Literature Review: 669828

Background

  • Technology is considered as a blessing to human beings
  • It has made the world a global village
  • Where in a single tap one can get any information they want about any place in the other corner of the world
  • However a very severe issue has come into the light that with the help of internet technology many women are getting harassed.
  • Crimes like cyber bullying has increased.
  • It is not just limited to cyber bullying at times people seek revenge on women with the help of internet (Folderauer 2014).

Literature Review

  • Technology has increased online harassment on women.
  • It has led to technology facilitated sexual violence
  • Technology facilitated violence is referred to such behaviors that include online harassment, gender and sexuality based harassment, cyber stalking, image based sexual behavior the carriage services used to influence the  victim to get involved in unwanted sexual act (Henry  and Powell 2016).

Revenge Porn

  • According to Folderauer (2014) in the present scenario dissemination of information and images are getting enabled by social media. Technology helps in exchanging of information in faster way. Revenge porn is defined as non-consensual sharing of images and further misuse of the images to take revenge on the other person.
  • In most of the cases the victims of revenge are young female.
  • Websites are created to take revenge on female victims (Folderauer 2014).

Social Ramifications

Cyber stalking at times changes into real world harassing.

  • Female victims are often intimidated and threatened.
  • This results in various psychological impact on the victim like depression, isolation and anxiety.
  • It causes a sense of low self-esteem in the victims (Taylor, Fritsch, andLiederbach 2014).

Research  Questions

  • How technology is used to seek revenge on women ?
  • What activities are involved in cyber crime ?
  • What are the social ramifications of the cyber crime taken to seek revenge on women?

Definitions

  • Cyber bullying- Cyber bullying is the use of technology, devices or social media devices to harass an individual (Henry and Powell 2016)
  • Revenge Porn- Revenge porn is defined as explicit distribution of images or videos without the consent of the person whose images and videos are distributed (Henry and Powell 2016).

Methodology

  • Research approach– As per the nature of the topic the approach selected is deductive.
  • Research philosophy- Since the research involves the researcher interpreting interests of human beings the philosophy selected is interpretivism .

Data collection and analysis

  • Secondary data has been used for the following research. The data is collected from secondary sources like books and journals.
  • Since the data was all secondary therefore secondary analysis has been done.
  • The research analytical approach is qualitative (Taylor, Bogdan and DeVault 2015).

Ethical considerations

  • All the data used for the research are genuine and none of the data are manipulated or misrepresented.
  • Genuine sources have been used for data collection, like journals and books (Mackey and Gass 2015).

References

  • Folderauer, K.M., 2014. Not All Is Fair (Use) in Love and War: Copyright Law and Revenge Porn.  Balt. L. Rev.44, p.321.
  • Henry, N. and Powell, A., 2016. Technology-facilitated sexual violence: A literature review of empirical research. Trauma, Violence, & Abuse, p.1524838016650189.
  • Mackey, A. and Gass, S.M., 2015. Second language research: Methodology and design. Routledge.
  • Taylor, R.W., Fritsch, E.J. and Liederbach, J., 2014. Digital crime and digital terrorism. Prentice Hall Press.
  • Taylor, S.J., Bogdan, R. and DeVault, M., 2015. Introduction to qualitative research methods: A guidebook and resource. John Wiley & Sons.