Search results
1 – 10 of over 1000Bridget Harris and Delanie Woodlock
Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical…
Abstract
Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical framework for technology-facilitated harms in heterosexual relationships which we characterize as digital coercive control. Here, we include behaviors which can be classified as abuse and stalking and also individualized tactics which are less easy to categorize, but evoke fear and restrict the freedoms of a particular woman. Drawing on their knowledge of a victim/survivor's experiences and, in the context of patterns and dynamics of abuse, digital coercive control strategies are personalized by perpetrators and extend and exacerbate “real-world” violence.
Digital coercive control is unique because of its spacelessness and the ease, speed, and identity-shielding which technology affords. Victim/survivors describe how perpetrator use of technology creates a sense of omnipresence and omnipotence which can deter women from exiting violent relationships and weakens the (already tenuous) notion that abuse can be “escaped.” We contend that the ways that digital coercive control shifts temporal and geographic boundaries warrant attention. However, spatiality more broadly cannot be overlooked. The place and shape in which victim/survivors and perpetrators reside will shape both experiences of and response to violence. In this chapter, we explore these ideas, reporting on findings from a study on digital coercive control in regional, rural, and remote Australia. We adopt a feminist research methodology in regard to our ethos, research processes, analysis, and the outputs and outcomes of our project. Women's voices are foreground in this approach and the emphasis is on how research can be used to inform, guide, and develop responses to domestic violence.
Details
Keywords
As the role and uptake of digital media, devices and other technologies increases, so has their presence in our lives. Technology has revolutionised the speed, type and extent of…
Abstract
As the role and uptake of digital media, devices and other technologies increases, so has their presence in our lives. Technology has revolutionised the speed, type and extent of communication and contact between individuals and groups, transforming temporal, geographic and personal boundaries. There have undoubtedly been benefits associated with such shifts, but technologies have also exacerbated existing patterns of gendered violence and introduced new forms of intrusion, abuse and surveillance. In order to understand and combat harm and, protect and empower women, criminologists must investigate these practices. This chapter discusses how technology has transformed the enactment of violence against women.
Typically, studies have focussed on particular types of technology-facilitated violence as isolated phenomenon. Here, the author examines, more holistically, a range of digital perpetration: by persons unknown, who may be known and are known to female targets. These digital harms should, the author contends, be viewed as part of what Kelly (1988) conceptualised as a ‘continuum of violence’ (and Stanko, 1985 as ‘continuums of unsafety’) to which women are exposed, throughout the course of our lives. These behaviours do not occur in a vacuum. Violence is the cause and effect of inequalities and social control, which manifests structurally and institutionally, offline and online. Technologies are shaped by these forces, and investigating the creation, governance and use of technologies provides insight how violence is enacted, fostered and normalised.
Details
Keywords
Jane Bailey, Nicola Henry and Asher Flynn
While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as…
Abstract
While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as technology-facilitated violence and abuse (TFVA). TFVA includes a spectrum of behaviors perpetrated online, offline, and through a range of technologies, including artificial intelligence, livestreaming, GPS tracking, and social media. This chapter provides an overview of TFVA, including a brief snapshot of existing quantitative and qualitative research relating to various forms of TFVA. It then discusses the aims and contributions of this book as a whole, before outlining five overarching themes arising from the contributions. The chapter concludes by mapping out the structure of the book.
Details
Keywords
Briony Anderson and Mark A. Wood
This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…
Abstract
This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.
Details
Keywords
Sofie Pelsmakers, Evy Vereecken, Miimu Airaksinen and Cliff C.A. Elwell
Millions of properties have suspended timber ground floors globally, with around ten million in the UK alone. However, it is unknown what the floor void conditions are, nor the…
Abstract
Purpose
Millions of properties have suspended timber ground floors globally, with around ten million in the UK alone. However, it is unknown what the floor void conditions are, nor the effect of insulating such floors. Upgrading floors changes the void conditions, which might increase or decrease moisture build-up and mould and fungal growth. The purpose of this paper is to provide a review of the current global evidence and present the results of in situ monitoring of 15 UK floor voids.
Design/methodology/approach
An extensive literature review on the moisture behaviour in both uninsulated and insulated suspended timber crawl spaces is supplemented with primary data of a monitoring campaign during different periods between 2012 and 2015. Air temperature and relative humidity sensors were placed in different floor void locations. Where possible, crawl spaces were visually inspected.
