Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home2/pollicyo/public_html/archive/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home2/pollicyo/public_html/archive/wp-includes/functions.php:6114) in /home2/pollicyo/public_html/archive/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home2/pollicyo/public_html/archive/wp-includes/functions.php:6114) in /home2/pollicyo/public_html/archive/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home2/pollicyo/public_html/archive/wp-includes/functions.php:6114) in /home2/pollicyo/public_html/archive/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home2/pollicyo/public_html/archive/wp-includes/functions.php:6114) in /home2/pollicyo/public_html/archive/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home2/pollicyo/public_html/archive/wp-includes/functions.php:6114) in /home2/pollicyo/public_html/archive/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home2/pollicyo/public_html/archive/wp-includes/functions.php:6114) in /home2/pollicyo/public_html/archive/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home2/pollicyo/public_html/archive/wp-includes/functions.php:6114) in /home2/pollicyo/public_html/archive/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home2/pollicyo/public_html/archive/wp-includes/functions.php:6114) in /home2/pollicyo/public_html/archive/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":970,"date":"2019-09-02T08:33:06","date_gmt":"2019-09-02T08:33:06","guid":{"rendered":"https:\/\/archive.pollicy.org\/?p=970"},"modified":"2024-07-22T00:35:36","modified_gmt":"2024-07-22T00:35:36","slug":"feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation","status":"publish","type":"post","link":"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/","title":{"rendered":"Feminist Internet Research on Cyber Harassment: Re-victimization or Recuperation?"},"content":{"rendered":"
\n
\n
\n

Last month, we (Pollicy<\/a>\u00a0and Berhan Taye) introduced our project on examining online or technology-facilitated gender-based violence in the African context through our blog titled, \u201cA Survival Guide to Being a Woman (on the Internet): Feminist Research for a Feminist Internet<\/a>\u201d. In this blog, we will use I interchangeably for both Neema and Berhan.<\/p>\n

\n
\n
\n
\n
\n
<\/div>\n

\"\"<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/figure>\n

As part of this research within the\u00a0Feminist Internet Research Network<\/em><\/strong>*, we started thinking about the differences between physical and online violence, and the way we collect information and stories from victims\/survivors in the process of creating knowledge.<\/p>\n

One of the foremost ethical concerns for researchers and ethics committees is to ensure the\u00a0benefit derived from research outweighs any potential harm to participants.\u00a0<\/em><\/strong>How do we weigh this harm and benefit? How do we ensure that harm is eliminated to the greatest degree possible? This can present a particular challenge in research where participants have experienced abuse or violence, as these participants are already in a vulnerable position. Online violence research is one such example. Online violence is acts committed, abetted, or aggravated, in part or fully by the use of information and communication technology (ICT).<\/p>\n

Research on sensitive<\/strong>\u00a0topics such as abuse and violence (including online violence) is necessary to generate an\u00a0understanding of risk factors and potential interventions to address these concerns,\u00a0<\/em><\/strong>and it can lead to action and support for survivors, as well as interventions that can prevent future abuse and violence. In most cases, it brings benefits (such as a sense of community, someone to listen to you, and even relief) as well as harms (including becoming upset or distressed and worst of all, re-traumatization). So, in every research study, ethical considerations must be made about the risk\u2013benefit ratio of the project. Emphasizing primarily the risks further contribute to a lack of knowledge on a sensitive issue but an under-recognition of potential harm may disregard the impact, especially emotional, of this type of research on participants.<\/p>\n

What exactly constitutes sensitive research is up for debate. A number of people may disregard the emotions of those distressed by online harassment as mere words or an online\/disconnected experience. Sensitive research most often refers to research about emotionally difficult topics that require participants to face issues that are deeply personal and possibly distressing. Sensitive research can also involve topics that may be taboo within a certain cultural context, too intrusive of one\u2019s private life, stigmatizing, illegal, and\/or potentially dangerous, or research that puts participants in a situation that they may find distressing to participate in. Unless we remember to conduct our research in a sensitive manner, there maybe this kind of re-victimization,\u00a0<\/em><\/strong>where we ask questions to participants with the aim of digging up these traumatizing memories, for whatever end purpose we have in mind: knowledge building, documentation, advocacy, law-making, etc.<\/p>\n

