Search results

1 – 10 of 19

Abstract

Details

Business and Management Doctorates World-Wide: Developing the Next Generation
Type: Book
ISBN: 978-1-78973-500-0

Open Access
Book part
Publication date: 4 June 2021

Jane Bailey, Nicola Henry and Asher Flynn

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as…

Abstract

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as technology-facilitated violence and abuse (TFVA). TFVA includes a spectrum of behaviors perpetrated online, offline, and through a range of technologies, including artificial intelligence, livestreaming, GPS tracking, and social media. This chapter provides an overview of TFVA, including a brief snapshot of existing quantitative and qualitative research relating to various forms of TFVA. It then discusses the aims and contributions of this book as a whole, before outlining five overarching themes arising from the contributions. The chapter concludes by mapping out the structure of the book.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Bronwyn Carlson and Ryan Frazer

Broadly understood as repeated, intentional, and aggressive behaviors facilitated by digital technologies, cyberbullying has been identified as a significant public health concern…

Abstract

Broadly understood as repeated, intentional, and aggressive behaviors facilitated by digital technologies, cyberbullying has been identified as a significant public health concern in Australia. However, there have been critical debates about the theoretical and methodological assumptions of cyberbullying research. On the whole, this research has demonstrated an aversion to accounting for context, difference, and complexity. This insensitivity to difference is evident in the absence of nuanced accounts of Indigenous people's experiences of cyberbullying. In this chapter, we extend recent critiques of dominant approaches to cyberbullying research and argue for novel theoretical and methodological engagements with Indigenous people's experiences of cyberbullying. We review a range of literature that unpacks the many ways that social, cultural, and political life is different for Indigenous peoples. More specifically, we demonstrate there are good reasons to assume that online conflict is different for Indigenous peoples, due to diverse cultural practices and the broader political context of settler-colonialism. We argue that the standardization of scholarly approaches to cyberbullying is delimiting its ability to attend to social difference in online conflict, and we join calls for more theoretically rigorous, targeted, difference-sensitive studies into bullying.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Elena Cama

In recent years, the use of dating and hook up apps has become an increasingly socially acceptable and commonly used method of seeking romantic and sexual partners. This has seen…

Abstract

In recent years, the use of dating and hook up apps has become an increasingly socially acceptable and commonly used method of seeking romantic and sexual partners. This has seen a corresponding rise in media and crime reports of sexual harms facilitated through these services, including sexual harassment, unsolicited sexual imagery, and sexual assault. Emerging empirical research shows that experiences of sexual harms in this context are common and predominantly impact women and girls. The aim of this chapter is to examine the sociocultural and sexual norms that underpin online dating and which perpetuate a “rape culture” within which sexual harms become both possible and normalized. This chapter also considers how the discourses that minimize and legitimize sexual harms are encoded within the responses undertaken by dating and hook up apps to sexual harms. It is argued that together these norms and discourses may act to facilitate and/or prevent sexual harms, and may normalize and excuse these harms when they occur.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Suzie Dunn

When discussing the term “technology-facilitated violence” (TFV) it is often asked: “Is it actually violence?” While international human rights standards, such as the United…

Abstract

When discussing the term “technology-facilitated violence” (TFV) it is often asked: “Is it actually violence?” While international human rights standards, such as the United Nations' Convention on the Elimination of All Forms of Discrimination against Women (United Nations General Assembly, 1979), have long recognized emotional and psychological abuse as forms of violence, including many forms of technology-facilitated abuse (United Nations, 2018), law makers and the general public continue to grapple with the question of whether certain harmful technology-facilitated behaviors are actually forms of violence. This chapter explores this question in two parts. First, it reviews three theoretical concepts of violence and examines how these concepts apply to technology-facilitated behaviors. In doing so, this chapter aims to demonstrate how some harmful technology-facilitated behaviors fit under the greater conceptual umbrella of violence. Second, it examines two recent cases, one from the British Columbia Court of Appeal (BCCA) in Canada and a Romanian case from the European Court of Human Rights (ECtHR), that received attention for their legal determinations on whether to define harmful technology-facilitated behaviors as forms of violence or not. This chapter concludes with observations on why we should conceptualize certain technology-facilitated behaviors as forms of violence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Bridget Harris and Delanie Woodlock

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical…

Abstract

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical framework for technology-facilitated harms in heterosexual relationships which we characterize as digital coercive control. Here, we include behaviors which can be classified as abuse and stalking and also individualized tactics which are less easy to categorize, but evoke fear and restrict the freedoms of a particular woman. Drawing on their knowledge of a victim/survivor's experiences and, in the context of patterns and dynamics of abuse, digital coercive control strategies are personalized by perpetrators and extend and exacerbate “real-world” violence.

