Search results

1 – 10 of 33
Article
Publication date: 24 May 2023

Cynthia Brown, Renee Fiolet, Dana McKay and Bridget Harris

This paper presents a novel exploration of the story completion (SC) method for investigating perpetration of technology-facilitated abuse in relationships (TAR).

Abstract

Purpose

This paper presents a novel exploration of the story completion (SC) method for investigating perpetration of technology-facilitated abuse in relationships (TAR).

Design/methodology/approach

The authors adopted the infrequently used SC method to explore TAR perpetration. The perpetration of TAR can involve socially undesirable and potentially illegal behaviours such as online stalking, non-consensual sharing of nude images, and other coercive and controlling behaviours. These problematic behaviours present an ideal context for employing the SC method to reveal new data on TAR perpetrator perspectives, motivations and behaviours.

Findings

The SC method elicited new hypotheses regarding TAR perpetration behaviours and motivations. Post-study reflection on the multifaceted nature of perpetration raised questions about the utility of SC as a stand-alone method for investigating TAR perpetration. Challenges encountered included: striking the most effective length, detail and ambiguity in the story stems, difficulty in eliciting important contextual features in participants’ stories, and other issues scholars encounter when investigating perpetration of violence more broadly. The authors close with suggestions for more effective use of SC methodology in TAR and intimate partner violence research.

Originality/value

This paper expands discussion of the SC method’s application and extends scholarship on violence and perpetration research methodologies. The paper demonstrates the importance of story stem design to the attainment of research objectives and the usefulness and limitations of SC in exploring this sensitive topic and hard-to-reach population. It also advocates for the combined application of SC with other methodological approaches for the attainment of research outcomes when investigating multifaceted phenomenon.

Details

Qualitative Research Journal, vol. 23 no. 5
Type: Research Article
ISSN: 1443-9883

Keywords

Article
Publication date: 29 July 2024

Kenji Logie and Marie-Helen Maras

The objective of this paper is to explore the development of the Blackmail-as-a-Service business model within the Digital Thrift Shop. This service model involves the sale of…

Abstract

Purpose

The objective of this paper is to explore the development of the Blackmail-as-a-Service business model within the Digital Thrift Shop. This service model involves the sale of doxing files to customers, as well as the removal of the content from the shop and its dissemination to victims or individuals closely connected to them.

Design/methodology/approach

To access the Digital Thrift shop, this study relies on the Tor browser and a darknet indexing site. The authors then use an application to collect and store the web pages as PDFs. Finally, content analysis is performed on these PDFs to understand the Blackmail-as-a-Service business model developed by the Digital Thrift.

Findings

The doxing data available on the Digital Thrift is primarily targeted toward women. Digital Thrift has also established a way to value the purchase, sale and the removal of blackmail data. The presence of Blackmail-as-a-Service on darknet sites poses unique challenges for criminal justice agencies in terms of jurisdiction, due to the lack of harmonized laws and the obstacles involved in taking down content from darknet sites. Finally, the use of a service model for blackmail allows criminals without technical skills to engage in cyber-victimization using blackmail.

Originality/value

Research into Blackmail-as-a-Service from boutique providers has not been conducted. To the best of the authors’ knowledge, this is one of the first study seeking to understand the Blackmail-as-a-Service business model on the darknet when used to target adults. This study presents evidence of a lack of connection between the buyers of the compromising material and the potential victim, challenging preconceived notions about image-based sexual abuse and its connection to individuals involved in interpersonal relationships.

Details

Journal of Aggression, Conflict and Peace Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1759-6599

Keywords

Article
Publication date: 5 September 2024

Muhammad Mujtaba Asad and Syeda Sabika Fatima

Cyber violence is a global emerging issue which is growing with technology or online spaces, having a great influence on individual’s development. The purpose of this study is to…

Abstract

Purpose

Cyber violence is a global emerging issue which is growing with technology or online spaces, having a great influence on individual’s development. The purpose of this study is to identify the dominant factors of cyber violence and its influence on the cognitive development of female undergraduate students.

Design/methodology/approach

In this quantitative study, a questionnaire is used as a data collection tool. Moreover, this research is conducted on female undergraduate students (n = 300). Whereas, the purposive sampling technique is used and Statistical Package for Social Science (SPSS 27.0) software is used to analyze the data.

Findings

The findings of this study show that cyber bullying is the dominant factor of cyber violence, whereas cyber doxxing has high influence on cognitive development of female undergraduate students. In addition, the value of correlational coefficient is 0.683, which indicates a strong positive correlation. Therefore, it supports that the null hypothesis is rejected and alternative hypothesis is accepted.

Practical implications

The findings of this study are of great importance for policymakers to update the regulations for cyber violence and provide the protection laws for victims whereas it is helpful for the investigation agencies and cybercrime units to be more active and needs to take immediate actions on reported incidents to minimize its further spread and support victims of it. Also, it helps society to understand the influence of it on cognitive health, which helps them to create a safer environment. Similarly, parents and teachers need to make a safe and comfortable environment around children and keep an eye on them. Further, it is beneficial for companies or online platforms to keep their sites or apps more secure for the users. Moreover, future research studies could expand the topic by involving different genders and age group peoples by using different methodologies to explore in depth.

