Search results

1 – 10 of 19
Open Access
Book part
Publication date: 4 June 2021

Jane Bailey, Nicola Henry and Asher Flynn

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as…

Abstract

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as technology-facilitated violence and abuse (TFVA). TFVA includes a spectrum of behaviors perpetrated online, offline, and through a range of technologies, including artificial intelligence, livestreaming, GPS tracking, and social media. This chapter provides an overview of TFVA, including a brief snapshot of existing quantitative and qualitative research relating to various forms of TFVA. It then discusses the aims and contributions of this book as a whole, before outlining five overarching themes arising from the contributions. The chapter concludes by mapping out the structure of the book.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Yee Man Louie

The rapid advancement of technology poses many social challenges including the emerging issue of technology-facilitated abuse (TFA) and violence. In Australia, women from…

Abstract

The rapid advancement of technology poses many social challenges including the emerging issue of technology-facilitated abuse (TFA) and violence. In Australia, women from culturally and linguistically diverse (CALD) backgrounds are found to be more vulnerable to domestic violence (DV) and abuse, including TFA. This chapter presents a snapshot of CALD women's technology-facilitated domestic abuse (TFDA) experiences in Melbourne through the eyes of a small group of DV practitioners. Findings show CALD women experience TFA similar to that of the mainstream, with tracking and monitoring through the use of smartphone and social media most common. Their migration and financial status, and language and digital literacy can increase their vulnerability to TFDA, making their experience more complicated. Appropriate digital services and resources together with face-to-face support services can be a way forward. Further research should focus on better understanding CALD women's perceptions of and responses to TFDA and explore ways to improve engagement with and use of community media channels/platforms.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Pam Hrick

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory…

Abstract

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory mandates as part of an effort to combat it. This chapter argues that these bodies have the potential to meaningfully further a survivor-centered approach to combatting technology-facilitated violence against women – one that places their experiences, rights, wishes, and needs at its core. It further argues that governments should consider integrating them into a broader holistic response to this conduct.

An overview is provided of the operations of New Zealand's Netsafe, the eSafety Commissioner in Australia, Nova Scotia's Cyberscan Unit, and the Canadian Centre for Child Protection in Manitoba. These types of centralized bodies have demonstrated an ability to advance survivor-centered approaches to technology-facilitated violence against women through direct involvement in resolving instances of violence, education, and research. However, these bodies are not a panacea. This chapter outlines critiques of their operations and the challenges they face in maximizing their effectiveness.

Notwithstanding these challenges and critiques, governments should consider creating such bodies or empowering existing bodies with a statutory mandate as one aspect of a broader response to combatting technology-facilitated violence against women. Some proposed best practices to maximize their effectiveness are identified.

Article
Publication date: 7 November 2023

Janine Arantes

The purpose of this scoping rapid review was to identify and analyse existing qualitative methodologies that have been used to investigate K-12 teachers' lived experiences of…

Abstract

Purpose

The purpose of this scoping rapid review was to identify and analyse existing qualitative methodologies that have been used to investigate K-12 teachers' lived experiences of adult cyber abuse as a result of student content “going viral” to propose a novel methodological stance incorporating the Australian Online Safety Act 2021.

Design/methodology/approach

A search of Google Scholar was conducted using keywords and phrases related to cyber trauma, teachers, qualitative methods and the Online Safety Act. Inclusion criteria for the review were: (1) published in English, (2) focused on teachers' experiences of online abuse and cyberbullying associated with viral posts and (3) employed a qualitative inquiry methodology. Full-text articles were obtained for those that met the inclusion criteria. Data were extracted and analysed using a PRISMA flowchart and inductive thematic analysis.

Findings

This methodology is considered to be justified, as the eSafety Commissioner's Safety-by-Design principles do not have any legal or regulatory enforceability, whereas the Online Safety Act 2021 provides the Australian eSafety Commissioner an avenue to drive greater algorithmic transparency and accountability.

Research limitations/implications

The findings of this review informed the development of a novel methodological stance for investigating Australian teachers' lived experiences of adult cyber abuse associated with viral posts. It provides a methodological positioning to support trauma informed qualitative research into adult cyber abuse, informed by the work of the eSafety Commissioner and the Online Safety Act.

