Results for 'Cyber harassment'

977 found
Order:
  1.  80
    The Means to Justify the End: Combating Cyber Harassment in Social Media.Tom van Laer - 2014 - Journal of Business Ethics 123 (1):85-98.
    Cyber harassment can have harmful effects on social media users, such as emotional distress and, consequently, withdrawal from social network sites or even life itself. At the same time, users are often upset when network providers intervene and deem such an intrusion an unjust occurrence. This article analyzes how decisions to intervene can be communicated in such a way that users consider them adequate and acceptable. A first experiment shows that informational justice perceptions of social network users depend (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  14
    Professional and Business Ethics Through Film: The Allure of Cinematic Presentation and Critical Thinking.Jadranka Skorin-Kapov - 2018 - Cham: Imprint: Palgrave Macmillan.
    This book considers ethical issues arising in professional and business settings and the role of individuals making decisions and coping with moral dilemmas. It starts by elaborating on critical thinking and on normative ethical theories, subsequently presenting the structure and cinematic elements of narrative film. These two avenues are tools for evaluating films and for discussions on various ethical problems in contemporary business, including: the corporate and banking financial machinations (greed, fraud, social responsibility); workplace ethical challenges (harassment, violence, inequity, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  33
    Being Right-With: On Human Rights Law as Unfreedom.Petero Kalulé - 2022 - Feminist Legal Studies 31 (2):243-264.
    This paper develops the notion of being right-with, a conceptual lens that underscores what happens when individuals turn to human rights law and other legal processes and proceedings to address injustices by the state. It does this through a critical multi-directional reading of two Uganda High Court appeal cases that overturned the decision of a lower court which at first instance had convicted Dr Stella Nyanzi of the offences of cyber harassment and offensive communications. Being right-with is a (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4. Just married: the synergy between feminist criminology and the Tripartite Cybercrime Framework.Suleman Lazarus - 2019 - International Social Science Journal 69 (231):15-33.
    This article is a theoretical treatment of feminist epistemology of crime, which advocates the centrality of gender as a theoretical starting point for the investigating of digital crimes. It does so by exploring the synergy between the feminist perspectives and the Tripartite Cybercrime Framework (TCF) (which argues that three possible factors motivate cybercrimes – socioeconomic, psychosocial, and geopolitical) to critique mainstream criminology and the meaning of the term “cybercrime”. Additionally, the article examines gender gaps in online harassment, cyber‐bullying, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  5.  40
    Exploring the value of feminist theory in understanding digital crimes: Gender and cybercrime types.Suleman Lazarus, Mark Button & Richard Kapend - 2022 - Howard Journal of Crime and Justice 1 (1):1-18.
    Do men and women perceive cybercrime types differently? This article draws on the distinction between socio-economic and psychosocial cybercrime proposed by Lazarus (2019) to investigate whether men and women hold different perceptions of digital crimes across these two dimensions. Informed by the synergy between feminist theory and the Tripartite Cybercrime Framework (TCF), our survey examined respondents’ differential perceptions of socio-economic cybercrime (online fraud) and psychosocial cybercrime (cyberbullying, revenge porn, cyberstalking, online harassment) among men and women in the United Kingdom. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  6.  9
    Unethical practices in online classes during COVID-19 pandemic: an analysis of affordances using routine activity theory.Ummaha Hazra & Asad Karim Khan Priyo - 2022 - Journal of Information, Communication and Ethics in Society 20 (4):546-567.
    Purpose While online classes have enabled many universities to carry out their regular academic activities, they have also given rise to new and unanticipated ethical concerns. We focus on the “dark side” of online class settings and attempt to illuminate the ethical problems associated with them. The purpose of this study is to investigate the affordances stemming from the technology-user interaction that can result in negative outcomes. We also attempt to understand the context in which these deleterious affordances are actualized. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7. New Zealand children’s experiences of online risks and their perceptions of harm Evidence from Ngā taiohi matihiko o Aotearoa – New Zealand Kids Online.Edgar Pacheco & Neil Melhuish - 2020 - Netsafe.
    While children’s experiences of online risks and harm is a growing area of research in New Zealand, public discussion on the matter has largely been informed by mainstream media’s fixation on the dangers of technology. At best, debate on risks online has relied on overseas evidence. However, insights reflecting the New Zealand context and based on representative data are still needed to guide policy discussion, create awareness, and inform the implementation of prevention and support programmes for children. This research report (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  8.  89
    Cyberbullying in Nigeria: Examining the Adequacy of Legal Responses.Adejoke O. Adediran - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 34 (4):965-984.
    Cyberbullying has been defined as the “process of using the internet, cell phones or other devices to send or post text or images intended to hurt or embarrass another person.” The word “cyberbullying” is often used interchangeably with “cyber stalking” and in fact the Cybercrimes Act 2015 of Nigeria, uses the word “cyber stalking” which it defines as any course of conduct directed at a specific person that would cause a reasonable person to feel fear. By the provisions (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  44
    Cyberbullying a desecration of information ethics.Lancelord Siphamandla Ncube & Luyanda Dube - 2016 - Journal of Information, Communication and Ethics in Society 14 (4):313-322.
    Purpose Cyberbullying occurs when a minor is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child. Given that cyberbullying entails defamation or spreading false information or portfolios about someone, it is regarded as a violation of the ethical code of information use. The purpose of the study was to explore the perceptions, experiences and challenges of post-high school youth with regards to cyberbullying. This is a quantitative study that used a survey approach to gather data using a self-administered (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10.  20
    Constructivist and Constructionist Approaches to Graduate Teaching in Second Life.R. S. Talab & Hope R. BotterbuschML S. - 2011 - International Journal of Cyber Ethics in Education 1 (1):36-57.
    As a growing number of faculty use constructivist and constructionist approaches to teaching in SL, little research exists on the many ethical considerations and legal implications that affect course development. Following the experiences of the instructor and five students, their 12-week journey is documented through interviews, journals, blogs, weekly course activities, SL class dialogs, and in-world assignments. Additionally, five faculty and staff experts who taught or trained in SL at this university were also interviewed and consulted. Ethical considerations in constructivist (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11. USC Football Notebook: Robey, McDonald Secondary Stalwarts.White House Confirms Cyber Attack - forthcoming - Hermes.
     
