Search results

1 – 10 of 28
Open Access
Book part
Publication date: 4 June 2021

Christopher Dietzel

Rape culture, described as when “violence is seen as sexy and sexuality as violent” (Buchwald, Fletcher, & Roth, 1993, p. vii), exists online and offline (Henry & Powell, 2014)…

Abstract

Rape culture, described as when “violence is seen as sexy and sexuality as violent” (Buchwald, Fletcher, & Roth, 1993, p. vii), exists online and offline (Henry & Powell, 2014). Much of the research on rape culture focuses on the experiences of heterosexual women, and few studies have explored rape culture in the context of dating apps. This chapter explores how men who have sex with men (MSM) understand and experience rape culture through their use of Grindr and similar dating apps. A thematic analysis of interviews with 25 MSM dating app users revealed problematic user behavior as well as unwanted sexual messages and images as common manifestations of rape culture on dating apps. Participants explained that rape culture extends beyond in-app interactions to in-person encounters, as evident by incidents of sexual violence that several participants had experienced and one participant had committed. Participants were unsure about the extent to which MSM dating apps facilitate rape culture but asserted that some apps enable rape culture more than others. This chapter demonstrates the importance of investigating sexual violence against people of diverse gender and sexual identities to ensure their experiences are not minimized, ignored, or rendered invisible.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Ari Ezra Waldman

Mobile dating apps are widely used in the queer community. Whether for sexual exploration or dating, mobile and geosocial dating apps facilitate connection. But they also bring…

Abstract

Mobile dating apps are widely used in the queer community. Whether for sexual exploration or dating, mobile and geosocial dating apps facilitate connection. But they also bring attendant privacy risks. This chapter is based on original research about the ways gay and bisexual men navigate their privacy on geosocial dating apps geared toward the LGBTQI community. It argues that, contrary to the conventional wisdom that people who share semi-nude or nude photos do not care about their privacy, gay and bisexual users of geosocial dating apps care very much about their privacy and engage in complex, overlapping privacy navigation techniques when sharing photos. They share semi-nude and nude photos for a variety of reasons, but generally do so only after building organic trust with another person. Because trust can easily break down without supportive institutions, this chapter argues that law and design must help individuals protect their privacy on geosocial dating apps.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Nicola Henry and Alice Witt

The nonconsensual taking or sharing of nude or sexual images, also known as “image-based sexual abuse,” is a major social and legal problem in the digital age. In this chapter, we…

Abstract

The nonconsensual taking or sharing of nude or sexual images, also known as “image-based sexual abuse,” is a major social and legal problem in the digital age. In this chapter, we examine the problem of image-based sexual abuse in the context of digital platform governance. Specifically, we focus on two key governance issues: first, the governance of platforms, including the regulatory frameworks that apply to technology companies; and second, the governance by platforms, focusing on their policies, tools, and practices for responding to image-based sexual abuse. After analyzing the policies and practices of a range of digital platforms, we identify four overarching shortcomings: (1) inconsistent, reductionist, and ambiguous language; (2) a stark gap between the policy and practice of content regulation, including transparency deficits; (3) imperfect technology for detecting abuse; and (4) the responsibilization of users to report and prevent abuse. Drawing on a model of corporate social responsibility (CSR), we argue that until platforms better address these problems, they risk failing victim-survivors of image-based sexual abuse and are implicated in the perpetration of such abuse. We conclude by calling for reasonable and proportionate state-based regulation that can help to better align governance by platforms with CSR-initiatives.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 23 August 2023

Giulio Ferrigno, Nicola Del Sarto, Andrea Piccaluga and Alessandro Baroncelli

The objective of this study is to examine current business and management research on “Industry 4.0 base technologies” and “business models” to shed light on this vast literature…

1748

Abstract

Purpose

The objective of this study is to examine current business and management research on “Industry 4.0 base technologies” and “business models” to shed light on this vast literature and to point out future research agenda.

