Search results
1 – 10 of over 14000The ideal of an open, all-inclusive, and participatory internet has been undermined by the rise of gender-based and misogynistic abuse on social media platforms. Limited progress…
Abstract
The ideal of an open, all-inclusive, and participatory internet has been undermined by the rise of gender-based and misogynistic abuse on social media platforms. Limited progress has been made at supranational and national levels in addressing this issue, and where steps have been taken to combat online violence against women (OVAW), they are typically limited to legislative developments addressing image-based sexual abuse. As such, harms associated with image-based abuse have gained recognition in law while harms caused by text-based abuse (TBA) have not been conceptualized in an equivalent manner.
This chapter critically outlines the lack of judicial consideration given to online harms in British courts, identifying a range of harms arising from TBAs which currently are not recognized by the criminal justice system. We refer to non-traditional harms recognized in cases heard before the British courts, assessing these in light of traditionally recognized harms in established legal authorities. This chapter emphasizes the connection between the harms suffered and the recognition of impact on the victims, demonstrated through specific case studies. Through this assessment, this chapter advocates for greater recognition of online harms within the legal system – especially those which take the forms of misogynistic and/or gendered TBA.
Details
Keywords
Karen Renaud and Suzanne Prior
The purpose of this paper is to scope the field of child-related online harms and to produce a resource pack to communicate all the different dimensions of this domain to teachers…
Abstract
Purpose
The purpose of this paper is to scope the field of child-related online harms and to produce a resource pack to communicate all the different dimensions of this domain to teachers and carers.
Design/methodology/approach
With children increasingly operating as independent agents online, their teachers and carers need to understand the risks of their new playground and the range of risk management strategies they can deploy. Carers and teachers play a prominent role in applying the three M’s: mentoring the child, mitigating harms using a variety of technologies (where possible) and monitoring the child’s online activities to ensure their cybersecurity and cybersafety. In this space, the core concepts of “cybersafety” and “cybersecurity” are substantively different and this should be acknowledged for the full range of counter-measures to be appreciated. Evidence of core concept conflation emerged, confirming the need for a resource pack to improve comprehension. A carefully crafted resource pack was developed to convey knowledge of risky behaviors for three age groups and mapped to the appropriate “three M’s” to be used as counter-measures.
Findings
The investigation revealed key concept conflation, and then identified a wide range of harms and countermeasures. The resource pack brings clarity to this domain for all stakeholders.
Research limitations/implications
The number of people who were involved in the empirical investigation was limited to those living in Scotland and Nigeria, but it is unlikely that the situation is different elsewhere because the internet is global and children’s risky behaviors are likely to be similar across the globe.
Originality/value
Others have investigated this domain, but no one, to the authors’ knowledge, has come up with the “Three M’s” formulation and a visualization-based resource pack that can inform educators and carers in terms of actions they can take to address the harms.
Details
Keywords
Cathy Brennan, Sonia Saraiva, Elizabeth Mitchell, Richard Melia, Lydia Campbell, Natalie King and Allan House
There are calls for greater regulation of online content related to self-harm and suicide, particularly that which is user-generated. However, the online space is a source of…
Abstract
Purpose
There are calls for greater regulation of online content related to self-harm and suicide, particularly that which is user-generated. However, the online space is a source of support and advice, including an important sharing of experiences. This study aims to explore what it is about such online content, and how people interact with it, that may confer harm or offer benefit.
Design/methodology/approach
The authors undertook a systematic review of the published evidence, using customised searches up to February 2021 in seven databases. The authors included empirical research on the internet or online use and self-harm or suicide content that had been indexed since 2015. The authors undertook a theoretically driven narrative synthesis.
Findings
From 4,493 unique records, 87 met our inclusion criteria. The literature is rapidly expanding and not all the evidence is high quality, with very few longitudinal or intervention studies so little evidence to understand possible causal links. Very little content online is classifiable as explicitly harmful or definitively helpful, with responses varying by the individual and immediate context. The authors present a framework that seeks to represent the interplay in online use between the person, the medium, the content and the outcome.
