Skip to main content

Towards Equal Digital Citizenship

  • 2457 Accesses

Part of the Palgrave Studies in Cybercrime and Cybersecurity book series (PSCYBER)

Abstract

The law alone will not provide an answer to technology-facilitated sexual violence, nor will it fulfil the justice needs of many victims. Partly this is due to the significant challenges of responding to crime in a global, digital context in which victims, perpetrators and the technologies used to facilitate harm may often reside in different nation states and the cross-jurisdictional will and/or the capacity to investigate all forms of technology-facilitated sexual violence may simply not be present or practically feasible given the scope of the problem. The law then cannot be the sole focus of efforts to address technology-facilitated sexual violence. This is a complex social problem that requires a combination of legal, technical and social solutions to tackle it at its core. In this chapter, we focus our attention on the prevention of technology-facilitated sexual violence. In particular, we consider the possibilities for translating existing prevention approaches, and developing new ones, for preventing digital violence, abuse and harassment.

This is a preview of subscription content, access via your institution.

Buying options

eBook
USD   19.99
Price excludes VAT (USA)
  • ISBN: 978-1-137-58047-4
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   29.99
Price excludes VAT (USA)
Hardcover Book
USD   79.99
Price excludes VAT (USA)

References

  • Akers, R. L. (1990). Rational choice, deterrence, and social learning theory in criminology: The path not taken. The Journal of Criminal Law and Criminology (1973–), 81(3), 653–676.

    CrossRef  Google Scholar 

  • Albury, K., & Crawford, K. (2012). Sexting, consent and young people’s ethics: Beyond Megan’s story. Continuum: Journal of Media and Cultural Studies, 26(3), 463–473.

    CrossRef  Google Scholar 

  • Allen, L. (2005). Sexual subjects: Young people, sexuality and education. New York: Springer.

    CrossRef  Google Scholar 

  • Bailey, J. (2013). Sexualized online bullying through an equality lens: Missed opportunity in AB v. Bragg. McGill Law Journal, 59, 709–737.

    CrossRef  Google Scholar 

  • Bailey, J. (2014). Time to unpack the juggernaut: Reflections on the Canadian federal paraliamentary debates on cyberbullying. Dalhousie Law Journal 661, 37(2). doi:10.2139/ssrn.2448480.

  • Bates, S. (2017). Revenge porn and mental health: A qualitative analysis of the mental health effects of revenge porn on female survivors. Feminist Criminology, 12(1), 22–42.

    Google Scholar 

  • Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory. International Journal of Cyber Criminology, 3(1), 400.

    Google Scholar 

  • Bossler, A. M., & Holt, T. J. (2010). The effect of self-control on victimization in the cyberworld. Journal of Criminal Justice, 38, 227–236.

    CrossRef  Google Scholar 

  • Braco, J. (2012, June 23). Nude photos of hundreds of Queensland women posted online. Sydney Morning Hearld. Retrieved from http://www.smh.com.au/queensland/nude-photos-of-hundreds-of-queensland-women-posted-online-20150622-ghuec0.html

  • Carmody, M. (2008). Sex and ethics (Vol. 1). South Yarra, Australia: Palgrave Macmillan.

    Google Scholar 

  • Carmody, M., & Carrington, K. (2000). Preventing sexual violence? Australian & New Zealand Journal of Criminology, 33(3), 341–361.

    CrossRef  Google Scholar 

  • Carmody, M., Evans, S., Krogh, C., Flood, M., Heenan, M., & Ovenden, G. (2009). Framing best practice: National standards for the primary prevention of sexual assault through education: National Sexual Assault Prevention Education Project for NASASV. University of Western Sydney, Australia.

    Google Scholar 

  • Carmody, M. (2014). Sexual violence prevention educator training. In N. Henry & A. Powell (Eds.), Preventing sexual violence: Interdisciplinary approaches to overcoming a rape culture (pp. 150–169). Basingstoke, UK: Palgrave Macmillan.

    Google Scholar 

  • Cares, A. C., Moynihan, M. M., & Banyard, V. L. (2014). Taking stock of bystander programmes. In N. Henry & A. Powell (Eds.), Preventing sexual violence: Interdisciplinary approaches to overcoming a rape culture (pp. 170–188). Basingstoke, UK: Palgrave Macmillan.

