{"title":"“I Need You All to Understand How Pervasive This Issue Is”: User Efforts to Regulate Child Sexual Offending on Social Media","authors":"M. Salter, Elly Hanson","doi":"10.1108/978-1-83982-848-520211053","DOIUrl":"https://doi.org/10.1108/978-1-83982-848-520211053","url":null,"abstract":"This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the absence of adequate intervention by internet service providers, social media platforms, and government. The chapter discusses the history of online CSE, focusing on regulatory stances over time in which online risks to children have been cast as natural and inevitable by the hegemony of a “cyberlibertarian” ideology. We illustrate the success of this ideology, as well as its profound contradictions and ethical failures, by presenting key examples in which internet users have taken decisive action to prevent online CSE and promote the removal of CSAM. Rejecting simplistic characterizations of “vigilante justice,” we argue instead that the fact that often young internet users report feeling forced to act against online CSE and CSAM undercuts libertarian claims that internet regulation is impossible, unworkable, and unwanted. Recent shifts toward a more progressive ethos of online harm minimization are promising; however, this ethos risks offering a new legitimizing ideology for online business models that will continue to put children at risk of abuse and exploitation. In conclusion, we suggest ways forward toward an internet built in the interests of children, rather than profit.","PeriodicalId":117534,"journal":{"name":"The Emerald International Handbook of Technology Facilitated Violence and Abuse","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122525453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Threat Modeling Intimate Partner Violence: Tech Abuse as a Cybersecurity Challenge in the Internet of Things","authors":"Julia Slupska, L. Tanczer","doi":"10.1108/978-1-83982-848-520211049","DOIUrl":"https://doi.org/10.1108/978-1-83982-848-520211049","url":null,"abstract":"Technology-Facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.","PeriodicalId":117534,"journal":{"name":"The Emerald International Handbook of Technology Facilitated Violence and Abuse","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116952627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Justice on the Digitized Field: Analyzing Online Responses to Technology-Facilitated Informal Justice through Social Network Analysis","authors":"Elaine Broadbent, Chrissy Thompson","doi":"10.1108/978-1-83982-848-520211051","DOIUrl":"https://doi.org/10.1108/978-1-83982-848-520211051","url":null,"abstract":"This chapter examines the structure and sentiment of the Twitter response to Nathan Broad's naming as the originator of an image-based sexual abuse incident following the 2017 Australian Football League Grand Final. Employing Social Network Analysis to visualize the hierarchy of Twitter users responding to the incident and Applied Thematic Analysis to trace the diffusion of differing streams of sentiment within this hierarchy, we produced a representation of participatory social media engagement in the context of image-based sexual abuse. Following two streams of findings, a model of social media user engagement was established that hierarchized the interplay between institutional and personal Twitter users. In this model, it was observed that the Broad incident generated sympathetic and compassionate discourses among an articulated network of social media users. This sentiment gradually diffused to institutional Twitter users – or Reference accounts – through the process of intermedia agenda-setting, whereby the narrative of terrestrial media accounts was altered by personal Twitter users over time.","PeriodicalId":117534,"journal":{"name":"The Emerald International Handbook of Technology Facilitated Violence and Abuse","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128642534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technology-Facilitated Violence Against Women and Girls in Public and Private Spheres: Moving from Enemy to Ally","authors":"Alison J. Marganski, Lisa A. Melander","doi":"10.1108/978-1-83982-848-520211046","DOIUrl":"https://doi.org/10.1108/978-1-83982-848-520211046","url":null,"abstract":"While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology demands that we pay attention to not only harms associated with interconnectivity, but also the potential for technology to counter offenses and “do good.” This chapter discusses technology as both a weapon and a shield when it comes to violence against women and girls in public spaces and private places. First, we review the complex and varied manifestations of technological gender violence, ranging from the use of technology to exploit, harass, stalk, and otherwise harm women and girls in communal spaces, to offenses that occur behind closed