Journal of Aggression, Conflict and Peace Research

Publisher:
Emerald Group Publishing Limited
Publication date:
2021-02-01
ISBN:
1759-6599

Latest documents

  • Exposure to violence and psychosocial trauma among Sudanese survivors

    Purpose: This paper aims to investigates the experiences of violence among Sudanese survivors and the associated mental health outcomes, including posttraumatic stress disorder (PTSD) and anxiety disorders. It highlights the variety, frequency and severity of political violence exposure and its impact on psychological trauma. Design/methodology/approach: A cross-sectional quantitative study used data from 324 Sudanese youth exposed to violence. A self-rated 17-item questionnaire assessed violence exposure types and frequency. The General Health Questionnaire and the Davidson Trauma Scale evaluated mental health. Findings: High levels of PTSD and poor general mental health were found in 60% of the youth. Exposure included brutal beatings (47%), physical torture (17%) and sexual violence (2%), with 47% enduring hours of torture. Research limitations/implications: The cross-sectional design limits causal inferences, and self-reported data may introduce biases. Future studies should use longitudinal designs and consider cultural factors to better understand the long-term effects of political violence. Practical implications: The study highlights the need for systematic trauma screening and targeted psychosocial support programs for Sudanese youth, particularly for underrepresented young adult males, to address significant trauma effectively. Originality/value: This research provides novel insights into the mental health impact of political violence on Sudanese youth, offering valuable evidence to inform policies and programs aimed at supporting this vulnerable population.

  • Opportunities for peace and non violence in the Papua New Guinea Highlands

    Purpose: This paper aims to synthesise the literature addressing opportunities for intervention and peacemaking in the Highlands of Papua New Guinea (PNG). It shows that peacebuilding in PNG is actively practised in a variety of different forms and by a range of actors. It relies heavily on local champions and coalitions working together with “bits of the state” in inventive but, ultimately, highly vulnerable ways. It argues that the way forward is to better understand how the multiple resources in and beyond the state can be networked more effectively to engineer peace at many different levels, from the clan to the nation state. Design/methodology/approach: The paper is based on a thorough review of the scholarly and grey literature concerning peacebuilding and conflict resolution in PNG over the past 30 years. Findings: The key insight is that peacemaking and non-violence interventions in PNG need to be understood as requiring three different categories of treatment: quick, short interventions; ongoing, slow peacebuilding; and development of community wellness to preventatively stave off violence through increased community cohesion. Originality/value: The paper is the basis of original research.

  • The state of contemporary intergroup conflict in the Papua New Guinea Highlands

    Purpose: This paper aims to discuss the scholarship over the past 30 years on what used to be called Melanesian warfare or “tribal fighting” and is termed in this paper “intergroup conflict” in the Highlands of Papua New Guinea. The paper categorises the drivers of intergroup conflict that make up the landscape for conflict in the Highlands. It starts with cultural factors and the understandings about conflict that have long been used to explain such violence, then adds newer factors. It argues that while the individual existence of each driver is important, far more important is the way in which they interact with each other in reinforcing feedback loops that propel the actors involved towards violence. Design/methodology/approach: The paper is based on a thorough review of the scholarly and grey literature on the topic, drawing from the fields of anthropology, criminology, political science, law, justice and peacebuilding. Findings: The overall finding of the paper is that the nature of intergroup conflict, its scale and dynamics, has changed considerably over the past 30 years, most prominently in the entanglement of the state with local-level conflicts. This has significantly affected the nature of intergroup conflict today, deepening the attractors towards violence and conflict, while weakening the ability of existing state and non-state systems to prevent it. The picture that emerges is one in which the interconnectivity of factors promoting violence has intensified, the rate of change is accelerating and levels of violence are amplified. Originality/value: This paper is an original work.

  • Editorial: Cyberviolence: a plague of victimization and exploitation online
  • The present and future of child sexual abuse on the metaverse: recommendations for an innovative approach to law enforcement responses

