Kadına Yönelik Dijital Şiddette Stratejik Sosyal Hizmet Yönetimi

Bu çalışma, kadına yönelik dijital şiddette stratejik sosyal hizmet yönetimi ilkelerinin belirlenmesine odaklanmaktadır. Bu çalışmanın amacı, dijital unsurlar vasıtasıyla kadına karşı şiddetin ortaya koyduğu sebep ve sonuçların social work tarafından tespit edilmesi, yönetilmesi, tedbirlerin uygulanmasında stratejik unsurların belirlenmesidir. Araştırmanın sonuçları, kadına yönelik dijital şiddetin davranış kalıplarının yıkıcı davranış, zorbalık, taciz, takip etme, göz korkutma, kontrol etme olduğunu gösterdi. Stratejik sosyal hizmet yönetiminin; analiz ve planlama, uygulama, kontrol, rekabet gücü, geri bildirim ve stratejik yenileme aşamalarından / adımlarından oluştuğu belirlenmiştir. Diğer bulgulara göre kadınların bilgisayar oyunları, siber zorbalık (siber taciz), siber savaş, internet dolandırıcılığı (siber suç dolandırıcılığı), sosyal medya, akıllı telefon uygulamaları, e-makaleler aracılığıyla dijital şiddete maruz kaldığı belirlendi. Sosyal hizmetin uygulama aşaması için önerilen uygulamalar ise e-cinsiyet ayrımcılığı önlemleri, kadın e-sığınağı / e-sığınma evi, espor (elektronik spor) kadınlardır.

Strategic Social Work Management in Digital Violence Against Women

This study focuses on determining the strategic social work management principles in digital violence against women. The aim of this study is to determine the strategic factors for the implementation of measures in the determination and management of the causes and effects of violence against women by social work through digital elements. The results of the study showed that the behavioral patterns of digital violence against women were disruptive behavior, bullying, harassment, stalking, intimidating, controlling. It was determined that strategic social work management consisted of analysis and planning, implementation, control, competitive power, feedback, and strategic renewal stages/steps. According to other findings, it was determined that women were exposed to digital violence through computer games, cyberbullying (cyber harassment), cyberwarfare, internet fraud (cybercrime fraud), social media, smartphone applications, e-articles. Recommended applications for the implementation phase of social work are e-gender discrimination measures, women's e-refuge / e-shelter, esports (electronic sports) women.

___

  • Ansoff, H. I., Kipley, D., Lewis, A. O., Helm-Stevens, R., & Ansoff, R. (2018). Implanting strategic management. Springer.
  • Antunovic, D. (2019). “We wouldn’t say it to their faces”: online harassment, women sports journalists, and feminism. Feminist Media Studies, 19(3), 428-442. Bányai, F., Griffiths, M. D., Király, O., & Demetrovics, Z. (2019). The psychology of esports: A systematic literature review. Journal of gambling studies, 35(2), 351-365.
  • Becker, S., Bryman, A., & Ferguson, H. (2012). Understanding Research for Social Policy and Social Work 2E: Themes, Methods and Approaches. Policy press.
  • Black, S. E., & Brainerd, E. (2004). Importing equality? The impact of globalization on gender discrimination. ILR Review, 57(4), 540-559.
  • Bock, J. G. (2012). The technology of nonviolence: Social media and violence prevention. MIT Press.
  • Broadhurst, K., Hall, C., Wastell, D., White, S., & Pithouse, A. (2010). Risk, instrumentalism and the humane project in social work: Identifying the informal logics of risk management in children's statutory services. British Journal of Social Work, 40(4), 1046-1064.
  • Brody, N., & Vangelisti, A. L. (2017). Cyberbullying: Topics, strategies, and sex differences. Computers in Human Behavior, 75, 739-748.
  • Chapple, M., & Seidl, D. (2014). Cyberwarfare. Jones & Bartlett Publishers.
  • Chatterjee, R., Doerfler, P., Orgad, H., Havron, S., Palmer, J., Freed, D., ... & Ristenpart, T. (2018). The spyware used in intimate partner violence. In 2018 IEEE Symposium on Security and Privacy (SP) (pp. 441-458). IEEE.
