Search results
Filter
12 results
Sort by:
The Heterogeneous Engineering of Music Piracy: Applying Actor‐Network Theory to Internet‐Based Wrongdoing
In: Policy & internet, Volume 4, Issue 3-4, p. 229-248
ISSN: 1944-2866
AbstractActor‐network theory, as developed within the sociology of science and technology, views any phenomenon as the product or effect of a patterned network of heterogeneous elements. This paper applies such a paradigmatic perspective to the phenomenon of music piracy, in an attempt to underscore the relevance of studying and analyzing each of the components (and their interrelationships) that make up the reality of that behavior. Heterogeneity implies not only the social but also the technical, economic, political, organizational, informational, contextual, and perceptual. Each of these components merit attention and response if progress is to be made in understanding and responding to digital piracy and possibly other forms of Internet‐based wrongdoing.
Theory and policy in online privacy
In: Knowledge, technology and policy: an international quarterly, Volume 17, Issue 1, p. 38-58
ISSN: 1874-6314
Sextortion Among Adolescents: Results From a National Survey of U.S. Youth
In: Sexual abuse: official journal of the Association for the Treatment of Sexual Abusers (ATSA), Volume 32, Issue 1, p. 30-54
ISSN: 1573-286X
Sextortion is the threatened dissemination of explicit, intimate, or embarrassing images of a sexual nature without consent, usually for the purpose of procuring additional images, sexual acts, money, or something else. Despite increased public interest in this behavior, it has yet to be empirically examined among adolescents. The current study fills this gap by exploring the prevalence of sextortion behaviors among a nationally representative sample of 5,568 U.S. middle and high school students. Approximately 5% of students reported that they had been the victim of sextortion, while about 3% admitted to threatening others who had shared an image with them in confidence. Males and nonheterosexual youth were more likely to be targeted, and males were more likely to target others. Moreover, youth who threatened others with sextortion were more likely to have been victims themselves. Implications for future research, as well as the preventive role that youth-serving professionals can play, are discussed.
Cultivating youth resilience to prevent bullying and cyberbullying victimization
In: Child abuse & neglect: the international journal ; official journal of the International Society for the Prevention of Child Abuse and Neglect, Volume 73, p. 51-62
ISSN: 1873-7757
Trends and Patterns Among Music Pirates
In: Deviant behavior: an interdisciplinary journal, Volume 32, Issue 7, p. 563-588
ISSN: 1521-0456
Trends in online social networking: adolescent use of MySpace over time
In: New media & society: an international and interdisciplinary forum for the examination of the social dynamics of media and information change, Volume 12, Issue 2, p. 197-216
ISSN: 1461-7315
MySpace has received a significant amount of negative attention from the media and many concerned adults, who point to several isolated incidents where predators have contacted, become involved with and even assaulted adolescents whom they met through the popular social networking web site. Furthermore, concerned parents have expressed discontent with the amount and type of personal and private information youth seem to reveal on their profile pages. In 2006, the authors performed an extensive content analysis of approximately 2423 randomly sampled adolescent MySpace profiles, and found that the vast majority of youth were making responsible choices with the information they shared online. In this follow-up study, the authors revisited the profiles one year later to examine the extent to which the content had changed. Though exceptions occur, youth are increasingly exercising discretion in posting personal information on MySpace and more youth are limiting access to their profile. Moreover, a significant number of youth appear to be abandoning their profiles or MySpace altogether.
Neutralizing Music Piracy: An Empirical Examination
In: Deviant behavior: an interdisciplinary journal, Volume 29, Issue 4, p. 334-366
ISSN: 1521-0456
Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization
In: Deviant behavior: an interdisciplinary journal, Volume 29, Issue 2, p. 129-156
ISSN: 1521-0456
Cyberbullying myths and realities
In: Computers in human behavior, Volume 29, Issue 6, p. 2703-2711
ISSN: 0747-5632
Bullying Victimization, Negative Emotions, and Digital Self-Harm: Testing a Theoretical Model of Indirect Effects
In: Deviant behavior: an interdisciplinary journal, Volume 43, Issue 3, p. 303-321
ISSN: 1521-0456