Search results

1 – 10 of 654
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 7 November 2023

Janine Arantes

The purpose of this scoping rapid review was to identify and analyse existing qualitative methodologies that have been used to investigate K-12 teachers' lived experiences of adult

129

Abstract

Purpose

The purpose of this scoping rapid review was to identify and analyse existing qualitative methodologies that have been used to investigate K-12 teachers' lived experiences of adult cyber abuse as a result of student content “going viral” to propose a novel methodological stance incorporating the Australian Online Safety Act 2021.

Design/methodology/approach

A search of Google Scholar was conducted using keywords and phrases related to cyber trauma, teachers, qualitative methods and the Online Safety Act. Inclusion criteria for the review were: (1) published in English, (2) focused on teachers' experiences of online abuse and cyberbullying associated with viral posts and (3) employed a qualitative inquiry methodology. Full-text articles were obtained for those that met the inclusion criteria. Data were extracted and analysed using a PRISMA flowchart and inductive thematic analysis.

Findings

This methodology is considered to be justified, as the eSafety Commissioner's Safety-by-Design principles do not have any legal or regulatory enforceability, whereas the Online Safety Act 2021 provides the Australian eSafety Commissioner an avenue to drive greater algorithmic transparency and accountability.

Research limitations/implications

The findings of this review informed the development of a novel methodological stance for investigating Australian teachers' lived experiences of adult cyber abuse associated with viral posts. It provides a methodological positioning to support trauma informed qualitative research into adult cyber abuse, informed by the work of the eSafety Commissioner and the Online Safety Act.

Originality/value

Cybertrauma is described as “any trauma that is a result of self- or, other-directed interaction with, mediated through, or from any electronic Internet/cyberspace ready device or machine learning algorithm, that results in impact now or the future” (Knibbs, 2021). It may result from the tracking of movement through various mobile phone features and applications such as location sharing, non-consensual monitoring of social media, and humiliation or punishment through the sharing of intimate images online, through to direct messages of abuse or threats of violence or humiliation. These actions are further perpetuated through automated searches, insights and recommendations on social media (i.e. engagement metrics promote memes, Facebook posts, Tweets, Tiktoks, Youtubes and so on). This is a novel methodology, as it not only considers direct cybertrauma but also automated forms of cybertrauma.

Details

Qualitative Research Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1443-9883

Keywords

Access Restricted. View access options
Article
Publication date: 7 July 2023

Natalie Booth, Gail Derefaka, Roxanne Khan and Gayle Brewer

This study aims to build on existing literature on face-to-face aggression in intimate relationships and adopts Finkel’s I3 theory to investigate the relationship between adult

149

Abstract

Purpose

This study aims to build on existing literature on face-to-face aggression in intimate relationships and adopts Finkel’s I3 theory to investigate the relationship between adult attachment style, dispositional self-control and cyber intimate partner aggression (IPA) perpetration and victimization.

Design/methodology/approach

Participants (N = 173) 20–52 years of age (M = 32.75 years, SD = 7.73, mode = 29 years) completed a series of standardized online measures to assess anxious and avoidant attachment, dispositional self-control and experience of cyber IPA (psychological, sexual and stalking), as both a perpetrator and victim.

Findings

Avoidant attachment was associated with increased perpetration of stalking and psychological abuse. Those high on avoidant attachment were also more likely to report that they were victims of cyber IPA psychological abuse and stalking. Self-control did not predict experience of cyber IPA, as a perpetrator or victim. Interactions between self-control and attachment were also non-significant.

Originality/value

This study addressed the paucity of cyber IPA research conducted with adult populations, by examining processes and factors to improve understanding of the experiences of online perpetration and victimization. The study also found evidence for the importance of impellance factors but not inhibiting factors (Finkel, 2008).

Details

Journal of Criminal Psychology, vol. 13 no. 4
Type: Research Article
ISSN: 2009-3829

Keywords

Access Restricted. View access options
Article
Publication date: 17 November 2020

Natalia D'Souza, Darryl Forsyth and Kate Blackwood

This paper offers a synopsis of workplace cyber abuse, identifying patterns of and responses to cyber abuse, as well as barriers to reporting and successful organisational…

910

Abstract

Purpose

This paper offers a synopsis of workplace cyber abuse, identifying patterns of and responses to cyber abuse, as well as barriers to reporting and successful organisational intervention.

Design/methodology/approach

Using a pragmatic research paradigm, quantitative and qualitative survey data were collected from 205 targets of cyber abuse in New Zealand.

