The Spread of Digital Intimate Partner Violence: Ethical Challenges for Business, Workplaces, Employers and Management

Jeff Hearn, Matthew Hall, Ruth Lewis, Charlotta Niemisto

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

In recent decades, huge technological changes have opened up possibilities and potentials for new socio-technological forms of violence, violation and abuse, themselves intersectionally gendered, that form part of and extend offline intimate partner violence (IPV). Digital IPV (DIPV)—the use of digital technologies in and for IPV—takes many forms, including: cyberstalking, internet-based abuse, non-consensual intimate imagery, and reputation abuse. IPV is thus now in part digital, and digital and non-digital violence may merge and reinforce each other. At the same time, technological and other developments have wrought significant changes in the nature of work, such as the blurring of work/life boundaries and routine use of digital technologies. Building on feminist theory and research on violence, and previous research on the ethics of digitalisation, this paper examines the ethical challenges raised for business, workplaces, employers and management by digital IPV. This includes the ethical challenges arising from the complexity and variability of DIPV across work contexts, its harmful impacts on employees, productivity, and security, and the prospects for proactive ethical responses in workplace policy and practice for victim/survivors, perpetrators, colleagues, managers, and stakeholders. The paper concludes with contributions made and key issues for the future research agenda.
Original languageEnglish
Pages (from-to)695-711
Number of pages17
JournalJournal of Business Ethics
Volume187
Issue number4
Early online date19 Jun 2023
DOIs
Publication statusPublished - 1 Nov 2023

Fingerprint

Dive into the research topics of 'The Spread of Digital Intimate Partner Violence: Ethical Challenges for Business, Workplaces, Employers and Management'. Together they form a unique fingerprint.

Cite this