Sunday, 11 September 2011


By  Anindya Datta, Lecturer, Department of sociology  , Maharani Kasiswari College.

And
Dr. Anirban Banerjee, Professor and Head of the Department of Sociology,
the University of Burdwan.
                                             (E-mail : anirban_2banerjee1961@yahoo.co.in


Abstract 
Interaction through Internet and other CMC (Computer Mediated Communication) technologies have fostered a significant change in the cultural dimension of society. The distinct cult of virtual interaction has made possible a prolific emergence of object-specific global community. This new global community operates on the basis of virtual reality and thus, this virtual community poses significant theoretical and socio-political challenges attributable to a social space populated by "body-less" beings. Claims are made about the positive and transformative impacts of cyberspace on sexism and racism as individuals are able to leave their identities behind and interact on the computer free from prejudicial constraints.  While there is no doubt these positive traits are part of the cyberspace revolution, numerous scholars have also focused upon the darker side of new communications technologies and the ways in which the Internet can be used to commit criminal acts and perpetuate deviant behaviours.       


The intention of this article is to assess, extend, and improve our understanding of 'deviant' behaviours on the Internet. Across the globe, there are increasing legislative, technological and surveillance efforts - all seemingly aimed at deviant (and sometime benign) Internet use. Not only does the Internet pose novel challenges in affording new forms of 'deviance' that need to be understood, but it also poses a unique opportunity for social scientists to influence policy aimed at such 'deviance', investigate specific cases of 'deviant' behaviour, as well as theoretical work that discusses the notion of deviance as applied to the Internet, policy and legal implications and methodologies. 


 Deviance and cyber deviance.
Deviance is any behaviour that violates social  as well as cultural norms including formally-enacted rules (e.g., crime) as well as informal violations of social norms (e.g., rejecting folkways and mores)., and is usually of sufficient severity to warrant disapproval from the majority of society. Alcoholism, excessive gambling, being nude in public places, playing with fire, stealing, lying, refusing to bathe, purchasing the services of prostitutes, and cross-dressing—to name only a few—as deviant. People who engage in deviant behaviour are referred to as deviants. Viewing deviance as a violation of social norms, sociologists have characterized it as "any thought, feeling or action that members of a social group judge to be a violation of their values or rules"; "violation of the norms of a society or group"; "conduct that violates definitions of appropriate and inappropriate conduct shared by the members of a social system"; "the departure of certain types of behaviour from the norms of a particular society at a particular time"; and "violation of certain types of group norms [... where] behaviour is in a disapproved direction and of sufficient degree to exceed the tolerance limit of the community.
Thus, deviance may better be described as a violation of social norms which are the specific behavioural standards, ways in which people are supposed to act, paradigms for predictable behaviour in society. This definition can ,however, be interpreted in different ways for the reason that social norms are different in one culture as opposed to another ; because, they are “rules of conduct, not neutral or universal, but ever changing; shifting as society shifts; mutable, emergent, loose, reflective of inherent biases and interests, and highly selfish and one-sided. They vary from class to class, and in the generational "gap." They are, in other words, contextual”. Thus, a deviant act can be committed in one society or culture that breaks a social norm there, but may be considered normal for another culture and society. Some acts of deviance may be criminal acts, but also, according to the society or culture, deviance can be strictly breaking social norms that are intact.

Cyberdeviance is an action that breaks Internet rules and norms; including, but not necessarily, committing illegal acts, ranging from destroying files to netiquette( Netiquette is the mores and norms that regulate considerate and appropriate behaviour on the Internet.) The deviant acts commonly found in the cyber community include profanity, harassment, vandalism, and obscenity. Perpetrators are less committed to maintain their online reputation and less attached to the online community. Hence, they are less likely to be involved in conventional activity and less likely to believe and follow community rules. Moreover, anonymity and the liminal (i.e., a quality that contributes to disinhibition in the online community) aspects of cyber community facilitate antisocial behaviour.  In short, people who are subject to weak social bonds and whose self-control is reduced by liminality and anonymity are more likely to commit deviant acts in cyber community. Nevertheless, these people also are unlikely to commit more serious acts, for the weak bonds do not allow them to be familiarized with the environment and potential victims, which in turn confine the scale of their deviance.