    Export citation  
     
    Bookmark  
  12.  46
    Cyber Trust.Amitai Etzioni - 2019 - Journal of Business Ethics 156 (1):1-13.
    From a sociological and anthropological viewpoint, the ability of complete strangers to carry out transactions that involve significant risk to one or both parties should be complicated by a lack of trust. Yet the rise of e-commerce and “sharing economy” platforms suggests that concerns that seemed prevalent only a few decades ago have been largely assuaged. What mechanisms have been used to facilitate trust between strangers online? Can we measure the extent to which users trust each other when interacting online? (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  13. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  14.  58
    Cyber Force and the Role of Sovereign States in Informational Warfare.Ugo Pagallo - 2015 - Philosophy and Technology 28 (3):407-425.
    The use of cyber force can be as severe and disruptive as traditional armed attacks are. Cyber attacks may neither provoke physical injuries nor cause property damages and still, they can affect essential functions of today’s societies, such as governmental services, business processes or communication systems that progressively depend on information as a vital resource. Whereas several scholars claim that an international treaty, much as new forms of international cooperation, are necessary, a further challenge should be stressed: authors (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  94
    Sexual Harassment at the Workplace: Converging Ideologies.Georgina Gabor - 2006 - Journal for the Study of Religions and Ideologies 5 (14):102-111.
    The present study endeavors to give a description of a famous case of sexual harass- ment at the workplace and critique it in terms of its embedment of an intertwined relationship between two pervasive ideologies prevalent in our society: patriarchy and consumerism. By focusing on the favorable conditions, ways of resolution, and outcomes of the lawsuit, this essay approaches the organization- al culture of Mitsubishi Motor Manufacturing of America through the lens of critical theory. Selective literature review on sexual (...), as well as general coverage of the event by the media and the parties involved demonstrate the validity of the claim that this study has made. (shrink)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  16.  16
    Sexual Harassment: Issues and Answers.Linda LeMoncheck & James P. Sterba (eds.) - 2001 - Oup Usa.
    This a collection of contemporary popular and scholarly writing on the subject of sexual harassment. The book is designed to clarify and enrich understanding of a topic that in recent years, especially in the United States, has been the subject of contentious debate in the media, the law, and the academy. The book's variety of political analysis, legal theory, philosophical debate, multicultural and international perspectives, regulatory documents, and Supreme Court case law is unprecedented in any single volume on the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  37
    Rethinking Cyber War.Daniel K. Rosenfield - 2009 - Critical Review: A Journal of Politics and Society 21 (1):77-90.
    ABSTRACT Cybernetic attacks have been wrongly perceived as weapons of physical destruction rather than of disruption. Because modern, post‐industrial societies have become critically dependent on computer networks to function on a day‐to‐day basis, disruption of those networks could have serious social and economic consequences. In order to better protect society, policymakers will have to re‐orient their approach toward cyber security so as to emphasize the genuine cybernetic threat, which is network disruption rather than physical destruction.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  36
    Cyber Law Terminology as a New Lexical Field in Legal Discourse.Sigita Rackevičienė & Liudmila Mockienė - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 33 (3):673-687.
    The cyber domain is one of the newest and most rapidly evolving fields of knowledge which has led to the development of a new area of law—cyber law, that regulates the use of the Internet and activities performed over the Internet and other networks. The cyber domain is particularly dynamic: new concepts are constantly developed and need new terminological designations, which in turn need new counterparts in other languages. Formation of these designations and their counterparts often raises (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  10
    Harassment: Sexual and Otherwise.James G. Speight - 2015 - In Ethics and the University. Hoboken: Wiley-Scrivener. pp. 201–221.
