Search results

1 – 8 of 8
Open Access
Book part
Publication date: 1 December 2022

Clemens Striebing

Purpose: Previous research identified a measurement gap in the individual assessment of social misconduct in the workplace related to gender. This gap implies that women respond…

Abstract

Purpose: Previous research identified a measurement gap in the individual assessment of social misconduct in the workplace related to gender. This gap implies that women respond to comparable self-reported acts of bullying or sexual discrimination slightly more often than men with the self-labeling as “bullied” or “sexually discriminated and/or harassed.” This study tests this hypothesis for women and men in the scientific workplace and explores patterns of gender-related differences in self-reporting behavior.

Basic design: The hypotheses on the connection between gender and the threshold for self-labeling as having been bullied or sexually discriminated against were tested based on a sample from a large German research organization. The sample includes 5,831 responses on bullying and 6,987 on sexual discrimination (coverage of 24.5 resp. 29.4 percentage of all employees). Due to a large number of cases and the associated high statistical power, this sample for the first time allows a detailed analysis of the “gender-related measurement gap.” The research questions formulated in this study were addressed using two hierarchical regression models to predict the mean values of persons who self-labeled as having been bullied or sexually discriminated against. The status of the respondents as scientific or non-scientific employees was included as a control variable.

Results: According to a self-labeling approach, women reported both bullying and sexual discrimination more frequently. This difference between women and men disappeared for sexual discrimination when, in addition to the gender of a person, self-reported behavioral items were considered in the prediction of self-labeling. For bullying, the difference between the two genders remained even in this extended prediction. No statistically significant relationship was found between the frequency of self-reported items and the effect size of their interaction with gender for either bullying or sexual discrimination. When comparing bullying and sexual discrimination, it should be emphasized that, on average, women report experiencing a larger number of different behavioral items than men.

Interpretation and relevance: The results of the study support the current state of research. However, they also show how volatile the measurement instruments for bullying and sexual discrimination are. For example, the gender-related measurement gap is considerably influenced by single items in the Negative Acts Questionnaire and Sexual Experience Questionnaire. The results suggest that women are generally more likely than men to report having experienced bullying and sexual discrimination. While an unexplained “gender gap” in the understanding of bullying was found for bullying, this was not the case for sexual discrimination.

Details

Diversity and Discrimination in Research Organizations
Type: Book
ISBN: 978-1-80117-959-1

Keywords

Open Access
Book part
Publication date: 4 June 2021

Eva PenzeyMoog and Danielle C. Slakoff

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this…

Abstract

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this chapter, we discuss three unique types of technological abuse: (1) financial abuse via banking websites and apps; (2) abuse via smart home devices (i.e., “Internet of Things” abuse); and (3) stalking via geo-location or GPS. We also argue pregnancy and wellness apps provide an opportunity for meaningful intervention for pregnant victims of domestic violence.

While there is no way to ensure users' safety in all situations, we argue thoughtful considerations while designing and building digital products can result in meaningful contributions to victims' safety. This chapter concludes with PenzeyMoog's (2020) “Framework for Inclusive Safety,” which is a roadmap for building technology that increases the safety of domestic violence survivors. This framework includes three key points: (1) the importance of educating technologists about domestic violence; (2) the importance of identifying possible abuse situations and designing against them; and (3) identifying user interactions that might signal abuse and offering safe interventions.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Yee Man Louie

The rapid advancement of technology poses many social challenges including the emerging issue of technology-facilitated abuse (TFA) and violence. In Australia, women from…

Abstract

The rapid advancement of technology poses many social challenges including the emerging issue of technology-facilitated abuse (TFA) and violence. In Australia, women from culturally and linguistically diverse (CALD) backgrounds are found to be more vulnerable to domestic violence (DV) and abuse, including TFA. This chapter presents a snapshot of CALD women's technology-facilitated domestic abuse (TFDA) experiences in Melbourne through the eyes of a small group of DV practitioners. Findings show CALD women experience TFA similar to that of the mainstream, with tracking and monitoring through the use of smartphone and social media most common. Their migration and financial status, and language and digital literacy can increase their vulnerability to TFDA, making their experience more complicated. Appropriate digital services and resources together with face-to-face support services can be a way forward. Further research should focus on better understanding CALD women's perceptions of and responses to TFDA and explore ways to improve engagement with and use of community media channels/platforms.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Bridget Harris and Delanie Woodlock

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical…

Abstract

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical framework for technology-facilitated harms in heterosexual relationships which we characterize as digital coercive control. Here, we include behaviors which can be classified as abuse and stalking and also individualized tactics which are less easy to categorize, but evoke fear and restrict the freedoms of a particular woman. Drawing on their knowledge of a victim/survivor's experiences and, in the context of patterns and dynamics of abuse, digital coercive control strategies are personalized by perpetrators and extend and exacerbate “real-world” violence.

