Search results

1 – 10 of 16
Open Access
Book part
Publication date: 4 June 2021

Pam Hrick

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory…

Abstract

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory mandates as part of an effort to combat it. This chapter argues that these bodies have the potential to meaningfully further a survivor-centered approach to combatting technology-facilitated violence against women – one that places their experiences, rights, wishes, and needs at its core. It further argues that governments should consider integrating them into a broader holistic response to this conduct.

An overview is provided of the operations of New Zealand's Netsafe, the eSafety Commissioner in Australia, Nova Scotia's Cyberscan Unit, and the Canadian Centre for Child Protection in Manitoba. These types of centralized bodies have demonstrated an ability to advance survivor-centered approaches to technology-facilitated violence against women through direct involvement in resolving instances of violence, education, and research. However, these bodies are not a panacea. This chapter outlines critiques of their operations and the challenges they face in maximizing their effectiveness.

Notwithstanding these challenges and critiques, governments should consider creating such bodies or empowering existing bodies with a statutory mandate as one aspect of a broader response to combatting technology-facilitated violence against women. Some proposed best practices to maximize their effectiveness are identified.

Open Access
Book part
Publication date: 4 June 2021

Alison J. Marganski and Lisa A. Melander

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology…

Abstract

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology demands that we pay attention to not only harms associated with interconnectivity, but also the potential for technology to counter offenses and “do good.” This chapter discusses technology as both a weapon and a shield when it comes to violence against women and girls in public spaces and private places. First, we review the complex and varied manifestations of technological gender violence, ranging from the use of technology to exploit, harass, stalk, and otherwise harm women and girls in communal spaces, to offenses that occur behind closed doors. Second, we discuss justice-related responses, underscoring how women and girls have “flipped the script” when their needs are not met. By developing innovative ways to respond to the wrongs committed against them and creating alternate systems that offer a voice, victims/survivors have repurposed technology to redress harms and unite in solidarity with others in an ongoing quest for justice.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 15 December 2002

C. B. Crawford and C. Sue Strohkirch

As we move rapidly into the 21st century leaders face the challenge of being effective in a global knowledge environment. Now, more than ever, leaders must play the key role in…

Abstract

As we move rapidly into the 21st century leaders face the challenge of being effective in a global knowledge environment. Now, more than ever, leaders must play the key role in helping organizations cope with the challenges they face from expanding knowledge and knowledge systems. Leaders must guide changes in a climate of increased competition to fill customer demands. This paper addresses the nature of the rapidly changing knowledge organization through an exploration of the traditional leadership paradigms, an examination of current trends in knowledge management and the learning organization, and by finally considering the role of leaders and leadership education in the emerging knowledge organization.

Details

Journal of Leadership Education, vol. 1 no. 2
Type: Research Article
ISSN: 1552-9045

Open Access
Book part
Publication date: 4 June 2021

Anne Cheung

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual…

Abstract

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual concerned. Intuitively, it is tempting to condemn doxing as a crude form of cyber violence that weaponizes personal data. When it is used as a strategy of resistance by the powerless to hold the powerful accountable, however, a more nuanced understanding is called for. This chapter focuses on the doxing phenomenon in Hong Kong, where doxing incidents against police officers and their family members have skyrocketed since 2019 (a 75-fold increase over 2018). It contends that doxing for political purposes is closely related to digital vigilantism, signifying a loss of confidence in the ruling authority and a yearning for an alternative form of justice. The chapter therefore argues that public interest should be recognized as a legal defense in doxing cases when those discharging or entrusted with public duty are the targets. Equally, it is important to confine the categories of personal data disclosed to information necessary to reveal the alleged wrongdoer or wrongdoing. Only in this way can a fair balance be struck between privacy, freedom of expression, and public interest.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Eva PenzeyMoog and Danielle C. Slakoff

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this…

Abstract

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this chapter, we discuss three unique types of technological abuse: (1) financial abuse via banking websites and apps; (2) abuse via smart home devices (i.e., “Internet of Things” abuse); and (3) stalking via geo-location or GPS. We also argue pregnancy and wellness apps provide an opportunity for meaningful intervention for pregnant victims of domestic violence.