    Google Scholar 

  • CBC News. (2015). Facebook clarifiies breastfeeding pics ok, updates rules. CBC Canada. World News. Retrieved from http://www.cbc.ca/news/world/facebook-clarifies-breastfeeding-pics-ok-updates-rules-1.2997124

  • Choi, K. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2, 308–333.

    Google Scholar 

  • Choi, M. (2016). A concept analysis of digital citizenship for democratic citizenship education in the Internet age. Theory & Research in Social Education, 1–43. doi:10.1080/00933104.2016.1210549.

  • Citron, D. K., & Norton, H. (2011). Intermediaries and hate speech: Fostering digital citizenship for our information age. BUL Rev, 91, 1435.

    Google Scholar 

  • Citron, D. K. (2014). Hate crimes in cyberspace. Cambridge, MA: Harvard University Press.

    CrossRef  Google Scholar 

  • Clarke, R. V. G., & Felson, M. (Eds.). (1993). Routine activity and rational choice (Vol. 5). New Brunswick, NJ: Transaction Publishers.

    Google Scholar 

  • Clough, J. (2011). Cybercrime. Commonwealth Law Bulletin, 37(4), 671–680.

    Google Scholar 

  • Clough, J. (2015). Principles of cybercrime. Cambridge, MA: Cambridge University Press.

    Google Scholar 

  • Connell, R. W. (1987). Gender and power: Society, the person and sexual politics. Cambridge, UK: Polity Press.

    Google Scholar 

  • Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 588–608.

    Google Scholar 

  • Crofts, T., Lee, M., McGovern, A., & Milivojevic, S. (2015). Sexting and young people. New York: Palgrave Macmillan UK.

    Google Scholar 

  • Deitch-Stackhouse, J., Kenneavy, K., Thayer, R., Berkowitz, A., & Mascari, J. (2015). The influence of social norms on advancement through bystander stages for preventing interpersonal violence. Violence Against Women, 21(10), 1284–1307.

    Google Scholar 

  • DeKeseredy, W. S. (1990). Male peer support and woman abuse: The current state of knowledge. Sociological Focus, 23(2), 129–139.

    CrossRef  Google Scholar 

  • DeKeseredy, W. S., & Schwartz, M. D. (Eds.). (2013). Male peer support and violence against women: The history and verification of a theory. Boston, MA: Northeastern University Press.

    Google Scholar 

  • DiMaggio, P., Hargittai, E., Neuman, W. R., & Robinson, J. P. (2001). Social implications of the Internet. Annual Review of Sociology, 27(1), 307–336.

    CrossRef  Google Scholar 

  • Dobson, A. S., & Ringrose, J. (2016). Sext education: Pedagogies of sex, gender and shame in the schoolyards of tagged and exposed. Sex Education, 16(1), 8–21.

    CrossRef  Google Scholar 

  • Edwards, S. S. (1996). Sex and gender in the legal process. Oxford: Oxford University Press on Demand.

    Google Scholar 

  • Eklund, L. (2011). Doing gender in cyberspace: The performance of gender by female World of Warcraft players. Convergence: The International Journal of Research into New Media Technologies, 17(3), 323–342.

    CrossRef  Google Scholar 

  • Eskola, M. (2012). From risk society to network society: Preventing cybercrimes in the 21st century. Journal of Applied Security Research, 7(1), 122–150.

    Google Scholar 

  • Felson, M. (2002). Those who discourage crime. Crime Prevention Studies, 4, 53–66.

    Google Scholar 

  • Fine, M. (1998). Sexuality, schooling, and adolescent females: The missing discourse of desire. Harvard Educational Review, 58(1), 29–54.

    Google Scholar 

  • Flood, M. (2014). Preventing violence against women and girls. In R. J. Burke & D. A. Major (Eds.), Gender in organizations: Are men allies or adversaries to women’s career advancement? Cheltenham: Edward Elgar Publishing.

    Google Scholar 

  • Fox, J., & Tang, W. Y. (2014). Sexism in online video games: The role of conformity to masculine norms and social dominance orientation. Computers in Human Behavior, 33, 314–320.

    CrossRef  Google Scholar 

  • Frankenfeld, P. J. (1992). Technological citizenship: A normative framework for risk studies. Science, Technology & Human Values, 17(4), 459–484.

