Ethical Issues of Social Computing in Corporate Cloud Services

AUTHOR
Engin Bozdag and Jeroen van den Hoven

ABSTRACT

Almost 50 years ago individual users at terminals communicated over telephone lines with a central hub where all the computing was done. The shift back to this model is currently under way. Data and programs are being swept up from desktop PCs and corporate server rooms are installed in “the computer cloud”. When you create a spreadsheet with Google Docs, major components of the software reside on unseen computers, whereabouts unknown, possibly scattered across continents (Hayes, 2008). This paradigm, known as Cloud Computing, allows users to “outsource” their data processing needs to a third-party (Jaeger et al., 2008). Thus, the computing world is rapidly transforming towards developing software for millions to consume as a service, rather than to run on their individual computers (see Buyya et al, 2009). Cloud computing changes the way software is designed and it is becoming ubiquitous. Major IT providers such as Google, Microsoft, Sun, and IBM are all offering cloud services. Intel has launched a vision for the next decade. Government agencies recently have started to use cloud applications and it is expected that a significant part of all the financial, economic and logistic transactions will be performed (semi-) automatically “in the cloud” (Buyya et al, 2009).

Cloud Computing changes the way software is defined, developed, marketed, sold and used. In Cloud Computing, the computer is valued as a gateway to computing services and resources in distant places. It is no longer what is on your desk-(top) or on the server in the basement of your office that counts, but rather which services, facilities and resources you have access to. The software is no longer a digital commodity that you install on your local machine, but rather a service offered by providers that you access and share with other users.

The internet and the web have become full fledged social environments; they facilitate and enhance known and traditional social phenomena by means of social software (e.g. social networking sites and collaborative software). In this way a mesh of computer networks, social software and interacting human persons has come in to being. Most cloud services not only allows the user to store and process a data in remote servers, but it also allows the user to share this data. This leads to an intertwine of cloud services and social computing.

While social phenomena such as crowdsourcing and large-scale social computing projects , cooperative computing are receiving attention, another form of social computing is emerging in cloud services that are storing a large amount of user data. Search engines or other social cloud services such as Facebook cannot solely rely on algorithms to analyze and modify this data, since these may perform imperfectly or may work with bad data generated by spammers, abusers, non-complying users. These services will also use human reviewers, to analyze, understand, filter, remove ,modify, add, sort, categorize the data if necessary. They will use the analyzing capacity of humans, to make judgements when an algorithm cannot decide. For instance a website scoring high in the search engine could be engaged in bad practices, such as spam, violation of TOS of the search engine. This violation might go undetected by the algorithm, but can be detected by a human controller, because of her epistemic and moral capabilities. However, the website in question can be a source of knowledge valuable to many people, leading to a moral dilemma on the part of the human controller, who is in charge to support or supplement the algorithms. If the human agent’s decision on the website is fully left to her own discretion, then this may lead to biases in the search engine results and the computation will differ per human agent, a problem that unassisted algorithms don’t have.

In this paper, we discuss the risks involved in using people as processing units, much like computer processes or subroutines, to provide a cloud service. We argue that, while designing a social computing application, a cloud service provider should have clear policies to minimize this individual judgment, without compromising the functionality it adds to the overall performance of the social computing application.

REFERENCES

[Buyya et al., 2009] Buyya, R., Yeo, C., Venugopal, S., Broberg, J., and Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6):599–616.

[Hayes, 2008] Hayes, B. (2008). Cloud Computing. Commun. ACM, 51(7):9–11.

[Jaeger et al., 2008] Jaeger, P., Lin, J., and Grimes, J. (2008). Cloud computing and information policy: Computing in a policy cloud? Journal of Information Technology & Politics, 5(3):269–283.

Professionalism taking root!

