Search results

1 – 10 of 314
Content available
Book part
Publication date: 30 July 2018

Abstract

Details

Marketing Management in Turkey
Type: Book
ISBN: 978-1-78714-558-0

Content available

Abstract

Details

Looking for Information
Type: Book
ISBN: 978-1-80382-424-6

Open Access
Book part
Publication date: 4 June 2021

Briony Anderson and Mark A. Wood

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…

Abstract

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Content available
Book part
Publication date: 15 December 2017

Abstract

Details

The Emerald Handbook of Modern Information Management
Type: Book
ISBN: 978-1-78714-525-2

Content available
Book part
Publication date: 21 July 2022

Ian Ruthven

Abstract

Details

Dealing With Change Through Information Sculpting
Type: Book
ISBN: 978-1-80382-047-7

Open Access
Book part
Publication date: 1 October 2018

Susanne Sackl-Sharif, Eva Goldgruber, Julian Ausserhofer, Robert Gutounig and Gudrun Reimerth

The 2013 Central European floods were not only one of the most severe natural disasters in Austria in the last decades, but also constituted a landmark in crisis communication…

Abstract

The 2013 Central European floods were not only one of the most severe natural disasters in Austria in the last decades, but also constituted a landmark in crisis communication. For the first time, social media and online newspapers were important news channels, creating a need for new crisis communication strategies. Based on 20 semi-structured interviews and an analysis of online data, we reconstruct in this chapter the online communication of different stakeholders such as the authorities, rescue organisations and journalists during this emergency situation. The study shows that the use of social media was a weak point in official crisis communication. Through detailed analyses of information flows and the requirements of different stakeholders, the study reveals new challenges and possibilities for crisis communication in the digital age.

Content available
Book part
Publication date: 30 June 2023

Lisa M. Given, Donald O. Case and Rebekah Willson

Abstract

Details

Looking for Information
Type: Book
ISBN: 978-1-80382-424-6

Content available
Book part
Publication date: 15 July 1991

Abstract

Details

Advances in Librarianship
Type: Book
ISBN: 978-0-12024-615-1

Open Access
Book part
Publication date: 4 June 2021

Kim Barker and Olga Jurasz

The ideal of an open, all-inclusive, and participatory internet has been undermined by the rise of gender-based and misogynistic abuse on social media platforms. Limited progress…

Abstract

The ideal of an open, all-inclusive, and participatory internet has been undermined by the rise of gender-based and misogynistic abuse on social media platforms. Limited progress has been made at supranational and national levels in addressing this issue, and where steps have been taken to combat online violence against women (OVAW), they are typically limited to legislative developments addressing image-based sexual abuse. As such, harms associated with image-based abuse have gained recognition in law while harms caused by text-based abuse (TBA) have not been conceptualized in an equivalent manner.

This chapter critically outlines the lack of judicial consideration given to online harms in British courts, identifying a range of harms arising from TBAs which currently are not recognized by the criminal justice system. We refer to non-traditional harms recognized in cases heard before the British courts, assessing these in light of traditionally recognized harms in established legal authorities. This chapter emphasizes the connection between the harms suffered and the recognition of impact on the victims, demonstrated through specific case studies. Through this assessment, this chapter advocates for greater recognition of online harms within the legal system – especially those which take the forms of misogynistic and/or gendered TBA.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 16 August 2023

Kim Moeller

The growth in cryptomarkets has reinvigorated the research on illicit drug distribution due to the availability of large-scale data. This data has enabled researchers to ask new…

Abstract

The growth in cryptomarkets has reinvigorated the research on illicit drug distribution due to the availability of large-scale data. This data has enabled researchers to ask new and detailed questions about how participants in these markets trust each other enough for the market not to collapse. This question deserves more attention because it has become a taken-for-granted notion that repeated transactions and social categories create trust. Whether online or on the street, economic exchanges under illegality are more uncertain than transactions in the legal economy. This puts higher demands on trust, as there is less information and the stakes are higher. In this chapter, the author presents definitions, typologies, and disciplinary contributions to the study of trust and examine how it has been operationalised in a sample of 13 peer-reviewed articles. These articles focus on three dimensions of trust: process-based trust that derives from repeated transactions with known partners; character-based trust measured by the networked reputation scores; and institutional-based trust in the platform and its administrators. In practice, the trust bases are intertwined. Drawing on the broader social science literature on trust, a mesolevel operationalisation that centres on networked reputation scores as embedded in processes and institutions can draw the research together in a multidisciplinary framework.

Details

Digital Transformations of Illicit Drug Markets: Reconfiguration and Continuity
Type: Book
ISBN: 978-1-80043-866-8

Keywords

Access

Only content I have access to

Year

Content type

Book part (314)
1 – 10 of 314