Search results

1 – 10 of 639
Open Access

Abstract

Details

Online Anti-Rape Activism: Exploring the Politics of the Personal in the Age of Digital Media
Type: Book
ISBN: 978-1-83867-442-7

Open Access
Book part
Publication date: 17 August 2020

Rachel Loney-Howes

Abstract

Details

Online Anti-Rape Activism: Exploring the Politics of the Personal in the Age of Digital Media
Type: Book
ISBN: 978-1-83867-442-7

Open Access

Abstract

Details

Online Anti-Rape Activism: Exploring the Politics of the Personal in the Age of Digital Media
Type: Book
ISBN: 978-1-83867-442-7

Open Access
Article
Publication date: 3 July 2023

Sarah Wydall, Rebecca Zerk and Elize Freeman

This paper aims to examine the use of coproduction to create a film “Do You See Me?”, to amplify the voices of a “hard to reach” group: older lesbian, gay, bisexual (LGB) victim

Abstract

Purpose

This paper aims to examine the use of coproduction to create a film “Do You See Me?”, to amplify the voices of a “hard to reach” group: older lesbian, gay, bisexual (LGB) victim-survivors of domestic abuse (DA).

Design/methodology/approach

Qualitative methods were used as part of the co-production, which included two practitioner focus groups and 14 narrative interviews with lesbian, gay, bisexual, transgender, queer or questioning persons or the community (LGBTQ+) victim-survivors.

Findings

Despite differences in gender, sexualities, roles and “lived experiences” across stakeholders, there was a shared aim to ensure victim-survivors had a sense of ownership in this endeavour. Consequently, a positive reciprocity existed that helped to foster effective communication, allow for capacity building and subsequent knowledge exchange. The collaboration produced a nuanced meta-narrative making visible the “lived experiences” of LGB victim-survivors’ perceptions of perpetrator behaviours.

Originality/value

To the best of the authors’ knowledge, this paper is original in two ways, firstly, providing insights into the “lived experiences” of an invisible group; older LGBTQ+ victim-survivors, and secondly, in involving them in the co-production of a film. The paper aims to reveal how interdependencies that developed between stakeholders helped to disrupt understandings, develop new ways of knowing and build levels of trust. Group interactions helped to dismantle hierarchies, so those with experiential knowledge: the survivors, had greater control throughout the research process. The paper is significant in providing a critical reflection on the ethical, methodological and resource challenges involved in co-production. It also makes recommendations for researchers and funders about the value of using co-production as a method to engage with hard-to-reach groups.

Details

The Journal of Adult Protection, vol. 25 no. 3
Type: Research Article
ISSN: 1466-8203

Keywords

Open Access
Book part
Publication date: 4 June 2021

Seonaid Stevenson-McCabe and Sarai Chisala-Tempelhoff

Technology-facilitated violence and abuse including image-based sexual abuse (IBSA) is a phenomenon affecting women and girls around the world. Abusers misuse technology to attack…

Abstract

Technology-facilitated violence and abuse including image-based sexual abuse (IBSA) is a phenomenon affecting women and girls around the world. Abusers misuse technology to attack victims and threaten their safety, privacy, and dignity. This abuse is gendered and a form of domestic and sexual violence. In this article, the authors compare criminal law approaches to tackling IBSA in Scotland and Malawi. We critically analyze the legislative landscape in both countries, with a view to assessing the potential for victims to seek and obtain redress for IBSA. We assess the role criminal law has to play in each jurisdiction while acknowledging the limits of criminal law alone in terms of providing redress.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 18 May 2020

Ahmad Raza Bilal, Tehreem Fatima, Muhammad Kashif Imran and Kamran Iqbal

This exploratory inquiry sheds light on the nature of victim (i.e. provocative and passive) and specific work context in shaping the perceived causes and outcomes of felt…

3553

Abstract

Purpose

This exploratory inquiry sheds light on the nature of victim (i.e. provocative and passive) and specific work context in shaping the perceived causes and outcomes of felt workplace ostracism in teaching faculty of Pakistani higher educational institutions (HEIs) based on target-centric victimization framework.

Design/methodology/approach

This phenomenological research is based on data gathered from 30 ostracized teaching faculty members working in Pakistani public and private HEIs through in-depth semi-structured interviews. The interviews were tape-recorded, and transcription was entered in NVivo 12 Plus software to conduct thematic analysis.

Findings

This study found that provocative and submissive victim status, as well as the specific contextual factors in Pakistani HEIs (i.e. negative competition, cronyism, egoism and poor interpersonal relationships), is responsible for fostering workplace ostracism and yielding unique outcomes in each case.

