{"id":96,"date":"2018-01-28T15:20:44","date_gmt":"2018-01-28T15:20:44","guid":{"rendered":"http:\/\/ssrc.ie\/blog\/?p=96"},"modified":"2020-01-31T13:57:56","modified_gmt":"2020-01-31T13:57:56","slug":"online-crime-and-harassment-protected-and-rewarded","status":"publish","type":"post","link":"https:\/\/ssrc.ie\/blog\/2018\/01\/28\/online-crime-and-harassment-protected-and-rewarded\/","title":{"rendered":"Online Crime and Harassment: Protected and Rewarded"},"content":{"rendered":"<p><strong>Introduction<\/strong><\/p>\n<p>A truism it may be, the <em>information age, <\/em>as it has come to be known, has brought about changes of unprecedented proportions to societies all over the world. Through the commercialization of the synthesis between artificial intelligence, the internet, and modern developments in engineering, \u2018smart\u2019 technology has been harnessed by <em>the common man, <\/em>presenting strands of opportunity never seen before. From the tweaking of subatomic particles, to the manipulation of natural atmospheric processes, there is a sense that we find ourselves in a new era of endless possibilities. Arguably, the technologies of the digital era are as seminal as any other from throughout history. Key social institutions like health, education, and law, have all benefited in a plethora of ways from the growing capacities of modern technology. While this may all be true, we still find ourselves very much within the eye of the storm, and there have been calls from some quarters to keep a tighter hold on the reins. As Hynes (2017) indicates, there is no reason to approach these new technologies from a determinists\u2019 standpoint. It is society; the developers, the engineers, the scientists, and indeed the consumers, who decide in which direction these advancements are taken. We must therefore be mindful of new developments, paying close attention to the canaries in the digital coalmine.<\/p>\n<p>Although the benefits of modern technology are undeniable, sinister behaviour has so too flourished, and this is evident in the proliferation of cybercrime and online acts of transgression. Online crime is fast becoming one of the foremost contemporary issues of our time, and there are no reasons why it should not be as rigorously investigated as crime within the <em>real world<\/em>. Given that 48 per cent of the world\u2019s population are now online, 70 per cent of the world\u2019s youths among them, we have reason enough to legitimize such endeavours (ITU, 2017). When engaging with the negative aspects of the digital world, it is imperative that a holistic analysis be conducted, involving both the technology, and the individuals who use them. One of the arguments that this essay will try to make is that there is connection between online crime and the way that users interact with these technologies. By applying a number of the most notable sociological theories on deviance to various cybercrimes, this essay will explore the ways in which online acts of transgression are protected, enhanced, and rewarded by the current digital paradigm.<\/p>\n<p><strong>Virtual World or Real World?<\/strong><\/p>\n<p>Before analysing any cybercrime sociologically, the true essence of the online world must first be discerned. There is little use in applying the theories of the physical world to the digital world without first establishing whether they are in fact part of the same realm. Wojak (2012, p.159) believes that \u2018actions performed within virtual worlds are really still actions performed in the real world by a real person\u2026with real-word consequences and effects.\u2019 Such a perspective would appear to be supported by Verne (2014, p.821) who claims that any human interaction\u2026that takes place online, although virtual, is still <em>real<\/em>. If these views are to be accepted, any human activity that takes place online can legitimately be scrutinized from a sociological perspective. Specifically, it is through human interaction with the online world as a socially constructed space that the most acute sociological insights are revealed.