Originality/value

Cybertrauma is described as “any trauma that is a result of self- or, other-directed interaction with, mediated through, or from any electronic Internet/cyberspace ready device or machine learning algorithm, that results in impact now or the future” (Knibbs, 2021). It may result from the tracking of movement through various mobile phone features and applications such as location sharing, non-consensual monitoring of social media, and humiliation or punishment through the sharing of intimate images online, through to direct messages of abuse or threats of violence or humiliation. These actions are further perpetuated through automated searches, insights and recommendations on social media (i.e. engagement metrics promote memes, Facebook posts, Tweets, Tiktoks, Youtubes and so on). This is a novel methodology, as it not only considers direct cybertrauma but also automated forms of cybertrauma.

Details

Qualitative Research Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1443-9883

Keywords

Abstract

Details

Fake News in Digital Cultures: Technology, Populism and Digital Misinformation
Type: Book
ISBN: 978-1-80117-877-8

Article
Publication date: 24 May 2023

Cynthia Brown, Renee Fiolet, Dana McKay and Bridget Harris

This paper presents a novel exploration of the story completion (SC) method for investigating perpetration of technology-facilitated abuse in relationships (TAR).

Abstract

Purpose

This paper presents a novel exploration of the story completion (SC) method for investigating perpetration of technology-facilitated abuse in relationships (TAR).

Design/methodology/approach

The authors adopted the infrequently used SC method to explore TAR perpetration. The perpetration of TAR can involve socially undesirable and potentially illegal behaviours such as online stalking, non-consensual sharing of nude images, and other coercive and controlling behaviours. These problematic behaviours present an ideal context for employing the SC method to reveal new data on TAR perpetrator perspectives, motivations and behaviours.

Findings

The SC method elicited new hypotheses regarding TAR perpetration behaviours and motivations. Post-study reflection on the multifaceted nature of perpetration raised questions about the utility of SC as a stand-alone method for investigating TAR perpetration. Challenges encountered included: striking the most effective length, detail and ambiguity in the story stems, difficulty in eliciting important contextual features in participants’ stories, and other issues scholars encounter when investigating perpetration of violence more broadly. The authors close with suggestions for more effective use of SC methodology in TAR and intimate partner violence research.

Originality/value

This paper expands discussion of the SC method’s application and extends scholarship on violence and perpetration research methodologies. The paper demonstrates the importance of story stem design to the attainment of research objectives and the usefulness and limitations of SC in exploring this sensitive topic and hard-to-reach population. It also advocates for the combined application of SC with other methodological approaches for the attainment of research outcomes when investigating multifaceted phenomenon.

Details

Qualitative Research Journal, vol. 23 no. 5
Type: Research Article
ISSN: 1443-9883

Keywords

Article
Publication date: 6 June 2022

Alex McCord, Philip Birch and Lewis A. Bizo

Global evidence suggests a potential displacement of youth offending from the physical to the digital landscape, requiring revision of existing detection and intervention methods…

Abstract

Purpose

Global evidence suggests a potential displacement of youth offending from the physical to the digital landscape, requiring revision of existing detection and intervention methods. This study aims to explore pathways from harmful to illegal online activity perpetrated by young people, legislation and police perspectives, current detection methods and interventions.

Design/methodology/approach

This perspective paper examines issues observed within a larger systematic literature review on digital youth offending.

Findings

A trajectory from acceptable to harmful and subsequently illegal behaviour was identified, with a particular pathway from unethical video game activity to digitally dependent offending. Legislation and police perspectives vary by jurisdiction, with a common theme that increased officer education is key to the level of preparedness to investigate cases. Machine learning and automatic prevention show promise as detection and disruption processes, with education recommended for young people as a deterrent and redirection of skills to positive outcomes.

Research limitations/implications

Recommendations for further research include a broad survey of school students to include all identified areas of digital offending, which could drive the development of targeted education by law enforcement and partner agencies for young people.

Practical implications

The shift in youth offending requires the justice and educational systems to adjust how they respond to youth crime. Policy and practise shifts can include further exploration of investigative hacking, education for law enforcement and educational prevention and redirection programmes aimed at youth.

Originality/value

The digital displacement of youth offending is a progressively emerging concept. This paper examines the current state of response from educational and law enforcement agencies and discusses the next steps based on what is currently known.