Insinuations for Radicalization
The Internet is well suited to support deviant lifestyles and behaviours because it is unregulated, information is privately posted and can be obtained freely and anonymously, and it connects individuals with others who practice the same deviant behaviour. What is less known is the extent to which any of these types of Web sites serve as gateways or catalysts into more active participation of a particular deviant impulse or tendency. Cyber culture perpetuates and encourages the idea that deviance is a social construction and what constitutes deviant behaviour may shift, as like-minded people are able to share their experiences.  It would seem that sexual deviance, as defined in the mainstream world, is especially up for seizing on the Internet. The availability of websites where men can rate prostitutes serves to construct “countercultures, in which ignominious practices are accepted as the norm and are entirely without stigma, in which one may participate without threat to one’s ‘normal’ identity”.  In their view, the Internet has perpetuated and perhaps even enhanced the empowerment of men who pay for sex while at the same time creating a discursive space that perpetuates the more traditional relationship of power between the punter and the prostitute.
            Internet allows for the construction of spaces where individuals can explore otherwise sexually deviant behaviours. The evidence suggests that many women and men are willing to explore the possibilities of bisexuality within an Internet environment, behaviour they would be less likely to consider in the “real” world .Thus, not only do these behaviours tell us something about the way the Internet allows individuals to experiment with identity, but also support the idea that identities are complex, multifaceted, and with the help of the Internet, not completely linked to a corporeal body.3
       Various micro level and macro level factors should be considered in the context of online deviance. The self-harm and sexual deviance literature shows how individual characteristics (e.g., loneliness, psychoticism, low self-control, poor social ties) are risk factors for online deviance, ranging from viewing soft-core pornography to engaging in self-injury. The online hate group literature suggests that macro-level contexts that make groups of individuals vulnerable socially, economically, and psychologically could provide a breeding ground for recruiting individuals into potentially violent movements, particularly for young people. This would be especially salient in areas where there is abject, widespread poverty, war, or some catastrophic event with long-lasting devastating effects . As fringe groups gain more traction in terms of numbers of Web sites and contacts made through these Web sites, individuals who would otherwise be disinhibited by their proclivities (e.g., cutters, white supremacists) may begin to feel even more empowered to act on their impulses and beliefs. Insofar as the Internet serves as a forum for groups to discuss goals, disagreements, and compromises, the open format of the Internet also permits law enforcement to monitor key changes and divergences within groups that are suspected of illegal or violent behaviours (Weimann, 2006). Although the Internet is a powerful tool for connecting people and rapidly spreading information, it is doubtful that most groups would rely solely on the Internet for communication and organization efforts. This may be particularly true for those groups that are set up for violent ends, given the risks for outside monitoring and sabotage. It is probable that groups are increasingly embracing other technologies, such as text messaging through cellular phones and Twitter. As a result, monitoring these emerging networks in real time—in addition to Internet monitoring—may be the most effective means for preventing extreme deviant (i.e., criminal) acts.8
                   A recent literature review of the Internet’s impact on sexuality in general concluded that “sexually related online activities have become routine in recent years for large segments of the population in the Western world” (Dohring, 2009, p. 1089). The impact of the Internet on the pornography industry alone is staggering. Quinn and Forsyth (2005, p. 192) cite that in a given year, Internet pornography is a $3 billion industry, with about 4.5 million Web sites containing pornographic content, encompassing 25% of total search engine requests, and with more than 75 million people accessing pornographic sites. A recent experiment yielded the conclusion that many casual Web surfers are easily tempted by hardcore pornography. Specifically, Demetriou and Silke (2003) developed a dummy Web site which was advertised on other sites as having free software downloads. The goal was to see how many visitors tried to access the illegal or deviant materials linked on the Web site (which did not work). In an 88- day period, more than half of the Web site’s visitors (457 of the 803) tried to access the hardcore pornographic images, although they originally entered the Web site for other reasons.
Other studies have attempted to understand the correlates of online consumers of pornography in general. For example, some sociological research suggests associations of online pornography with unhappy marriages and weak ties to religion among adults (Stack,Wasserman, & Kern, 2004) and poor social ties to family, school, and society among adolescents (Mesch, 2009). A psychologically based study found that adolescent participants scoring high in psychoticism used the Internet in deviant and defiant ways, including viewing pornography (Amiel & Sargent, 2004). For those on the far end of the sexual deviance spectrum, the versatility, speed, and visual medium offered by the Internet are well suited for consumers who reach new extremes quickly (Durkin, Forsyth, & Quinn, 2006; Quinn & Forsyth, 2005). One of the most provocative and well-researched areas within the online sexual deviance literature is pedophilia.Typologies of online pedophiles (e.g., Beech, Elliott, Birgden, & Findlater, 2008; Krone, 2004;Lanning, 2001) and theories to explain the etiology of online pedophilia (Elliott & Beech, 2009)have been proposed, while others have examined how the Internet domain is used among communities of pedophiles (e.g., Durkin, 1997). It is generally agreed that the Internet connects pedophiles such that they can rapidly exchange images, locate and groom victims,and maintain and develop networks (Beech, Elliott, Birgden, & Findlater, 2008; Durkin, Forsyth,& Quinn, 2006). Durkin and colleagues (2006, p. 599) note the prominent role the Internet plays in affirming and validating identities of pedophiles, and in serving as a platform to recruit those who have a proclivity toward pedophilia. The vast proliferation of online child pornography indicates a fairly substantial group of consumers who are increasingly becoming more extreme in their tastes (Beech, Elliott, Birgden, & Findlater, 2008).