Originality/value
This review highlights that content should not be considered separately to the person accessing it, so online safety means thinking about all users. Blanket removal or unthinking regulation may be more harmful than helpful. A focus on safe browsing is important and tools that limit time and diversify content would support this.
Details
Keywords
Previous research has found that people who use anabolic androgenic steroids (hereafter ‘steroids’) typically describe these drugs as safe. However, research exploring the inside…
Abstract
Previous research has found that people who use anabolic androgenic steroids (hereafter ‘steroids’) typically describe these drugs as safe. However, research exploring the inside perspective on steroid risk has focussed on steroids in general, and failed to examine how particular steroids are viewed and experienced. During my online ethnographic research in bodybuilding communities, I found discussion of one particular steroid said to cause significant physical, psychological, social and sexual harm: trenbolone. Trenbolone is a veterinary drug used to increase muscle in beef cattle that has been found to have neurodegenerative and genotoxic effects on animals. It has been used by bodybuilders since the 1980s, and recent research has found it to be one of the most popular steroids used by bodybuilders. If trenbolone is described by bodybuilders as causing significant harm, why do so many bodybuilders use it? This chapter attempts to answer this question through a description of bodybuilder folk models of trenbolone risk. Using a social life of drugs approach it describes: (1) the effects of trenbolone; (2) how these effects are given meaning as either harms or benefits, and then weighed against each other; (3) how the risks of trenbolone are reduced through harm reduction strategies and (4) the role of online communities in negotiations of trenbolone risk. Trenbolone was found to occupy a mythical status in bodybuilding communities, in part because of the conflicted relationship bodybuilders have with the drug. This conflicted relationship illustrates the inherent ambivalence of drugs, which are always both remedy and poison.
Details
Keywords
Online environments have become a central part of our social, private, and economic life. The term for this is “digital existence,” characterized as a new epoch in mediated…
Abstract
Online environments have become a central part of our social, private, and economic life. The term for this is “digital existence,” characterized as a new epoch in mediated experience. Over the last decade, there has been a growing interest in how online abuse impacts one's digital existence. Drawing on 15 interviews with women, this chapter demonstrates a type of labor—which I call “ontological labor”—that women exercise when processing their own experiences of online abuse, and when sharing their experiences with others. Ontological labor is the process of overcoming a denial of experience. In the case of online abuse, this denial stems partly from the treatment of online and offline life as separate and opposing. This division is known as digital dualism, which I argue is a discourse that denies women the space to have their experiences of online abuse recognized as such.
Details
Keywords
The COVID-19 pandemic has driven universities to deliver education online, making use of digital platforms for both formal and informal learning. This move has accelerated…
Abstract
The COVID-19 pandemic has driven universities to deliver education online, making use of digital platforms for both formal and informal learning. This move has accelerated concerns regarding institutions’ capabilities to protect students from online abuse and support those who fall victim to its many forms. Empirical data drawn from UK universities prior to the pandemic highlight the lack of policy and practice across the university sector around both awareness of, and support from, online abuse among the student body. Further concerns during the pandemic, which highlight failures not just of safeguarding policy, but cybersecurity practice, demonstrate the need for universities to not only recognise their duty of care regarding student welfare but also to provide training and education for all, making use of online and hybrid higher education.
Details
Keywords
The purpose of this scoping rapid review was to identify and analyse existing qualitative methodologies that have been used to investigate K-12 teachers' lived experiences of…
Abstract
Purpose
The purpose of this scoping rapid review was to identify and analyse existing qualitative methodologies that have been used to investigate K-12 teachers' lived experiences of adult cyber abuse as a result of student content “going viral” to propose a novel methodological stance incorporating the Australian Online Safety Act 2021.
Design/methodology/approach
A search of Google Scholar was conducted using keywords and phrases related to cyber trauma, teachers, qualitative methods and the Online Safety Act. Inclusion criteria for the review were: (1) published in English, (2) focused on teachers' experiences of online abuse and cyberbullying associated with viral posts and (3) employed a qualitative inquiry methodology. Full-text articles were obtained for those that met the inclusion criteria. Data were extracted and analysed using a PRISMA flowchart and inductive thematic analysis.
