Theories of Crime
This thesis is exploring the relatively new criminal trends of computer crime, or as it is recognized termed, cracking. The foundation for the assessment is based on how well classic psychological theories of criminal offenses and deviance explain the brand new behaviour. Dominant theories in each of the categories of psychoanalytic, learning and control are reviewed. The thesis concludes that for the most part, classic psychological ideas are deficient with regard to explaining criminal laptop behaviour. It is argued that differential association and cultural learning theory may be partly effective in explaining the original involvement and continuation of criminal computer system behaviour.
Psychological Hypotheses of Criminal offenses and " Hacking”
Today's society with the midst of the technological trend. With advances in computers and telecommunications most businesses and lots of individuals have grown to be dependent on personal computers and systems to carry out everyday activities (Howard, 1997; Sterling, 1992). Howard (1997) mentioned that by 1996, 13 million website hosts systems had been accessing the web. It has been believed that by the year the year 2003, the number could have risen to more than 200 million (Denning, 1998). The rush to embrace the brand new technology has additionally introduced a brand new category of lawbreaker activity and behaviour, commonly known as hacking1 (Goodell, 1996; Littman, 1995). Hacking is a lawbreaker activity that relies on the dependence of computers and networks, such as Internet (Hutchison, 1997, Schnell und einfach, 1996; Stoll, 1985). Those engaged in cracking activities have already been termed cyber criminals (Howard, 1997; Taylor, 1998). The term hacker has had a large number of connotations over time. It was originally connected with outstanding and radical coders in the computer system science fields (usually by Berkley, Stanford or MIT) (Chandler, 1996). Today that commonly refers to an individual engaged in a form of legal behaviour, hacking. Hacking could be formally defined as either a successful or defeated attempt to gain unauthorized use or unauthorized access to your computer system (Howard, 1997).
Society is now looking to come to grips with this new criminal activity that knows not any geographical limitations and blurs the notion of criminal legislation (Hafner & Markoff 1995; Hutchison, 1997). Behavioural research has been remiss in its research into the tendency of cracking and as such there has been little or no scientific research in the areas of emotional profiles and causes of the behaviour (Karnow et al., 1994).
In order to be familiar with criminal conduct of cyber criminals, it is necessary to examine the traditional psychological theories of criminal conduct and how they are often applied to develop an understanding of hacking. Key Psychological Theories of Crime
The major emotional theories of crime can be categorized in to the following areas; psychoanalytic theory learning theory, and control theory (Blackburn, 1993; Feldman, 1993; Hollin, 1989). Dominant theories within just each of these categories will be quickly reviewed. Difficulties psychological hypotheses of criminal offense have been inspired to some extent by simply other areas (i. e., criminology, sociology, & biology) (Feldman, 1993; Hollin, 1989). Criminology might have had the biggest effect on the development of behavioural ideas of crime (Bartol, 1991; Hollin, 1989). As such it is important to quickly review the 2 predominant disciplines in criminology, classical, and positivist theory. (Clinnar & Quinney, 1986; Feldman, 1993; Hollin, 1989).
The classical theorists hold central the style that guy is capable of free will (Hollin, 1989). Crime can be described in terms of alternatives between criminal behaviour (if the opportunity arose) or noncriminal behaviour. If the rewards for any criminal take action are higher than the retribution, the possibility of felony behaviour boosts (Hollin, 1989).
The positivist theorists believe that...
References: Agnew, R. (1995). Testing the main crime theories: An alternative technique focusing on motivational processes. Record of Analysis in Criminal offense and Delinquency, 32, 363-398.
Bartol, C. (1991). Lawbreaker behavior a psychosocial strategy 3rd copy. New Jersey: Prentice Hall.
Blackburn, R. (1993). The psychology of legal conduct: Theory, research and practice. Toronto: John Wiley & Daughters.
Chandler, A. (1996). The changing classification and picture of hackers in popular discourse. International Diary of the Sociology of Legislation, 24, 229-251.
Denning, D. (1998). Information Combat and Protection. Reading: Addison-Wesley.
Duff, D., & Gardiner, S. (1996). Computer criminal offenses in the global village: Methods for control and regulation- in defence with the hacker. Intercontinental Journal in the Sociology of Law, 24, 221-228.
Ellison, K. & Buckhout, L. (1981). Psychology and lawbreaker justice. New York: Harper & Row.
Eysenck, S. & Eysenck, They would. (1977). Individuality differences among prisoners and controls. Psychological Reports, 45, 1023-1028.
Ewen, 3rd there�s r
Feldman, S. (1993). The psychology of crime a social research textbook. Cambridge: Cambridge College or university Press.
Garfinkel, S., & Spafford, G. (1996). Functional unix and internet reliability. New York: O'reilly & Associates Inc.
Gattiker, U., & Kelley, L. (1997). Techno-crime and horror against tomorrow's organization: How about cyberpunks? Available HTTP: www.ncsa.com/library.
Goldstein, Elizabeth. (1997). And justice for all those. 2600: The Hacker Quarterly, 13(2), 48-57.
Goodell, T., (1996). The cyber thief and the samurai. New York: Dell Publishing.
Hafner, K. & Markoff, L. (1995). Cyberpunks: Outlaws and hackers on the computer frontier. Barcelone: Simon and Schuster.
Hollin, C. (1989). Psychology and crime: An intro to criminological psychology. New york city: Routledge
Hutchison, S. (1997). Computer criminal offense in canada. Unpublished Manuscript.
Karnow, C., Landels, R. & Landels, Deb. (1994). Recombinant culture: criminal offense in the digital network. Obtainable HTTP: www.cpsr.org/privacy.
Littman, M. (1995). The fugitive game: online with kevin mitnick. Toronto: Tiny Brown & Company.
Littman, J. (1997). The Watchman: The garbled life and
offences of serial hacker kevin poulsen
Mizrach, S. (1997). Is there a hacker ethic for the 90s? Available HTTP: Hostname: infowar. com.
Post, J. (1996). The dangerous information program insider: Emotional perspectives. Obtainable HTTP: www.infowar.com
Electrical power, R
Electric power, R. (1998). Current and future threat. Computer Secureness Institute.
Schnell und einfach, M. (1996). Criminal law and the internet. The
Internet and Business: A Lawyer's Tips for the Emerging Legal issues
Rogers, M. (2001). A cultural learning theory and moral disengagement examination of lawbreaker computer habit: An disovery study. Unpublished dissertation.
Stoll, C. (1985). The cuckoos egg: Tracking a traveler through the maze of computer system espionage. Ny: Mass Market Paperback.
Sutherland, E. (1947). Principles of criminology (4th ed. ). Philadelphia: Lippincott.
Taylor, S. (1998). Hackers: the hawks and the doves-enemies & good friends. Unpublished manuscript.
West, M. (1988). Emotional contributions to criminology. United kingdom Journal of Criminology, twenty-eight, 77-92.
Born News. (1998). Analyzer requires notoriety towards the bank. Readily available
How to Overcome Sleep problems Essay
P3 Product 16 Business Btec Level 2 Composition
Swot Analysis Essay
Cleveland Medical clinic Essay
Imaginative Trips Essay
A Review of Uk Literature Dissertation
Essay in Compare and Contrast Yoga and Hinduism
1 . a few LMS function file Article
Informative Presentation About Eating Disorders Essay
Undifferentiated Schizophrenia Essay
5DPP Assignment Nov 2014 Essay
Dimaporo V Hret Composition
Identify the Firm’s Essential External Stakeholders and Show Their Varying Influences Upon This Organisation Article
Essay on The Stanford Zimbardo Experiment
Workplace Tradition Essay