Search results
1 – 6 of 6Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual…
Abstract
Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual concerned. Intuitively, it is tempting to condemn doxing as a crude form of cyber violence that weaponizes personal data. When it is used as a strategy of resistance by the powerless to hold the powerful accountable, however, a more nuanced understanding is called for. This chapter focuses on the doxing phenomenon in Hong Kong, where doxing incidents against police officers and their family members have skyrocketed since 2019 (a 75-fold increase over 2018). It contends that doxing for political purposes is closely related to digital vigilantism, signifying a loss of confidence in the ruling authority and a yearning for an alternative form of justice. The chapter therefore argues that public interest should be recognized as a legal defense in doxing cases when those discharging or entrusted with public duty are the targets. Equally, it is important to confine the categories of personal data disclosed to information necessary to reveal the alleged wrongdoer or wrongdoing. Only in this way can a fair balance be struck between privacy, freedom of expression, and public interest.
Details
Keywords
This paper aims to systematically unpack the ideal of organizational transparency by tracing the concept's origins in the era of Enlightenment. Based on a genealogical…
Abstract
Purpose
This paper aims to systematically unpack the ideal of organizational transparency by tracing the concept's origins in the era of Enlightenment. Based on a genealogical reconstruction, the article explores different transparency understandings in key areas of online public relations (PR) and discusses the opportunities and challenges they present for the field.
Design/methodology/approach
This is a conceptual paper that unfolds a genealogical reconstruction to uncover different transparency ideals of modernity. These perspectives are then transferred to the field of online PR to discuss their ethical and practical implications in the context of digitalization.
Findings
Claims for transparency manifest in three distinct ideals, namely normative, instrumental and expressive transparency, which are also pursued in online PR. These ideals are related to associated concepts, like dialogue, control and authenticity, which serve as transparency proxies. Moreover, each transparency ideal inherits an ambivalence that presents unique opportunities and challenges for PR practitioners.
Practical implications
Instead of an unquestioned belief in the ideal of organizational transparency, the paper urges communication practitioners to critically reflect on the ambivalent nature of different transparency regimes in the context of digitalization and provides initial recommendations on how to manage digital transparency in online PR responsibly.
Originality/value
The paper contributes to the vivid debate surrounding organizational transparency in the context of digitalization by offering a novel and systematic analysis of the multifaced concept of transparency while opening new research avenues for further conceptual and empirical research.
Details
Keywords
Alison J. Marganski and Lisa A. Melander
While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology…
Abstract
While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology demands that we pay attention to not only harms associated with interconnectivity, but also the potential for technology to counter offenses and “do good.” This chapter discusses technology as both a weapon and a shield when it comes to violence against women and girls in public spaces and private places. First, we review the complex and varied manifestations of technological gender violence, ranging from the use of technology to exploit, harass, stalk, and otherwise harm women and girls in communal spaces, to offenses that occur behind closed doors. Second, we discuss justice-related responses, underscoring how women and girls have “flipped the script” when their needs are not met. By developing innovative ways to respond to the wrongs committed against them and creating alternate systems that offer a voice, victims/survivors have repurposed technology to redress harms and unite in solidarity with others in an ongoing quest for justice.
Details
Keywords
Hartoyo Hartoyo, Haryanto Sindung, Fahmi Teuku and Sunarto Sunarto
The purpose of this paper is to analyse the effects of socio-demographic factors on ethnic tolerance (ET) and religious tolerance (RT) as well as the participation of the local…
Abstract
Purpose
The purpose of this paper is to analyse the effects of socio-demographic factors on ethnic tolerance (ET) and religious tolerance (RT) as well as the participation of the local community in peacebuilding in post-ethnic violent conflicts in a multi-cultural society.
Design/methodology/approach
This research was conducted in the rural areas of Indonesia, on the basis of an empirical study that was performed in Lampung, a province at the southern tip of Sumatra. Data were collected through a survey of 500 respondents from five districts susceptible to ethnic conflicts. From each district, two villages that experienced ethnic conflicts were chosen and from each village, 50 respondents were randomly selected. To strengthen the explanation of quantitative data, in-depth interviews were also conducted with another 50 residents, five informants from each of ten villages. Informants comprised community leaders or traditional leaders, local police officers, local military officers and district government officials.
Findings
First, the degree of tolerance is not specifically concentrated in the socio-demographic characteristics. Second, ET affects RT. Third, local community participation in peacebuilding in post-ethnic violent conflicts is not influenced by the socio-demographic characteristics but is influenced by ET and RT. The socio-cultural approach is the main strategy for peacebuilding in post-ethnic (and religious) conflicts in multi-cultural societies. The weakness of inter-ethnic relations soon improves in the post-peace period through the reconstruction of social and cultural factors to strengthen social cohesion and social capital at the local community level by involving various stakeholders
Originality/value
This paper is a valuable source of information regarding current research on the role of local communities in strengthening and building peace in post-ethnic violent conflicts in multi-cultural societies.
Details
Keywords
Briony Anderson and Mark A. Wood
This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…
Abstract
This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.
Details
Keywords
Michael Salter and Elly Hanson
This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the…
Abstract
This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the absence of adequate intervention by internet service providers, social media platforms, and government. The chapter discusses the history of online CSE, focusing on regulatory stances over time in which online risks to children have been cast as natural and inevitable by the hegemony of a “cyberlibertarian” ideology. We illustrate the success of this ideology, as well as its profound contradictions and ethical failures, by presenting key examples in which internet users have taken decisive action to prevent online CSE and promote the removal of CSAM. Rejecting simplistic characterizations of “vigilante justice,” we argue instead that the fact that often young internet users report feeling forced to act against online CSE and CSAM undercuts libertarian claims that internet regulation is impossible, unworkable, and unwanted. Recent shifts toward a more progressive ethos of online harm minimization are promising; however, this ethos risks offering a new legitimizing ideology for online business models that will continue to put children at risk of abuse and exploitation. In conclusion, we suggest ways forward toward an internet built in the interests of children, rather than profit.
Details