Search results

1 – 10 of 21
Open Access
Book part
Publication date: 4 June 2021

Bridget Harris and Delanie Woodlock

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical…

Abstract

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical framework for technology-facilitated harms in heterosexual relationships which we characterize as digital coercive control. Here, we include behaviors which can be classified as abuse and stalking and also individualized tactics which are less easy to categorize, but evoke fear and restrict the freedoms of a particular woman. Drawing on their knowledge of a victim/survivor's experiences and, in the context of patterns and dynamics of abuse, digital coercive control strategies are personalized by perpetrators and extend and exacerbate “real-world” violence.

Digital coercive control is unique because of its spacelessness and the ease, speed, and identity-shielding which technology affords. Victim/survivors describe how perpetrator use of technology creates a sense of omnipresence and omnipotence which can deter women from exiting violent relationships and weakens the (already tenuous) notion that abuse can be “escaped.” We contend that the ways that digital coercive control shifts temporal and geographic boundaries warrant attention. However, spatiality more broadly cannot be overlooked. The place and shape in which victim/survivors and perpetrators reside will shape both experiences of and response to violence. In this chapter, we explore these ideas, reporting on findings from a study on digital coercive control in regional, rural, and remote Australia. We adopt a feminist research methodology in regard to our ethos, research processes, analysis, and the outputs and outcomes of our project. Women's voices are foreground in this approach and the emphasis is on how research can be used to inform, guide, and develop responses to domestic violence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 9 April 2020

Suzie McGreevy and Pauline Boland

An emerging evidence base, and increased awareness of the effects of trauma on the body, advocates a sensory-based approach to treatment with posttraumatic stress and complex…

24908

Abstract

Purpose

An emerging evidence base, and increased awareness of the effects of trauma on the body, advocates a sensory-based approach to treatment with posttraumatic stress and complex trauma survivors. This paper aims to identify, analyse and summarise the empirical evidence for the sensory-based interventions, which occupational therapists are using in the treatment of adult and adolescent trauma survivors.

Design/methodology/approach

An integrative review of the literature was undertaken. Both empirical and conceptual papers were included. An inductive approach and constant comparative method were used to understand and synthesise the research.

Findings

The literature search yielded 18 papers describing the types of sensory-based interventions used, sensory processing (SP) patterns and the context and evidence for sensory-based occupational therapy practice with trauma survivors. Nine of the studies were empirical and nine were conceptual and review papers. Themes identified included: atypical SP patterns; type of sensory-based intervention used with trauma survivors; and transdisciplinary treatment programmes can reduce the symptoms of trauma.

Practical implications

Sensory-based interventions with adult and adolescent trauma survivors are emerging as promising areas of practice and research in the literature. Although empirical data is limited, the sensory needs of the body in processing trauma experiences is becoming more recognised and are supported by the atypical SP patterns identified in survivors. A sensory-based, transdisciplinary approach to treatment has the potential to be effective in treating the trauma survivor.

Originality/value

With a skill base in sensory integration and occupational analysis, occupational therapists have much to offer the field of trauma studies. This review begins to address the gap in the literature, recommending more rigorous controlled outcome research with larger sample sizes, person-centred studies focussing on the trauma survivor’s perspective and continuing professional development and mentorship for occupational therapists working with this population.

Details

Irish Journal of Occupational Therapy, vol. 48 no. 1
Type: Research Article
ISSN: 2398-8819

Keywords

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 15 June 2015

Jenifer Wolf Williams and Stuart Allen

Though trauma survivors sometimes emerge as leaders in prosocial causes related to their previous negative or traumatic experiences, little is known about this transition, and…

Abstract

Though trauma survivors sometimes emerge as leaders in prosocial causes related to their previous negative or traumatic experiences, little is known about this transition, and limited guidance is available for survivors who hope to make prosocial contributions. To understand what enables trauma-inspired prosocial leadership development, the transition narratives of seven trauma-inspired leaders who varied by global region, primary language, gender, ethnicity, religion, trauma type, and leadership area were analyzed. Using interpretative phenomenological analysis in an exploratory study, participants’ transitional journeys were examined through analysis of their autobiographies. Critical findings included frequent references by all participants to perspective enlargement (reframing a problem or context) and resilience to the negative, apathetic, or retaliatory responses to the mission (possibly learned through resilience to trauma itself). This study explores posttraumatic leadership conceptually and makes suggestions for leadership development among trauma-inspired survivors

Details

Journal of Leadership Education, vol. 14 no. 3
Type: Research Article
ISSN: 1552-9045

Open Access

Abstract

Details

Online Anti-Rape Activism: Exploring the Politics of the Personal in the Age of Digital Media
Type: Book
ISBN: 978-1-83867-442-7

Open Access
Book part
Publication date: 4 June 2021

Eva PenzeyMoog and Danielle C. Slakoff

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this…

Abstract

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this chapter, we discuss three unique types of technological abuse: (1) financial abuse via banking websites and apps; (2) abuse via smart home devices (i.e., “Internet of Things” abuse); and (3) stalking via geo-location or GPS. We also argue pregnancy and wellness apps provide an opportunity for meaningful intervention for pregnant victims of domestic violence.

While there is no way to ensure users' safety in all situations, we argue thoughtful considerations while designing and building digital products can result in meaningful contributions to victims' safety. This chapter concludes with PenzeyMoog's (2020) “Framework for Inclusive Safety,” which is a roadmap for building technology that increases the safety of domestic violence survivors. This framework includes three key points: (1) the importance of educating technologists about domestic violence; (2) the importance of identifying possible abuse situations and designing against them; and (3) identifying user interactions that might signal abuse and offering safe interventions.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Content available
Book part
Publication date: 7 December 2016

Arch G. Woodside

Abstract

Details

Case Study Research
Type: Book
ISBN: 978-1-78560-461-4

Content available
Book part
Publication date: 19 August 2017

Abstract

Details

Human Capital and Assets in the Networked World
Type: Book
ISBN: 978-1-78714-828-4

Content available
Book part
Publication date: 18 September 2018

Abstract

Details

Gender, Women’s Health Care Concerns and Other Social Factors in Health and Health Care
Type: Book
ISBN: 978-1-78756-175-5

Open Access
Book part
Publication date: 4 June 2021

Michael Salter and Elly Hanson

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the…

Abstract

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the absence of adequate intervention by internet service providers, social media platforms, and government. The chapter discusses the history of online CSE, focusing on regulatory stances over time in which online risks to children have been cast as natural and inevitable by the hegemony of a “cyberlibertarian” ideology. We illustrate the success of this ideology, as well as its profound contradictions and ethical failures, by presenting key examples in which internet users have taken decisive action to prevent online CSE and promote the removal of CSAM. Rejecting simplistic characterizations of “vigilante justice,” we argue instead that the fact that often young internet users report feeling forced to act against online CSE and CSAM undercuts libertarian claims that internet regulation is impossible, unworkable, and unwanted. Recent shifts toward a more progressive ethos of online harm minimization are promising; however, this ethos risks offering a new legitimizing ideology for online business models that will continue to put children at risk of abuse and exploitation. In conclusion, we suggest ways forward toward an internet built in the interests of children, rather than profit.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Access

Only content I have access to

Year

Content type

1 – 10 of 21