Findings
Comparison of void conditions to mould growth thresholds highlights that a large number of monitored floor voids might exceed the critical ranges for mould growth, leading to potential occupant health impacts if mould spores transfer into living spaces above. A direct comparison could not be made between insulated and uninsulated floors in the sample due to non-random sampling and because the insulated floors included historically damp floors. The study also highlighted that long-term monitoring over all seasons and high-resolution monitoring and inspection are required; conditions in one location are not representative of conditions in other locations.
Originality/value
This study presents the largest UK sample of monitored floors, evaluated using a review of current evidence and comparison with literature thresholds.
Details
Keywords
Melissa Bull, Kerry Carrington and Laura Vitis
Violence against women and girls (VAWG) is a global policy issue with significant social, economic and personal consequences. The burden of VAWGs is distributed unequally, with…
Abstract
Violence against women and girls (VAWG) is a global policy issue with significant social, economic and personal consequences. The burden of VAWGs is distributed unequally, with rates of gender violence significantly higher in low- to middle-income countries of the Global South. Yet the bulk of global research on gender violence is based on the experiences of urban communities in high-income English-speaking countries mainly from the Global North. This body of research typically takes the experience of women from Anglophone countries as the norm from which to theorise and frame theories and research of gender-based violence. This chapter problematises theories that the privilege women in the Global North as the empirical referents of ‘everyday violence’ (Carrington et al., 2016). At the same time, however, it is important to resist homogenising the violence experienced by women across diverse societies in the Global South as oppressed subaltern Southern. This binary discourse exaggerates the differences and obfuscates the similarities of VAWG across Northern and Southern borders and reproduces images of women in the Global South as unfortunate victims of ‘other’ cultures (Durham, 2015; Narayan, 1997). This chapter contrasts three examples, the policing of family violence in Indigenous communities in Australia; Image-based Abuse in Singapore; and the policing of gender violence in the Pacific as a way of concretising the argument.
Details
Keywords
The rapid advancement of technology poses many social challenges including the emerging issue of technology-facilitated abuse (TFA) and violence. In Australia, women from…
Abstract
The rapid advancement of technology poses many social challenges including the emerging issue of technology-facilitated abuse (TFA) and violence. In Australia, women from culturally and linguistically diverse (CALD) backgrounds are found to be more vulnerable to domestic violence (DV) and abuse, including TFA. This chapter presents a snapshot of CALD women's technology-facilitated domestic abuse (TFDA) experiences in Melbourne through the eyes of a small group of DV practitioners. Findings show CALD women experience TFA similar to that of the mainstream, with tracking and monitoring through the use of smartphone and social media most common. Their migration and financial status, and language and digital literacy can increase their vulnerability to TFDA, making their experience more complicated. Appropriate digital services and resources together with face-to-face support services can be a way forward. Further research should focus on better understanding CALD women's perceptions of and responses to TFDA and explore ways to improve engagement with and use of community media channels/platforms.
Details
Keywords
This chapter introduces the Technology Pedagogy and Content Knowledge (TPACK) model as it relates to technology-enhanced learning design. The key features of the framework are…
Abstract
This chapter introduces the Technology Pedagogy and Content Knowledge (TPACK) model as it relates to technology-enhanced learning design. The key features of the framework are unpacked, along with a brief examination of what TPACK looks like in practice. Approaches to developing TPACK capacity are considered, with learning-by-design emerging as the most promising technique. Issues relating to TPACK are also critically discussed, including those relating to measurement and the capacity of the framework to support educational design practice.
Dan H. Langerud, Peter J. Jordan, Matthew J. Xerri and Amanda Biggs
Purpose: The psychological contract involves expectations and responsibilities from both employees and organizations. Recently, arguments have emerged that link employee…
Abstract
Purpose: The psychological contract involves expectations and responsibilities from both employees and organizations. Recently, arguments have emerged that link employee expectations to increasing individual entitlement beliefs which may not involve reciprocity. Equity theory suggests that employees continually assess their personal outcomes for fairness and that these equity perceptions could be affected by entitlement beliefs. The question that then arises is, how do entitled employees pursue these unmet beliefs and what are the implications if these beliefs are met or unmet? Approach: In this chapter, we present a conceptual model proposing that emotion regulation motives (instrumental or hedonic) influence how employees with unmet entitlement beliefs seek to advance their claims. Using equity theory as an underpinning theory, we conceptualize that instrumental and hedonic emotion regulation motives lead to different job satisfaction levels. We also argue that actual job performance moderates this relationship. Originality/Value: Understanding this process is essential as managers may constantly deal with employee entitlement beliefs, and low job satisfaction has been linked to poor employee and organizational outcomes. Theoretical and practical implications are discussed.
Details