Show simple item record

dc.contributor.advisor Rieker, Martina
dc.contributor.author Fouda, Radwa
dc.date.accessioned 2018-09-26T11:26:55Z
dc.date.available 2018-09-26T22:00:18Z
dc.date.created Fall 2018 en_US
dc.date.issued 2018-09-26
dc.identifier.uri http://dar.aucegypt.edu/handle/10526/5492
dc.description.abstract Internet has long existed in Egypt, however sudden scholarly interest came after the 2011 revolution. The global scholarly body tended to couple internet accessibility to the so-called Arab-spring, without studying the other forms and politics of internet as an evolution, and almost none have delved in the dungeons of Cyber violence in the MENA Region, needless to say in Egypt. It focuses mainly on individual-to-individual perpetration of violence, how, when and why people variably define unsolicited intervention with their data as “violence”, and how, when and why, they choose other notions to define such incident(s). By doing so, it opens up questions about notions such as surveillance, privacy, kinship, control and care, sovereignty, legibility, legitimacy, marginalization and rights. The structure is seen as a vertical gradient, each chapter is a dominant colour that seeps into the one the follows. While cyber violence is visualized as a circular gradient that floods into the center, while having nodes of colours around the edges that signify the prominent hue of the violence perpetuation and the effects of other nodes on its hue. While this thesis is premised primarily on the Castellian view of the network society, various other scholars constitute the rest of the pillars of this thesis to engage more with notions of the state, the social, capital, violence, technology. From Weber, Deleuze, Das, Tilly, Arendt, and Fanon, to Haraway, Bernal, Spivak, Latour and McLuhan, these theories try to give justice to the multitude of entanglements produced by the 9 interlocutors whose stories are extremely rich and telling. From Family, to friends, to work managers, to intimate partners, to totally anonymous persons; the perpetration of violence varying in justifications between care and control, have illustrated the Chimeras that our cyber selves are. Through engaging and living the ups and downs with my interlocutors, I have come to realize the complexities that violence studies involve, beside those that Internet analysis have, through interviews, side talks, countless private messages, and cyber security measures, I have also understood the levels upon which social-scientists deal with their data, as well as themselves in the data, and how interlocutors and the social handle them. en_US
dc.description.sponsorship I would like to thank my interlocutors, my professors who are also mentors of their own right, my advisor for such a pleasant guidance, my friends, and my biological family; without you this wouldn’t have happened. The reason why I said biological family, is that during the journey of this project and this certificate, I have made yet another family, one that through the toughest times, when we were are in our weakest points, we found strength in lifting each other up. In our good days we spread our colourful feathers wide like peacocks, we find joy in the ordinary and the mundane, we create the wild and magnificent from the scraps of affect we collect as we breath, we fight, we argue, and we stay strong; not as one but as diverse. The people mentioned in this thesis, and the people known but not mentioned in this thesis, have given me the honor of sharing their most private, intimate and vulnerable moments, of entrusting me with their data they could not utter sometimes even to their families, kids, friends; I only hope this thesis is insightful to whoever who will read it, not only in theory, or in its academic content, but insightful for you, as a person; a mind, body and soul. en_US
dc.format.extent 115 p. en_US
dc.format.medium theses en_US
dc.language.iso en en_US
dc.rights Author retains all rights with regard to copyright. en
dc.subject Cyber Violence en_US
dc.subject Surveillance en_US
dc.subject Cyber Bullying en_US
dc.subject Defamation en_US
dc.subject Stalking en_US
dc.subject Egypt en_US
dc.subject Gender Based Violence en_US
dc.subject.lcsh Thesis (M.A.)--American University in Cairo en_US
dc.title Through the keyhole: Ethnographic analysis of cyber violence in Egypt en_US
dc.type Text en_US
dc.subject.discipline Gender and Women's Studies in the Middle East/North Africa en_US
dc.rights.access This item is available en_US
dc.contributor.department American University in Cairo. Cynthia Nelson Center for Gender and Women's Studies en_US
dc.description.irb American University in Cairo Institutional Review Board approval has been obtained for this item. en_US
dc.contributor.committeeMember ElSabea, Hanan
dc.contributor.committeeMember Schwab, Manuel


Files in this item

Icon

This item appears in the following Collection(s)

  • Theses and Dissertations [1559]
    This collection includes theses and dissertations authored by American University in Cairo graduate students.

Show simple item record