Search results
1 – 10 of 85Petra Filistrucchi, Patrizia Bucarelli, Giuseppe Aversa and Donata Bianchi
This chapter focuses on ways of giving voice to the survivors of institutional abuse and how their contribution can be capitalised in raising community awareness of this…
Abstract
This chapter focuses on ways of giving voice to the survivors of institutional abuse and how their contribution can be capitalised in raising community awareness of this phenomenon. The collection of testimonies demonstrates that institutional abuse is a common and widespread phenomenon that in most cases remains unrevealed throughout the life course. The participatory research process we describe is part of an important social and clinical intervention developed in the framework of two projects. The chapter illustrates outputs and outcomes related to disclosure of institutional abuse and its long-term consequences, as well as the meaning and implications of collective trauma. Results confirm the need to promote the voice of survivors to build a new professional and community culture and sensitisation towards children's right to be heard as an essential instrument to prevent and detect institutional ill treatment. Participatory processes can overcome the resistance of individuals, professional communities and politicians to recognising the phenomenon, emphasising institutional responsibilities and the specific effects of a serious form of maltreatment that requires extraordinary and specific interventions in terms of intensity and flexibility. This chapter describes a fieldwork and research experience made possible thanks to a strong alliance with survivors who engaged in a process of reflection and theoretical elaboration that generated both social and clinical impacts.
Details
Keywords
Alex Stern and Jolka Nathanaili-Penotet
Through research on child sexual abuse (CSA) and adult survivors, knowledge is gained. This knowledge might support decisions – whether political, professional or otherwise – that…
Abstract
Through research on child sexual abuse (CSA) and adult survivors, knowledge is gained. This knowledge might support decisions – whether political, professional or otherwise – that affect the lives of children who are victims of CSA and adult survivors. Additionally, this knowledge influences what the public knows about CSA and adult survivors and as a consequence, how child victims of CSA and adult survivors are treated in everyday life. Given the huge impact research can have on survivors' lives, this chapter raises the question of what aspects of CSA and survivorship are relevant for survivors from survivors' perspective and whether these aspects can be addressed by Participatory Action Research (PAR) as a research paradigm. To identify relevant aspects, survivors' artwork is analysed because art is a way to contribute to public discourses with very little regulation. For analysis, the Sociology of Knowledge Approach to Discourse is used. In this chapter, we introduce basic theories of knowledge from a constructivist perspective in a short background section and explain the aim and method of analysis. Afterwards, we present some key aspects of survivors' art on CSA and survivorship: The invasiveness of CSA, speech, the symbolic violence behind physical abuse and issues of injustice and responsibility are discussed. Additionally, the discursive relation between artists and audience is of interest to finally answer whether – and, if so, why – PAR is an appropriate research paradigm to address these aspects.
Details
Keywords
Julia Buxton, Lona Lauridsen Burger and Giavana Margo
This chapter presents a broad introduction to women’s varied interactions with drugs and drug markets. It provides a brief overview of the international framework of drug control…
Abstract
This chapter presents a broad introduction to women’s varied interactions with drugs and drug markets. It provides a brief overview of the international framework of drug control and the ways in which drug policy enforcement differently impacts women and men. It highlights the negative and disproportionate impacts on women of criminalisation-based approaches and how drug policy serves to reinforce existing problems of structural discrimination. This provides context for the contributions to this edited collection, which are summarised in the introduction. The book situates drug policy reform as a crucial and underlooked feminist issue.
Ella Broadbent and Chrissy Thompson
This chapter examines the structure and sentiment of the Twitter response to Nathan Broad's naming as the originator of an image-based sexual abuse incident following the 2017…
Abstract
This chapter examines the structure and sentiment of the Twitter response to Nathan Broad's naming as the originator of an image-based sexual abuse incident following the 2017 Australian Football League Grand Final. Employing Social Network Analysis to visualize the hierarchy of Twitter users responding to the incident and Applied Thematic Analysis to trace the diffusion of differing streams of sentiment within this hierarchy, we produced a representation of participatory social media engagement in the context of image-based sexual abuse. Following two streams of findings, a model of social media user engagement was established that hierarchized the interplay between institutional and personal Twitter users. In this model, it was observed that the Broad incident generated sympathetic and compassionate discourses among an articulated network of social media users. This sentiment gradually diffused to institutional Twitter users – or Reference accounts – through the process of intermedia agenda-setting, whereby the narrative of terrestrial media accounts was altered by personal Twitter users over time.
Details
Keywords
Milica Mirazić and Daša Duhaček
As a form of gender-based violence, sexual harassment represents one of the most serious obstacles to gender equality in higher education institutions. A systematic and…
Abstract
As a form of gender-based violence, sexual harassment represents one of the most serious obstacles to gender equality in higher education institutions. A systematic and institutional response is required in order for the problem to be regulated. This chapter provides a short overview of the existing institutional mechanisms adopted – with the support system built within the TARGET project – at the University of Belgrade and its member institutions, as a possible and good practice model of institutional interventions dealing with this issue. With three member faculties already having previously introduced their own rulebooks, the first University of Belgrade Rulebook on the Prevention of and Protection from Sexual Harassment was adopted university-wide in 2021. This document represents an important step forward and a substantial support to all the member institutions in the process of regulating the prevention of and protection from sexual harassment and thus contributes substantially to gender equality at all levels of the institution.
Details
Keywords
Julia Slupska and Leonie Maria Tanczer
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…
Abstract
Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.
Details