    This chapter contains sections titled: Introduction Title IX Harassment Situations Effect on the Victim Effect on the University.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  35
    Can Cyber‐Physical Systems Reliably Collaborate within a Blockchain?Ben van Lier - 2017 - Metaphilosophy 48 (5):698-711.
    A blockchain can be considered a technological phenomenon that is made up of different interconnected and autonomous systems. Such systems are referred to here as cyber-physical systems: complex interconnections of cyber and physical components. When cyber-physical systems are interconnected, a new whole consisting of a system of systems is created by the autonomous systems and their intercommunication and interaction. In a blockchain, individual systems can independently make decisions on joint information transactions. The decision-making procedures needed for this (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  7
    Students Harassing Students: The Emotional and Educational Toll on Kids.Janice Cantrell - 2008 - R&L Education.
    Research studies have shown that as many as 80 percent of students are sexually harassed by their peers, ranging from minor, isolated incidences to repeated, criminal actions. Students Harassing Students deals with definitions, problems, suggested solutions and preventions. Each chapter begins with a scenario or case study that demonstrates what educators need to be aware of and address. Cantrell presents liability issues in language easily understood by readers who are not legal scholars. Accessible to non-educators as well as administrators and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  22
    Cyber Capacity without Cyber Security.Roseline Obada Moses-Òkè - 2012 - Journal of Philosophy, Science and Law 12:1-14.
    Prior to the year 2001, the phenomenon of Internet criminal fraud was not globally associated with Nigeria. Since then, however, the country had acquired a world-wide notoriety in criminal activities, especially financial scams, facilitated through the use of the Internet. This is not to say that computer-related crimes were alien to the country. It is, however, remarkable that the perpetration of cyber crimes involving Nigerians and traceable to Nigeria became so rampant that questions might be legitimately raised as to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  24
    Cyber Intelligence and Influence: In Defense of “Cyber Manipulation Operations” to Parry Atrocities.Rhiannon Neilsen - 2023 - Ethics and International Affairs 37 (2):161-176.
    Intelligence operations overwhelmingly focus on obtaining secrets (espionage) and the unauthorized disclosure of secrets by a public official in one political community to another (treason). It is generally understood that the principal responsibility of spies is to successfully procure secrets about the enemy. Yet, in this essay, I ask: Are spies and traitors ethically justified in using cyber operations not merely to acquire secrets (cyber espionage) but also to covertly manipulate or falsify information (cyber manipulation) to prevent (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  31
    Cyber Warfare Ethics.Michael Skerker & David Whetham (eds.) - 2021 - Howgate Publishing.
    Cyber technology gives states the ability to accomplish effects that once required kinetic action. These effects can now be achieved with cyber means in a manner that is covert, deniable, cheap, and technologically feasible for many governments. In some cases, cyber means are morally preferable to conventional military operations, but in other cases, cyber's unique qualities can lead to greater mischief than governments would have chanced using kinetic means. This volume addresses the applicability of traditional military (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  99
    Violence, Just Cyber War and Information.Massimo Durante - 2015 - Philosophy and Technology 28 (3):369-385.
    Cyber warfare has changed the scenario of war from an empirical and a theoretical viewpoint. Cyber war is no longer based on physical violence only, but on military, political, economic and ideological strategies meant to exploit a state’s informational resources. This means that a deeper understanding of what cyber war is requires us to adopt an informational approach. This approach may enable us to account for the two-dimensional nature of cyber war, to revise the notion of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  26.  40
    Justifying Cyber-intelligence?Ross W. Bellaby - 2016 - Journal of Military Ethics 15 (4):299-319.
    The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently (...)