While there is no way to ensure users' safety in all situations, we argue thoughtful considerations while designing and building digital products can result in meaningful contributions to victims' safety. This chapter concludes with PenzeyMoog's (2020) “Framework for Inclusive Safety,” which is a roadmap for building technology that increases the safety of domestic violence survivors. This framework includes three key points: (1) the importance of educating technologists about domestic violence; (2) the importance of identifying possible abuse situations and designing against them; and (3) identifying user interactions that might signal abuse and offering safe interventions.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Michael Salter and Elly Hanson

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the…

Abstract

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the absence of adequate intervention by internet service providers, social media platforms, and government. The chapter discusses the history of online CSE, focusing on regulatory stances over time in which online risks to children have been cast as natural and inevitable by the hegemony of a “cyberlibertarian” ideology. We illustrate the success of this ideology, as well as its profound contradictions and ethical failures, by presenting key examples in which internet users have taken decisive action to prevent online CSE and promote the removal of CSAM. Rejecting simplistic characterizations of “vigilante justice,” we argue instead that the fact that often young internet users report feeling forced to act against online CSE and CSAM undercuts libertarian claims that internet regulation is impossible, unworkable, and unwanted. Recent shifts toward a more progressive ethos of online harm minimization are promising; however, this ethos risks offering a new legitimizing ideology for online business models that will continue to put children at risk of abuse and exploitation. In conclusion, we suggest ways forward toward an internet built in the interests of children, rather than profit.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 5 May 2021

Vidhi Chaudhri, Tessa Oomen, Jason Pridmore and Alexandra Joon

Guided by the growing importance of social-mediated organisational communication, this study examines how communication professionals within healthcare organisations perceive and…

4461

Abstract

Purpose

Guided by the growing importance of social-mediated organisational communication, this study examines how communication professionals within healthcare organisations perceive and respond to the reputation impacts of social media on the organisation’s reputation. Although the healthcare sector finds itself in the midst of a (continually) transforming landscape characterised by large amounts of digital health (mis)information and an empowered “patient-as-consumer”, little is known about how professionals in this sector understand the changes and respond to them. Moreover, much extant scholarship on the topic is published in specialised health or medical journals and does not explicitly address the communication implications for healthcare organisations.

Design/methodology/approach

In-depth semi-structured interviews were conducted with communication professionals responsible for social media across eight hospitals in the Netherlands. The sample included two participants working as communication consultants/social media advisors for healthcare organisations. In all, 15 interviews were conducted.

Findings

Building on interviewee perspectives, the authors advance the CARE (Control, Access(ability), Responsive(ness) and Engagement) model of social-mediated communication, highlighting the dualistic characteristics of each dimension. This model is built upon a careful analysis of healthcare professional responses. In an always-on environment, understanding and managing the tensions within the authors’ model may be decisive to the reputation implications of social media use.

Originality/value

Understanding the tensions within each dimension lends a more nuanced perspective on the potential impact(s) of social media as experienced by professionals in the field. In shifting away from a binary, either/or approach, the paper contributes to explicating the complexities of a pervasive phenomenon (i.e. social-mediated communication) and its multifaceted impacts on the healthcare sector.

Details

Journal of Communication Management, vol. 25 no. 2
Type: Research Article
ISSN: 1363-254X

Keywords

Open Access
Article
Publication date: 7 January 2019

Elyria Angela Kemp, Kim Williams, Dong-Jun Min and Han Chen

The purpose of this paper is to examine the psychological influence that the presence of music has on consumers’ evaluations of the service environment. Specifically, it…

5633

Abstract

Purpose

The purpose of this paper is to examine the psychological influence that the presence of music has on consumers’ evaluations of the service environment. Specifically, it investigates how emotion regulation processes and the impact of emotions/mood are linked to consumers’ evaluation of service and product quality.