AUTHOR
Clive Victor Boughton and Malgorzata Alicja Plotka

ABSTRACT

“Might Implement Data report BREAK contracts or agreements with the lecturer?” “Yes, providing bad student survey results could lead to the potential loss of a contract, by a lecturer who had received bad marks” answered one of the students during the SoDIS (Software Development Impact Statement) analysis of his project performed using Software Improvements SPA (SoDIS Project Auditor). This was just one of the concerns identified by students who participated in the inaugural course titled “Social Aspects of Computing” at Gdansk PJWSTK (Polish-Japanese Institute of Information Technology) in 2010. This new course focusses on professionalism in computing-related vocations, and uses SoDIS/SPA to underpin course goals. The results of our assessment of the course are both pleasing and useful to all concerned stakeholders. So much so that we have come to ask ourselves: If SPA enabled students of Gdansk PJWSTK to identify social and ethical impacts on stakeholders, then how many more important professional and ethical issues could be identified by a more experienced and/or professional analyst of software requirements who also used SPA?

The SoDIS process was developed by Gotterbarn and Rogerson [1, 2] to provide an effective, consistent means to manage project risks from the perspectives of a wide-range of stakeholders. Risk analysis begins effectively by addressing a range of qualitative questions about the impacts of development. Generally a SoDIS question is of the form “Might ?” The question that begins this abstract is a practical example where the is Implement data report, the is BREAK contracts or agreements and the is lecturer. Such questions, which have been derived from international codes of practice and conduct, articulate potential risks, and once formed, they need to be considered/analysed. Risk analysis ensues by considering whether there are any circumstances for which the (potential) risk might actually occur. Description of such circumstances together with any other relevant information/discussion constitutes a concern in SoDIS. An actual risk may have several associated concerns. A concern is an elaboration of an actual risk and as such helps with the identification of one or more risk mitigations which are called solutions in SoDIS. The student’s statement at the beginning of this abstract is an example of such a concern.

One might ask: Why bother teaching students about social and ethical aspects/principles in order to assist and aspire them to become real professionals? We at Gdansk PJWSTK have no doubts concerning the thesis that to be a real professional, in whatever vocation one might decide to embark on, it is not sufficient to merely possess essential knowledge and experience in the chosen vocation. One definition [3] of a ‘professional’ promotes the necessity of the following characteristics: competency, ethicity, knowledgeability, learning ability, care, and pride. Hence, a ‘to-be’ professional ought to become familiar with these necessary characteristics which include the social and ethical aspects connected with his/her chosen vocation. Thus, to be truly bestowed as a professional computer scientist, one should not only be competent with computing-related tasks/research, but also be aware of how what they do affects others both at a personal and a discipline level, and be able to address such affects. That is why at Gdansk PJWSTK, we have decided to enrich our studies program with a course on the topic of “Social Aspects of Computing”. The SoDIS Analysis and Inspection processes [2, 4, 5], as implemented in SPA [6], provided an essential framework for promoting and supporting professional behaviour; it was a very important and independent component of the course.

During the course, students were given four hours of SoDIS Analysis lectures with practical examples of SPA usage. After the theoretical part of the course students were able to verify in practice their understanding of the lectures by analysis of their own projects, such as the ticket reservation system for the Eurocup football in 2012, hotel room check in, electronic access to technical documentation, tourist information portal, and blogs. Students showed they understood the idea of the SoDIS process, and the vast majority successfully completed their project analyses within SPA. They also observed that a SoDIS Analysis in IT projects/software development can be really useful because it enables/compels them to look at every potential concern from the perspective of the stakeholders, the people directly affected by the development and delivery of the IT product. Here SPA comes to our aid by presenting the results of impact analysis in a very clear and transparent manner (e.g. by using colouration of cells within tables to focus users on key information). The ability to identify any potential risks which may arise and then set the probability of their occurrence helps cover any important professional and ethical situations presented to the user and to manage risk exposure from start to finish. Moreover, in the latest version of SPA, new features provide the flexibility to modify the SPA software to our needs.

In this paper we present the outcomes of the course, the teaching, and the evaluation of SPA. Although the usability of SPA was rated positively, both students’ and lecturer’s observations have led to suggested improvements. The Gdansk results will also be compared with earlier assessments of teaching the SoDIS process when it was still under development.