A few studies have looked into whether asking questions to those who have experienced abuse and victimization forces them to relive the trauma. This question is further complicated when deciding whether to ask the same questions to youth or adolescents as opposed to adults. This is something we grappled with within our research design. Online bullying can start at a very young age, but we need to take special care when talking to adolescents, and for this research, we opted to only include adults. Are we missing out on important information on how to protect children and adolescents? Yes, we just didn\u2019t have the resources to take this special care at this stage, and for us, it was more important to minimize harm.<\/p>\n

As human subject protections strengthen over time, concern about potential harm in research on emotionally distressing topics has become increasingly important, especially in the context of no benefit for participants. These concerns include psychological risk, anxiety, trust issues, shame, fear, frustration, inconvenience, but more so a feeling of a lack of support. If you interview someone about the online harassment they face, are you also expected to offer solutions?<\/p>\n

On the flip side, what about the benefits?<\/h2>\n

Some of the participants we spoke to in our in-depth interviews said that they felt that being able to answer our questions was therapeutic or cathartic. To have someone to talk to about their experience. What benefits can such research present to participants where we previously thought there was none? The opportunity to discuss their experience, to learn about resources, new insight, feelings of well-being, improvements in health, and the potential to help others.<\/p>\n

While it is expected for some participants to report unexpected distress, some research has actually shown that more numbers report gains from participation, recognizing that while it is difficult, it is also helpful.<\/p>\n

\n

Trauma survivors \u201care not too fragile to participate in trauma research even in the acute aftermath of a traumatic experience\u201d<\/p>\n

– Participation in Trauma Research: Is There Evidence of Harm?
\nMichael G. Griffin, Patricia A. Resick, Angela E. Waldrop, Mindy B. Mechanic<\/p>\n<\/blockquote>\n

Research that is emotionally charged or sensitive can open up new spaces for new questions, new ideas, and new interpretations of both. It can challenge previously held concepts of subjectivity, objectivity, and experience and open doors for new new knowledge to be developed and explored.<\/p>\n

But what about survivor porn?<\/h1>\n

Word to the wise, do not Google \u201csurvivor porn\u201d.<\/em><\/p>\n

I came across this interesting blog and podcast titled \u201cThe Ethics of Nonprofit Storytelling: Survivor Porn and Parading Trauma\u201d interviewing Sophie Otiende who works at HAART in Kenya.<\/p>\n

\n

\u201cThink about the power that organization holds over this victim, and then think about consent. Think about whether that victim \u2014 that survivor \u2014 would actually be able to give proper consent about telling their story.\u201d<\/p>\n<\/blockquote>\n

The interview examines the ethics of non-profit storytelling and how survivors of trauma are often asked by non-profits to provide an \u201cemotional hook\u201d.<\/p>\n

Take for example this email we received a few days before I wrote this blog. We set up a hotline and a chat bot,\u00a0Wetaase<\/a>, to streamline referrals for people looking for information, victims, and survivors in Uganda as part of our civic technology initiatives. We receive many such emails and requests.<\/p>\n

\n
\n
\n
\n
<\/div>\n

\"\"<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/figure>\n

Where do we draw the line between building knowledge versus parading trauma for our causes?<\/em><\/strong><\/p>\n

And What about Us?<\/h1>\n

Last week, after a meeting in my office, a colleague and I walked out to get a drink of water. Our Research Manager had her head in her hands, looking down at her laptop. We asked her what was wrong, and she said that she was reading the focus group transcript. And how disturbing it was.<\/p>\n

Throughout this process, we had been thinking about our participants. But what does it mean for us, the researchers? For our data collectors? Vicarious trauma can be a very real problem for researchers who work on topics such as sexual violence. Vicarious Trauma<\/em><\/strong>\u00a0can be defined as the transformation of the researcher\u2019s inner experience due to empathetic and\/or repeated engagement with survivors of violence and their trauma. The multitudes of stories of pain from our participants can have lasting emotional impacts.<\/p>\n

\n

A key factor in the ability to care for others is the ability to care for oneself.
\n-H. Helm, A. Williams, and J. Carden<\/p>\n<\/blockquote>\n

