Search results

1 – 10 of 145
Open Access
Book part
Publication date: 4 June 2021

Bronwyn Carlson and Ryan Frazer

Broadly understood as repeated, intentional, and aggressive behaviors facilitated by digital technologies, cyberbullying has been identified as a significant public health concern…

Abstract

Broadly understood as repeated, intentional, and aggressive behaviors facilitated by digital technologies, cyberbullying has been identified as a significant public health concern in Australia. However, there have been critical debates about the theoretical and methodological assumptions of cyberbullying research. On the whole, this research has demonstrated an aversion to accounting for context, difference, and complexity. This insensitivity to difference is evident in the absence of nuanced accounts of Indigenous people's experiences of cyberbullying. In this chapter, we extend recent critiques of dominant approaches to cyberbullying research and argue for novel theoretical and methodological engagements with Indigenous people's experiences of cyberbullying. We review a range of literature that unpacks the many ways that social, cultural, and political life is different for Indigenous peoples. More specifically, we demonstrate there are good reasons to assume that online conflict is different for Indigenous peoples, due to diverse cultural practices and the broader political context of settler-colonialism. We argue that the standardization of scholarly approaches to cyberbullying is delimiting its ability to attend to social difference in online conflict, and we join calls for more theoretically rigorous, targeted, difference-sensitive studies into bullying.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 17 June 2019

Rebecka Cowen Forssell

The purpose of this paper is to explore what characterizes cyberbullying when it is performed in digital space and in an increasingly boundary blurred working life context.

4161

Abstract

Purpose

The purpose of this paper is to explore what characterizes cyberbullying when it is performed in digital space and in an increasingly boundary blurred working life context.

Design/methodology/approach

Cyberbullying is explored through the lens of Erving Goffman’s theories on everyday life interaction and social media scholars understanding of social life on the internet today. The empirical material for the study is grounded in eight in-depth interviews with individuals who have been subjected to cyberbullying behavior in their professional life. The interview data were analyzed by means of thematic analysis.

Findings

Three key themes were identified: spatial interconnectedness, colliding identities and the role of the audience. The empirical data indicate that in order to understand cyberbullying in working life, it is necessary to consider the specific context that emerges with social network sites and blogs. Moreover, this study shows how social network sites tend to blur boundaries between the private and the professional for the targeted individual.

Originality/value

Cyberbullying in working life is a relatively under-researched area. Most existing research on cyberbullying follows the tradition of face-to-face bullying by addressing the phenomenon with quantitative methods. Given the limited potential of this approach to uncover new and unique features, this study makes an important contribution by exploring cyberbullying with a qualitative approach that provides in-depth understanding of the new situations that emerge when bullying is performed online.

Details

Qualitative Research in Organizations and Management: An International Journal, vol. 15 no. 2
Type: Research Article
ISSN: 1746-5648

Keywords

Open Access
Article
Publication date: 2 October 2017

Tuija Muhonen, Sandra Jönsson and Martin Bäckström

The purpose of this paper is to explore health- and work-related outcomes of cyberbullying behaviour and the potential mediating role of social organisational climate, social…

8940

Abstract

Purpose

The purpose of this paper is to explore health- and work-related outcomes of cyberbullying behaviour and the potential mediating role of social organisational climate, social support from colleagues and social support from superiors.

Design/methodology/approach

Altogether 3,371 respondents participated in a questionnaire study.

Findings

The results of this study indicate that social organisational climate can have a mediating role in the relationship between cyberbullying behaviour and health, well-being, work engagement and intention to quit. Contrary to earlier face-to-face bullying research, the current study showed that cyberbullying behaviour had stronger indirect than direct relationships to health, well-being, work engagement and intention to quit.

Practical implications

Communication through digital devices in work life is becoming more prevalent, which in turn increases the risk for cyberbullying behaviour. Organisations need therefore to develop occupational health and safety policies concerning the use of digital communication and social media in order to prevent cyberbullying behaviour and its negative consequences.

Originality/value

Cyberbullying behaviour among working adults is a relatively unexplored phenomenon and therefore this study makes valuable contribution to the research field.

Details

International Journal of Workplace Health Management, vol. 10 no. 5
Type: Research Article
ISSN: 1753-8351

Keywords

Open Access
Article
Publication date: 5 November 2019

Naruemon Auemaneekul, Arpaporn Powwattana, Emwadee Kiatsiri and Nanthana Thananowan

The purpose of this paper is to examine the etiological model of cyberbullying behaviors among Thai adolescents, testing the hypothesis that the constructs of theory of planned…

4216

Abstract

Purpose

The purpose of this paper is to examine the etiological model of cyberbullying behaviors among Thai adolescents, testing the hypothesis that the constructs of theory of planned behavior (TPB), including self-esteem, will influence and have impact on cyberbullying intention and behaviors.

Design/methodology/approach

Structural equation modeling (SEM) was used to analyze the data. Self-administered questionnaires were used among multi-stage stratified random samples from secondary schools in the Bangkok. The sample size consisting of 354 subjects included those who were victims (44.7 percent), perpetrators (33.1 percent) and witness (67.8 percent).

Findings

The SEM showed subjective norm (SN) to be the most direct influential factor of cyberbullying intention and behaviors, followed by attitude toward cyberbullying (Intention β=0.31, 0.24; p=0.01, Behavior β=0.09, 0.07; p=0.012 and 0.05, respectively). However, the SEM revealed that all variables from TPB including self-esteem in the equation can explain the variation scores of intention and cyberbullying behaviors at 54 and 67 percent levels (adjusted R2=0.54 and 0.67), respectively. The SEM showed that model modification indices indicate a good fit to the data (χ2=0.00, df=0, p>0.05, CMIN/df=0, GFI=1, AGFI=1, CFI=1 and RMSEA=0).

