Literature Review

Background

  • Technology is considered as a blessing to human beings
  • It has made the world a global village
  • Where in a single tap one can get any information they want about any place in the other corner of the world
  • However a very severe issue has come into the light that with the help of internet technology many women are getting harassed.
  • Crimes like cyber bullying has increased.
  • It is not just limited to cyber bullying at times people seek revenge on women with the help of internet (Folderauer 2014).

Literature Review

  • Technology has increased online harassment on women.
  • It has led to technology facilitated sexual violence
  • Technology facilitated violence is referred to such behaviors that include online harassment, gender and sexuality based harassment, cyber stalking, image based sexual behavior the carriage services used to influence the  victim to get involved in unwanted sexual act (Henry  and Powell 2016).

Revenge Porn

  • According to Folderauer (2014) in the present scenario dissemination of information and images are getting enabled by social media. Technology helps in exchanging of information in faster way. Revenge porn is defined as non-consensual sharing of images and further misuse of the images to take revenge on the other person.
  • In most of the cases the victims of revenge are young female.
  • Websites are created to take revenge on female victims (Folderauer 2014).

Social Ramifications

Cyber stalking at times changes into real world harassing.

  • Female victims are often intimidated and threatened.
  • This results in various psychological impact on the victim like depression, isolation and anxiety.
  • It causes a sense of low self-esteem in the victims (Taylor, Fritsch, andLiederbach 2014).

Research  Questions

  • How technology is used to seek revenge on women ?
  • What activities are involved in cyber crime ?
  • What are the social ramifications of the cyber crime taken to seek revenge on women?

Definitions

  • Cyber bullying- Cyber bullying is the use of technology, devices or social media devices to harass an individual (Henry and Powell 2016)
  • Revenge Porn- Revenge porn is defined as explicit distribution of images or videos without the consent of the person whose images and videos are distributed (Henry and Powell 2016).

Methodology

  • Research approach– As per the nature of the topic the approach selected is deductive.
  • Research philosophy- Since the research involves the researcher interpreting interests of human beings the philosophy selected is interpretivism .

Data collection and analysis

  • Secondary data has been used for the following research. The data is collected from secondary sources like books and journals.
  • Since the data was all secondary therefore secondary analysis has been done.
  • The research analytical approach is qualitative (Taylor, Bogdan and DeVault 2015).

Ethical considerations

  • All the data used for the research are genuine and none of the data are manipulated or misrepresented.
  • Genuine sources have been used for data collection, like journals and books (Mackey and Gass 2015).

References

  • Folderauer, K.M., 2014. Not All Is Fair (Use) in Love and War: Copyright Law and Revenge Porn.  Balt. L. Rev.44, p.321.
  • Henry, N. and Powell, A., 2016. Technology-facilitated sexual violence: A literature review of empirical research. Trauma, Violence, & Abuse, p.1524838016650189.
  • Mackey, A. and Gass, S.M., 2015. Second language research: Methodology and design. Routledge.
  • Taylor, R.W., Fritsch, E.J. and Liederbach, J., 2014. Digital crime and digital terrorism. Prentice Hall Press.
  • Taylor, S.J., Bogdan, R. and DeVault, M., 2015. Introduction to qualitative research methods: A guidebook and resource. John Wiley & Sons.

Related Assignment Samples

  • June 1, 2018 Research Proposal: 675144
  • September 6, 2017 Business Research:608132
  • September 19, 2017 Business Research (Enterprise Business Mobility):608132
  • March 17, 2018 Colonialism, Cultural Diversity and Human Rights : 679806
  • May 24, 2018 Technology Implementation of Security Controls Template: 725203
  • February 13, 2018 Evaluating the moral obligation to take in refugees : 165011
  • January 31, 2018 Putting It All Together and Making it Work at Work : 660624
  • November 21, 2017 Development of Chinatown in the Western Parts of Australia : 654848
  • January 31, 2018 Test on International Entrepreneurship : 601447
  • December 26, 2017 Leadership And Employee Retention (Literature Review) : 664080
  • June 3, 2017 E Government System:552729
  • June 3, 2017 Issues in the e-Governance in Jordan:548708
  • December 26, 2017 critical account of Kants short text : 666190
  • May 11, 2018 Media and Communications: 698450
  • September 19, 2017 Relationship Counseling: 590796
  • March 17, 2018 Hacker Ethics : 679804
  • December 26, 2017 Social Media Analysis (Three Farmers) : 655219
  • June 1, 2018 Lab Worksheet 2: 678283
  • June 12, 2017 Legal Aspects of International Trade:562001
  • June 1, 2018 Policing: System and Practice: 708033

This entry was posted in EDUCATION on by admin.

Previous answers to this question


This is a preview of an assignment submitted on our website by a student. If you need help with this question or any assignment help, click on the order button below and get started. We guarantee authentic, quality, 100% plagiarism free work or your money back.

order uk best essays Get The Answer