Search results

1 – 10 of 126
Open Access
Book part
Publication date: 4 June 2021

Jane Bailey and Sara Shayan

This article considers how digital technologies are informed by, and implicated in, the systematic and interlocking oppressions of colonialism, misogyny, and racism, all of which…

Abstract

This article considers how digital technologies are informed by, and implicated in, the systematic and interlocking oppressions of colonialism, misogyny, and racism, all of which have been identified as root causes of the missing and murdered Indigenous women crisis in Canada. The authors consider how technology can facilitate multiple forms of violence against women including stalking and intimate partner violence, human trafficking, pornography and child abuse images, and online hate and harassment and note instances where Indigenous women and girls may be particularly vulnerable. The authors also explore some of the complexities related to police use of technology for investigatory purposes, touching on police use of social media and DNA technology. Without simplistically blaming technology, the authors argue that technology interacts with multiple factors in the complex historical, socio-cultural environment that incubates the national crisis of missing and murdered Indigenous women and girls. The article concludes with related questions that may be considered at the impending national inquiry.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Alison J. Marganski and Lisa A. Melander

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology…

Abstract

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology demands that we pay attention to not only harms associated with interconnectivity, but also the potential for technology to counter offenses and “do good.” This chapter discusses technology as both a weapon and a shield when it comes to violence against women and girls in public spaces and private places. First, we review the complex and varied manifestations of technological gender violence, ranging from the use of technology to exploit, harass, stalk, and otherwise harm women and girls in communal spaces, to offenses that occur behind closed doors. Second, we discuss justice-related responses, underscoring how women and girls have “flipped the script” when their needs are not met. By developing innovative ways to respond to the wrongs committed against them and creating alternate systems that offer a voice, victims/survivors have repurposed technology to redress harms and unite in solidarity with others in an ongoing quest for justice.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Ari Ezra Waldman

Mobile dating apps are widely used in the queer community. Whether for sexual exploration or dating, mobile and geosocial dating apps facilitate connection. But they also bring…

Abstract

Mobile dating apps are widely used in the queer community. Whether for sexual exploration or dating, mobile and geosocial dating apps facilitate connection. But they also bring attendant privacy risks. This chapter is based on original research about the ways gay and bisexual men navigate their privacy on geosocial dating apps geared toward the LGBTQI community. It argues that, contrary to the conventional wisdom that people who share semi-nude or nude photos do not care about their privacy, gay and bisexual users of geosocial dating apps care very much about their privacy and engage in complex, overlapping privacy navigation techniques when sharing photos. They share semi-nude and nude photos for a variety of reasons, but generally do so only after building organic trust with another person. Because trust can easily break down without supportive institutions, this chapter argues that law and design must help individuals protect their privacy on geosocial dating apps.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 30 October 2023

Giacomo Pigatto, John Dumay, Lino Cinquini and Andrea Tenucci

This research aims to examine and understand the rationales and modalities behind the use of disclosure before, during and after a corporate governance scandal involving CPA…

Abstract

Purpose

This research aims to examine and understand the rationales and modalities behind the use of disclosure before, during and after a corporate governance scandal involving CPA Australia (CPAA).

Design/methodology/approach

Data beyond CPAA's annual reports were collected, such as news articles, media releases, an independent review panel (IRP) report, and the Chief Operating Officer's letter to members. These disclosures were manually coded and analysed through the word counts and word trees in NVivo. This study also relied on Norbert Elias' conceptual tool of power games among networks of actors – figurations – to model the scandal as a power game between the old Board, the press, concerned members, the IRP and the new Board. This study analysed the data to reveal a collective and in fieri power balance that changed with the phases of the scandal.

Findings

A mix of voluntary, involuntary, requested and absent disclosures was important in triggering, managing and ending the CPAA scandal. Moreover, communication and disclosure fulfilled a constitutive role since both: mobilised actors, enabled coordination among actors, contributed to pursuing shared goals and influenced power balances. Such a constitutive role was at the heart of the ability of coalitions of figurations to challenge and restore the powerful status quo.

Originality/value

This research introduces to accounting studies the collective and in fieri dimensions of power from figurational theory. Moreover, the research sheds new light on using voluntary, involuntary, requested and absent disclosures before, during and after a corporate crisis.

Details

Accounting, Auditing & Accountability Journal, vol. 36 no. 9
Type: Research Article
ISSN: 0951-3574

Keywords

Open Access
Book part
Publication date: 4 June 2021

Robert D. Lytle, Tabrina M. Bratton and Heather K. Hudson

Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly…

Abstract

Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly referred to as bystander intervention models (BIMs). More recently, BIMs have been modified to facilitate initiatives to prevent various forms of online victimization. This chapter begins with a review of BIMs and recent applications of bystander intervention research to online environments. We also present several future directions for research along with applications for reducing technology-facilitated violence, including programming recommendations and theoretical development.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Eva PenzeyMoog and Danielle C. Slakoff

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this…

Abstract

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this chapter, we discuss three unique types of technological abuse: (1) financial abuse via banking websites and apps; (2) abuse via smart home devices (i.e., “Internet of Things” abuse); and (3) stalking via geo-location or GPS. We also argue pregnancy and wellness apps provide an opportunity for meaningful intervention for pregnant victims of domestic violence.

