Anderson, C. Psychological Science Wiley-Blackwell , 12 5 , Retrieved from Academic Search Complete database. Bertozzi, E. Bonanno, P. Educational Psychology, 25 1 ,
Internet harassment and online threats targeting women: Research review
CSDL | IEEE Computer Society
Researchers have come up with various models and theories to investigate factors that influence the extent to which humans use computers and its applications. Unified Theory of Adoption and Use of Technology UTAUT is the latest model which has been conceived to understand the nature of technology usage and has been applied in various domains like education, banking, health care etc. Gender has been attributed as a significant variable in explaining the technology acceptance behaviour of humans. The objective of this study is to review the existing literature on the technology usage and intention to use technology from the gender perspective. It has been observed from the review that in few contexts, gender plays a significant role in determining the intention of accepting new technology and there are cases where gender differences cannot be discerned. Card, S. Westland and Clark has observed that since s, organizations have invested about 50 percent of new capital in Information Technology .
Gender Differences in Online Gaming: A Literature Review
Skip to Main Content. A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. Use of this web site signifies your agreement to the terms and conditions.
Online harassment and threats are not a new phenomenon, but the degree to which these are directed at women and girls has begun to receive increased attention from news media , academia and law enforcement. Forms of harassment can vary widely, from name-calling and trolling to persistent stalking and shaming to outright sexual and death threats. But it remains the case that the wide-open environment that enables creativity, innovation and vigorous debate online paradoxically also enables derogatory, anonymous speech for which there is often little legal recourse. Because of the volume of data and information they deal with, many Internet and social media companies struggle to articulate and enforce standards, even on more obvious issues such as the online messaging of violent extremists. Most warn that death threats, for example, are not protected by free speech , but banning users in an environment with anonymity is a challenge.