Preview

Crime Thoeries

Good Essays
Open Document
Open Document
704 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Crime Thoeries
Crime Theories
Kristyn Irene Hope Seiler
Information Technology in Criminal Justice – CIS170
Strayer University

Professor Carmen J. Flores
November 5, 2012

There are many different theories when it comes to digital crime. Some of the theories are the choice theory, the deterrence theory, the psychological theory, the strain theory and the routine activities theory. In this paper I will discuss the one theory to be the cause of digital crime, why the theory chosen could be recognized as the most relevant in terms of being the cause of digital crime and two examples of non-digital crime that could be considered caused by this theory. The one theory that I believe that caused digital crime is the routine activities theory. This is related to crime in general by the way that the criminals had made a rational choice to commit the crime. The rational activities theory can be related to crime in general by that the criminals have the choice of what victim that they want to commit the crime on. There are many different ways to commit this crime digitally. Three of the ways are a motivated offender, a suitable target and the absence of a capable guardian. The three ways to commit a digital crime and a crime in general is the same three ways. In any crime you need a many different opportunities that need to be in place before the crime happens. The reason that rational activities theory could be recognized as the most relevant in terms of digital crime is because of what can happen when these criminals want something. A motivated offender is like a hacker. A suitable target is like a vulnerable computer system. The absence of a capable guardian is like inadequate software protection. The criminals have to have these three things that need to be in place before the criminal needs to be able to commit the crime. They need to weigh the risks of what crime they are about to commit with the benefits that will come forward when you finished committing



References: Marsh, Ian and Melville, Gaynor (2006). Theories of Crime. pg 1-181 Decker, Scott H. and Barlow, Hugh D. (2010). Criminology and Public Policy: Putting Theory to Work. pg 1-272 Robert W. Taylor, Eric J. Frisch, John Liederbach, and Thomas J. Holt (2011). Digital Crime and Digital Terrorism. pg 8-15

You May Also Find These Documents Helpful

  • Best Essays

    Nt1110 Unit 11 Lab

    • 2482 Words
    • 10 Pages

    Choi, K.(2008) Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2(1), 308-333.…

    • 2482 Words
    • 10 Pages
    Best Essays
  • Satisfactory Essays

    Advancing technology produce new forms of crime by creating or giving criminals that technology to commit the crime they have committed. For instance a hacker typically has to have a computer or internet to commit a cybercrime.…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Computer crime is an ongoing issue that we continuously see, and a major problem with this is that most people do not realize the harm that computer crime can cause. Computer crime is also a niche that continues to grow. This is based on the fact that there are many different perceptions about what computer crime is, and the harmful effects it can have. Because there is a gap between traditional views of what cyber crime is and the actual realities of these crimes, it is a criminal offense that will continue to happen.…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Explain how the Internet has aided criminal activity. The internet has aided criminal activity by communicating with each other without having to be near, as well as fraud and identity theft. The rise of the Internet over the last decade has paralleled some of the greatest milestones in communications history. Along with such great strides in bringing the world together, the frightening aspect of accessing information and propaganda that tests the very limits of the U.S. Constitution has arrived. Above all, the Internet is used to commit against persons that include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail. The trafficking, distribution, posting, and dissemination of obscene material including pornography and indecent exposure, constitutes one of the most important criminal activity known today. With just a few keystrokes, an individual can have access to all forms of personal information, bomb-making instructions, and poison recipes; and a plethora of extremist ideologies expressing everything from radical religious cults to clandestine organized crime groups.…

    • 1217 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The aim of this essay is to compare, contrast and evaluate two sociological theories of crime causation and two psychological theories of crime causation.…

    • 1985 Words
    • 8 Pages
    Good Essays
  • Good Essays

    When trying to evaluate a theory and deem whether it is a good enough theory that can be applied throughout a vast majority of situations, in this case crimes, theorists have a specific criteria that they have to meet. When developing a theory, theorists must construct their theory so that it can be judged by this certain criteria. This criteria is made out of: 1.) empirical validity, 2.) its logical consistency, 3.) scope, and parsimony, 4.) testability as well as 5.) The usefulness and 6.)…