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  27. Just War, Cyber War, and the Concept of Violence.Christopher J. Finlay - 2018 - Philosophy and Technology 31 (3):357-377.
    Recent debate on the relationship between cyber threats, on the one hand, and both strategy and ethics on the other focus on the extent to which ‘cyber war’ is possible, both as a conceptual question and an empirical one. Whether it can is an important question for just war theorists. From this perspective, it is necessary to evaluate cyber measures both as a means of responding to threats and as a possible just cause for using armed kinetic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  28.  50
    Sexual Harassment and Objectivity.Jenna Tomasello - 2013 - Stance 6 (1):7-14.
    Sexual harassment is often understood as a subjective notion that asks the woman if she has been victimized. This paper argues that we need not ask women if they are victims by conceptualizing sexual harassment as an objective notion that holds the perpetrator accountable for his actions. In making my case, I will apply an objective conception of sexual harassment to the U.S. Supreme Court case Meritor Savings Bank v. Vinson by drawing on the feminist view of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  29.  29
    Sexual Harassment as an Emerging Problem in Peruvian University Contexts.Luz Angelica Atoche-Silva, Alberto Remaycuna-Vasquez, Gilberto Carrión-Barco, Jesús Emilio Agustín Padilla-Caballero, Lucia Ruth Pantoja-Tirado & Dina Marisol Calonge De la Piedra - 2023 - Human Review. International Humanities Review / Revista Internacional de Humanidades 21 (1):113-123.
    Considering the prevalence of sexual harassment, especially in university contexts, it is essential to have a validated instrument to identify these characteristics in the educational community. For this reason, this study aimed to analyze the psychometric processes of the sexual harassment scale on university campuses. Using an instrumental design and a sample of 927 students, it was found that the values of the evidence of construct validity and reliability are acceptable. The practical implications of validating the instrument that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  23
    Workplace Harassment Intensity and Revenge: Mediation and Moderation Effects.Qiang Wang, Nathan A. Bowling, Qi-tao Tian, Gene M. Alarcon & Ho Kwong Kwan - 2018 - Journal of Business Ethics 151 (1):213-234.
    This study examines the mediating role of rumination, state anger, and blame attribution, and the moderating role of trait forgiveness in the relationship between workplace harassment intensity and revenge among employed students at a medium-sized Midwestern U.S. university and full-time employees from various industries in Shanghai, China. We tested the proposed model using techniques described by Hayes. Results within both samples suggested that workplace harassment intensity is positively associated with both major and minor revenge. Results of multiple mediation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  31.  58
    Sexual Harassment and Masculinity: The Power and Meaning of “Girl Watching”.Beth A. Quinn - 2002 - Gender and Society 16 (3):386-402.
    That women tend to see harassment where men see harmless fun or normal gendered interaction is one of the more robust findings in sexual harassment research. Using in-depth interviews with employed men and women, this article argues that these differences may be partially explained by the performative requirements of masculinity. The ambiguous practice of “girl watching” is centered, and the production of its meaning analyzed. The data suggest that men's refusal to see their behavior as harassing may be (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  32.  46
    The Cyber Combatant: a New Status for a New Warrior.Maurizio D’Urso - 2015 - Philosophy and Technology 28 (3):475-478.
    Cyber warfare differs from traditional forms of conflicts, both in the instruments used—computers—and in the environment in which it is conducted—the virtual world of the internet and other data communication networks.The purpose of the commentary is to discuss whether, even in cyber warfare, the concept of ‘direct participation in hostilities’ is still operative, with special reference to the laws related to it, and to assess its consequences with regard to the law of armed conflict. In particular, I will (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33. Armchair Cyber Travelers: A Kansas City-Cairo Discussion Group.Safia El-Wakil & Daniel J. Martin - 2002 - Kairos (Université de Toulouse-Le Mirail. Faculté de philosophie) 7:24.
    No categories
     