Details

The Journal of Forensic Practice, vol. 24 no. 3
Type: Research Article
ISSN: 2050-8794

Keywords

Article
Publication date: 17 September 2019

Susan Whatman, Roberta Thompson and Katherine Main

The purpose of this paper is to suggest how well-being messages are recontextualized into school-based contexts from an analysis of national policy and state curricular approaches…

1342

Abstract

Purpose

The purpose of this paper is to suggest how well-being messages are recontextualized into school-based contexts from an analysis of national policy and state curricular approaches to health education as reported in the findings of two selected case studies as well as community concerns about young people’s well-being.

Design/methodology/approach

A cross-sectional review of Australian federal and state-level student well-being policy documents was undertaken. Using two case examples of school-based in-curricular well-being programs, the paper explores how discourses from these well-being policy documents are recontextualized through progressive fields of translation and pedagogic decision making into local forms of curriculum.

Findings

Pedagogic messages about well-being in Australia are often extra-curricular, in that they are rarely integrated into one or across existing subject areas. Such messages are increasingly focused on mental health, around phenomena such as bullying. Both case examples clearly demonstrate how understandings of well-being respond to various power relations and pressures emanating from stakeholders within and across official pedagogic fields and other contexts such as local communities.

Originality/value

The paper focusses on presenting an adaptation of Bernstein’s (1990) model of social reproduction of pedagogic discourse. The adapted model demonstrates how “top-down” knowledge production from the international disciplines shaping curriculum development and pedagogic approaches can be replaced by community context-driven political pressure and perceived community crises. It offers contemporary insight into youth-at-risk discourses, well-being approaches and student mental health.

Details

Health Education, vol. 119 no. 5/6
Type: Research Article
ISSN: 0965-4283

Keywords

Article
Publication date: 4 August 2020

Jayne Cleave and John Geijsman

LibraryCraft was created to bring communities together across Western Australia (WA) in a safe, structured and moderated way so that players could stretch their creativity and…

1283

Abstract

Purpose

LibraryCraft was created to bring communities together across Western Australia (WA) in a safe, structured and moderated way so that players could stretch their creativity and imagination. LibraryCraft uses the features of Minecraft that stretch users’ innovation and creative thinking, develops their STEAM skills and builds social and life skills such as collaboration, negotiation, economic management and civic engagement.

Design/methodology/approach

In late 2019, the Fremantle Library launched a small, local Minecraft server for the local community of young people. After several months of testing and upgrades, LibraryCraft was made available to all players aged 7–17 across WA, and WA local governments were invited to participate.

Findings

The COVID-19 pandemic led to a cancellation of Fremantle Library in-person programmes; LibraryCraft, as a purely online programme, was scaled up, and in a few weeks, had more than tripled its player base. At the time of writing, LibraryCraft brings together 20 WA local councils, reaches over 100 players from Derby-West Kimberley to Albany and sees hundreds of play hours logged each week. Players have created new friendships across the state and are regularly working collaboratively on challenges and exploration.

Originality/value

While Minecraft servers operated by libraries are far from new, LibraryCraft is unique. No groups of libraries have run Minecraft servers collaboratively in Australia before, and none is available state wide. The programme is highly valued with families in WA, providing a safe social outlet for players stuck at home in isolation.

Details

Digital Library Perspectives, vol. 36 no. 4
Type: Research Article
ISSN: 2059-5816

Keywords

Open Access
Book part
Publication date: 4 June 2021

Gisella Lopes Gomes Pinto Ferreira

Much of the research on intimate partner violence focuses on adults, and little of it emanates from the Global-South. The study reported upon in this chapter is aimed at…

Abstract

Much of the research on intimate partner violence focuses on adults, and little of it emanates from the Global-South. The study reported upon in this chapter is aimed at addressing these gaps. Adopting a Southern Feminist Framework, it discusses findings from interviews with Brasilian and Australian advocates working on prevention of youth IPV. Participants from both countries noted disturbing instances of digital coercive control among the youth with whom they work, as well as underlying factors such as gender-based discrimination that simultaneously contribute to the prevalence of such behaviors, as well as their normalization among young people. However, they also emphasized the positive role that technology can play in distributing educational programming that reaches young people where they are and circumvents conservative agendas that in some cases keep education about gender discrimination and healthy relationships out of schools.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 10 of 19