Part VII Chapter 40. The Internet has provided a fertile deviant opportunity structure Hacking : unauthorized intrusion into a computer system or network.

Slides:



Advertisements
Similar presentations
Part I: Making Good Online Choices
Advertisements

Becoming the Man or Woman You Want To Be
Social Emotional Development and Friendships
Key Stage Three Resources
Wolfpack Advocacy Hour January 10, 2012 Grade 10.
Our Digital World Second Edition
Descriptive Research methods Dr. Surej P John. Main Topics Conceptual Framework Hypothesis development Descriptive research methods Survey Observation.
Robin L. Donaldson May 5, 2010 Prospectus Defense Florida State University College of Communication and Information.
Your Potential as an Entrepreneur
Qualitative and Observational Research
Feminist Theory.
Chapter 12 Prostitution, Pornography, & the Sex Trade
Chapter 14 Leadership.
An introduction to Child Protection and Safeguarding
“ Copyright © Allyn & Bacon 2010 Deviance 10e Chapter Five: RAPE AND CHILD MOLESTATION This multimedia product and its contents are protected under copyright.
Back to Table of Contents
Chapter 1 Thinking About Social Problems Key Terms.
Friendship and Support. Overview of Friendship Nature of Friendship Rules of Friendship Theories of Friendship Balance Theory Developmental Theory Theories.
Building Prevention: Sexual Violence, Youth, and Drinking Holly Johnson, PhD Department of Criminology.
BENEFITS BASED PROGRAMMING
Dramaturgical metaphors as information theories April 7, 2004 IS 208B.
Sexual Assault on Campus: Insights from Research on College Student Social Life Prof. Elizabeth A. Armstrong Graduate Students: Laura Hamilton, Evelyn.
Chapter 5 The Self CONSUMER BEHAVIOR, 10e Michael R. Solomon
Copyright © 2012 Pearson Education, Inc. All rights reserved. Gender, Sexual Orientation, and Social Inequality Chapter 8 Gender, Sexual Orientation, and.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
 Digital marketing: Uses digital media to develop communications and exchanges with customers  Electronic media (E-marketing): Refers to the strategic.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Chapter 13 Violence And Abuse In Relationships Definitions of Violence, Abuse and Neglect Abuse In Dating/Marriage Relationships Violence In Relationships.
Interpersonal Communication © All photo clip art copyright of Microsoft Office Online.
Stacy Snyder, Aspiring Teacher FIRED Stacy Snyder, “Drunken Pirate”
Gender, Sexuality and Emotion
1 Chapter 3 The Nature of Sport Sociologists define sport as a set of competitive activities in which winners and losers are determined by physical performance.
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
Why Taiwan College Students like to Use Wretch? Professor:Charles Trappey Students: Mavis Fan 范淑順 Kelly Lin 林可馨 Johnny Wu 吳英浩.
SEXYOUAL AWARENESS WEEK Virtual Case Study Competition MORGAN RIDGELL DENISHA ROSS TORRI STATON.
Online Social Networking. Agenda Survey Results What is Online Social Networking? Popular Online Social Networking Sites Privacy Settings for Facebook.
VIOLENCE PREVENTION AND INTERVENTION PROGRAM (VPIP) TECHNIQUES TO PREVENT DATING VIOLENCE I. Indicators of Perpetrators and Victims of Dating Violence.
Gender and Migration Some Recommendations for Programmatic Policies.
Entrepreneurship: Ideas in Action 5e © 2011 Cengage Learning. All rights reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
EVENT LEVEL: Sex obtained through aggression will frequently be unprotected GLOBAL LEVEL: Men who have perpetrated sexual aggression will be more likely.
100 Internet Safety Jeopardy Social Network Sites Online Shopping Words & Pictures Cyber- bullying Internet Scams.
Sociology: a Social Science Outcomes: 1.1 describe the discipline of sociology as a social science through the examination of selected social Issues.
Child Sexual Exploitation (CSE) Melanie Hartley Designated Nurse for Safeguarding Children, NHS Salford CCG.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Why should any form of sexual abuse be reported to the police?
Reading the wrong message 1. If a girl wears sexy clothes: She thinks..... These clothes are cool, cute, fashionable, comfortable He might think …… She’s.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
A PARENT’S GUIDE TO CYBER BULLYING BY: SHIRLEY JONES.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
PGHS Advocacy Digital Citizenship Lesson 2
Ch. 1 Consumer Behavior vs. Marketing Strategy
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
13-1 Failures Are The Pillars Of Success PRESENTED BY JAYANTI CHAURASIA.
SEXUAL VIOLENCE AGAINST THE WOMAN.  Andrea Jiménez  Paola Lara  Viviana León  Marcelo Llano  Michael Macías  Amanda Montaluisa  Miguel Pachacama.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Child Sexual Exploitation Detective Inspector Angie Chapman.
LEADERSHIP 1 Leadership The process by which a person exerts influence over others and inspires, motivates and directs their activities to achieve group.
Understanding Literary Theory and Critical Lenses
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Your job is to develop a list of questions that your group will want to discuss about the reading. Through your questions, you must help people recognize.
Love Chapter 5.
Chapter 10 Variations in Sexual Behavior
PSY 110 RANK Creative and Effective /psy110rank.com
Pics, Flicks, and Sexting
Appropriate Use of Technology
Social Organization and Power: Rape and Sexual Assault
12 Sexuality Ted Soqui/Ted Soqui Photography/Corbis
Presentation transcript:

