Search results

1 – 10 of 55
Article
Publication date: 27 September 2021

Kevin Walby and Courtney Joshua

This paper aims to examine the online communications, symbolism and imagery of 35 community crime prevention and crime watch groups across Canada to explore how these groups…

Abstract

Purpose

This paper aims to examine the online communications, symbolism and imagery of 35 community crime prevention and crime watch groups across Canada to explore how these groups organize themselves and assess the resulting community actions.

Design/methodology/approach

Contributing to digital criminology, gathering data from open access platforms such as Facebook and online platforms such as websites, the authors analyse communications from community crime prevention and crime watch groups in 12 Canadian cities. The authors used qualitative content analysis to explore the types of posts to assess trends and patterns in types of ideas communicated and symbolized.

Findings

Whilst such groups bring the community together to help promote community safety, the groups may also encourage stereotyping, shaming and even vigilantism through misrepresenting the amount of crime occurring in the community and focusing on fear. The authors demonstrate how crime prevention becomes sidelined amongst most of the groups, and how intense crime reporting and the focus on fear derail actual community development.

Research limitations/implications

The current study is limited to two years of posts from each group under examination. Interviews with members of online community crime prevention and crime watch groups would provide insights into the lived experience of regular users and their reasons for interacting with the group.

Practical implications

Given some of the vigilante-style the actions of such groups, the authors would suggest these groups pose a governance problem for local governments.

Originality/value

Community crime prevention and crime watch groups are not a new phenomenon, but their activities are moving online in ways that deserve criminological research. The authors contribute to the field of digital criminology by researching how online communications shape community crime prevention organizations and how ideas about regulation of crime and social control circulate online. The authors also explain how this community crime prevention trend may contribute to issues of vigilantism and increased transgression.

Details

Safer Communities, vol. 20 no. 4
Type: Research Article
ISSN: 1757-8043

Keywords

Book part
Publication date: 3 November 2014

Daniel Trottier

Social media platforms, along with networked devices and applications, enable their user base to produce, access and circulate large volumes of data. On the one hand, this…

Abstract

Purpose

Social media platforms, along with networked devices and applications, enable their user base to produce, access and circulate large volumes of data. On the one hand, this development contains an empowering potential for users, who can make otherwise obscured aspects of social life visible, and coordinate social action in accordance. Yet the preceding activities in turn render these users visible to governments as well as the multinational companies that operate these services. Between these two visions lie more nuanced accounts of individuals coordinating via social data for reactionary purposes, as well as policing and intelligence agencies struggling with the affordances of big data.

Design/methodology/approach

This chapter considers how individual users as well as police agencies respectively actualise the supposedly revolutionary and repressive potentials associated with big data. It briefly considers the broader social context in which ‘big data’ is situated, which includes the hardware, software, individuals and cultural values that render big data meaningful and useful. Then, in contrast to polarising visions of the social impact of big data, it considers two sets of practices that speak to a more ambivalent potentiality. First, recent examples suggest a kind of crowd-sourced vigilantism, where individuals rely on ubiquitous data and devices in order to reproduce law and order politics. Second, police agencies in various branches of European governments report a sense of obligation to turn to social data as a source of intelligence and evidence, yet attempts to do so are complicated by both practical and procedural challenges. A combination of case studies and in-depth interviews offers a grounded understanding of big data in practice, in contrast to commonly held visions of these technologies.

Findings

First, big data is only ever meaningful in use. While they may be contained in databases in remote locations, big data do not exist in a social vacuum. Their impact cannot be fully understood in the context of newly assembled configurations or ‘game-changing’ discourses. Instead, they are only knowable in the context of existing practices. These practices can initially be the sole remit of public discourse shaped by journalists, tech-evangelists and even academics. Yet embodied individual and institutional practices also emerge, and this may contradict or at least complicate discursive assertions. Secondly, the range of devices and practices that make up big data are engaged in a bilateral relation with these practices. They may be a platform to further reproduce relations of information exchange and power relations. Yet they may also reconfigure these relations.

