Abstract
The law alone will not provide an answer to technology-facilitated sexual violence, nor will it fulfil the justice needs of many victims. Partly this is due to the significant challenges of responding to crime in a global, digital context in which victims, perpetrators and the technologies used to facilitate harm may often reside in different nation states and the cross-jurisdictional will and/or the capacity to investigate all forms of technology-facilitated sexual violence may simply not be present or practically feasible given the scope of the problem. The law then cannot be the sole focus of efforts to address technology-facilitated sexual violence. This is a complex social problem that requires a combination of legal, technical and social solutions to tackle it at its core. In this chapter, we focus our attention on the prevention of technology-facilitated sexual violence. In particular, we consider the possibilities for translating existing prevention approaches, and developing new ones, for preventing digital violence, abuse and harassment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akers, R. L. (1990). Rational choice, deterrence, and social learning theory in criminology: The path not taken. The Journal of Criminal Law and Criminology (1973–), 81(3), 653–676.
Albury, K., & Crawford, K. (2012). Sexting, consent and young people’s ethics: Beyond Megan’s story. Continuum: Journal of Media and Cultural Studies, 26(3), 463–473.
Allen, L. (2005). Sexual subjects: Young people, sexuality and education. New York: Springer.
Bailey, J. (2013). Sexualized online bullying through an equality lens: Missed opportunity in AB v. Bragg. McGill Law Journal, 59, 709–737.
Bailey, J. (2014). Time to unpack the juggernaut: Reflections on the Canadian federal paraliamentary debates on cyberbullying. Dalhousie Law Journal 661, 37(2). doi:10.2139/ssrn.2448480.
Bates, S. (2017). Revenge porn and mental health: A qualitative analysis of the mental health effects of revenge porn on female survivors. Feminist Criminology, 12(1), 22–42.
Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3(1), 400.
Bossler, A. M., & Holt, T. J. (2010). The effect of self-control on victimization in the cyberworld. Journal of Criminal Justice, 38, 227–236.
Braco, J. (2012, June 23). Nude photos of hundreds of Queensland women posted online. Sydney Morning Hearld. Retrieved from http://www.smh.com.au/queensland/nude-photos-of-hundreds-of-queensland-women-posted-online-20150622-ghuec0.html
Carmody, M. (2008). Sex and ethics (Vol. 1). South Yarra, Australia: Palgrave Macmillan.
Carmody, M., & Carrington, K. (2000). Preventing sexual violence? Australian & New Zealand Journal of Criminology, 33(3), 341–361.
Carmody, M., Evans, S., Krogh, C., Flood, M., Heenan, M., & Ovenden, G. (2009). Framing best practice: National standards for the primary prevention of sexual assault through education: National Sexual Assault Prevention Education Project for NASASV. University of Western Sydney, Australia.
Carmody, M. (2014). Sexual violence prevention educator training. In N. Henry & A. Powell (Eds.), Preventing sexual violence: Interdisciplinary approaches to overcoming a rape culture (pp. 150–169). Basingstoke, UK: Palgrave Macmillan.
Cares, A. C., Moynihan, M. M., & Banyard, V. L. (2014). Taking stock of bystander programmes. In N. Henry & A. Powell (Eds.), Preventing sexual violence: Interdisciplinary approaches to overcoming a rape culture (pp. 170–188). Basingstoke, UK: Palgrave Macmillan.
CBC News. (2015). Facebook clarifiies breastfeeding pics ok, updates rules. CBC Canada. World News. Retrieved from http://www.cbc.ca/news/world/facebook-clarifies-breastfeeding-pics-ok-updates-rules-1.2997124
Choi, K. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2, 308–333.
Choi, M. (2016). A concept analysis of digital citizenship for democratic citizenship education in the Internet age. Theory & Research in Social Education, 1–43. doi:10.1080/00933104.2016.1210549.
Citron, D. K., & Norton, H. (2011). Intermediaries and hate speech: Fostering digital citizenship for our information age. BUL Rev, 91, 1435.
Citron, D. K. (2014). Hate crimes in cyberspace. Cambridge, MA: Harvard University Press.
Clarke, R. V. G., & Felson, M. (Eds.). (1993). Routine activity and rational choice (Vol. 5). New Brunswick, NJ: Transaction Publishers.
Clough, J. (2011). Cybercrime. Commonwealth Law Bulletin, 37(4), 671–680.
Clough, J. (2015). Principles of cybercrime. Cambridge, MA: Cambridge University Press.