Part VII Chapter 40

The Internet has provided a fertile deviant opportunity structure Hacking : unauthorized intrusion into a computer system or network Fraud & other deceptive practices are common on the Internet; examples include: Stock manipulation Misappropriation of credit card information Investment swindles Online auction fraud Cyberstalking, harassing Threatening electronic communications Part 7: Ch. 40

Analysis of website content over period of four years, plus 500 printed pages Collected from homepages, message forums, Yahoo groups, user profiles & blogs Author stumbled on topic – “money mistress” offering services looking for “money slaves” Data collection strategy included snowball sampling with use of Internet sites used for information as opposed to individuals Data analyzed for common themes, characteristics & tendencies Part 7: Ch. 40

Money slavery : involves males giving money or gifts to women they meet online in exchange for being degraded, humiliated or blackmailed Described as “…ultimate depiction of economic dehumanization” Some Internet sites where participants can be found: The Real Money Slaves Money Slaves 101 Cash Fetish Money Slaves Fellowship Forum Part 7: Ch. 40

Request various forms of remuneration from men in order to obtain ongoing contact Commonly require them to send “tributes” electronically or by credit card or Pay Pal Many have an “initiation fee” or “introductory tribute” before men are made money slaves Some require that men pay off a bill each month (rent, car, electric, phone, etc.) Some might request men buy them items from computerized “wish list” Part 7: Ch. 40

Some men give exorbitant amounts of money to women: One woman’s website shows copy of $50,000 wire transfer Copies of $17,000 credit card receipts Little evidence that any physical meetings ever occur between money slaves & money mistresses Blackmail services : man fills out online application with name, address, telephone number of girlfriend, wife or employer as well as other discrediting information Money slave is required to pay mistress to avoid having information revealed Part 7: Ch. 40

Chastity belt program : money slave buys device & sends mistress key. In turn, he is required to pay a fee to have key returned to him Other “services” include purchases of: Used panties ($75) Locks of her hair ($100) Worn socks ($45) Phone sex calls ($9.99 per minute) One money slave reported paying $330 for a conversation Part 7: Ch. 40

Sexual interests seem to motivate the money slaves Psychological pain appears to be important to many masochists. Pain encompasses: Feeling of helplessness Subservience Humiliation Degradation Money slaves reported being sexually aroused by making payments Part 7: Ch. 40

Social control plays an important part in phenomenon of money slavery These practices are ripe with opportunities for fraud, deception & deceit Money mistress may not reciprocate for money or gifts received Money masochists may be deceived by using photos of other women Gender can also be disguised on the Internet Part 7: Ch. 40

To protect their interests money slaves formed the Money Slaves Fellowship Forum & Find Fake Money Slaves to share information on detecting & avoiding frauds Money masochists also engage in deceptive practices by not paying for services such as Web cam views or chat time Money mistresses create “losers” or “fakers” lists exposing identities of nonpaying money masochists Money masochists are also rewarded for paying by being thanked on mistresses’ websites, etc. Part 7: Ch. 40

Paying for sexual fantasy is not new, but phenomenon of money slavery appears to be novel manifestation of this type of deviance predicated on existence of the Internet Primary contact between mistress & slave takes place via Internet Money slavery entails presentation & consumption of images Money mistress is a character who exists in cyberspace Part 7: Ch. 40

How is money slavery similar – as well as different from – traditional forms of (sexual) deviance? What kinds of social control strategies do money mistresses implement to keep money masochists in line? Part 7: Ch. 40

Part VII Chapter 41

A 1997 NIJ study estimated from 1/5 to 1/4 of women are victims of completed or attempted rape while in college From 1/2 to 3/4 of sexual assaults on college campuses involve alcohol use on part of victim, perpetrator, or both Alcohol and sex assault link suggests many assaults are “party rapes” Part 7: Ch. 41

