Search results

1 – 10 of 50
Article
Publication date: 5 September 2024

Muhammad Mujtaba Asad and Syeda Sabika Fatima

Cyber violence is a global emerging issue which is growing with technology or online spaces, having a great influence on individual’s development. The purpose of this study is to…

Abstract

Purpose

Cyber violence is a global emerging issue which is growing with technology or online spaces, having a great influence on individual’s development. The purpose of this study is to identify the dominant factors of cyber violence and its influence on the cognitive development of female undergraduate students.

Design/methodology/approach

In this quantitative study, a questionnaire is used as a data collection tool. Moreover, this research is conducted on female undergraduate students (n = 300). Whereas, the purposive sampling technique is used and Statistical Package for Social Science (SPSS 27.0) software is used to analyze the data.

Findings

The findings of this study show that cyber bullying is the dominant factor of cyber violence, whereas cyber doxxing has high influence on cognitive development of female undergraduate students. In addition, the value of correlational coefficient is 0.683, which indicates a strong positive correlation. Therefore, it supports that the null hypothesis is rejected and alternative hypothesis is accepted.

Practical implications

The findings of this study are of great importance for policymakers to update the regulations for cyber violence and provide the protection laws for victims whereas it is helpful for the investigation agencies and cybercrime units to be more active and needs to take immediate actions on reported incidents to minimize its further spread and support victims of it. Also, it helps society to understand the influence of it on cognitive health, which helps them to create a safer environment. Similarly, parents and teachers need to make a safe and comfortable environment around children and keep an eye on them. Further, it is beneficial for companies or online platforms to keep their sites or apps more secure for the users. Moreover, future research studies could expand the topic by involving different genders and age group peoples by using different methodologies to explore in depth.

Originality/value

This study is unique as there are limited studies, which identify the factor of cyber violence and its influence on cognitive development. Also, fewer studies can be seen in the context of Pakistan.

Details

Journal of Aggression, Conflict and Peace Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1759-6599

Keywords

Open Access
Book part
Publication date: 4 June 2021

Sukaina Al-Nasrawi

Violence against women and girls is globally prevalent. Overcoming it is a prerequisite for attaining gender equality and achieving sustainable development. The United Nation's…

Abstract

Violence against women and girls is globally prevalent. Overcoming it is a prerequisite for attaining gender equality and achieving sustainable development. The United Nation's 2030 Agenda for Sustainable Development considers technology as a means to combat violence against women and girls, and there is ample evidence on the positive impact of technology in combating violence. At the same time, however, technology can promote and perpetrate new forms of violence. Research shows that more than 70% of women and girls online are exposed to forms of cyber violence. Most of these cases remain unreported.

This chapter argues that technology contributes to increasing cyber violence against women and girls which in turn leads to severe social and economic implications affecting them. It also argues that legislative and policy reforms can limit this type of violence while enabling women and girls to leverage technology for empowerment. It highlights cases of cyber violence in the Arab region and provides an overview of applicable legislative frameworks. The chapter concludes with recommended policy reforms and measures to strengthen and harmonize efforts to combat cyber violence against women and girls in the Arab region.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Article
Publication date: 23 June 2021

Ahmad Ghandour, Viktor Shestak and Konstantin Sokolovskiy

This paper aims to study the developed countries’ experience on the cyberbullying legal regulation among adolescents, to identify existing shortcomings in the developing…

Abstract

Purpose

This paper aims to study the developed countries’ experience on the cyberbullying legal regulation among adolescents, to identify existing shortcomings in the developing countries’ laws and to develop recommendations for regulatory framework improvement.

Design/methodology/approach

The authors have studied the state regulatory practice of the UK, the USA, Canada, Malaysia, South Africa, Turkey, UAE and analyzed the statistics of 2018 on the cyberbullying manifestation among adolescents in these countries.

Findings

The study results can encourage countries to create separate cyberbullying legislation and periodically review and modify already existing legislation.

Originality/value

The study provides a list of the recommendations to regulate cybercrime in developing countries and prevent it as well. The results may contribute to creating laws related to the regulation of cyberbullying in countries where such legislation does not exist yet or existing regulatory legal acts do not bring the expected results, namely, in Post-Soviet countries and other developing countries of the world.