In our research, we hear comments such as \u201cIf you don\u2019t like it, you can just leave social media\u201d, \u201cIt\u2019s just words\u201d, \u201cIt\u2019s harmless, get over it\u201d. But listening to the stories, it\u2019s much bigger than this. People have\u00a0taken their lives<\/a>\u00a0over cyberbullying and harassment. There is real pain and hurt, as our physical and digital merge into one. How do we feel empathy in its full form, while still protecting our own mental health? What are our coping strategies? It\u2019s not enough for us to just say #selfcare, what does it really, really mean? And what can we do for future researchers, for content moderators, law enforcement agents who will increasingly have to deal with cases of online gender-based violence?<\/p>\n

Final Thoughts<\/h2>\n

Our aim when we joined the Feminist Internet Research Network was to understand how women living in Kenya, Senegal, and South Africa experience the internet. We specifically wanted to document online gender-based violence and if possible, to help improve women\u2019s experiences online. From the get-go, we were conscious of the challenges this research poses to us as women researchers who have previously been harassed online and to the 3000+ women participants.<\/p>\n

We had to be intentional by acknowledging our ambitions and privileges, revising, and reworking our approach countless times. Even now, after we have concluded research in one country and as we get ready to do the same in the other two countries, we have to re-examine our approach and strive to do better to minimize the risk and increase the benefit to our research participants.<\/p>\n

To be honest, as we talk to more women and hear more stories about how unforgiving the internet can be to women, we sometimes have to admit that we may have taken on more than we can actually carry. These women have trusted us with some of the most emotionally charged moments in their lives and while every story has affected this research for the better, we fear that our research and results might not affect the positive change and solution to every person that shared their story with us.<\/p>\n

Going in to do this research, we were definitely apprehensive about how our interviews might be interpreted but through talking to our participants, we have learned immensely and learned how important it is to give space to people to talk about their experiences, positive and negative.<\/p>\n

At the beginning of this blog, we commented that it is worth doing research on sensitive topics if the risk out-weights the benefit. Every story we hear forces us to ask this simple question \u2014 how can we actually make sure that the findings of this research benefit each and everyone that shared their story with us and improve the experience of women online?<\/p>\n<\/div>\n<\/div>\n<\/section>\n

