Advertisement

Challenging the Risks in Online Medicine Purchasing: Respectable Deviance

  • Lisa Sugiura
Chapter
Part of the Palgrave Studies in Cybercrime and Cybersecurity book series (PSCYBER)

Abstract

This chapter focuses on the risks in online medicine purchasing and utilises a theoretical framework – respectable deviance to underpin how the risks are challenged. Incorporating three stages involving the construction of deviance, the justification of deviance and the management of respectability, respectable deviance provides insight into how online medicine consumers account for their activity, which sometimes transgresses regulation and disputes authority.

Keywords

Risks Respectable deviance Techniques of neutralization Dramaturgy Medicines 

Bibliography

  1. Bakardjieva, M. (2011). The internet in everyday life: Exploring the tenets and contributions of diverse approaches. In The handbook of internet studies (Vol. 11, p. 59). Oxford: Wiley-Blackwell.CrossRefGoogle Scholar
  2. Banks, I., Jackson, G., & Patel, S. (2009). Consumer attitudes toward counterfeit medications. The Journal of Sexual Medicine, 6(Suppl. 5), 446.Google Scholar
  3. Bart, Y., Shankar, V., Sultan, F., & Urban, G. L. (2005). Are the drivers and role of online trust the same for all web sites and consumers? A large-scale exploratory empirical study. Journal of Marketing, 69(4), 133–152.CrossRefGoogle Scholar
  4. Beck, U. (1992). Risk society: Towards a new modernity. London: Sage.Google Scholar
  5. Becker, H. (1963). Outsiders: Studies in the sociology of deviance. New York: The Free Press.Google Scholar
  6. Bowker, A. L. (1999). Juveniles and computers: Should we be concerned. Federal Probation, 63, 40.Google Scholar
  7. Box, S. (1983). Crime, power and mystification. London: Tavistock.CrossRefGoogle Scholar
  8. Castells, M. (2001). The internet galaxy, reflections on the internet, business and society. Oxford: Oxford University Press.Google Scholar
  9. Chambliss, W. J. (1975). Toward a political economy of crime. Theory and Society, 2(1), 149–170.CrossRefGoogle Scholar
  10. Cohen, S. (1972). Folk devils and moral panics. London: MacGibbon and Kee Ltd.Google Scholar
  11. Cohen, S. (2001). States of denial: Knowing about atrocities and suffering. Malden: Blackwell.Google Scholar
  12. Cornish, D. B., & Clarke, R. V. (1987). Understanding crime displacement: An application of rational choice theory. Criminology, 25(4), 933–948.CrossRefGoogle Scholar
  13. Downes, D. M., & Rock, P. (2011). Understanding deviance: A guide to the sociology of crime and rule-breaking. New York: Oxford University Press.Google Scholar
  14. Egger, F. N. (2001, June). Affective design of e-commerce user interfaces: How to maximise perceived trustworthiness. In Proceedings of the international conference on Affective Human Factors Design, Singapore, pp. 317–324.Google Scholar
  15. Felson, M. (1998). Crime and everyday life (2nd ed.). Thousand Oaks: Pine Forge Press.Google Scholar
  16. Ferrell, J. (2005). The only possible adventure: Edgework and anarchy. In Edgework: The sociology of risk-taking (pp. 75–88). New York: Routledge.Google Scholar
  17. Ferrell, J., Hayward, K., & Young, J. (2008). Cultural criminology: An invitation. London: Sage.Google Scholar
  18. Fox, N. J. (1997). Space, sterility and surgery: Circuits of hygiene in the operating theatre. Social Science & Medicine, 45(5), 649–657.CrossRefGoogle Scholar
  19. Fox, N., Ward, K., & O’Rourke, A. (2005). Pro-anorexia, weight-loss drugs and the Internet: An ‘anti-recovery’ explanatory model of anorexia. Sociology of Health & Illness, 27, 944–971. ISSN 0141–9889.Google Scholar
  20. Frericks, P., Maier, R., & de Graaf, W. (2009). Toward a neoliberal Europe? Pension reforms and transformed citizenship. Administration & Society, 41(2), 135–157.CrossRefGoogle Scholar
  21. Giddens, A. (1990). The consequences of modernity. Cambridge: Polity Press.Google Scholar