Details

Journal of Information, Communication and Ethics in Society, vol. 19 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Open Access
Book part
Publication date: 4 June 2021

Emma A. Jane

While a growing body of literature reveals the prevalence of men's harassment and abuse of women online, scant research has been conducted into women's attacks on each other in…

Abstract

While a growing body of literature reveals the prevalence of men's harassment and abuse of women online, scant research has been conducted into women's attacks on each other in digital networked environments. This chapter responds to this research gap by analyzing data obtained from qualitative interviews with Australian women who have received at times extremely savage cyberhate they know or strongly suspect was sent by other women. Drawing on scholarly literature on historical intra-feminism schisms – specifically what have been dubbed the “mommy wars” and the “sex wars” – this chapter argues that the conceptual lenses of internalized misogyny and lateral violence are useful in their framing of internecine conflict within marginalized groups as diagnostic of broader, systemic oppression rather than being solely the fault of individual actors. These lenses, however, require multiple caveats and have many limitations. In conclusion, I canvas the possibility that the pressure women may feel to present a united front in the interests of feminist politics could itself be considered an outcome of patriarchal oppression (even if performing solidarity is politically expedient and/or essential). As such, there might come a time when openly renouncing discourses of sisterhood and feeling free to disagree with, and even dislike, other women might be considered markers of liberation.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Article
Publication date: 4 December 2023

Xi Wang, Xinyi You, Yulan Xu and Jie Zheng

Social media's role in engaging participants in sports events, particularly during the pandemic, is acknowledged. However, previous studies often utilized sports events for…

Abstract

Purpose

Social media's role in engaging participants in sports events, particularly during the pandemic, is acknowledged. However, previous studies often utilized sports events for diverse objectives but overlooked brand equity's influence on sports event development. And very limited research explores social media's impact on brand equity in esports events, despite its significance. Therefore, this study aims to explore how social media affects esports event brand equity and participants' satisfaction and engagement with social media through brand equity's influence.

Design/methodology/approach

The study focused on League of Legends World Championships (LOLWC) participants, who completed a self-judged questionnaire online. The questionnaire included demographic details and latent constructs. Data analysis involved two steps: exploratory factor analysis (EFA) to assess measurement scale validity and structural equation modeling (SEM) to study relationships between traits.

Findings

The results reveal that, within the esports event context, controlled communication exerts a meaningful and dual impact – both directly and indirectly – on the fundamental components of brand equity. This, in turn, serves as a catalyst for increasing participant contentment and their posting intention.

Originality/value

This study applies brand equity theories to the esports domain, exploring participant-based brand equity concepts, user behavior and the influence of social media communication on event branding and engagement. It also recommends strategies for event improvement, emphasizes controlled communication for brand equity and highlights marketing's role in brand awareness, association and participant satisfaction. Additionally, it suggests government regulation to address cyber violence during esports events.

Details

International Journal of Sports Marketing and Sponsorship, vol. 25 no. 1
Type: Research Article
ISSN: 1464-6668

Keywords

Open Access
Book part
Publication date: 4 June 2021

Anne Cheung

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual…

Abstract

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual concerned. Intuitively, it is tempting to condemn doxing as a crude form of cyber violence that weaponizes personal data. When it is used as a strategy of resistance by the powerless to hold the powerful accountable, however, a more nuanced understanding is called for. This chapter focuses on the doxing phenomenon in Hong Kong, where doxing incidents against police officers and their family members have skyrocketed since 2019 (a 75-fold increase over 2018). It contends that doxing for political purposes is closely related to digital vigilantism, signifying a loss of confidence in the ruling authority and a yearning for an alternative form of justice. The chapter therefore argues that public interest should be recognized as a legal defense in doxing cases when those discharging or entrusted with public duty are the targets. Equally, it is important to confine the categories of personal data disclosed to information necessary to reveal the alleged wrongdoer or wrongdoing. Only in this way can a fair balance be struck between privacy, freedom of expression, and public interest.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Elizabeth Coombs

This chapter examines technology-facilitated violence from the perspective of international human rights law. It explores current research relating to technology-facilitated…

Abstract

This chapter examines technology-facilitated violence from the perspective of international human rights law. It explores current research relating to technology-facilitated violence and then highlights the international human rights instruments that are triggered by the various forms of such violence. Ultimately, it focuses upon international human rights to privacy and to freedom from violence (especially gender-based violence) and the obligations on State and Nonstate actors to address violations of these rights. It argues that adoption of a human rights perspective on technology-facilitated violence better enables us to hold State and Nonstate actors to account in finding meaningful ways to address violence in all of its forms.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Book part
Publication date: 20 September 2021

Jaquelyn Osborne, Emma Kavanagh and Chelsea Litchfield

Social media provides a space for female athletes to create their own media (and advertising) in order to share their lives through stories presented online – a phenomenon, that…

