8
Copyright © Allyn & Bacon 2010 Deviance 10e Deviance 10e Chapter Fifteen Chapter Fifteen Internet Deviance This multimedia product and its contents are protected under copyright law. The following are prohibited by law: any public performance or display, including transmission of any image over a network; preparation of any derivative work, including the extraction, in whole or in part, of any images; Alex Thio Alex Thio

“ Copyright © Allyn & Bacon 2010 Deviance 10e Chapter Fifteen Internet Deviance This multimedia product and its contents are protected under copyright

Embed Size (px)

Citation preview

Page 1: “ Copyright © Allyn & Bacon 2010 Deviance 10e Chapter Fifteen Internet Deviance This multimedia product and its contents are protected under copyright

“Copyright © Allyn & Bacon 2010

Deviance 10eDeviance 10eDeviance 10eDeviance 10e

Chapter Fifteen Chapter Fifteen Internet Deviance

This multimedia product and its contents are protected under copyright law. The following are prohibited by law:• any public performance or display, including transmission of any image over a network;• preparation of any derivative work, including the extraction, in whole or in part, of any images;• any rental, lease, or lending of the program.

Alex ThioAlex ThioAlex ThioAlex Thio

Page 2: “ Copyright © Allyn & Bacon 2010 Deviance 10e Chapter Fifteen Internet Deviance This multimedia product and its contents are protected under copyright

“Copyright © Allyn & Bacon 2010

IntroductionIntroduction

The Internet today resembles the wild, wild The Internet today resembles the wild, wild West of the old frontier days; all kinds of West of the old frontier days; all kinds of deviant activities are taking place with deviant activities are taking place with relative impunity relative impunity

Two types of cyberdeviance: Two types of cyberdeviance: (a) disrupting a computer network as a target, (a) disrupting a computer network as a target,

such as hackingsuch as hacking (b) using the computer as a tool to commit (b) using the computer as a tool to commit

acts like identity theft and pornography acts like identity theft and pornography

Page 3: “ Copyright © Allyn & Bacon 2010 Deviance 10e Chapter Fifteen Internet Deviance This multimedia product and its contents are protected under copyright

“Copyright © Allyn & Bacon 2010

Seeking Easy Money OnlineSeeking Easy Money Online

Online identity theftOnline identity theft: involves use of : involves use of computer to steal credit card numbers, computer to steal credit card numbers, social security numbers, or other personal social security numbers, or other personal infoinfo

Internet gamblingInternet gambling: although illegal in U.S., : although illegal in U.S., $12 billion gambled in 2006$12 billion gambled in 2006

Page 4: “ Copyright © Allyn & Bacon 2010 Deviance 10e Chapter Fifteen Internet Deviance This multimedia product and its contents are protected under copyright

“Copyright © Allyn & Bacon 2010

Searching Cyberspace for Sex Searching Cyberspace for Sex

CybersexCybersex: online personal ads; chat : online personal ads; chat rooms; and includes trading e-mail, rooms; and includes trading e-mail, pornographic pictures, and steamy pornographic pictures, and steamy conversation, ending in sexual stimulation conversation, ending in sexual stimulation and masturbation or meeting for sex in and masturbation or meeting for sex in personperson

CyberpornCyberporn: pornography in cyberspace : pornography in cyberspace

Page 5: “ Copyright © Allyn & Bacon 2010 Deviance 10e Chapter Fifteen Internet Deviance This multimedia product and its contents are protected under copyright

“Copyright © Allyn & Bacon 2010

Searching Cyberspace for Sex Searching Cyberspace for Sex – cont. – cont.

Between 20,000 and 30,000 porn sites on Between 20,000 and 30,000 porn sites on the web; generates $700 million per yearthe web; generates $700 million per year

Most cyberporn surfers are older and Most cyberporn surfers are older and married menmarried men

Page 6: “ Copyright © Allyn & Bacon 2010 Deviance 10e Chapter Fifteen Internet Deviance This multimedia product and its contents are protected under copyright

“Copyright © Allyn & Bacon 2010

Expressing Hate OnlineExpressing Hate Online

It is easier for people to express prejudice It is easier for people to express prejudice against minorities in cyberspace because against minorities in cyberspace because they can get avoid ridicule or retaliationthey can get avoid ridicule or retaliation

The is also a proliferation of anti-minority The is also a proliferation of anti-minority extremists and hate groupsextremists and hate groups

Many organizations are trying to combat Many organizations are trying to combat internet prejudice through filtering internet prejudice through filtering programs programs

Page 7: “ Copyright © Allyn & Bacon 2010 Deviance 10e Chapter Fifteen Internet Deviance This multimedia product and its contents are protected under copyright

“Copyright © Allyn & Bacon 2010

Expressing Hate Online – cont.Expressing Hate Online – cont.

CyberstalkingCyberstalking: Internet and e-mail are : Internet and e-mail are used to harass victimsused to harass victims

Can include the spread of personal data Can include the spread of personal data gained through the internet, takes place gained through the internet, takes place around the world, creates serious mental around the world, creates serious mental and emotional harm, and even leads to and emotional harm, and even leads to physical or sexual assault physical or sexual assault

Page 8: “ Copyright © Allyn & Bacon 2010 Deviance 10e Chapter Fifteen Internet Deviance This multimedia product and its contents are protected under copyright

“Copyright © Allyn & Bacon 2010

Disrupting Computer NetworksDisrupting Computer Networks

Targeting a computer network is another Targeting a computer network is another form of cyber devianceform of cyber deviance

Computer hackers break into a computer Computer hackers break into a computer network and plan viruses, change user network and plan viruses, change user names, or simply explore the networknames, or simply explore the network

Cyberspace is creating new opportunities Cyberspace is creating new opportunities for terroristsfor terrorists