Download presentation
Presentation is loading. Please wait.
Published byJeremy Shaw Modified over 9 years ago
1
“ Copyright © Allyn & Bacon 2010 Deviance 10e Chapter Fifteen Internet Deviance This multimedia product and its contents are protected under copyright law. The following are prohibited by law: any public performance or display, including transmission of any image over a network; preparation of any derivative work, including the extraction, in whole or in part, of any images; any rental, lease, or lending of the program. Alex Thio
2
“ Copyright © Allyn & Bacon 2010 Introduction The Internet today resembles the wild, wild West of the old frontier days; all kinds of deviant activities are taking place with relative impunity The Internet today resembles the wild, wild West of the old frontier days; all kinds of deviant activities are taking place with relative impunity Two types of cyberdeviance: Two types of cyberdeviance: (a) disrupting a computer network as a target, such as hacking (a) disrupting a computer network as a target, such as hacking (b) using the computer as a tool to commit acts like identity theft and pornography (b) using the computer as a tool to commit acts like identity theft and pornography
3
“ Copyright © Allyn & Bacon 2010 Seeking Easy Money Online Online identity theft: involves use of computer to steal credit card numbers, social security numbers, or other personal info Online identity theft: involves use of computer to steal credit card numbers, social security numbers, or other personal info Internet gambling: although illegal in U.S., $12 billion gambled in 2006 Internet gambling: although illegal in U.S., $12 billion gambled in 2006
4
“ Copyright © Allyn & Bacon 2010 Searching Cyberspace for Sex Cybersex: online personal ads; chat rooms; and includes trading e-mail, pornographic pictures, and steamy conversation, ending in sexual stimulation and masturbation or meeting for sex in person Cybersex: online personal ads; chat rooms; and includes trading e-mail, pornographic pictures, and steamy conversation, ending in sexual stimulation and masturbation or meeting for sex in person Cyberporn: pornography in cyberspace Cyberporn: pornography in cyberspace
5
“ Copyright © Allyn & Bacon 2010 Searching Cyberspace for Sex – cont. Between 20,000 and 30,000 porn sites on the web; generates $700 million per year Between 20,000 and 30,000 porn sites on the web; generates $700 million per year Most cyberporn surfers are older and married men Most cyberporn surfers are older and married men
6
“ Copyright © Allyn & Bacon 2010 Expressing Hate Online It is easier for people to express prejudice against minorities in cyberspace because they can get avoid ridicule or retaliation It is easier for people to express prejudice against minorities in cyberspace because they can get avoid ridicule or retaliation The is also a proliferation of anti-minority extremists and hate groups The is also a proliferation of anti-minority extremists and hate groups Many organizations are trying to combat internet prejudice through filtering programs Many organizations are trying to combat internet prejudice through filtering programs
7
“ Copyright © Allyn & Bacon 2010 Expressing Hate Online – cont. Cyberstalking: Internet and e-mail are used to harass victims Cyberstalking: Internet and e-mail are used to harass victims Can include the spread of personal data gained through the internet, takes place around the world, creates serious mental and emotional harm, and even leads to physical or sexual assault Can include the spread of personal data gained through the internet, takes place around the world, creates serious mental and emotional harm, and even leads to physical or sexual assault
8
“ Copyright © Allyn & Bacon 2010 Disrupting Computer Networks Targeting a computer network is another form of cyber deviance Targeting a computer network is another form of cyber deviance Computer hackers break into a computer network and plan viruses, change user names, or simply explore the network Computer hackers break into a computer network and plan viruses, change user names, or simply explore the network Cyberspace is creating new opportunities for terrorists Cyberspace is creating new opportunities for terrorists
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.