Search results

1 – 4 of 4
Open Access
Book part
Publication date: 4 June 2021

Alison J. Marganski and Lisa A. Melander

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology…

Abstract

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology demands that we pay attention to not only harms associated with interconnectivity, but also the potential for technology to counter offenses and “do good.” This chapter discusses technology as both a weapon and a shield when it comes to violence against women and girls in public spaces and private places. First, we review the complex and varied manifestations of technological gender violence, ranging from the use of technology to exploit, harass, stalk, and otherwise harm women and girls in communal spaces, to offenses that occur behind closed doors. Second, we discuss justice-related responses, underscoring how women and girls have “flipped the script” when their needs are not met. By developing innovative ways to respond to the wrongs committed against them and creating alternate systems that offer a voice, victims/survivors have repurposed technology to redress harms and unite in solidarity with others in an ongoing quest for justice.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 4 March 2021

Ariful Islam and Sazali Abd Wahab

The informal segment compared to the formal segment is developing rapidly in urban areas of many developing Muslim countries. However, matter of fact, the contribution factor of…

3478

Abstract

Purpose

The informal segment compared to the formal segment is developing rapidly in urban areas of many developing Muslim countries. However, matter of fact, the contribution factor of the food cart business to the economic outline of the country has been vastly overlooked or neglected. The authority, policymakers, social organisations, vendors and the customers together need to play a contributing role based on intervention tactics regarding the major focus areas related to the development of this business segment. As a result, this study aims to explore concerns or issues that are hampering future business prospects considering the philosophy of halalan tayyiba.

Design/methodology/approach

The study has organised 16 semi-structured interview procedures with relevant food cart vendors of Chittagong, Bangladesh. The study selected participants (food cart vendors) from lower- to medium-income areas occupying at least one high school, one college in relation to several commercial premises (ex-mini shopping malls, offices and small factories) considering 6 out of 41 wards of Chittagong city corporation. All meetings with reflected participants were audiotaped and transcribed verbatim and transcripts were loaded into NVivo for coding and analysis procedure.

Findings

This investigation revealed that issues with food security, weather, lack of proper legislation, lack of awareness related with halalan tayyiba and erratic policies are the major challenges for the development of the food cart business in Chittagong. This study also advances how street food security well-being and hygiene practices are a piece of the halal idea and should in this way be adjusted by the halal food segment to accomplish halalan tayyiba affirmation. The outcomes also indicate an agenda for future research in this area.

Research limitations/implications

More reflections from the different stakeholders do have both pertinence and potential for incorporation in suggestions.

Practical implications

The detected findings may help both authority and other concerned entities to identify the critical dynamics to initiate appropriate strategic activities towards local economic growth considering halalan tayyiba outlines.

Social implications

It will ensure social well-being and food security.

Originality/value

This explorative research is one of few studies in the Bangladesh context, which is investigating halalan tayyiba-oriented business development outline for micro entrepreneurs.

Details

Rajagiri Management Journal, vol. 16 no. 1
Type: Research Article
ISSN: 0972-9968

Keywords

Open Access
Article
Publication date: 23 March 2023

Octávio Sacramento

Using COVID-19 pandemic as a more immediate empirical reference, this paper aims to understand the biosecurity risks arising from tourist activities and, through a more…

Abstract

Purpose

Using COVID-19 pandemic as a more immediate empirical reference, this paper aims to understand the biosecurity risks arising from tourist activities and, through a more prospective analysis, to consider the relevance of public health issues in the context of tourism-sustainability nexuses.

Design/methodology/approach

The text assumes a hybrid format, incorporating elements resulting from empirical research and essayistic viewpoints. The collection of empirical elements was based on documental research in several sources, such as newspapers, international institutions of an intergovernmental nature and the discussion forum of the travel platform TripAdvisor.

Findings

By assuming mobility and large agglomerations of people from different origins, mass tourism has fostered multiple outbreaks of COVID-19 and the rapid global spread of contagion chains. The pandemic clearly exemplified the responsibility of tourism in the dispersion of biotic agents with severe ecological, economic, social and public health repercussions. It is, therefore, urgent to rethink the tourism growth trajectory and more effectively consider the biosecurity risks associated with mobility in discussions on tourism and sustainability. At the same time, tourism must be delineated in terms of the great aims of sustainability, and this transversal purpose to which it contributes should be considered an intrinsic condition of its own sectorial sustainability as an economic activity.

Originality/value

The biosecurity challenges posed by mass tourism are a very topical issue, still little considered in sustainability policies and on which there is a marked deficit in scientific research.

Details

Journal of Tourism Futures, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2055-5911

Keywords

Access

Only Open Access

Year

Content type

1 – 4 of 4