Search results

1 – 10 of 156
Open Access
Book part
Publication date: 4 June 2021

Seonaid Stevenson-McCabe and Sarai Chisala-Tempelhoff

Technology-facilitated violence and abuse including image-based sexual abuse (IBSA) is a phenomenon affecting women and girls around the world. Abusers misuse technology to attack…

Abstract

Technology-facilitated violence and abuse including image-based sexual abuse (IBSA) is a phenomenon affecting women and girls around the world. Abusers misuse technology to attack victims and threaten their safety, privacy, and dignity. This abuse is gendered and a form of domestic and sexual violence. In this article, the authors compare criminal law approaches to tackling IBSA in Scotland and Malawi. We critically analyze the legislative landscape in both countries, with a view to assessing the potential for victims to seek and obtain redress for IBSA. We assess the role criminal law has to play in each jurisdiction while acknowledging the limits of criminal law alone in terms of providing redress.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 May 2018

Dahlan A. Rahman and Nuriman Abdullah

Purpose – This research aims to explore Qanun Aceh post-conflict enacted in the legislation of Government of Aceh through a Memorandum of Understanding (MoU) and enhancement…

Abstract

Purpose – This research aims to explore Qanun Aceh post-conflict enacted in the legislation of Government of Aceh through a Memorandum of Understanding (MoU) and enhancement policy of Wali Nanggroe associated with educational development.

Approach Methodology – The review of the literature links to the Qanun Aceh exploring the Wali Nanggroe institution through normative theory. A qualitative method was used to find a strategic policy of the Legislation Government of Aceh related to documents used in data analysis.

Findings – The study found the existence of the Wali Nanggroe institution brought several opportunities and challenges of unifying Aceh people post-conflict. The discussion of the Wali Nanggroe Institution has brought new dynamics in the policy and educational development in post-conflict Aceh. The Government of Aceh and the Parliament did not take the policy for educational building in order for the society to have an understanding of the Wali Nanggroe institutional position as stated in the Law of Government Aceh (LoGA).

Research Limitations – The examination of these dynamics and prospect of the Wali Nanggroe institution is linked to the policy on educational development for the Aceh people and implementation of the LoGA post-conflict of the Aceh Government and the Government of Indonesian Republic.

Practical Implications – The solution offered is to improve the educational system to give a political understanding of the Aceh people.

Open Access
Book part
Publication date: 4 June 2021

Sukaina Al-Nasrawi

Violence against women and girls is globally prevalent. Overcoming it is a prerequisite for attaining gender equality and achieving sustainable development. The United Nation's…

Abstract

Violence against women and girls is globally prevalent. Overcoming it is a prerequisite for attaining gender equality and achieving sustainable development. The United Nation's 2030 Agenda for Sustainable Development considers technology as a means to combat violence against women and girls, and there is ample evidence on the positive impact of technology in combating violence. At the same time, however, technology can promote and perpetrate new forms of violence. Research shows that more than 70% of women and girls online are exposed to forms of cyber violence. Most of these cases remain unreported.

This chapter argues that technology contributes to increasing cyber violence against women and girls which in turn leads to severe social and economic implications affecting them. It also argues that legislative and policy reforms can limit this type of violence while enabling women and girls to leverage technology for empowerment. It highlights cases of cyber violence in the Arab region and provides an overview of applicable legislative frameworks. The chapter concludes with recommended policy reforms and measures to strengthen and harmonize efforts to combat cyber violence against women and girls in the Arab region.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 9 December 2021

Mark Taylor and Richard Kirkham

A policy of surveillance which interferes with the fundamental right to a private life requires credible justification and a supportive evidence base. The authority for such…

Abstract

A policy of surveillance which interferes with the fundamental right to a private life requires credible justification and a supportive evidence base. The authority for such interference should be clearly detailed in law, overseen by a transparent process and not left to the vagaries of administrative discretion. If a state surveils those it governs and claims the interference to be in the public interest, then the evidence base on which that claim stands and the operative conception of public interest should be subject to critical examination. Unfortunately, there is an inconsistency in the regulatory burden associated with access to confidential patient information for non-health-related surveillance purposes and access for health-related surveillance or research purposes. This inconsistency represents a systemic weakness to inform or challenge an evidence-based policy of non-health-related surveillance. This inconsistency is unjustified and undermines the qualities recognised to be necessary to maintain a trustworthy confidential public health service. Taking the withdrawn Memorandum of Understanding (MoU) between NHS Digital and the Home Office as a worked example, this chapter demonstrates how the capacity of the law to constrain the arbitrary or unwarranted exercise of power through judicial review is not sufficient to level the playing field. The authors recommend ‘levelling up’ in procedural oversight, and adopting independent mechanisms equivalent to those adopted for establishing the operative conceptions of public interest in the context of health research to non-health-related surveillance purposes.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Book part
Publication date: 4 June 2021

Pam Hrick

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory…

Abstract

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory mandates as part of an effort to combat it. This chapter argues that these bodies have the potential to meaningfully further a survivor-centered approach to combatting technology-facilitated violence against women – one that places their experiences, rights, wishes, and needs at its core. It further argues that governments should consider integrating them into a broader holistic response to this conduct.

An overview is provided of the operations of New Zealand's Netsafe, the eSafety Commissioner in Australia, Nova Scotia's Cyberscan Unit, and the Canadian Centre for Child Protection in Manitoba. These types of centralized bodies have demonstrated an ability to advance survivor-centered approaches to technology-facilitated violence against women through direct involvement in resolving instances of violence, education, and research. However, these bodies are not a panacea. This chapter outlines critiques of their operations and the challenges they face in maximizing their effectiveness.