    CrossRef  Google Scholar 

  • Franks, M. (2016, February). Keynote Presentation delivered at More than revenge: Developing effective law reform to address the harms of revenge pornography. Melbourne, Australia.

    Google Scholar 

  • Fraser, N. (2007). Reframing justice in a globalizing world. In D. Held & A. Kaya (Eds.), Global inequality (pp. 252–272). Cambridge, UK: Polity Press.

    Google Scholar 

  • Garcia, A., Mirra, N., Morrell, E., Martinez, A., & Scorza, D. A. (2015). The council of youth research: Critical literacy and civic agency in the digital age. Reading & Writing Quarterly, 31(2), 151–167.

    CrossRef  Google Scholar 

  • Gardner, J. (2015). Retrieved from http://www.dailymail.co.uk/news/article-2951615/Photographer-s-outrage-Facebook-bans-photo-group-mother-s-breastfeeding.html

  • Gavey, N. (2005). Just sex?: The cultural scaffolding of rape. London: Routledge.

    Google Scholar 

  • Gidycz, C. A., Rich, C. L., & Marioni, N. L. (2002). Interventions to prevent rape and sexual assault. In J. Petrak & B. Hedge (Eds.), The trauma of sexual assault: Treatment, prevention, and practice (pp. 235–259). Somerset, NJ: Wiley.

    Google Scholar 

  • Grabosky, P. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10, 243–249.

    CrossRef  Google Scholar 

  • Hawdon, J., Oksanen, A., & Räsänen, P. (2016). Exposure to online hate in four nations: a cross-national consideration. Deviant Behavior, 38(3).

    Google Scholar 

  • Henry, N., & Powell, A. (Eds.). (2014). Preventing sexual violence: Interdisciplinary approaches to overcoming a rape culture. Basingstoke, UK: Palgrave Macmillan.

    Google Scholar 

  • Hern, A. (2013, October 22). Facebook’s changing standards: From beheading to breastfeeding image. The Guardian. Retrieved from https://www.theguardian.com/technology/2013/oct/22/facebook-standards-beheading-breastfeeding-social-networking

  • Hinde, N (2015, February 25). #Brelfies: Mums take breastfeeding selfies in protest of Facebook’s nudity rules. The Huffington Post. Retrieved from http://www.huffingtonpost.co.uk/2015/02/25/breastfeeding-selfies-protest-facebook-nudity-rules_n_6752890.html

  • Hobbs, R., & Jensen, A. (2013). The past, present, and future of media literacy education. Journal of Media Literacy Education, 1(1), 1.

    Google Scholar 

  • Holland, J., Ramazanoglu, C., Sharpe, S., & Thomson, R. (2004). The male in the head: Young people, heterosexuality and power. London: Tufnell.

    Google Scholar 

  • Hollway, W. (1984). Women’s power in heterosexual sex. Women’s Studies International Forum, 7(1), 63–68.

    CrossRef  Google Scholar 

  • Holt, T. J., & Bossler, A. M. (2008). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30(1), 1–25.

    Google Scholar 

  • Holt, T. J., Bossler, A. M., Malinski, R., & May, D. C. (2016). Identifying predictors of unwanted online sexual conversations among youth using a low self-control and routine activity framework. Journal of Contemporary Criminal Justice, 32(2), 108–128.

    CrossRef  Google Scholar 

  • Joiner, R., Stewart, C., & Beaney, C. (2015). Gender digital divide. In N. R. Cheever, L. D. Rosen, & L. M. Carrier (Eds.), The Wiley handbook of psychology, technology, and society (pp. 74–88). Somerset: Wiley.

    Google Scholar 

  • Jones, L. M., & Mitchell, K. J. (2015). Defining and measuring youth digital citizenship. New Media & Society, 18(9), 2063–2079.

    Google Scholar 

  • Kilmartin, C., & Berkowitz, A. D. (2014). Sexual assault in context: Teaching college men about gender. New York: Psychology Press.

    Google Scholar 

  • Lawson, S., & Olle, L. (2006). Dangerous drink spiking archetypes. Women Against Violence: A Feminist Journal, 18, 46–55.

