Dot.consYvonne Jewkes Cyberspace opens up infinitely new possibilities to the deviant imagination. With access to the Internet and sufficient know-how you can, if you are so inclined, buy a bride, cruise gay bars, go on a global shopping spree with someone else's credit card, break into a bank's security system, plan a demonstration in another country and hack into the Pentagon − all on the same day. In more than any other medium, time and place are transcended, undermining the traditional relationship between physical context and social situation. This book crosses the boundaries of sociological, criminological and cultural discourse in order to explore the implications of these massive transformations in information and communication technologies for the growth of criminal and deviant identities and behaviour on the Internet. This is a book not about computers, nor about legal controversies over the regulation of cyberspace, but about people and the new patterns of human identity, behaviour and association that are emerging as a result of the communications revolution. |
From inside the book
Results 1-5 of 30
... unpaginated) In an enduring ritual of nightly 'cruising', a crowd of people has gathered in a lonely-hearts club. A man musters up the courage to approach a woman and fires off a few of his best one-liners. She takes the bait and tugs ...
... unpaginated) And if this were not sufficient to fuel a moral panic, the The Observer adopts an even more hysterical tone, claiming that the dark side of the web includes 'pornography, paedophilia, murder, snuff movies and drug-dealing ...
You have reached your viewing limit for this book.
You have reached your viewing limit for this book.
You have reached your viewing limit for this book.
Contents
1 | |
15 | |
prostitution on the Internet
| 36 |
secret sexual deviance in cybersociety
| 53 |
buying brides and babies on the Net
| 68 |
identity theft and the Internet
| 86 |
an international perspective
| 105 |
Chapter 8 Maestros or misogynists? Gender and the social construction of hacking
| 126 |
Chapter 9 Digital countercultures and the nature of electronic social and political movements
| 147 |
a consideration of the ethical and practical issues surrounding online research in chat rooms
| 164 |
References | 180 |
Index | 194 |