Connell, R. W. (1987). Gender and power: Society, the person and sexual politics. Cambridge, UK: Polity Press.
Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 588–608.
Crofts, T., Lee, M., McGovern, A., & Milivojevic, S. (2015). Sexting and young people. New York: Palgrave Macmillan UK.
Deitch-Stackhouse, J., Kenneavy, K., Thayer, R., Berkowitz, A., & Mascari, J. (2015). The influence of social norms on advancement through bystander stages for preventing interpersonal violence. Violence Against Women, 21(10), 1284–1307.
DeKeseredy, W. S. (1990). Male peer support and woman abuse: The current state of knowledge. Sociological Focus, 23(2), 129–139.
DeKeseredy, W. S., & Schwartz, M. D. (Eds.). (2013). Male peer support and violence against women: The history and verification of a theory. Boston, MA: Northeastern University Press.
DiMaggio, P., Hargittai, E., Neuman, W. R., & Robinson, J. P. (2001). Social implications of the Internet. Annual Review of Sociology, 27(1), 307–336.
Dobson, A. S., & Ringrose, J. (2016). Sext education: Pedagogies of sex, gender and shame in the schoolyards of tagged and exposed. Sex Education, 16(1), 8–21.
Edwards, S. S. (1996). Sex and gender in the legal process. Oxford: Oxford University Press on Demand.
Eklund, L. (2011). Doing gender in cyberspace: The performance of gender by female World of Warcraft players. Convergence: The International Journal of Research into New Media Technologies, 17(3), 323–342.
Eskola, M. (2012). From risk society to network society: Preventing cybercrimes in the 21st century. Journal of Applied Security Research, 7(1), 122–150.
Felson, M. (2002). Those who discourage crime. Crime Prevention Studies, 4, 53–66.
Fine, M. (1998). Sexuality, schooling, and adolescent females: The missing discourse of desire. Harvard Educational Review, 58(1), 29–54.
Flood, M. (2014). Preventing violence against women and girls. In R. J. Burke & D. A. Major (Eds.), Gender in organizations: Are men allies or adversaries to women’s career advancement? Cheltenham: Edward Elgar Publishing.
Fox, J., & Tang, W. Y. (2014). Sexism in online video games: The role of conformity to masculine norms and social dominance orientation. Computers in Human Behavior, 33, 314–320.
Frankenfeld, P. J. (1992). Technological citizenship: A normative framework for risk studies. Science, Technology & Human Values, 17(4), 459–484.
Franks, M. (2016, February). Keynote Presentation delivered at More than revenge: Developing effective law reform to address the harms of revenge pornography. Melbourne, Australia.
Fraser, N. (2007). Reframing justice in a globalizing world. In D. Held & A. Kaya (Eds.), Global inequality (pp. 252–272). Cambridge, UK: Polity Press.
Garcia, A., Mirra, N., Morrell, E., Martinez, A., & Scorza, D. A. (2015). The council of youth research: Critical literacy and civic agency in the digital age. Reading & Writing Quarterly, 31(2), 151–167.
Gardner, J. (2015). Retrieved from http://www.dailymail.co.uk/news/article-2951615/Photographer-s-outrage-Facebook-bans-photo-group-mother-s-breastfeeding.html
Gavey, N. (2005). Just sex?: The cultural scaffolding of rape. London: Routledge.
Gidycz, C. A., Rich, C. L., & Marioni, N. L. (2002). Interventions to prevent rape and sexual assault. In J. Petrak & B. Hedge (Eds.), The trauma of sexual assault: Treatment, prevention, and practice (pp. 235–259). Somerset, NJ: Wiley.
Grabosky, P. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10, 243–249.
Hawdon, J., Oksanen, A., & Räsänen, P. (2016). Exposure to online hate in four nations: a cross-national consideration. Deviant Behavior, 38(3).
Henry, N., & Powell, A. (Eds.). (2014). Preventing sexual violence: Interdisciplinary approaches to overcoming a rape culture. Basingstoke, UK: Palgrave Macmillan.
Hern, A. (2013, October 22). Facebook’s changing standards: From beheading to breastfeeding image. The Guardian. Retrieved from https://www.theguardian.com/technology/2013/oct/22/facebook-standards-beheading-breastfeeding-social-networking
Hinde, N (2015, February 25). #Brelfies: Mums take breastfeeding selfies in protest of Facebook’s nudity rules. The Huffington Post. Retrieved from http://www.huffingtonpost.co.uk/2015/02/25/breastfeeding-selfies-protest-facebook-nudity-rules_n_6752890.html
Hobbs, R., & Jensen, A. (2013). The past, present, and future of media literacy education. Journal of Media Literacy Education, 1(1), 1.
