Advertisement

#Crime pp 153-191 | Cite as

#FutureCrime: What Is Crime in the Age of New Media?

  • Rebecca M. Hayes
  • Kate Luther
Chapter
Part of the Palgrave Studies in Crime, Media and Culture book series (PSCMC)

Abstract

The commission and control of crime are changing due to new media. Crimes are committed online, law enforcement investigates the social media accounts of alleged perpetrators, and questions are being asked about the responsibility of new media in crime control responses. Using four case studies, this chapter explores crime and victimization in the context of new media. Each case study addresses a particular form of new media crime—trolling, revenge porn, cyberbullying, and performance crime—and examines prevalence, the criminal legal response, and emerging questions.

References

Media References

  1. Barrett, D. (2013, July 10). One surveillance camera for every 11 people in Britain says CCTV survey. The Telegraph. Retrieved from http://www.telegraph.co.uk/technology/10172298/One-surveillance-camera-for-every-11-people-in-Britain-says-CCTV-survey.html
  2. BBC. (2016, October 10). Internet trolls targeted with new legal guidelines. BBC. Retrieved from http://www.bbc.com/news/uk-37601431
  3. BBC. (2017, May 8). Nigeria Chibok abductions: What we know. BBC. Retrieved from http://www.bbc.com/news/world-africa-32299943
  4. Benes, R. (2016, October 25). 6 charts: Twitters troll problem by the numbers. Digiday. Retrieved from https://digiday.com/media/6-charts-twitters-troll-problem-numbers/
  5. Berman, M. (2016, December). One year after the San Bernandino attack, police offer a possible motive as questions still linger. The Washington Post. Retrieved from https://www.washingtonpost.com/news/post-nation/wp/2016/12/02/one-year-after-san-bernardino-police-offer-a-possible-motiveas-questions-still-linger/?noredirect=on&utm_term=.34cc971e6ed0
  6. Brand-Williams, O. (2017, April 4). Woman wins 600K in Macomb County revenge porn suit. The Detroit News. Retrieved from http://www.detroitnews.com/story/news/local/macomb-county/2017/04/04/revenge-porn-damages-approved/100019510/
  7. CNN. (2011, August 16). ‘Flash mob’ robs Maryland 7-Eleven in less than a minute, police say. CNN. Retrieved from http://www.cnn.com/2011/CRIME/08/16/maryland.flash.mob/index.html
  8. Dewey, C. (2014, October 14). The only guide to Gamergate that you will ever need to read. The Washington Post. Retrieved from https://www.washingtonpost.com/news/the-intersect/wp/2014/10/14/the-only-guide-to-gamergate-you-will-ever-need-to-read/?utm_term=.f4d98dbfd66a
  9. Duwe, G. (2017a, October 4). Mass shootings are getting more deadly, not more frequent. Politico Magazine. Retrieved from https://www.politico.com/magazine/story/2017/10/04/mass-shootings-more-deadly-frequent-research-215678
  10. Gleeson, H. (2016, July 8). Why do men send unsolicited dick pics? ABC Australia. Retrieved from http://www.abc.net.au/news/2016-07-09/why-men-send-unsolicited-dick-pics/7540904
  11. Gonzales, R. (2016, October 27). Roommate pleads guilty in Rutgers suicide case. NPR. Retrieved from https://www.npr.org/sections/thetwo-way/2016/10/27/499663847/roommate-pleads-guilty-in-rutgers-suicide-case