Research limitations/implications

The experiences or witness of family violence and support at school level, which is supposed to mitigate the bullying problems, were neglected from this study.

Practical implications

The preventive measures for cyberbullying behaviors among adolescents should involve activities fostering self-esteem, developing proper attitude and SN to prevent cyberbullying. The initiatives and developed school supportive system for adolescents to understand how to control themselves when engaging in social network are imperative. However, for future research, family violence witness and attempt to lure the cyberbullying victims into offline meeting should be explored more.

Social implications

TPB and the use of social media should be taken into account for planning and designing appropriate intervention to reduce and eliminate cyberbullying among all stakeholders in both public and private sectors in the area of health and educational institutes in order to endeavor and to advocate the anti-cyberbullying policy in Thailand.

Originality/value

TPB and self-esteem explained a substantial portion of and more modest but significant amount of variance in cyberbullying intention and behaviors. However, SN and attitude toward cyberbullying which was found to be most influential factors could be the useful information for designing intervention toward cyberbullying prevention for Thai adolescents and advocate implementing the anti-cyberbullying policy in Thailand.

Details

Journal of Health Research, vol. 34 no. 1
Type: Research Article
ISSN: 2586-940X

Keywords

Content available

Abstract

Details

A Meaningful Life at Work
Type: Book
ISBN: 978-1-78756-767-2

Open Access
Book part
Publication date: 4 June 2021

Robert D. Lytle, Tabrina M. Bratton and Heather K. Hudson

Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly…

Abstract

Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly referred to as bystander intervention models (BIMs). More recently, BIMs have been modified to facilitate initiatives to prevent various forms of online victimization. This chapter begins with a review of BIMs and recent applications of bystander intervention research to online environments. We also present several future directions for research along with applications for reducing technology-facilitated violence, including programming recommendations and theoretical development.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Pam Hrick

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory…

Abstract

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory mandates as part of an effort to combat it. This chapter argues that these bodies have the potential to meaningfully further a survivor-centered approach to combatting technology-facilitated violence against women – one that places their experiences, rights, wishes, and needs at its core. It further argues that governments should consider integrating them into a broader holistic response to this conduct.

An overview is provided of the operations of New Zealand's Netsafe, the eSafety Commissioner in Australia, Nova Scotia's Cyberscan Unit, and the Canadian Centre for Child Protection in Manitoba. These types of centralized bodies have demonstrated an ability to advance survivor-centered approaches to technology-facilitated violence against women through direct involvement in resolving instances of violence, education, and research. However, these bodies are not a panacea. This chapter outlines critiques of their operations and the challenges they face in maximizing their effectiveness.

Notwithstanding these challenges and critiques, governments should consider creating such bodies or empowering existing bodies with a statutory mandate as one aspect of a broader response to combatting technology-facilitated violence against women. Some proposed best practices to maximize their effectiveness are identified.

Open Access
Book part
Publication date: 4 June 2021

Jane Bailey, Nicola Henry and Asher Flynn

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as…

Abstract

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as technology-facilitated violence and abuse (TFVA). TFVA includes a spectrum of behaviors perpetrated online, offline, and through a range of technologies, including artificial intelligence, livestreaming, GPS tracking, and social media. This chapter provides an overview of TFVA, including a brief snapshot of existing quantitative and qualitative research relating to various forms of TFVA. It then discusses the aims and contributions of this book as a whole, before outlining five overarching themes arising from the contributions. The chapter concludes by mapping out the structure of the book.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Olusesan Ayodeji Makinde, Emmanuel Olamijuwon, Nchelem Kokomma Ichegbo, Cheluchi Onyemelukwe and Michael Gboyega Ilesanmi

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly…

Abstract

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly attention has been given to the nature of technology-facilitated violence and abuse (TFVA) across sub-Saharan Africa (SSA) despite an explosion in the use of various technologies. We conducted a literature review to identify and harmonize available data relating to the types of TFVA taking place in SSA. This was followed by an online survey of young adults through the SHYad.NET forum to understand the nature of TFVA among young adults in SSA. Our literature review revealed various types of TFVA to be happening across SSA, including cyberbullying, cyberstalking, trolling, dating abuse, image-based sexual violence, sextortion, and revenge porn. The results of our online survey revealed that both young men and women experience TFVA, with the most commonly reported TFVA being receiving unwanted sexually explicit images, comments, emails, or text messages. Female respondents more often reported repeated and/or unwanted sexual requests online via email or text message while male respondents more often reported experiencing violent threats. Respondents used various means to cope with TFVA including blocking the abuser or deleting the abused profile on social media.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Edgar Pacheco and Neil Melhuish

The nature and extent of adults' engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization…

Abstract

The nature and extent of adults' engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization. When explored, engagement in online aggression and abuse has centered on children and young people, particularly in school and higher education settings. Drawing on nationally representative data from New Zealand adults aged 18 and over, this chapter explores the overall prevalence of online aggression with a focus on gender and age. Our findings support the need to also understand adult aggressors' behaviors to better address the distress and harm caused to targets through digital communications. The chapter discusses the implications of the results for policy and practice and proposes some directions for future research.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 10 of 145