<\/p>\n<p>Humans interact with different spaces in different ways. This is because certain cultural norms and rules have been applied to these socially constructed spaces. Humans learn these rules through the process of socialization, which subsequently influences how they interact with any given space, as defined by the particular culture. Consider the online world as a space. Individuals are likely to interact with this space very differently to how they\u2019d interact with a church, or a nightclub, for example. However, given that the behaviour of individuals within a space is guided by the codes of conduct that they have adopted through their culture, how do individuals interact within a transnational, multi-cultural, and virtual space?<\/p>\n<p><strong>Online Deviance &amp; Design<\/strong><\/p>\n<p>In an environment where there are a plethora of global perspectives, cultures, and beliefs, interlinked and engaged within an ever-shrinking time-space compression, it can be difficult to determine what kind of behaviour should be considered deviant. Deviance itself is subject to myriad interpretations. It may refer to statistical anomalies; simply doing something that very few people do (Share et al, 2011), although generally, deviance is more commonly associated with negative connotations. This interpretation is reflected by Share et al (2011, p.234) who expand upon their earlier definition by describing deviance as an \u2018act that arouses public disapproval.\u2019 Macionis and Plummer (2012, p.582) on the other hand, recognize the subjectivity involved in classifying deviance by stating that it \u2018involves the recognised violation of cultural norms.\u2019 However, as outlined at an earlier point within this essay, the online world is not subject to one, single culture. Although online manifestations of crime may be approached from a culture-by-culture basis in relation to the perpetrator, there may be a universal actor influencing acts of transgression undertaken online. According to Bijker et al (1987), human behaviour can be analysed through their interactions with physical technology. This leads one to investigate whether the literal design of information and communication technologies (ICT) in some way influences interactive online behaviour.<\/p>\n<p>The investigation here is concerned with several features related to ICT, namely; the user interface, the design of software, the artificial intelligence, and the precise construction of technologies like the internet. This essay does not propose that a psychological phenomenon occurs when users engage with computer software or the internet. Instead, it may simply be the case that the characteristics listed above are very consciously harnessed by the individual when they engage in cybercrime. It is the characteristics of the cyber features that may need re-evaluating if cybercrime or acts of online transgression are to be combatted. As it stands, these features serve to protect online crime, and in fact, reward them, and to illustrate this, several notable sociological theories will be applied to several examples of negative online behaviour. For the purposes of this essay, the sociological theories that will be used will be drawn from the positivist approach to deviance. The examples of deviance that will be referred to will be online harassment, and economic cybercrime.<\/p>\n<p style=\"text-align: center;\"><img data-attachment-id=\"100\" data-permalink=\"https:\/\/ssrc.ie\/blog\/2018\/01\/28\/online-crime-and-harassment-protected-and-rewarded\/hacker\/\" data-orig-file=\"https:\/\/i0.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2018\/01\/hacker.jpg?fit=960%2C640&amp;ssl=1\" data-orig-size=\"960,640\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"hacker\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2018\/01\/hacker.jpg?fit=300%2C200&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2018\/01\/hacker.jpg?fit=640%2C427&amp;ssl=1\" decoding=\"async\" loading=\"lazy\" class=\"alignright size-full wp-image-100\" src=\"https:\/\/i0.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2018\/01\/hacker.jpg?resize=640%2C427\" alt=\"\" width=\"640\" height=\"427\" srcset=\"https:\/\/i0.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2018\/01\/hacker.jpg?w=960&amp;ssl=1 960w, https:\/\/i0.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2018\/01\/hacker.