Findings

Nearly half of all respondents experienced more than one form of cyber abuse, with gendered patterns emerging. Workplace cyber abuse also frequently went unreported for varying reasons. Based on the descriptive analyses, four key challenges for the management of cyber abuse are identified: (1) multiple and gendered patterns of cyber abuse, (2) cyber abuse across organisational boundaries, (3) non-reporting and underreporting and (4) ineffective (or lack of) organisational interventions.

Practical implications

Implications for human resource management (HRM) and line managers include adopting a preventative approach to workplace cyber abuse by implementing clear policies, guidelines and resources to deal with cyber abuse, clarifying the boundaries of “workplace” cyber abuse and considering organisational protection measures for non-standard and vulnerable workers.

Social implications

Unique challenges with workplace cyber abuse emphasise the need for a coordinated, multilevel intervention approach involving organisations, policymakers, online platforms and academics.

Originality/value

This study provides an important overview of existing approaches to the management of workplace cyber abuse as well as a foundation upon which to base further research exploring good practice in its prevention and intervention and much-needed theoretical development.

Access Restricted. View access options
Article
Publication date: 15 April 2020

Beatriz Víllora, Santiago Yubero and Raul Navarro

Previous research has documented a negative association between subjective well-being and different forms of victimization. The present study aims to examine differences in…

1096

Abstract

Purpose

Previous research has documented a negative association between subjective well-being and different forms of victimization. The present study aims to examine differences in well-being among university student victims of cyber dating abuse and bullying after controlling for acceptance of dating violence.

Design/methodology

This a cross-sectional study involving 1,657 Spanish university students (62.1% females, 37.1% males) using a quantitative approach.

Findings

The multiple regression analysis results showed that the university students who reported low bullying victimization and low acceptance of dating violence also reported higher emotional, social and psychological well-being, although the association between bullying and well-being was weak. No relationship was found between cyber dating abuse victimization and the well-being dimensions examined (emotional, social and psychological). Indeed, the participants not involved in any form of abuse and the cyber dating abuse victims presented the highest level of emotional, social and psychological well-being compared to the bullying victims and the combined victims.

Practical implications

Prevention and intervention programs need to specifically address bullying and cyber dating abusive in university, with a special focus on normative beliefs about both types of victimization and offering different sources of support to overcome negative consequences on mental health.

Originality/value

This paper analyzes the subjective well-being correlates simultaneously in victims of cyber dating abuse and bullying among university students without assuming that every form of victimization has the same mental health outcomes.

Details

Information Technology & People, vol. 34 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Access Restricted. View access options
Article
Publication date: 28 January 2025

Mary Macharia and Mary Dunaway

Drawing on two competing theories, the online disinhibition effect and communication privacy management, this study explores the antecedents of cyber harassment and the mediating…

16

Abstract

Purpose

Drawing on two competing theories, the online disinhibition effect and communication privacy management, this study explores the antecedents of cyber harassment and the mediating and moderating role of digital citizenship on cyber harassment among adults.

Design/methodology/approach

To ensure the quality of the data collected, participant recruitment was conducted using two panels: Qualtrics and Cloud Research. The sample comprised 262 participants who were USA residents aged between 18 and 87 years who use the Internet regularly. Additionally, the survey required a balance of participants across racial and educational levels. The survey was drawn from items for which reliability and validity indexes have been tested and confirmed in prior disparate studies.

Findings

Results show that digital citizenship is a significant moderator in the relationships between disposition to value web privacy, perceived online disinhibition and cyber harassment. Digital citizenship behavior mediates the relationship between perceived online disinhibition and cyber harassment but does not mediate the relationship between disposition to value privacy and cyber harassment.

Originality/value

The results of this study broaden the understanding of digital citizenship as a behavior modification for cyber harassment, specifically among adult Internet users. Further, we seek to bring together two streams of research that have previously been studied separately: the literature on the antecedents of perceived online disinhibition and disposition to value web privacy concerns.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Access Restricted. View access options
Article
Publication date: 12 May 2021

Katelyn Wan Fei Ma and Tammy McKinnon

The emergence of the novel coronavirus (COVID-19) has threatened physical and mental health, and changed the behaviour and decision-making processes of individuals, organisations…

3662

Abstract

Purpose

The emergence of the novel coronavirus (COVID-19) has threatened physical and mental health, and changed the behaviour and decision-making processes of individuals, organisations, and institutions worldwide. As many services move online due to the pandemic, COVID-19-themed cyber fraud is also growing. This article explores cyber fraud victimization and cyber security threats during COVID-19 using psychological and traditional criminological theories. It also provides a COVID-19-themed cyber fraud typology using empirical evidence from institutional and agency reports. Through organizing COVID-19-themed cyber fraud into four different categorizations, we aim to offer classification insights to researchers and industry professionals so that stakeholders can effectively manage emerging cyber fraud risks in our current pandemic.

