male teachers, or located in rural areas, will be in a situation of greater vulnerability to be victims of the problems that arise as part of ICT risks in a digital society

Research limitations/implications

This article only offers a first approach to ICT and teachers’ perceptions. It is necessary to broaden the scope of this type of research to include different educational contexts and to ask questions that reveal in greater detail how schools are dealing with ICT and its possible risks and the factors that have influenced the successes or failures they are having in these attempts.

Practical implications

This finding can help schools to promote programs focused to apply ICT for student flourishment and help them to deal with the risk that digital technology is generating in young students.

Originality/value

Although multiple research have been conducted to address teachers’ perception about diverse topics, there has been no specific research on the self-perception of teachers in dealing with technology and preparing students for the problems presented by ICT and its risks. This research contributes to the literature on the impact that teachers’ perceptions can have on the adoption of technology in education, and how this can be different by gender and region.

Details

On the Horizon , vol. 29 no. 3
Type: Research Article
ISSN: 1074-8121

Keywords

Expert briefing
Publication date: 5 January 2022

However, women as well as gender minorities in these countries have experienced an uptick in cyberviolence in recent years. Most existing laws lack clear definition on what…

Details

DOI: 10.1108/OXAN-DB266467

ISSN: 2633-304X

Keywords

Geographic
Topical
Graphic analysis
Publication date: 18 November 2021

Although international law recognises online gender-based abuse and violence, national-level reform is slow

Details

DOI: 10.1108/OXAN-GA265546

ISSN: 2633-304X

Keywords

Geographic
Topical
Open Access
Book part
Publication date: 4 June 2021

Suzie Dunn

When discussing the term “technology-facilitated violence” (TFV) it is often asked: “Is it actually violence?” While international human rights standards, such as the United…

Abstract

When discussing the term “technology-facilitated violence” (TFV) it is often asked: “Is it actually violence?” While international human rights standards, such as the United Nations' Convention on the Elimination of All Forms of Discrimination against Women (United Nations General Assembly, 1979), have long recognized emotional and psychological abuse as forms of violence, including many forms of technology-facilitated abuse (United Nations, 2018), law makers and the general public continue to grapple with the question of whether certain harmful technology-facilitated behaviors are actually forms of violence. This chapter explores this question in two parts. First, it reviews three theoretical concepts of violence and examines how these concepts apply to technology-facilitated behaviors. In doing so, this chapter aims to demonstrate how some harmful technology-facilitated behaviors fit under the greater conceptual umbrella of violence. Second, it examines two recent cases, one from the British Columbia Court of Appeal (BCCA) in Canada and a Romanian case from the European Court of Human Rights (ECtHR), that received attention for their legal determinations on whether to define harmful technology-facilitated behaviors as forms of violence or not. This chapter concludes with observations on why we should conceptualize certain technology-facilitated behaviors as forms of violence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Book part
Publication date: 18 November 2020

Bridget Harris, Molly Dragiewicz and Delanie Woodlock

Goal 5 of the United Nations (UN) Sustainable Development Goals (SDGs) prioritises gender equality and empowerment of all women and girls. Key to achieving this is addressing…

Abstract

Goal 5 of the United Nations (UN) Sustainable Development Goals (SDGs) prioritises gender equality and empowerment of all women and girls. Key to achieving this is addressing violence against women (VAW; see SDG target 5.2) and, we believe, understanding the role of technology in both enacting and combating VAW. In this chapter, we outline how technology-facilitated VAW threatens women's use of technology and discuss policies and practices of support workers and practitioners that aid safe use of digital media. We consider features of technology-facilitated VAW advocacy which differ from traditional VAW advocacy, using examples from the Global North and South. Information communication technologies (ICTs) are used by VAW advocates in a range of ways; to provide information and education about domestic violence, safe use of technology and negotiating the legal and criminal justice systems; collect evidence about abuse; provide support; and pursue social change. As the capabilities and prevalence of ICT and devices increase and access costs decrease, these channels offer new and innovative opportunities capitalising on the spacelessness, cost-effectiveness and timelessness of media. Nonetheless, technological initiatives are not perfect or failsafe. Throughout the pages that follow, we acknowledge the limitations and challenges of technology-facilitated advocacy, which could hinder application of the SDG.

Details

The Emerald Handbook of Crime, Justice and Sustainable Development
Type: Book
ISBN: 978-1-78769-355-5

Keywords

Open Access
Book part
Publication date: 4 June 2021

Jane Bailey and Sara Shayan

This article considers how digital technologies are informed by, and implicated in, the systematic and interlocking oppressions of colonialism, misogyny, and racism, all of which…

Abstract

This article considers how digital technologies are informed by, and implicated in, the systematic and interlocking oppressions of colonialism, misogyny, and racism, all of which have been identified as root causes of the missing and murdered Indigenous women crisis in Canada. The authors consider how technology can facilitate multiple forms of violence against women including stalking and intimate partner violence, human trafficking, pornography and child abuse images, and online hate and harassment and note instances where Indigenous women and girls may be particularly vulnerable. The authors also explore some of the complexities related to police use of technology for investigatory purposes, touching on police use of social media and DNA technology. Without simplistically blaming technology, the authors argue that technology interacts with multiple factors in the complex historical, socio-cultural environment that incubates the national crisis of missing and murdered Indigenous women and girls. The article concludes with related questions that may be considered at the impending national inquiry.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Article
Publication date: 16 February 2010

Fotis Lazarinis

The purpose of this paper is to provide an overall insight into the factors which undermine safe internet access for students. Safer internet access for students is an issue…

4302

Abstract

Purpose

The purpose of this paper is to provide an overall insight into the factors which undermine safe internet access for students. Safer internet access for students is an issue raised during recent years as the web becomes increasingly more accessible to children. However, recent research studies and initiatives demonstrated a number of potential online risks for students. To be able to protect children from potentially hazardous content it is first necessary to have a good understanding of the existing online threats.

