Skip to main content

#FutureCrime: What Is Crime in the Age of New Media?

  • Chapter
  • First Online:
#Crime

Part of the book series: Palgrave Studies in Crime, Media and Culture ((PSCMC))

Abstract

The commission and control of crime are changing due to new media. Crimes are committed online, law enforcement investigates the social media accounts of alleged perpetrators, and questions are being asked about the responsibility of new media in crime control responses. Using four case studies, this chapter explores crime and victimization in the context of new media. Each case study addresses a particular form of new media crime—trolling, revenge porn, cyberbullying, and performance crime—and examines prevalence, the criminal legal response, and emerging questions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

Media References

Academic References

  • Barak, A. (2005). Sexual harassment on the Internet. Social Science Computer Review, 23(1), 77–92.

    Article  Google Scholar 

  • Barratt, J., & Bishop, J. (2015). The impacts of alcohol on e-dating activity: Increases in flame trolling corresponds with higher alcohol consumption. In J. Bishop (Ed.), Psychological and sociological implications surrounding internet gaming addiction (pp. 186–197). Hershey: Information Science Reference.

    Chapter  Google Scholar 

  • Bates, S. (2017). Revenge porn and mental health: A qualitative analysis of the mental health effects of revenge porn on female survivors. Feminist Criminology, 12(1), 22–42.

    Google Scholar 

  • Bishop, J. (2013). Examining the concepts, issues, and implications of internet trolling. Hershey: IGI Global.

    Book  Google Scholar 

  • Branch, K., Hilinski-Rosick, C. M., Johnson, E., & Solano, G. (2017). Revenge Porn Victimization of College Students in the United States: An Exploratory Analysis. International Journal of Cyber Criminology, 11(1), 128–142.

    Google Scholar 

  • Burden, K., & Palmer, C. (2003). Cyber crime: A new breed of criminal? Computer Law & Security Report, 19, 222–227.

    Google Scholar 

  • Burke, S. C., Wallen, M., Vail-Smith, K., & Knox, D. (2011). Using technology to control intimate partners: An exploratory study of college undergraduates. Computers in Human Behavior, 27(3), 1162–1167.

    Google Scholar 

  • Capeller, W. (2001). Not such a neat net: Some comments on virtual criminality. Social & Legal Studies, 10, 229–242.

    Google Scholar 

  • Chess, S., & Shaw, A. (2015). A conspiracy of fishes, or, how we learned to stop worrying about #gamergate and embrace hegemonic masculinity. Journal of Broadcasting & Electronic Media, 59(1), 208–220.

    Article  Google Scholar 

  • Citron, D. K. (2014). Hate crimes in cyberspace. Cambridge, MA: Harvard University Press.

    Google Scholar 

  • Coleman, G. (2014). Hacker, hoaxer, whistleblower, spy: The many faces of anonymous. Brooklyn: Verso.

    Google Scholar 

  • Cook, C., Schaafsma, J., & Antheunis, M. L. (2018). Under the bridge: An in-depth examination of online trolling in the gaming context. New Media & Society [Online]. Retrieved from http://journals.sagepub.com/doi/10.1177/1461444817748578

  • Cyber Civil Rights. (n.d.). 38 States + DC have revenge porn laws. Retrieved from https://www.cybercivilrights.org/revenge-porn-laws/

  • DeKeseredy, W., & Schwartz, M. (1998, February). Measuring the extent of woman abuse in intimate heterosexual relationships: A critique of the conflict tactics scale. Retrieved from http://vawnet.org/sites/default/files/materials/files/2016-09/AR_Ctscrit_0.pdf

  • Dimond, J., Fiesler, C., & Bruckman, A. (2011). Domestic violence and information communication technologies. Interacting with Computers, 23(5), 413–421.

    Google Scholar 

  • Duwe, G. (2017b). The patterns and prevalence of mass public shootings in the United States, 1915–2013. In L. C. Wilson (Ed.), The Wiley handbook of the psychology of mass shootings (pp. 20–35). West Sussex: Wiley Blackwell.

    Google Scholar 

  • Eaton, A. A., Jacobs, H., & Ruvalcaba, Y. (2017). 2017 Nationwide online study of nonconsensual porn victimization and perpetration: A summary report. Cyber Civil Rights Initiative. Retrieved from https://www.cybercivilrights.org/wp-content/uploads/2017/06/CCRI-2017-Research-Report.pdf

  • FBI. (2017). Terrorism. Federal Bureau of Investigations. Retrieved from https://www.fbi.gov/investigate/terrorism

  • Findlaw.com. (2017). Internet trolls can be prosecuted under Australian Law. Retrieved from http://www.findlaw.com.au/articles/4259/internet-trolls-can-be-prosecuted-under-australian.aspx

  • Franklin. (2017). Justice for revenge porn victims: Legal theories to overcome claims of civil immunity by operators of revenge porn websites. California Law Review, 102, 1303–1335.