Design/methodology/approach

The approach the study take for this conceptual paper is typology.

Details

Journal of Financial Crime, vol. 29 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Available. Open Access. Open Access
Book part
Publication date: 4 June 2021

Edgar Pacheco and Neil Melhuish

The nature and extent of adults' engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization…

Abstract

The nature and extent of adults' engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization. When explored, engagement in online aggression and abuse has centered on children and young people, particularly in school and higher education settings. Drawing on nationally representative data from New Zealand adults aged 18 and over, this chapter explores the overall prevalence of online aggression with a focus on gender and age. Our findings support the need to also understand adult aggressors' behaviors to better address the distress and harm caused to targets through digital communications. The chapter discusses the implications of the results for policy and practice and proposes some directions for future research.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Available. Open Access. Open Access
Book part
Publication date: 4 June 2021

Pam Hrick

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory…

Abstract

As the means and harms of technology-facilitated violence have become more evident, some governments have taken steps to create or empower centralized bodies with statutory mandates as part of an effort to combat it. This chapter argues that these bodies have the potential to meaningfully further a survivor-centered approach to combatting technology-facilitated violence against women – one that places their experiences, rights, wishes, and needs at its core. It further argues that governments should consider integrating them into a broader holistic response to this conduct.

An overview is provided of the operations of New Zealand's Netsafe, the eSafety Commissioner in Australia, Nova Scotia's Cyberscan Unit, and the Canadian Centre for Child Protection in Manitoba. These types of centralized bodies have demonstrated an ability to advance survivor-centered approaches to technology-facilitated violence against women through direct involvement in resolving instances of violence, education, and research. However, these bodies are not a panacea. This chapter outlines critiques of their operations and the challenges they face in maximizing their effectiveness.

Notwithstanding these challenges and critiques, governments should consider creating such bodies or empowering existing bodies with a statutory mandate as one aspect of a broader response to combatting technology-facilitated violence against women. Some proposed best practices to maximize their effectiveness are identified.

Available. Open Access. Open Access
Book part
Publication date: 4 June 2021

Walter S. DeKeseredy, Danielle M. Stoneberg and Gabrielle L. Lory

Polyvictimization means looking at multiple victimizations of different kinds that one person has experienced. Virtually, all of the work in this field focuses on the effects of…

Abstract

Polyvictimization means looking at multiple victimizations of different kinds that one person has experienced. Virtually, all of the work in this field focuses on the effects of childhood trauma and victimization on currently distressed children, and empirical and theoretical work on the intertwining of adult female offline and online abuse experiences is in short supply. Recently, however, some scholars are starting to fill these research gaps by generating data showing that technology-facilitated violence and abuse are part and parcel of women's polyvictimization experiences at institutions of higher education. This chapter provides an in-depth review of the extant social scientific literature on the role technology-facilitated violence and abuse plays in the polyvictimization of female college/university students. In addition to proposing new ways of knowing, we suggest progressive policies and practices aimed at preventing polyvictimization on the college campus.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Access Restricted. View access options
Book part
Publication date: 22 August 2022

Andy Phippen and Emma Bond

The COVID-19 pandemic has driven universities to deliver education online, making use of digital platforms for both formal and informal learning. This move has accelerated…

Abstract

The COVID-19 pandemic has driven universities to deliver education online, making use of digital platforms for both formal and informal learning. This move has accelerated concerns regarding institutions’ capabilities to protect students from online abuse and support those who fall victim to its many forms. Empirical data drawn from UK universities prior to the pandemic highlight the lack of policy and practice across the university sector around both awareness of, and support from, online abuse among the student body. Further concerns during the pandemic, which highlight failures not just of safeguarding policy, but cybersecurity practice, demonstrate the need for universities to not only recognise their duty of care regarding student welfare but also to provide training and education for all, making use of online and hybrid higher education.

Details

The Emerald Handbook of Higher Education in a Post-Covid World: New Approaches and Technologies for Teaching and Learning
Type: Book
ISBN: 978-1-80382-193-1

Keywords

1 – 10 of 654
Per page
102050