    Purpose: The purpose of this study is twofold: (1) to diagnose and analyze the current state of child sexual violence in the Metaverse through thematic analysis, identifying patterns and empirically diagnosing issues and (2) to enhance cybercrime investigation capabilities and public safety training in Metaverse investigations in the future. Design/methodology/approach: By using thematic analysis, the study examines online child sexual violence victimization cases in the Metaverse, collecting data through keyword searches in newspapers and court records. Research limitations/implications: This study provides detailed policy recommendations for building trust between the government and citizens involved in the digital age. Originality/value: The research endeavors harbor a dual focus: first, to meticulously dissect and comprehend the prevalent landscape of child sexual violence within the intricate realms of the Metaverse. Through rigorous thematic analysis, the authors endeavor to unearth underlying patterns, diagnose empirical realities and illuminate the pressing issues at hand. Second, the authors aspire to fortify the arsenal of cybercrime investigation techniques, bolstering the capacity for future Metaverse inquiries. Using thematic analysis, the study meticulously scrutinizes a dozen cases of online child sexual violence, meticulously gathering data from diverse sources such as newspapers and court records. The implications of the research extend far beyond academia, offering concrete policy recommendations to safeguard vulnerable denizens of the Metaverse.

  • Threats and forced displacement in Colombia: an analysis based on municipal data

    Purpose: This paper aims to examine the role of threats in the forced displacement of populations from their municipalities of origin in Colombia that is among the nations with the highest number of internally displaced people in the world with 6.7 million victims. Design/methodology/approach: The data cover the period 2011–2017 and were obtained from the Unit for Attention and Integral Reparation to Victims. Using general panel data models and a difference-in-differences identification strategy, this paper finds that threats within the context of the armed conflict show a positive and significant contribution to forced displacement in municipalities. Findings: Direct intimidations by illegal armed groups to the population seem to have an influence on the decision of the threatened person to leave the territory in general, although it is not a proportional reaction due to the fact that some victims of intimidations decide not to move to keep their assets and maintain territorial ties. Research limitations/implications: The study highlights that the implementation of the Peace Agreements signed in 2016 and the negotiation with illegal armed groups is an effort that the Colombian State must strengthen to prevent the occurrence of threats. Originality/value: This paper’s contribution to the literature is twofold: the paper reveals that rising threats encourage forced displacement in Colombia, by embracing a municipality panel data perspective and a difference-in-differences design that were not applied in previous studies; and the results offer suggestive evidence of the importance of decreasing threats for positive peace outcomes, especially in the most affected territories.

  • Legal mechanism for securing humanitarian assistance by Ukrainian defense forces during the initial phase of the full-scale Russian invasion

    Purpose: This paper aims to provide a comprehensive analysis of the legal status and mechanisms involved in the receipt and registration of humanitarian aid by Ukrainian defense forces. The study aims to highlight the importance of proper control and accountability by military unit commanders, addressing the challenges and responsibilities associated with the management of humanitarian aid during the initial phase of the full-scale Russian invasion. Design/methodology/approach: This study uses a qualitative approach, analyzing legal documents, organizational procedures and case studies related to the receipt and registration of humanitarian aid by Ukrainian defense forces. The research involves examining the actions of military unit commanders, identifying gaps in existing legislation and proposing improvements based on observed challenges and best practices. Findings: The study finds that the legal status and proper accounting of military property received as humanitarian aid are critical for ensuring its effective use. It identifies significant challenges in the organizational and legal mechanisms, including issues of non-receipt and non-registration of aid. The findings emphasize the need for improved legislation, better control measures and increased accountability of military unit commanders to enhance the efficiency and transparency of humanitarian aid management during conflict situations. Research limitations/implications: The research is primarily limited by the availability and reliability of data due to the ongoing conflict, which may affect the comprehensiveness of the analysis. Additionally, the dynamic nature of the legal and organizational environment during wartime poses challenges in maintaining updated information. Future studies could benefit from longitudinal data and comparative analysis with other conflict zones to enhance the robustness and applicability of findings. Practical implications: This study provides actionable recommendations for improving the legal framework and organizational processes related to humanitarian aid in military contexts. It offers guidance for military unit commanders on best practices for receiving, accounting and preserving aid. The findings aim to inform policymakers and military officials to ensure more effective and transparent management of humanitarian resources, ultimately enhancing the operational capabilities of the Ukrainian Armed Forces. Social implications: By addressing the legal and organizational challenges in managing humanitarian aid, this research contributes to the overall welfare of military personnel and affected civilians. Ensuring the effective use of humanitarian aid can improve the living conditions and morale of soldiers and support communities impacted by the conflict. The study also highlights the importance of accountability and transparency, fostering trust among international donors and encouraging continued support for humanitarian efforts in Ukraine. Originality/value: This study provides a novel and comprehensive examination of the legal mechanisms and organizational practices involved in the receipt and registration of humanitarian aid by the Ukrainian defense forces during the initial phase of the Russian invasion. By focusing on the unique challenges faced in this conflict, the research offers original insights into the legal status of military property received as aid and the accountability of military commanders. The findings contribute valuable recommendations for policy and practice, aiming to enhance the effectiveness and transparency of humanitarian aid management in conflict situations.