doors. Second, we discuss justice-related responses, underscoring how women and girls have “flipped the script” when their needs are not met. By developing innovative ways to respond to the wrongs committed against them and creating alternate systems that offer a voice, victims/survivors have repurposed technology to redress harms and unite in solidarity with others in an ongoing quest for justice.","PeriodicalId":117534,"journal":{"name":"The Emerald International Handbook of Technology Facilitated Violence and Abuse","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116019122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reasonable Expectations of Privacy in an Era of Drones and Deepfakes: Expanding the Supreme Court of Canada's Decision in R v Jarvis","authors":"Kristen Thomasen, Suzie Dunn","doi":"10.1108/978-1-83982-848-520211040","DOIUrl":"https://doi.org/10.1108/978-1-83982-848-520211040","url":null,"abstract":"Perpetrators of Technology-Facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse. Whether this be monitoring movements through stalkerware, using drones to nonconsensually fi lm or harass, or manipulating and distributing intimate images online such as deepfakes and creepshots, invasions of privacy have become a signi fi cant form of gender-based violence. Accordingly, our normative and legal concepts of privacy must evolve to counter the harms arising from this misuse of new technology. Canada ’ s Supreme Court recently addressed Technology-Facilitated violations of privacy in the context of voyeurism in R v Jarvis (2019) . The dis-cussion of privacy in this decision appears to be a good fi rst step toward a more equitable conceptualization of privacy protection. Building on existing privacy theories, this chapter examines what the reasoning in Jarvis might mean for “ reasonable expectations of privacy ” in other areas of law, and how this concept might be interpreted in response to gender-based Technology-Facilitated violence. The authors argue the courts in Canada and elsewhere must take the analysis in Jarvis further to fully realize a notion of privacy that protects the autonomy, dignity, and liberty of all.","PeriodicalId":117534,"journal":{"name":"The Emerald International Handbook of Technology Facilitated Violence and Abuse","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125938297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bystander Apathy and Intervention in the Era of Social Media","authors":"R. Lytle, Tabrina M. Bratton, H. Hudson","doi":"10.1108/978-1-83982-848-520211052","DOIUrl":"https://doi.org/10.1108/978-1-83982-848-520211052","url":null,"abstract":"Bystander apathy has been a source of debate for decades. In the past half-century, psychologists developed theoretical frameworks to understand bystander activity, commonly referred to as bystander intervention models (BIMs). More recently, BIMs have been modi fi ed to facilitate initiatives to prevent various forms of online victimization. This chapter begins with a review of BIMs and recent applications of bystander intervention research to online environments. We also present several future directions for research along with applications for reducing Technology-Facilitated violence, including programming recommendations and theoretical development.","PeriodicalId":117534,"journal":{"name":"The Emerald International Handbook of Technology Facilitated Violence and Abuse","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129282736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Doxing and the Challenge to Legal Regulation: When Personal Data Become a Weapon","authors":"A. Cheung","doi":"10.1108/978-1-83982-848-520211041","DOIUrl":"https://doi.org/10.1108/978-1-83982-848-520211041","url":null,"abstract":"Doxing refers to the intentional public release by a third party of personal data without consent, often with the intent to humiliate, intimidate, harass, or punish the individual concerned. Intuitively, it is tempting to condemn doxing as a crude form of cyber violence that weaponizes personal data. When it is used as a strategy of resistance by the powerless to hold the powerful accountable, however, a more nuanced understanding is called for. This chapter focuses on the doxing phenomenon in Hong Kong, where doxing incidents against police officers and their family members have skyrocketed since 2019 (a 75-fold increase over 2018). It contends that doxing for political purposes is closely related to digital vigilantism, signifying a loss of confidence in the ruling authority and a yearning for an alternative form of justice. The chapter therefore argues that public interest should be recognized as a legal defense in doxing cases when those discharging or entrusted with public duty are the targets. Equally, it is important to confine the categories of personal data disclosed to information necessary to reveal the alleged wrongdoer or wrongdoing. Only in