Javascript must be enabled to continue!
Intuitive Blaming of Peeping Toms Versus Cyber Peepers
View through CrossRef
In a series of studies, we examine the existence and factors underlying a blaming discrepancy between responses to a cyber peeper and to a peeping Tom. The first study demonstrates reduced blame for a cyber peeper, and the subsequent eight studies hone in on major differences between the cyber peeping and peeping Tom scenarios that may contribute to a blaming discrepancy, such as the effort involved on the part of the peeper and the risk-taking on the part of the victim. Four of eight such factors are found to impact blame. We then compare responses to cyber peeping and peeping Tom scenarios that are roughly matched on these four factors to assess whether such matching equalizes blame. Finally, we compare blame for the viewing of a private nude photo on the Internet with blame for the viewing of a private nude photo printed on paper in order to assess whether blame is influenced by the involvement of Internet technology itself, rather than by the other factors the technology brings with it.
Title: Intuitive Blaming of Peeping Toms Versus Cyber Peepers
Description:
In a series of studies, we examine the existence and factors underlying a blaming discrepancy between responses to a cyber peeper and to a peeping Tom.
The first study demonstrates reduced blame for a cyber peeper, and the subsequent eight studies hone in on major differences between the cyber peeping and peeping Tom scenarios that may contribute to a blaming discrepancy, such as the effort involved on the part of the peeper and the risk-taking on the part of the victim.
Four of eight such factors are found to impact blame.
We then compare responses to cyber peeping and peeping Tom scenarios that are roughly matched on these four factors to assess whether such matching equalizes blame.
Finally, we compare blame for the viewing of a private nude photo on the Internet with blame for the viewing of a private nude photo printed on paper in order to assess whether blame is influenced by the involvement of Internet technology itself, rather than by the other factors the technology brings with it.
Related Results
An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
The Evolution of Cyber Resilience Frameworks in Network Security: A Conceptual Analysis provides a comprehensive overview of the development and application of cyber resilience fra...
A comparison of Peeping Tom and Psycho
A comparison of Peeping Tom and Psycho
A detailed comparison with Psycho. Peeping Tom and Psycho were released in 1960 only 2 months apart, both made by revered British directors. But while Peeping Tom was rejected, Psy...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract
Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...
Differentiation in poult plumage color of f1 progeny from crosses between white and black indigenous turkeys
Differentiation in poult plumage color of f1 progeny from crosses between white and black indigenous turkeys
Abstract
A study assessed the poult plumage color of F1 progeny from artificially inseminated crossings between white and black indigenous turkeys. 72 hens (32 black...
Cyber Espionage
Cyber Espionage
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage. Because no internationally and legally recognized defi...
EFEKTIFITAS CYBER EXTENSION PADA PENYULUH AGAMA DI KOTA SEMARANG
EFEKTIFITAS CYBER EXTENSION PADA PENYULUH AGAMA DI KOTA SEMARANG
Abstrak
Artikel ini menyajikan hasil pelaksanaan cyber extension yang dilaksanakan oleh penyuluh agama Kota Semarang, serta efektifitas dari pelaksanaannya. Cyber extension ...
Information behaviors and cognitive modes used for cyber situation assessment
Information behaviors and cognitive modes used for cyber situation assessment
The purpose of this dissertation research was to examine the information behaviors and cognitive modes used by expert cyber defenders when completing cyber situation assessment tas...