  • Clarke, R., Wright, P., Balaam, M., & McCarthy, J. (2013). Digital portraits: photo-sharing after domestic violence. In Proceedings of the SIGCHI conference on Human factors in computing systems (pp. 2517-2526).
  • Crowther, M., Lim, W., & Crowther, M. A. (2010). Systematic review and meta-analysis methodology. Blood, 116(17), 3140-3146.
  • Dankoski, M. E., Keiley, M. K., Thomas, V., Choice, P., Lloyd, S. A., & Seery, B. L. (2006). Affect regulation and the cycle of violence against women: New directions for understanding the process. Journal of Family Violence, 21(5), 327-339.
  • Dill, K. E., Gentile, D. A., Richter, W. A., & Dill, J. C. (2005). Violence, Sex, Race, and Age in Popular Video Games: A Content Analysis.
  • Dipert, R. R. (2010). The ethics of cyberwarfare. Journal of Military Ethics, 9(4), 384-410.
  • Dobash, R. P., Dobash, R. E., Cavanagh, K., & Lewis, R. (1998). Separate and intersecting realities: A comparison of men's and women's accounts of violence against women. Violence against women, 4(4), 382-414.
  • Dodge, A. (2016). Digitizing rape culture: Online sexual violence and the power of the digital photograph. Crime, media, culture, 12(1), 65-82. Dominelli, L. (2004). Social work: Theory and practice for a changing profession. Polity Press.
  • Ehman, A. C., & Gross, A. M. (2019). Sexual cyberbullying: review, critique, & future directions. Aggression and violent behavior, 44, 80-87. Farrington, D. P. (1993). Understanding and preventing bullying. Crime and justice, 17, 381-458.
  • Fedorov, A. V. (2005). School students and computer games with screen violence. Russian Education & Society, 47(11), 88-96.
  • Ferguson, C. J. (2011). Video games and youth violence: A prospective analysis in adolescents. Journal of youth and adolescence, 40(4), 377-391.
  • Fisher, E. A. (2009). Motivation and leadership in social work management: A review of theories and related studies. Administration in social work, 33(4), 347-367.
  • Fisher, B. S., Cullen, F. T., & Turner, M. G. (2002). Being pursued: Stalking victimization in a national study of college women. Criminology & Public Policy, 1(2), 257-308.
  • Flood, M., & Pease, B. (2009). Factors influencing attitudes to violence against women. Trauma, violence, & abuse, 10(2), 125-142.
  • Forssell, R. C. (2020). Gender and organisational position: predicting victimisation of cyberbullying behaviour in working life. The international journal of human resource management, 31(16), 2045-2064.
  • Ganesh, B. (2018). The ungovernability of digital hate culture. Journal of International Affairs, 71(2), 30-49.
  • Garcia-Moreno, C., Heise, L., Jansen, H. A., Ellsberg, M., & Watts, C. (2005). Violence against women. Science, 310(5752), 1282-1283.
  • Grasso, D. J., Henry, D., Kestler, J., Nieto, R., Wakschlag, L. S., & Briggs-Gowan, M. J. (2016). Harsh parenting as a potential mediator of the association between intimate partner violence and child disruptive behavior in families with young children. Journal of interpersonal violence, 31(11), 2102-2126.
  • Gautam, S., & Jeong, H. S. (2019). Intimate partner violence in relation to husband characteristics and women empowerment: evidence from Nepal. International journal of environmental research and public health, 16(5), 709.
  • Gutek, B. A., & Koss, M. P. (1993). Changed women and changed organizations: Consequences of and coping with sexual harassment. Journal of Vocational Behavior, 42(1), 28-48.
  • Hall, D. M. (1998). The victims of stalking. In The psychology of stalking (pp. 113-137). Academic Press.
  • Hallmann, K., & Giel, T. (2018). eSports–Competitive sports or recreational activity?. Sport management review, 21(1), 14-20.