Based on the favourable outcomes of the inaugural course teaching SoDIS Analysis in practice with the use of SPA is to continue. Additionally, Gdansk’s branch of PJWSTK is planning to include the “Social Aspects of Computing” course (with the SoDIS module) in the postgraduate studies programs, and corporate training program, currently being worked on.

The use of SPA in a wider range of applications; e.g., to analyse the impact of software used by stakeholders to determine the required information relating to their engineering process, will be discussed drawing on the practical experience at Gdansk.

REFERENCES

1. Gotterbarn, D. and Rogerson, S. (1998) – The Ethics of Software Project Management in G. Colleste (Ed.), Ethics and Information Technology. Dehli: New Academic Publisher.

2. Gotterbarn, D. and Rogerson, S. (2005) – Responsible Risk Analysis for Software Development: Creating the Software Development Impact Statement, Communications for the Association of Information Systems, Vol 15/40.

3. Boughton, C. (2009) – What is an ICT Professional Anyway? Australian Journal of Information Systems, Vol 16/1.

4. Gotterbarn, D. (2001) – Understanding and Reducing Project Failure: The Ethics of Project Management, Proceedings of NACCQ Conference, Napier NZ.

5. Gotterbarn, D., Clear, T. and Kwan, C-T. (2008) – A Practical Mechanism for Ethical Risk Assessment – A SoDIS Inspection, The Handbook of Information and Computer Ethics, Chapter 18, Wiley.

6. Boughton, C. and Boughton, C. (2010) – Stakeholder and Risk Management with SoDIS, Softimp Publishing.

The Cyberspace Era: The Best and Worst of Times for Lovers

AUTHOR
Professor Aaron Ben-Ze’ev

ABSTRACT

The cyberspace era could be considered as the best and worst of times for lovers. This is indeed both a happy and a difficult time for lovers—happy in that available, willing potential lovers are all around; difficult in that maintaining a loving committed relationship is harder than before as alternative romantic options are easier to explore and to realize. The need to make romantic compromises is therefore greater, but making them is more difficult.

Difficulties in long-term romantic relationships

Two major types of difficulties for long-term romantic relationships can be discerned in the cyberspace era: (a) The great role that changes play in generating emotions, and (b) the greater availability of leaving a current relationship and starting a new one.

The first difficulty, which stems from the nature of the emotional system, refers to the fact that intense emotions are typically transient and unstable states, whereas in long-term committed relationships stability is of greater importance. Emotions are usually experienced when we perceive a significant change in our situation—or in that of those related to us. Whereas change intensifies emotions, commitment entails stability.

The second major difficulty for long-term romantic relationships refers to certain developments in the cyberspace era that have increased the availability of romantic partners. Two major developments are most relevant here: (a) the lifting of most of the constraints that once prevented long-term committed relationships from dissolving, and (b) the apparent presence of many attractive alternatives. Both developments began before the cyberspace era (particularly the first one), but are accelerating in this era.

Nowadays, staying within a committed relationship has become a more difficult option—one that requires the partners to constantly reexamine the value of their relationship in light of, among other issues, the presence of love. The abundance of alternatives and the perpetual possibility of achieving something “better” can undermine commitment and happiness.

The role of cyberspace in the new circumstances

The development of cyberspace, and in particular online romantic relationships, has considerably enhanced the weight of the above difficulties. Change, instability, and transition characterize cyberspace. The great availability of online romantic partners enables frequent novel changes, and this makes cyberspace more dynamic, unstable, and exciting.

Cyberspace is an alternative, available environment that provides us with easy access to many available and desired options. One does not have to do much or invest significant resources in order to step into this imaginative paradise.

Online romantic seduction is just a click away, making seduction far more available than it is offline. This is mainly due to the following factors: (a) It is easier to meet new people in cyberspace, as you merely need a few clicks to find so many willing people; (b) you can choose people who are willing to establish a romantic relationship with you; (c) there is faster and more profound self-disclosure in online communication than in face-to-face meetings; hence, it is easier to identify available and willing people.

