Search results

1 – 10 of 26
Open Access
Book part
Publication date: 4 June 2021

Eva PenzeyMoog and Danielle C. Slakoff

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this…

Abstract

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this chapter, we discuss three unique types of technological abuse: (1) financial abuse via banking websites and apps; (2) abuse via smart home devices (i.e., “Internet of Things” abuse); and (3) stalking via geo-location or GPS. We also argue pregnancy and wellness apps provide an opportunity for meaningful intervention for pregnant victims of domestic violence.

While there is no way to ensure users' safety in all situations, we argue thoughtful considerations while designing and building digital products can result in meaningful contributions to victims' safety. This chapter concludes with PenzeyMoog's (2020) “Framework for Inclusive Safety,” which is a roadmap for building technology that increases the safety of domestic violence survivors. This framework includes three key points: (1) the importance of educating technologists about domestic violence; (2) the importance of identifying possible abuse situations and designing against them; and (3) identifying user interactions that might signal abuse and offering safe interventions.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Laura Vitis

Technology-facilitated violence against women (TFVW) is readily becoming a key site of analysis for feminist criminologists. The scholarship in this area has identified online…

Abstract

Technology-facilitated violence against women (TFVW) is readily becoming a key site of analysis for feminist criminologists. The scholarship in this area has identified online sexual harassment, contact-based harassment, image-based abuse, and gender-based cyberhate – among others – as key manifestations of TFVW. It has also unpacked the legal strategies available to women seeking formal justice outcomes. However, much of the existing empirical scholarship has been produced within countries like the United States, United Kingdom, and Australia, and there has been limited research on this phenomenon within South East Asia. As such, this chapter maps how technology is shaping Singaporean women's experiences of gendered, sexual, and domestic violence. To do so, it draws upon findings from a research project which examined TFVW in Singapore by utilizing semistructured interviews with frontline workers in the fields of domestic and sexual violence and LGBT services. Drawing from Dragiewicz et al.’s (2018) work on technology-facilitated coercive control (TFCC), I argue that victims-survivors of dating, domestic, and family violence need to be provided with support that is TFCC informed and technically guided. I also suggest that further research is needed to fully understand the prevalence and nature of TFVW in the Singaporean context.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Alison J. Marganski and Lisa A. Melander

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology…

Abstract

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology demands that we pay attention to not only harms associated with interconnectivity, but also the potential for technology to counter offenses and “do good.” This chapter discusses technology as both a weapon and a shield when it comes to violence against women and girls in public spaces and private places. First, we review the complex and varied manifestations of technological gender violence, ranging from the use of technology to exploit, harass, stalk, and otherwise harm women and girls in communal spaces, to offenses that occur behind closed doors. Second, we discuss justice-related responses, underscoring how women and girls have “flipped the script” when their needs are not met. By developing innovative ways to respond to the wrongs committed against them and creating alternate systems that offer a voice, victims/survivors have repurposed technology to redress harms and unite in solidarity with others in an ongoing quest for justice.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 30 January 2012

Anne Leena Marika Kauppi, Tuija Vanamo, Kari Karkola and Juhani Merikanto

A parent who continuously physically abuses her/his child doesn't aim to kill the child but commits an accidental filicide in a more violent outburst of anger. Fatal abuse deaths…

