When discussing the term “technology-facilitated violence” (TFV) it is often asked: “Is it actually violence?” While international human rights standards, such as the United…
Abstract
When discussing the term “technology-facilitated violence” (TFV) it is often asked: “Is it actually violence?” While international human rights standards, such as the United Nations' Convention on the Elimination of All Forms of Discrimination against Women (United Nations General Assembly, 1979), have long recognized emotional and psychological abuse as forms of violence, including many forms of technology-facilitated abuse (United Nations, 2018), law makers and the general public continue to grapple with the question of whether certain harmful technology-facilitated behaviors are actually forms of violence. This chapter explores this question in two parts. First, it reviews three theoretical concepts of violence and examines how these concepts apply to technology-facilitated behaviors. In doing so, this chapter aims to demonstrate how some harmful technology-facilitated behaviors fit under the greater conceptual umbrella of violence. Second, it examines two recent cases, one from the British Columbia Court of Appeal (BCCA) in Canada and a Romanian case from the European Court of Human Rights (ECtHR), that received attention for their legal determinations on whether to define harmful technology-facilitated behaviors as forms of violence or not. This chapter concludes with observations on why we should conceptualize certain technology-facilitated behaviors as forms of violence.
Details
Keywords
Abstract
Details
Keywords
Jane Bailey, Nicola Henry and Asher Flynn
While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as…
Abstract
While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as technology-facilitated violence and abuse (TFVA). TFVA includes a spectrum of behaviors perpetrated online, offline, and through a range of technologies, including artificial intelligence, livestreaming, GPS tracking, and social media. This chapter provides an overview of TFVA, including a brief snapshot of existing quantitative and qualitative research relating to various forms of TFVA. It then discusses the aims and contributions of this book as a whole, before outlining five overarching themes arising from the contributions. The chapter concludes by mapping out the structure of the book.
Details
Keywords
With the rise of the gig economy, management positions are increasingly staffed with flexible labor, so-called interim managers. They plunge into organizations for a limited…
Abstract
Purpose
With the rise of the gig economy, management positions are increasingly staffed with flexible labor, so-called interim managers. They plunge into organizations for a limited period, operating in a liminal position as partly insider, partly outsider. Although several contributions to their client organizations are acknowledged, it is unknown how the interim manager’s knowledge from previous assignments is made useful in the new context under these particular working conditions. Therefore, the purpose of this paper is to increase the understanding of how the interim manager’s knowledge is transferred to the client organization while operating from a liminal position.
Design/methodology/approach
This paper presents an interview-based multiple case study of six interim assignments where knowledge transfer is considered a social and context-dependent process.
Findings
The findings unveil the multifaceted nature of the liminal position, which consists of task orientation, time limitation, political detachment and cultural distance. These facets contribute to knowledge transfer in terms of new shared understandings and joint interests, which in turn might create new practices that augment continuous knowledge-sharing patterns.
Originality/value
The results contribute to the research on flexible work arrangements by shedding light on how the liminal position, predominantly depicted as an obstacle for the individual, might facilitate knowledge transfer. Through the process of knowledge generation, it is shown how a short-term engagement might enable the organization to increase its knowledge over time.
Details
Keywords
Bridget Harris and Delanie Woodlock
Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical…
Abstract
Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical framework for technology-facilitated harms in heterosexual relationships which we characterize as digital coercive control. Here, we include behaviors which can be classified as abuse and stalking and also individualized tactics which are less easy to categorize, but evoke fear and restrict the freedoms of a particular woman. Drawing on their knowledge of a victim/survivor's experiences and, in the context of patterns and dynamics of abuse, digital coercive control strategies are personalized by perpetrators and extend and exacerbate “real-world” violence.
Digital coercive control is unique because of its spacelessness and the ease, speed, and identity-shielding which technology affords. Victim/survivors describe how perpetrator use of technology creates a sense of omnipresence and omnipotence which can deter women from exiting violent relationships and weakens the (already tenuous) notion that abuse can be “escaped.” We contend that the ways that digital coercive control shifts temporal and geographic boundaries warrant attention. However, spatiality more broadly cannot be overlooked. The place and shape in which victim/survivors and perpetrators reside will shape both experiences of and response to violence. In this chapter, we explore these ideas, reporting on findings from a study on digital coercive control in regional, rural, and remote Australia. We adopt a feminist research methodology in regard to our ethos, research processes, analysis, and the outputs and outcomes of our project. Women's voices are foreground in this approach and the emphasis is on how research can be used to inform, guide, and develop responses to domestic violence.