Notwithstanding these challenges and critiques, governments should consider creating such bodies or empowering existing bodies with a statutory mandate as one aspect of a broader response to combatting technology-facilitated violence against women. Some proposed best practices to maximize their effectiveness are identified.

Open Access
Book part
Publication date: 1 May 2019

Anandasivakumar Ekambaram, Ann Kristin Kvellheim and Luitzen de Boer

This study aims to gain an understanding of success factors and barriers to public private collaboration in the context of zero emission neighbourhood.

Abstract

Purpose

This study aims to gain an understanding of success factors and barriers to public private collaboration in the context of zero emission neighbourhood.

Design/Methodology/Approach

Qualitative research method: narrative literature study.

Findings

On the basis of the identified success factors and barriers, a model with the following five interconnected themes is developed: (1) supportive public policy, (2) stakeholder management, (3) creation of a common ground for understanding, (4) knowledge sharing and learning and (5) uncertainty management.

Research Limitations/Implications

The model can be further developed and tested. In-depth conceptual/empirical study on the five themes can shed more light on the topic.

Practical Implications

This model is one of the several ways to understand, structure and simplify the reality (of public private collaboration in the context of zero emission neighbourhood). These five themes are arranged in the model in such a way to represent strategic, tactical and operational levels. This model can be useful to identify measures (steps, concrete actions, etc.) To address issues related to the five themes in a given organisational context. Focusing adequately on these five themes can contribute to successful public private collaboration in the context of zero emission neighbourhoods.

Originality/Value

This study/model provides an overall, holistic approach to address/improve public private collaborative endeavours in the context of developing zero emission neighbourhoods.

Details

10th Nordic Conference on Construction Economics and Organization
Type: Book
ISBN: 978-1-83867-051-1

Keywords

Open Access
Book part
Publication date: 1 May 2019

Leif D. Houck

For a public project leader charged with a construction project, it can be crucial to meet the budget, while maximizing the qualities within a construction project. A method to…

Abstract

Purpose

For a public project leader charged with a construction project, it can be crucial to meet the budget, while maximizing the qualities within a construction project. A method to achieve this is to use the “opposite design build” procurement method, in which the price is fixed and the contractors compete on adding a wide range of qualities to the project. However, such procurement approaches are rare, and it is difficult to find models on how to implement such an approach.

Design/Methodology/Approach

This study firstly looks at the literature on design-build, quality-only as the main selection criterion and to some degree on constructors’ bidding behaviour. Secondly, it explains a model for a design-build, quality-only procurement designed within the public tendering legislations. Thirdly, it investigates the outcome of the model applied to a specific case in Norway.

Findings

There seems to be a research gap within literature and cases on design-build, quality-only selection with a fixed price. The developed model allowed for negotiations, which led to more comparable and improved bids. In the investigated case, and the client was able to implement more qualities in the project than expected within the budget.

Research Limitations/Implications

The researcher was himself partly involved in the process as an advisor.

Practical Implications

The developed method is relatively simple and might readily be applied by any client to maximise a project’s qualities within a given fixed price.

Originality/Value

The long-term value should be to widen the range of useful procurement methods.

Details

10th Nordic Conference on Construction Economics and Organization
Type: Book
ISBN: 978-1-83867-051-1

Keywords

Open Access
Book part
Publication date: 12 October 2022

Deepesh Nirmaldas Dayal

South Africa attained democracy over 24 years ago. The changes in South Africa's Constitution allowed for protection for all citizens. Despite these freedoms and the promise of…

Abstract

South Africa attained democracy over 24 years ago. The changes in South Africa's Constitution allowed for protection for all citizens. Despite these freedoms and the promise of change, the country is plagued by violence, corruption and crime. These crimes affect the LGBTQ+ people of the South African population. These citizens have been protected by the Constitution; however, they continue to live their lives in a paradox, between protection and prejudice. LGBTQ+ people experience high levels of hate crimes which extend to violence, assault, bullying and cyberbullying. This chapter focuses on the legal protection and challenges experienced by South African LGBTQ+ people.

Details

Gender Violence, the Law, and Society
Type: Book
ISBN: 978-1-80117-127-4

Keywords

Open Access
Book part
Publication date: 4 June 2021

Olga Marques

Media attention on nonconsensual intimate image dissemination has led to the relatively recent proliferation of academic research on the topic. This literature has focused on many…

Abstract

Media attention on nonconsensual intimate image dissemination has led to the relatively recent proliferation of academic research on the topic. This literature has focused on many areas including victimization and perpetration prevalence rates, coerced sexting, legal and/or criminal contexts, sexual violence in digital spaces, gendered constructions of blame and risk, and legal analysis of high-profile cases and legislation. Despite this research, several gaps exist, including a lack of empirical research with service providers. Informed by in-depth interviews with 10 sexual violence frontline professionals in Southern Ontario (Canada), this chapter focuses on their perspectives of the additive role of technology. With respect to nonconsensual intimate image dissemination, technology acts as a digital “layer” that operates in addition to the commission of physical acts of sexual violence, and compounds the harms experienced by the victim by adding a virtual – and indelible – “permanent remembering” of the violence. Nuancing the contours of consent in a digital age, this chapter concludes by considering what consent means in a technological context.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 12 June 2023

Peter Robinson

Abstract

Details

How Gay Men Prepare for Death
Type: Book
ISBN: 978-1-83909-587-0

Access

Only Open Access

Year

Content type

Book part (156)
1 – 10 of 156