Search results

1 – 10 of 327
Open Access
Book part
Publication date: 9 December 2021

Mark Taylor and Richard Kirkham

A policy of surveillance which interferes with the fundamental right to a private life requires credible justification and a supportive evidence base. The authority for such…

Abstract

A policy of surveillance which interferes with the fundamental right to a private life requires credible justification and a supportive evidence base. The authority for such interference should be clearly detailed in law, overseen by a transparent process and not left to the vagaries of administrative discretion. If a state surveils those it governs and claims the interference to be in the public interest, then the evidence base on which that claim stands and the operative conception of public interest should be subject to critical examination. Unfortunately, there is an inconsistency in the regulatory burden associated with access to confidential patient information for non-health-related surveillance purposes and access for health-related surveillance or research purposes. This inconsistency represents a systemic weakness to inform or challenge an evidence-based policy of non-health-related surveillance. This inconsistency is unjustified and undermines the qualities recognised to be necessary to maintain a trustworthy confidential public health service. Taking the withdrawn Memorandum of Understanding (MoU) between NHS Digital and the Home Office as a worked example, this chapter demonstrates how the capacity of the law to constrain the arbitrary or unwarranted exercise of power through judicial review is not sufficient to level the playing field. The authors recommend ‘levelling up’ in procedural oversight, and adopting independent mechanisms equivalent to those adopted for establishing the operative conceptions of public interest in the context of health research to non-health-related surveillance purposes.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Book part
Publication date: 4 June 2021

Kristen Thomasen and Suzie Dunn

Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse…

Abstract

Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse. Whether this be monitoring movements through stalkerware, using drones to nonconsensually film or harass, or manipulating and distributing intimate images online such as deepfakes and creepshots, invasions of privacy have become a significant form of gender-based violence. Accordingly, our normative and legal concepts of privacy must evolve to counter the harms arising from this misuse of new technology. Canada's Supreme Court recently addressed technology-facilitated violations of privacy in the context of voyeurism in R v Jarvis (2019) . The discussion of privacy in this decision appears to be a good first step toward a more equitable conceptualization of privacy protection. Building on existing privacy theories, this chapter examines what the reasoning in Jarvis might mean for “reasonable expectations of privacy” in other areas of law, and how this concept might be interpreted in response to gender-based technology-facilitated violence. The authors argue the courts in Canada and elsewhere must take the analysis in Jarvis further to fully realize a notion of privacy that protects the autonomy, dignity, and liberty of all.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Abstract

Details

Remembering the Life, Work, and Influence of Stuart A. Karabenick
Type: Book
ISBN: 978-1-80455-710-5

Open Access
Book part
Publication date: 29 September 2023

Laura Lamas-Abraira

In transnational families worldwide, different family members have varying degrees of mobility, as well as different physical and emotional experiences with relatives and places…

Abstract

In transnational families worldwide, different family members have varying degrees of mobility, as well as different physical and emotional experiences with relatives and places throughout their lives. For this reason, in recent decades, increasing attention has been placed upon the experiences of migrants' descendants growing up across borders.

Based on data from a multi-sited ethnography and a survey, this chapter explores the experiences of children growing up in Chinese transnational families split between Zhejiang province and their parents' immigration countries, located mainly in Europe. First, it introduces the migration context and methods, presenting the profiles and basic information of the 77 Chinese migrants' descendants who participated in a ‘Roots-seeking Journey’ summer camp held in their family area of origin in China, in 2018. Second, it explores their heterogeneous early childhood paths and conditions, paying particular attention to mobility, care strategies, intergenerational relations and transnational ties. Finally, this chapter introduces the concept of fluid childhoods, and reflects on the key role of care-related mobility and communication technologies in shaping their early life paths and experiences as well as further transnational engagement.

Details

The Emerald Handbook of Childhood and Youth in Asian Societies
Type: Book
ISBN: 978-1-80382-284-6

Keywords

Open Access

Abstract

Details

Online Anti-Rape Activism: Exploring the Politics of the Personal in the Age of Digital Media
Type: Book
ISBN: 978-1-83867-442-7

Open Access
Book part
Publication date: 4 June 2021

Ella Broadbent and Chrissy Thompson

This chapter examines the structure and sentiment of the Twitter response to Nathan Broad's naming as the originator of an image-based sexual abuse incident following the 2017…

Abstract

This chapter examines the structure and sentiment of the Twitter response to Nathan Broad's naming as the originator of an image-based sexual abuse incident following the 2017 Australian Football League Grand Final. Employing Social Network Analysis to visualize the hierarchy of Twitter users responding to the incident and Applied Thematic Analysis to trace the diffusion of differing streams of sentiment within this hierarchy, we produced a representation of participatory social media engagement in the context of image-based sexual abuse. Following two streams of findings, a model of social media user engagement was established that hierarchized the interplay between institutional and personal Twitter users. In this model, it was observed that the Broad incident generated sympathetic and compassionate discourses among an articulated network of social media users. This sentiment gradually diffused to institutional Twitter users – or Reference accounts – through the process of intermedia agenda-setting, whereby the narrative of terrestrial media accounts was altered by personal Twitter users over time.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Briony Anderson and Mark A. Wood

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…

Abstract

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Abstract

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Open Access
Book part
Publication date: 4 June 2021

Seonaid Stevenson-McCabe and Sarai Chisala-Tempelhoff

Technology-facilitated violence and abuse including image-based sexual abuse (IBSA) is a phenomenon affecting women and girls around the world. Abusers misuse technology to attack…

Abstract

Technology-facilitated violence and abuse including image-based sexual abuse (IBSA) is a phenomenon affecting women and girls around the world. Abusers misuse technology to attack victims and threaten their safety, privacy, and dignity. This abuse is gendered and a form of domestic and sexual violence. In this article, the authors compare criminal law approaches to tackling IBSA in Scotland and Malawi. We critically analyze the legislative landscape in both countries, with a view to assessing the potential for victims to seek and obtain redress for IBSA. We assess the role criminal law has to play in each jurisdiction while acknowledging the limits of criminal law alone in terms of providing redress.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 20 February 2023

Brita Ytre-Arne

This chapter discusses how media use changes when everyday life undergoes change, focusing on major life transitions. I briefly introduce different perspectives on evolving media

Abstract

This chapter discusses how media use changes when everyday life undergoes change, focusing on major life transitions. I briefly introduce different perspectives on evolving media repertoires across the life course, and argue for the relevance of studying periods of destabilization and reorientation, when elements of media repertoires and modes of public connection are temporarily or more permanently transformed. I argue that easily adaptable media technologies such as smartphones tend to become more important in unsettled circumstances, as easy-to-reach for tools for new forms of self-expression, information-seeking or social contact, in accordance with shifting social roles and everyday circumstances. The primary empirical material analyzed in the chapter is a small qualitative interview study with mothers, about their media use the first year with a new-born.

Details

Media Use in Digital Everyday Life
Type: Book
ISBN: 978-1-80262-383-3

Access

Only Open Access

Year

Content type

Book part (327)
1 – 10 of 327