Digital drift and the criminal interaction order

Despite growing interest in cybercrime, the Internet still poses significant challenges for criminological understanding. Its penetration of everyday life is relevant to many crime types, not just cybercrimes. This article examines the ways in which criminal commitments form using the Internet and related communication technologies that empower the individual relative to the group (gang, mafia, etc.). We argue this occurs in two ways. First, it allows individuals to limit involvement in particular associations or networks. The concept of digital drift is used to explore this element. Second, it allows them to commit crimes more autonomously through facilitating self-instruction. Drawing on Goffman, the importance of studying the encounter as the basic unit of a criminal interaction order is proposed.

[1]  R. Ackland,et al.  Online collective identity: The case of the environmental movement , 2011, Soc. Networks.

[2]  K. Durkin,et al.  propagandizing pederasty: a thematic analysis of the on-line exculpatory accounts of unrepentant pedophiles , 1999 .

[3]  Philip R. Kavanaugh,et al.  Deviant Identity in Online Contexts: New Directives in the Study of a Classic Concept , 2012 .

[4]  Louise Barkhuus,et al.  Empowerment through seamfulness: smart phones in everyday life , 2011, Personal and Ubiquitous Computing.

[5]  P. Klerks The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands , 2001 .

[6]  Paul Dourish,et al.  Yesterday’s tomorrows: notes on ubiquitous computing’s dominant vision , 2007, Personal and Ubiquitous Computing.

[7]  Jo Bryce The Technological Transformation of Leisure , 2001 .

[8]  David Matza Delinquency and Drift , 1966 .

[9]  E. Goffman Behavior in Public Places , 1963 .

[10]  B. Wellman,et al.  Relationships, Community, and Networked Individuals , 2013 .

[11]  J. Meyrowitz,et al.  No Sense of Place: The Impact of Electronic Media on Social Behavior. , 1987 .

[12]  Steffen Blaschke,et al.  Organizations as Networks of Communication Episodes: Turning the Network Perspective Inside Out , 2012 .

[13]  Zeynep Tufekci Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites , 2008 .

[14]  E. Goffman The Interaction Order: American Sociological Association, 1982 Presidential Address , 1983 .

[15]  Michael J. Hindelang The Commitment of Delinquents to their Misdeeds: Do Delinquents Drift? , 1970 .

[16]  R. Rettie Mobile Phone Communication: Extending Goffman to Mediated Interaction , 2009 .

[17]  G. Weimann,et al.  The Strength of Weak Terrorist Ties , 2011 .

[18]  Steve Uhlig,et al.  Demystifying porn 2.0: a look into a major adult video streaming website , 2013, Internet Measurement Conference.

[19]  Gresham M. Sykes,et al.  Techniques of neutralization: A theory of delinquency. , 1957 .

[20]  Lilly U. Nguyen,et al.  BIRDS OF THE INTERNET , 2011 .

[21]  M. Yar The Novelty of ‘Cybercrime’ , 2005 .

[22]  E. Quayle,et al.  child pornography and the internet: perpetuating a cycle of abuse , 2002 .

[23]  I. Munro,et al.  The territorial organization: History, divergence and possibilities , 2013 .

[24]  G. Riva,et al.  Outline for a Social Psychology of Cyberspace , 2001 .

[25]  Barry Wellman,et al.  The Social Affordances of the Internet for Networked Individualism , 2006, J. Comput. Mediat. Commun..

[26]  Joshua Meyrowitz,et al.  Shifting Worlds of Strangers: Medium Theory and Changes in “Them” Versus “Us”* , 1997 .

[27]  C. Forsyth,et al.  describing sexual behavior in the era of the internet: a typology for empirical research , 2005 .

[28]  David Matza,et al.  Delinquency and Drift , 1966 .

[29]  Mimi Sheller,et al.  Mobile Publics: Beyond the Network Perspective , 2004 .

[30]  Noella Edelmann,et al.  Reviewing the Definitions of "Lurkers" and Some Implications for Online Research , 2013, Cyberpsychology Behav. Soc. Netw..

[31]  S. Passini A binge-consuming culture: The effect of consumerism on social interactions in western societies , 2013 .

[32]  Susan W. Brenner Organized Cybercrime? How Cyberspace May Affect the Structure of Criminal Relationships , 2003 .

[33]  Eric Schmidt,et al.  The New Digital Age: Reshaping the Future of People, Nations and Business , 2001 .

[34]  R. Clarke Technology, Criminology and Crime Science , 2002 .

[35]  L. Qvortrup Understanding New Digital Media , 2006 .

[36]  P. Jenkins. Beyond Tolerance: Child Pornography on the Internet , 2001 .