Cyberspace provides an alternative world to the actual one. People do not live exclusively in one world; rather, they move from one world to the other. Cyberspace enables participants to explore exciting romantic alternatives without necessarily violating significant personal commitments. Indeed, many online affairs are conducted while at least one of the participants is having an offline relationship with another person.

This greater availability of choices in cyberspace exacerbates the inability to be satisfied with one’s romantic lot. People no longer want to settle for anything less than Prince Charming. If such a prince is just one message away, it can seem emotionally intolerable to leave him there and make do with someone viewed as second-best.

What is next?

Endlessly searching for a better alternative brings frustration and misery rather than happiness. Settling for one’s lot, which is an important way to achieve profound happiness, is even more imperative in the cyberspace era. However, if you compromise and accept something much less than your dream demands, it can ruin your happiness as well. The cyberspace era requires people to make more compromises, since we are aware of more promising alternatives (as compared to our own current situation), but it is more difficult to make those compromises, since the alternatives are easier to achieve.

Future lovers may have to make more compromises and their frustration in not achieving the imaginary perfect partner might increase. But those lovers have also a greater chance of being satisfied with their romantic relationship, in such a way that they will not feel that they are making significant compromises.

The cyberspace era does pose specific difficulties in finding a romantic framework that will suit all lovers. Nevertheless, love itself is flourishing in this era, which can be considered as a golden age for love—even its renaissance. It is more possible now than ever before to find the one you have been waiting for all your life.

Love is on the minds of so many people and its presence is considered as an important need. Love can no longer be dismissed as a silly fantasy; it is perceived as realistic and feasible for more people. However, lovers in the cyberspace age will have a hard time coping with the need to avoid other alternatives and seeing their current relationship as an inferior or temporary compromise.

The view proposed here is optimistic in the sense that our happiness is more within our grasp—either by being satisfied with our own lot, or by achieving the possible and then being satisfied with that lot. But it is a cautious optimism, as the chains of the possible are so hard to release, and the roads not taken often augment our regret. The future romantic arena can be seen then to be bright; however, the paths to romance are full of stumbling blocks.

Bunkerology – a case study in the meaning making practices of on-line urban exploration forums

AUTHOR
Luke Bennett

ABSTRACT
My paper analyses the meaning making practices operating within internet forums for ‘urban explorers’. An influential user guide to urban exploration defines the activity as: “seeking out, visiting and documenting interesting human-made spaces, most typically abandoned buildings…” (Ninjalicious 2005: 4) There is nothing to stop individuals visiting modern ruins and making their own sense of these abandoned ‘”non-places” (Auge 1995), however to participate in the urban exploration community by submitting on-line accounts of visits one has to learn to conform to the ordained ‘ways of seeing’ (Berger 1972) operating within this community. I will present a case study examining the ways in which stable descriptive conventions are created for the signification of abandoned underground nuclear fallout monitoring bunkers within one such internet urban exploration (urbex) forum: www.28dayslater.co.uk.

My study was ethnographic in aim, seeking to learn the ‘rules’ by which accounts of urban exploration forays are constructed and circulated on-line. The self-publishing opportunities for urban explorers on internet blogs and forums has opened up direct access to a rich mass of participant ‘accounts’ readily available for study. In the blow-by-blow exchange and debate of posted site visit accounts on its web forums, the process of operation of urbex as an ‘interpretive community’ (Fish 1980) is laid bare.

Writing and circulating accounts of exploration to unusual (and/or perilous) places is nothing new. Precursors can be seen, for example, in the autobiographical accounts of grand touring and tomb raiding proto-archaeologists like Belzoni in the Nineteenth century (Romer 2005).

