Search results

1 – 4 of 4

Abstract

Details

Sameness and Repetition in Contemporary Media Culture
Type: Book
ISBN: 978-1-80455-955-0

Open Access
Book part
Publication date: 1 October 2018

Steen Steensen

This chapter analyses the Norwegian Twitter-sphere during and in the aftermath of the terrorist attack in Norway on 22 July 2011. Based on a collection of 2.2 million tweets…

Abstract

This chapter analyses the Norwegian Twitter-sphere during and in the aftermath of the terrorist attack in Norway on 22 July 2011. Based on a collection of 2.2 million tweets representing the Twitter-sphere during the period 20 July–28 August 2011, the chapter seeks answers to how the micro-blogging services aided in creating situation awareness (SA) related to the emergency event, what role hashtags played in that process and who the dominant crisis communicators were. The chapter is framed by theories and previous research on SA and social media use in the context of emergency events. The findings reveal that Twitter was important in establishing SA both during and in the aftermath of the terrorist attack, that hashtags were of limited value in this process during the critical phase, and that unexpected actors became key communicators.

Details

Social Media Use in Crisis and Risk Communication
Type: Book
ISBN: 978-1-78756-269-1

Keywords

Open Access
Book part
Publication date: 22 July 2021

Justyna Bandola-Gill, Sotiria Grek and Matteo Ronzani

The visualization of ranking information in global public policy is moving away from traditional “league table” formats and toward dashboards and interactive data displays. This…

Abstract

The visualization of ranking information in global public policy is moving away from traditional “league table” formats and toward dashboards and interactive data displays. This paper explores the rhetoric underpinning the visualization of ranking information in such interactive formats, the purpose of which is to encourage country participation in reporting on the Sustainable Development Goals. The paper unpacks the strategies that the visualization experts adopt in the measurement of global poverty and wellbeing, focusing on a variety of interactive ranking visualizations produced by the OECD, the World Bank, the Gates Foundation and the ‘Our World in Data’ group at the University of Oxford. Building on visual and discourse analysis, the study details how the politically and ethically sensitive nature of global public policy, coupled with the pressures for “decolonizing” development, influence how rankings are visualized. The study makes two contributions to the literature on rankings. First, it details the move away from league table formats toward multivocal interactive layouts that seek to mitigate the competitive and potentially dysfunctional pressures of the display of “winners and losers.” Second, it theorizes ranking visualizations in global public policy as “alignment devices” that entice country buy-in and seek to align actors around common global agendas.

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Access

Only Open Access

Year

Content type

Book part (4)
1 – 4 of 4