Originality/value

This study has taken the scantly used target-centric victimization framework to distinguish the causes and consequences of workplace ostracism based on the nature of victim and work context in Pakistani HEIs .

Details

European Journal of Management and Business Economics, vol. 30 no. 1
Type: Research Article
ISSN: 2444-8451

Keywords

Abstract

Details

Online Anti-Rape Activism: Exploring the Politics of the Personal in the Age of Digital Media
Type: Book
ISBN: 978-1-83867-442-7

Open Access
Article
Publication date: 28 April 2022

Tatiana Iwai and João Vinícius França Carvalho

This paper aims to examine how verbal responses (denials vs apologies) following a trust violation in cooperative relationships influence reconciliation by changing attributions…

Abstract

Purpose

This paper aims to examine how verbal responses (denials vs apologies) following a trust violation in cooperative relationships influence reconciliation by changing attributions of responsibility for the transgression and transgressor’s perceived integrity. Additionally, the moderating role of perceived sincerity of the response is examined.

Design/methodology/approach

Two experimental studies were conducted with 465 participants. Hypotheses were tested using ordinary least squares (OLS) regressions and moderated serial mediation analyses with bootstrapping procedures.

Findings

In the occurrence of integrity-based trust violations, denials are more effective than apologies to repair trust. The positive indirect effects of these verbal responses on reconciliation are explained by a two-part mediating mechanism (attribution of responsibility followed by transgressor’s perceived integrity). Additionally, when responses are perceived as highly credible, denials are much more effective in deflecting blame than apologies.

Research limitations/implications

This study contributes to the literature on trust repair by examining when and why managers’ verbal responses to breaches of trust may be more or less effective in restoring cooperative relationships.

Practical implications

Managers must be aware that their perceived integrity following a breach of trust is influenced by the level of responsibility taken. Therefore, they should choose wisely which defensive tactics (apologies or denials) to use.

Social implications

As trust plays a central role in many cooperative relationships, choosing an appropriate response after a transgression is critical to solving conflicts both within and between organizations.

Originality/value

This work contributes to the reconciliation literature by uncovering the underlying cognitive mechanisms and boundary conditions by which different verbal responses influence reconciliation.

Details

RAUSP Management Journal, vol. 57 no. 3
Type: Research Article
ISSN: 2531-0488

Keywords

Open Access
Book part
Publication date: 4 June 2021

Ella Broadbent and Chrissy Thompson

This chapter examines the structure and sentiment of the Twitter response to Nathan Broad's naming as the originator of an image-based sexual abuse incident following the 2017…

Abstract

This chapter examines the structure and sentiment of the Twitter response to Nathan Broad's naming as the originator of an image-based sexual abuse incident following the 2017 Australian Football League Grand Final. Employing Social Network Analysis to visualize the hierarchy of Twitter users responding to the incident and Applied Thematic Analysis to trace the diffusion of differing streams of sentiment within this hierarchy, we produced a representation of participatory social media engagement in the context of image-based sexual abuse. Following two streams of findings, a model of social media user engagement was established that hierarchized the interplay between institutional and personal Twitter users. In this model, it was observed that the Broad incident generated sympathetic and compassionate discourses among an articulated network of social media users. This sentiment gradually diffused to institutional Twitter users – or Reference accounts – through the process of intermedia agenda-setting, whereby the narrative of terrestrial media accounts was altered by personal Twitter users over time.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Pam Hrick

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory…

Abstract

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory mandates as part of an effort to combat it. This chapter argues that these bodies have the potential to meaningfully further a survivor-centered approach to combatting technology-facilitated violence against women – one that places their experiences, rights, wishes, and needs at its core. It further argues that governments should consider integrating them into a broader holistic response to this conduct.

An overview is provided of the operations of New Zealand's Netsafe, the eSafety Commissioner in Australia, Nova Scotia's Cyberscan Unit, and the Canadian Centre for Child Protection in Manitoba. These types of centralized bodies have demonstrated an ability to advance survivor-centered approaches to technology-facilitated violence against women through direct involvement in resolving instances of violence, education, and research. However, these bodies are not a panacea. This chapter outlines critiques of their operations and the challenges they face in maximizing their effectiveness.

Notwithstanding these challenges and critiques, governments should consider creating such bodies or empowering existing bodies with a statutory mandate as one aspect of a broader response to combatting technology-facilitated violence against women. Some proposed best practices to maximize their effectiveness are identified.

1 – 10 of 639