Findings
This methodology is considered to be justified, as the eSafety Commissioner's Safety-by-Design principles do not have any legal or regulatory enforceability, whereas the Online Safety Act 2021 provides the Australian eSafety Commissioner an avenue to drive greater algorithmic transparency and accountability.
Research limitations/implications
The findings of this review informed the development of a novel methodological stance for investigating Australian teachers' lived experiences of adult cyber abuse associated with viral posts. It provides a methodological positioning to support trauma informed qualitative research into adult cyber abuse, informed by the work of the eSafety Commissioner and the Online Safety Act.
Originality/value
Cybertrauma is described as “any trauma that is a result of self- or, other-directed interaction with, mediated through, or from any electronic Internet/cyberspace ready device or machine learning algorithm, that results in impact now or the future” (Knibbs, 2021). It may result from the tracking of movement through various mobile phone features and applications such as location sharing, non-consensual monitoring of social media, and humiliation or punishment through the sharing of intimate images online, through to direct messages of abuse or threats of violence or humiliation. These actions are further perpetuated through automated searches, insights and recommendations on social media (i.e. engagement metrics promote memes, Facebook posts, Tweets, Tiktoks, Youtubes and so on). This is a novel methodology, as it not only considers direct cybertrauma but also automated forms of cybertrauma.
Details
Keywords
Michael Salter and Elly Hanson
This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the…
Abstract
This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the absence of adequate intervention by internet service providers, social media platforms, and government. The chapter discusses the history of online CSE, focusing on regulatory stances over time in which online risks to children have been cast as natural and inevitable by the hegemony of a “cyberlibertarian” ideology. We illustrate the success of this ideology, as well as its profound contradictions and ethical failures, by presenting key examples in which internet users have taken decisive action to prevent online CSE and promote the removal of CSAM. Rejecting simplistic characterizations of “vigilante justice,” we argue instead that the fact that often young internet users report feeling forced to act against online CSE and CSAM undercuts libertarian claims that internet regulation is impossible, unworkable, and unwanted. Recent shifts toward a more progressive ethos of online harm minimization are promising; however, this ethos risks offering a new legitimizing ideology for online business models that will continue to put children at risk of abuse and exploitation. In conclusion, we suggest ways forward toward an internet built in the interests of children, rather than profit.
Details
Keywords
Chara Bakalis and Julia Hornle
This chapter is about online hate speech propagated via platforms operated by social media companies (SMCs). It examines the options open to states in forcing SMCs to take…
Abstract
This chapter is about online hate speech propagated via platforms operated by social media companies (SMCs). It examines the options open to states in forcing SMCs to take responsibility for the hateful content that appears on their sites. It examines the technological and legal context for imposing legal obligations on SMCs, and analyses initiatives in Germany, the United Kingdom, the European Union and elsewhere. It argues that while SMCs can play a role in controlling online hate speech, there are limitations to what they can achieve.
Details
Keywords
Alex McCord, Philip Birch and Lewis A. Bizo
Global evidence suggests that youth offending has reduced; however, this study aims to suggest a more complex picture, with youth crime potentially being displaced to the digital…
Abstract
Purpose
Global evidence suggests that youth offending has reduced; however, this study aims to suggest a more complex picture, with youth crime potentially being displaced to the digital space. Historically, young people and crime have been synonymous with public spaces and being visible. A shift or expansion to online offending requires revision of how the justice and educational systems respond to youth offending.
Design/methodology/approach
A systematic literature review explored keywords related to age, digital offence or harm and criminal or harmful nature, using a search, appraisal, synthesis and analysis framework.
Findings
Three emergent areas of digital youth crime are discussed: digitally assisted crime, digitally dependent crime and digital harm.
Practical implications
The shift in youth offending requires response adjustment from prevention to detection. Opportunities may exist to disrupt or redirect youth before they offend. Further data specific to digital offending is needed. These findings seek to provide a possible direction for future research.
Originality/value
The concept of digital displacement of youth offending is progressively emerging. This paper examines types of offending categorised into three areas of interest.
Details