Examining Variations in Participation and Outcomes of Consensual and Nonconsensual Extradyadic Behavior among Ashley Madison Users

2021 ◽  
pp. 1-11
Author(s):  
Ashley E. Thompson ◽  
Delaney Wilder ◽  
Danica Kulibert
Keyword(s):  
2021 ◽  
pp. 026540752110377
Author(s):  
Cassandra Alexopoulos

A longitudinal survey study was conducted to examine which strategies for reducing cognitive dissonance were used among men engaging in infidelity. Data were collected in two waves, 1 month apart ( n time1 = 1514, n time2 = 425), from a sample of male users of Ashley Madison, a “married dating” site targeting users who are seeking to engage in infidelity. Because perpetrators of infidelity may justify their behaviors differently depending on whether they cheated in an online environment, both online and offline infidelity behaviors were considered. Results indicated that attitude change and self-concept change were positively related to online infidelity, while only self-concept change was positively related to offline infidelity, suggesting their differential effectiveness for various communication media. Self-concept change, attitude change, and denial of responsibility were negatively related to psychological discomfort and perceived negative impact at time 2, indicating their relative success for reducing negative psychological outcomes compared to other strategies such as adding consonant cognitions.


2021 ◽  
Author(s):  
Katherine Owczar

[Para. 1] At a time where online activists are targeting and obtaining the intellectual property of companies on a regular basis, how should a company communicate and mitigate the data breach to ensure that its valued customers feel protected, or in the best case scenario, prevent it altogether? The adoption and implementation of a sound crisis communication and management strategy is thus a fundamental operative for the success of any organization. Organizational crises can fundamentally disrupt and harm companies, organizations and individuals alike; they are characterized as “non-routine, severe event[s] that [can] destroy [its] reputation or operations” (Koerber, 2017). When a crisis arises for an organization, it is imperative that they have a strong sense of clarity regarding the issue at hand – specifically, they must understand the context and “background narrative that gives interpretative shape to [its] foreground issues” (Arnett, Deiuliis, Corr, 2017). Perhaps most emblematic of these background narratives is the circulation of competing information and perspectives, by both social media and traditional news sources. With the rise of social media and the 24/7 news cycle, a new sense of power and inflated ability to frame an issue has been afforded to many publics – particularly due to the ability of these mediums to rapidly transmit and receive information. These affordances have the potential to be either beneficial or detrimental to a company when faced with a crisis. While an organization can benefit from strategic media relations and effective crisis communication, even the most established of firms can have their voice become convoluted or be reprimanded if communication is poorly executed.


2017 ◽  
Vol 8 (1-2) ◽  
pp. 41-54 ◽  
Author(s):  
Jana Hackathorn ◽  
Jordan Daniels ◽  
Brien K. Ashdown ◽  
Sean Rife

Cadernos Pagu ◽  
2015 ◽  
pp. 31-60 ◽  
Author(s):  
Larissa Pelúcio

Internet, sex and secret are a triad that launches many methodological and ethical challenges for those who conduct researches in the digital media field requiring reinvention of already consolidated techniques. On Ashley Madison website, which is oriented to promote dates between married people, I became immersed in the dynamics of these relations in which the tension among new communication technologies, masculinities, conjugalities and affections market led me to discuss the researcher's place and role as interlocutor and confident; being aware of the emotional dimension of media proved to be a crucial factor on the production of discourse and of the evident textualization of oneself.


2018 ◽  
Author(s):  
Jason P. Ottomano

102 Cornell L. Rev. 1743 (2017)On August 18, 2015, a group of hackers named Impact Team released 37 million records—9.7 gigabytes of data—from the Toronto-based website Ashley Madison. The hackers claimed to be motivated by the alleged unscrupulous practices of Ashley Madison’s parent company, Avid Life Media Inc., such as false advertising and failing to follow through on a datapurging procedure for which it charged members a nineteendollar fee, The data dump has affected people from all walks of life, including 15,000 government employees, Vice President Joe Biden’s son, and individuals who, because of this data breach, learned that strangers used their e-mail addresses to create Ashley Madison accounts. Former subscribers to the website have received demands to pay money in the form of bitcoins as a ransom on their personal information. The data breach is likely related to at least two suicides thus far. Lawsuits against Avid Life Media Inc. have commenced, and more are in the planning stages; some plaintiffs hope to coordinate class action litigation. Despite the understandable outrage that the website’s members and former members feel, many lawyers are not optimistic about the chances of recovering damages from Ashley Madison or Avid Life Media Inc. This Note will explore the avenues for recovery available to individuals who lose control of their personal information when the security of an organization that collects or holds such information is compromised. This Note will begin by tracing the development of privacy jurisprudence as it specifically relates to the creation and eventual prominence of the Internet in the United States. Next, the piece will discuss the emerging split of authority surrounding a question of statutory interpretation presented by the Good Samaritan exception of the Telecommunications Act of 1996. Specifically, the issue is whether 47 U.S.C. § 230(e)(2)—a carve-out within the Good Samaritan exception that withholds immunity for civil liability for intellectual property claims—applies to federal intellectual property laws only, or to both federal and state intellectual property laws. The piece will then conclude that if the Supreme Court were to resolve this split of authority, it should, and likely would, hold that § 230(e)(2) withholds immunity from claims brought under both federal and state intellectual property laws. Finally, this Note will present new policy proposals that Congress and interactive computer service providers (ICSPs) could pursue in light of that conclusion.


2021 ◽  
pp. 186-200
Author(s):  
Florian J. Egloff

This chapter focuses on intentions and cyberterrorists. In defining cyberterrorism as the use, or threat of use, of cyberspace to deliver violence, through the disruption or destruction of digital data, the chapter captures potentially novel behaviour. It highlights the claims made by intelligence officials about terrorists’ intentions of using cyberspace. It then interrogates to what extent this matches the literature on terrorist motivations and intentions, and whether cyberspace is an attractive means for carrying out terrorist attacks. Finding that a simple cost–benefit analysis does not favour cyberspace as a means of carrying out terrorist acts, the chapter interrogates the vectors of change both on the intentions and capability side of the assessment. It closes with the analysis of a hypothetical case that would match the definition of cyberterror: a religiously inspired version of the Ashley Madison hack.


2015 ◽  
Vol 2015 (9) ◽  
pp. 8-16 ◽  
Author(s):  
Steve Mansfield-Devine
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document