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2018\/01\/hacker.jpg?resize=768%2C512&amp;ssl=1 768w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><\/p>\n<p><strong>Online Harassment<\/strong><\/p>\n<p>The first example of online deviance to be investigated will be harassment, and to observe how those who partake in online harassment are both protected, and rewarded, by cyber features, we will use several interpretations of control theory. Cyberbullying, in particular, has emerged as one of the most concerning developments within the discourse of contemporary child protection, with Grania Long, chief executive officer of the ISPCC, calling \u2018online protection of children\u2026the child protection issue of our time\u2019 (ISPCC annual report, 2017). Other forms of online harassment are less targeted at a specific individual, with the act of trolling firmly established as a cultural norm on interactive websites (Coleman, 2012). Trolling, described by the Oxford dictionary as \u2018a deliberately offensive or provocative online post,\u2019 can range from the wholly arbitrary, to the vehemently discriminatory.<\/p>\n<p>Control theory is primarily concerned with conformity, rather than deviance, with proponents of this school of thought arguing that deviance occurs when there is the absence of what causes conformity (Thio, 2010). To understand how those who engage in online harassment are protected by digital systems, we will utilize the approaches of both Travis Hirschi, and John Braithwaite, while also looking at theories of formal deterrence. Retribution is a fundamental component within control theory, whereby individuals are deterred from engaging in an act of deviance for fear of the punishment that would consequentially be inflicted upon them.<\/p>\n<p>Hirschi suggests that the degree to which an individual is connected to society influences whether they become involved in deviant behaviour. The more social capital that an individual has, the less likely it is that that individual will engage in transgressive behaviour (Scriver, 2017). Many social media sites, for example, fail to stomp-out online harassment or intolerance. Given the sheer scale of online social interactions, and the fact that a deviant can conceal their identity through fake profiles, the risks associated with Hirschi\u2019s theory do not apply to online deviants. Ramalingam &amp; Chinnaiah (2017) remark upon the ease with which fake online profiles can be created, while also detailing the damage such users can inflict upon others; from identity theft, to sexual harassment.<\/p>\n<p>Similarly, John Braithwaite\u2019s \u2018shaming\u2019 approach (Thio, 2010) is rendered null and void. This interpretation suggests that individuals conform for fear of facing social exclusion. Yet again, those who create fake profiles are immune from such social deterrence. Key to Braithwaite\u2019s approach is the notion that the collective public act as a judiciary system. Were someone to commit a crime that violates a deep cultural value, that individual would face the scorn or <em>shame <\/em>of the public. According to this theory, fear of this scenario is what maintains conformity. However, this communal form of social control appears to be under threat in an increasingly fragmented and digital reality. Wellman et al (2003) speculate as to what place the internet might have amid a less community-centred society. With greater movement towards \u2018network individualism,\u2019 people are less likely to engage in acts of solidarity. Parallel to this is the continued depletion of the family institution as a pillar of informal social control. When such a transition is considered within the context of Braithwaite\u2019s theory, it would seem as though this shift away from social collectivism is a possible reason for the perpetuation of transgressive phenomena such as trolling. Under the protection of anonymous profile systems, there is no threat of any looming shame to bear down upon them.<\/p>\n<p>In addition to the protection offered to them by anonymous profiling, certain contemporary social media designs contain features that reward transgressive behaviour. To best illustrate this, Burgess and Aker\u2019s differential reinforcement theory can be applied. Thio (2010, p.25) explains how this theory is used to describe those who \u2018are motivated to continue behaving in a certain way if [they] have been rewarded for doing so.