Design/methodology/approach

The authors conducted a bibliometric analysis of scientific publications based on 482 documents collected from the Scopus database and a co-citation analysis to provide an overview of business model studies related to Industry 4.0 base technologies. After that a qualitative analysis of the articles was also conducted to identify research trends and trajectories.

Findings

The results reveal the existence of five research themes: smart products (cluster 1); business model innovation (cluster 2); technological platforms (cluster 3); value creation and appropriation (cluster 4); and digital business models (cluster 5). A qualitative analysis of the articles was also conducted to identify research trends and trajectories.

Research limitations/implications

First, the dataset was collected through Scopus. The authors are aware that other databases, such as Web of Science, can be used to deepen the focus of quantitative bibliometric analysis. Second, the authors based this analysis on the Industry 4.0 base technologies identified by Frank et al. (2019). The authors recognize that Industry 4.0 comprises other technologies beyond IoT, cloud computing, big data and analytics.

Practical implications

Drawing on these analyses, the authors submit a useful baseline for developing Industry 4.0 base technologies and considering their implications for business models.

Originality/value

In this paper, the authors focus their attention on the relationship between technologies underlying the fourth industrial revolution, identified by Frank et al. (2019), and the business model, with a particular focus on the developments that have occurred over the last decade and the authors performed a bibliometric analysis to consider all the burgeoning literature on the topic.

Details

European Journal of Innovation Management, vol. 26 no. 7
Type: Research Article
ISSN: 1460-1060

Keywords

Open Access
Book part
Publication date: 4 June 2021

Suzie Dunn

When discussing the term “technology-facilitated violence” (TFV) it is often asked: “Is it actually violence?” While international human rights standards, such as the United…

Abstract

When discussing the term “technology-facilitated violence” (TFV) it is often asked: “Is it actually violence?” While international human rights standards, such as the United Nations' Convention on the Elimination of All Forms of Discrimination against Women (United Nations General Assembly, 1979), have long recognized emotional and psychological abuse as forms of violence, including many forms of technology-facilitated abuse (United Nations, 2018), law makers and the general public continue to grapple with the question of whether certain harmful technology-facilitated behaviors are actually forms of violence. This chapter explores this question in two parts. First, it reviews three theoretical concepts of violence and examines how these concepts apply to technology-facilitated behaviors. In doing so, this chapter aims to demonstrate how some harmful technology-facilitated behaviors fit under the greater conceptual umbrella of violence. Second, it examines two recent cases, one from the British Columbia Court of Appeal (BCCA) in Canada and a Romanian case from the European Court of Human Rights (ECtHR), that received attention for their legal determinations on whether to define harmful technology-facilitated behaviors as forms of violence or not. This chapter concludes with observations on why we should conceptualize certain technology-facilitated behaviors as forms of violence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Elina Vaahensalo

The growth of online communities and social media has led to a growing need for methods, concepts, and tools for researching online cultures. Particular attention should be paid…

Abstract

The growth of online communities and social media has led to a growing need for methods, concepts, and tools for researching online cultures. Particular attention should be paid to polarizing online discussion cultures and dynamics that increase inequality in online environments. Social media has enormous potential to create good, but in order to unlock its full potential, we also need to examine the mechanisms keeping these spaces monotonous, homogenous, and even hostile toward some groups. With this need in mind, I have developed the concept and theory of othering online discourse (OOD).

This chapter introduces and defines the concept of OOD and explains the key characteristics and different attributes of OOD in relation to other concepts that deal with disruptive and discriminatory behavior in online spaces. The attributes of OOD are demonstrated drawing on examples gathered from the Finnish Suomi24 (Finland24) forum.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Chandell Gosse

Online environments have become a central part of our social, private, and economic life. The term for this is “digital existence,” characterized as a new epoch in mediated…

