Search results

1 – 10 of 52
Article
Publication date: 27 September 2021

Kevin Walby and Courtney Joshua

This paper aims to examine the online communications, symbolism and imagery of 35 community crime prevention and crime watch groups across Canada to explore how these groups…

Abstract

Purpose

This paper aims to examine the online communications, symbolism and imagery of 35 community crime prevention and crime watch groups across Canada to explore how these groups organize themselves and assess the resulting community actions.

Design/methodology/approach

Contributing to digital criminology, gathering data from open access platforms such as Facebook and online platforms such as websites, the authors analyse communications from community crime prevention and crime watch groups in 12 Canadian cities. The authors used qualitative content analysis to explore the types of posts to assess trends and patterns in types of ideas communicated and symbolized.

Findings

Whilst such groups bring the community together to help promote community safety, the groups may also encourage stereotyping, shaming and even vigilantism through misrepresenting the amount of crime occurring in the community and focusing on fear. The authors demonstrate how crime prevention becomes sidelined amongst most of the groups, and how intense crime reporting and the focus on fear derail actual community development.

Research limitations/implications

The current study is limited to two years of posts from each group under examination. Interviews with members of online community crime prevention and crime watch groups would provide insights into the lived experience of regular users and their reasons for interacting with the group.

Practical implications

Given some of the vigilante-style the actions of such groups, the authors would suggest these groups pose a governance problem for local governments.

Originality/value

Community crime prevention and crime watch groups are not a new phenomenon, but their activities are moving online in ways that deserve criminological research. The authors contribute to the field of digital criminology by researching how online communications shape community crime prevention organizations and how ideas about regulation of crime and social control circulate online. The authors also explain how this community crime prevention trend may contribute to issues of vigilantism and increased transgression.

Details

Safer Communities, vol. 20 no. 4
Type: Research Article
ISSN: 1757-8043

Keywords

Book part
Publication date: 3 November 2014

Daniel Trottier

Social media platforms, along with networked devices and applications, enable their user base to produce, access and circulate large volumes of data. On the one hand, this…

Abstract

Purpose

Social media platforms, along with networked devices and applications, enable their user base to produce, access and circulate large volumes of data. On the one hand, this development contains an empowering potential for users, who can make otherwise obscured aspects of social life visible, and coordinate social action in accordance. Yet the preceding activities in turn render these users visible to governments as well as the multinational companies that operate these services. Between these two visions lie more nuanced accounts of individuals coordinating via social data for reactionary purposes, as well as policing and intelligence agencies struggling with the affordances of big data.

Design/methodology/approach

This chapter considers how individual users as well as police agencies respectively actualise the supposedly revolutionary and repressive potentials associated with big data. It briefly considers the broader social context in which ‘big data’ is situated, which includes the hardware, software, individuals and cultural values that render big data meaningful and useful. Then, in contrast to polarising visions of the social impact of big data, it considers two sets of practices that speak to a more ambivalent potentiality. First, recent examples suggest a kind of crowd-sourced vigilantism, where individuals rely on ubiquitous data and devices in order to reproduce law and order politics. Second, police agencies in various branches of European governments report a sense of obligation to turn to social data as a source of intelligence and evidence, yet attempts to do so are complicated by both practical and procedural challenges. A combination of case studies and in-depth interviews offers a grounded understanding of big data in practice, in contrast to commonly held visions of these technologies.

Findings

First, big data is only ever meaningful in use. While they may be contained in databases in remote locations, big data do not exist in a social vacuum. Their impact cannot be fully understood in the context of newly assembled configurations or ‘game-changing’ discourses. Instead, they are only knowable in the context of existing practices. These practices can initially be the sole remit of public discourse shaped by journalists, tech-evangelists and even academics. Yet embodied individual and institutional practices also emerge, and this may contradict or at least complicate discursive assertions. Secondly, the range of devices and practices that make up big data are engaged in a bilateral relation with these practices. They may be a platform to further reproduce relations of information exchange and power relations. Yet they may also reconfigure these relations.

Research limitations/implications

This research is limited to a sample of respondents based in the European Union, and based at a particular stage of big data and social media monitoring uptake. Subsequent research should look at how this uptake is occurring elsewhere, along with the medium to long-term implications of big data monitoring. Finally, subsequent research should consider how citizens and other social actors are coping with these emerging practices.

Originality/value

This chapter considers practices associated with big data monitoring and draws from cross-national empirical data. It stands in contrast to overly optimistic as well as well as totalising accounts of the social costs and consequences of big data. For these reasons, this chapter will be of value to scholars in internet studies, as well as privacy advocates and policymakers who are responsive to big data developments.

Details

Big Data? Qualitative Approaches to Digital Research
Type: Book
ISBN: 978-1-78441-050-6

Keywords

Open Access
Book part
Publication date: 4 June 2021

Anne Cheung

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual…

Abstract

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual concerned. Intuitively, it is tempting to condemn doxing as a crude form of cyber violence that weaponizes personal data. When it is used as a strategy of resistance by the powerless to hold the powerful accountable, however, a more nuanced understanding is called for. This chapter focuses on the doxing phenomenon in Hong Kong, where doxing incidents against police officers and their family members have skyrocketed since 2019 (a 75-fold increase over 2018). It contends that doxing for political purposes is closely related to digital vigilantism, signifying a loss of confidence in the ruling authority and a yearning for an alternative form of justice. The chapter therefore argues that public interest should be recognized as a legal defense in doxing cases when those discharging or entrusted with public duty are the targets. Equally, it is important to confine the categories of personal data disclosed to information necessary to reveal the alleged wrongdoer or wrongdoing. Only in this way can a fair balance be struck between privacy, freedom of expression, and public interest.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Expert briefing
Publication date: 18 March 2021

Relatively low internet penetration rates (an average of 40% across the continent) and stark differences in digital access within and across states mask social media’s increasing…

Article
Publication date: 6 June 2022

Kimberly V. Legocki, Kristen L. Walker and Meike Eilert

This paper aims to contribute to the emerging body of research on firestorms, specifically on the inflammatory user-generated content (UGC) created in response to brand…

Abstract

Purpose

This paper aims to contribute to the emerging body of research on firestorms, specifically on the inflammatory user-generated content (UGC) created in response to brand transgressions. By analyzing and segmenting UGC created and shared in the wake of three different events, the authors identify which type of inflammatory message is most likely to be widely shared; thus, contributing to a possible online firestorm.

