{"title":"“Feminism is Eating Itself”: Women's Experiences and Perceptions of Lateral Violence Online","authors":"E. Jane","doi":"10.1108/978-1-83982-848-520211009","DOIUrl":"https://doi.org/10.1108/978-1-83982-848-520211009","url":null,"abstract":"While a growing body of literature reveals the prevalence of men's harassment and abuse of women online, scant research has been conducted into women's attacks on each other in digital networked environments. This chapter responds to this research gap by analyzing data obtained from qualitative interviews with Australian women who have received at times extremely savage cyberhate they know or strongly suspect was sent by other women. Drawing on scholarly literature on historical intra-feminism schisms – specifically what have been dubbed the “mommy wars” and the “sex wars” – this chapter argues that the conceptual lenses of internalized misogyny and lateral violence are useful in their framing of internecine conflict within marginalized groups as diagnostic of broader, systemic oppression rather than being solely the fault of individual actors. These lenses, however, require multiple caveats and have many limitations. In conclusion, I canvas the possibility that the pressure women may feel to present a united front in the interests of feminist politics could itself be considered an outcome of patriarchal oppression (even if performing solidarity is politically expedient and/or essential). As such, there might come a time when openly renouncing discourses of sisterhood and feeling free to disagree with, and even dislike, other women might be considered markers of liberation.","PeriodicalId":117534,"journal":{"name":"The Emerald International Handbook of Technology Facilitated Violence and Abuse","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114519685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Doxxing: A Scoping Review and Typology","authors":"Briony Anderson, M. Wood","doi":"10.1108/978-1-83982-848-520211015","DOIUrl":"https://doi.org/10.1108/978-1-83982-848-520211015","url":null,"abstract":"This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of Technology-Facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.","PeriodicalId":117534,"journal":{"name":"The Emerald International Handbook of Technology Facilitated Violence and Abuse","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123646510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technology as Both a Facilitator of and Response to Youth Intimate Partner Violence: Perspectives from Advocates in the Global-South","authors":"Gisella Lopes Gomes Pinto Ferreira","doi":"10.1108/978-1-83982-848-520211032","DOIUrl":"https://doi.org/10.1108/978-1-83982-848-520211032","url":null,"abstract":"Much of the research on intimate partner violence focuses on adults, and little of it emanates from the Global-South. The study reported upon in this chapter is aimed at addressing these gaps. Adopting a Southern Feminist Framework, it discusses findings from interviews with Brasilian and Australian advocates working on prevention of youth IPV. Participants from both countries noted disturbing instances of digital coercive control among the youth with whom they work, as well as underlying factors such as gender-based discrimination that simultaneously contribute to the prevalence of such behaviors, as well as their normalization among young people. However, they also emphasized the positive role that technology can play in distributing educational programming that reaches young people where they are and circumvents conservative agendas that in some cases keep education about gender discrimination and healthy relationships out of schools.","PeriodicalId":117534,"journal":{"name":"The Emerald International Handbook of Technology Facilitated Violence and Abuse","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125648070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Calling All Stakeholders: An Intersectoral Dialogue about Collaborating to End Tech-Facilitated Violence and Abuse","authors":"Jane Bailey, Raine Liliefeldt","doi":"10.1108/978-1-83982-848-520211056","DOIUrl":"https://doi.org/10.1108/978-1-83982-848-520211056","url":null,"abstract":"The emergence of Technology-Facilitated violence and abuse (TFVA) has led to calls for increased collaboration across and among sectors. Growing recognition of the need for multistakeholder collaboration (MSC) between industry, civil society, government, and academia reflects the number of moving parts involved, the need for specialized knowledge and skills in relation to certain issues, and the importance of recognizing the ways in which interlocking systems of subordination can lead to very different experiences with and impressions of social justice issues (Crenshaw, 1991). Numerous financial, professional, and personal factors incentivize MSC. Notwithstanding growing opportunities and incentives for TFVA-related MSC, collaborative efforts bring with them their own set of challenges. This chapter integrates elements of the literature on MSC, particularly those focusing on risks, benefits, and ways forward, with excerpts from a dialogue between an academic and community organization leader who are collaborating on a research partnership encompassing TFVA against young Canadians.","PeriodicalId":117534,"journal":{"name":"The Emerald International Handbook of Technology Facilitated Violence and Abuse","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121680855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Governing Image-Based Sexual Abuse: Digital Platform Policies, Tools, and Practices","authors":"N. Henry, Alice Witt","doi":"10.1108/978-1-83982-848-520211054","DOIUrl":"https://doi.org/10.1108/978-1-83982-848-520211054","url":null,"abstract":"The nonconsensual taking or sharing of nude or sexual images, also known as “ image-based sexual abuse, ” is a major social and legal problem in the digital age. In this chapter, we examine the problem of image-based sexual abuse in the context of digital platform governance. Speci fi cally, we focus on two key governance issues: fi rst, the governance