  • Harris, B., & Vitis, L. (2020). Digital intrusions: technology, spatiality and violence against women. Journal of Gender-Based Violence, 4(3), 325-341. Heise, L., Ellsberg, M., & Gottemoeller, M. (1999). Ending violence against women. Population reports, 27(4), 1-44.
  • Hellevik, P., & Øverlien, C. (2016). Teenage intimate partner violence: Factors associated with victimization among Norwegian youths. Scandinavian journal of public health, 44(7), 702-708.
  • Henry, N., & Powell, A. (2016). Sexual violence in the digital age: The scope and limits of criminal law. Social & legal studies, 25(4), 397-418.
  • Jacobson, N. S., Gottman, J. M., Waltz, J., Rushe, R., Babcock, J., & Holtzworth-Munroe, A. (1994). Affect, verbal content, and psychophysiology in the arguments of couples with a violent husband. Journal of consulting and clinical psychology, 62(5), 982-988.
  • Jahankhani, H., Al-Nemrat, A., & Hosseinian-Far, A. (2014). Cybercrime classification and characteristics. In Cyber Crime and Cyber Terrorism Investigator's Handbook (pp. 149-164). Syngress.
  • Jahn-Sudmann, A., & Stockmann, R. (2008). Computer Games as a Sociocultural Phenomenon: Games Without Frontiers-War Without Tears. Springer. Jerreat-Poole, A. (2018). Avatars under Attack: The War on Women's Testimony. a/b: Auto/Biography Studies, 33(2), 473-482.
  • Jewkes, R., & Dartnall, E. (2019). More research is needed on digital technologies in violence against women. The Lancet Public Health, 4(6), e270-e271. Johnson, H., Ollus, N., & Nevala, S. (2007). Violence against women: An international perspective. Springer Science & Business Media.
  • Jordan, C. E., Wilcox, P., & Pritchard, A. J. (2007). Stalking acknowledgement and reporting among college women experiencing intrusive behaviors: Implications for the emergence of a “classic stalking case”. Journal of Criminal Justice, 35(5), 556-569.
  • Khan, K. S., Kunz, R., Kleijnen, J., & Antes, G. (2003). Five steps to conducting a systematic review. Journal of the royal society of medicine, 96(3), 118-121.
  • Kimotho, S. G., & Nyaga, R. N. (2016). Digitized Ethnic Hate Speech: Understanding Effects of Digital Media Hate Speech on Citizen Journalism in Kenya. Advances in Language and Literary Studies, 7(3), 189-200.
  • Kopecký, K., & Szotkowski, R. (2017). Cyberbullying, cyber aggression and their impact on the victim–The teacher. Telematics and Informatics, 34(2), 506-517.
  • Krantz, G., & Garcia-Moreno, C. (2005). Violence against women. Journal of Epidemiology & Community Health, 59(10), 818-821.
  • Loeber, R., Capaldi, D. M., & Costello, E. (2013). Gender and the development of aggression, disruptive behavior, and delinquency from childhood to early adulthood. In Disruptive behavior disorders (pp. 137-160). Springer, New York, NY.
  • Lumsden, K., & Harmer, E. (2019). Online othering: Exploring digital violence and discrimination on the web. Springer.
  • MacIntosh, J., Wuest, J., Gray, M. M., & Aldous, S. (2010). Effects of workplace bullying on how women work. Western journal of nursing research, 32(7), 910-931.
  • Martin, N., & Rice, J. (2011). Cybercrime: Understanding and addressing the concerns of stakeholders. Computers & Security, 30(8), 803-814.
  • Martínez-Monteagudo, M. C., Delgado, B., Díaz-Herrero, Á., & García-Fernández, J. M. (2020). Relationship between suicidal thinking, anxiety, depression and stress in university students who are victims of cyberbullying. Psychiatry Research, 286, 112856.
  • Nikolaou, D. (2017). Does cyberbullying impact youth suicidal behaviors?. Journal of health economics, 56, 30-46.
  • Ottosen, R. (2009). The military-industrial complex revisited: Computer games as war propaganda. Television & New Media, 10(1), 122-125.
