Upload
jeremy-shaw
View
213
Download
1
Embed Size (px)
Citation preview
“Copyright © Allyn & Bacon 2010
Deviance 10eDeviance 10eDeviance 10eDeviance 10e
Chapter Fifteen Chapter Fifteen Internet Deviance
This multimedia product and its contents are protected under copyright law. The following are prohibited by law:• any public performance or display, including transmission of any image over a network;• preparation of any derivative work, including the extraction, in whole or in part, of any images;• any rental, lease, or lending of the program.
Alex ThioAlex ThioAlex ThioAlex Thio
“Copyright © Allyn & Bacon 2010
IntroductionIntroduction
The Internet today resembles the wild, wild The Internet today resembles the wild, wild West of the old frontier days; all kinds of West of the old frontier days; all kinds of deviant activities are taking place with deviant activities are taking place with relative impunity relative impunity
Two types of cyberdeviance: Two types of cyberdeviance: (a) disrupting a computer network as a target, (a) disrupting a computer network as a target,
such as hackingsuch as hacking (b) using the computer as a tool to commit (b) using the computer as a tool to commit
acts like identity theft and pornography acts like identity theft and pornography
“Copyright © Allyn & Bacon 2010
Seeking Easy Money OnlineSeeking Easy Money Online
Online identity theftOnline identity theft: involves use of : involves use of computer to steal credit card numbers, computer to steal credit card numbers, social security numbers, or other personal social security numbers, or other personal infoinfo
Internet gamblingInternet gambling: although illegal in U.S., : although illegal in U.S., $12 billion gambled in 2006$12 billion gambled in 2006
“Copyright © Allyn & Bacon 2010
Searching Cyberspace for Sex Searching Cyberspace for Sex
CybersexCybersex: online personal ads; chat : online personal ads; chat rooms; and includes trading e-mail, rooms; and includes trading e-mail, pornographic pictures, and steamy pornographic pictures, and steamy conversation, ending in sexual stimulation conversation, ending in sexual stimulation and masturbation or meeting for sex in and masturbation or meeting for sex in personperson
CyberpornCyberporn: pornography in cyberspace : pornography in cyberspace
“Copyright © Allyn & Bacon 2010
Searching Cyberspace for Sex Searching Cyberspace for Sex – cont. – cont.
Between 20,000 and 30,000 porn sites on Between 20,000 and 30,000 porn sites on the web; generates $700 million per yearthe web; generates $700 million per year
Most cyberporn surfers are older and Most cyberporn surfers are older and married menmarried men
“Copyright © Allyn & Bacon 2010
Expressing Hate OnlineExpressing Hate Online
It is easier for people to express prejudice It is easier for people to express prejudice against minorities in cyberspace because against minorities in cyberspace because they can get avoid ridicule or retaliationthey can get avoid ridicule or retaliation
The is also a proliferation of anti-minority The is also a proliferation of anti-minority extremists and hate groupsextremists and hate groups
Many organizations are trying to combat Many organizations are trying to combat internet prejudice through filtering internet prejudice through filtering programs programs
“Copyright © Allyn & Bacon 2010
Expressing Hate Online – cont.Expressing Hate Online – cont.
CyberstalkingCyberstalking: Internet and e-mail are : Internet and e-mail are used to harass victimsused to harass victims
Can include the spread of personal data Can include the spread of personal data gained through the internet, takes place gained through the internet, takes place around the world, creates serious mental around the world, creates serious mental and emotional harm, and even leads to and emotional harm, and even leads to physical or sexual assault physical or sexual assault
“Copyright © Allyn & Bacon 2010
Disrupting Computer NetworksDisrupting Computer Networks
Targeting a computer network is another Targeting a computer network is another form of cyber devianceform of cyber deviance
Computer hackers break into a computer Computer hackers break into a computer network and plan viruses, change user network and plan viruses, change user names, or simply explore the networknames, or simply explore the network
Cyberspace is creating new opportunities Cyberspace is creating new opportunities for terroristsfor terrorists