\n
\n
\n

Sources<\/strong><\/h2>\n

1. Jodie Valpied, A. C. (2014).\u00a0Sometimes cathartic. Sometimes quite raw\u201d: Benefit and harm in an intimate partner.<\/em>\u00a0Retrieved from\u00a0http:\/\/dro.deakin.edu.au\/eserv\/DU:30069266\/taket-sometimescathartic-post-2014.pdf<\/a>
\n2. Association for Progressive Communications (APC) (2 March 2015). From Impunity to Justice: Domestic legal remedies for cases of technology-related violence against women. Available online:\u00a0
http:\/\/www.genderit.org\/sites\/default\/upload\/flow_domestic_legal_remedies.pdf<\/a>
\n3. Tracy McClinton Appollis, C. L. (2015).\u00a0Adolescents\u2019 and Adults\u2019 Experiences of Being Surveyed About Violence and Abuse: A Systematic Review of Harms, Benefits, and Regrets.<\/em>\u00a0Am J Public Health. Retrieved from\u00a0
https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC4318302\/<\/a>
\n4. Peter G. van der Velden, M. W. (2013).\u00a0The Burden of Research on Trauma for Respondents: A Prospective and Comparative Study on Respondents Evaluations and Predictors.<\/em>\u00a0Retrieved from\u00a0
https:\/\/journals.plos.org\/plosone\/articleid=10.1371\/journal.pone.0077266<\/a>
\n5. Angela Melville, D. H. (May 2016). Conducting Sensitive Interviews: A Review of Reflections. doi:10.5553\/REM\/.000015
\n6. Anderson, N. (2014).\u00a0Does Asking Victimized Youth Sensitive Questions Cause Additional Distress and Trauma?<\/em>\u00a0Evans Evaluation. Retrieved from\u00a0
http:\/\/evansevaluation.com\/more\/white-papers\/<\/a>
\n7. Hermeren G. Human and social consequences of research. Progress in Clinical Biological Research. 1983; 128:359\u2013379.\u00a0
https:\/\/www.ncbi.nlm.nih.gov\/pubmed\/6634734<\/a>
\n8. Sieber JE. Planning research: Basic ethical decision-making. In: Sales BD, Folkman S, editors. Ethics in research with human participants. Washington, DC: American Psychological Association; 2000. pp. 13\u201326.
\n9. Newman E, Kaloupek DG, Keane TM, Folstein SF. Ethical issues in trauma research. In: Kantor GK, Jasinski JG, editors. Out of the darkness. London: Sage; 1997. pp. 271\u2013281.
\n10. Newman E, Risch E, Kassam-Adams N. Ethical issues in trauma-related research: A review. Journal of Empirical Research on Human Research Ethics. 2006;1(3):29\u201346.
\n11. Susan M. Labott, T. P. (n.d.).\u00a0Emotional Risks to Respondents in Survey Research: Some Empirical Evidence.
\n<\/em>12.\u00a0<\/em>Griffin, M., Resick, P., Waldrop, A., & Mechanic, M. (2003). Participation in trauma research: Is there evidence of harm? Journal of Traumatic Stress, 16, 221\u2013227.
\n13. Heather R. Hlavka, C. K.-L. (2007). Revictimizing the Victims? Interviewing Women About Interpersonal Violence.\u00a022<\/em>(7). Retrieved from\u00a0
http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.824.6334&rep=rep1&type=pd<\/a>f
\n14. Blakely, K. (2007). Reflections on the Role of Emotion in Feminist Research.\u00a06(2)<\/em>. Retrieved from\u00a0
https:\/\/sites.ualberta.ca\/~iiqm\/backissues\/6_2\/blakely.pdf<\/a>
\n15. Pearlman, Laurie A., & Saakvitne, Karen W. (1995). Trauma and the Therapist: Countertransference and Vicarious Traumatization in Psychotherapy with Incest Survivors. New York: W.W. Norton, xix, pp.451, $40.00.\u201d\u00a0American Journal of Clinical Hypnosis<\/em>, 38(4), pp. 298\u2013299
\n16. H. Helm, A. Williams, and J. Carden, Management of Vicarious Trauma and Compassion Fatigue in Play Therapists, The International Association for Play Therapy, Dallas, Tex, USA, 2008.<\/p>\n

*This work forms part of the APC \u201cFeminist Internet Research Network\u201d
\nthe project, supported by the International Development Research Centre,
\nOttawa, Canada. The views expressed herein do not necessarily represent
\nthose of IDRC or its Board of Governors.<\/em><\/p>\n

Written by Neema Iyer, Berhan Taye and supported by Sandra Nalubega<\/strong><\/p>\n

We also wanted to thank Tigist Hussein and Erika Smith for their time and for adding to our knowledge on this topic.<\/em><\/strong><\/p>\n<\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"