[37]  Ramon Spaaij,et al.  The Enigma of Lone Wolf Terrorism: An Assessment , 2010 .

[38]  Yang-chih Fu,et al.  Weak ties and contact initiation in everyday life: Exploring contextual variations from contact diaries , 2013, Soc. Networks.

[39]  D. Mann,et al.  NETCRIME More Change in the Organization of Thieving , 1998 .

[40]  Bill McCarthy,et al.  When Crime Pays: Capital, Competence, and Criminal Success , 2001 .

[41]  Matthias Hofer,et al.  Perceived bridging and bonding social capital on Twitter: Differentiating between followers and followees , 2013, Comput. Hum. Behav..

[42]  Giuseppe Riva,et al.  Actors, Artifacts and Inter-Actions. Outline for a Social Psychology of Cyberspace , 2001 .

[43]  Aram Sinnreich,et al.  The end of forgetting: Strategic agency beyond the panopticon , 2013, New Media Soc..

[44]  Michael Yip,et al.  Drifting on and off-line: humanising the cyber criminal , 2012 .

[45]  A. Cohen THE CONCEPT OF CRIMINAL ORGANISATION , 1977 .

[46]  J. Meyrowitz,et al.  No sense of place : the impact of electronic media on social behavior , 1988 .

[47]  Christian Licoppe,et al.  'Timid encounters': a case study in the use of proximity-based mobile technologies , 2012, CHI.

[48]  Yaman Akdeniz Anonymity, Democracy, and Cyberspace , 2015 .

[49]  Carlo Morselli,et al.  Inside Criminal Networks , 2008 .

[50]  Robin Teigland,et al.  The Immersive Internet: Reflections on the Entangling of the Virtual with Society, Politics and the Economy , 2013 .

[51]  Carlo Morselli,et al.  Welcome to the Scene , 2012 .

[52]  K. Durkin Misuse of the Internet by Pedophiles: Implications for Law Enforcement and Probation Practice , 2002 .

[53]  M. Feldman Comparative Lone Wolf Terrorism: Toward a Heuristic Definition , 2013 .

[54]  S. Shaw,et al.  Playing with violence: Gamers’ social construction of violent video game play as tolerable deviance , 2006 .

[55]  Lawrence E. Cohen,et al.  Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .

[56]  S. Lyng Crime, Edgework and Corporeal Transaction , 2004 .

[57]  Julie Wuthnow Strange Encounters: Embodied Others in Post- Coloniality , 2002 .

[58]  Edmund Chattoe,et al.  It's not who you know - it's what you know about people you don't know that counts: extending the analysis of crime groups as social networks , 2005 .

[59]  H. Becker Notes on the Concept of Commitment , 1960, American Journal of Sociology.

[60]  Mark Andrejevic,et al.  The Discipline of Watching: Detection, Risk, and Lateral Surveillance , 2006 .

[61]  J. Katz,et al.  Seductions of Crime: Moral and Sensual Attractions in Doing Evil. , 1990 .

[62]  M. Felson Crime and nature , 2006 .

[63]  Jaron Lanier,et al.  Who Owns the Future , 2013 .

[64]  I. Sarason Deviance and Identity. , 1970 .

[65]  G. Weimann Lone Wolves in Cyberspace , 2012 .

[66]  M. Kebbell,et al.  DRAFT COPY : Porter & Kebbell 1 RUNNING HEAD : Examining Australia ’ s Convicted Terrorists Radicalization in Australia : Examining Australia ’ s Convicted Terrorists , 2012 .

[67]  L. Webb,et al.  Characteristics of Internet Child Pornography Offenders: A Comparison with Child Molesters , 2007, Sexual abuse : a journal of research and treatment.

[68]  Heith Copes,et al.  "How Edge Are You?" Constructing Authentic Identities and Subcultural Boundaries in a Straightedge Internet Forum , 2005 .

[69]  Jason-Leigh Striegher Early detection of the lone wolf: advancement of counter-terrorism investigations with an absence or abundance of information and intelligence , 2013 .

[70]  Dennis Waskul,et al.  Now the Orgy Is Over , 2010 .

[71]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[72]  Garry Robins,et al.  Understanding individual behaviors within covert networks: the interplay of individual qualities, psychological predispositions, and network effects , 2009 .

[73]  K. Crawford Listening, not Lurking: The Neglected Form of Participation , 2011 .

[74]  T. Holt,et al.  Considering the Pedophile Subculture Online , 2010, Sexual abuse : a journal of research and treatment.

[75]  M. Castells Materials for an exploratory theory of the network society , 2000 .