Digital coercive control is unique because of its spacelessness and the ease, speed, and identity-shielding which technology affords. Victim/survivors describe how perpetrator use of technology creates a sense of omnipresence and omnipotence which can deter women from exiting violent relationships and weakens the (already tenuous) notion that abuse can be “escaped.” We contend that the ways that digital coercive control shifts temporal and geographic boundaries warrant attention. However, spatiality more broadly cannot be overlooked. The place and shape in which victim/survivors and perpetrators reside will shape both experiences of and response to violence. In this chapter, we explore these ideas, reporting on findings from a study on digital coercive control in regional, rural, and remote Australia. We adopt a feminist research methodology in regard to our ethos, research processes, analysis, and the outputs and outcomes of our project. Women's voices are foreground in this approach and the emphasis is on how research can be used to inform, guide, and develop responses to domestic violence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Chandell Gosse

Online environments have become a central part of our social, private, and economic life. The term for this is “digital existence,” characterized as a new epoch in mediated…

Abstract

Online environments have become a central part of our social, private, and economic life. The term for this is “digital existence,” characterized as a new epoch in mediated experience. Over the last decade, there has been a growing interest in how online abuse impacts one's digital existence. Drawing on 15 interviews with women, this chapter demonstrates a type of labor—which I call “ontological labor”—that women exercise when processing their own experiences of online abuse, and when sharing their experiences with others. Ontological labor is the process of overcoming a denial of experience. In the case of online abuse, this denial stems partly from the treatment of online and offline life as separate and opposing. This division is known as digital dualism, which I argue is a discourse that denies women the space to have their experiences of online abuse recognized as such.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Michael Salter and Elly Hanson

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the…

Abstract

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the absence of adequate intervention by internet service providers, social media platforms, and government. The chapter discusses the history of online CSE, focusing on regulatory stances over time in which online risks to children have been cast as natural and inevitable by the hegemony of a “cyberlibertarian” ideology. We illustrate the success of this ideology, as well as its profound contradictions and ethical failures, by presenting key examples in which internet users have taken decisive action to prevent online CSE and promote the removal of CSAM. Rejecting simplistic characterizations of “vigilante justice,” we argue instead that the fact that often young internet users report feeling forced to act against online CSE and CSAM undercuts libertarian claims that internet regulation is impossible, unworkable, and unwanted. Recent shifts toward a more progressive ethos of online harm minimization are promising; however, this ethos risks offering a new legitimizing ideology for online business models that will continue to put children at risk of abuse and exploitation. In conclusion, we suggest ways forward toward an internet built in the interests of children, rather than profit.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 3 November 2023

Donna Marshall, Jakob Rehme, Aideen O'Dochartaigh, Stephen Kelly, Roshan Boojihawon and Daniel Chicksand

This article explores how companies in multiple controversial industries report their controversial issues. For the first time, the authors use a new conceptualization of…

Abstract

Purpose

This article explores how companies in multiple controversial industries report their controversial issues. For the first time, the authors use a new conceptualization of controversial industries, focused on harm and solutions, to investigate the reports of 28 companies in seven controversial industries: Agricultural Chemicals, Alcohol, Armaments, Coal, Gambling, Oil and Tobacco.

Design/methodology/approach

The authors thematically analyzed company reports to determine if companies in controversial industries discuss their controversial issues in their reporting, if and how they communicate the harm caused by their products or services, and what solutions they provide.

Findings

From this study data the authors introduce a new legitimacy reporting method in the controversial industries literature: the solutions companies offer for the harm caused by their products and services. The authors find three solution reporting methods: no solution, misleading solution and less-harmful solution. The authors also develop a new typology of reporting strategies used by companies in controversial industries based on how they report their key controversial issue and the harm caused by their products or services, and the solutions they offer. The authors identify seven reporting strategies: Ignore, Deny, Decoy, Dazzle, Distort, Deflect and Adapt.

Research limitations/implications

Further research can test the typology and identify strategies used by companies in different institutional or regulatory settings, across different controversial industries or in larger populations.

Practical implications

Investors, consumers, managers, activists and other stakeholders of controversial companies can use this typology to identify the strategies that companies use to report controversial issues. They can assess if reports admit to the controversial issue and the harm caused by a company's products and services and if they provide solutions to that harm.

Originality/value

This paper develops a new typology of reporting strategies by companies in controversial industries and adds to the theory and discourse on social and environmental reporting (SER) as well as the literature on controversial industries.

Details

Accounting, Auditing & Accountability Journal, vol. 36 no. 9
Type: Research Article
ISSN: 0951-3574

Keywords

Access

Only Open Access

Year

Content type

1 – 8 of 8