Internet and communications as elements for CIDT and Torture. Initial reflections in an unexplored field
DOI:
https://doi.org/10.7146/torture.v30i1.120593Keywords:
ICIT, Internet and TortureAbstract
The internet was once seen as a new and definitive window to freedom and a world without torture. There is however, another less obvious but perhaps more notorious side: torturous environments can also be created through the internet; a place where individu- als may be targeted for discrimination, coer- cion or control.There is a dearth of academic research and theoretical developments in this very new area of knowledge and this Edito- rial will review and reflect on various aspects, thereby suggesting possible lines of research.
References
Amnesty International. (2018). #ToxicTwitter:Violence
and abuse against women online. https://www.amnestyusa.org/wp-content/uploads/2018/03/Toxic-Twitter.pdf
Anderson, C., & Carnegey, N. (2004). Violent evil and the General Agression Model. In A. G. Miller (Ed.), The social psychology of good and evil. Guilford. New York.
Aronson, J. D., Cole, M., Hauptmann, A., Miller, D., & Samuels, B. (2018). Reconstructing human rights violations using large eyewitness video collections:The case of euromaidan protester deaths. Journal of Human Rights Practice, 10(1), 159–178. https://doi.org/10.1093/jhuman/huy005
Barrera, L., & Rodríguez, C. (2017). La violencia en línea contra las mujeres en México. Informe para la Relatora sobre laViolencia contra las Mujeres MS. Dubravka Simonovic. Internet Es Nuestra. www.internetesnuestra.mx
Basak, R., Sural, S., Ganguly, N., & Ghosh, S. K. (2019). Online Public Shaming on Twitter: Detection, Analysis, and Mitigation. IEEE Transactions on Computational Social Systems, 6(2), 208–220. https://doi.org/10.1109/TCSS.2019.2895734
Bunce, M. (2019). Humanitarian Communication in a Post-Truth World. Journal of Humanitarian Affairs, 1(1), 49–55. https://doi.org/10.7227/jha.007
Carmichael, F., & Pinnell, O. (2019). How fake news from Sudan’s regime backfired. BBC News, pp. 1–10.
Cole, J. (2014). The New Arabs: How the Millennial Generation is Changing the Middle East. Simon & Schuster.
Debord, G. (1995). The Society of the Spectacle. Society, p. 154. https://library.brown.edu/pdfs/1124975246668078.pdf
Dhrodia, A. (2018). Unsocial media: A toxic place for women. IPPR Progressive Review, 24(4), 380–387. https://doi.org/10.1111/newe.12078
Douglas, H., Harris, B. A., & Dragiewicz, M. (2019). Technology-facilitated domestic and family violence:Women’s experiences. British Journal of Criminology, 59(3), 551–570. https://doi.org/10.1093/bjc/azy068
ECHRT. (2019). Mass surveillance (Vol. 8). https:// www.echr.coe.int/Documents/FS_Mass_ surveillance_ENG.pdf
Freedom House. (2017). Manipulating Social Media to Undermine Democracy. https://doi.org/10.1080/00224545.1975.9923293
Gleeson, H. (2014). The prevalence and impact of bullying linked to social media on the mental heath and suicidal behaviour among young people. Dublin. https://assets.gov.ie/25088/59fb1e4948fc43028f931a6c1e0c8790.pdf
Gonzales, A. L., & Hancock, J. T. (2011). Mirror, mirror on my Facebook wall: Effects of exposure to Facebook on self-esteem. Cyberpsychology, Behavior, and Social Networking, 14(1–2), 79–83. https://doi.org/10.1089/cyber.2009.0411
Gray, G. (2019). Disappearing refugees inside the United States. Torture Journal, 29(1), 144–146. https://doi.org/10.7146/torture.v29i1.113206
Harris, B. A., & Woodlock, D. (2019). Digital coercive control: Insights from two landmark domestic violence studies. British Journal of Criminology, 59(3), 530–550. https://doi.org/10.1093/bjc/azy052
Harsin, J., & Harsin, J. (2018). Post-Truth and Critical Communication Studies. In Oxford Research Encyclopedia of Communication. https://doi.org/10.1093/acrefore/9780190228613.013.757
Hodalska, M. (2019). Cyberbullying, Fear and Silence: From Bystanders to Cyber- Samaritans. Perils of the Web: Cyber Security and Internet Safety, (May). https://doi.org/10.1163/9781848885011_004
Hopper, E., & Hidalgo, J. (2006). Invisible_Chains: Psychological coercion of human trafficking victims. Intercultural Human Rights Law Review, 1, 185/209.
HRC. (2018). Report of the Special Rapporteur on violence against women, its causes and consequences on online violence against women and girls from a human rights perspective - A/HRC/38/47.
HRW. (2017). Online and on All Fronts. Russia’s assault on freedom of expression. Human Rights Watch. https://www.hrw.org/sites/default/files/report_pdf/ russiafoe0717_web_2.pdf
IGF. (2015). Best Practice Forum (BPF) on Online Abuse and Gender-Based Violence Against Women. Internet Governance Forum.
John, A., Glendenning, A. C., Marchant, A., Montgomery, P., Stewart, A., Wood, S.,... Hawton, K. (2018). Self-harm, suicidal behaviours, and cyberbullying in children and young people: Systematic review. Journal of Medical Internet Research, 20(4). https://doi.org/10.2196/jmir.9044
Koenig, K. A. (2013). The “Worst”. A Closer Look at Cruel, Inhuman and Degrading Treatment. University of California, Berkeley - School of Law; University of San Francisco. Doctoral Dissertation.