Design/methodology/approach

Initially, prior works on online safety problems for children are reviewed and a list of online risks is assembled based on the previous studies and on information gathered from web sites dedicated to safer internet access. Then, based on this listing, an access log of unsupervised internet access of high school students is analyzed to understand which of these risks can be identified.

Findings

The review of previous works on the topic of safer internet access produces a list of diverse problems for unsupervised internet access for children. The results of the log files evaluation show that several of the identified online risks existed in the students' visited sites and that the students are able to bypass the applied restrictions to visit their preferred sites.

Originality/value

The list of online risks can be used by researchers, teachers, parents, educational technologists, web designers, school administrators and libraries to obtain a clearer view of the internet safety issues. Further, this list could be used for directing future research projects on the social consequences of internet usage for children.

Details

The Electronic Library, vol. 28 no. 1
Type: Research Article
ISSN: 0264-0473

Keywords

Book part
Publication date: 9 September 2020

James Hawdon and Matthew Costello

Purpose – This chapter investigates if Ronald Aker’s Social Structure Social Learning (SSSL) theory can help explain who is involved with the production of online materials…

Abstract

Purpose – This chapter investigates if Ronald Aker’s Social Structure Social Learning (SSSL) theory can help explain who is involved with the production of online materials considered hateful or extremist.

Methodology/Approach – After discussing how SSSL can account for becoming exposed to online extremism and then becoming involved in its production, the authors conduct a logistic regression on data from 1,008 American adults that predicts if they produced online hate materials with variables derived from SSSL.

Findings – Results strongly support SSSL. While structural factors such as the respondents’ differential social organization, differential social location, and differential location in the social structure predict production of online hate materials, the effect of these factors is largely mediated once social learning variables are included in the model. Specifically, the respondents’ general definitions related to violence, specific definitions related to hate speech, and differential association accounts for variation in the production of online hate materials.

Originality/Value – This research contributes to the literature in two primary ways: (1) the authors investigate a critical, yet understudied, factor involved in the radicalization process; and (2) the authors demonstrate that a leading criminological theory applies to this form of deviance. This research also suggests key variables for creating strategies for countering violent extremism.

Book part
Publication date: 20 September 2021

Jaquelyn Osborne, Emma Kavanagh and Chelsea Litchfield

Social media provides a space for female athletes to create their own media (and advertising) in order to share their lives through stories presented online – a phenomenon, that…

Abstract

Social media provides a space for female athletes to create their own media (and advertising) in order to share their lives through stories presented online – a phenomenon, that to date has been ignored in traditional media spaces. Research suggests that athletes more broadly can take a more active role in their public presentation across a wide variety of platforms (Lebel & Danylchuk, 2012) and share more aspects of their identity than typically portrayed in mainstream media coverage (Sanderson, 2013, 2014). More specifically, virtual worlds have created platforms through which female athletes can share content and present themselves to fans or followers of sport in their own way and with relative freedom (Litchfield & Kavanagh, 2018). While it is acknowledged that social media can empower the female user, simultaneously, these spaces have proven to be hostile and can serve to oppress or marginalise individuals and groups (Kavanagh et al., 2016; Litchfield et al., 2018). An intersectional, third-wave feminist lens will be adopted in this chapter in order to examine such a dichotomy (Bruce, 2016). This approach will analyse the disjunction between the rise of the female ‘@thlete’ and their adoption of contemporary digital sporting spaces and the presence of a darker narrative permeating digital environments through highlighting the presence of online vitriol and intersectional abuse (racist, sexist, homophobic, etc.) that athletes may face while navigating lives online.

Details

The Professionalisation of Women’s Sport
Type: Book
ISBN: 978-1-80043-196-6

Keywords

Open Access
Book part
Publication date: 4 June 2021

Sukaina Al-Nasrawi

Violence against women and girls is globally prevalent. Overcoming it is a prerequisite for attaining gender equality and achieving sustainable development. The United Nation's…

Abstract

Violence against women and girls is globally prevalent. Overcoming it is a prerequisite for attaining gender equality and achieving sustainable development. The United Nation's 2030 Agenda for Sustainable Development considers technology as a means to combat violence against women and girls, and there is ample evidence on the positive impact of technology in combating violence. At the same time, however, technology can promote and perpetrate new forms of violence. Research shows that more than 70% of women and girls online are exposed to forms of cyber violence. Most of these cases remain unreported.

This chapter argues that technology contributes to increasing cyber violence against women and girls which in turn leads to severe social and economic implications affecting them. It also argues that legislative and policy reforms can limit this type of violence while enabling women and girls to leverage technology for empowerment. It highlights cases of cyber violence in the Arab region and provides an overview of applicable legislative frameworks. The chapter concludes with recommended policy reforms and measures to strengthen and harmonize efforts to combat cyber violence against women and girls in the Arab region.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 10 of 24