Search results

1 – 6 of 6
Open Access
Book part
Publication date: 4 June 2021

Anne Cheung

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual…

Abstract

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual concerned. Intuitively, it is tempting to condemn doxing as a crude form of cyber violence that weaponizes personal data. When it is used as a strategy of resistance by the powerless to hold the powerful accountable, however, a more nuanced understanding is called for. This chapter focuses on the doxing phenomenon in Hong Kong, where doxing incidents against police officers and their family members have skyrocketed since 2019 (a 75-fold increase over 2018). It contends that doxing for political purposes is closely related to digital vigilantism, signifying a loss of confidence in the ruling authority and a yearning for an alternative form of justice. The chapter therefore argues that public interest should be recognized as a legal defense in doxing cases when those discharging or entrusted with public duty are the targets. Equally, it is important to confine the categories of personal data disclosed to information necessary to reveal the alleged wrongdoer or wrongdoing. Only in this way can a fair balance be struck between privacy, freedom of expression, and public interest.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 12 October 2023

Philip Wamprechtsamer

This paper aims to systematically unpack the ideal of organizational transparency by tracing the concept's origins in the era of Enlightenment. Based on a genealogical…

Abstract

Purpose

This paper aims to systematically unpack the ideal of organizational transparency by tracing the concept's origins in the era of Enlightenment. Based on a genealogical reconstruction, the article explores different transparency understandings in key areas of online public relations (PR) and discusses the opportunities and challenges they present for the field.

Design/methodology/approach

This is a conceptual paper that unfolds a genealogical reconstruction to uncover different transparency ideals of modernity. These perspectives are then transferred to the field of online PR to discuss their ethical and practical implications in the context of digitalization.

Findings

Claims for transparency manifest in three distinct ideals, namely normative, instrumental and expressive transparency, which are also pursued in online PR. These ideals are related to associated concepts, like dialogue, control and authenticity, which serve as transparency proxies. Moreover, each transparency ideal inherits an ambivalence that presents unique opportunities and challenges for PR practitioners.

Practical implications

Instead of an unquestioned belief in the ideal of organizational transparency, the paper urges communication practitioners to critically reflect on the ambivalent nature of different transparency regimes in the context of digitalization and provides initial recommendations on how to manage digital transparency in online PR responsibly.

Originality/value

The paper contributes to the vivid debate surrounding organizational transparency in the context of digitalization by offering a novel and systematic analysis of the multifaced concept of transparency while opening new research avenues for further conceptual and empirical research.

Details

Journal of Communication Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1363-254X

Keywords

Open Access
Book part
Publication date: 4 June 2021

Alison J. Marganski and Lisa A. Melander

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology…

Abstract

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology demands that we pay attention to not only harms associated with interconnectivity, but also the potential for technology to counter offenses and “do good.” This chapter discusses technology as both a weapon and a shield when it comes to violence against women and girls in public spaces and private places. First, we review the complex and varied manifestations of technological gender violence, ranging from the use of technology to exploit, harass, stalk, and otherwise harm women and girls in communal spaces, to offenses that occur behind closed doors. Second, we discuss justice-related responses, underscoring how women and girls have “flipped the script” when their needs are not met. By developing innovative ways to respond to the wrongs committed against them and creating alternate systems that offer a voice, victims/survivors have repurposed technology to redress harms and unite in solidarity with others in an ongoing quest for justice.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 3 February 2020

Hartoyo Hartoyo, Haryanto Sindung, Fahmi Teuku and Sunarto Sunarto

The purpose of this paper is to analyse the effects of socio-demographic factors on ethnic tolerance (ET) and religious tolerance (RT) as well as the participation of the local…

7634

Abstract

Purpose

The purpose of this paper is to analyse the effects of socio-demographic factors on ethnic tolerance (ET) and religious tolerance (RT) as well as the participation of the local community in peacebuilding in post-ethnic violent conflicts in a multi-cultural society.

Design/methodology/approach

This research was conducted in the rural areas of Indonesia, on the basis of an empirical study that was performed in Lampung, a province at the southern tip of Sumatra. Data were collected through a survey of 500 respondents from five districts susceptible to ethnic conflicts. From each district, two villages that experienced ethnic conflicts were chosen and from each village, 50 respondents were randomly selected. To strengthen the explanation of quantitative data, in-depth interviews were also conducted with another 50 residents, five informants from each of ten villages. Informants comprised community leaders or traditional leaders, local police officers, local military officers and district government officials.

Findings

First, the degree of tolerance is not specifically concentrated in the socio-demographic characteristics. Second, ET affects RT. Third, local community participation in peacebuilding in post-ethnic violent conflicts is not influenced by the socio-demographic characteristics but is influenced by ET and RT. The socio-cultural approach is the main strategy for peacebuilding in post-ethnic (and religious) conflicts in multi-cultural societies. The weakness of inter-ethnic relations soon improves in the post-peace period through the reconstruction of social and cultural factors to strengthen social cohesion and social capital at the local community level by involving various stakeholders

Originality/value

This paper is a valuable source of information regarding current research on the role of local communities in strengthening and building peace in post-ethnic violent conflicts in multi-cultural societies.

Details

Journal of Aggression, Conflict and Peace Research, vol. 12 no. 1
Type: Research Article
ISSN: 1759-6599

Keywords

Open Access
Book part
Publication date: 4 June 2021

Briony Anderson and Mark A. Wood

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…

Abstract

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Michael Salter and Elly Hanson

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the…

Abstract

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the absence of adequate intervention by internet service providers, social media platforms, and government. The chapter discusses the history of online CSE, focusing on regulatory stances over time in which online risks to children have been cast as natural and inevitable by the hegemony of a “cyberlibertarian” ideology. We illustrate the success of this ideology, as well as its profound contradictions and ethical failures, by presenting key examples in which internet users have taken decisive action to prevent online CSE and promote the removal of CSAM. Rejecting simplistic characterizations of “vigilante justice,” we argue instead that the fact that often young internet users report feeling forced to act against online CSE and CSAM undercuts libertarian claims that internet regulation is impossible, unworkable, and unwanted. Recent shifts toward a more progressive ethos of online harm minimization are promising; however, this ethos risks offering a new legitimizing ideology for online business models that will continue to put children at risk of abuse and exploitation. In conclusion, we suggest ways forward toward an internet built in the interests of children, rather than profit.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 6 of 6