  • Influence of cyber violence and online victimization on cognitive development of female students from Pakistani higher education institutions

    Purpose: Cyber violence is a global emerging issue which is growing with technology or online spaces, having a great influence on individual’s development. The purpose of this study is to identify the dominant factors of cyber violence and its influence on the cognitive development of female undergraduate students. Design/methodology/approach: In this quantitative study, a questionnaire is used as a data collection tool. Moreover, this research is conducted on female undergraduate students (n = 300). Whereas, the purposive sampling technique is used and Statistical Package for Social Science (SPSS 27.0) software is used to analyze the data. Findings: The findings of this study show that cyber bullying is the dominant factor of cyber violence, whereas cyber doxxing has high influence on cognitive development of female undergraduate students. In addition, the value of correlational coefficient is 0.683, which indicates a strong positive correlation. Therefore, it supports that the null hypothesis is rejected and alternative hypothesis is accepted. Practical implications: The findings of this study are of great importance for policymakers to update the regulations for cyber violence and provide the protection laws for victims whereas it is helpful for the investigation agencies and cybercrime units to be more active and needs to take immediate actions on reported incidents to minimize its further spread and support victims of it. Also, it helps society to understand the influence of it on cognitive health, which helps them to create a safer environment. Similarly, parents and teachers need to make a safe and comfortable environment around children and keep an eye on them. Further, it is beneficial for companies or online platforms to keep their sites or apps more secure for the users. Moreover, future research studies could expand the topic by involving different genders and age group peoples by using different methodologies to explore in depth. Originality/value: This study is unique as there are limited studies, which identify the factor of cyber violence and its influence on cognitive development. Also, fewer studies can be seen in the context of Pakistan.

  • Echoes of dysfunction: a thematic exploration of toxic leadership in higher education

    Purpose: Numerous studies have examined effective or positive leadership styles and their effects on employees and organizational outcomes. In recent years, toxic leadership has drawn the attention of several organizations, and toxic managers undoubtedly harm an organization’s social, economic and individual quality of life. This study aims to examine academicians’ perceptions of toxic leadership behavior exhibited by their immediate leaders in the higher education sector. Design/methodology/approach: A qualitative interpretive phenomenological research design was used, and data was analyzed using Clarke & Braun’s thematic analysis method. Data were collected through individual semi-structured interviews with 26 teachers from the technical education sector within higher education who had five years or more of experience in the higher education sector. Findings: Five themes emerged from the teacher's narratives based on the research questions that were framed with the help of expert opinions and a thorough literature review (“frequency of occurrences,” “outward behavior,” “repercussions,” “coping strategies” and “support mechanisms”). Using the NVIVO 14.0 software, auto-coded themes were generated and corroborated with the findings. The triangulation of outcomes reveals toxic behaviors exhibited by the leaders in universities and colleges, which conforms with the toxic leadership literature. Originality/value: This study advances the understanding of the harmful or toxic side of leadership, specifically in the higher education sector. This work advances earlier studies in the field by examining teachers’ perceptions of toxic leadership behavior exhibited by their leaders in the higher education sector. The study continues by highlighting areas of toxic leadership research that are yet to be explored in academic literature and are still to be studied.

  • Block? Delete? All of the above? The self-protective behaviors of young adult cyberstalking victims

    Purpose: The purpose of this paper is to understand the self-protective behaviors of young adult cyberstalking victims and the factors that impact adoption of such behaviors. Design/methodology/approach: This study used a sample of 880 young adults (18–25 years of age) who had experienced cyberstalking victimization within the previous 12 months. Data were collected through an online self-report survey hosted on Qualtrics from Amazon’s Mechanical Turk workers. Findings: Results revealed that three-quarters of cyberstalking victims engaged in at least one form of self-protective behavior. The most commonly adopted self-protective behavior was blocking unwanted communications only (29%), while 40% of cyberstalking victims noted engaging in multiple forms of self-protective behaviors. While results varied across models, findings revealed that incident characteristics and respondent characteristics impacted the likelihood of engaging in self-protective behaviors after a cyberstalking victimization experience. Originality/value: This study contributes to the literature examining the self-protective behaviors adopted by cyberstalking victims, which can shed light on other forms of cyber abuse and help explain victims’ low reporting rates to official sources (e.g. law enforcement).

Featured documents