  12. Hamilton, M. (2017). Families of San Bernardino attack victims accuse Facebook, Google and Twitter of aiding terrorism in lawsuit. LA Times. Retrieved from http://www.latimes.com/local/lanow/la-me-ln-san-bernardino-tech-lawsuit-20170503-story.html
  13. Hathaway, J. (2014, October 10). What is gamergate, and why? An explainer for non-geeks. Gawker. Retrieved from http://gawker.com/what-is-gamergate-and-why-an-explainer-for-non-geeks-1642909080
  14. History.com. (2014). Boston marathon bombing. History.com . Retrieved from http://www.history.com/topics/boston-marathon-bombings
  15. Koerner, B. (2016, April). Why ISIS is winning the social media war. Wired. Retrieved from https://www.wired.com/2016/03/isis-winning-social-media-war-heres-beat/
  16. Kushner, D. (2013, November 27). Anonymous vs. Steubenville. Rolling Stone. Retrieved from https://www.rollingstone.com/culture/news/anonymous-vs-steubenville-20131127
  17. Lavoipierre, A. (2017, November 10). New revenge porn legislation to impose fines for abusers slated this year. ABC. http://www.abc.net.au/news/2017-11-10/new-revenge-porn-legislation-to-impose-civil-penalties/9138040
  18. Merelli, A. (2017). The University of Florida is allowing Richard Spencer to speak because it has to. Quartz. Retrieved from https://qz.com/1103619/the-university-of-florida-is-allowing-richard-spencer-to-speak-because-it-has-to/
  19. National Consortium for the Study of Terrorism and Responses to Terrorism (START). (2017). Global Terrorism Database [Data file]. Retrieved from https://www.start.umd.edu/gtd
  20. Phillips, W. (2011, December 5). LOLing at tragedy: Facebook trolls, memorial pages and resistance to grief online. First Monday. Retrieved from http://firstmonday.org/article/view/3168/3115
  21. Sanger-Katz, M. (2016, August 16). Is terrorism getting worse? In the West, yes. In the world, no. New York Times. Retrieved from https://www.nytimes.com/2016/08/16/upshot/is-terrorism-getting-worse-in-the-west-yes-in-the-world-no.html
  22. Solon, O. (2017, April 26). Live and death. The Guardian. Retrieved from https://www.theguardian.com/technology/2017/apr/25/facebook-live-mark-zuckerberg-murder-video-thailand
  23. The Guardian. (2017, April 18). Facebook’s Mark Zuckerberg on video killing: “We have a lot of work to do.” The Guardian. Retrieved from https://www.theguardian.com/technology/video/2017/apr/19/facebooks-mark-zuckerberg-on-video-killing-we-have-a-lot-of-work-to-do
  24. Turley, J. (2015, January 8). The biggest threat to French free speech isn’t terrorism. It’s the government. The Washington Post. Retrieved from https://www.washingtonpost.com/opinions/what-it-means-to-stand-with-charlie-hebdo/2015/01/08/ab416214-96e8-11e4-aabd-d0b93ff613d5_story.html?utm_term=.9943d75b7e4b
  25. Williams, J. (2017, November 21). Jennifer Lawrence’s nude photo leak in Fappening felt like a gang bang. Newsweek. Retrieved from http://www.newsweek.com/jennifer-lawrence-nude-photo-leak-718172
  26. Yann, H. (2017, April 17). White supremacist Richard Spencer denied at University of Florida. CNN. Retrieved from http://www.cnn.com/2017/08/16/us/richard-spencer-denied-at-university-of-florida-trnd/index.html
  27. Zimmerman, A., & Bustillo, M. (2011, October 21). Flash Robs Vex Retailers. The Wall Street Journal. Retreived from https://www.wsj.com/articles/SB10001424052970203752604576643422390552158

