Chapter 4 Flashcards
What are the 5 different relationships that can exist in the media-deviance nexus?
- The media causes deviance.
- The media socially constructs deviance/normality.
- The media is used as a tool for committing deviant acts.
- The media is used as a site where the deviance dance is played out.
- The media is deviantized itself and is subjected to measures of social control.
What assumption does administrative research rely on to come to the conclusion that media causes deviance?
The content of the media messages has an effect on individuals’ thoughts, feelings, and behaviours.
Is the effect of media on people the same across the board?
No, different people are impacted by media differently.
True or false? Violence in the media has been found to have some impact on aggressive behaviour in the real world in all people.
False, it is only shown in some people.
___ research on media studies says that media causes deviance.
Administrative.
___ research on media studies says that media constructs deviance and normality.
Critical.
Critical research on media studies says that media constructs deviance and normality. This rests on the assumption that…
The media influences the culture as a whole (not individuals) through its power to define boundaries, identify social problems, and shape public debates.
How does the media construct deviance and normality?
Media shapes the dominant moral codes that govern what is perceived as acceptable and unacceptable behaviour, characteristics, and people.
Cyberdeviance
Deviant acts that are committed using a computer.
Give an example of deviance that can only happen in the cyber world:
Creating/spreading viruses and malware or using someone else’s wireless signal.
Give an example of deviance that can occur both online and in the real world:
Bullying, watching pornography.
Which demographic was most likely to be victimized by cyber deviance?
Those engaged in cyber deviance themselves. Downloading music illegally, using someone else’s wireless signal, accessing computer files without permission, etc.
Hackers
People who access computer systems without authorization and sometimes use that access for malicious purposes.
What are two ways that hackers use computer?
As a means of attack, and of communicating with other hackers.
What are the five normative orders that characterize that characterize the hacker subculture?
Technology, knowledge, commitment, categorization, and law.
Hackers and technology:
Express a deep overriding interest in understanding and manipulating technology, which they report emerging from an early age. Use forums to obtain technical skills.
Hackers and knowledge:
Continuous quest for knowledge. Hackers define themselves as people in pursuit of knowledge, and different labels are applied to individuals with varying levels of knowledge.
What are hackers with lots or knowledge called?
Elite hackers, 1337, or leet.
What are hackers with simplistic hacking activities called?
Script kiddies of noobs.