Digital coercive control is unique because of its spacelessness and the ease, speed, and identity-shielding which technology affords. Victim/survivors describe how perpetrator use of technology creates a sense of omnipresence and omnipotence which can deter women from exiting violent relationships and weakens the (already tenuous) notion that abuse can be “escaped.” We contend that the ways that digital coercive control shifts temporal and geographic boundaries warrant attention. However, spatiality more broadly cannot be overlooked. The place and shape in which victim/survivors and perpetrators reside will shape both experiences of and response to violence. In this chapter, we explore these ideas, reporting on findings from a study on digital coercive control in regional, rural, and remote Australia. We adopt a feminist research methodology in regard to our ethos, research processes, analysis, and the outputs and outcomes of our project. Women's voices are foreground in this approach and the emphasis is on how research can be used to inform, guide, and develop responses to domestic violence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Alison J. Marganski and Lisa A. Melander

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology…

Abstract

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology demands that we pay attention to not only harms associated with interconnectivity, but also the potential for technology to counter offenses and “do good.” This chapter discusses technology as both a weapon and a shield when it comes to violence against women and girls in public spaces and private places. First, we review the complex and varied manifestations of technological gender violence, ranging from the use of technology to exploit, harass, stalk, and otherwise harm women and girls in communal spaces, to offenses that occur behind closed doors. Second, we discuss justice-related responses, underscoring how women and girls have “flipped the script” when their needs are not met. By developing innovative ways to respond to the wrongs committed against them and creating alternate systems that offer a voice, victims/survivors have repurposed technology to redress harms and unite in solidarity with others in an ongoing quest for justice.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Briony Anderson and Mark A. Wood

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…

Abstract

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Laura Vitis

Technology-facilitated violence against women (TFVW) is readily becoming a key site of analysis for feminist criminologists. The scholarship in this area has identified online…

Abstract

Technology-facilitated violence against women (TFVW) is readily becoming a key site of analysis for feminist criminologists. The scholarship in this area has identified online sexual harassment, contact-based harassment, image-based abuse, and gender-based cyberhate – among others – as key manifestations of TFVW. It has also unpacked the legal strategies available to women seeking formal justice outcomes. However, much of the existing empirical scholarship has been produced within countries like the United States, United Kingdom, and Australia, and there has been limited research on this phenomenon within South East Asia. As such, this chapter maps how technology is shaping Singaporean women's experiences of gendered, sexual, and domestic violence. To do so, it draws upon findings from a research project which examined TFVW in Singapore by utilizing semistructured interviews with frontline workers in the fields of domestic and sexual violence and LGBT services. Drawing from Dragiewicz et al.’s (2018) work on technology-facilitated coercive control (TFCC), I argue that victims-survivors of dating, domestic, and family violence need to be provided with support that is TFCC informed and technically guided. I also suggest that further research is needed to fully understand the prevalence and nature of TFVW in the Singaporean context.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Ella Broadbent and Chrissy Thompson

This chapter examines the structure and sentiment of the Twitter response to Nathan Broad's naming as the originator of an image-based sexual abuse incident following the 2017…

Abstract

This chapter examines the structure and sentiment of the Twitter response to Nathan Broad's naming as the originator of an image-based sexual abuse incident following the 2017 Australian Football League Grand Final. Employing Social Network Analysis to visualize the hierarchy of Twitter users responding to the incident and Applied Thematic Analysis to trace the diffusion of differing streams of sentiment within this hierarchy, we produced a representation of participatory social media engagement in the context of image-based sexual abuse. Following two streams of findings, a model of social media user engagement was established that hierarchized the interplay between institutional and personal Twitter users. In this model, it was observed that the Broad incident generated sympathetic and compassionate discourses among an articulated network of social media users. This sentiment gradually diffused to institutional Twitter users – or Reference accounts – through the process of intermedia agenda-setting, whereby the narrative of terrestrial media accounts was altered by personal Twitter users over time.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 10 of 19