Search results

1 – 10 of 88
Open Access
Book part
Publication date: 4 June 2021

Olusesan Ayodeji Makinde, Emmanuel Olamijuwon, Nchelem Kokomma Ichegbo, Cheluchi Onyemelukwe and Michael Gboyega Ilesanmi

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly…

Abstract

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly attention has been given to the nature of technology-facilitated violence and abuse (TFVA) across sub-Saharan Africa (SSA) despite an explosion in the use of various technologies. We conducted a literature review to identify and harmonize available data relating to the types of TFVA taking place in SSA. This was followed by an online survey of young adults through the SHYad.NET forum to understand the nature of TFVA among young adults in SSA. Our literature review revealed various types of TFVA to be happening across SSA, including cyberbullying, cyberstalking, trolling, dating abuse, image-based sexual violence, sextortion, and revenge porn. The results of our online survey revealed that both young men and women experience TFVA, with the most commonly reported TFVA being receiving unwanted sexually explicit images, comments, emails, or text messages. Female respondents more often reported repeated and/or unwanted sexual requests online via email or text message while male respondents more often reported experiencing violent threats. Respondents used various means to cope with TFVA including blocking the abuser or deleting the abused profile on social media.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Edgar Pacheco and Neil Melhuish

The nature and extent of adults' engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization…

Abstract

The nature and extent of adults' engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization. When explored, engagement in online aggression and abuse has centered on children and young people, particularly in school and higher education settings. Drawing on nationally representative data from New Zealand adults aged 18 and over, this chapter explores the overall prevalence of online aggression with a focus on gender and age. Our findings support the need to also understand adult aggressors' behaviors to better address the distress and harm caused to targets through digital communications. The chapter discusses the implications of the results for policy and practice and proposes some directions for future research.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 19 March 2020

Kimberly McCarthy, Jone L. Pearce, John Morton and Sarah Lyon

The emerging literature on computer-mediated communication at the study lacks depth in terms of elucidating the consequences of the effects of incivility on employees. This study…

2081

Abstract

Purpose

The emerging literature on computer-mediated communication at the study lacks depth in terms of elucidating the consequences of the effects of incivility on employees. This study aims to compare face-to-face incivility with incivility encountered via e-mail on both task performance and performance evaluation.

Design/methodology/approach

In two experimental studies, the authors test whether exposure to incivility via e-mail reduces individual task performance beyond that of face-to-face incivility and weather exposure to that incivility results in lower performance evaluations for third-parties.

Findings

The authors show that being exposed to cyber incivility does decrease performance on a subsequent task. The authors also find that exposure to rudeness, both face-to-face and via e-mail, is contagious and results in lower performance evaluation scores for an uninvolved third party.

Originality/value

This research comprises an empirically grounded study of incivility in the context of e-mail at study, highlights distinctions between it and face-to-face rudeness and reveals the potential risks that cyber incivility poses for employees.

Details

Organization Management Journal, vol. 17 no. 1
Type: Research Article
ISSN: 1541-6518

Keywords

Open Access
Book part
Publication date: 4 June 2021

Bridget Harris and Delanie Woodlock

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical…

Abstract

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical framework for technology-facilitated harms in heterosexual relationships which we characterize as digital coercive control. Here, we include behaviors which can be classified as abuse and stalking and also individualized tactics which are less easy to categorize, but evoke fear and restrict the freedoms of a particular woman. Drawing on their knowledge of a victim/survivor's experiences and, in the context of patterns and dynamics of abuse, digital coercive control strategies are personalized by perpetrators and extend and exacerbate “real-world” violence.

Digital coercive control is unique because of its spacelessness and the ease, speed, and identity-shielding which technology affords. Victim/survivors describe how perpetrator use of technology creates a sense of omnipresence and omnipotence which can deter women from exiting violent relationships and weakens the (already tenuous) notion that abuse can be “escaped.” We contend that the ways that digital coercive control shifts temporal and geographic boundaries warrant attention. However, spatiality more broadly cannot be overlooked. The place and shape in which victim/survivors and perpetrators reside will shape both experiences of and response to violence. In this chapter, we explore these ideas, reporting on findings from a study on digital coercive control in regional, rural, and remote Australia. We adopt a feminist research methodology in regard to our ethos, research processes, analysis, and the outputs and outcomes of our project. Women's voices are foreground in this approach and the emphasis is on how research can be used to inform, guide, and develop responses to domestic violence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Alison J. Marganski and Lisa A. Melander

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology…

Abstract

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology demands that we pay attention to not only harms associated with interconnectivity, but also the potential for technology to counter offenses and “do good.” This chapter discusses technology as both a weapon and a shield when it comes to violence against women and girls in public spaces and private places. First, we review the complex and varied manifestations of technological gender violence, ranging from the use of technology to exploit, harass, stalk, and otherwise harm women and girls in communal spaces, to offenses that occur behind closed doors. Second, we discuss justice-related responses, underscoring how women and girls have “flipped the script” when their needs are not met. By developing innovative ways to respond to the wrongs committed against them and creating alternate systems that offer a voice, victims/survivors have repurposed technology to redress harms and unite in solidarity with others in an ongoing quest for justice.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 17 June 2019

Rebecka Cowen Forssell

The purpose of this paper is to explore what characterizes cyberbullying when it is performed in digital space and in an increasingly boundary blurred working life context.