\u2019 Considered within the context of online harassment, the \u2018like\u2019 facility on Facebook presents itself as a good example. This facility allows a user to interact with a feature on the website by \u2018liking\u2019 it, so to speak, which is intended to represent their favour or support toward the feature in question. Hogan (2010, cited in Eranki &amp; Lonkila, 2015) draws attention to the relationship between the \u2018like\u2019 and the \u2018exhibition\u2019 put-on by certain users in their pursuit of <em>likes<\/em>. This is a defining characteristic of internet trolling, where comments are often intended to illicit outrage, rather than any positive emotions. The \u2018like\u2019 button in this regard presents an opportunity to reward a troll for their inventiveness, or humour, however unethical their comment might have been. The more likes a troll receives for outrageous commentary, the more he or she will continue to embark upon such behaviour.<\/p>\n<p><strong>Cybercrime<\/strong><\/p>\n<p>The surge in cybercrime in recent years has been the source of mounting fears for private businesses and governments alike. The Norton Cybercrime Report (2012) found that two-out-of-three adults had experienced cybercrime in their lifetime, while \u2018close to half of online adults had fallen victim to attacks such as malware, viruses, hacking, scams, fraud, &amp; theft.\u2019 This variety in potential cybercrimes is reflected by the diversity of cybercriminals committing these crimes. Jewkes and Yar (2010, p.94) seek to quash the popular portrayal of cybercriminals as the \u2018socially inept\u2019 hacker (Taylor, 1999, p.59) by acknowledging that cybercrime is not \u2018above the capabilities of normal folk.\u2019 Thus, it is not simply the anonymity of those who engage in cybercrime that maintains their evasiveness, but also; the difficulty in labeling any one <em>type <\/em>of person.<\/p>\n<p>Relative to <em>real world <\/em>crime; the \u2018Comprehensive Study on Cybercrime\u2019 report (2013, p.17), conducted by the United Nations Office on Drugs and Crime, found that certain cybercrimes were more common than other \u2018conventional\u2019 crimes, such as burglary, robbery, and car theft. In Ireland, similar fears exist among senior business executives, with 36% claiming that \u2018cybercrime is the biggest risk facing Irish businesses in the future\u2019 (PwC, 2016, p.1). To illustrate the ways in which cybercrime is both protected and rewarded by the make-up of digital technologies, we will draw upon the anomie-strain theory.<\/p>\n<p>The anomie-strain theories, associated most with Robert Merton (Thio, 2010), relate to cultural goals, and the institutional means through which they are achieved. Merton believed that for some individuals, there was a \u2018strain\u2019 between the means that are unavailable to them, and the goals they wish to achieve. The online world, then, presents a very useful outlet for cybercriminals to achieve their goals through \u2018innovative\u2019 means. Firstly, when used correctly, cybercriminals are protected in the same way that those who wish to conceal their identity on social media sites are protected. For those embroiled in drug trafficking, for example, the interconnectivity and borderless nature of the internet has been advantageous (Scriver, 2017). As further outlined by Scriver (2017), \u2018opportunities for trans-national crime have increased at a faster rate than technologies used to detect them.\u2019 Though clearly not the fault of any one actor in particular, the intricacies of the internet provide criminals with many possible points of exploitation.<\/p>\n<p>The rewards for such activities would depend on the motivation for engaging in them. These range from the obvious; such as financial rewards; to the politically motivated. Kupferschmidt (2017) provides an example of the latter, drawing attention to the widely-held belief that the result of the 2016 United States presidential election was largely influenced by online activities. Although cybercriminals engage in what may be considered high-risk behaviour to achieve their goals, the enormous depth of the virtual world means that these deviants have many points of escape, are more often rewarded than punished for their illicit behaviour.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>The purposes of these observations were to attempt to illustrate the ways in which the current digital paradigm seems to protect and reward negative online behaviour. In combating such behaviour, it may be the case that, as Garland (cited in Chriss, 2007, p.105) acknowledges, \u2018only the mainstream processes of socialization\u2026are able to promote proper conduct on a consistent and regular basis.