However, urbex participants regard the rise of internet based forums as a significant development. Deyo (n.d.) echoes many commentators on urbex who see the rise of self-publishing (initially via fanzine, then more latterly with the rise of internet based outlets for account sharing) as the key differentiator between their hobby being trespass or exploration, for: “Exploration serves no purpose when its results remain obscure…Today, the increased flow of information has uplifted urban exploration, and the discourse that surrounds it. What was once kids breaking into warehouses and smashing windows is now serious research…With Infiltration magazine, then, the urban explorer truly parted company with the mundane trespasser.

Ninjalicious became an explorer when he faithfully published his observations and enriched posterity by them. The trespasser, by contrast, always consigned his story to silence.”

Dodge (2006) has pointed to the importance of studying urbex site visit reports as ‘accounts’. For Orbuch, accounts are “verbal and written statements as social explanations of events” (1997:456), and in particular arise where the actor is keen to explain behaviours that might otherwise be seen as deviant. Accounting thus relates to the performance (and repair) of self: Goffman (1971) and Garfinkel (1967). In this tradition a study of accounting behavior within urbex should investigate the content of the account, the conditions under which the account will be made, and the conditions governing whether the account will be accepted / acceptable, and my study attempts this.

My paper will show how at least this one type of urban exploration is structured by clear representational rules circulated via its on-line community, and (applying Bourdieu 2010, and Foucault 2002) that that culture is reproduced through a mix of conscious and structural aesthetic and epistemic control.

At the conscious level the site’s moderator exercises a subtle form of editorial quality control over submissions to the forum. Elders also guide (and at times chastise or exclude) newer entrants who have yet to master the social conventions of these virtual ‘meetings’.

At the ‘unconscious’ (structural) level the practice of this on-line accounting is shaped by the influence of pre-existing received aesthetic tropes absorbed from mainstream culture – the picturesque, the sublime, the notion of a ‘good photograph’, and it is also shaped by the very architecture of the software upon which these forums are based. Submitted accounts can only become part of the community’s knowledge base, to exist at all, if they can be sorted and stored by urbex genre, site location and alphabetized in accordance with in inherently positivist (scientistic) logic. Also, photographs are held in these accounts alongside text, rather than separately ranked and ordered by purely artistic or phenomenological criteria. The epistemic role of such pre-ordering software structures warrants further investigation – for the database derived platform style in use as the base for the 28dayslater.co.uk site was observed in the study as the base also for many other collaborative forums.

REFERENCES

Auge, M. 1995. Non-places: Introduction to an anthropology of supermodernity London: Verso.

Berger, P. 1972. Ways of seeing Harmondsworth, London: Penguin.

Bourdieu, P. 2010. Distinction: a social critique of the judgement of taste London: Routledge.

Dodge, M. 2006. Exposing the secret city: urban exploration as space hacking Power Point presentation to University of Manchester Geography Department Seminar, 22 February 2006

Deyo, L.B. n.d. Psychopathology & the Hidden City. Jinx Magazine (on-line) undated but accessed 23 July 2009 (available at: http://www.jinxmagazine.com/ue_pathology.html)

Fish, S.1980. Is there a text in this class? – the authority of interpretive communities. Harvard: Harvard University Press.

Foucault, M. 2002. The order of things – An archaeology of the human sciences. London: Routledge.

Garfinkel, H. 1967. Studies in Ethnomethodology. Englewood Cliffs: Prentice-Hall.

Goffman, E. 1971. The presentation of self in everyday life. London: Penguin.

Nijalicious 2005. Access all areas – a user’s guide to the art of urban exploration. Canada: Infiltration.

Orbuch, T.L. 1997. People’s accounts count: the sociology of accounts. Annual Review of Sociology. 23: 455-478

Romer, J. 2005. Valley of the Kings. London: Phoenix Press.

A commentary of Computer Ethics by Deborah G. Johnson (4th edition)

AUTHOR
Professor Porfirio Barroso and Lucía Tello PhD

ABSTRACT

On the occasion of the publishing in Spanish language of the bestseller Computer Ethics written by the author Deborah G. Johnson, the translators of this work (Porfirio Barroso and Lucía Tello) believe relevant to discuss about the most important topics of this book (Ética informática y Ética e Internet in its Spanish version), due to approach the revision of how the Computer Science has been changed by the different events emerged in the Technological Society Age.

