Search results

1 – 10 of 33
Content available
Article
Publication date: 15 March 2013

85

Abstract

Details

Journal of Children's Services, vol. 8 no. 1
Type: Research Article
ISSN: 1746-6660

Content available
Article
Publication date: 2 June 2020

Woody Caan

198

Abstract

Details

Journal of Public Mental Health, vol. 19 no. 2
Type: Research Article
ISSN: 1746-5729

Open Access
Book part
Publication date: 4 June 2021

Pam Hrick

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory…

Abstract

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory mandates as part of an effort to combat it. This chapter argues that these bodies have the potential to meaningfully further a survivor-centered approach to combatting technology-facilitated violence against women – one that places their experiences, rights, wishes, and needs at its core. It further argues that governments should consider integrating them into a broader holistic response to this conduct.

An overview is provided of the operations of New Zealand's Netsafe, the eSafety Commissioner in Australia, Nova Scotia's Cyberscan Unit, and the Canadian Centre for Child Protection in Manitoba. These types of centralized bodies have demonstrated an ability to advance survivor-centered approaches to technology-facilitated violence against women through direct involvement in resolving instances of violence, education, and research. However, these bodies are not a panacea. This chapter outlines critiques of their operations and the challenges they face in maximizing their effectiveness.

Notwithstanding these challenges and critiques, governments should consider creating such bodies or empowering existing bodies with a statutory mandate as one aspect of a broader response to combatting technology-facilitated violence against women. Some proposed best practices to maximize their effectiveness are identified.

Open Access
Book part
Publication date: 4 June 2021

Alison J. Marganski and Lisa A. Melander

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology…

Abstract

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology demands that we pay attention to not only harms associated with interconnectivity, but also the potential for technology to counter offenses and “do good.” This chapter discusses technology as both a weapon and a shield when it comes to violence against women and girls in public spaces and private places. First, we review the complex and varied manifestations of technological gender violence, ranging from the use of technology to exploit, harass, stalk, and otherwise harm women and girls in communal spaces, to offenses that occur behind closed doors. Second, we discuss justice-related responses, underscoring how women and girls have “flipped the script” when their needs are not met. By developing innovative ways to respond to the wrongs committed against them and creating alternate systems that offer a voice, victims/survivors have repurposed technology to redress harms and unite in solidarity with others in an ongoing quest for justice.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Content available
Book part
Publication date: 26 October 2022

Abstract

Details

Recognizing Promise
Type: Book
ISBN: 978-1-80262-703-9

Content available
Article
Publication date: 12 June 2009

Julie McLeod

415

Abstract

Details

Records Management Journal, vol. 19 no. 2
Type: Research Article
ISSN: 0956-5698

Open Access
Book part
Publication date: 4 June 2021

Anne Cheung

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual…

Abstract

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual concerned. Intuitively, it is tempting to condemn doxing as a crude form of cyber violence that weaponizes personal data. When it is used as a strategy of resistance by the powerless to hold the powerful accountable, however, a more nuanced understanding is called for. This chapter focuses on the doxing phenomenon in Hong Kong, where doxing incidents against police officers and their family members have skyrocketed since 2019 (a 75-fold increase over 2018). It contends that doxing for political purposes is closely related to digital vigilantism, signifying a loss of confidence in the ruling authority and a yearning for an alternative form of justice. The chapter therefore argues that public interest should be recognized as a legal defense in doxing cases when those discharging or entrusted with public duty are the targets. Equally, it is important to confine the categories of personal data disclosed to information necessary to reveal the alleged wrongdoer or wrongdoing. Only in this way can a fair balance be struck between privacy, freedom of expression, and public interest.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Content available
Book part
Publication date: 18 December 2020

Abstract

Details

Black Metal, Trauma, Subjectivity and Sound: Screaming the Abyss
Type: Book
ISBN: 978-1-78756-925-6

Content available
Book part
Publication date: 23 November 2020

Abstract

Details

Teaching and Learning Practices for Academic Freedom
Type: Book
ISBN: 978-1-80043-480-6

Content available
Article
Publication date: 1 May 2001

47

Abstract

Details

Disaster Prevention and Management: An International Journal, vol. 10 no. 2
Type: Research Article
ISSN: 0965-3562

Access

Only content I have access to

Year

Content type

1 – 10 of 33