Search results

1 – 10 of 54
Book part
Publication date: 2 July 2020

Bridget A. Harris

As the role and uptake of digital media, devices and other technologies increases, so has their presence in our lives. Technology has revolutionised the speed, type and extent of…

Abstract

As the role and uptake of digital media, devices and other technologies increases, so has their presence in our lives. Technology has revolutionised the speed, type and extent of communication and contact between individuals and groups, transforming temporal, geographic and personal boundaries. There have undoubtedly been benefits associated with such shifts, but technologies have also exacerbated existing patterns of gendered violence and introduced new forms of intrusion, abuse and surveillance. In order to understand and combat harm and, protect and empower women, criminologists must investigate these practices. This chapter discusses how technology has transformed the enactment of violence against women.

Typically, studies have focussed on particular types of technology-facilitated violence as isolated phenomenon. Here, the author examines, more holistically, a range of digital perpetration: by persons unknown, who may be known and are known to female targets. These digital harms should, the author contends, be viewed as part of what Kelly (1988) conceptualised as a ‘continuum of violence’ (and Stanko, 1985 as ‘continuums of unsafety’) to which women are exposed, throughout the course of our lives. These behaviours do not occur in a vacuum. Violence is the cause and effect of inequalities and social control, which manifests structurally and institutionally, offline and online. Technologies are shaped by these forces, and investigating the creation, governance and use of technologies provides insight how violence is enacted, fostered and normalised.

Details

The Emerald Handbook of Feminism, Criminology and Social Change
Type: Book
ISBN: 978-1-78769-956-4

Keywords

Open Access
Book part
Publication date: 4 June 2021

Bridget Harris and Delanie Woodlock

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical…

Abstract

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical framework for technology-facilitated harms in heterosexual relationships which we characterize as digital coercive control. Here, we include behaviors which can be classified as abuse and stalking and also individualized tactics which are less easy to categorize, but evoke fear and restrict the freedoms of a particular woman. Drawing on their knowledge of a victim/survivor's experiences and, in the context of patterns and dynamics of abuse, digital coercive control strategies are personalized by perpetrators and extend and exacerbate “real-world” violence.

Digital coercive control is unique because of its spacelessness and the ease, speed, and identity-shielding which technology affords. Victim/survivors describe how perpetrator use of technology creates a sense of omnipresence and omnipotence which can deter women from exiting violent relationships and weakens the (already tenuous) notion that abuse can be “escaped.” We contend that the ways that digital coercive control shifts temporal and geographic boundaries warrant attention. However, spatiality more broadly cannot be overlooked. The place and shape in which victim/survivors and perpetrators reside will shape both experiences of and response to violence. In this chapter, we explore these ideas, reporting on findings from a study on digital coercive control in regional, rural, and remote Australia. We adopt a feminist research methodology in regard to our ethos, research processes, analysis, and the outputs and outcomes of our project. Women's voices are foreground in this approach and the emphasis is on how research can be used to inform, guide, and develop responses to domestic violence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Jane Bailey, Nicola Henry and Asher Flynn

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as…

Abstract

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as technology-facilitated violence and abuse (TFVA). TFVA includes a spectrum of behaviors perpetrated online, offline, and through a range of technologies, including artificial intelligence, livestreaming, GPS tracking, and social media. This chapter provides an overview of TFVA, including a brief snapshot of existing quantitative and qualitative research relating to various forms of TFVA. It then discusses the aims and contributions of this book as a whole, before outlining five overarching themes arising from the contributions. The chapter concludes by mapping out the structure of the book.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Yee Man Louie

The rapid advancement of technology poses many social challenges including the emerging issue of technology-facilitated abuse (TFA) and violence. In Australia, women from…

Abstract

The rapid advancement of technology poses many social challenges including the emerging issue of technology-facilitated abuse (TFA) and violence. In Australia, women from culturally and linguistically diverse (CALD) backgrounds are found to be more vulnerable to domestic violence (DV) and abuse, including TFA. This chapter presents a snapshot of CALD women's technology-facilitated domestic abuse (TFDA) experiences in Melbourne through the eyes of a small group of DV practitioners. Findings show CALD women experience TFA similar to that of the mainstream, with tracking and monitoring through the use of smartphone and social media most common. Their migration and financial status, and language and digital literacy can increase their vulnerability to TFDA, making their experience more complicated. Appropriate digital services and resources together with face-to-face support services can be a way forward. Further research should focus on better understanding CALD women's perceptions of and responses to TFDA and explore ways to improve engagement with and use of community media channels/platforms.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Book part
Publication date: 18 November 2020

Bridget Harris, Molly Dragiewicz and Delanie Woodlock

Goal 5 of the United Nations (UN) Sustainable Development Goals (SDGs) prioritises gender equality and empowerment of all women and girls. Key to achieving this is addressing…

Abstract

Goal 5 of the United Nations (UN) Sustainable Development Goals (SDGs) prioritises gender equality and empowerment of all women and girls. Key to achieving this is addressing violence against women (VAW; see SDG target 5.2) and, we believe, understanding the role of technology in both enacting and combating VAW. In this chapter, we outline how technology-facilitated VAW threatens women's use of technology and discuss policies and practices of support workers and practitioners that aid safe use of digital media. We consider features of technology-facilitated VAW advocacy which differ from traditional VAW advocacy, using examples from the Global North and South. Information communication technologies (ICTs) are used by VAW advocates in a range of ways; to provide information and education about domestic violence, safe use of technology and negotiating the legal and criminal justice systems; collect evidence about abuse; provide support; and pursue social change. As the capabilities and prevalence of ICT and devices increase and access costs decrease, these channels offer new and innovative opportunities capitalising on the spacelessness, cost-effectiveness and timelessness of media. Nonetheless, technological initiatives are not perfect or failsafe. Throughout the pages that follow, we acknowledge the limitations and challenges of technology-facilitated advocacy, which could hinder application of the SDG.

