Save
⭐️Sociology
Crime and deviance
moral panics and cyber crime
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
leah
Visit profile
Cards (29)
What is the first stage of the deviance amplification spiral?
Primary deviance
View source
What happens during the isolation and alienation stage of the deviance amplification spiral?
The act has not yet been
labelled
View source
What role does the media play in the deviance amplification spiral?
It increases
social reaction
to deviance
View source
What is secondary deviance in the deviance amplification spiral?
Person is
labelled
and receives a
master status
View source
What is the social reaction to a master status?
It leads to
increased
deviance
View source
How does the deviance amplification spiral help explain moral panics?
It shows how reactions
escalate
to deviance
View source
What is a moral panic?
An
exaggerated
over-reaction by society
View source
Who typically identifies groups as 'folk devils' during moral panics?
The
media
View source
How does the media present 'folk devils'?
In a
negative
, stereotypical way
View source
What do moral entrepreneurs do during moral panics?
They condemn the group and their behavior
View source
What caused the initial panic between mods and rockers in 1964?
Petty violence between two
subcultures
View source
How did the media portray the mods and rockers?
As
hooligans
and monsters
View source
What was the reality of the violence between mods and rockers?
It was exaggerated by the
media
View source
What assumption does the evaluation of moral panics make about societal reactions?
They are
disproportionate
over-reactions
View source
What do McRobbie and Thornton argue about moral panics?
They have become
routine
and less impactful
View source
How has the consensus about deviance changed in late modern society?
There is less consensus about deviance
View source
How do Thomas and Loader define cybercrime?
Computer mediated
activities that are illegal
View source
What opportunities does the internet create according to Jewkes?
To commit
conventional
and new crimes
View source
What is cyber-trespass?
Crossing boundaries into others'
cyber property
View source
What does cyber-deception and theft include?
Identity theft
and
phishing
View source
What is cyber-pornography?
Pornography involving
minors
and
non-consensual
sharing
View source
What is cyber-violence?
Causing
psychological
harm or
inciting
physical harm
View source
Who was victimized by the Melissa virus?
Users of
Microsoft-based
systems
View source
What was the estimated cost of the Melissa virus damage?
$80 million
View source
Who was the offender in the Melissa virus case?
Smith
View source
Who was victimized in the NASA cyber attack in 1999?
NASA and the
Defence Threat Reduction Agency
View source
Who was the offender in the NASA cyber attack?
Johnathan James
View source
What was the cost of the NASA cyber attack?
$1.7 million
in
data
View source
How much did NASA have to pay in repairs after the cyber attack?
$44,000
View source