Post‐separation abuse: A concept analysis
KJ Spearman, JL Hardesty… - Journal of advanced …, 2023 - Wiley Online Library
Aim To report an analysis of the concept of post‐separation abuse and its impact on the
health of children and adult survivors. Design Concept analysis. Data Sources A literature …
health of children and adult survivors. Design Concept analysis. Data Sources A literature …
Unsolicited dick pics: Erotica, exhibitionism or entitlement?
RM Hayes, M Dragiewicz - Women's Studies International Forum, 2018 - Elsevier
Technologically mediated forms of sexual abuse have been the subject of extensive media
discussion in the 2000s. Arguably, digital media have transformed sexual abuse. Cultural …
discussion in the 2000s. Arguably, digital media have transformed sexual abuse. Cultural …
Technology facilitated coercive control: Domestic violence and the competing roles of digital media platforms
M Dragiewicz, J Burgess… - Feminist Media …, 2018 - Taylor & Francis
This article describes domestic violence as a key context of online misogyny, foregrounding
the role of digital media in mediating, coordinating, and regulating it; and proposing an …
the role of digital media in mediating, coordinating, and regulating it; and proposing an …
Digital coercive control: Insights from two landmark domestic violence studies
BA Harris, D Woodlock - The British Journal of Criminology, 2019 - academic.oup.com
This paper examines the use of digital technologies by domestic violence perpetrators,
which we believe constitutes 'digital coercive control'. We draw on two Australian research …
which we believe constitutes 'digital coercive control'. We draw on two Australian research …
Thinking sociologically about image-based sexual abuse: The contribution of male peer support theory
WS DeKeseredy, MD Schwartz - Sexualization, Media, & …, 2016 - journals.sagepub.com
Often referred to by journalists, policy makers, and the general public as revenge porn,
image-based sexual abuse is starting to garner serious legal and social scientific attention …
image-based sexual abuse is starting to garner serious legal and social scientific attention …
Bringing feminist sociological analyses of patriarchy back to the forefront of the study of woman abuse
WS DeKeseredy - Violence against women, 2021 - journals.sagepub.com
Regardless of their contributions to some of the most important scientific advances in the
field, feminist sociological analyses of various types of male-to-female violence that prioritize …
field, feminist sociological analyses of various types of male-to-female violence that prioritize …
Human rights by design: The responsibilities of social media platforms to address gender‐based violence online
Gender‐based violence online is rampant, ranging from harassment of women who are
public figures on social media to stalking intimate partners using purpose‐built apps. This is …
public figures on social media to stalking intimate partners using purpose‐built apps. This is …
[图书][B] Contemporary critical criminology
WS DeKeseredy - 2021 - taylorfrancis.com
The concept of critical criminology–that crime and the present-day processes of
criminalization are rooted in the core structures of society–is of more relevance today than it …
criminalization are rooted in the core structures of society–is of more relevance today than it …
[图书][B] Australians' attitudes to violence against women and gender equality: Findings from the 2017 National Community Attitudes towards Violence against Women …
This report documents findings from the National Community Attitudes towards Violence
against Women Survey (NCAS) and considers them in the context of other related research …
against Women Survey (NCAS) and considers them in the context of other related research …
Domestic violence and communication technology: Survivor experiences of intrusion, surveillance, and identity crime
The research investigated how domestic violence perpetrators intrude on victim's lives via
unwanted contact, unauthorised access to telecommunications accounts and devices, and …
unwanted contact, unauthorised access to telecommunications accounts and devices, and …