Details

The Emerald Handbook of Crime, Justice and Sustainable Development
Type: Book
ISBN: 978-1-78769-355-5

Keywords

Open Access
Book part
Publication date: 4 June 2021

Eva PenzeyMoog and Danielle C. Slakoff

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this…

Abstract

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this chapter, we discuss three unique types of technological abuse: (1) financial abuse via banking websites and apps; (2) abuse via smart home devices (i.e., “Internet of Things” abuse); and (3) stalking via geo-location or GPS. We also argue pregnancy and wellness apps provide an opportunity for meaningful intervention for pregnant victims of domestic violence.

While there is no way to ensure users' safety in all situations, we argue thoughtful considerations while designing and building digital products can result in meaningful contributions to victims' safety. This chapter concludes with PenzeyMoog's (2020) “Framework for Inclusive Safety,” which is a roadmap for building technology that increases the safety of domestic violence survivors. This framework includes three key points: (1) the importance of educating technologists about domestic violence; (2) the importance of identifying possible abuse situations and designing against them; and (3) identifying user interactions that might signal abuse and offering safe interventions.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Book part
Publication date: 26 August 2019

Walter S. DeKeseredy

Purpose – This chapter presents some innovative ways in which researchers can collect survey data on various types of violence against women.Methodology/approach – The suggestions…

Abstract

Purpose – This chapter presents some innovative ways in which researchers can collect survey data on various types of violence against women.

Methodology/approach – The suggestions made here are drawn from over 30 years of national, international, and local survey research.

Findings – The methods described in this chapter minimize underreporting, produce theoretically relevant data, and have meaningful policy consequences.

Originality/value – The research techniques reviewed here have made many important contributions to the field and the data they uncovered have helped raise public awareness about one of the world’s most compelling social problems.

Details

Methods of Criminology and Criminal Justice Research
Type: Book
ISBN: 978-1-78769-865-9

Keywords

Book part
Publication date: 2 July 2020

Walter S. DeKeseredy

The key purpose of this chapter is to identify some ways of enhancing feminist conceptual, empirical, and theoretical work on violence against women. Much attention is given to…

Abstract

The key purpose of this chapter is to identify some ways of enhancing feminist conceptual, empirical, and theoretical work on violence against women. Much attention is given to addressing the harms caused by new electronic forms of woman abuse, including the role of adult Internet pornography and sex robots. This chapter also emphasises the importance of revisiting some major feminist contributions from the past.

Details

The Emerald Handbook of Feminism, Criminology and Social Change
Type: Book
ISBN: 978-1-78769-956-4

Keywords

Open Access
Book part
Publication date: 4 June 2021

Gisella Lopes Gomes Pinto Ferreira

Much of the research on intimate partner violence focuses on adults, and little of it emanates from the Global-South. The study reported upon in this chapter is aimed at…

Abstract

Much of the research on intimate partner violence focuses on adults, and little of it emanates from the Global-South. The study reported upon in this chapter is aimed at addressing these gaps. Adopting a Southern Feminist Framework, it discusses findings from interviews with Brasilian and Australian advocates working on prevention of youth IPV. Participants from both countries noted disturbing instances of digital coercive control among the youth with whom they work, as well as underlying factors such as gender-based discrimination that simultaneously contribute to the prevalence of such behaviors, as well as their normalization among young people. However, they also emphasized the positive role that technology can play in distributing educational programming that reaches young people where they are and circumvents conservative agendas that in some cases keep education about gender discrimination and healthy relationships out of schools.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Pam Hrick

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory…

Abstract

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory mandates as part of an effort to combat it. This chapter argues that these bodies have the potential to meaningfully further a survivor-centered approach to combatting technology-facilitated violence against women – one that places their experiences, rights, wishes, and needs at its core. It further argues that governments should consider integrating them into a broader holistic response to this conduct.

An overview is provided of the operations of New Zealand's Netsafe, the eSafety Commissioner in Australia, Nova Scotia's Cyberscan Unit, and the Canadian Centre for Child Protection in Manitoba. These types of centralized bodies have demonstrated an ability to advance survivor-centered approaches to technology-facilitated violence against women through direct involvement in resolving instances of violence, education, and research. However, these bodies are not a panacea. This chapter outlines critiques of their operations and the challenges they face in maximizing their effectiveness.

Notwithstanding these challenges and critiques, governments should consider creating such bodies or empowering existing bodies with a statutory mandate as one aspect of a broader response to combatting technology-facilitated violence against women. Some proposed best practices to maximize their effectiveness are identified.

1 – 10 of 54