Lageson, S. E., & Maruna, S. (2018). Digital degradation: Stigma management in the internet age. Punishment and Society, 20(1), 113–133. https://doi.org/10.1177/1462474517737050
Lazer, D. M. J., Baum, M. A., Benkler,Y., Berinsky, A. J., Greenhill, K. M., Menczer, F., ... Zittrain, J. L. (2018). The science of fake news. Science, 359(6380), 1094–1096. https://doi.org/10.1126/science.aao2998
Leary, M. R., & Tangney, J. P. (2012). Handbook of Self and Identity. Guilford Press.
Luban, D. (2009). Human Dignity, Humiliation, and Torture. Kennedy Institute of Ethics Journal, 19, 211–230. https://doi.org/10.1353/ken.0.0292
Maier, A. (2011). Torture. How Denying Moral Standing Violates Human Dignity. In E. Kaufmann, P., Kuch, H., Neuhäuser, C., & Webster (Ed.), Humiliation, Degradation, Dehumanization (pp. 101–118). Springer Netherlands.
Manago, A. (2014). Identity Development in the Digital Age:The Case of Social Networking Sites. Oxford Handbooks On-line.
Mijatovic, D. (2018). New Challenges to Freedom of Expression: Countering Online Abuse of Female Journalists. https://www.osce.org/files/f/documents/c/3/220411.pdf
NDI. (2019). Tweets That Chill : Analyzing Online Violence AgainstWomen in Politics. www.ndi.org/ tweets-that-chill
Ortega, R., Elipe, P., Mora-Merchán, J. A., Genta, M. L., Brighi, A., Guarini, A., ... Tippett, N. (2012). The Emotional Impact of Bullying and Cyberbullying on Victims: A European Cross- National Study. Aggressive Behavior, 38(5), 342– 356. https://doi.org/10.1002/ab.21440
Parry, J. T. (2003). What Is Torture, Are We Doing It, and What if We Are. Pitt. Law Review, 64, 237–249.
Perez de Acha, G. (2016). Hacking team malware para la vigilancia en América Latina. Santiago de Chile.
Phillips, E. M. (2011). Pain, Suffering, and Humiliation: The Systemization of Violence in Kidnapping for Ransom. Journal of Aggression, Maltreatment & Trauma, 20(8), 845–869. https://doi.org/10.1080/10926771.2011.626512
Pirlot de Corbion, A., Hosein, G., Nyst, C., Fisher, T., Gerathy, E., Callander, A., & Bouffet, T. (2018). The Humanitarian Metadata Problem: ‘Doing No Harm’ in the Digital Era. (October), 130. Privacy International. https://privacyinternational.org/sites/default/files/2018-12/TheHumanitarianMetadataProblem-DoingNoHarmintheDigitalEra.pdf
Pollmann, A. (2011). Humiliation, Degradation, Dehumanization (P. Kaufmann, H. Kuch, C. Neuhaeuser, & E. Webster, Eds.). https://doi.org/10.1007/978-90-481-9661-6
Privacy International. (2018). Secret Global Surveillance Networks: Intelligence Sharing Between Governments and the Need for Safeguards. (April), 173. https://privacyinternational.org/sites/default/files/201804/Secret%20Global%20 Surveillance%20Networks%20report%20web%20%28200%29.pdf
R3D. (2017). Gobierno espía.Vigilancia sistemática a periodistas y defensores de derechos humanos en Mexico. Mexico. https://r3d.mx/2017/06/19/gobierno-espia/
Richards, J. (2019). Intelligence gathering, issues of accountability, and Snowden. In Terrorism and State Surveillance of Communications. (pp. 19–37). Routledge.
Ruhrmann, H. (2019). Facing the future. Protecting Human Rights in Policy Strategies for Facial Recognition Technology in Law Enforcement.
Rukundo, S. (2018). My President is a Pair of Buttocks’: The limits of online freedom of expression in Uganda. International Journal of Law and Information Technology, 26(3), 252–271. https://doi.org/10.1093/ijlit/eay009
Scarry, E. (1985). The body in Pain. Oxford University Press.
Serra, L. (2018). On-line gender based violence. Pikara - Online Magazine., 2(December), 227– 249. Pikara Magazine. http://lab.pikaramagazine.com/wp-content/uploads/2019/06/VIOLENCIAS_EN.pdf
Sussman, D. (2006). Defining Torture. Case Western Reserve Journal of International Law, 37, 225.
T-CY. (2018). Mapping study on cyberviolence. Council of Europe. www.coe.int/cybercrime
Tufekci, Z. (2014). Social Movements and Governments in the Digital Age: Evaluating a Complex Landscape. Journal of International Affairs, 68(1), 1–18. http://blogs.cuit.columbia.edu/jia/files/2014/12/xvii-18_Tufekci_Article.pdf
Van der Wilk, A. (2018). Cyber violence and hate speech online against women (PE 604.979). https:// www.europarl.europa.eu/RegData/etudes/STUD/2018/604979/IPOL_STU(2018)604979_ EN.pdf
Wilkinson, C. (2014). Putting “Traditional Values” Into Practice: The Rise and Contestation of Anti- Homopropaganda Laws in Russia. Journal of Human Rights, 13(3), 363–379. https://doi.org/10.1080/14754835.2014.919218
Zhao, S. (2005). The Digital Self: Through the Looking Glass of Telecopresent Others. Symbolic Interaction, 28(3), 387–405. https://doi.org/10.1525/si.2005.28.3.387
Downloads
Published
How to Cite
Issue
Section
License
We accept that some authors (e.g. government employees in some countries) are unable to transfer copyright. The Creative Commons Licence Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) covers both the Torture Journal and the IRCT web site. The publisher will not put any limitation on the personal freedom of the author to use material contained in the paper in other works which may be published, provided that acknowledgement is made to the original place of publication.