Abstract

Social media provides a space for female athletes to create their own media (and advertising) in order to share their lives through stories presented online – a phenomenon, that to date has been ignored in traditional media spaces. Research suggests that athletes more broadly can take a more active role in their public presentation across a wide variety of platforms (Lebel & Danylchuk, 2012) and share more aspects of their identity than typically portrayed in mainstream media coverage (Sanderson, 2013, 2014). More specifically, virtual worlds have created platforms through which female athletes can share content and present themselves to fans or followers of sport in their own way and with relative freedom (Litchfield & Kavanagh, 2018). While it is acknowledged that social media can empower the female user, simultaneously, these spaces have proven to be hostile and can serve to oppress or marginalise individuals and groups (Kavanagh et al., 2016; Litchfield et al., 2018). An intersectional, third-wave feminist lens will be adopted in this chapter in order to examine such a dichotomy (Bruce, 2016). This approach will analyse the disjunction between the rise of the female ‘@thlete’ and their adoption of contemporary digital sporting spaces and the presence of a darker narrative permeating digital environments through highlighting the presence of online vitriol and intersectional abuse (racist, sexist, homophobic, etc.) that athletes may face while navigating lives online.

Details

The Professionalisation of Women’s Sport
Type: Book
ISBN: 978-1-80043-196-6

Keywords

Article
Publication date: 21 February 2024

Mirela Cătălina Türkeş, Aurelia Felicia Stăncioiu, Mihai Cristian Orzan, Mariana Jugănaru, Roxana-Cristina Marinescu and Ion Dănuț Jugănaru

Almost four years after the COVID-19 pandemic, the changes in the labour market and legislation, but also in people's lives, do not stop. At the same time, employees' perceptions…

Abstract

Purpose

Almost four years after the COVID-19 pandemic, the changes in the labour market and legislation, but also in people's lives, do not stop. At the same time, employees' perceptions regarding the change in the legislative and contractual framework, as well as in the working conditions and the use of telework, also change. Therefore, the aim of the paper is to identify the perceptions of employees regarding the use of telework in the post-pandemic period.

Design/methodology/approach

The research was based on a survey carried out on 128 teleworkers in the post-pandemic period. The statistical hypotheses were tested using Kolmogorov–Smirnov and Kruskal–Wallis tests, multiple linear regression and pairwise comparison analysis.

Findings

The results of the study demonstrate that the modification of the legislative and contractual framework and of the working conditions, as well as of the way of using information and communication technology in the post-pandemic era, generates a positive and significant impact on the use of telework by employees. Some of the main advantages valued by teleworkers included the possibility of benefitting from a flexible work schedule and the possibility of reducing transport costs.

Originality/value

The study highlights the need to continuously develop and update labour policies and strategies in line with current and future labour market requirements, considering the implications of telework on the perceptions of employees, so that government organisations and managers who want to protect the rights and interests of teleworkers, aspects of their lives and organise an appropriate work environment manage to do so in order to achieve the expected results.

Details

Employee Relations: The International Journal, vol. 46 no. 3
Type: Research Article
ISSN: 0142-5455

Keywords

Article
Publication date: 29 January 2024

Kai Wang

The identification of network user relationship in Fancircle contributes to quantifying the violence index of user text, mining the internal correlation of network behaviors among…

Abstract

Purpose

The identification of network user relationship in Fancircle contributes to quantifying the violence index of user text, mining the internal correlation of network behaviors among users, which provides necessary data support for the construction of knowledge graph.

Design/methodology/approach

A correlation identification method based on sentiment analysis (CRDM-SA) is put forward by extracting user semantic information, as well as introducing violent sentiment membership. To be specific, the topic of the implementation of topology mapping in the community can be obtained based on self-built field of violent sentiment dictionary (VSD) by extracting user text information. Afterward, the violence index of the user text is calculated to quantify the fuzzy sentiment representation between the user and the topic. Finally, the multi-granularity violence association rules mining of user text is realized by constructing violence fuzzy concept lattice.

Findings

It is helpful to reveal the internal relationship of online violence under complex network environment. In that case, the sentiment dependence of users can be characterized from a granular perspective.

Originality/value

The membership degree of violent sentiment into user relationship recognition in Fancircle community is introduced, and a text sentiment association recognition method based on VSD is proposed. By calculating the value of violent sentiment in the user text, the annotation of violent sentiment in the topic dimension of the text is achieved, and the partial order relation between fuzzy concepts of violence under the effective confidence threshold is utilized to obtain the association relation.

Details

Data Technologies and Applications, vol. 58 no. 4
Type: Research Article
ISSN: 2514-9288

Keywords

1 – 10 of 50