Academic References

  1. Barak, A. (2005). Sexual harassment on the Internet. Social Science Computer Review, 23(1), 77–92.CrossRefGoogle Scholar
  2. Barratt, J., & Bishop, J. (2015). The impacts of alcohol on e-dating activity: Increases in flame trolling corresponds with higher alcohol consumption. In J. Bishop (Ed.), Psychological and sociological implications surrounding internet gaming addiction (pp. 186–197). Hershey: Information Science Reference.CrossRefGoogle Scholar
  3. Bates, S. (2017). Revenge porn and mental health: A qualitative analysis of the mental health effects of revenge porn on female survivors. Feminist Criminology, 12(1), 22–42.Google Scholar
  4. Bishop, J. (2013). Examining the concepts, issues, and implications of internet trolling. Hershey: IGI Global.CrossRefGoogle Scholar
  5. Branch, K., Hilinski-Rosick, C. M., Johnson, E., & Solano, G. (2017). Revenge Porn Victimization of College Students in the United States: An Exploratory Analysis. International Journal of Cyber Criminology, 11(1), 128–142.Google Scholar
  6. Burden, K., & Palmer, C. (2003). Cyber crime: A new breed of criminal? Computer Law & Security Report, 19, 222–227.Google Scholar
  7. Burke, S. C., Wallen, M., Vail-Smith, K., & Knox, D. (2011). Using technology to control intimate partners: An exploratory study of college undergraduates. Computers in Human Behavior, 27(3), 1162–1167.Google Scholar
  8. Capeller, W. (2001). Not such a neat net: Some comments on virtual criminality. Social & Legal Studies, 10, 229–242.Google Scholar
  9. Chess, S., & Shaw, A. (2015). A conspiracy of fishes, or, how we learned to stop worrying about #gamergate and embrace hegemonic masculinity. Journal of Broadcasting & Electronic Media, 59(1), 208–220.CrossRefGoogle Scholar
  10. Citron, D. K. (2014). Hate crimes in cyberspace. Cambridge, MA: Harvard University Press.Google Scholar
  11. Coleman, G. (2014). Hacker, hoaxer, whistleblower, spy: The many faces of anonymous. Brooklyn: Verso.Google Scholar
  12. Cook, C., Schaafsma, J., & Antheunis, M. L. (2018). Under the bridge: An in-depth examination of online trolling in the gaming context. New Media & Society [Online]. Retrieved from http://journals.sagepub.com/doi/10.1177/1461444817748578
  13. Cyber Civil Rights. (n.d.). 38 States + DC have revenge porn laws. Retrieved from https://www.cybercivilrights.org/revenge-porn-laws/
  14. DeKeseredy, W., & Schwartz, M. (1998, February). Measuring the extent of woman abuse in intimate heterosexual relationships: A critique of the conflict tactics scale. Retrieved from http://vawnet.org/sites/default/files/materials/files/2016-09/AR_Ctscrit_0.pdf
  15. Dimond, J., Fiesler, C., & Bruckman, A. (2011). Domestic violence and information communication technologies. Interacting with Computers, 23(5), 413–421.Google Scholar
  16. Duwe, G. (2017b). The patterns and prevalence of mass public shootings in the United States, 1915–2013. In L. C. Wilson (Ed.), The Wiley handbook of the psychology of mass shootings (pp. 20–35). West Sussex: Wiley Blackwell.Google Scholar
  17. Eaton, A. A., Jacobs, H., & Ruvalcaba, Y. (2017). 2017 Nationwide online study of nonconsensual porn victimization and perpetration: A summary report. Cyber Civil Rights Initiative. Retrieved from https://www.cybercivilrights.org/wp-content/uploads/2017/06/CCRI-2017-Research-Report.pdf
  18. FBI. (2017). Terrorism. Federal Bureau of Investigations. Retrieved from https://www.fbi.gov/investigate/terrorism
  19. Findlaw.com. (2017). Internet trolls can be prosecuted under Australian Law. Retrieved from http://www.findlaw.com.au/articles/4259/internet-trolls-can-be-prosecuted-under-australian.aspx
  20. Franklin. (2017). Justice for revenge porn victims: Legal theories to overcome claims of civil immunity by operators of revenge porn websites. California Law Review, 102, 1303–1335.Google Scholar