    Export citation  
     
    Bookmark  
  34. The cyber world of child pornography and the child pornography act of 1996: Thoughts on morphing, virtual imaging, and the first amendment.Sandy Karnold - 2000 - Journal of Information Ethics 9 (2):60-65.
     
    Export citation  
     
    Bookmark  
  35.  23
    Sexual harassment, discrimination, and faculty–student intimate relationships in anesthesia practice.Gail A. Van Norman - 2010 - In Gail A. Van Norman, Stephen Jackson, Stanley H. Rosenbaum & Susan K. Palmer (eds.), Clinical Ethics in Anesthesiology: A Case-Based Textbook. Cambridge University Press.
  36.  55
    Sexual harassment in the public accounting profession?Brian B. Stanko & Mark Schneider - 1999 - Journal of Business Ethics 18 (2):185 - 200.
    Federal discrimination laws have defined two distinct types of activity that constitute sexual harassment – "hostile environment" and "quid pro quo." The Civil Rights Act of 1991 and more recent Supreme Court rulings make it easier for workers to win lawsuits claiming they were sexually harassed in the work environment.While the public accounting profession continues to address gender-related problems, it remains vulnerable to claims of sexual harassment. In an attempt to better understand the underlying risk the public accounting (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  37.  64
    Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  38.  21
    Cyber-Aggression as an Example of Dysfunctional Behaviour of the Young Generation in the Globalized World.Tomasz Prymak & Tomasz Sosnowski - 2017 - Studies in Logic, Grammar and Rhetoric 52 (1):181-192.
    The objective of this paper is to try to identify the specificity and frequency of cyber-agression as a form of problem behaviour characteristic for the contemporary youth known as Generation Y. Analysis of the results of research conducted among schoolchildren aged 15–16 indicates that cyber-agression is a common phenomenon in the group. It raises the need for reconstruction and re-evaluation of practices and standards developed to date and implemented to address the problematic behaviour of young people through the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  39. Cyber Security and Dehumanisation.Marie Oldfield - 2021 - 5Th Digital Geographies Research Group Annual Symposium.
    Artificial Intelligence is becoming widespread and as we continue ask ‘can we implement this’ we neglect to ask ‘should we implement this’. There are various frameworks and conceptual journeys one should take to ensure a robust AI product; context is one of the vital parts of this. AI is now expected to make decisions, from deciding who gets a credit card to cancer diagnosis. These decisions affect most, if not all, of society. As developers if we do not understand or (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  33
    Harassment, Seclusion and the Status of Women in the Workplace: An Islamic and International Human Rights Perspective.Sarah Balto - 2020 - Muslim World Journal of Human Rights 17 (1):65-88.
    Since the mid-nineteenth century, women in Europe, North America and elsewhere have played an increasing role in the workforce. Women started pursuing jobs in factories, offices and businesses instead of being dependent on men for their livelihood. However, along with this significant improvement in the status of women, they still face obstacles, such as the gender pay gab and harassment in the workplace. Although both males and females experience harassment, the available literature clearly suggests that females are more (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  41. Sexual Harassment in Public Places.Margaret Crouch - 2009 - Social Philosophy Today 25:137-148.
    Most discussions of sexual harassment and laws addressing sexual harassment focus solely on sexual harassment in the workplace and/or in academe. In this paper, I will explore sexual harassment in public spaces such as streets and public transportation. Street and/or transportation harassment is a major problem for women in a number of countries. These forms of harassment constrain women’s freedom of movement, preventing them from taking advantage of opportunities at school, at work, and in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  42. Sexual Harassment and the University.Robert L. Holmes - 1996 - The Monist 79 (4):499-518.
    Sexual harassment is a serious and insufficiently recognized problem for universities. But while virtually everyone can agree that sexual harassment is wrong, there is little agreement as to what precisely it is. Here one finds a proliferating array of definitions. They include the following.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  43.  9
    From social to cyber justice: critical views on justice, law, and ethics.Nythamar Fernandes de Oliveira, Marek Hrubec & Emil Albert Sobottka (eds.) - 2018 - Porto Alegre: PUCRS.
    The book contains critical analyses of injustice in connection to law and ethics, and develops normative alternatives linked to justice. It covers the relevant issues from social justice to cyber justice. The chapters address issues and concepts which guideline on social innovations, transformations inherent in democratizing processes, global conflicts and other interactions, including the ultimate danger of escalation to war conflicts, be they conventional wars or new cyberwars.--From publisher's website.
    Direct download  
     