    • 1043 Words
    • 5 Pages
    Good Essays
  • Better Essays

    This can be applied to the behaviors of criminals. According to Fishbein (1990, pg.37), “behavior [is] primarily attributed to inherited predispositions and genetic influences.” Nurture is the environmental influence that shape human behavior (Fishbein, 1990, pg.37). Human genetics and environmental factors contribute to the uniqueness to a person’s behavior. However, there are underlying qualities in a criminal’s historical background. Aspects of the nature and nurturing of a criminal behavior includes some problems with earlier biological explanations and some recent biological explanations which have overcome the weaknesses of the earlier ones. These two aspects can be applied in criminology for the prevention of the development of criminal minds.…

    • 1415 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Cybercrime: Hacking

    • 1198 Words
    • 4 Pages

    With everything in society advancing rapidly, it should be of no surprise that technology is now used to commit crimes against other people. Those crimes include identity theft, stealing money, illegal gambling, and cyberstalking. This paper will review cybercrime and the differences there are from traditional crime and it will review the purpose of hackers. There will also be three cases reviewed to help bring light to what kind of cybercrimes are being committed around the world.…

    • 1198 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    The routine activity theory was developed by Lawrence E. Cohen along with Marcus Felson in an attempt to explain victimization rates. This theory required structural changes be made by individuals to actively reduce their chances of becoming a victim. The theory identified three factors needed to be present for the successful completion of a crime. The first is a motivated individual wanting to commit a crime. The second is an attainable target available to the potential offender. Finally, a lack of a caretaker of the targeted…

    • 429 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    “Policing in America today is at a crossroads as it looks towards the future, the old policing strategies are no longer suited to address the emerging threats and growth of electronic crimes arising from out of the growth and popularity of the Internet, these crimes include: online fraud, child pornography, embezzlement, economic espionage, privacy violations, computer intrusions, cyber--stalking or any other offences that occur in an electronic environment for the express purpose of economic gain or with the intend to destroy or inflict harm to another person or institution.” …

    • 2169 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Computer crimes are criminal activities that involve using a computer and a network to gain unauthorized access with the intent of deleting, altering, or damaging computer data. Due to them being extremely versatile, establishing criminal and noncriminal behavior when in use can be very difficult at times. “According to the U.S. Uniform Crime Reporting Statistics, by 2000 more than 300 million users around the globe accessed the World Wide Web. Of those, at least 1 million were engaged in illegal Internet activities (computer crime or "cyber-crime"). Cyber-crimes include Internet-related forgery, embezzlement, fraud, vandalism, and the disposal of stolen goods. The potential threat to the overall development of e-commerce was serious—so much that online security expenditures were expected to double to $30 billion in 2004” (Computer Crime – Definitions). The four most common categories of computer crimes are infrastructure attacks, technological facilitation, information attacks, and promotion.…

    • 733 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Deterrence Theory

    • 724 Words
    • 3 Pages

    Deterrence of a crime is based on choice theory, which is the assumption that a person is making a conscious decision to commit a criminal act. Since the person is making a conscious effort to commit the crime, deterrence is meant to reflect the punishment for the crime based on that decision. In computer crime, since most computer users are aware of what constitutes as an illegal act (e.g. downloading music without paying for it), the assumption is that most people know when they are committing the crime. The reasons why deterrence may or may not be effective, the punishments used, and the key concepts of deterrence are the topic being discussed today.…

    • 724 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    A stated on the Law and Legal Information Web site, “A precise definition of computer crime is problematic’ (Law.jrank.org, n.d). Delving further into an explanation, one finds, “This is because of the array of different forms and forums in which the crime may appear. A single category cannot accommodate the wide divergence of conduct, perpetrators, victims, and motives found in examining computer crimes. Adding to this confusion is the fact that computer crimes also can vary depending upon the jurisdiction criminalizing the conduct. The criminal conduct can be the subject of punishment under a state statute. There is also…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Cyberbullying In Canada

    • 1966 Words
    • 8 Pages

    It has been a routine that when someone needs something, he or she can proceed to the Internet for his or her need to be catered. But on the other side of the Internet, crimes after crimes spread. Anything that takes place in cyberspace, or all electronic or internet means of communication can potentially produce cyber victims. A Cybercriminal use the computer as their object…

    • 1966 Words
    • 8 Pages
    Powerful Essays
  • Best Essays

    Marsh, I., Melville G., Norris G., Morgan K., Walkington, Z. (2006). Theories of Crime. London: Taylor & Francis Ltd. P125.…

    • 2514 Words
    • 11 Pages
    Best Essays