Surveillance:
Several efforts are now directed towards the surveillance of deviant activities of members of cyber society. Governments are very much sensitive about the issues of cyber deviance  and much of their endeavours are directed towards bringing such issues under the purview of law. Consequently, a bunch of Cyber laws have been enacted. The main function of Net dogs is to vigil carefully that any such incidents should not inspire cyber people to commit such crimes.
     The surveillance primarily involves the monitoring of data and traffic on the Internet. Under the Communications Assistance For Law Enforcement Act in US, all phone calls and broadband internet traffic (emails, web traffic, instant messaging, etc.) are accessible for unimpeded real-time monitoring by Federal law enforcement agencies. Billions of dollars per year are spent, by agencies such as the Information Awareness Office, NSA, and the FBI, to develop, purchase, implement, and operate systems which intercept and analyze all of these data, and extract only the information which is useful to law enforcement and intelligence agencies.
    As per the latest information available from Wiki, “Google, the world's most popular search engine, stores identifying information for each web search. An IP address and the search phrase used are stored in a database for up to 18 months. Google also scans the content of emails of users of its Gmail webmail service, in order to create targeted advertising based on what people are talking about in their personal email correspondences. Google is, by far, the largest Internet advertising agency—millions of sites place Google's advertising banners and links on their websites, in order to earn money from visitors who click on the ads. Each page containing Google advertisements adds, reads, and modifies "cookies" on each visitor's computer. These cookies track the user across all of these sites, and gather information about their web surfing habits, keeping track of which sites they visit, and what they do when they are on these sites. This information, along with the information from their email accounts, and search engine histories, is stored by Google to use for build a profile of the user to deliver better-targeted advertising.
The United States government often gains access to these databases, either by producing a warrant for it, or by simply asking. The Department of Homeland Security has openly stated that it uses data collected from consumer credit and direct marketing agencies for augmenting the profiles of individuals that it is monitoring.” 
Wiki further provides helpful information on the process of surveillance which may be noteworthy that “ One common form of surveillance is to create maps of social networks based on data from social networking sites as well as from traffic analysis information from phone call records such as those in the NSA call database, and internet traffic data gathered under CALEA. These social network "maps" are then data mined to extract useful information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities.
Many U.S. government agencies such as the Defense Advanced Research Projects Agency (DARPA), the National Security Agency (NSA), and the Department of Homeland Security (DHS) are currently investing heavily in research involving social network analysis. The intelligence community believes that the biggest threat to the U.S. comes from decentralized, leaderless, geographically dispersed groups. These types of threats are most easily countered by finding important nodes in the network, and removing them.
                                   India ranks fifth in the world for cyber crime, according to a report last year by the U.S.-based Internet Crime Complaint Center, a partnership between the Federal Bureau of Investigation and the National White Collar Crime Center. In fact, the report said that as India became home to the fourth highest number of Internet users in the world, cyber crime has been rising at more than 50 percent per year. A striking example of such crime was the attack on computers in the Indian prime minister's office by Chinese hackers, December 2009.
Investigators are still coming to terms with the extent of damage caused by that attack, as the hackers had targeted the cream of India's national security setup: National Security Advisor M.K. Narayanan, Cabinet Secretary K.M. Chandrasekhar, the prime minister’s special envoy Shyam Saran and deputy National Security Advisor Shekhar Dutt. In addition, 26 others were also squarely in the crosshairs of the hacking attempt.
The timing of the espionage attempt led investigators to suspect the Chinese hackers of desperately trying to access any available data on India's position at the Copenhagen Climate Summit being held at the time. It may be noted that until Indian Prime Minister Manmohan Singh arrived in Copenhagen on Dec. 17, Environment Minister Jairam Ramesh and Saran were singing different tunes.