    Google Scholar 

  • Furnell, S. (2002). Cybercrime: Vandalizing the information society. London, UK: AddisonWesley.

    Google Scholar 

  • Gámez-Guadix, M., Almendros, C., Borrajo, E., & Calvete, E. (2015). Prevalence and association of sexting and online sexual victimization among Spanish adults. Sexuality Research and Social Policy, 12(2), 145–154.

    Article  Google Scholar 

  • Garcia, A., Mirra, N., Morrell, E., Martinez, A., & Scorza, D. A. (2015). The council of youth research: Critical literacy and civic agency in the digital age. Reading & Writing Quarterly, 31(2), 151–167.

    Google Scholar 

  • Garett, R., Lord, L. R., & Young, S. D. (2016). Associations between social media and cyberbullying: A review of the literature. MHealth online. Retrieved from http://mhealth.amegroups.com/article/view/12924/13218

  • Grabosky, P. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10, 243–249.

    Google Scholar 

  • Hare, I., & Weinstein, J. (Eds.). (2009). Extreme speech and democracy. Oxford: Oxford University Press.

    Google Scholar 

  • Hayes, R. M., & Dragewiecz, M. (submitted). Dick pics: Exhibitionism or entitlement? Women’s Studies International Forum.

    Google Scholar 

  • Henry, N., & Powell, A. (2015). Embodied harms: Gender, shame, and technology facilitated sexual violence. Violence Against Women, 21(6), 758–779.

    Article  Google Scholar 

  • Henry, N., & Powell, A. (2016a). Technology-facilitated sexual violence: A literature review of empirical research. Trauma, Violence and Abuse, 19(2), 1–14.

    Google Scholar 

  • Henry, N., & Powell, A. (2016b). Sexual violence in the digital age: The scope and limits of criminal law. Social & Legal Studies, 25(4), 1–22.

    Article  Google Scholar 

  • Henry, N., Powell, A., & Flynn, A. (2017). Not just ‘revenge pornography’: Australian’s experiences of image-based abuse. Melbourne, Australia: RMIT University. Retrieved from: https://www.rmit.edu.au/content/dam/rmit/documents/college-of-design-and-socialcontext/schools/global-urban-and-social-studies/revenge_porn_report_2017.pdf

  • Hinduja, S., & Patchin, J. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2), 129–156.

    Article  Google Scholar 

  • Hinduja, S., & Patchin, J. W. (2015). Bullying beyond the schoolyard: Preventing and responding to cyberbullying (2nd ed.). Thousand Oaks: Sage.

    Google Scholar 

  • Jane, E. A. (2017). Misogyny online: A short (and brutish) history. Sage Publications.

    Google Scholar 

  • Kelly, L. (1988). Surviving sexual violence. Cambridge, UK: Polity Press.

    Google Scholar 

  • Klausen, J. (2015). Tweeting the jihad. Studies in Conflict and Terrorism, 38(1), 1–22.

    Article  Google Scholar 

  • Lankford, A., & Madfis, E. (2017). Don’t name them, don’t show them, but report everything else: A pragmatic proposal for denying mass killers the attention they seek and deterring future offenders. American Behavioral Scientist. https://doi.org/10.1177/0002764217730854.

  • Legal Dictionary. (n.d.). Cyberstalking. Retrieved from https://legaldictionary.net/cyberstalking

  • Lenhart, A., Ybarra, M., & Price-Feeney, M. (2016). Nonconsensual image sharing: One in 25 Americans has been a victim of ‘revenge porn’. LenRetrieved from https://datasociety.net/pubs/oh/Nonconsensual_Image_Sharing_2016.pdf

  • Lenhart, A., Ybarra, M., Zickuhr, K., & Price-Feeney, M. (2016). Online harassment, digital abuse, and cyberstalking in America. Data & Society Research Institute Report 11.21.16. Retrieved from https://www.datasociety.net/pubs/oh/Online_Harassment_2016.pdf

  • Lindgren, S., & Lundstrom, R. (2011). Pirate culture and hacktivist mobilization: The cultural and social protocols of #Wikileaks on twitter. New Media & Society, 13(6), 999–1018.

