Search results

1 – 10 of 760
Open Access
Book part
Publication date: 4 June 2021

Olusesan Ayodeji Makinde, Emmanuel Olamijuwon, Nchelem Kokomma Ichegbo, Cheluchi Onyemelukwe and Michael Gboyega Ilesanmi

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly…

Abstract

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly attention has been given to the nature of technology-facilitated violence and abuse (TFVA) across sub-Saharan Africa (SSA) despite an explosion in the use of various technologies. We conducted a literature review to identify and harmonize available data relating to the types of TFVA taking place in SSA. This was followed by an online survey of young adults through the SHYad.NET forum to understand the nature of TFVA among young adults in SSA. Our literature review revealed various types of TFVA to be happening across SSA, including cyberbullying, cyberstalking, trolling, dating abuse, image-based sexual violence, sextortion, and revenge porn. The results of our online survey revealed that both young men and women experience TFVA, with the most commonly reported TFVA being receiving unwanted sexually explicit images, comments, emails, or text messages. Female respondents more often reported repeated and/or unwanted sexual requests online via email or text message while male respondents more often reported experiencing violent threats. Respondents used various means to cope with TFVA including blocking the abuser or deleting the abused profile on social media.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 13 November 2023

Chiara Natalie Focacci and Pak Hung Lam

According to statistics by the US National Sexual Violence Resource Center, more than 50% of women claim they have been raped by an intimate partner or an acquaintance. In this…

Abstract

Purpose

According to statistics by the US National Sexual Violence Resource Center, more than 50% of women claim they have been raped by an intimate partner or an acquaintance. In this experiment, the authors test whether exposing individuals to different types of images portraying the victim and their perpetrator influences individuals' perception of (1) the perpetrator's deserved punishment and (2) the role played by the victim in her rape.

Design/methodology/approach

In an experimental survey, the authors randomly treat groups of individuals with manipulated facial and physical expressions of the same photographs.

Findings

The authors find that news about rape are more or less effective in uncovering the seriousness of the crime independent of the pictures accompanying them, suggesting media should avoid their misusage.

Originality/value

While the role of the narrative of rape has been extensively discussed in the literature from a theoretical perspective, this research provides original evidence based on actual behavioural response.

Details

International Journal of Sociology and Social Policy, vol. 43 no. 13/14
Type: Research Article
ISSN: 0144-333X

Keywords

Open Access
Article
Publication date: 9 October 2018

Judith Corcoba and Raigam Jafet Martinez Portilla

Jihadist terrorism is one of the most important current global issues. Terrorism is an instrument of fear and fear an instrument of news. The purpose of this paper is to…

2118

Abstract

Purpose

Jihadist terrorism is one of the most important current global issues. Terrorism is an instrument of fear and fear an instrument of news. The purpose of this paper is to understand the difference in propaganda between the most powerful terrorist groups and the association with the Islamic State group (ISIS).

Design/methodology/approach

This cross-sectional study has been carried out on the usage of propagandistic material. For the analyses, two different groups have been created, propaganda emitted from the Islamic State group and propaganda from the other main terrorist groups (Boko Haram, Taliban, Al-Qaeda).

Findings

It has been proved that there are significant differences between the Islamic State propaganda and the other main groups.

Originality/value

This study has been conducted in order to provide a comparison of the propaganda content of the main jihadist groups.

Details

Journal of Aggression, Conflict and Peace Research, vol. 11 no. 1
Type: Research Article
ISSN: 1759-6599

Keywords

Open Access
Book part
Publication date: 4 June 2021

Suzie Dunn

When discussing the term “technology-facilitated violence” (TFV) it is often asked: “Is it actually violence?” While international human rights standards, such as the United…

Abstract

When discussing the term “technology-facilitated violence” (TFV) it is often asked: “Is it actually violence?” While international human rights standards, such as the United Nations' Convention on the Elimination of All Forms of Discrimination against Women (United Nations General Assembly, 1979), have long recognized emotional and psychological abuse as forms of violence, including many forms of technology-facilitated abuse (United Nations, 2018), law makers and the general public continue to grapple with the question of whether certain harmful technology-facilitated behaviors are actually forms of violence. This chapter explores this question in two parts. First, it reviews three theoretical concepts of violence and examines how these concepts apply to technology-facilitated behaviors. In doing so, this chapter aims to demonstrate how some harmful technology-facilitated behaviors fit under the greater conceptual umbrella of violence. Second, it examines two recent cases, one from the British Columbia Court of Appeal (BCCA) in Canada and a Romanian case from the European Court of Human Rights (ECtHR), that received attention for their legal determinations on whether to define harmful technology-facilitated behaviors as forms of violence or not. This chapter concludes with observations on why we should conceptualize certain technology-facilitated behaviors as forms of violence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 17 August 2020