746

Abstract

A parent who continuously physically abuses her/his child doesn't aim to kill the child but commits an accidental filicide in a more violent outburst of anger. Fatal abuse deaths are prevented by recognition of signs of battering in time. Out of 200 examined intra-familial filicides, 23 (12%) were caused by child battering and 13 (7%) by continuous battering. The medical and court records of the victim and the perpetrator were examined. The perpetrator was the biological mother and the victim was male in 69 per cent of the cases. The abused children were either younger than one year or from two-and-a-half to four years old. Risk factors of the victim (being unwanted, premature birth, separation from the parent caused by hospitalization or custodial care, being ill and crying a lot) and the perpetrator (personality disorder, low socioeconomic status, chaotic family conditions, domestic violence, isolation, alcohol abuse) were common. The injuries caused by previous battering were mostly soft tissue injuries in head and limbs and head traumas and the battering lasted for days or even an year. The final assault was more violent and occurred when the parent was more anxious, frustrated or left alone with the child. The perpetrating parent was diagnosed as having a personality disorder (borderline, narcissistic or dependent) and often substance dependence (31%). None of them were psychotic. Authorities and community members should pay attention to the change in child's behavior and inexplicable injuries or absence from daycare. Furthermore if the parent is immature, alcohol dependent, have a personality disorder and is unable to cope with the demands the small child entails in the parent's life, the child may be in danger.

Details

Mental Illness, vol. 4 no. 1
Type: Research Article
ISSN: 2036-7465

Keywords

Open Access
Book part
Publication date: 4 June 2021

Bridget Harris and Delanie Woodlock

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical…

Abstract

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical framework for technology-facilitated harms in heterosexual relationships which we characterize as digital coercive control. Here, we include behaviors which can be classified as abuse and stalking and also individualized tactics which are less easy to categorize, but evoke fear and restrict the freedoms of a particular woman. Drawing on their knowledge of a victim/survivor's experiences and, in the context of patterns and dynamics of abuse, digital coercive control strategies are personalized by perpetrators and extend and exacerbate “real-world” violence.

Digital coercive control is unique because of its spacelessness and the ease, speed, and identity-shielding which technology affords. Victim/survivors describe how perpetrator use of technology creates a sense of omnipresence and omnipotence which can deter women from exiting violent relationships and weakens the (already tenuous) notion that abuse can be “escaped.” We contend that the ways that digital coercive control shifts temporal and geographic boundaries warrant attention. However, spatiality more broadly cannot be overlooked. The place and shape in which victim/survivors and perpetrators reside will shape both experiences of and response to violence. In this chapter, we explore these ideas, reporting on findings from a study on digital coercive control in regional, rural, and remote Australia. We adopt a feminist research methodology in regard to our ethos, research processes, analysis, and the outputs and outcomes of our project. Women's voices are foreground in this approach and the emphasis is on how research can be used to inform, guide, and develop responses to domestic violence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 10 December 2021

Martha Saavedra

Abstract

Details

Sport, Gender and Development
Type: Book
ISBN: 978-1-83867-863-0

Open Access

Abstract

Details

The Incel Rebellion: The Rise of the Manosphere and the Virtual War Against Women
Type: Book
ISBN: 978-1-83982-257-5

Open Access
Book part
Publication date: 4 June 2021

Jane Bailey and Sara Shayan

This article considers how digital technologies are informed by, and implicated in, the systematic and interlocking oppressions of colonialism, misogyny, and racism, all of which…

Abstract

This article considers how digital technologies are informed by, and implicated in, the systematic and interlocking oppressions of colonialism, misogyny, and racism, all of which have been identified as root causes of the missing and murdered Indigenous women crisis in Canada. The authors consider how technology can facilitate multiple forms of violence against women including stalking and intimate partner violence, human trafficking, pornography and child abuse images, and online hate and harassment and note instances where Indigenous women and girls may be particularly vulnerable. The authors also explore some of the complexities related to police use of technology for investigatory purposes, touching on police use of social media and DNA technology. Without simplistically blaming technology, the authors argue that technology interacts with multiple factors in the complex historical, socio-cultural environment that incubates the national crisis of missing and murdered Indigenous women and girls. The article concludes with related questions that may be considered at the impending national inquiry.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 12 September 2016

Angela Sweeney, Sarah Clement, Beth Filson and Angela Kennedy

The purpose of this paper is to describe and explain trauma-informed approaches (TIAs) to mental health. It outlines evidence on the link between trauma and mental health…

64405

Abstract

Purpose

The purpose of this paper is to describe and explain trauma-informed approaches (TIAs) to mental health. It outlines evidence on the link between trauma and mental health, explains the principles of TIAs and their application in mental health and explores the extent to which TIAs are impacting in the UK.

