Search results

1 – 10 of 12
Open Access
Book part
Publication date: 4 June 2021

Briony Anderson and Mark A. Wood

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…

Abstract

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Content available
Book part
Publication date: 15 May 2018

Crystal Abidin

Abstract

Details

Internet Celebrity: Understanding Fame Online
Type: Book
ISBN: 978-1-78756-079-6

Content available
Book part
Publication date: 10 September 2018

David C. Giles

Abstract

Details

Twenty-First Century Celebrity: Fame In Digital Culture
Type: Book
ISBN: 978-1-78754-212-9

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Content available
Book part
Publication date: 19 November 2018

Abstract

Details

Microcelebrity Around the Globe
Type: Book
ISBN: 978-1-78756-749-8

Content available
Book part
Publication date: 25 November 2019

Ruth A. Deller

Abstract

Details

Reality Television: The Television Phenomenon That Changed the World
Type: Book
ISBN: 978-1-83909-021-9

Content available
Book part
Publication date: 19 November 2018

Crystal Abidin and Megan Lindsay Brown

Although the early conversations of microcelebrity centered on Anglo-centric theories and context despite the varied backgrounds and cultural context of microcelebrity, this…

Abstract

Although the early conversations of microcelebrity centered on Anglo-centric theories and context despite the varied backgrounds and cultural context of microcelebrity, this compilation of chapters seeks to assess and reframe the applications and uptake of microcelebrity around the world. Each of the chapters in this anthology contribute to expand the theoretical concept and contextualize the history and cultural affairs of those who are famous online. The case studies provide examples of how a microcelebrity emerges to fame because of their exposure and interaction within a group of niche users, a specific online community, or a specific cultural and geographical context through the social networks that emerge online. Academic scholarship on microcelebrity has crossed methodologies, disciplines and platforms demonstrating the wide appeal as the influence of these figures are on the rise. As preparation for the reader, this chapter offers a brief history of current scholarship, with an emphasis on shifting knowledge production away from an Anglo and Global North perspective. The introduction chapter serves as a road map for the reader breaking down each of the three sections of the book – norms, labors, and activism. Lastly, the co-editors have outlined different ways to read the text group chapters according to reader interest.

Details

Microcelebrity Around the Globe
Type: Book
ISBN: 978-1-78756-749-8

Keywords

Content available
Book part
Publication date: 11 March 2022

Franziska Leutner, Reece Akhtar and Tomas Chamorro-Premuzic

Abstract

Details

The Future of Recruitment
Type: Book
ISBN: 978-1-83867-562-2

Content available
Book part
Publication date: 10 September 2018

David C. Giles

Abstract

Details

Twenty-First Century Celebrity: Fame In Digital Culture
Type: Book
ISBN: 978-1-78754-212-9

Open Access
Book part
Publication date: 4 June 2021

Kristen Thomasen and Suzie Dunn

Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse…

Abstract

Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse. Whether this be monitoring movements through stalkerware, using drones to nonconsensually film or harass, or manipulating and distributing intimate images online such as deepfakes and creepshots, invasions of privacy have become a significant form of gender-based violence. Accordingly, our normative and legal concepts of privacy must evolve to counter the harms arising from this misuse of new technology. Canada's Supreme Court recently addressed technology-facilitated violations of privacy in the context of voyeurism in R v Jarvis (2019) . The discussion of privacy in this decision appears to be a good first step toward a more equitable conceptualization of privacy protection. Building on existing privacy theories, this chapter examines what the reasoning in Jarvis might mean for “reasonable expectations of privacy” in other areas of law, and how this concept might be interpreted in response to gender-based technology-facilitated violence. The authors argue the courts in Canada and elsewhere must take the analysis in Jarvis further to fully realize a notion of privacy that protects the autonomy, dignity, and liberty of all.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Access

Only content I have access to

Year

Content type

Book part (12)
1 – 10 of 12