Search results

1 – 10 of over 19000
Article
Publication date: 7 November 2023

Janine Arantes

The purpose of this scoping rapid review was to identify and analyse existing qualitative methodologies that have been used to investigate K-12 teachers' lived experiences of…

Abstract

Purpose

The purpose of this scoping rapid review was to identify and analyse existing qualitative methodologies that have been used to investigate K-12 teachers' lived experiences of adult cyber abuse as a result of student content “going viral” to propose a novel methodological stance incorporating the Australian Online Safety Act 2021.

Design/methodology/approach

A search of Google Scholar was conducted using keywords and phrases related to cyber trauma, teachers, qualitative methods and the Online Safety Act. Inclusion criteria for the review were: (1) published in English, (2) focused on teachers' experiences of online abuse and cyberbullying associated with viral posts and (3) employed a qualitative inquiry methodology. Full-text articles were obtained for those that met the inclusion criteria. Data were extracted and analysed using a PRISMA flowchart and inductive thematic analysis.

Findings

This methodology is considered to be justified, as the eSafety Commissioner's Safety-by-Design principles do not have any legal or regulatory enforceability, whereas the Online Safety Act 2021 provides the Australian eSafety Commissioner an avenue to drive greater algorithmic transparency and accountability.

Research limitations/implications

The findings of this review informed the development of a novel methodological stance for investigating Australian teachers' lived experiences of adult cyber abuse associated with viral posts. It provides a methodological positioning to support trauma informed qualitative research into adult cyber abuse, informed by the work of the eSafety Commissioner and the Online Safety Act.

Originality/value

Cybertrauma is described as “any trauma that is a result of self- or, other-directed interaction with, mediated through, or from any electronic Internet/cyberspace ready device or machine learning algorithm, that results in impact now or the future” (Knibbs, 2021). It may result from the tracking of movement through various mobile phone features and applications such as location sharing, non-consensual monitoring of social media, and humiliation or punishment through the sharing of intimate images online, through to direct messages of abuse or threats of violence or humiliation. These actions are further perpetuated through automated searches, insights and recommendations on social media (i.e. engagement metrics promote memes, Facebook posts, Tweets, Tiktoks, Youtubes and so on). This is a novel methodology, as it not only considers direct cybertrauma but also automated forms of cybertrauma.

Details

Qualitative Research Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1443-9883

Keywords

Open Access
Book part
Publication date: 4 June 2021

Pam Hrick

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory…

Abstract

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory mandates as part of an effort to combat it. This chapter argues that these bodies have the potential to meaningfully further a survivor-centered approach to combatting technology-facilitated violence against women – one that places their experiences, rights, wishes, and needs at its core. It further argues that governments should consider integrating them into a broader holistic response to this conduct.

An overview is provided of the operations of New Zealand's Netsafe, the eSafety Commissioner in Australia, Nova Scotia's Cyberscan Unit, and the Canadian Centre for Child Protection in Manitoba. These types of centralized bodies have demonstrated an ability to advance survivor-centered approaches to technology-facilitated violence against women through direct involvement in resolving instances of violence, education, and research. However, these bodies are not a panacea. This chapter outlines critiques of their operations and the challenges they face in maximizing their effectiveness.

Notwithstanding these challenges and critiques, governments should consider creating such bodies or empowering existing bodies with a statutory mandate as one aspect of a broader response to combatting technology-facilitated violence against women. Some proposed best practices to maximize their effectiveness are identified.

Open Access
Book part
Publication date: 4 June 2021

Michael Salter and Elly Hanson

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the…

Abstract

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the absence of adequate intervention by internet service providers, social media platforms, and government. The chapter discusses the history of online CSE, focusing on regulatory stances over time in which online risks to children have been cast as natural and inevitable by the hegemony of a “cyberlibertarian” ideology. We illustrate the success of this ideology, as well as its profound contradictions and ethical failures, by presenting key examples in which internet users have taken decisive action to prevent online CSE and promote the removal of CSAM. Rejecting simplistic characterizations of “vigilante justice,” we argue instead that the fact that often young internet users report feeling forced to act against online CSE and CSAM undercuts libertarian claims that internet regulation is impossible, unworkable, and unwanted. Recent shifts toward a more progressive ethos of online harm minimization are promising; however, this ethos risks offering a new legitimizing ideology for online business models that will continue to put children at risk of abuse and exploitation. In conclusion, we suggest ways forward toward an internet built in the interests of children, rather than profit.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Executive summary
Publication date: 8 August 2024

UK: Ofcom letter renews focus on the Online Safety Act

Details

DOI: 10.1108/OXAN-ES288859

ISSN: 2633-304X

Keywords

Geographic
Topical
Expert briefing
Publication date: 6 September 2024

The digital regulation, which is set to come into full force in 2025, has faced scrutiny over its enforcement capacity and ability to tackle misinformation effectively.

Details

DOI: 10.1108/OXAN-DB289472

ISSN: 2633-304X

Keywords

Geographic
Topical
Expert briefing
Publication date: 5 July 2024

The effort had become a test case for the government’s ability to enforce online safety standards. eSafety will pursue legal action against X, formerly known as Twitter, for…

Details

DOI: 10.1108/OXAN-DB288060

ISSN: 2633-304X

Keywords

Geographic
Topical
Executive summary
Publication date: 9 August 2024

INT: Google-Meta ad row promises online safety rules

Details

DOI: 10.1108/OXAN-ES288880

ISSN: 2633-304X

Keywords

Geographic
Topical
Executive summary
Publication date: 31 January 2024

US: Hearing on child safety may not pave way for law

Details

DOI: 10.1108/OXAN-ES284936

ISSN: 2633-304X

Keywords

Geographic
Topical
Expert briefing
Publication date: 14 December 2023

Notable poll-bound countries include the United States, India, Russia, Ukraine, Indonesia, Egypt and South Africa, and possibly the United Kingdom. Textual and audio-visual…

Details

DOI: 10.1108/OXAN-DB284024

ISSN: 2633-304X

Keywords

Geographic
Topical
Open Access
Article
Publication date: 16 April 2024

Iddrisu Mohammed, Alexander Preko, Samuel Kwami Agbanu, Timothy K. Zilevu and Akorfa Wuttor

This conceptual paper aims to explore government regulatory responses of social networking platforms (SNP) and tourism destination evangelism. This research draws on a two-phase…

Abstract

Purpose

This conceptual paper aims to explore government regulatory responses of social networking platforms (SNP) and tourism destination evangelism. This research draws on a two-phase data source review of government legislations that guarantee social media users and empirical papers related to social media platforms. The results revealed that Ghana has adopted specific legislations that manage and control SNP. To the best of the author’s knowledge, this study is the first of its kind that synthesized government legislation and empirical papers on social networking platforms in evangelising destinations which have been missing in extant literature.

Details

Tourism Critiques: Practice and Theory, vol. 5 no. 1
Type: Research Article
ISSN: 2633-1225

Keywords

1 – 10 of over 19000