While there is no way to ensure users' safety in all situations, we argue thoughtful considerations while designing and building digital products can result in meaningful contributions to victims' safety. This chapter concludes with PenzeyMoog's (2020) “Framework for Inclusive Safety,” which is a roadmap for building technology that increases the safety of domestic violence survivors. This framework includes three key points: (1) the importance of educating technologists about domestic violence; (2) the importance of identifying possible abuse situations and designing against them; and (3) identifying user interactions that might signal abuse and offering safe interventions.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 19 November 2020

Abstract

Details

The Impact of Global Drug Policy on Women: Shifting the Needle
Type: Book
ISBN: 978-1-83982-885-0

Open Access
Book part
Publication date: 4 June 2021

Emma A. Jane

While a growing body of literature reveals the prevalence of men's harassment and abuse of women online, scant research has been conducted into women's attacks on each other in…

Abstract

While a growing body of literature reveals the prevalence of men's harassment and abuse of women online, scant research has been conducted into women's attacks on each other in digital networked environments. This chapter responds to this research gap by analyzing data obtained from qualitative interviews with Australian women who have received at times extremely savage cyberhate they know or strongly suspect was sent by other women. Drawing on scholarly literature on historical intra-feminism schisms – specifically what have been dubbed the “mommy wars” and the “sex wars” – this chapter argues that the conceptual lenses of internalized misogyny and lateral violence are useful in their framing of internecine conflict within marginalized groups as diagnostic of broader, systemic oppression rather than being solely the fault of individual actors. These lenses, however, require multiple caveats and have many limitations. In conclusion, I canvas the possibility that the pressure women may feel to present a united front in the interests of feminist politics could itself be considered an outcome of patriarchal oppression (even if performing solidarity is politically expedient and/or essential). As such, there might come a time when openly renouncing discourses of sisterhood and feeling free to disagree with, and even dislike, other women might be considered markers of liberation.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 5 October 2020

Letitia Hadden, Aisling O’Riordan and Jeanne Jackson

Equality of rights for individuals who identify as being lesbian or gay (LG) have emerged over recent years, and significant advancements have been made in recognition and support…

2329

Abstract

Purpose

Equality of rights for individuals who identify as being lesbian or gay (LG) have emerged over recent years, and significant advancements have been made in recognition and support of LG rights in Ireland. Given the recent change in legal rights for the LG population, Civil Partnership 2010 and Marriage Equality 2015, this paper aims to explore the lived experience of daily occupations of LG adult’s in Ireland today, by applying an occupational justice lens.

Design/methodology/approach

A qualitative phenomenological research study, examined the concept of occupational justice as experienced by eight adults, who identified as being LG. Data was collected through face to face, semi-structured interviews.

Findings

Four themes capturing the complexity of each participant’s experience of daily occupations and occupational justice emerged, namely, transitions and personal journeys, celebrating differences, empowerment through occupation and inner conflict. Findings demonstrate how occupational justice is experienced as a complex, contextually embedded and dynamic process specific to each individual.

Originality/value

Future research in this area should aim to explore the experiences of both a younger and older LG population, along with those who identify as bisexual, transgender, queer or intersex to continue to raise awareness of the potential for occupational injustice within this minority population.

Details

Irish Journal of Occupational Therapy, vol. 48 no. 2
Type: Research Article
ISSN: 2398-8819

Keywords

Open Access
Book part
Publication date: 4 June 2021

Elina Vaahensalo

The growth of online communities and social media has led to a growing need for methods, concepts, and tools for researching online cultures. Particular attention should be paid…

Abstract

The growth of online communities and social media has led to a growing need for methods, concepts, and tools for researching online cultures. Particular attention should be paid to polarizing online discussion cultures and dynamics that increase inequality in online environments. Social media has enormous potential to create good, but in order to unlock its full potential, we also need to examine the mechanisms keeping these spaces monotonous, homogenous, and even hostile toward some groups. With this need in mind, I have developed the concept and theory of othering online discourse (OOD).

This chapter introduces and defines the concept of OOD and explains the key characteristics and different attributes of OOD in relation to other concepts that deal with disruptive and discriminatory behavior in online spaces. The attributes of OOD are demonstrated drawing on examples gathered from the Finnish Suomi24 (Finland24) forum.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 10 of 126