  21. Furnell, S. (2002). Cybercrime: Vandalizing the information society. London, UK: AddisonWesley.Google Scholar
  22. Gámez-Guadix, M., Almendros, C., Borrajo, E., & Calvete, E. (2015). Prevalence and association of sexting and online sexual victimization among Spanish adults. Sexuality Research and Social Policy, 12(2), 145–154.CrossRefGoogle Scholar
  23. Garcia, A., Mirra, N., Morrell, E., Martinez, A., & Scorza, D. A. (2015). The council of youth research: Critical literacy and civic agency in the digital age. Reading & Writing Quarterly, 31(2), 151–167.Google Scholar
  24. Garett, R., Lord, L. R., & Young, S. D. (2016). Associations between social media and cyberbullying: A review of the literature. MHealth online. Retrieved from http://mhealth.amegroups.com/article/view/12924/13218
  25. Grabosky, P. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10, 243–249.Google Scholar
  26. Hare, I., & Weinstein, J. (Eds.). (2009). Extreme speech and democracy. Oxford: Oxford University Press.Google Scholar
  27. Hayes, R. M., & Dragewiecz, M. (submitted). Dick pics: Exhibitionism or entitlement? Women’s Studies International Forum. Google Scholar
  28. Henry, N., & Powell, A. (2015). Embodied harms: Gender, shame, and technology facilitated sexual violence. Violence Against Women, 21(6), 758–779.CrossRefGoogle Scholar
  29. Henry, N., & Powell, A. (2016a). Technology-facilitated sexual violence: A literature review of empirical research. Trauma, Violence and Abuse, 19(2), 1–14.Google Scholar
  30. Henry, N., & Powell, A. (2016b). Sexual violence in the digital age: The scope and limits of criminal law. Social & Legal Studies, 25(4), 1–22.CrossRefGoogle Scholar
  31. Henry, N., Powell, A., & Flynn, A. (2017). Not just ‘revenge pornography’: Australian’s experiences of image-based abuse. Melbourne, Australia: RMIT University. Retrieved from: https://www.rmit.edu.au/content/dam/rmit/documents/college-of-design-and-socialcontext/schools/global-urban-and-social-studies/revenge_porn_report_2017.pdf
  32. Hinduja, S., & Patchin, J. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2), 129–156.CrossRefGoogle Scholar
  33. Hinduja, S., & Patchin, J. W. (2015). Bullying beyond the schoolyard: Preventing and responding to cyberbullying (2nd ed.). Thousand Oaks: Sage.Google Scholar
  34. Jane, E. A. (2017). Misogyny online: A short (and brutish) history. Sage Publications.Google Scholar
  35. Kelly, L. (1988). Surviving sexual violence. Cambridge, UK: Polity Press.Google Scholar
  36. Klausen, J. (2015). Tweeting the jihad. Studies in Conflict and Terrorism, 38(1), 1–22.CrossRefGoogle Scholar
  37. Lankford, A., & Madfis, E. (2017). Don’t name them, don’t show them, but report everything else: A pragmatic proposal for denying mass killers the attention they seek and deterring future offenders. American Behavioral Scientist. https://doi.org/10.1177/0002764217730854.
  38. Legal Dictionary. (n.d.). Cyberstalking. Retrieved from https://legaldictionary.net/cyberstalking
  39. Lenhart, A., Ybarra, M., & Price-Feeney, M. (2016). Nonconsensual image sharing: One in 25 Americans has been a victim of ‘revenge porn’. LenRetrieved from https://datasociety.net/pubs/oh/Nonconsensual_Image_Sharing_2016.pdf
  40. Lenhart, A., Ybarra, M., Zickuhr, K., & Price-Feeney, M. (2016). Online harassment, digital abuse, and cyberstalking in America. Data & Society Research Institute Report 11.21.16. Retrieved from https://www.datasociety.net/pubs/oh/Online_Harassment_2016.pdf
  41. Lindgren, S., & Lundstrom, R. (2011). Pirate culture and hacktivist mobilization: The cultural and social protocols of #Wikileaks on twitter. New Media & Society, 13(6), 999–1018.CrossRefGoogle Scholar
  42. Marcum, C., Ricketts, M., & Higgins, G. (2010). Assessing sex experiences of online victimization: An examination of adolescent online behaviors using Routine Activity Theory’. Criminal Justice Review, 35(4), 412–437.Google Scholar