Design/methodology/approach

The approach is a conceptual account of TIAs including a consideration of why they are important, what they are and how they can become more prevalent in the UK. This is supported by a narrative overview of literature on effectiveness and a scoping of the spread of TIAs in the UK.

Findings

There is strong and growing evidence of a link between trauma and mental health, as well as evidence that the current mental health system can retraumatise trauma survivors. There is also emerging evidence that trauma-informed systems are effective and can benefit staff and trauma survivors. Whilst TIAs are spreading beyond the USA where they developed, they have made little impact in the UK. The reasons for this are explored and ways of overcoming barriers to implementation discussed.

Originality/value

This paper – authored by trauma survivors and staff – describes an innovative approach to mental health service provision that, it is argued, could have immense benefits for staff and service users alike.

Details

Mental Health Review Journal, vol. 21 no. 3
Type: Research Article
ISSN: 1361-9322

Keywords

Open Access
Article
Publication date: 28 September 2022

Juan Dempere and Kennedy Modugu

This article intends to analyse the explanatory power of the Travel and Tourism Competitiveness Index (TTCI) and some of its constituent factors on national success metrics in…

1522

Abstract

Purpose

This article intends to analyse the explanatory power of the Travel and Tourism Competitiveness Index (TTCI) and some of its constituent factors on national success metrics in managing the initial surge of the COVID-19 pandemic.

Design/methodology/approach

The authors study the outbreak control effectiveness of 132 countries during the first semester of 2020. The authors apply generalized linear regression models and weighted least squares models using 6 COVID-19-related dependent variables, 9 TTCI-related independent variables and 12 control variables.

Findings

The results suggest that countries with superior TTCI values and selected constituent factors have the highest daily averages of coronavirus infections and fatalities per million and the highest speed rates of COVID-19 spread. The authors also find that these countries have the shortest government response time, the lowest daily average of the social restrictions index and the shortest time from the first case reported in China to the first case reported nationally.

Originality/value

To the best of the authors' awareness, no previous study exists analysing the statistical relationship between the TTCIB and some of its constituent factors with the selected metrics of national success at managing the initial surge of the COVID-19 pandemic. This fact represents the primary evidence of this article's unique contribution.

研究目的

本文擬分析旅行及觀光競爭力指數、以及其部份構成因素,如何影響有關國家在新型冠狀病毒肺炎大爆發初期控制病毒傳播方面的成功指標。

研究設計/方法/理念

我們就132個國家於2020年上半年控制肺炎爆發方面的表現進行研究。我們以廣義線性回歸模型和加權最小平方法進行分析研究,當中使用了六個與新型冠狀病毒肺炎有關的因變數、九個與旅行及觀光競爭力指數有關的自變數、和12個控制變量。

研究結果

研究結果暗示、在擁有優越的旅行及觀光競爭力指數值和選定的構成因素的國家,以百萬人來計算,每日冠狀病毒感染及死亡的平均數字是最高的; 而且,新型冠狀病毒肺炎的傳播速度也是最高的。研究結果亦顯示、在這些國家,政府反應所需的時間是最短的,社會限制指數的日均值是最低的,以及首宗在中國被報導的個案與首宗在有關的國家被全國性地報導的個案之間的時間距是最短的。

研究的原創性/價值

盡作者們所知,從前似沒有相關的研究、以國家在新型冠狀病毒肺炎大爆發初期成功控制病毒傳播的選定指數、來分析旅行及觀光競爭力指數與其部分構成因素之間的統計關係; 這正是本文所作獨特貢獻的基本證據。

Details

European Journal of Management and Business Economics, vol. 32 no. 3
Type: Research Article
ISSN: 2444-8451

Keywords

1 – 10 of 26