\u2019 Perhaps the current digital paradigm serves to provide too many opportunities for transgressive behaviour, particularly when there appears to be only rewards, and no punishment, for doing so. The question then remains: where should our attentions be drawn; the person, or the platform?<\/p>\n<p><strong>References<\/strong><\/p>\n<ul>\n<li>Bijker, W.E. (1987) <em>The Social Construction of Technological Systems, New Directions in the Sociology and History of Technology. <\/em>Cambridge, Mass: MIT Press.<\/li>\n<li>Chriss, J.J. (2007) <em>Social Control: an introduction. <\/em>Cambridge, U.K.; Malden, MA: Polity.<\/li>\n<li>Coleman, E.G. (2012) \u2018Phreaks, Hackers, and Trolls: The Politics of Transgression and Spectacle\u2019, in Mandiberg, M. (ed.) <em>The Social Media Reader. <\/em>New York: New York University Press, pp. 99-119.<\/li>\n<li>Eranti, V. &amp; Lonkila, M. (2015) \u2018The social significance of the Facebook Like button\u2019, <em>First Monday, <\/em>20 (6), Available at: <a href=\"http:\/\/firstmonday.org.libgate.library.nuigalway.ie\/ojs\/index.php\/fm\/article\/view\/5505\/4581\">http:\/\/firstmonday.org.libgate.library.nuigalway.ie\/ojs\/index.php\/fm\/article\/view\/5505\/4581<\/a> (Accessed: 22<sup>nd<\/sup> November 2017).<\/li>\n<li>Hynes, M. (2017) \u2018Shining a brighter light into the digital \u2018black box\u2019: A call for stronger sociological (re)engagement with digital technology design, development and adoption debates\u2019, <em>Irish Journal of Sociology, <\/em>0 (0), pp. 1-33.<\/li>\n<li>International Telecommunication Union (2017) <em>ICT Facts and Figures 2017. <\/em>Geneva: International Telecommunication Union. Available at: <a href=\"http:\/\/www.itu.int\/en\/ITU-D\/Statistics\/Documents\/facts\/ICTFactsFigures2017.pdf\">http:\/\/www.itu.int\/en\/ITU-D\/Statistics\/Documents\/facts\/ICTFactsFigures2017.pdf<\/a> (Accessed: 6<sup>th<\/sup> November 2017).<\/li>\n<li>Irish Society for the Prevention of Cruelty to Children (2017) <em>Annual Report and Accounts 2016. <\/em>Dublin: ISPCC. Available at: <a href=\"https:\/\/www.ispcc.ie\/file\/459\/22\/1\/14_0\/ISPCC-2016-Annual-Report.pdf\">https:\/\/www.ispcc.ie\/file\/459\/22\/1\/14_0\/ISPCC-2016-Annual-Report.pdf<\/a> (Accessed: 15<sup>th<\/sup> November 2017).<\/li>\n<li>Jewkes, Y. &amp; Yar, M. (2009) \u2018Histories and Contexts\u2019, in Jewkes, Y. &amp; Yar, M. (eds.) <em>Handbook of Internet Crime. <\/em>Cullompton: Willan.<\/li>\n<li>Kirwan, G. &amp; Power, A. (2013) <em>Cybercrime: the psychology of online offenders. <\/em>Cambridge: Cambridge University Press.<\/li>\n<li>Kupferschimdt, K. (2017) \u2018Social media \u2018bots\u2019 tried to influence the U.S. election. Germany may be next,\u2019 <em>Sciencemag, <\/em>13<sup>th<\/sup> Sep. Available at: <a href=\"http:\/\/www.sciencemag.org.libgate.library.nuigalway.ie\/news\/2017\/09\/social-media-bots-tried-influence-us-election-germany-may-be-next\">http:\/\/www.sciencemag.org.libgate.library.nuigalway.ie\/news\/2017\/09\/social-media-bots-tried-influence-us-election-germany-may-be-next<\/a> (Accessed: 23<sup>rd<\/sup> November 2017).<\/li>\n<li>Norton (2012) <em>2012 Norton Cybercrime Report. <\/em>California: Norton by Symantec. Available at: <a href=\"http:\/\/now-static.norton.com\/now\/en\/pu\/images\/Promotions\/2012\/cybercrimeReport\/2012_Norton_Cybercrime_Report_Master_FINAL_050912.pdf\">http:\/\/now-static.norton.com\/now\/en\/pu\/images\/Promotions\/2012\/cybercrimeReport\/2012_Norton_Cybercrime_Report_Master_FINAL_050912.pdf<\/a> (Accessed: 22<sup>nd<\/sup> November 2017).<\/li>\n<li>PwC (2016) <em>Economic Crime: a rising threat in Ireland. <\/em>Dublin: PwC. Available at: <a href=\"https:\/\/www.pwc.ie\/publications\/2016\/pwc-irish-economic-crime-survey.pdf\">https:\/\/www.pwc.ie\/publications\/2016\/pwc-irish-economic-crime-survey.pdf<\/a> (Accessed: 22<sup>nd<\/sup> November 2017).