2 Discussion Questions
1. What are the differences between cyberdeviants who do not intend harm to other computer users or their systems and those who intend malicious damage and theft?
2. How are cyberdeviant subcultures formed and sustained through time? How are members recruited, selected, and socialized by a cybercrime subculture?