Research limitations/implications

This research is limited to a sample of respondents based in the European Union, and based at a particular stage of big data and social media monitoring uptake. Subsequent research should look at how this uptake is occurring elsewhere, along with the medium to long-term implications of big data monitoring. Finally, subsequent research should consider how citizens and other social actors are coping with these emerging practices.

Originality/value

This chapter considers practices associated with big data monitoring and draws from cross-national empirical data. It stands in contrast to overly optimistic as well as well as totalising accounts of the social costs and consequences of big data. For these reasons, this chapter will be of value to scholars in internet studies, as well as privacy advocates and policymakers who are responsive to big data developments.

Details

Big Data? Qualitative Approaches to Digital Research
Type: Book
ISBN: 978-1-78441-050-6

Keywords

Open Access
Book part
Publication date: 4 June 2021

Anne Cheung

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual…

Abstract

Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual concerned. Intuitively, it is tempting to condemn doxing as a crude form of cyber violence that weaponizes personal data. When it is used as a strategy of resistance by the powerless to hold the powerful accountable, however, a more nuanced understanding is called for. This chapter focuses on the doxing phenomenon in Hong Kong, where doxing incidents against police officers and their family members have skyrocketed since 2019 (a 75-fold increase over 2018). It contends that doxing for political purposes is closely related to digital vigilantism, signifying a loss of confidence in the ruling authority and a yearning for an alternative form of justice. The chapter therefore argues that public interest should be recognized as a legal defense in doxing cases when those discharging or entrusted with public duty are the targets. Equally, it is important to confine the categories of personal data disclosed to information necessary to reveal the alleged wrongdoer or wrongdoing. Only in this way can a fair balance be struck between privacy, freedom of expression, and public interest.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Expert briefing
Publication date: 18 March 2021

Relatively low internet penetration rates (an average of 40% across the continent) and stark differences in digital access within and across states mask social media’s increasing…

Article
Publication date: 6 June 2022

Kimberly V. Legocki, Kristen L. Walker and Meike Eilert

This paper aims to contribute to the emerging body of research on firestorms, specifically on the inflammatory user-generated content (UGC) created in response to brand…

Abstract

Purpose

This paper aims to contribute to the emerging body of research on firestorms, specifically on the inflammatory user-generated content (UGC) created in response to brand transgressions. By analyzing and segmenting UGC created and shared in the wake of three different events, the authors identify which type of inflammatory message is most likely to be widely shared; thus, contributing to a possible online firestorm.

Design/methodology/approach

Tweets were collected involving brand transgressions in the retail, fast food and technology space from varying timeframe and diverse media coverage. Then, the tweets were coded for message intention and analyzed with linguistics software to determine the message characteristics and framing. A two-step cluster analysis identified three types of UGC.

Findings

The authors found that message dimensions and the framing of tweets in the context of brand transgressions differed in characteristics, sentiment, call to action and the extent to which the messages were shared. The findings contradict traditional negative word-of-mouth studies involving idiosyncratic service and product failure. During online brand firestorms, rational activism messages with a call to action, generated in response to a firm’s transgression or “sparks,” have a higher likelihood of being shared (virality).

Originality/value

This research provides novel insights into UGC created after brand transgressions. Different types of messages created after these events vary in the extent that they “fan the flames” of the transgression. A message typology and flowchart are provided to assist managers in identifying and responding to three message types: ash, sparks and embers.

Article
Publication date: 29 July 2024

Kenji Logie and Marie-Helen Maras

The objective of this paper is to explore the development of the Blackmail-as-a-Service business model within the Digital Thrift Shop. This service model involves the sale of…

Abstract

Purpose

The objective of this paper is to explore the development of the Blackmail-as-a-Service business model within the Digital Thrift Shop. This service model involves the sale of doxing files to customers, as well as the removal of the content from the shop and its dissemination to victims or individuals closely connected to them.

Design/methodology/approach

To access the Digital Thrift shop, this study relies on the Tor browser and a darknet indexing site. The authors then use an application to collect and store the web pages as PDFs. Finally, content analysis is performed on these PDFs to understand the Blackmail-as-a-Service business model developed by the Digital Thrift.

