Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Intuitive Blaming of Peeping Toms Versus Cyber Peepers

View through CrossRef
In a series of studies, we examine the existence and factors underlying a blaming discrepancy between responses to a cyber peeper and to a peeping Tom. The first study demonstrates reduced blame for a cyber peeper, and the subsequent eight studies hone in on major differences between the cyber peeping and peeping Tom scenarios that may contribute to a blaming discrepancy, such as the effort involved on the part of the peeper and the risk-taking on the part of the victim. Four of eight such factors are found to impact blame. We then compare responses to cyber peeping and peeping Tom scenarios that are roughly matched on these four factors to assess whether such matching equalizes blame. Finally, we compare blame for the viewing of a private nude photo on the Internet with blame for the viewing of a private nude photo printed on paper in order to assess whether blame is influenced by the involvement of Internet technology itself, rather than by the other factors the technology brings with it.
Title: Intuitive Blaming of Peeping Toms Versus Cyber Peepers
Description:
In a series of studies, we examine the existence and factors underlying a blaming discrepancy between responses to a cyber peeper and to a peeping Tom.
The first study demonstrates reduced blame for a cyber peeper, and the subsequent eight studies hone in on major differences between the cyber peeping and peeping Tom scenarios that may contribute to a blaming discrepancy, such as the effort involved on the part of the peeper and the risk-taking on the part of the victim.
Four of eight such factors are found to impact blame.
We then compare responses to cyber peeping and peeping Tom scenarios that are roughly matched on these four factors to assess whether such matching equalizes blame.
Finally, we compare blame for the viewing of a private nude photo on the Internet with blame for the viewing of a private nude photo printed on paper in order to assess whether blame is influenced by the involvement of Internet technology itself, rather than by the other factors the technology brings with it.

Related Results

An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...
A comparison of Peeping Tom and Psycho
A comparison of Peeping Tom and Psycho
A detailed comparison with Psycho. Peeping Tom and Psycho were released in 1960 only 2 months apart, both made by revered British directors. But while Peeping Tom was rejected, Psy...
Cyber Espionage
Cyber Espionage
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage. Because no internationally and legally recognized defi...
The challenges of cybersecurity insurance development: The case of Latvia
The challenges of cybersecurity insurance development: The case of Latvia
Purpose. This paper aims to provide an overview of the current challenges of cybersecurity insurance, focusing on the identification of development constraints and opportunities an...
Cyprus Health Education Curriculum from “victim blaming to empowerment”
Cyprus Health Education Curriculum from “victim blaming to empowerment”
Purpose – Health promotion can fall into a victim blaming approach and put social pressure on particular students who could be marginalized due to their personal, e...
Comprehensive Analysis of Cyber-Manufacturing Attacks Using a Cyber-Manufacturing Testbed
Comprehensive Analysis of Cyber-Manufacturing Attacks Using a Cyber-Manufacturing Testbed
Abstract Cyber-Manufacturing Systems (CMS) are vulnerable to cyber-manufacturing attacks ironically because of its very beneficial advance: seamless integration with...
Making Peeping Tom
Making Peeping Tom
This chapter looks at Michael Powell’s mastery of film making and analyses what makes Peeping Tom so different from contemporary Horror in terms of its setting, themes and technica...

Back to Top