Design/methodology/approach

Tweets were collected involving brand transgressions in the retail, fast food and technology space from varying timeframe and diverse media coverage. Then, the tweets were coded for message intention and analyzed with linguistics software to determine the message characteristics and framing. A two-step cluster analysis identified three types of UGC.

Findings

The authors found that message dimensions and the framing of tweets in the context of brand transgressions differed in characteristics, sentiment, call to action and the extent to which the messages were shared. The findings contradict traditional negative word-of-mouth studies involving idiosyncratic service and product failure. During online brand firestorms, rational activism messages with a call to action, generated in response to a firm’s transgression or “sparks,” have a higher likelihood of being shared (virality).

Originality/value

This research provides novel insights into UGC created after brand transgressions. Different types of messages created after these events vary in the extent that they “fan the flames” of the transgression. A message typology and flowchart are provided to assist managers in identifying and responding to three message types: ash, sparks and embers.

Content available
Article
Publication date: 14 September 2015

Rebecca Whiting and Katrina Pritchard

378

Abstract

Details

Qualitative Research in Organizations and Management: An International Journal, vol. 10 no. 3
Type: Research Article
ISSN: 1746-5648

Content available
Book part
Publication date: 10 September 2021

Ignas Kalpokas

Abstract

Details

Malleable, Digital, and Posthuman
Type: Book
ISBN: 978-1-80117-621-7

Open Access
Article
Publication date: 12 October 2023

Philip Wamprechtsamer

This paper aims to systematically unpack the ideal of organizational transparency by tracing the concept's origins in the era of Enlightenment. Based on a genealogical…

Abstract

Purpose

This paper aims to systematically unpack the ideal of organizational transparency by tracing the concept's origins in the era of Enlightenment. Based on a genealogical reconstruction, the article explores different transparency understandings in key areas of online public relations (PR) and discusses the opportunities and challenges they present for the field.

Design/methodology/approach

This is a conceptual paper that unfolds a genealogical reconstruction to uncover different transparency ideals of modernity. These perspectives are then transferred to the field of online PR to discuss their ethical and practical implications in the context of digitalization.

Findings

Claims for transparency manifest in three distinct ideals, namely normative, instrumental and expressive transparency, which are also pursued in online PR. These ideals are related to associated concepts, like dialogue, control and authenticity, which serve as transparency proxies. Moreover, each transparency ideal inherits an ambivalence that presents unique opportunities and challenges for PR practitioners.

Practical implications

Instead of an unquestioned belief in the ideal of organizational transparency, the paper urges communication practitioners to critically reflect on the ambivalent nature of different transparency regimes in the context of digitalization and provides initial recommendations on how to manage digital transparency in online PR responsibly.

Originality/value

The paper contributes to the vivid debate surrounding organizational transparency in the context of digitalization by offering a novel and systematic analysis of the multifaced concept of transparency while opening new research avenues for further conceptual and empirical research.

Details

Journal of Communication Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1363-254X

Keywords

Book part
Publication date: 23 April 2021

Sarah Lageson and Kateryna Kaplun

Purpose – In a digital environment, a simple accusation has the potential to permanently attach to a person’s identity. Our purpose here is to identify several types of…

Abstract

Purpose – In a digital environment, a simple accusation has the potential to permanently attach to a person’s identity. Our purpose here is to identify several types of accusations that persist in the internet environment: person to person accusations, media documented accusations, and accusations by the state. Approach – Using a typology of cases and legal analyses, the authors trace how accusations proliferate and persist across the internet and offer a set of social and legal explanations for the salience of public accusation online. Findings – The authors ultimately find that in contemporary society, the act of accusing increasingly replaces the desire or need for a fair and just outcome. The authors close by discussing implications for the accused and potential avenues for remedy. Originality – Our contribution bridges sociological and legal perspectives on the intersection of free speech, defamation, and digital media.

Details

Media and Law: Between Free Speech and Censorship
Type: Book
ISBN: 978-1-80071-729-9

Keywords

Open Access
Book part
Publication date: 4 June 2021

Alison J. Marganski and Lisa A. Melander

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology…

Abstract

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology demands that we pay attention to not only harms associated with interconnectivity, but also the potential for technology to counter offenses and “do good.” This chapter discusses technology as both a weapon and a shield when it comes to violence against women and girls in public spaces and private places. First, we review the complex and varied manifestations of technological gender violence, ranging from the use of technology to exploit, harass, stalk, and otherwise harm women and girls in communal spaces, to offenses that occur behind closed doors. Second, we discuss justice-related responses, underscoring how women and girls have “flipped the script” when their needs are not met. By developing innovative ways to respond to the wrongs committed against them and creating alternate systems that offer a voice, victims/survivors have repurposed technology to redress harms and unite in solidarity with others in an ongoing quest for justice.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 10 of 52