Holland, J., Ramazanoglu, C., Sharpe, S., & Thomson, R. (2004). The male in the head: Young people, heterosexuality and power. London: Tufnell.
Hollway, W. (1984). Women’s power in heterosexual sex. Women’s Studies International Forum, 7(1), 63–68.
Holt, T. J., & Bossler, A. M. (2008). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30(1), 1–25.
Holt, T. J., Bossler, A. M., Malinski, R., & May, D. C. (2016). Identifying predictors of unwanted online sexual conversations among youth using a low self-control and routine activity framework. Journal of Contemporary Criminal Justice, 32(2), 108–128.
Joiner, R., Stewart, C., & Beaney, C. (2015). Gender digital divide. In N. R. Cheever, L. D. Rosen, & L. M. Carrier (Eds.), The Wiley handbook of psychology, technology, and society (pp. 74–88). Somerset: Wiley.
Jones, L. M., & Mitchell, K. J. (2015). Defining and measuring youth digital citizenship. New Media & Society, 18(9), 2063–2079.
Kilmartin, C., & Berkowitz, A. D. (2014). Sexual assault in context: Teaching college men about gender. New York: Psychology Press.
Lawson, S., & Olle, L. (2006). Dangerous drink spiking archetypes. Women Against Violence: A Feminist Journal, 18, 46–55.
Leukfeldt, E. R. (2014). Phishing for suitable targets in the Netherlands: Routine activity theory and phishing victimization. Cyberpsychology, Behavior, and Social Networking, 17(8), 551–555.
Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263–280.
Lewis, R., Dobash, R. E., Dobash, R. P., & Cavanagh, K. (2001). Law’s progressive potential: The value of engagement with the law for domestic violence. Social & Legal Studies, 10(1), 105–130.
Lim, W. Y., Tan, C. M., Nizam, M., Zhou, W., & Tan, S. M. (2016). Toward digital citizenship in primary schools: Leveraging on our enhanced cyberwellness framework. Future Learning in Primary Schools. doi:10.1007/978-981-287-579-2_7.
Lonsway, K. A., Banyard, V. L., Berkowitz, A. D., Gidycz, C. A., Katz, J. T., Koss, M. P., & Ullman, S. E. (2009). Rape prevention and risk reduction: Review of the research literature for practitioners. In Applied Research Forum: National Online Resource Center on Violence Against Women, pp. 1–20.
MacKinnon, R. (2012). Consent of the networked: The worldwide struggle for Internet freedom. New York: Basic Books.
Marganski, A., & Melander, L. (2015). Intimate partner violence victimization in the cyber and real world examining the extent of cyber aggression experiences and its association with in-person dating violence. Journal of Interpersonal Violence. doi:10.1177/0886260515614283.
Merhab, B., & Yousafi, R. (2016). Grow up and don’t take naked pictures: AFP. News.com.au . Retrieved from http://www.news.com.au/national/breaking-news/law-alone-wont-stop-revenge-porn-inquiry/news-story/9ebf53146319db796213abeb9cf2b45c
Microsoft. (2016). Content Removal Requests Report. Retrieved from https://www.microsoft.com/about/csr/transparencyhub/crrr/
Moss, R. (2015, March 16). Facebook clarifies nudity policy: Breastfeeding photos are allowed (as long as you can’t see any nipples). The Huffington Post. Retrieved from http://www.huffingtonpost.co.uk/2015/03/16/breastfeeding-facebook-nudity-policy_n_6877208.html
Mossberger, K., Tolbert, C. J., & McNeal, R. S. (2008). Digital citizenship: The Internet, society, and participation. Cambridge, MA: MIT Press.
Nemer, D. (2015). From digital divide to digital inclusion and beyond. The Journal of Community Informatics, 11(1).
Norris, K. O. (2004). Gender stereotypes, aggression, and computer games: An online survey of women. Cyberpsychology & Behavior, 7(6), 714–727.
Pease, B. (2014). Theorising men’s violence prevention policies. In N. Henry & A. Powell (Eds.), Preventing sexual violence: Interdisciplinary approaches to overcoming a rape culture (pp. 22–40). Basingstoke, UK: Palgrave Macmillan.
Pew Research Centre. (2014, 22 October). Online harassment. Pew Research Centre. Retrieved from http://www.pewinternet.org/files/2014/10/PI_OnlineHarassment_102214_pdf1.pdf
Powell, A. (2008). Amor fati? Gender habitus and young people’s negotiation of (hetero) sexual consent. Journal of Sociology, 44(2), 167–184.
