About: Proxy recruitment   Sponge Permalink

An Entity of Type : owl:Thing, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

Abuse by proxy is the use, by abusers and harassers, of third parties to carry out harassment. Sam Vaknin described abuse by proxy as follows: If all else fails, the abuser recruits friends, colleagues, mates, family members, the authorities, institutions, neighbours, the media, teachers – in short, third parties – to do his bidding. He uses them to cajole, coerce, threaten, stalk, offer, retreat, tempt, convince, harass, communicate and otherwise manipulate his target. He controls these unaware instruments exactly as he plans to control his ultimate prey. He employs the same mechanisms and devices. And he dumps his props unceremoniously when the job is done.

AttributesValues
rdfs:label
  • Proxy recruitment
rdfs:comment
  • Abuse by proxy is the use, by abusers and harassers, of third parties to carry out harassment. Sam Vaknin described abuse by proxy as follows: If all else fails, the abuser recruits friends, colleagues, mates, family members, the authorities, institutions, neighbours, the media, teachers – in short, third parties – to do his bidding. He uses them to cajole, coerce, threaten, stalk, offer, retreat, tempt, convince, harass, communicate and otherwise manipulate his target. He controls these unaware instruments exactly as he plans to control his ultimate prey. He employs the same mechanisms and devices. And he dumps his props unceremoniously when the job is done.
dcterms:subject
abstract
  • Abuse by proxy is the use, by abusers and harassers, of third parties to carry out harassment. Sam Vaknin described abuse by proxy as follows: If all else fails, the abuser recruits friends, colleagues, mates, family members, the authorities, institutions, neighbours, the media, teachers – in short, third parties – to do his bidding. He uses them to cajole, coerce, threaten, stalk, offer, retreat, tempt, convince, harass, communicate and otherwise manipulate his target. He controls these unaware instruments exactly as he plans to control his ultimate prey. He employs the same mechanisms and devices. And he dumps his props unceremoniously when the job is done. In a June 2014 blog post, Betsy Haibel detailed the ways in which abusers and harassers use sites like Reddit and 4chan to recruit third parties to engage in abuse by proxy: When people from privileged groups, or who hold positions of power, attack someone with less privilege or power, harassment happens. (While many attackers here are white straight cis men, that’s not a requirement - for example, white women have a long history of attacking women of color in this manner.) In these cases, the emotional violence of the initial attack is compounded by the inevitable wave of trolling which follows it. Typically, the harassment being organized is online harassment, but it's not un-heard of for online harassment campaigns to escalate to doxxing, then intimidating behavior in physical space.
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software