    Article  Google Scholar 

  • Marcum, C., Ricketts, M., & Higgins, G. (2010). Assessing sex experiences of online victimization: An examination of adolescent online behaviors using Routine Activity Theory’. Criminal Justice Review, 35(4), 412–437.

    Google Scholar 

  • Martin, J., & Alaggia, R. (2013). Sexual abuse images in cyberspace: Expanding the ecology of the child. Journal of Child Sexual Abuse, 22(4), 398–415.

    Google Scholar 

  • Marwick, A., & Lewis, R. (n.d.). Media manipulation and disinformation online. Retrieved from https://datasociety.net/pubs/oh/DataAndSociety_MediaManipulationAndDisinformationOnline.pdf

  • McAfee. (2013). Lovers beware: Scorned exes nay share intimate data and images online. Retrieved from http://mcafee.com/au/about/news/2013/q1/20130204-01.aspx

  • McGlynn, C., & Rackley, E. (2015). Image-based sexual abuse: More than just revenge porn. Retrieved from https://claremcglynn.files.wordpress.com/2015/10/imagebasedsexualabuse-mcglynnrackley-briefing.pdf

  • McGlynn, C., & Rackley, E. (2017). Image-based sexual abuse. Oxford Journal of Legal Studies, 37(3), 534–561.

    Article  Google Scholar 

  • McGlynn, C., Rackley, E., & Houghton, R. (2017). Beyond “revenge porn”: The continuum of image-based sexual abuse. SSRN. Retrieved from https://ssrn.com/abstract=2929257

  • Mitchell, K. J., Jones, L. M., Finkelhor, D., & Wolak, J. (2011). Internet-facilitated commercial sexual exploitation of children: Findings from a nationally representative sample of law enforcement agencies in the United States’. Sexual Abuse, 23(1), 43–71.

    Google Scholar 

  • Mitchell, K. J., Finkelhor, D., Jones, L. M., & Wolak, J. (2012). Prevalence and characteristics of youth sexting: A national study. Pediatrics, 129(1), 1–10.

    Article  Google Scholar 

  • Morelli, M., Bianchi, D., Baiocco, R., Pezzuti, L., & Chirumbolo, A. (2016). Sexting, psychological distress and dating violence among adolescents and young adults. Psicothema, 28(2), 137–142.

    Google Scholar 

  • Patchin, J. W., & Hinduja, S. (2006). Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth Violence and Juvenile Justice, 4(2), 148–169.

    Article  Google Scholar 

  • Pease, K. (2001). Crime futures and foresight: Challenging criminal behaviour in the information age. In D. Wall (Ed.), Crime and the Internet (pp. 18–28). London, UK: Routledge.

    Google Scholar 

  • Phillips, W. (2015). This is why we can’t have nice things: Mapping the relationship between online trolling and mainstream culture. Cambridge, MA: MIT Press.

    Google Scholar 

  • Powell, A., & Henry, N. (2016). Policing technology-facilitated sexual violence against adult victims: Police and service sector perspectives. Policing & Society, 28(3), 1–17.

    Google Scholar 

  • Powell, A., & Henry, N. (2017). Sexual violence and harassment in the digital era. In A. Deckert & R. Sarre (Eds.), The Australian and New Zealand handbook of criminology, crime and justice. Basingstoke, UK: Palgrave Macmillan.

    Google Scholar 

  • Pozza, V., Di Pietro, A., Morel, S., & Psaila, E. (2016). Cyberbullying among young people. European Parliament Think Tank. Retrieved from http://www.europarl.europa.eu/thinktank/en/document.html?reference=IPOL_STU(2016)571367

  • Prasad, S. T. (2014). Ethical hacking and types of hackers. International Journal of Emerging Technology in Computer Science and Electronics, 11(2), 24–27.

    Google Scholar 

  • Reyns, B. W., Burek, M. W., Henson, B., & Fisher, B. S. (2013). The unintended consequences of digital technology: Exploring the relationship between sexting and cybervictimization. Journal of Crime and Justice, 36(1), 1–17.

    Google Scholar 

  • Salter, M. (2017). Crime, justice & social media. Oxon: Routledge.

    Google Scholar 

  • Sheridan, L. P. & Grant, T. D. (2007). Is Cyberstalking Different? Psychology, Crime and Law, 13(6), 627–640.

    Google Scholar 

  • Siegel, L. (2015). Criminology: Theories, patterns, and typologies. Boston: Cengage Learning.