But what has disturbed investigators most is that the Chinese hackers possibly had inside help. The possibility of a mole within the Indian establishment helping a foreign adversary is staring investigators in the face.
In March 2009, a China-based cyber spy network hacked into government and private systems in 103 countries, including many Indian embassies and the headquarters of the Dalai Lama. In May 2008, hackers from China attacked the website of India’s Ministry of External Affairs. Despite official denials, at least one website reported that hackers had stolen the identities and passwords of several Indian diplomats.
In the past three years, over 9,000 Indian websites have been at the mercy of an anti-India community. Hackers based beyond India’s borders have become a threat for the government.
Cyber attacks from across the border are not new to India. This happened for the first time when India was conducting nuclear tests at Pokhran in 1998 and hackers based in Pakistan attacked the websites of Zee News and India Today. GForce Pakistan and Pakistani Hackerz Club took responsibility for the intrusions and left behind threatening messages demanding that the nuclear tests be stopped.
After the terror attacks on the Indian Parliament in December 2001 and a massive troop standoff between India and Pakistan several hacking incidents were reported.
Pakistani hackers also targeted the Indian website www.armyinkashmir.com, which was providing factual information about daily events in the Kashmir Valley in 1999. Hackers posted photographs showing Indian security forces allegedly killing Kashmiri people and blamed the Indian government for “atrocities” there. Obviously, this had the intended impact in the valley.
In December 2008, the Indian Eastern Railways portal was hacked by Whackerz-Pakistan. The official website www.easternrailway.gov.in bore a strange look. When opened, the top scroll on the site, which normally consists of official announcements, had unusual notes. The first note read: “Cyber war has been declared on Indian cyberspace by Whackerz-Pakistan (24 Dec-2008).”
The scene became grimmer after the terror attacks on Mumbai on Nov. 26, 2008. The Pakistan Cyber Army hacked into the websites of the Indian Institute of Remote Sensing, the Center for Transportation Research and Management, the Kendriya Vidyalaya of Ratlam – a chain of schools run by the Indian Army – and the Oil and Natural Gas Corporation of India. The damage took a long time to repair.
Even at the individual level cyber attacks are on the rise in India. According to the New Delhi police, in 2009 email hacking and cheating cases went up by 150 percent. It is said that Nigerian gangs are very active in India, particularly during festive seasons when massive purchases are transacted online, thanks to the system of credit cards and online bank accounts.
The severity and magnitude of Indian cybercrime can be anticipated from the data provided by National Crime Record Bureau 2009 under the heading “Incidence Of Cases Registered And Number Of Persons Arrested Under Cyber Crimes (IT Act + IPC Section) During 2009 (All-India) which illustrates a wide variety of Criminal activities  such as Tampering computer source documents ,Hacking with Computer Systems, Loss/damage to computer source/utility ,Hacking ,obscene publication/transmission in electronic form , Failure of compliance/orders of certifying Authority, To assist in decrypting the information intercepted by Govt. Agency, Un-authorized access/attempt to access of protected Computer system, Obtaining License or Digital Signature Certificate by misrepresentation/suppression of fact ,Publishing false digital Signature Certificate , Fraud Digital Signature Certificate , Breach of confidentiality/privacy, Destruction of electronic  evidence and many other Cyber Crimes. Most of such crimes are committed, as per record, by the age group between 18-30 years (see tables appended below )
Indian teenagers are no less ahead than the foreign counterparts in adopting the recent global trend which has a positive leaning towards the subtle acts of cyber crime such as fraudulency, making false profile/identity in such Social Networking sites as Facebook, Tweeter , LinkedIn etc. One of such incident may be exemplified from an article by Karitha Shanmugam in The Telegraph, Calcutta Sunday 28th August 2011 “ in which the young teenage girl from a small town of Rajasthan was stunned “when a relative questioned her two months ago about the links to pornographic sites she had ostensibly posted on her Facebook(FB) account.
        It was her profile all right ,complete with her photograph and her authentic Rajsamand address, but the problem was she has never seen the links…… or the site ….. before . Her concerned father went to the police and with the help of cyber security experts tracked down two former schoolmates.
   The boys had created a fake profile of hers to put her in awkward spot since she had stopped talking to them. The boys ,now in college, were booked under section 67 and 67A of the Information Technology Act ,which can lead to a jail term of three to five years and a fine of Rs.5 lakhs. “