<\/li>\n<li>Ramalingham, D. &amp; Chinnaiah, V. (2017) \u2018Fake profile detection techniques in large-scale online social networks: A comprehensive review\u2019, <em>Computers and Electrical Engineering. <\/em>Available at: <a href=\"http:\/\/www.sciencedirect.com.libgate.library.nuigalway.ie\/science\/article\/pii\/S004579061731279X\">http:\/\/www.sciencedirect.com.libgate.library.nuigalway.ie\/science\/article\/pii\/S004579061731279X<\/a> (Accessed: 22<sup>nd<\/sup> November 2017)<\/li>\n<li>Scriver, S. (2017) \u2018Crime and Deviance\u2019. <em>SP158: Introduction to Politics &amp; Sociology. <\/em>Available at: <a href=\"http:\/\/blackboard.nuigalway.ie\">http:\/\/blackboard.nuigalway.ie<\/a> (Accessed: 22nd November 2017).<\/li>\n<li>Scriver, S. (2017) \u2018Crime and Deviance \u2013 Modernization and Globalization\u2019. <em>SP158: Introduction to Politics &amp; Sociology. <\/em>Available at: <a href=\"http:\/\/blackboard.nuigalway.ie\">http:\/\/blackboard.nuigalway.ie<\/a> (Accessed: 22nd November 2017).<\/li>\n<li>Taylor, P.A. (1999) <em>Hackers: crime in the digital sublime. <\/em>London; New York: Routledge.<\/li>\n<li>Thio, A. (2010) <em>Deviant Behavior. <\/em>10<sup>th<\/sup> edn. Boston: Allyn &amp; Bacon.<\/li>\n<li>\u2018Troll\u2019 in <em>Oxford Living Dictionaries. <\/em>Oxford: Oxford University Press. Available at: <a href=\"https:\/\/en.oxforddictionaries.com\/definition\/troll\">https:\/\/en.oxforddictionaries.com\/definition\/troll<\/a> (Accessed: 15<sup>th<\/sup> November 2017).<\/li>\n<li>United Nations Office on Drugs and Crime (2013) <em>Comprehensive Study on Cybercrime. <\/em>Vienna: United Nations Office on Drugs and Crime. Available at: <a href=\"http:\/\/www.unodc.org\/documents\/organized-crime\/cybercrime\/CYBERCRIME_STUDY_210213.pdf\">http:\/\/www.unodc.org\/documents\/organized-crime\/cybercrime\/CYBERCRIME_STUDY_210213.pdf<\/a> (Accessed: 22<sup>nd<\/sup> November 2017).<\/li>\n<li>Verne, J. (2014) \u2018Virtual Mobilities\u2019, in Cloke, P., Crang, P., &amp; Goodwin, M. (eds.) <em>Introducing Human Geographies. <\/em>3<sup>rd<\/sup> edn. Oxfordshire, England; New York: Routledge.<\/li>\n<li>Wellman, B., Haase, A.Q., Boase, J., Chen, W., Hampton, K., D\u00edaz, I., Miyata, K. (2003) \u2018The Social Affordances of the Internet for Networked Individualism\u2019, <em>Journal of Computer-Mediated Communication, <\/em>8 (3), Available at: <a href=\"http:\/\/onlinelibrary.wiley.com.libgate.library.nuigalway.ie\/doi\/10.1111\/j.1083-6101.2003.tb00216.x\/full\">http:\/\/onlinelibrary.wiley.com.libgate.library.nuigalway.ie\/doi\/10.1111\/j.1083-6101.2003.tb00216.x\/full<\/a> (Accessed: 22<sup>nd<\/sup> November 2017).<\/li>\n<li>Wojak, R. (2012) \u2018Griefing Through The Virtual World\u2019, in Heider, D., &amp; Massanari, A. L. (eds.) <em>Digital Ethics Research &amp; Practice. <\/em>New York, N.Y.; Oxford: Peter Lang.<\/li>\n<\/ul>\n<p><em>Dara Kerins is currently an undergraduate student on the Bachelor of Sciences (Applied Social Sciences) Degree Programme at the National University of Ireland Galway<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction A truism it may be, the information age, as it has come to be known, has brought about changes of unprecedented proportions to societies all over the world. Through the commercialization of the synthesis between artificial intelligence, the internet, and modern developments in engineering, \u2018smart\u2019 technology has been harnessed by the common man, presenting &#8230;<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[1],"tags":[25,26,27],"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9PkL7-1y","jetpack-related-posts":[{"id":433,"url":"https:\/\/ssrc.ie\/blog\/2021\/01\/29\/virtual-needs\/","url_meta":{"origin":96,"position":0},"title":"Virtual Needs","date":"January 29, 2021","format":false,"excerpt":"Introduction Maslow's theory affirmed the motivation of human needs and arranged a hierarchy of relevance. The bottom of the pyramid are basic needs, biological and physiological \u2013 food, water, warmth, and above this level is love and relationships. Next is self-esteem and finally at the top self-actualisation. He stated that\u2026","rel":"","context":"In &quot;Digital Citizenship&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2021\/01\/pexels-artem-beliaikin-2490920-1-scaled.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":187,"url":"https:\/\/ssrc.ie\/blog\/2019\/01\/14\/the-digital-divide\/","url_meta":{"origin":96,"position":1},"title":"The Digital Divide","date":"January 14, 2019","format":false,"excerpt":"Introduction Conceptualising the diverse topic that exists in today\u2019s world, this blog post will approach the digital divide with an outlook of hope that the widening gap will one day close. Starting with a brief understanding of how exactly the digital divide came about, explanations will then be brought forward\u2026","rel":"","context":"In &quot;Digital Citizenship&quot;","img":{"alt_text":"","src":"https:\/\/i1.