  43. Martin, J., & Alaggia, R. (2013). Sexual abuse images in cyberspace: Expanding the ecology of the child. Journal of Child Sexual Abuse, 22(4), 398–415.Google Scholar
  44. Marwick, A., & Lewis, R. (n.d.). Media manipulation and disinformation online. Retrieved from https://datasociety.net/pubs/oh/DataAndSociety_MediaManipulationAndDisinformationOnline.pdf
  45. McAfee. (2013). Lovers beware: Scorned exes nay share intimate data and images online. Retrieved from http://mcafee.com/au/about/news/2013/q1/20130204-01.aspx
  46. McGlynn, C., & Rackley, E. (2015). Image-based sexual abuse: More than just revenge porn. Retrieved from https://claremcglynn.files.wordpress.com/2015/10/imagebasedsexualabuse-mcglynnrackley-briefing.pdf
  47. McGlynn, C., & Rackley, E. (2017). Image-based sexual abuse. Oxford Journal of Legal Studies, 37(3), 534–561.CrossRefGoogle Scholar
  48. McGlynn, C., Rackley, E., & Houghton, R. (2017). Beyond “revenge porn”: The continuum of image-based sexual abuse. SSRN. Retrieved from https://ssrn.com/abstract=2929257
  49. Mitchell, K. J., Jones, L. M., Finkelhor, D., & Wolak, J. (2011). Internet-facilitated commercial sexual exploitation of children: Findings from a nationally representative sample of law enforcement agencies in the United States’. Sexual Abuse, 23(1), 43–71.Google Scholar
  50. Mitchell, K. J., Finkelhor, D., Jones, L. M., & Wolak, J. (2012). Prevalence and characteristics of youth sexting: A national study. Pediatrics, 129(1), 1–10.CrossRefGoogle Scholar
  51. Morelli, M., Bianchi, D., Baiocco, R., Pezzuti, L., & Chirumbolo, A. (2016). Sexting, psychological distress and dating violence among adolescents and young adults. Psicothema, 28(2), 137–142.Google Scholar
  52. Patchin, J. W., & Hinduja, S. (2006). Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth Violence and Juvenile Justice, 4(2), 148–169.CrossRefGoogle Scholar
  53. Pease, K. (2001). Crime futures and foresight: Challenging criminal behaviour in the information age. In D. Wall (Ed.), Crime and the Internet (pp. 18–28). London, UK: Routledge.Google Scholar
  54. Phillips, W. (2015). This is why we can’t have nice things: Mapping the relationship between online trolling and mainstream culture. Cambridge, MA: MIT Press.Google Scholar
  55. Powell, A., & Henry, N. (2016). Policing technology-facilitated sexual violence against adult victims: Police and service sector perspectives. Policing & Society, 28(3), 1–17.Google Scholar
  56. Powell, A., & Henry, N. (2017). Sexual violence and harassment in the digital era. In A. Deckert & R. Sarre (Eds.), The Australian and New Zealand handbook of criminology, crime and justice. Basingstoke, UK: Palgrave Macmillan.Google Scholar
  57. Pozza, V., Di Pietro, A., Morel, S., & Psaila, E. (2016). Cyberbullying among young people. European Parliament Think Tank. Retrieved from http://www.europarl.europa.eu/thinktank/en/document.html?reference=IPOL_STU(2016)571367
  58. Prasad, S. T. (2014). Ethical hacking and types of hackers. International Journal of Emerging Technology in Computer Science and Electronics, 11(2), 24–27.Google Scholar
  59. Reyns, B. W., Burek, M. W., Henson, B., & Fisher, B. S. (2013). The unintended consequences of digital technology: Exploring the relationship between sexting and cybervictimization. Journal of Crime and Justice, 36(1), 1–17.Google Scholar
  60. Salter, M. (2017). Crime, justice & social media. Oxon: Routledge.Google Scholar
  61. Sheridan, L. P. & Grant, T. D. (2007). Is Cyberstalking Different? Psychology, Crime and Law, 13(6), 627–640.Google Scholar
  62. Siegel, L. (2015). Criminology: Theories, patterns, and typologies. Boston: Cengage Learning.Google Scholar
  63. Spitzberg, B.H. & Hoobler, G. (2002. Cyberstalking and the technologies of interpersonal terrorism. New Media & Society, 4(1), 71–92.Google Scholar
