Gendered cyberhate, victim-blaming, and why the internet is more like driving a car on a road than being naked in the snow

2017 ◽  
pp. 61-78 ◽  
Author(s):  
Emma A. Jane
Keyword(s):  
Author(s):  
Melody Lee Rood ◽  
John Schriner

Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research concerning cyberharassment in the workplace generally, there is little written about specifically IBSA and the workplace. This chapter examines current academic research on IBSA, the issues with defining this type of abuse, victim blaming, workplace policy, and challenges to victim-survivors' redress. The authors explore monetary motivation for websites that host revenge pornography and unpack how the dark web presents new challenges to seeking justice. Additionally, this chapter presents recommendations from the literature focusing on shifting cultural attitudes, effective legislation, and increased education and training.


2021 ◽  
Vol 2 (1) ◽  
pp. 12-21
Author(s):  
Syarifah Nuzulliah Ihsani

Kekerasan berbasis gender online sering terjadi di media online. Banyak pemberitaan mengenai pelecehan di internet yang menggiring masyarakat untuk menyalahkan korban. Maraknya victim-blaming terhadap korban pelecehan menyebabkan mereka merasa malu, terancam, dan tidak memperoleh haknya sebagai korban. Bahkan, victim-blaming menyebabkan banyaknya korban pelecehan yang lebih memilih bungkam daripada menceritakan permasalahan mereka karena khawatir akan disalahkan. Penelitian ini bertujuan untuk melihat penyebab victim-blaming pada kasus pelecehan yang dipublikasikan melalui media online agar dapat memberikan rekomendasi kebijakan untuk perlindungan terhadap korban. Penelitian ini dilakukan dengan studi literatur melalui pencarian inklusif literatur yang telah dipublikasi dan mengidentifikasi studi yang berkaitan dengan victim-blaming pada kasus kekerasan berbasis gender yang dipublikasi melalui media online. Hasil penelitian menunjukkan bahwa peran media online terhadap budaya victim-blaming disebabkan karena adanya bias gender pada praktik jurnalistik pada media online. Penggunaan diksi yang bias terhadap korban, menggiring pembaca menerima stereotip yang dikontruksi oleh media online sehingga tindakan victim-blaming sering terjadi. ===== Online gender-based violence often occurs in online media. Many news about harassment on the internet has led people to blame the victim. The victims of harassment often blamed people, which causes them to feel ashamed, threatened, and do not get their rights as victims. Blaming the victim also causes many victims to prefer silence rather than telling the problem for fear of blaming. This study aims to review the causes of victim-blaming of published harassment cases through online media to provide policy recommendations to protect the victims. This research was conducted by studying literature through published literature searches and identifying studies related to victim-blaming in published gender-based violence cases through online media. The results demonstrate that gender bias in journalism practices in online media has a role on online media in victim-blaming. The use of victim-biased diction leads the reader to accept stereotypes constructed by online media motivate victim-blaming occurred.


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


2001 ◽  
Vol 120 (5) ◽  
pp. A735-A735
Author(s):  
C STREETS ◽  
J PETERS ◽  
D BRUCE ◽  
P TSAI ◽  
N BALAJI ◽  
...  

1996 ◽  
Vol 16 (4) ◽  
pp. 244-245 ◽  
Author(s):  
L. Smessaert
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document