Published online by Cambridge University Press: 05 November 2015
The internet is not for sissies.
– Paul VixieOne night in Harry's Bar I struck up a conversation with MissTara, a member of the lesbian dominance/submission cult at the Palace. Knowing I was a psychologist doing research, she seemed interested in telling me about her Palace lifestyle. She suggested we go up to one of the bedrooms where she felt more comfortable talking. Once inside, she shut and locked the door behind us. Rather than explaining what she enjoyed about avatars, she decided to give me a firsthand experience. She shape-shifted from one form to another: a topless woman, a naked woman kneeling on the bed, a naked woman tied to the bed. “What do you think?” she asked. I felt rather uncomfortable and awkward. “Well, this is certainly interesting for my research.”
In the beginning, onliners advocated what they called “netiquette.” It was the spirit of preserving cooperation, helpfulness, and trust in all digital realms. Unfortunately, over the years we discovered that if you build it, some people will abuse it. This is a toxic example of the generativity principle, which is how people find ways to use technology unanticipated by its designers (Zittrain, 2009).
The brand of deviance endorsed by a dominance/submission cult will strike some people as abnormal and offensive, while others will simply consider it an alternative sexual lifestyle. As in the real world, aberrant behavior in the digital realm runs the spectrum from mild to severe, depending on who is defining it, whether it hurts anyone, and, if it does hurt people, how much harm it does (see Figure 13.1). Along the way, the cyberpsychological architecture of an environment determines what kinds of deviant behavior are possible.
Since the early days of the Internet, those who lean in the direction of deviance have used cyberspace to surprise, shock, deceive, abuse, or take advantage of other people, often for their own personal gain. In the seminal books about cybercrime (Kirwan & Power, 2013; Sternberg, 2012), researchers described the serious offenses that now proliferate online, including piracy, identity theft, extortion, stalking, hacking, drug dealing, human trafficking, political extremism, illegal and disturbing pornography, vigilantism, and child sex offenses. Hopefully, few of us will find ourselves exposed to these disturbing activities.
To save this book to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Find out more about the Kindle Personal Document Service.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.