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2019\/01\/black-and-white-computer.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":272,"url":"https:\/\/ssrc.ie\/blog\/2019\/12\/20\/generation-z-redefining-social-media-activism\/","url_meta":{"origin":96,"position":2},"title":"Generation Z; Redefining Social Media Activism","date":"December 20, 2019","format":false,"excerpt":"Introduction Amid the current trend of constrictive age labelling - \u2018snowflakes\u2019 and \u2018OK, boomer\u2019 to name a few - \u2018digital natives\u2019 is a more optimistic and malleable label. It defines the powerful pull Generation Z and beyond has to politically influence and organise. Social media was lauded as a revolutionary\u2026","rel":"","context":"In &quot;Digital Citizenship&quot;","img":{"alt_text":"","src":"https:\/\/i1.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2019\/12\/event.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":415,"url":"https:\/\/ssrc.ie\/blog\/2021\/01\/25\/the-digital-black-hole\/","url_meta":{"origin":96,"position":3},"title":"The Digital Black Hole","date":"January 25, 2021","format":false,"excerpt":"Introduction iPhones, laptops, PlayStations, Smart-Watches \u2013 you name it, we have it. We have evolved into a generation that is obsessed with our technological devices, such as our phones for example. A generation that must have the latest technology, gadget or model. A generation that if we were asked too,\u2026","rel":"","context":"In &quot;Digital Citizenship&quot;","img":{"alt_text":"","src":"https:\/\/i2.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2021\/01\/texting.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":441,"url":"https:\/\/ssrc.ie\/blog\/2021\/02\/01\/the-role-technology-plays-in-education\/","url_meta":{"origin":96,"position":4},"title":"The Role Technology Plays in Education","date":"February 1, 2021","format":false,"excerpt":"Introduction This blog post will examine the role that technology plays in education in our modern society and the impacts digital revolution has and continues to have on the education process. Technology is all around us and it is constantly continuing to expand. Technology is certainly being merged into the\u2026","rel":"","context":"In &quot;Digital Citizenship&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2021\/02\/pexels-photo-2774556-1.jpeg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":208,"url":"https:\/\/ssrc.ie\/blog\/2019\/01\/16\/the-digital-worlds-environmental-impact\/","url_meta":{"origin":96,"position":5},"title":"The Digital World&#8217;s Environmental Impact","date":"January 16, 2019","format":false,"excerpt":"Introduction The production, consumption and disposal of the digital world has considerable environmental impacts. Hodgson (2015) states that global data centres are producing the same amount of emissions as aviation. E-waste and the ways in which to manage it are contestable. In 1998 electrical and electronic waste was estimated to\u2026","rel":"","context":"In &quot;Digital Citizenship&quot;","img":{"alt_text":"","src":"https:\/\/i2.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2019\/01\/e-waste.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/ssrc.ie\/blog\/wp-json\/wp\/v2\/posts\/96"}],"collection":[{"href":"https:\/\/ssrc.ie\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ssrc.ie\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ssrc.ie\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/ssrc.ie\/blog\/wp-json\/wp\/v2\/comments?post=96"}],"version-history":[{"count":6,"href":"https:\/\/ssrc.ie\/blog\/wp-json\/wp\/v2\/posts\/96\/revisions"}],"predecessor-version":[{"id":306,"href":"https:\/\/ssrc.ie\/blog\/wp-json\/wp\/v2\/posts\/96\/revisions\/306"}],"wp:attachment":[{"href":"https:\/\/ssrc.ie\/blog\/wp-json\/wp\/v2\/media?parent=96"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ssrc.ie\/blog\/wp-json\/wp\/v2\/categories?post=96"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ssrc.ie\/blog\/wp-json\/wp\/v2\/tags?post=96"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}