In these days, Technology is not a mere tool, but also a value. Every action we carry out online implies new ethical dilemmas born under the aegis of the IT. Recent social networks and communities have not only positive effects as its contribution to socialising, sharing global knowledge, or helping to develop relationships between citizens and to bring together people all around the world (namely, Blogs, wikis, social networks, tweeting, podcasts or social tagging). The author confirms that there are also problems related with basic human rights like privacy or intimacy and property, which result damaged by the action of these new technological tools.

The so called eDemocracy harm some important and inviolable values without the conscience of the users in particular (and citizens in general), who ignore where their data go when they share them without suspicion. This is, precisely, the new point of Computer Ethics 4th Edition: the approach of the sociotechnical computer ethics.

With a profuse and detailed structure of chapters, the readers will find a thematical approach through seven different aspects. The fist one, an introduction to Sociotechnical Computer Ethics, in which Johnson develop three scenarios which reproduce the virtual problems emanated from the use of the Internet, from a sociotechnical perspective and rejecting technological determinism.

In the second chapter, Johnson introduces a descriptive analysis of the different ethical methods of approach to the Computer Ethics and Internet Ethics. Utilitarianism, Dialectic Theory, Deontological Theory and Rights and social Contract Theory, are scanned to have a wide perspective about how to revise properly the Computer Ethics.

Under the title “Ethics in IT-Configured Societies”, Johnson explains how the technology is converted in instrumentation of human action, referring specially to cyborgs, robots and their connection with human beings. Google or Turnitin are two enterprises which are analyzed by the author emphasizing in the importance of their social implications. IT-configured domains of life open the wide world of virtuality, Avatars and Role-playing games, helping we out to discover how can plagiarism be detected in the Net.

Proceed from Privacy, Surveillance and Information flow, Johnson explores the concern of citizens about the importance of privacy. Evaluated as “individual good”, “contextual integrity”, and as a “social good essential for Democracy”, we travel around Email Privacy and Advertising, the Workplace spying, and the Data Mining and e-Business.

Descend from the digital intellectual property, in the fifth chapter we discover how easy results to obtain pirated software abroad, and the difference between free software that follows proprietary software, and the use of Public Domain Software in Proprietary Software. By the way, Johnson explains the philosophical basis of property, which is derived from the natural rights.

In the following chapter, the Wiki network and some Yahoo cases are used as basis of an extensive argumentation relative to law and order on the Internet. Hackers are in this part a significant point about how technology has transformed property and privacy conceptions. Sociotechnical security shows numerous breaches, which need to be mend in IT-Configured Societies. Wikipedia and its new order of knowledge production and the dilemma emanated from the freedom of expression and censorship, are questions studied by the author in the current chapter.

Finally, Deborah G. Johnson approach the study of Professional Ethics in Computing, focused on the state of the profession, and maintaining as crucial the formal organization, autonomy, the establishment of Codes of Ethics and Mastery of Knowledge.

With this paper we aim to explain the fundamental points stated by the author, trying to adapt some of the scenarios and cases into the European culture, given the fact that most of the issues translated into the continental context could seem remote and distant. However, is commendable the effort of the author to consider global cases not uniquely American (as Chinese, German or English) which contribute to a wider vision of the Computer Ethics problems.

This bestseller is, therefore, an exceptional opportunity to discover the dynamic which underlines the IT-Configured Societies, and a superb form of be conscious about what really happens when we share our data into the global Network.

Online Gambling and Crime: A Sure Bet?