    Export citation  
     
    Bookmark  
  44. Sexual harassment and the "repetition requirement".Iddo Landau - 2004 - Philosophy of the Social Sciences 34 (1):79-83.
    In his "Reply to Iddo Landau," Edmund Wall responds to the author’s critique of some of the views expressed in his "Sexual Harassment and Wrongful Communication." The present article concentrates on what the author takes to be the main problem in Wall’s definition: by requiring that any act, even if intentional and cruel in nature, needs to be repeated to count as sexual harassment, Wall allows too much leeway and renders permissible a wide range of intentional, mean, and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45.  20
    " Sexual Harassment" Must Be Eliminated.Ferrel M. Christensen - 1994 - Public Affairs Quarterly 8 (1):1-17.
  46. Sexual Harassment in the Workplace: Perspectives, Frontiers, and Response Strategies by Margaret S. Stockdale.S. Key - 1998 - Business and Society 37:228-232.
     
    Export citation  
     
    Bookmark  
  47. Sexual Harassment.Sharon O'Malley - 2020 - In David Weitzner (ed.), Issues in business ethics and corporate social responsibility: selections from SAGE business researcher. Los Angeles: SAGE reference.
  48.  68
    Understanding Sexual Harassment a Little Better Reed and Bull Information Systems Ltd v. Stedman.Giorgio Monti - 2000 - Feminist Legal Studies 8 (3):367-377.
    This case note reviews the guidelines issued by Morison J. in the Employment Appeal Tribunal at the end of the decision in Reed and Bull Information Systems Ltd v. Stedman [1999] I.R.L.R.299. The author argues that while the judge’s decision is to be welcomed in adopting an approach more sympathetic to victims of sexual harassment, it also raises a number of problems by placing a burden on the victim to place the harasser on notice that she does not welcome (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  49. A philosophical and evolutionary approach to cyber-bullying: social networks and the disruption of sub-moralities.Tommaso Bertolotti & Lorenzo Magnani - 2013 - Ethics and Information Technology 15 (4):285-299.
    Cyber-bullying, and other issues related to violence being committed online in prosocial environments, are beginning to constitute an emergency worldwide. Institutions are particularly sensitive to the problem especially as far as teenagers are concerned inasmuch as, in cases of inter-teen episodes, the deterrent power of ordinary justice is not as effective as it is between adults. In order to develop the most suitable policies, institution should not be satisfied with statistics and sociological perspectives on the phenomenon, but rather seek (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  50.  9
    Sexual Harassment in Display Work: The Case of the Modeling Industry.Jocelyn Elise Crowley - 2021 - Gender and Society 35 (5):719-745.
    This feminist analysis focuses on sexual harassment within a specific category of jobs known as display work, where primarily women’s bodies are commodified and sold to consumers, and often through the conduits of powerful male industry leaders. Using qualitative content analysis methods to analyze 88 subjective, first-person narratives of harassment from 70 models working within the fashion business, I describe how the commodification of bodies interacts with the particular features of the modeling industry—the premium placed on youth, ambiguous (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 977