    Google Scholar 

  • Leukfeldt, E. R. (2014). Phishing for suitable targets in the Netherlands: Routine activity theory and phishing victimization. Cyberpsychology, Behavior, and Social Networking, 17(8), 551–555.

    CrossRef  Google Scholar 

  • Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263–280.

    CrossRef  Google Scholar 

  • Lewis, R., Dobash, R. E., Dobash, R. P., & Cavanagh, K. (2001). Law’s progressive potential: The value of engagement with the law for domestic violence. Social & Legal Studies, 10(1), 105–130.

    CrossRef  Google Scholar 

  • Lim, W. Y., Tan, C. M., Nizam, M., Zhou, W., & Tan, S. M. (2016). Toward digital citizenship in primary schools: Leveraging on our enhanced cyberwellness framework. Future Learning in Primary Schools. doi:10.1007/978-981-287-579-2_7.

  • Lonsway, K. A., Banyard, V. L., Berkowitz, A. D., Gidycz, C. A., Katz, J. T., Koss, M. P., & Ullman, S. E. (2009). Rape prevention and risk reduction: Review of the research literature for practitioners. In Applied Research Forum: National Online Resource Center on Violence Against Women, pp. 1–20.

    Google Scholar 

  • MacKinnon, R. (2012). Consent of the networked: The worldwide struggle for Internet freedom. New York: Basic Books.

    Google Scholar 

  • Marganski, A., & Melander, L. (2015). Intimate partner violence victimization in the cyber and real world examining the extent of cyber aggression experiences and its association with in-person dating violence. Journal of Interpersonal Violence. doi:10.1177/0886260515614283.

  • Merhab, B., & Yousafi, R. (2016). Grow up and don’t take naked pictures: AFP. News.com.au . Retrieved from http://www.news.com.au/national/breaking-news/law-alone-wont-stop-revenge-porn-inquiry/news-story/9ebf53146319db796213abeb9cf2b45c

  • Microsoft. (2016). Content Removal Requests Report. Retrieved from https://www.microsoft.com/about/csr/transparencyhub/crrr/

  • Moss, R. (2015, March 16). Facebook clarifies nudity policy: Breastfeeding photos are allowed (as long as you can’t see any nipples). The Huffington Post. Retrieved from http://www.huffingtonpost.co.uk/2015/03/16/breastfeeding-facebook-nudity-policy_n_6877208.html

  • Mossberger, K., Tolbert, C. J., & McNeal, R. S. (2008). Digital citizenship: The Internet, society, and participation. Cambridge, MA: MIT Press.

    Google Scholar 

  • Nemer, D. (2015). From digital divide to digital inclusion and beyond. The Journal of Community Informatics, 11(1).

    Google Scholar 

  • Norris, K. O. (2004). Gender stereotypes, aggression, and computer games: An online survey of women. Cyberpsychology & Behavior, 7(6), 714–727.

    CrossRef  Google Scholar 

  • Pease, B. (2014). Theorising men’s violence prevention policies. In N. Henry & A. Powell (Eds.), Preventing sexual violence: Interdisciplinary approaches to overcoming a rape culture (pp. 22–40). Basingstoke, UK: Palgrave Macmillan.

    Google Scholar 

  • Pew Research Centre. (2014, 22 October). Online harassment. Pew Research Centre. Retrieved from http://www.pewinternet.org/files/2014/10/PI_OnlineHarassment_102214_pdf1.pdf

  • Powell, A. (2008). Amor fati? Gender habitus and young people’s negotiation of (hetero) sexual consent. Journal of Sociology, 44(2), 167–184.

    CrossRef  Google Scholar 

  • Powell, A. (2010). Sex, power and consent: Youth culture and the unwritten rules. Cambridge, MA: Cambridge University Press.

    Google Scholar 

  • Powell, A. (2014). Shifting upstream. In N. Henry & A. Powell (Eds.), Preventing sexual violence: Interdisciplinary approaches to overcoming a rape culture (pp. 189–207). Basingstoke, UK: Palgrave Macmillan.

    Google Scholar 

  • Powell, A., & Henry, N. (2016). Policing technology-facilitated sexual violence against adult victims: Police and service sector perspectives. Policing and Society. doi:10.1080/10439463.2016.1154964.