Powell, A. (2010). Sex, power and consent: Youth culture and the unwritten rules. Cambridge, MA: Cambridge University Press.
Powell, A. (2014). Shifting upstream. In N. Henry & A. Powell (Eds.), Preventing sexual violence: Interdisciplinary approaches to overcoming a rape culture (pp. 189–207). Basingstoke, UK: Palgrave Macmillan.
Powell, A., & Henry, N. (2016). Policing technology-facilitated sexual violence against adult victims: Police and service sector perspectives. Policing and Society. doi:10.1080/10439463.2016.1154964.
Reyns, B. W., & Henson, B. (2015). The thief with a thousand faces and the victim with none: Identifying determinants for online identity theft victimization with routine activity theory. International Journal of Offender Therapy and Comparative Criminology, 60(10), 1119–1139.
Reyns, B. W., Henson, B., & Fisher, B. S. (2011). Being pursued online applying cyberlifestyle–routine activities theory to cyberstalking victimization. Criminal Justice and Behavior, 38(11), 1149–1169.
Ringrose, J., Gill, R., Livingstone, S., & Harvey, L. (2012). A qualitative study of children. Young people and ‘sexting’, a report prepared for the NSPCC. London: National Society for the Prevention of Cruelty to Children. Retrieved from http://www.nspcc.org.uk/Inform/resourcesforprofessionals/sexualabuse/sextingresearch-report_wdf89269.pdf
Söchting, I., Fairbrother, N., & Koch, W. J. (2004). Sexual assault of women: Prevention efforts and risk factors. Violence Against Women, 10(1), 73–93.
Southworth, C., Dawson, S., Fraser, C., & Tucker, S. (2005). A high-tech twist on abuse: Technology, intimate partner stalking, and advocacy. Report prepared by Safety Net: National Safe & Strategic Technology Project at the National Network to End Domestic Violence Fund. Washington: Violence Against Women Online Resources.
Sparrow, J. (2015, March 18). Whose ‘community standard’ is Facebook enforcing? ABC The Drum. Retrieved from http://www.abc.net.au/news/2015-03-18/sparrow-whose-%27community-standard%27-is-facebook-enforcing/6328326
Stanko, E. (1990). Everyday violence: How women and men experience sexual and physical danger. Glasgow, London: Pandora.
Sutton, A., Cherny, A., & White, R. (2008). Crime prevention: Principles, perspectives and practices. Melbourne, Australia: Cambridge University Press.
Systrom, K. (2016, September 12). Keeping comments safe on Instagram. Instagram Blog. Retrieved from http://blog.instagram.com/post/150312324357/160912-news
Tolman, D. L. (1994). Doing desire: Adolescent girls’ struggles for/with sexuality. Gender & Society, 8(3), 324–342.
Tyner, K. (2014). Literacy in a digital world: Teaching and learning in the age of information. London: Routledge.
Ullman, S. E. (1997). Review and critique of empirical studies of rape avoidance. Criminal Justice and Behavior, 24(2), 177–204.
Ullman, S. E. (2007). A 10-year update of ‘review and critique of empirical studies of rape avoidance’. Criminal Justice and Behavior, 34(3), 411–429.
Van Ouytsel, J., Ponnet, K., & Walrave, M. (2016). Cyber dating abuse victimization among secondary school students from a lifestyle-routine activities theory perspective. Journal of Interpersonal Violence. doi:10.1177/0886260516629390.
Wajcman, J. (1991). Feminism confronts technology. Cambridge, UK: Polity Press.
Wajcman, J. (2013). TechnoFeminism. Oxford: Wiley.
Yar, M. (2005). The novelty of ‘cybercrime’: An assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407–427.
Yeater, E. A., & O’Donohue, W. (1999). Sexual assault prevention programs: Current issues, future directions, and the potential efficacy of interventions with women. Clinical Psychology Review, 19(7), 739–771.
Author information
Authors and Affiliations
Copyright information
© 2017 The Author(s)
About this chapter
Cite this chapter
Powell, A., Henry, N. (2017). Towards Equal Digital Citizenship. In: Sexual Violence in a Digital Age. Palgrave Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-58047-4_8
Download citation
DOI: https://doi.org/10.1057/978-1-137-58047-4_8
Published:
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-137-58046-7
Online ISBN: 978-1-137-58047-4
eBook Packages: Law and CriminologyLaw and Criminology (R0)