AUTHOR
Dr James Banks

ABSTRACT

The explosive growth of the internet as a public and commercial vehicle has provided new opportunities for gambling based activities to take place online. Facilitated by the development of the first gambling software, by Microgaming in 1994, and encrypted communication protocols, which enable online monetary transactions, by Cryptologic in 1995, Antiguan based company InterCasino became the first internet gambling site to accept an online wager in January 1996. By the end of the year, approximately 15 sites were accepting wagers, rising to 200 by the end of 1997, 650 by the end of 1999 and 1,800 by the end of 2002. Today, there are in the region of 2,347 listed gambling sites in existence, including 768 casinos, 524 poker rooms, 430 sportsbooks, 19 betting exchanges, 377 bingo sites, 45 skill games sites, 94 lottery sites, 13 backgammon sites and 16 mahjong and rummy sites. These sites are spread across 661 owners who operate out of 74 jurisdictions, including Antigua and Barbuda, Australia, Costa Rica, the Dutch Antilles, the Kahnawake Mohawk reserve in Canada, Malta, and the United Kingdom.

This marked growth in online gambling appears to stem from a number of inter-related factors. First, online gambling offers an extremely lucrative business venture for many. The entertainment and leisure industry has recognised that cost effectiveness of online gambling sites, as start-up and operating costs are considerably less than those of their land-based counterparts. Second, significant sectors of the world populace have the potential to access online gambling sites. With computers becoming less expensive, simpler to use and more readily available, the opportunity for consumers to partake in anonymous and effortless gaming from the comfort of their own home or workplace has increased substantially. Third, internet gambling services have continued to enhance the consumer’s online experience, through sophisticated gaming software that combines live remote wagering and increasing realism with multi-lingual websites, integrated, multicurrency e-cash systems and improving customer service, making gambling online an appealing alternative to land-based gambling operations. In sum, the online gambling experience is likely to continue to be desirable to consumers because it offers frequent and interactive gaming that is characterised by accessibility, affordability and anonymity. Moreover, as the popularity of online gambling continues to grow, the market will undoubtedly be an attractive area of expansion for land-based gambling operators, the leisure industry and business investors alike.

However, the development of such gambling technology has not been accepted uncritically. The last decade has witnessed a growing body of research that has explored the deleterious social effects of online gambling. Of particular concern is the ease with which young people and other vulnerable populations can access online gambling sites, increases in gambling, money spent gambling, problem gambling and gambling addiction, public health and public safety. Yet, to date, there has been very little empirical research into internet gambling and crime. This is surprising given that the scale and density of internet gambling sites, the voluminous number of players, and the large quantities of e-cash available as tournament prizes or held in online gambling accounts, provides a marketplace replete with criminal potential. Nevertheless, little is known about the frequency, types, techniques and organisational dynamics of internet gambling related crime nor has there been any consideration of the degree to which such crimes go undetected.

Cyberspace has been depicted as a ‘world wild west’, with the threat of e-criminality looming large over an increasingly globalised world (Sandywell 2010). Unsurprisingly, the significant quantities of e-cash held in online gambling sites and flowing between them and various ancillary organisations presents a digital network ripe for criminal exploitation. Internet gambling sites can operate as source of criminal activity, as a vehicle for crime or support for other criminal enterprise. In such contested spaces, gambling site operators, employees, customers and unwanted ‘third parties’ anonymously intermingle creating the opportunity for multi-various forms of criminal activity and constructing rhyzomatic relations between perpetrators and victims.

This paper seeks to simplify this dense tangle of virtual villains and victims and present a overview of the principal forms of e-crime committed by gambling site operators and their employees, users of online gambling sites, and ‘criminal entrepreneurs’, whom either utilise gambling sites as a conduit for nefarious activities or specifically target gambling operators and their clientele. It offers an initial assessment of the forms, features and organisational dynamics of crimes that take place in and around internet gambling sites. Moreover, the paper identifies the opportunities and complexities in undertaking empirical research in this area, but also outlines a research agenda for this field. In turn, it is envisaged that this paper will act as a catalyst for discussion, debate and exploration into the potential criminogenic effects of online gambling, the victimisation of online gambling operations and their clientele, and the degree to which technological, educational and legal frameworks can reduce the potential for crime and victimisation in and around online gambling sites.