  64. Staude-Müller, F., Hansen, B., & Voss, M. (2012). How stressful is online victimization? Effects of victim’s personality and properties of the incident. European Journal of Developmental Psychology, 9(2), 260–274.CrossRefGoogle Scholar
  65. Stevens, H., & Aggarwal, P. (2017, April). What’s it like to get trolled all day long. Hindustan Times. Retrieved from https://www.hindustantimes.com/interactives/lets-talk-about-trolls/whats-it-like-to-get-trolled-all-day-long/
  66. Stonard K. E., Bowen E., Lawrence T. R., & Price S. A. (2014). The relevance of technology to the nature, prevalence and impact of adolescent dating violence and abuse: A research synthesis. Aggression and Violent Behavior, 19(4), 390–417.Google Scholar
  67. Straus, M. A., Hamby, S. L., Boney-McCoy, S., & Sugarman, D. B. (1995). The revised conflict tactics scales (CTS2-form A). Durham: Family Research Laboratory.Google Scholar
  68. Stryker, C. (2011). Epic win for anonymous: An online army conquers the web. New York: The Overlook Press.Google Scholar
  69. Surette, R. (2015). Media, crime, & criminal justice: Images, realities, and policies (5th ed.). Stamford: Cengage Learning.Google Scholar
  70. Synder, F. (2001). Sites of criminality and sites of governance. Social & Legal Studies, 10, 251–256.Google Scholar
  71. Thompson, M. P., & Morrison, D. J. (2013). Prospective predictors of technology-based sexual coercion by college males. Psychology of Violence, 3(3), 233–246.Google Scholar
  72. Trottier, D., & Fuchs, C. (2015). Social media, politics and the state: Protests, revolutions, riots, crime and policing in the age of Facebook, Twitter, and Youtube. New York: Routledge.Google Scholar
  73. Tyler Clementi Foundation. (2017). Tyler’s story. Retrieved from https://tylerclementi.org/tylers-story/
  74. United States Department of Justice. (2017). Winchester man sentenced to 24 months for illegally hacking into website and lying to federal agents. Retrieved from https://www.justice.gov/usao-edky/pr/winchester-man-sentenced-24-months-illegally-hacking-website-and-lying-federal-agents
  75. Wall, D. (2001). Crime and the Internet. London: Routledge.Google Scholar
  76. Westlake, B. G., & Bouchard, M. (2016). Criminal careers in cyberspace: Examining website failure within child exploitation networks. Justice Quarterly, 33(7), 1154–1181.Google Scholar
  77. Woodlock, D. (2016). The abuse of technology in domestic violence and stalking. Violence Against Women, OnlineFirst.Google Scholar
  78. World Health Organization (WHO) (2002). World report on violence and health. Geneva: World Health Organization.Google Scholar
  79. World Health Organization (WHO) (2013). Global and regional estimates of violence against women: Prevalence and health effects.Google Scholar
  80. Wu, P. (2015). Impossible to regulate: Social media, terrorists, and the role for the U.N. Chicago Journal of International Law, 16(1), Article 11. Retrieved from https://chicagounbound.uchicago.edu/cgi/viewcontent.cgi?article=1690&context=cjil
  81. Yar, M. (2005). The novelty of ‘cybercrime’: An assessment in light of routine activity. European Journal of Criminology, 2, 407–427.Google Scholar
  82. Yar, M. (2012). Crime, media, and the will-to-representation: Reconsidering relationships in the social media age. Crime, Media & Culture, 8(3), 245–260.CrossRefGoogle Scholar
  83. Zweig J., Dank M., Yahner J., Lachman P. (2013). The rate of cyber dating abuse among teens and how it relates to other forms of teen dating violence’. Journal of Youth and Adolescence, 42(7), 1063–1077.Google Scholar

Copyright information

© The Author(s) 2018

Authors and Affiliations

  • Rebecca M. Hayes
    • 1
  • Kate Luther
    • 2
  1. 1.Central Michigan UniversityMount PleasantUSA
  2. 2.Pacific Lutheran UniversityTacomaUSA

Personalised recommendations