Rachel Loney-Howes

Abstract

Details

Online Anti-Rape Activism: Exploring the Politics of the Personal in the Age of Digital Media
Type: Book
ISBN: 978-1-83867-442-7

Open Access
Book part
Publication date: 4 June 2021

Jane Bailey and Sara Shayan

This article considers how digital technologies are informed by, and implicated in, the systematic and interlocking oppressions of colonialism, misogyny, and racism, all of which…

Abstract

This article considers how digital technologies are informed by, and implicated in, the systematic and interlocking oppressions of colonialism, misogyny, and racism, all of which have been identified as root causes of the missing and murdered Indigenous women crisis in Canada. The authors consider how technology can facilitate multiple forms of violence against women including stalking and intimate partner violence, human trafficking, pornography and child abuse images, and online hate and harassment and note instances where Indigenous women and girls may be particularly vulnerable. The authors also explore some of the complexities related to police use of technology for investigatory purposes, touching on police use of social media and DNA technology. Without simplistically blaming technology, the authors argue that technology interacts with multiple factors in the complex historical, socio-cultural environment that incubates the national crisis of missing and murdered Indigenous women and girls. The article concludes with related questions that may be considered at the impending national inquiry.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Robert D. Lytle, Tabrina M. Bratton and Heather K. Hudson

Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly…

Abstract

Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly referred to as bystander intervention models (BIMs). More recently, BIMs have been modified to facilitate initiatives to prevent various forms of online victimization. This chapter begins with a review of BIMs and recent applications of bystander intervention research to online environments. We also present several future directions for research along with applications for reducing technology-facilitated violence, including programming recommendations and theoretical development.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Elena Cama

In recent years, the use of dating and hook up apps has become an increasingly socially acceptable and commonly used method of seeking romantic and sexual partners. This has seen…

Abstract

In recent years, the use of dating and hook up apps has become an increasingly socially acceptable and commonly used method of seeking romantic and sexual partners. This has seen a corresponding rise in media and crime reports of sexual harms facilitated through these services, including sexual harassment, unsolicited sexual imagery, and sexual assault. Emerging empirical research shows that experiences of sexual harms in this context are common and predominantly impact women and girls. The aim of this chapter is to examine the sociocultural and sexual norms that underpin online dating and which perpetuate a “rape culture” within which sexual harms become both possible and normalized. This chapter also considers how the discourses that minimize and legitimize sexual harms are encoded within the responses undertaken by dating and hook up apps to sexual harms. It is argued that together these norms and discourses may act to facilitate and/or prevent sexual harms, and may normalize and excuse these harms when they occur.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 14 October 2021

Lisa Sugiura

Abstract

Details

The Incel Rebellion: The Rise of the Manosphere and the Virtual War Against Women
Type: Book
ISBN: 978-1-83982-257-5

Open Access
Article
Publication date: 12 April 2021

Anushree Tandon, Amandeep Dhir and Matti Mäntymäki

The association between social media and jealousy is an aspect of the dark side of social media that has garnered significant attention in the past decade. However, the…

21143

Abstract

Purpose

The association between social media and jealousy is an aspect of the dark side of social media that has garnered significant attention in the past decade. However, the understanding of this association is fragmented and needs to be assimilated to provide scholars with an overview of the current boundaries of knowledge in this area. This systematic literature review (SLR) aims to fulfill this need.

Design/methodology/approach

The authors undertake an SLR to assimilate the current knowledge regarding the association between social media and jealousy, and they examine the phenomenon of social media-induced jealousy (SoMJ). Forty-five empirical studies are curated and analyzed using stringent protocols to elucidate the existing research profile and thematic research areas.

Findings

The research themes emerging from the SLR are (1) the need for a theoretical and methodological grounding of the concept, (2) the sociodemographic differences in SoMJ experiences, (3) the antecedents of SoMJ (individual, partner, rival and platform affordances) and (4) the positive and negative consequences of SoMJ. Conceptual and methodological improvements are needed to undertake a temporal and cross-cultural investigation of factors that may affect SoMJ and acceptable thresholds for social media behavior across different user cohorts. This study also identifies the need to expand current research boundaries by developing new methodologies and focusing on under-investigated variables.

Originality/value

The study may assist in the development of practical measures to raise awareness about the adverse consequences of SoMJ, such as intimate partner violence and cyberstalking.

Details

Internet Research, vol. 31 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

1 – 10 of 760