    Google Scholar 

  • Spitzberg, B.H. & Hoobler, G. (2002. Cyberstalking and the technologies of interpersonal terrorism. New Media & Society, 4(1), 71–92.

    Google Scholar 

  • Staude-Müller, F., Hansen, B., & Voss, M. (2012). How stressful is online victimization? Effects of victim’s personality and properties of the incident. European Journal of Developmental Psychology, 9(2), 260–274.

    Article  Google Scholar 

  • Stevens, H., & Aggarwal, P. (2017, April). What’s it like to get trolled all day long. Hindustan Times. Retrieved from https://www.hindustantimes.com/interactives/lets-talk-about-trolls/whats-it-like-to-get-trolled-all-day-long/

  • Stonard K. E., Bowen E., Lawrence T. R., & Price S. A. (2014). The relevance of technology to the nature, prevalence and impact of adolescent dating violence and abuse: A research synthesis. Aggression and Violent Behavior, 19(4), 390–417.

    Google Scholar 

  • Stopbullying.gov. (n.d.). Kids on social media and gaming. Retrieved from https://www.stopbullying.gov/cyberbullying/kids-on-social-media-and-gaming/index.html

  • Straus, M. A., Hamby, S. L., Boney-McCoy, S., & Sugarman, D. B. (1995). The revised conflict tactics scales (CTS2-form A). Durham: Family Research Laboratory.

    Google Scholar 

  • Stryker, C. (2011). Epic win for anonymous: An online army conquers the web. New York: The Overlook Press.

    Google Scholar 

  • Surette, R. (2015). Media, crime, & criminal justice: Images, realities, and policies (5th ed.). Stamford: Cengage Learning.

    Google Scholar 

  • Synder, F. (2001). Sites of criminality and sites of governance. Social & Legal Studies, 10, 251–256.

    Google Scholar 

  • Thompson, M. P., & Morrison, D. J. (2013). Prospective predictors of technology-based sexual coercion by college males. Psychology of Violence, 3(3), 233–246.

    Google Scholar 

  • Trottier, D., & Fuchs, C. (2015). Social media, politics and the state: Protests, revolutions, riots, crime and policing in the age of Facebook, Twitter, and Youtube. New York: Routledge.

    Google Scholar 

  • Tyler Clementi Foundation. (2017). Tyler’s story. Retrieved from https://tylerclementi.org/tylers-story/

  • United States Department of Justice. (2017). Winchester man sentenced to 24 months for illegally hacking into website and lying to federal agents. Retrieved from https://www.justice.gov/usao-edky/pr/winchester-man-sentenced-24-months-illegally-hacking-website-and-lying-federal-agents

  • Wall, D. (2001). Crime and the Internet. London: Routledge.

    Google Scholar 

  • Westlake, B. G., & Bouchard, M. (2016). Criminal careers in cyberspace: Examining website failure within child exploitation networks. Justice Quarterly, 33(7), 1154–1181.

    Google Scholar 

  • Woodlock, D. (2016). The abuse of technology in domestic violence and stalking. Violence Against Women, OnlineFirst.

    Google Scholar 

  • World Health Organization (WHO) (2002). World report on violence and health. Geneva: World Health Organization.

    Google Scholar 

  • World Health Organization (WHO) (2013). Global and regional estimates of violence against women: Prevalence and health effects.

    Google Scholar 

  • Wu, P. (2015). Impossible to regulate: Social media, terrorists, and the role for the U.N. Chicago Journal of International Law, 16(1), Article 11. Retrieved from https://chicagounbound.uchicago.edu/cgi/viewcontent.cgi?article=1690&context=cjil

  • Yar, M. (2005). The novelty of ‘cybercrime’: An assessment in light of routine activity. European Journal of Criminology, 2, 407–427.

    Google Scholar 

  • Yar, M. (2012). Crime, media, and the will-to-representation: Reconsidering relationships in the social media age. Crime, Media & Culture, 8(3), 245–260.

    Article  Google Scholar 

  • Zweig J., Dank M., Yahner J., Lachman P. (2013). The rate of cyber dating abuse among teens and how it relates to other forms of teen dating violence’. Journal of Youth and Adolescence, 42(7), 1063–1077.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Hayes, R.M., Luther, K. (2018). #FutureCrime: What Is Crime in the Age of New Media?. In: #Crime. Palgrave Studies in Crime, Media and Culture. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-89444-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-89444-7_5

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-319-89443-0

  • Online ISBN: 978-3-319-89444-7

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics