Explicit Content: An Investigation of Online Sexual Harassment

Explicit Content: An Investigation of Online Sexual Harassment

Kevin N. Shufford
ISBN13: 9781668455944|ISBN10: 1668455943|EISBN13: 9781668455951
DOI: 10.4018/978-1-6684-5594-4.ch038
Cite Chapter Cite Chapter

MLA

Shufford, Kevin N. "Explicit Content: An Investigation of Online Sexual Harassment." Research Anthology on Combating Cyber-Aggression and Online Negativity, edited by Information Resources Management Association, IGI Global, 2022, pp. 695-711. https://doi.org/10.4018/978-1-6684-5594-4.ch038

APA

Shufford, K. N. (2022). Explicit Content: An Investigation of Online Sexual Harassment. In I. Management Association (Ed.), Research Anthology on Combating Cyber-Aggression and Online Negativity (pp. 695-711). IGI Global. https://doi.org/10.4018/978-1-6684-5594-4.ch038

Chicago

Shufford, Kevin N. "Explicit Content: An Investigation of Online Sexual Harassment." In Research Anthology on Combating Cyber-Aggression and Online Negativity, edited by Information Resources Management Association, 695-711. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-6684-5594-4.ch038

Export Reference

Mendeley
Favorite

Abstract

This chapter investigates the transformation of traditional face-to-face sexual harassment (SH) to online sexual harassment (OSH). First, an overview of traditional workplace sexual harassment is discussed. Next, the issues of cyberbullying and cyberstalking are presented as a bridge to online sexual harassment, as the two former types of behavior can be seen in online sexual harassment and have both received considerable attention. Then, current research concerning online sexual harassment will be presented, including a discussion of factors that facilitate OSH, social media as a site of harassment, coping strategies, and effects. This concept is worthy of study because online sexual harassment represents a way for the perpetrator to victimize his or her target without the boundaries and restrictions of time, location, or fear of consequence. This chapter concludes with some practical recommendations for organizational leaders to implement to prevent both on- and offline SH from occurring within their company.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.