Search results

1 – 10 of 19
Content available
Book part
Publication date: 25 July 2014

Abstract

Details

The Future of Learning and Teaching in Next Generation Learning Spaces
Type: Book
ISBN: 978-1-78350-986-7

Content available
Book part
Publication date: 14 November 2018

Fergus McNeill

Abstract

Details

Pervasive Punishment
Type: Book
ISBN: 978-1-78756-466-4

Content available
Book part
Publication date: 12 July 2017

Mike Rosenberg

Abstract

Details

Strategy and Geopolitics
Type: Book
ISBN: 978-1-78714-568-9

Open Access
Book part
Publication date: 4 June 2021

Ari Ezra Waldman

Mobile dating apps are widely used in the queer community. Whether for sexual exploration or dating, mobile and geosocial dating apps facilitate connection. But they also bring…

Abstract

Mobile dating apps are widely used in the queer community. Whether for sexual exploration or dating, mobile and geosocial dating apps facilitate connection. But they also bring attendant privacy risks. This chapter is based on original research about the ways gay and bisexual men navigate their privacy on geosocial dating apps geared toward the LGBTQI community. It argues that, contrary to the conventional wisdom that people who share semi-nude or nude photos do not care about their privacy, gay and bisexual users of geosocial dating apps care very much about their privacy and engage in complex, overlapping privacy navigation techniques when sharing photos. They share semi-nude and nude photos for a variety of reasons, but generally do so only after building organic trust with another person. Because trust can easily break down without supportive institutions, this chapter argues that law and design must help individuals protect their privacy on geosocial dating apps.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Michael Salter and Elly Hanson

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the…

Abstract

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the absence of adequate intervention by internet service providers, social media platforms, and government. The chapter discusses the history of online CSE, focusing on regulatory stances over time in which online risks to children have been cast as natural and inevitable by the hegemony of a “cyberlibertarian” ideology. We illustrate the success of this ideology, as well as its profound contradictions and ethical failures, by presenting key examples in which internet users have taken decisive action to prevent online CSE and promote the removal of CSAM. Rejecting simplistic characterizations of “vigilante justice,” we argue instead that the fact that often young internet users report feeling forced to act against online CSE and CSAM undercuts libertarian claims that internet regulation is impossible, unworkable, and unwanted. Recent shifts toward a more progressive ethos of online harm minimization are promising; however, this ethos risks offering a new legitimizing ideology for online business models that will continue to put children at risk of abuse and exploitation. In conclusion, we suggest ways forward toward an internet built in the interests of children, rather than profit.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Content available
Article
Publication date: 1 April 1999

Michael Hussey and Nicola Duncombe

Research has shown that consumers very often do not use explicit, concrete, rational factors to evaluate products, and thus their motivation to purchase is not always easy to…

8071

Abstract

Research has shown that consumers very often do not use explicit, concrete, rational factors to evaluate products, and thus their motivation to purchase is not always easy to articulate. Traditionally, marketers have used projective techniques in qualitative research groups to overcome this problem. This method is not infallible as each moderator brings his or her own style to discussions and subjective judgement to the interpretation of results, and it is practically impossible to replicate identically over time. The work presented in this paper describes the development of a set of implicit characteristics for two animation sets to which respondents will respond similarly and with consistency, through which we can identify the brand image held and consequently the motivations behind brand choice.

Details

Qualitative Market Research: An International Journal, vol. 2 no. 1
Type: Research Article
ISSN: 1352-2752

Keywords

Content available
Book part
Publication date: 4 December 2023

Stuart Cartland

Abstract

Details

Constructing Realities
Type: Book
ISBN: 978-1-83797-546-4

Content available
Article
Publication date: 7 March 2016

5

Abstract

Details

Gender in Management: An International Journal, vol. 31 no. 1
Type: Research Article
ISSN: 1754-2413

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Content available
Article
Publication date: 6 February 2009

2167

Abstract

Details

International Journal of Operations & Production Management, vol. 29 no. 2
Type: Research Article
ISSN: 0144-3577

Access

Only content I have access to

Year

Content type

1 – 10 of 19