More Subjects
The Internet and The World of Deviance
[Author Name(s), First M. Last, Omit Titles and Degrees]
[Institutional Affiliation(s)]
Author Note
The Internet and The World of Deviance
The world of deviance was definitely “put on steroids” around 1989 when the use of the internet started catching fire among the masses. While this deviant behavior has always been prevalent in society, the entire process became a nightmare overnight with the integration of the internet. Bullying, that took place in school corridors and park corners shifted to online chat and communication platforms, where people can say whatever they wanted to say to someone without looking them in the eye or seeing them in person. This evolved into a phenomenon of its own that we call cyberbullying ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"9e3p8vgt","properties":{"formattedCitation":"(Whittaker & Kowalski, 2015)","plainCitation":"(Whittaker & Kowalski, 2015)","noteIndex":0},"citationItems":[{"id":253,"uris":["http://zotero.org/users/local/5VyEEXyp/items/N9LD4ST4"],"uri":["http://zotero.org/users/local/5VyEEXyp/items/N9LD4ST4"],"itemData":{"id":253,"type":"article-journal","title":"Cyberbullying via social media","container-title":"Journal of School Violence","page":"11-29","volume":"14","issue":"1","author":[{"family":"Whittaker","given":"Elizabeth"},{"family":"Kowalski","given":"Robin M."}],"issued":{"date-parts":[["2015"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Whittaker & Kowalski, 2015).
Cybercrime also became a serious criminal concern overnight, with people having their credit card information and identity stolen. This was done for nefarious purposes that involved monetary exploitation of an individual for personal gain ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"rdxm49ni","properties":{"formattedCitation":"(Reyns & Henson, 2016)","plainCitation":"(Reyns & Henson, 2016)","noteIndex":0},"citationItems":[{"id":254,"uris":["http://zotero.org/users/local/5VyEEXyp/items/PYMKQKYR"],"uri":["http://zotero.org/users/local/5VyEEXyp/items/PYMKQKYR"],"itemData":{"id":254,"type":"article-journal","title":"The thief with a thousand faces and the victim with none: Identifying determinants for online identity theft victimization with routine activity theory","container-title":"International journal of offender therapy and comparative criminology","page":"1119-1139","volume":"60","issue":"10","author":[{"family":"Reyns","given":"Bradford W."},{"family":"Henson","given":"Billy"}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Reyns & Henson, 2016).
With cybercrime becoming a very real phenomenon, the idea of hacking into a personal computer to illegally access the camera and uploading personal sexual interactions on pornographic websites is also becoming more and more common today. This includes young impressionable teenager’s being groomed and catfished by older men into being sexually exploited through sexting, among other things ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"6AZhyfXj","properties":{"formattedCitation":"(Lareki, de Morentin, Altuna, & Amenabar, 2017)","plainCitation":"(Lareki, de Morentin, Altuna, & Amenabar, 2017)","noteIndex":0},"citationItems":[{"id":255,"uris":["http://zotero.org/users/local/5VyEEXyp/items/LHN6IUQQ"],"uri":["http://zotero.org/users/local/5VyEEXyp/items/LHN6IUQQ"],"itemData":{"id":255,"type":"article-journal","title":"Teenagers' perception of risk behaviors regarding digital technologies","container-title":"Computers in Human Behavior","page":"395-402","volume":"68","author":[{"family":"Lareki","given":"Arkaitz"},{"family":"Morentin","given":"Juan Ignacio Martínez","non-dropping-particle":"de"},{"family":"Altuna","given":"Jon"},{"family":"Amenabar","given":"Nere"}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Lareki, de Morentin, Altuna, & Amenabar, 2017).
The Internet has made social deviance and the ability of an individual to indulge in deviant behavior rather easier. Between the internet, mobile applications and social media and widespread outreach across the globe the prevalence of deviant behavior online isn’t going to cease anytime soon ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"gAOqSHp7","properties":{"formattedCitation":"(Stalans & Finn, 2016)","plainCitation":"(Stalans & Finn, 2016)","noteIndex":0},"citationItems":[{"id":256,"uris":["http://zotero.org/users/local/5VyEEXyp/items/P5TP9I6L"],"uri":["http://zotero.org/users/local/5VyEEXyp/items/P5TP9I6L"],"itemData":{"id":256,"type":"book","title":"Understanding how the internet facilitates crime and deviance","publisher":"Taylor & Francis","ISBN":"1556-4886","author":[{"family":"Stalans","given":"Loretta J."},{"family":"Finn","given":"Mary A."}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Stalans & Finn, 2016). Add in the effects of peer pressure, one that motivates individuals to follow their peer’s activities online and replicate their behavior just because it is “fun”. This results in such deplorable behavior online, where killing someone and streaming it live over Instagram or posting it on Snapchat is no longer an issue. These nefarious designs only pave way for something deplorable, a deviant manifestation that we cannot control ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"42zH7oXh","properties":{"formattedCitation":"(McCoy, Dimler, Samuels, & Natsuaki, 2019)","plainCitation":"(McCoy, Dimler, Samuels, & Natsuaki, 2019)","noteIndex":0},"citationItems":[{"id":257,"uris":["http://zotero.org/users/local/5VyEEXyp/items/HHRZN7G5"],"uri":["http://zotero.org/users/local/5VyEEXyp/items/HHRZN7G5"],"itemData":{"id":257,"type":"article-journal","title":"Adolescent susceptibility to deviant peer pressure: Does gender matter?","container-title":"Adolescent Research Review","page":"59-71","volume":"4","issue":"1","author":[{"family":"McCoy","given":"Shelly S."},{"family":"Dimler","given":"Laura M."},{"family":"Samuels","given":"Danielle V."},{"family":"Natsuaki","given":"Misaki N."}],"issued":{"date-parts":[["2019"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (McCoy, Dimler, Samuels, & Natsuaki, 2019).
References
ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Lareki, A., de Morentin, J. I. M., Altuna, J., & Amenabar, N. (2017). Teenagers’ perception of risk behaviors regarding digital technologies. Computers in Human Behavior, 68, 395–402.
McCoy, S. S., Dimler, L. M., Samuels, D. V., & Natsuaki, M. N. (2019). Adolescent susceptibility to deviant peer pressure: Does gender matter? Adolescent Research Review, 4(1), 59–71.
Reyns, B. W., & Henson, B. (2016). The thief with a thousand faces and the victim with none: Identifying determinants for online identity theft victimization with routine activity theory. International Journal of Offender Therapy and Comparative Criminology, 60(10), 1119–1139.
Stalans, L. J., & Finn, M. A. (2016). Understanding how the internet facilitates crime and deviance. Taylor & Francis.
Whittaker, E., & Kowalski, R. M. (2015). Cyberbullying via social media. Journal of School Violence, 14(1), 11–29.
More Subjects
Join our mailing list
© All Rights Reserved 2023