  • Padgett, D. K. (2016). Qualitative methods in social work research (Vol. 36). Sage publications.
  • Palaiologou, I. (2017). Digital violence and children under five: The Phantom Menace within digital homes of the 21st century?. Education Sciences & Society-Open Access Journal, 8(1), 123-136.
  • Parks, R. C., & Duggan, D. P. (2011). Principles of cyberwarfare. IEEE Security & Privacy, 9(5), 30-35.
  • Payne, M. (2014). Modern social work theory. Oxford University Press.
  • Pedraza-Ramirez, I., Musculus, L., Raab, M., & Laborde, S. (2020). Setting the scientific stage for esports psychology: A systematic review. International Review of Sport and Exercise Psychology, 1-34.
  • Peled, E., & Leichtentritt, R. (2002). The ethics of qualitative social work research. Qualitative social work, 1(2), 145-169.
  • Peppard, J., & Ward, J. (2016). The strategic management of information systems: Building a digital strategy. John Wiley & Sons.
  • Powell, A., & Henry, N. (2017). Sexual violence in a digital age. Springer. Pryor, J. B., LaVite, C. M., & Stoller, L. M. (1993). A social psychological analysis of sexual harassment: The person/situation interaction. Journal of vocational behavior, 42(1), 68-83.
  • Resnik, J. (2000). The programmatic judiciary: Lobbying, judging, and invalidating the Violence Against Women Act. S. Cal. L. Rev., 74, 269.
  • Roberts, T., & Marchais, G. (2018). Assessing the role of social media and digital technology in violence reporting. Contemporary Readings in Law and Social Justice, 10(2), 9-42.
  • Rodriguez, N. M. (1988). Transcending bureaucracy: Feminist politics at a shelter for battered women. Gender & Society, 2(2), 214-227.
  • Suzor, N., Dragiewicz, M., Harris, B., Gillett, R., Burgess, J., & Van Geelen, T. (2019). Human Rights by Design: The Responsibilities of Social Media Platforms to Address Gender‐Based Violence Online. Policy & Internet, 11(1), 84-103.
  • Swim, J. K., & Cohen, L. L. (1997). Overt, covert, and subtle sexism: A comparison between the attitudes toward women and modern sexism scales. Psychology of women quarterly, 21(1), 103-118.
  • Tjaden, P. G., & Thoennes, N. (1998). Stalking in America: Findings from the national violence against women survey. US Department of Justice, Office of Justice Programs, National Institute of Justice.
  • Truntsevsky, Y. V., Lukiny, I. I., Sumachev, A. V., & Kopytova, A. V. (2018). A smart city is a safe city: the current status of street crime and its victim prevention using a digital application. In MATEC Web of Conferences (Vol. 170, p. 01067). EDP Sciences.
  • Walker, L. E. (1989). Psychology and violence against women. American Psychologist, 44(4), 695–702. https://doi.org/10.1037/0003-066X.44.4.695
  • Walker, C. M., Sockman, B. R., & Koehn, S. (2011). An exploratory study of cyberbullying with undergraduate university students. TechTrends, 55(2), 31-38.
  • Weisberg, E., McGeehan, K., & Fraser, I. S. (2016). Effect of perceptions of menstrual blood loss and menstrual pain on women’s quality of life. The European Journal of Contraception & Reproductive Health Care, 21(6), 431-435.
  • Williams, S. (2015). Digital defense: Black feminists resist violence with hashtag activism. Feminist media studies, 15(2), 341-344.
  • Williams, R. B., & Clippinger, C. A. (2002). Aggression, competition and computer games: computer and human opponents. Computers in human behavior, 18(5), 495-506.
  • Woodlock, D., McKenzie, M., Western, D., & Harris, B. (2020). Technology as a weapon in domestic violence: responding to digital coercive control. Australian social work, 73(3), 368-380.
  • van de Weijer, S. G., Leukfeldt, R., & Bernasco, W. (2019). Determinants of reporting cybercrime: A comparison between identity theft, consumer fraud, and hacking. European Journal of Criminology, 16(4), 486-508.