this way can a fair balance be struck between privacy, freedom of expression, and public interest.","PeriodicalId":117534,"journal":{"name":"The Emerald International Handbook of Technology Facilitated Violence and Abuse","volume":"6 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131437334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Text-Based (Sexual) Abuse and Online Violence Against Women: Toward Law Reform?","authors":"Kim Barker, Olga Jurasz","doi":"10.1108/978-1-83982-848-520211017","DOIUrl":"https://doi.org/10.1108/978-1-83982-848-520211017","url":null,"abstract":"The ideal of an open, all-inclusive, and participatory internet has been undermined by the rise of gender-based and misogynistic abuse on social media platforms. Limited progress has been made at supranational and national levels in addressing this issue, and where steps have been taken to combat online violence against women (OVAW), they are typically limited to legislative developments addressing image-based sexual abuse. As such, harms associated with image-based abuse have gained recognition in law while harms caused by text-based abuse (TBA) have not been conceptualized in an equivalent manner.","PeriodicalId":117534,"journal":{"name":"The Emerald International Handbook of Technology Facilitated Violence and Abuse","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114695612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Is it Actually Violence? Framing Technology-Facilitated Abuse as Violence","authors":"Suzie Dunn","doi":"10.1108/978-1-83982-848-520211002","DOIUrl":"https://doi.org/10.1108/978-1-83982-848-520211002","url":null,"abstract":"When discussing the term “Technology-Facilitated violence” (TFV) it is often asked: “Is it actually violence?” While international human rights standards, such as the United Nations' Convention on the Elimination of All Forms of Discrimination against Women (United Nations General Assembly, 1979), have long recognized emotional and psychological abuse as forms of violence, including many forms of Technology-Facilitated abuse (United Nations, 2018), law makers and the general public continue to grapple with the question of whether certain harmful Technology-Facilitated behaviors are actually forms of violence. This chapter explores this question in two parts. First, it reviews three theoretical concepts of violence and examines how these concepts apply to Technology-Facilitated behaviors. In doing so, this chapter aims to demonstrate how some harmful Technology-Facilitated behaviors fit under the greater conceptual umbrella of violence. Second, it examines two recent cases, one from the British Columbia Court of Appeal (BCCA) in Canada and a Romanian case from the European Court of Human Rights (ECtHR), that received attention for their legal determinations on whether to define harmful Technology-Facilitated behaviors as forms of violence or not. This chapter concludes with observations on why we should conceptualize certain Technology-Facilitated behaviors as forms of violence.","PeriodicalId":117534,"journal":{"name":"The Emerald International Handbook of Technology Facilitated Violence and Abuse","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130413179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intimate Image Dissemination and Consent in a Digital Age: Perspectives from the Front Line","authors":"Olga Marques","doi":"10.1108/978-1-83982-848-520211022","DOIUrl":"https://doi.org/10.1108/978-1-83982-848-520211022","url":null,"abstract":"Media attention on nonconsensual intimate image dissemination has led to the relatively recent proliferation of academic research on the topic. This literature has focused on many areas including victimization and perpetration prevalence rates, coerced sexting, legal and/or criminal contexts, sexual violence in digital spaces, gendered constructions of blame and risk, and legal analysis of high-profile cases and legislation. Despite this research, several gaps exist, including a lack of empirical research with service providers. Informed by in-depth interviews with 10 sexual violence frontline professionals in Southern Ontario (Canada), this chapter focuses on their perspectives of the additive role of technology. With respect to nonconsensual intimate image dissemination, technology acts as a digital “layer” that operates in addition to the commission of physical acts of sexual violence, and compounds the harms experienced by the victim by adding a virtual – and indelible – “permanent remembering” of the violence. Nuancing the contours of consent in a digital age, this chapter concludes by considering what consent means in a technological context.","PeriodicalId":117534,"journal":{"name":"The Emerald International Handbook of Technology Facilitated Violence and Abuse","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134190701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}