of platforms, including the regulatory frameworks that apply to technology companies; and second, the governance by platforms, focusing on their policies, tools, and practices for responding to image-based sexual abuse. After analyzing the policies and practices of a range of digital platforms, we identify four overarching shortcomings: (1) inconsistent, reductionist, and ambiguous language; (2) a stark gap between the policy and practice of content regulation, including transparency de fi cits; (3) imperfect technology for detecting abuse; and (4) the responsibilization of users to report and prevent abuse. Drawing on a model of corporate social responsibility (CSR), we argue that until platforms better address these problems, they risk failing victim-survivors of image-based sexual abuse and are implicated in the perpetration of such abuse. We conclude by calling for reasonable and proportionate state-based regulation that can help to better align governance by platforms with CSR-initiatives.","PeriodicalId":117534,"journal":{"name":"The Emerald International Handbook of Technology Facilitated Violence and Abuse","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130090370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image-Based Sexual Abuse: A Comparative Analysis of Criminal Law Approaches in Scotland and Malawi","authors":"Seonaid Stevenson-McCabe, Sarai Chisala-Tempelhoff","doi":"10.1108/978-1-83982-848-520211038","DOIUrl":"https://doi.org/10.1108/978-1-83982-848-520211038","url":null,"abstract":"Technology-facilitated violence and abuse including image-based sexual abuse (IBSA) is a phenomenon affecting women and girls around the world. Abusers misuse technology to attack victims and threaten their safety, privacy, and dignity. This abuse is gendered and a form of domestic and sexual violence. In this article, the authors compare criminal law approaches to tackling IBSA in Scotland and Malawi. We critically analyze the legislative landscape in both countries, with a view to assessing the potential for victims to seek and obtain redress for IBSA. We assess the role criminal law has to play in each jurisdiction while acknowledging the limits of criminal law alone in terms of providing redress.","PeriodicalId":117534,"journal":{"name":"The Emerald International Handbook of Technology Facilitated Violence and Abuse","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126580172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"“Not the Real World”: Exploring Experiences of Online Abuse, Digital Dualism, and Ontological Labor","authors":"Chandell Gosse","doi":"10.1108/978-1-83982-848-520211003","DOIUrl":"https://doi.org/10.1108/978-1-83982-848-520211003","url":null,"abstract":"Online environments have become a central part of our social, private, and economic life. The term for this is “digital existence,” characterized as a new epoch in mediated experience. Over the last decade, there has been a growing interest in how online abuse impacts one's digital existence. Drawing on 15 interviews with women, this chapter demonstrates a type of labor—which I call “ontological labor”—that women exercise when processing their own experiences of online abuse, and when sharing their experiences with others. Ontological labor is the process of overcoming a denial of experience. In the case of online abuse, this denial stems partly from the treatment of online and offline life as separate and opposing. This division is known as digital dualism, which I argue is a discourse that denies women the space to have their experiences of online abuse recognized as such.","PeriodicalId":117534,"journal":{"name":"The Emerald International Handbook of Technology Facilitated Violence and Abuse","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115032002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Just Fantasy? Online Pornography’s Contribution to Experiences of Harm","authors":"Samantha Keene","doi":"10.1108/978-1-83982-848-520211021","DOIUrl":"https://doi.org/10.1108/978-1-83982-848-520211021","url":null,"abstract":"No description supplied","PeriodicalId":117534,"journal":{"name":"The Emerald International Handbook of Technology Facilitated Violence and Abuse","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116264929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technology-Facilitated Violence Against Women in Singapore: Key Considerations","authors":"L. Vitis","doi":"10.1108/978-1-83982-848-520211031","DOIUrl":"https://doi.org/10.1108/978-1-83982-848-520211031","url":null,"abstract":"Technology-Facilitated violence against women (TFVW) is readily becoming a key site of analysis for feminist criminologists. The scholarship in this area has identified online sexual harassment, contact-based harassment, image-based abuse, and gender-based cyberhate – among others – as key manifestations of TFVW. It has also unpacked the legal strategies available to women seeking formal justice outcomes. However, much of the existing empirical scholarship has been produced within countries like the United States, United Kingdom, and Australia, and there has been limited research on this phenomenon within South East Asia. As such, this chapter maps how technology is shaping Singaporean women's experiences of gendered, sexual, and domestic violence. To do so, it draws upon findings from a research project which examined TFVW in Singapore by utilizing semistructured interviews with frontline workers in the fields of domestic and sexual violence and LGBT services. Drawing from Dragiewicz et al.’s (2018) work on Technology-Facilitated coercive control (TFCC), I argue that victims-survivors of dating, domestic, and family violence need to be provided with support that is TFCC informed and technically guided. I also suggest that further research is needed to fully understand the prevalence and nature of TFVW in the Singaporean context.","PeriodicalId":117534,"journal":{"name":"The Emerald International Handbook of Technology Facilitated Violence and Abuse","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123860763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}