  • Reyns, B. W., & Henson, B. (2015). The thief with a thousand faces and the victim with none: Identifying determinants for online identity theft victimization with routine activity theory. International Journal of Offender Therapy and Comparative Criminology, 60(10), 1119–1139.

    CrossRef  Google Scholar 

  • Reyns, B. W., Henson, B., & Fisher, B. S. (2011). Being pursued online applying cyberlifestyle–routine activities theory to cyberstalking victimization. Criminal Justice and Behavior, 38(11), 1149–1169.

    CrossRef  Google Scholar 

  • Ringrose, J., Gill, R., Livingstone, S., & Harvey, L. (2012). A qualitative study of children. Young people and ‘sexting’, a report prepared for the NSPCC. London: National Society for the Prevention of Cruelty to Children. Retrieved from http://www.nspcc.org.uk/Inform/resourcesforprofessionals/sexualabuse/sextingresearch-report_wdf89269.pdf

  • Söchting, I., Fairbrother, N., & Koch, W. J. (2004). Sexual assault of women: Prevention efforts and risk factors. Violence Against Women, 10(1), 73–93.

    CrossRef  Google Scholar 

  • Southworth, C., Dawson, S., Fraser, C., & Tucker, S. (2005). A high-tech twist on abuse: Technology, intimate partner stalking, and advocacy. Report prepared by Safety Net: National Safe & Strategic Technology Project at the National Network to End Domestic Violence Fund. Washington: Violence Against Women Online Resources.

    Google Scholar 

  • Sparrow, J. (2015, March 18). Whose ‘community standard’ is Facebook enforcing? ABC The Drum. Retrieved from http://www.abc.net.au/news/2015-03-18/sparrow-whose-%27community-standard%27-is-facebook-enforcing/6328326

  • Stanko, E. (1990). Everyday violence: How women and men experience sexual and physical danger. Glasgow, London: Pandora.

    Google Scholar 

  • Sutton, A., Cherny, A., & White, R. (2008). Crime prevention: Principles, perspectives and practices. Melbourne, Australia: Cambridge University Press.

    Google Scholar 

  • Systrom, K. (2016, September 12). Keeping comments safe on Instagram. Instagram Blog. Retrieved from http://blog.instagram.com/post/150312324357/160912-news

  • Tolman, D. L. (1994). Doing desire: Adolescent girls’ struggles for/with sexuality. Gender & Society, 8(3), 324–342.

    Google Scholar 

  • Tyner, K. (2014). Literacy in a digital world: Teaching and learning in the age of information. London: Routledge.

    Google Scholar 

  • Ullman, S. E. (1997). Review and critique of empirical studies of rape avoidance. Criminal Justice and Behavior, 24(2), 177–204.

    CrossRef  Google Scholar 

  • Ullman, S. E. (2007). A 10-year update of ‘review and critique of empirical studies of rape avoidance’. Criminal Justice and Behavior, 34(3), 411–429.

    Google Scholar 

  • Van Ouytsel, J., Ponnet, K., & Walrave, M. (2016). Cyber dating abuse victimization among secondary school students from a lifestyle-routine activities theory perspective. Journal of Interpersonal Violence. doi:10.1177/0886260516629390.

  • Wajcman, J. (1991). Feminism confronts technology. Cambridge, UK: Polity Press.

    Google Scholar 

  • Wajcman, J. (2013). TechnoFeminism. Oxford: Wiley.

    Google Scholar 

  • Yar, M. (2005). The novelty of ‘cybercrime’: An assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407–427.

    Google Scholar 

  • Yeater, E. A., & O’Donohue, W. (1999). Sexual assault prevention programs: Current issues, future directions, and the potential efficacy of interventions with women. Clinical Psychology Review, 19(7), 739–771.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Copyright information

© 2017 The Author(s)

About this chapter

Cite this chapter

Powell, A., Henry, N. (2017). Towards Equal Digital Citizenship. In: Sexual Violence in a Digital Age. Palgrave Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-58047-4_8

Download citation

  • DOI: https://doi.org/10.1057/978-1-137-58047-4_8

  • Published:

  • Publisher Name: Palgrave Macmillan, London

  • Print ISBN: 978-1-137-58046-7

  • Online ISBN: 978-1-137-58047-4

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)