Abstract

Online environments have become a central part of our social, private, and economic life. The term for this is “digital existence,” characterized as a new epoch in mediated experience. Over the last decade, there has been a growing interest in how online abuse impacts one's digital existence. Drawing on 15 interviews with women, this chapter demonstrates a type of labor—which I call “ontological labor”—that women exercise when processing their own experiences of online abuse, and when sharing their experiences with others. Ontological labor is the process of overcoming a denial of experience. In the case of online abuse, this denial stems partly from the treatment of online and offline life as separate and opposing. This division is known as digital dualism, which I argue is a discourse that denies women the space to have their experiences of online abuse recognized as such.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Emma A. Jane

While a growing body of literature reveals the prevalence of men's harassment and abuse of women online, scant research has been conducted into women's attacks on each other in…

Abstract

While a growing body of literature reveals the prevalence of men's harassment and abuse of women online, scant research has been conducted into women's attacks on each other in digital networked environments. This chapter responds to this research gap by analyzing data obtained from qualitative interviews with Australian women who have received at times extremely savage cyberhate they know or strongly suspect was sent by other women. Drawing on scholarly literature on historical intra-feminism schisms – specifically what have been dubbed the “mommy wars” and the “sex wars” – this chapter argues that the conceptual lenses of internalized misogyny and lateral violence are useful in their framing of internecine conflict within marginalized groups as diagnostic of broader, systemic oppression rather than being solely the fault of individual actors. These lenses, however, require multiple caveats and have many limitations. In conclusion, I canvas the possibility that the pressure women may feel to present a united front in the interests of feminist politics could itself be considered an outcome of patriarchal oppression (even if performing solidarity is politically expedient and/or essential). As such, there might come a time when openly renouncing discourses of sisterhood and feeling free to disagree with, and even dislike, other women might be considered markers of liberation.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Laura Vitis

Technology-facilitated violence against women (TFVW) is readily becoming a key site of analysis for feminist criminologists. The scholarship in this area has identified online…

Abstract

Technology-facilitated violence against women (TFVW) is readily becoming a key site of analysis for feminist criminologists. The scholarship in this area has identified online sexual harassment, contact-based harassment, image-based abuse, and gender-based cyberhate – among others – as key manifestations of TFVW. It has also unpacked the legal strategies available to women seeking formal justice outcomes. However, much of the existing empirical scholarship has been produced within countries like the United States, United Kingdom, and Australia, and there has been limited research on this phenomenon within South East Asia. As such, this chapter maps how technology is shaping Singaporean women's experiences of gendered, sexual, and domestic violence. To do so, it draws upon findings from a research project which examined TFVW in Singapore by utilizing semistructured interviews with frontline workers in the fields of domestic and sexual violence and LGBT services. Drawing from Dragiewicz et al.’s (2018) work on technology-facilitated coercive control (TFCC), I argue that victims-survivors of dating, domestic, and family violence need to be provided with support that is TFCC informed and technically guided. I also suggest that further research is needed to fully understand the prevalence and nature of TFVW in the Singaporean context.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Moira Aikenhead

Canada criminalized the nonconsensual distribution of intimate images in 2014. Lawmakers and commentators noted that this new offense would fill a legislative gap in relation to…

Abstract

Canada criminalized the nonconsensual distribution of intimate images in 2014. Lawmakers and commentators noted that this new offense would fill a legislative gap in relation to “revenge pornography,” which entails individuals (typically men) sharing intimate images of their ex-partners (typically women) online in an attempt to seek revenge or cause them harm. Feminist writers and activists categorize revenge pornography as a symptom and consequence of “rape culture,” in which sexual violence is routinely trivialized and viewed as acceptable or entertaining, and women are blamed for their sexual victimization. In this chapter, I analyze Canada's burgeoning revenge pornography case law and find that these cases support an understanding of revenge pornography as a serious form of communal, gendered, intimate partner violence, which is extremely effective at harming victims because of broader rape culture. While Canadian judges are taking revenge pornography seriously, there is some indication from the case law that they are at risk of relying on gendered reasoning and assumptions previously observed by feminists in sexual assault jurisprudence, which may have the result of bolstering rape culture, rather than contesting it.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 10 of 28