In India cyber crime comes under both the traditional Indian penal code and the Information Technology Act, 2000, which was amended in 2008. And here lies the confusion. Since policing is a matter of the state, and complaints have to be lodged with the local police, it all depends under which law the police register a case; it so happens that for the most part they prefer the age-hold penal code.

Local police are not conversant with the intricacies of the nationally legislated IT Act. But once a case is filed under the penal code, the method of investigation must follow certain guidelines that make it extremely difficult to prove most cyber crimes, experts say.
Even under the IT Act, investigations in India are not easy. This is mainly due to the lack of what is called “cyber forensics.” We know that forensic evidence is important in normal criminal investigations. But the collection and presentation of electronic evidence to prove cyber crimes have posed a challenge to investigation and prosecution agencies and the judiciary.
Cyber-related techno-legal acumen and knowledge are not well developed in India. These require a sound working and practical knowledge of information technology as well as relevant legal knowledge. Cyber laws, international telecommunications laws, cyber forensics, digital evidencing and cyber security pose difficult and sometimes hard to understand legal challenges to the courts. This explains why there are almost no convictions of cyber criminals in India. Judges in India must fill in this legal gap.

 Internet content control and Net-Freedom Movement :
The internet control mechanisms are functioning much effectively and strictly to some extent in China and Soudi Arabia where governments play very sensitive roles in checking the contents of the websites and routinely censor and redirect search requests to error pages if anything found objectionable. In Vietnam bloggers who criticise the govt are, in some cases, even arrested, and in Cuba strategies are made to delimit internet to its national boundary.
             Over the past few years, the govt. of India has also been gradually building censorship muscle over the internet. In 2006 it blocked “Type Pad”, the blog-hosting service and a bulk sms site.
      A Right to Information plea filed by the Bangalore based centre for internet and society leaves that the govt blocked 11 sites between 2008 and 2011. This range from sites hosting the predictable girl-wall paper and “Kamasutra” to blog discussing freedom of speech .
   Recently a growing dissatisfaction resulting from the action of Indian govt. towards blocking internet contents which it “ deems objectionable led to internet freedom activists to raise their voice against this new set of rules claimed to have violated the right to freedom of speech and expression.
In a written reply, Minister of states, information and Technology, Sachi Pilot told the Loksabha that the recently notified rules under the Information Technology Act to regulate the use of Internet, “don’t give any power to the govt. to regulate the content”.
Pilot added the rules did not raise issues “pertaining to privacy and violation of freedom of speech and expression “.
The new rules demand that the intermediary must notify user not to publish or use information ,that is derogatory, abusive, insulting or which violates intellectual property rights or impacts the sovereignty of nation. The country that has 81 million internet users, this can never be easy. ------ Source : India Super Cops now patrol the www.highway by Aashees Sharma, Hindustan Times , Tues Day August 9.2011.

Future Directions in Research
Researchers face numerous theoretical and methodological challenges in trying to assess the influence of the Internet on deviant behaviour. A common denominator across many of these studies is the fear that the Internet will generate a critical mass of deviants, which would foster justification for socially unacceptable forms of behaviour, strengthen the development of pathological disorders, or encourage criminal behaviours. This could include some causal relationship between online activity and deviant behaviour among persons who had not engaged in these behaviours before. The challenges and gaps identified in previous studies suggest several possible directions for future research within this topic area. First, longitudinal research is needed to explore the potential causal relationships between passive online behaviours leading to engage in criminal acts. Second, identifying potential risk factors (i.e., individual, environmental, social, and psychological characteristics) associated with online offenders, third, ethical concerns surround researching vulnerable populations (e.g., children) and emotionally fragile populations (e.g., self-harmer). Ethical standards are particularly salient in light of the deception used by many studies in this field and because so many of them lack an informed consent process, the ability to verify mental competency, and a debriefing session. Fourth, more theoretical work is needed across each of the areas summarized above to situate these deviant behaviours in a larger context and to guide more rigorous empirical research. Durkin and colleagues (2006, p. 600) have called forth Goffman’s (1963) work on stigma to draw parallels between the Internet and what he described as “back places,” or places where people are open about their peculiar inclinations and depend on one another for support. Other work has questioned the extent to which the Internet is different when it comes to influencing sexuality, or whether the Internet is merely one of a long line of technologies representing cyclical shifts in sexual media (Stern & Handel, 2001). Stern and Handel (2001) concluded that although the Internet is relatively new, the concerns about its power and ability to influence social mores and behaviours have been applied to nearly all of its technological precursors. Lastly, as stated earlier, most of the work in these areas is located in the province of qualitative methods so many of the studies described above are not generalizeable. Future work in these areas will profit from advances in Internet methods in general, which may address the issues concerning representative populations, response rates, and identity issues.