Originality/value

This study is unique as there are limited studies, which identify the factor of cyber violence and its influence on cognitive development. Also, fewer studies can be seen in the context of Pakistan.

Details

Journal of Aggression, Conflict and Peace Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1759-6599

Keywords

Book part
Publication date: 20 October 2023

Rebecca M. Hayes

Abstract

Details

Defining Rape Culture: Gender, Race and the Move Toward International Social Change
Type: Book
ISBN: 978-1-80262-214-0

Abstract

Details

Occupational Therapy With Older People into the Twenty-First Century
Type: Book
ISBN: 978-1-83753-043-4

Book part
Publication date: 6 August 2024

Jeffrey A. Hayes

This chapter begins by covering four parenting styles and their effects on college students’ wellbeing. Next, the effects of parents’ divorce and parental death on college…

Abstract

This chapter begins by covering four parenting styles and their effects on college students’ wellbeing. Next, the effects of parents’ divorce and parental death on college students are explored. In addition to relationships with their parents, the chapter also examines college students’ relationships with their friends. Friendships based on utility or pleasure are contrasted with those based on virtue. Next, the chapter explores the effects of college students’ friendships on various aspects of their academic performance (e.g., dropping out of school) and social lives (e.g., drinking behaviors). The role of social media in college students’ relationships is considered as well. The chapter concludes with a focus on college students’ romantic relationships.

Details

College Student Mental Health and Wellness: Coping on Campus
Type: Book
ISBN: 978-1-83549-197-3

Keywords

Content available
Book part
Publication date: 20 October 2023

Rebecca M. Hayes

Abstract

Details

Defining Rape Culture: Gender, Race and the Move Toward International Social Change
Type: Book
ISBN: 978-1-80262-214-0

Abstract

Details

Defining Rape Culture: Gender, Race and the Move Toward International Social Change
Type: Book
ISBN: 978-1-80262-214-0

Article
Publication date: 3 January 2023

Abdullah Oguz, Nikhil Mehta and Prashant Palvia

This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying…

1012

Abstract

Purpose

This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying, its effects on organizations and organizational controls enacted to contain these effects.

Design/methodology/approach

The study conducts a theoretical review of the workplace cyberbullying literature between 2005 and 2021 drawing upon existing literature and two important theories, the routine activities theory and control theory. The final sample of 54 empirical papers represents a comprehensive body of literature on cyberbullying published across various disciplines.

Findings

A theoretical model of workplace cyberbullying is developed, which highlights major antecedents to workplace cyberbullying and its impact on individual employees as well as organizations.

Originality/value

As firms increasingly rely on information and communication technologies (ICTs), the misuse of ICTs in the form of cyberbullying is also increasing. Workplace cyberbullying severely hurts an organization’s employees and compromises the efficacy of its information systems. Fortunately, various controls can be utilized by firms to minimize workplace cyberbullying and its attendant costs. In all, eleven propositions are offered, providing a robust agenda for future research. The authors also offer insights for practitioners on how to minimize cyberbullying in the workplace and its damaging effects.

Article
Publication date: 31 July 2024

Kyung-Shick Choi, Mohamed Chawki and Subhajit Basu

Exhibiting an unprecedented rate of advancement, technology’s progression over the past two decades has regrettably led to a disturbing increase in the distribution of child…

Abstract

Purpose

Exhibiting an unprecedented rate of advancement, technology’s progression over the past two decades has regrettably led to a disturbing increase in the distribution of child sexual abuse materials (CSAM) online. Compounded by the emergence of an underground cryptocurrency market, which serves as a primary distribution channel for these materials, the investigation and sanctioning of CSAM present a complex and unique set of challenges. The purpose of this study is to accurately diagnose the CSAM sentencing landscape and build a more comprehensive, evidence-based legal framework in penology.

Design/methodology/approach

The study collected and analyzed case details regarding CSAM sanctions in a database sourced from the US Department of Justice for 2020. Various factors were analyzed such as the victim’s age, offender typology and previous conviction, accompanied by an analysis of how these factors affect the sentence length.

Findings

The study found that the hierarchical agency-level interactions give insight into resource allocation prioritization, as well as confirming a close relationship between prior conviction history and sentence length, with the victim’s age inversely related to sentence length. Leveraging data-driven insights, the study paves the way for more targeted and effective sanctions, ultimately contributing to the broader goal of safeguarding children from online sexual exploitation.

Originality/value

The paper provides a critical analysis of the complex landscape surrounding CSAM distribution and judicial sentencing. By examining case details and leveraging data-driven insights, it offers valuable contributions to understanding the interplay between various factors such as victim age, offender typology and prior convictions on sentencing outcomes. This comprehensive approach not only sheds light on the dynamics of CSAM sanctions but also lays the groundwork for evidence-based legal frameworks in penology. Its originality lies in its nuanced examination of hierarchical agency interactions and its potential to inform more targeted interventions for safeguarding children from online exploitation.

Details

Journal of Aggression, Conflict and Peace Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1759-6599

Keywords

1 – 10 of 33