moral panics and cyber crime

Cards (29)

  • What is the first stage of the deviance amplification spiral?
    Primary deviance
  • What happens during the isolation and alienation stage of the deviance amplification spiral?
    The act has not yet been labelled
  • What role does the media play in the deviance amplification spiral?
    It increases social reaction to deviance
  • What is secondary deviance in the deviance amplification spiral?
    Person is labelled and receives a master status
  • What is the social reaction to a master status?
    It leads to increased deviance
  • How does the deviance amplification spiral help explain moral panics?
    It shows how reactions escalate to deviance
  • What is a moral panic?
    An exaggerated over-reaction by society
  • Who typically identifies groups as 'folk devils' during moral panics?
    The media
  • How does the media present 'folk devils'?
    In a negative, stereotypical way
  • What do moral entrepreneurs do during moral panics?
    They condemn the group and their behavior
  • What caused the initial panic between mods and rockers in 1964?
    Petty violence between two subcultures
  • How did the media portray the mods and rockers?
    As hooligans and monsters
  • What was the reality of the violence between mods and rockers?
    It was exaggerated by the media
  • What assumption does the evaluation of moral panics make about societal reactions?
    They are disproportionate over-reactions
  • What do McRobbie and Thornton argue about moral panics?
    They have become routine and less impactful
  • How has the consensus about deviance changed in late modern society?
    There is less consensus about deviance
  • How do Thomas and Loader define cybercrime?
    Computer mediated activities that are illegal
  • What opportunities does the internet create according to Jewkes?
    To commit conventional and new crimes
  • What is cyber-trespass?
    Crossing boundaries into others' cyber property
  • What does cyber-deception and theft include?
    Identity theft and phishing
  • What is cyber-pornography?
    Pornography involving minors and non-consensual sharing
  • What is cyber-violence?
    Causing psychological harm or inciting physical harm
  • Who was victimized by the Melissa virus?
    Users of Microsoft-based systems
  • What was the estimated cost of the Melissa virus damage?
    $80 million
  • Who was the offender in the Melissa virus case?
    Smith
  • Who was victimized in the NASA cyber attack in 1999?
    NASA and the Defence Threat Reduction Agency
  • Who was the offender in the NASA cyber attack?
    Johnathan James
  • What was the cost of the NASA cyber attack?
    $1.7 million in data
  • How much did NASA have to pay in repairs after the cyber attack?
    $44,000