1)- What is the sociology of internet?
The sociology of the internet involves the application of sociological theory and method to the internet as a source of information and communication.
2)- What are the main forms of the new technology?
Sociologists are concerned with the social implications of the technology, new social network, virtual communities and ways of interaction that have arisen.
3)- How can internet be studied by sociologists?
The internet, is of interest for sociologists in various ways: as a tool for research, for example, in using online questionnaries instead of paper ones as a analysis of online communities, virtual communities and virtual worlds.
And studied statistically through network analysis and at the same time interpreted qualitatively, such as through virtual ethnography. Social change can be studied through statistical demographics.
4)- Is social change taking place in our society?
With the new technology, it is observing social change, this advanced communication and corresponds entire internet, is an easier way for communication, adding compartments files and more.
5)- What are the cyber crimes?
A computer crime is any action, characteristic unlawful and guilty, which is given by way computer or aims to destroy and damage computers, electronic media and Internet networks. Because the computer is moving faster than the law, there are computer inland criminal conduct can not be considered as a crime, according to the "theory of crime" and therefore defined as computer abuse and computer crime.
For example:
- Obscene or offensive
Some jurisdictions limit explicitly prohibit certain speech and racism, political subversion, promoting violence, sedition and the material that incites hatred and crime.
- Harassment
- Drug trafficking
The rise in Internet drug trades could also be attributed to the lack of face-to-face communication. These virtual exchanges allow more intimidated individuals to more comfortably purchase illegal drugs. The sketchy effects that are often associated with drug trades are severely minimized and the filtering process that comes with physical interaction fades away.
- Threats, Intimidation
- Spam
- Fraud
Altering in an unauthorized way. This requires little technical expertise and is not an uncommon form of theft by employees altering the data before entry or entering false data, or by entering unauthorized instructions or using unauthorized processes;
Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions: this is difficult to detect;
Altering or deleting stored data;
Altering or misusing existing system tools or software packages, or altering or writing code for fraudulent purposes.
Other forms of fraud may be facilitated using computer systems, including bank fraud, identity theft, extortion, and theft of classified information.
- Cyber warfare
The U.S. Department of Defense (DoD) notes that cyberspace has emerged as a national-level concern through several recent events of geo-strategic significance. Among those are included the attack on Estonia's infrastructure in 2007, allegedly by Russian hackers. "In August 2008, Russia again allegedly conducted cyber attacks, this time in a coordinated and synchronized kinetic and non-kinetic campaign against the country of Georgia. Fearing that such attacks may become the norm in future warfare among nation-states, the concept of cyberspace operations impacts and will be adapted by warfighting military commanders in the future.