Last month, we (Pollicy\u00a0and Berhan Taye) introduced our project on […]<\/p>\n","protected":false},"author":1,"featured_media":1158,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[48,47,49],"class_list":["post-970","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-cyber-harassment","tag-feminist","tag-research"],"yoast_head":"\nFeminist Internet Research on Cyber Harassment: Re-victimization or Recuperation? - Pollicy<\/title>\n<meta name=\"description\" content=\"Explore feminist internet research on cyber harassment and its effects, focusing on re-victimization and recuperation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Feminist Internet Research on Cyber Harassment: Re-victimization or Recuperation? - Pollicy\" \/>\n<meta property=\"og:description\" content=\"Explore feminist internet research on cyber harassment and its effects, focusing on re-victimization and recuperation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/\" \/>\n<meta property=\"og:site_name\" content=\"Pollicy\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-02T08:33:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-22T00:35:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/archive.pollicy.org\/wp-content\/uploads\/2019\/09\/feminist-research-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2028\" \/>\n\t<meta property=\"og:image:height\" content=\"1914\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"padmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"padmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/\"},\"author\":{\"name\":\"padmin\",\"@id\":\"https:\/\/archive.pollicy.org\/#\/schema\/person\/dbef51f2244b45007b08da79bd216830\"},\"headline\":\"Feminist Internet Research on Cyber Harassment: Re-victimization or Recuperation?\",\"datePublished\":\"2019-09-02T08:33:06+00:00\",\"dateModified\":\"2024-07-22T00:35:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/\"},\"wordCount\":2156,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/archive.pollicy.org\/#organization\"},\"image\":{\"@id\":\"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/archive.pollicy.org\/wp-content\/uploads\/2019\/09\/feminist-research-1.jpeg\",\"keywords\":[\"Cyber Harassment\",\"Feminist\",\"Research\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/\",\"url\":\"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/\",\"name\":\"Feminist Internet Research on Cyber Harassment: Re-victimization or Recuperation? - Pollicy\",\"isPartOf\":{\"@id\":\"https:\/\/archive.pollicy.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/archive.pollicy.org\/wp-content\/uploads\/2019\/09\/feminist-research-1.jpeg\",\"datePublished\":\"2019-09-02T08:33:06+00:00\",\"dateModified\":\"2024-07-22T00:35:36+00:00\",\"description\":\"Explore feminist internet research on cyber harassment and its effects, focusing on re-victimization and recuperation.\",\"breadcrumb\":{\"@id\":\"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/#primaryimage\",\"url\":\"https:\/\/archive.pollicy.org\/wp-content\/uploads\/2019\/09\/feminist-research-1.jpeg\",\"contentUrl\":\"https:\/\/archive.pollicy.org\/wp-content\/uploads\/2019\/09\/feminist-research-1.jpeg\",\"width\":2028,\"height\":1914,\"caption\":\"feminist research\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/archive.pollicy.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Feminist Internet Research on Cyber Harassment: Re-victimization or Recuperation?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/archive.pollicy.org\/#website\",\"url\":\"https:\/\/archive.pollicy.org\/\",\"name\":\"Pollicy Archive\",\"description\":\"Re-designing Government for Citizens\",\"publisher\":{\"@id\":\"https:\/\/archive.pollicy.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/archive.pollicy.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/archive.pollicy.org\/#organization\",\"name\":\"Pollicy\",\"url\":\"https:\/\/archive.pollicy.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/archive.pollicy.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/archive.pollicy.org\/wp-content\/uploads\/2021\/08\/pollicy-high-res-logo-01.png\",\"contentUrl\":\"https:\/\/archive.pollicy.org\/wp-content\/uploads\/2021\/08\/pollicy-high-res-logo-01.png\",\"width\":12629,\"height\":7695,\"caption\":\"Pollicy\"},\"image\":{\"@id\":\"https:\/\/archive.pollicy.org\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/archive.pollicy.org\/#\/schema\/person\/dbef51f2244b45007b08da79bd216830\",\"name\":\"padmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/archive.pollicy.