Findings

The doxing data available on the Digital Thrift is primarily targeted toward women. Digital Thrift has also established a way to value the purchase, sale and the removal of blackmail data. The presence of Blackmail-as-a-Service on darknet sites poses unique challenges for criminal justice agencies in terms of jurisdiction, due to the lack of harmonized laws and the obstacles involved in taking down content from darknet sites. Finally, the use of a service model for blackmail allows criminals without technical skills to engage in cyber-victimization using blackmail.

Originality/value

Research into Blackmail-as-a-Service from boutique providers has not been conducted. To the best of the authors’ knowledge, this is one of the first study seeking to understand the Blackmail-as-a-Service business model on the darknet when used to target adults. This study presents evidence of a lack of connection between the buyers of the compromising material and the potential victim, challenging preconceived notions about image-based sexual abuse and its connection to individuals involved in interpersonal relationships.

Details

Journal of Aggression, Conflict and Peace Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1759-6599

Keywords

Content available
Article
Publication date: 14 September 2015

Rebecca Whiting and Katrina Pritchard

379

Abstract

Details

Qualitative Research in Organizations and Management: An International Journal, vol. 10 no. 3
Type: Research Article
ISSN: 1746-5648

Content available
Book part
Publication date: 10 September 2021

Ignas Kalpokas

Abstract

Details

Malleable, Digital, and Posthuman
Type: Book
ISBN: 978-1-80117-621-7

Open Access
Article
Publication date: 12 October 2023

Philip Wamprechtsamer

This paper aims to systematically unpack the ideal of organizational transparency by tracing the concept's origins in the era of Enlightenment. Based on a genealogical…

1364

Abstract

Purpose

This paper aims to systematically unpack the ideal of organizational transparency by tracing the concept's origins in the era of Enlightenment. Based on a genealogical reconstruction, the article explores different transparency understandings in key areas of online public relations (PR) and discusses the opportunities and challenges they present for the field.

Design/methodology/approach

This is a conceptual paper that unfolds a genealogical reconstruction to uncover different transparency ideals of modernity. These perspectives are then transferred to the field of online PR to discuss their ethical and practical implications in the context of digitalization.

Findings

Claims for transparency manifest in three distinct ideals, namely normative, instrumental and expressive transparency, which are also pursued in online PR. These ideals are related to associated concepts, like dialogue, control and authenticity, which serve as transparency proxies. Moreover, each transparency ideal inherits an ambivalence that presents unique opportunities and challenges for PR practitioners.

Practical implications

Instead of an unquestioned belief in the ideal of organizational transparency, the paper urges communication practitioners to critically reflect on the ambivalent nature of different transparency regimes in the context of digitalization and provides initial recommendations on how to manage digital transparency in online PR responsibly.

Originality/value

The paper contributes to the vivid debate surrounding organizational transparency in the context of digitalization by offering a novel and systematic analysis of the multifaced concept of transparency while opening new research avenues for further conceptual and empirical research.

Details

Journal of Communication Management, vol. 28 no. 2
Type: Research Article
ISSN: 1363-254X

Keywords

Book part
Publication date: 23 April 2021

Sarah Lageson and Kateryna Kaplun

Purpose – In a digital environment, a simple accusation has the potential to permanently attach to a person’s identity. Our purpose here is to identify several types of…

Abstract

Purpose – In a digital environment, a simple accusation has the potential to permanently attach to a person’s identity. Our purpose here is to identify several types of accusations that persist in the internet environment: person to person accusations, media documented accusations, and accusations by the state. Approach – Using a typology of cases and legal analyses, the authors trace how accusations proliferate and persist across the internet and offer a set of social and legal explanations for the salience of public accusation online. Findings – The authors ultimately find that in contemporary society, the act of accusing increasingly replaces the desire or need for a fair and just outcome. The authors close by discussing implications for the accused and potential avenues for remedy. Originality – Our contribution bridges sociological and legal perspectives on the intersection of free speech, defamation, and digital media.

Details

Media and Law: Between Free Speech and Censorship
Type: Book
ISBN: 978-1-80071-729-9

Keywords

1 – 10 of 55