4106

Abstract

Purpose

The purpose of this paper is to explore what characterizes cyberbullying when it is performed in digital space and in an increasingly boundary blurred working life context.

Design/methodology/approach

Cyberbullying is explored through the lens of Erving Goffman’s theories on everyday life interaction and social media scholars understanding of social life on the internet today. The empirical material for the study is grounded in eight in-depth interviews with individuals who have been subjected to cyberbullying behavior in their professional life. The interview data were analyzed by means of thematic analysis.

Findings

Three key themes were identified: spatial interconnectedness, colliding identities and the role of the audience. The empirical data indicate that in order to understand cyberbullying in working life, it is necessary to consider the specific context that emerges with social network sites and blogs. Moreover, this study shows how social network sites tend to blur boundaries between the private and the professional for the targeted individual.

Originality/value

Cyberbullying in working life is a relatively under-researched area. Most existing research on cyberbullying follows the tradition of face-to-face bullying by addressing the phenomenon with quantitative methods. Given the limited potential of this approach to uncover new and unique features, this study makes an important contribution by exploring cyberbullying with a qualitative approach that provides in-depth understanding of the new situations that emerge when bullying is performed online.

Details

Qualitative Research in Organizations and Management: An International Journal, vol. 15 no. 2
Type: Research Article
ISSN: 1746-5648

Keywords

Abstract

Details

Video Games Crime and Next-Gen Deviance
Type: Book
ISBN: 978-1-83867-450-2

Open Access
Article
Publication date: 29 October 2019

Zhishuo Liu, Tian Fang, Yao Dongxin and Nianci Kou

Current models of transaction credit in the e-commerce network face many problems, such as the one-sided measurement, low accuracy and insufficient anti-aggression solutions. This…

Abstract

Purpose

Current models of transaction credit in the e-commerce network face many problems, such as the one-sided measurement, low accuracy and insufficient anti-aggression solutions. This paper aims to address these problems by studying the transaction credit problem in the crowd transaction network.

Design/methodology/approach

This study divides the transaction credit into two parts, direct transaction credit and recommended transaction credit, and it proposes a model based on the crowd transaction network. The direct transaction credit comprehensively includes various factors influencing the transaction credit, including transaction evaluation, transaction time, transaction status, transaction amount and transaction times. The recommendation transaction credit introduces two types of recommendation nodes and constructs the recommendation credibility for each type. This paper also proposes a “buyer + circle of friends” method to store and update the transaction credit data.

Findings

The simulation results show that this model is superior with high accuracy and anti-aggression.

Originality/value

The direct transaction credit improves the accuracy of the transaction credit data. The recommendation transaction credit strengthens the anti-aggression of the transaction credit data. In addition, the “buyer + circle of friends” method fully uses the computing of the storage ability of the internet, and it also solves the failure problem of using a single node.

Details

International Journal of Crowd Science, vol. 3 no. 3
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Book part
Publication date: 4 June 2021

Walter S. DeKeseredy, Danielle M. Stoneberg and Gabrielle L. Lory

Polyvictimization means looking at multiple victimizations of different kinds that one person has experienced. Virtually, all of the work in this field focuses on the effects of…

Abstract

Polyvictimization means looking at multiple victimizations of different kinds that one person has experienced. Virtually, all of the work in this field focuses on the effects of childhood trauma and victimization on currently distressed children, and empirical and theoretical work on the intertwining of adult female offline and online abuse experiences is in short supply. Recently, however, some scholars are starting to fill these research gaps by generating data showing that technology-facilitated violence and abuse are part and parcel of women's polyvictimization experiences at institutions of higher education. This chapter provides an in-depth review of the extant social scientific literature on the role technology-facilitated violence and abuse plays in the polyvictimization of female college/university students. In addition to proposing new ways of knowing, we suggest progressive policies and practices aimed at preventing polyvictimization on the college campus.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Bronwyn Carlson and Ryan Frazer

Broadly understood as repeated, intentional, and aggressive behaviors facilitated by digital technologies, cyberbullying has been identified as a significant public health concern…

Abstract

Broadly understood as repeated, intentional, and aggressive behaviors facilitated by digital technologies, cyberbullying has been identified as a significant public health concern in Australia. However, there have been critical debates about the theoretical and methodological assumptions of cyberbullying research. On the whole, this research has demonstrated an aversion to accounting for context, difference, and complexity. This insensitivity to difference is evident in the absence of nuanced accounts of Indigenous people's experiences of cyberbullying. In this chapter, we extend recent critiques of dominant approaches to cyberbullying research and argue for novel theoretical and methodological engagements with Indigenous people's experiences of cyberbullying. We review a range of literature that unpacks the many ways that social, cultural, and political life is different for Indigenous peoples. More specifically, we demonstrate there are good reasons to assume that online conflict is different for Indigenous peoples, due to diverse cultural practices and the broader political context of settler-colonialism. We argue that the standardization of scholarly approaches to cyberbullying is delimiting its ability to attend to social difference in online conflict, and we join calls for more theoretically rigorous, targeted, difference-sensitive studies into bullying.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 10 of 88