  22. Goffman, E. (1959). The presentation of self in everyday life. New York: Garden City.Google Scholar
  23. Goffman, E. (1963). Stigma: Notes on the management of spoiled identity. New York: Touchstone.Google Scholar
  24. Goffman, E. (1968). Asylums: Essays on the social situation of mental patients and other inmates. New Brunswick: AldineTransaction.Google Scholar
  25. Goffman, E. (1981). Forms of talk. Philadelphia: University of Pennsylvania Press.Google Scholar
  26. Gurau, C. (2005). Pharmaceutical marketing on the internet. Journal of Consumer Marketing, 22(7), 421–428.CrossRefGoogle Scholar
  27. Haythornthwaite, C. A., & Wellman, B. (Eds.). (2002). The Internet in everyday life (pp. 3–42). Oxford: Blackwell.Google Scholar
  28. Jensen, G. F. (2007). The sociology of deviance. In The handbook of 21st century sociology. Thousand Oaks: Sage.Google Scholar
  29. Jewkes, Y. (2010). Media & crime. London: Sage.Google Scholar
  30. Johnson, J. L., Bottorff, J. L., Browne, A. J., Grewal, S., Hilton, B. A., & Clarke, H. (2004). Othering and being othered in the context of health care services. Health Communication, 16(2), 255–271.CrossRefGoogle Scholar
  31. Karstedt, S., & Farrall, S. (2007). Law-abiding majority? The everyday crimes of the middle classes. Crime and Society [Online]. http://www.crimeandjustice.org.uk/opus45/Law_abiding_Majority_FINAL_VERSION.pdf
  32. Katz, J. (1988). Seductions of crime: The sensual and moral attractions of doing evil. New York: Basic.Google Scholar
  33. Katz, J. (1999). How emotions work. Chicago: University of Chicago Press.Google Scholar
  34. Lea, J., & Young, J. (1984). What is to be done about law and order? (p. 54). Harmondsworth: Penguin Books.Google Scholar
  35. Lemert, E. M. (1951). Social pathology: A systematic approach to the theory of sociopathic behavior. New York: McGraw-Hill.Google Scholar
  36. Liang, B. A., & Mackey, T. (2011). Direct-to-consumer advertising with interactive internet media: Global regulation and public health issues. JAMA, 305(8), 824–825.CrossRefGoogle Scholar
  37. Liazos, A. (1972). The poverty of the sociology of deviance: Nuts, sluts, and perverts. Social Problems, 20(1), 103–120.CrossRefGoogle Scholar
  38. Lyng, S. (1990). Edgework: A social psychological analysis of voluntary risk taking. American Journal of Sociology, 95(4), 876–921.CrossRefGoogle Scholar
  39. Mackey, T. K., & Liang, B. A. (2011). The global counterfeit drug trade: Patient safety and public health risks. Journal of Pharmaceutical Sciences, 100(11), 4571–4579.CrossRefGoogle Scholar
  40. Maruna, S., & Copes, H. (2005). What have we learned from five decades of neutralization research? Crime and Justice, 32, 221–320.CrossRefGoogle Scholar
  41. Matza, D. (1964). Delinquency and drift: From the research program of the center for the study of law and society. New York: Wiley.Google Scholar
  42. Matza, D. (1969). Becoming deviant. Englewood Cliffs: Prentice-Hall.Google Scholar
  43. Matza, D., & Sykes, G. M. (1961). Juvenile delinquency and subterranean values. American Sociological Review, 26(5), 712–719.CrossRefGoogle Scholar
  44. Mills, C. W. (1940). Situated actions and vocabularies of motive. American Sociological Review, 5(6), 904–913.CrossRefGoogle Scholar
  45. Mitchell, K. (2001). Transnationalism, neo-liberalism, and the rise of the shadow state. Economy and Society, 30(2), 165–189.CrossRefGoogle Scholar
  46. Mudge, S. L. (2008). What is neo-liberalism? Socio-Economic Review, 6(4), 703–731.CrossRefGoogle Scholar
  47. Mythen, G. (2004). Ulrich Beck: A critical introduction to the risk society. London: Pluto Press.Google Scholar
  48. Parker, H., Williams, L., & Aldridge, J. (2002). The normalization of ‘sensible’ recreational drug use: Further evidence from the North West England longitudinal study. Sociology, 36(4), 941–964.CrossRefGoogle Scholar