Design/methodology/approach

An exploratory study was conducted using industry professionals in order to garner insight about the value of music and its benefits in the service environment. A field experiment was then conducted to test hypotheses.

Findings

Industry professionals offer implicit theories about the value of music. Specifically, they propose that music can be used to help customers regulate emotions and improve mood, enhance the customer experience and help in attracting new consumer segments. Results from the field experiment found that those exposed to music were likely to improve mood, express more favorable evaluations of the service and product quality of the establishment, as well as exhibit stronger intentions to continue to patronize the establishment.

Practical implications

Using live music in the service environment can be beneficial to organizations by improving customers’ emotional/psychological status as well as their evaluation of the consumption experience.

Originality/value

This research contributes to the existing literature by demonstrating how emotion regulation processes and the impact of emotions/mood are linked to consumers’ evaluation of service and product quality. Also, support for mood congruency judgment is found. Participants in the field study who had been exposed to music indicated that they made efforts to improve their mood and subsequently had more favorable judgments of service and product quality.

Details

International Hospitality Review, vol. 33 no. 1
Type: Research Article
ISSN: 2516-8142

Keywords

Open Access
Book part
Publication date: 30 November 2023

Francois van Schalkwyk and Nico Cloete

Relations in university settings are becoming more heterogeneous in terms of race, ethnicity, religion, nationality, class, and gender. In South Africa, transformation imperatives…

Abstract

Relations in university settings are becoming more heterogeneous in terms of race, ethnicity, religion, nationality, class, and gender. In South Africa, transformation imperatives have radically changed the complexion of the country’s university campuses but have also entrenched political imperatives in its universities. As a consequence, the university is a highly politicised space. This is not new. What is new is a communication environment characterised by real-time, global networked digital communication and the uptake of digital media platforms (including social media platforms). We explore the effects of politicisation and new modes of communication using the case of a controversial article published in a South Africa journal and the ensuing polemic. Drawing on both institutional theory and Castells’ description of the network society, we conceptualise collegiality along two dimensions: horizontal collegial relations which exist for the purpose of knowledge creation and transfer which, in turn, depends on self-governance according to a taken-for-granted code of conduct; and vertical collegiality which describes collegial relations between academic staff and university management, and which is necessary for the governance of the university as a complex organisation. We conclude that the highly personal nature of communication that is propelled by digital communication has a direct impact on collegial relations within the university. The motivations of both university academic staff and management, as well as the public, extend beyond stimulating collective debate in the service of knowledge production to serving individual and/or ideological agendas as the communication of science becomes politicised. While issues pertaining to collegiality in South Africa may at first glance appear to be unique to the country, we believe that in a globally transforming academy, the South African case may offer novel insights and useful lessons for other highly politicised university systems.

Details

University Collegiality and the Erosion of Faculty Authority
Type: Book
ISBN: 978-1-80455-814-0

Keywords

Open Access
Article
Publication date: 18 March 2022

Nancy Kurland

The purpose of this paper is to highlight the role a full range of activities can play to combat mission drift in a social enterprise. In doing so, it expands understanding of…

1676

Abstract

Purpose

The purpose of this paper is to highlight the role a full range of activities can play to combat mission drift in a social enterprise. In doing so, it expands understanding of integrated activities to recognize the role of indirect support activities and an activity ecosystem to sustain mission. This paper also provides practical implications about the process for creating such an ecosystem.

Design/methodology/approach

This paper relies on an in-depth qualitative study of a for-profit company that later in life became an employee-owned benefit corporation. Data include interviews, informal and formal company documents and a site visit.

Findings

This paper expands the definition of activity integration to recognize indirect mission support, highlights the role an activity ecosystem plays to ensure the viability of these activities, and identifies a set of rules and a three-step process to create the reinforcing ecosystem.

Originality/value

Commonly, activities are integrated if the company earns revenues through pursuit of its social mission and differentiated if the company earns revenues not related to its social mission. By comparison, this paper argues for a more nuanced definition of activities to recognize indirect mission support and its role in reinforcing a dual mission.

Access

Only Open Access

Year

Content type

1 – 10 of 16