Bibliography

·        Punishing the persona:  Correctional Strategies for the virtual offender;        Richard C. Mackinnon; http://www.actlab.utexas.edu/~spartan; Government department in affiliation with the advanced communication technologies laboratory (actlab) the University of Texas at Austin; october 10, 1996

·        DOT.CONS: Crime, Deviance, And Identity On The Internet by Yvonne Jewkes (ed). Cullompton:  Willan Press, 2003.  200 pp. 


·        The Impact of the Internet on Deviant Behaviour and  Deviant Communities; Literature Review , Institutes for Homeland Security Solutions; Authors Hope Smiley McDonald, Ph.D., RTI International;Nicole Horstmann, B.S., RTI, International Kevin J. Strom, Ph.D., RTI International ;Mark W. Pope, M.S., RTI International

·        A Review of Virtually Criminal: Crime, Deviance and Regulation Online ,Sz-De Yu, Indiana University of Pennsylvania Book: Virtually Criminal: Crime, Deviance and Regulation Online ;Author: Matthew Williams; Publisher: Routledge ;Year: 2006

·        Bequai, August. 1978. White Collar Crime: A 20th Century Crisis. D.C.: Lexington Books.
·        Chantico Publishing Company, Inc. 1992. Combating Computer Crime. NY: McGraw Hill, Inc.

·        Conference on World Affairs. 1996. Open and Closed: Bullies, Hackers and Saints – The Internet Changes it All. April 12. Roger Ebert, Burgess Laird, Oliver McBryan, Ulrich

·        Correll, Shelley. 1995. The Ethnography of an Electronic Bar. Journal of Contemporary

·        Ethnography, Vol. 24 No.3, October, 270-298.


·        CU’s own E-Mail Policy. 1996. http://www.colorado.edu/HyperHelp/news-info/email.html

·        CU’s own Appropriate Computer Behavior Policy. 1996

·        Henry, Stuart and Pfuhl, Erdwin H. 1993. The Deviance Process. NY: Aldine De Gruyter.


·        Hollinger, Richard C. 1988. Computer Hackers follow a Guttman-like Progression. Sociology and Social Research, Vol. 72 No. 3, April, 199-200.
·        Hollinger, Richard. 1993. Crime by Computer: Correlates of Software piracy and Unauthorized Account Access. Security Journal; 1993, 4, 1, Jan., 2-12

·        Katz, Jack. 1988. Seductions of Crime. NY: Basic Books, Inc., Publishers

·        Markoff, John. 1995. A Most-Wanted Cyberthief is Caught in his own Web. New York Times,February 16.-------. 1995. How a Computer Sleuth Traced a Digital Trail. New York Times, February 16.-------. 1995. Hacker case Underscores Internet’s Vulnerability. New York Times, February 17.

·        Marx, Gary. 1994. New Telecommunications technologies require new manners.
Telecommunications Policy 18: 538-551.
·        Marx, Gary. 1991. The New Surveillance. National Forum; 1991, 71, 3, Summer, 32-36.
·        Marx, Gary. 1988. Undercover. Berkeley: University of California Press.
·        Marx, Gary. 1988. Privacy and Technology. Many articles
·        Mendels, Pamela. 1996. On-Line Newspaper’s Provocation to Test Decency Act. New York Times, April 26.
·        Parker, Donn. 1976. Crime by Computer. NY: Charles Scribner’s and Sons.
·        Pfuhl, Erdwin H. 1987. Computer Abuse: Problems of Instrumental Control. Deviant Behavior,8:113-130.
·        Shimora, Tsutomu. 1996. Takedown: Pursuit and Capture of Kevin Mitnick. NY: Hyperion.
·        Whiteside, Thomas. 1978. Computer Capers. NY: Thomas Y. Crowell, Publishers.
·        Wong, John. In Progress. Caught in the Web: Social Control of Electronic Mail.