  49. Pearson, G. (1983). Hooligan: A history of respectable fears. London: Macmillan.CrossRefGoogle Scholar
  50. Plummer, K. (1979). Misunderstanding labelling perspectives. In Deviant interpretations (pp. 85–121). New York: Barnes & Noble.Google Scholar
  51. Pope, C. (2002). Contingency in everyday surgical work. Sociology of Health & Illness, 24(4), 369–384.CrossRefGoogle Scholar
  52. Presdee, M. (2003). Cultural criminology and the carnival of crime. London: Routledge.Google Scholar
  53. Presser, L., & Sandberg, S. (2015). Research strategies for narrative criminology. Qualitative Research in Criminology, 1, 85.Google Scholar
  54. Riegelsberger, J., & Sasse, M. A. (2001). Trustbuilders and trustbusters. In Towards the E-Society (pp. 17–30). Springer.Google Scholar
  55. Riegelsberger, J., Sasse, M. A., & McCarthy, J. D. (2005). The mechanics of trust: A framework for research and design. International Journal of Human-Computer Studies, 62(3), 381–422.CrossRefGoogle Scholar
  56. Rubington, E., & Weinberg, M. S. (2007). Deviance: The interactionist perspective. Boston: Allyn & Bacon.Google Scholar
  57. Sartre, J. P. (2003). The emotions: Outline of a theory. New York: Citadel Press.Google Scholar
  58. Schur, E. M. (1979). Interpreting deviance: A sociological introduction. New York: Harper & Row.Google Scholar
  59. Schur, E. M. (1980). The politics of deviance: Stigma contests and the uses of power. Englewood Cliffs: Prentice Hall.Google Scholar
  60. Scott, M. B., & Lyman, S. M. (1968). Accounts. American Sociological Review, 33(1), 46–62.Google Scholar
  61. Shneiderman, B. (2000). Designing trust into online experiences. Communications of the ACM, 43(12), 57–59.CrossRefGoogle Scholar
  62. Stenson, K. M., & Cowell, D. (Eds.). (1991). The politics of crime control. Oxon: Sage.Google Scholar
  63. Stenson, K., & Sullivan, R. R. (Eds.). (2012). Crime, risk and justice. London: Routledge.Google Scholar
  64. Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22, 664–670.CrossRefGoogle Scholar
  65. Taylor, I., Walton, P., & Young, J. (1973). The new criminology: For a social theory of deviance. London: Routledge.CrossRefGoogle Scholar
  66. Turkle, S. (1995). Life on the screen: Identity in the age of the internet. New York: Simon and Schuster.Google Scholar
  67. Wall, D. (2001). Maintaining order and law on the internet. In Crime and the internet (p. 167). London: Routledge.Google Scholar
  68. Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age (Vol. 4). Cambridge: Polity.Google Scholar
  69. Webber, C. (2007). Revaluating relative deprivation theory. Theoretical Criminology, 11(1), 97–120.CrossRefGoogle Scholar
  70. Weis, L. (1995). Identity formation and the processes of ‘othering’: Unraveling sexual threads. Educational Foundations, 9(1), 17–33.Google Scholar
  71. World Health Organisation. (2009). International Medical Products Anti-Counterfeiting Taskforce — IMPACT. http://www.who.int/impact/en/
  72. World Health Organisation. (2010a). ATLAS eHealth country profiles: Based on the findings of the second global survey on eHealth, Global observatory for eHealth series (Vol. 1). Geneva: World Health Organization.Google Scholar
  73. World Health Organisation. (2010b). Medicines: Counterfeit medicines. Fact sheet No. 275. http://www.who.int/mediacentre/factsheets/fs275/en/. Accessed Feb 2012.
  74. Yar, M. (2014). Crime, deviance and doping: Fallen sports stars, autobiography and the management of stigma. Basingstoke: Palgrave Macmillan.CrossRefGoogle Scholar
  75. Young, J. (2003). Merton with energy, Katz with structure: The sociology of vindictiveness and the criminology of transgression. Theoretical Criminology, 7(3), 388–414.CrossRefGoogle Scholar

Copyright information

© The Author(s) 2018

Authors and Affiliations

  • Lisa Sugiura
    • 1
  1. 1.University of PortsmouthPortsmouthUK

Personalised recommendations