The Culture of Fear_ Why Americans Are Afraid of the Wrong Things - Barry Glassner [144]
12 Sue Fisher, “The Pull of the Fruit Machine,” Sociological Review 41 (1993): 446-74.
13 Jim Nesbitt, “Teens Vulnerable to Betting Addiction,” Seattle Times, 29 March 1998, p. A1; Brett Pulley, “Those Seductive Snake Eyes,” New York Times, 16 June 1998, pp. A1, 23.
14 Chavira, “Rise of Teenage Gambling”; Susan Howlett, “Risky Business,” Los Angeles Times, 14 September 1993, pp. E1—2; Holmstrom, “Teenage Gambling Addiction Grows.”
15 Howard Shaffer and Matthew Hall, “Estimating the Prevalence of Adolescent Gambling Disorders,” Journal of Gambling Studies 12 (1996): 193-214; Constance Holden, “Gambling on the Increase,” Science 279 (23 January 1998): 485; Howard Shaffer, “Youthful Addiction and Gambling,” talk delivered 27 October 1995 and distributed through the National Center for Responsible Gaming; Pulley, “Seductive Snake Eyes.” On maturing out see also Barry Glassner and Julia Loughlin, Drugs and Crime in Adolescent Worlds (New York: St. Martin’s Press, 1987).
16 Pulley, “Seductive Snake Eyes.”
17 Ray Robinson, “Is Rimm’s Porn Study ‘Cyberfraud’?” The Press of Atlantic City Online, 11 July 1995; Philip Elmer-Dewitt, “On a Screen Near You: Cyberporn,” Time, 3 July 1995, pp. 38—45.
18 Robinson, “Is Rimm’s Porn Study ‘Cyberfraud’?”; Philip Elmer-Dewitt, “Fire Storm on the Computer Nets,” Time, 24 July 1995, p. 57.
19 Donna Hoffman and Thomas Novak, “A Detailed Critique of the Time Article,” posted in July 1995 at http://www.vanderbilt.edu/Owen/HomePage.html; Brock N. Meeks, “CyberWire Dispatch on Time and the Rimm Study,” posted in July 1995 at http://www.cyberwerks.com:70/1/cyberwire.
20 Elmer-Dewitt, “On a Screen Near You.”
21 Hoffman and Novak, “A Detailed Critique”; Meeks, “CyberWire Dispatch.”
22 The technological generation gap: Laura Miller, “Fear of net.sex,” Wired, November 1995, p. 138. The act: Floyd Abrams, “Clinton vs. the First Amendment,” New York Times, 30 March 1997, p. F42 (contains Frankfurter quote); Joshua Quittner, “Free Speech for the Net,” Time, 24 June 1996, pp. 56-57; Steven Levy, “U.S. v. the Internet,” Newsweek, 31 March 1997, pp. 77-79. On blocking software and other resources available to parents see also Michael Banks, “Filtering the Net in Libraries,” Computers in Libraries 18 (March 1998): 50-54; Donna Rice Hughes, Kids Online: Protecting Your Children in Cyberspace (Grand Rapids, MI: Revell, 1998).
23 Time’s follow-up piece: Elmer-Dewitt, “Fire Storm,” p. 57. On the rarity of a news medium admitting it got a story wrong: Conrad Smith, Media and Apocalypse (Westport, CT: Greenwood Press, 1992), pp. 24—25, 187-88.
24 Abductions: Gunnar Stickler et al., “Parents’ Worries About Children Compared to Actual Risks,” Clinical Pediatrics 30 (1991): 522—28; press releases in 1995 from SafeCard Services reporting surveys by Audits and Surveys; David Finkelhor, Gerald Hotaling, and Andrea Sedlak, “The Abduction of Children by Strangers and Nonfamily Members,” Journal of Interpersonal Violence 7 (1992): 226-43; information from the National Center for Missing and Exploited Children. On the history of panics over missing children see Paula Fass, Kidnapped (New York: Oxford University Press, 1998).
25 See Kim Pittaway, “Sex Offenders: What You Need to Know,” Chatelaine 68 (March 1995): 57; Kenneth Wooden, Child Lures (Arlington, TX: Summit, 1995).
26 Joel Best, Threatened Children (Chicago: University of Chicago Press, 1990), ch. 2; Jay Grelen, “Sorting Out Myth, Mystery of ‘81 Slaying,” Rocky Mountain News, 15 May 1995, p. A22 (contains Walsh quote).
27 Best, Threatened Children, and “Dark Figures and Child Victims,” in J. Best, ed., Images ofIssues(New York: Aldine de Gruyter, 1989), pp. 21-38 (contains Young quote).
28 Barbara