While college-universities have been aware of problem of sexual assault for at least 20 years, rates of sexual assault have not declined Why do colleges-universities remain dangerous places for women? In what follows, sexual assault is seen as predictable outcome of both gendered and gender neutral processes operating at individual, organizational and interactional levels Part 7: Ch. 41

Three main types of explanation: (1) Psychological or individual determinants: Sex assault seen as a consequence of perpetrator or victim characteristics, like gender role attitudes, personality, family background, or sexual history (2) A “rape culture”: Sex assault seen as result of widespread belief in rape myths or ideas about men, women, sexuality that fosters a pro-rape environment (3) A social context approach that identifies certain settings such as fraternities or bars as sexually dangerous places and grounds such assaults in organizations that provide resources and opportunities Part 7: Ch. 41

This study develops third approach by linking it to recent scholarship in the sociology of gender (Martin, 2004; Risman, 1998, 2004; Lorber, 1994) Argues that gender is embedded not only in persons, but also in cultural rules, social interaction, and organizational arrangements This integrated approach emphasizes socialization produces gendered selves, cultural rules reproduce gender inequality in interaction, and organizational practices reproduce gender inequality at institutional level Part 7: Ch. 41

Data are from group and individual interviews, ethnographic observation, and public information collected at a large Midwestern research university Most data collected during academic year in a residence hall known as a “party dorm” Authors and research team assigned to a room on a floor occupied by 55 women students Part 7: Ch. 41

Individual characteristics that generate interest in college partying and gendered sexual agendas resulting in high-stakes competition over erotic status: Part 7: Ch. 41

General agreement among students that one was “supposed” to party in colleges, a way to feel part of college life Females reported wanting to fit in, be popular and have friends Part 7: Ch. 41

Partying was primary way to meet men on campus and some complained they lacked friendly contact with men compared to mined-gender friendship groups in high school Meeting men at parties very important to most women and they found men’s sexual interest as parties to be a source of self- esteem and status Enjoying dancing and kissing men at parties, proved that men “liked” them Part 7: Ch. 41

Women worked hard to attain physically attractive presentation through exercise, tanning, dieting, buying new clothes Women found that achieving high erotic status in party scene required looking “hot” but not “slutty” resulting if successful in looking “classy” Men also sought proof of their erotic appeal; Men were more interested that they were in having sex reflecting traditional double- standard Part 7: Ch. 41

Sexual danger is an unintended consequence of many university practices intended to be gender neutral The clustering of homogenous students intensifies the dynamics of student peer cultures and heightens motivations to party Part 7: Ch. 41

Residence halls rules push student partying off-campus into bars, residences and fraternities Male control of fraternities results in their control of all aspects of parties at their houses: Themes, music, transportation, admission, access to alcohol and movement of guests Party themes encourage women to wear scant, sexy, clothing and place women in subordinate positions Part 7: Ch. 41

Peer culture and organizational arrangements set up risky partying conditions but do not explain how student interactions at parties generate sexual assault Party rape is the result of fun situations that shift, gradually or suddenly, into coercive situations Part 7: Ch. 41

College partying involves predictable activities in a predictable order, and shared assumptions about good or adequate participation Fun partiers throws themselves into the event, drink, display upbeat mood, and evoke revelry in others; Partiers are expected to like and to trust party- mates Cultural expectations of partying are gendered: Women, but not men, wear revealing outfits and women cede control of turf, transportation, and liquor, and are expected to be nice in ways men are not Part 7: Ch. 41

As a result, women become vulnerable to sexual assault, which too many men are willing to exploit Significant number of narratives collected from subjects of study in which sexual assault or probable sexual assault occurred Many women appear uncertain and unwilling to define many acts as assaults due to effects of alcohol, and a desire to preserve their status with peers as popular Part 7: Ch. 41

The frequency of women’s negative experiences in the party scene poses a problem for those students most invested in it: Finding fault threatens their identities and lifestyles The majority of heterosexual encounters at parties are fun and consensual Females reported loving to flirt and be admired Part 7: Ch. 41

Many male and female students account for the harm to women in the party scene by blaming victims their “mistakes” Avoiding criticism of party scene or men’s behavior Hence only “immature,” “naïve,” or “stupid” women get into trouble Even women who have been assaulted may tend to blame themselves (drinking too much alcohol) rather than the perpetrator Part 7: Ch. 41

Why is there still a tendency to blame the victim of sexual assault and rape for drinking too much as opposed to the perpetrator? Part 7: Ch. 41