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/24478edf03d7ca6683f3e99e1756592b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/24478edf03d7ca6683f3e99e1756592b?s=96&d=mm&r=g\",\"caption\":\"padmin\"},\"url\":\"https:\/\/archive.pollicy.org\/author\/padmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Feminist Internet Research on Cyber Harassment: Re-victimization or Recuperation? - Pollicy","description":"Explore feminist internet research on cyber harassment and its effects, focusing on re-victimization and recuperation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/","og_locale":"en_US","og_type":"article","og_title":"Feminist Internet Research on Cyber Harassment: Re-victimization or Recuperation? - Pollicy","og_description":"Explore feminist internet research on cyber harassment and its effects, focusing on re-victimization and recuperation.","og_url":"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/","og_site_name":"Pollicy","article_published_time":"2019-09-02T08:33:06+00:00","article_modified_time":"2024-07-22T00:35:36+00:00","og_image":[{"width":2028,"height":1914,"url":"https:\/\/archive.pollicy.org\/wp-content\/uploads\/2019\/09\/feminist-research-1.jpeg","type":"image\/jpeg"}],"author":"padmin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"padmin","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/#article","isPartOf":{"@id":"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/"},"author":{"name":"padmin","@id":"https:\/\/archive.pollicy.org\/#\/schema\/person\/dbef51f2244b45007b08da79bd216830"},"headline":"Feminist Internet Research on Cyber Harassment: Re-victimization or Recuperation?","datePublished":"2019-09-02T08:33:06+00:00","dateModified":"2024-07-22T00:35:36+00:00","mainEntityOfPage":{"@id":"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/"},"wordCount":2156,"commentCount":0,"publisher":{"@id":"https:\/\/archive.pollicy.org\/#organization"},"image":{"@id":"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/#primaryimage"},"thumbnailUrl":"https:\/\/archive.pollicy.org\/wp-content\/uploads\/2019\/09\/feminist-research-1.jpeg","keywords":["Cyber Harassment","Feminist","Research"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/","url":"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/","name":"Feminist Internet Research on Cyber Harassment: Re-victimization or Recuperation? - Pollicy","isPartOf":{"@id":"https:\/\/archive.pollicy.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/#primaryimage"},"image":{"@id":"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/#primaryimage"},"thumbnailUrl":"https:\/\/archive.pollicy.org\/wp-content\/uploads\/2019\/09\/feminist-research-1.jpeg","datePublished":"2019-09-02T08:33:06+00:00","dateModified":"2024-07-22T00:35:36+00:00","description":"Explore feminist internet research on cyber harassment and its effects, focusing on re-victimization and recuperation.","breadcrumb":{"@id":"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/#primaryimage","url":"https:\/\/archive.pollicy.org\/wp-content\/uploads\/2019\/09\/feminist-research-1.jpeg","contentUrl":"https:\/\/archive.pollicy.org\/wp-content\/uploads\/2019\/09\/feminist-research-1.jpeg","width":2028,"height":1914,"caption":"feminist research"},{"@type":"BreadcrumbList","@id":"https:\/\/archive.pollicy.org\/2019\/09\/feminist-internet-research-on-cyber-harassment-re-victimization-or-recuperation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/archive.pollicy.org\/"},{"@type":"ListItem","position":2,"name":"Feminist Internet Research on Cyber Harassment: Re-victimization or Recuperation?"}]},{"@type":"WebSite","@id":"https:\/\/archive.pollicy.org\/#website","url":"https:\/\/archive.pollicy.org\/","name":"Pollicy Archive","description":"Re-designing Government for Citizens","publisher":{"@id":"https:\/\/archive.pollicy.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/archive.pollicy.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/archive.pollicy.org\/#organization","name":"Pollicy","url":"https:\/\/archive.pollicy.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/archive.pollicy.org\/#\/schema\/logo\/image\/","url":"https:\/\/archive.pollicy.org\/wp-content\/uploads\/2021\/08\/pollicy-high-res-logo-01.png","contentUrl":"https:\/\/archive.pollicy.org\/wp-content\/uploads\/2021\/08\/pollicy-high-res-logo-01.png","width":12629,"height":7695,"caption":"Pollicy"},"image":{"@id":"https:\/\/archive.pollicy.org\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/archive.pollicy.org\/#\/schema\/person\/dbef51f2244b45007b08da79bd216830","name":"padmin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/archive.pollicy.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/24478edf03d7ca6683f3e99e1756592b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/24478edf03d7ca6683f3e99e1756592b?s=96&d=mm&r=g","caption":"padmin"},"url":"https:\/\/archive.pollicy.org\/author\/padmin\/"}]}},"_links":{"self":[{"href":"https:\/\/archive.pollicy.org\/wp-json\/wp\/v2\/posts\/970","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.pollicy.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.pollicy.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.pollicy.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.pollicy.org\/wp-json\/wp\/v2\/comments?post=970"}],"version-history":[{"count":4,"href":"https:\/\/archive.pollicy.org\/wp-json\/wp\/v2\/posts\/970\/revisions"}],"predecessor-version":[{"id":1323,"href":"https:\/\/archive.pollicy.org\/wp-json\/wp\/v2\/posts\/970\/revisions\/1323"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/archive.pollicy.org\/wp-json\/wp\/v2\/media\/1158"}],"wp:attachment":[{"href":"https:\/\/archive.pollicy.org\/wp-json\/wp\/v2\/media?parent=970"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.pollicy.org\/wp-json\/wp\/v2\/categories?post=970"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.pollicy.org\/wp-json\/wp\/v2\/tags?post=970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}