Crime Causation Theory

Great Essays
Crime Causation & Theory:
In order to understand cybercrime or in this case the provided hypothetical cybercrime scenario of the group of vigilante computer hackers this paper will use a theoretical approach to better outline some of the key elements that lead to motivation behind these criminal activities, weather there is a link or relationship between crime and technology in this case the internet as a platform connected to a global network accessible to anyone around the world. In order understand these key factors to explain online deviance and behaviour by examining self-control theory, whether an individual’s level of self-control has any relevance in their tendencies to engage in online deviant activities. In the research journal article
…show more content…
In reference to the Convention on cybercrime which Canada is a part of the enacted legislations which grants police agencies the ability and power to compel internet providers to assist law enforcement in the release of ‘lawful access’ of personal data, traffic and general information needed for the purpose of investigation in response to a new internet data surveillance approach to tackle cybercrime (Huey & Rosenberg, 2004). The purpose behind this legislation was in response to online cybercrime deviant crimes and for law enforcement to have the ability to retrieve or access information such as identity, location, to track down individuals participating in deviant behaviour on the internet. Although this approach seemed to be focused more towards surveillances of citizens rather than the main idea of implementing effective policies to protect individuals from cyber-attacks. In the Cybercrime Convention part of the international cooperation common goals implemented to better tackle cybercrimes worldwide was to enhance law enforcement, judicial and international cooperation’s by establishing procedures such as detection, investigation and prosecution of individuals in relation to computer related crimes and the collection of evidence available to …show more content…
Some of these challenges outlined are key issues that make it tough to predict or detect cybercrimes, for instance finding out the identity of the hackers or hacker groups behind an attack is a problem, due to the mask of anonymity that conceals individuals true identities. Another factor is the idea that the perpetrator behind a computer crime can originate from around the world, thus the restrictive boundaries of space geographically and politically making it time and resource consuming for law enforcements to pursue any relevant leads or evidence. Also due to the ever increasing interconnection of various public and private companies’ reliance on their own privacy and interdependence, the sharing of information has made it challenging to track or locate individuals behind these cybercrimes who at times use similar tools developed for reliability for criminal purposes, therefore making it costly and difficult to deter such threats (Deloitte, 2008). One such initiative that was introduced was the Canada Evidence Act that provided new powers that gave police the ability to search and seize warrants that would ensure private internet providers and telecommunication firms reveal information as it relates to

Related Documents

  • Decent Essays

    Furthermore, the causes of her behavior in committing seven murders had a lot to do with Social reaction theory. People have labelled Wuornos because of her crimes, which put a damaging perception on her self-image. This labeling on her relates to Interpreting Crime; people’s reactions and thoughts of her devastating crimes. For instance, many labeled her as a psychopath, murdered, serial killer, uneducated, poor, emotionally and physically corrupted. Interpreting crime, also helps label positive behavior from negative behavior.…

    • 146 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Control theory concentrates on the elements that limit people from crime. They contend that all individuals have needs and desires that are more effectively fulfilled through crime than through legitimate channels. For instance, it is much less demanding to take cash than to work for it. So according to control theorists, crime requires no extraordinary clarification, and it is frequently the most practical approach to get what one needs. Instead of clarifying why individuals participate in crime, we have to clarify why they don't.…

    • 306 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Please consider this my formal application for the position of Director of the Royal Canadian Mint. I am an internationally successful and digitally literate business leader and lawyer. I have been an officer, director, and advisor to private businesses and/or public companies in Canada, the United States, England, and Australia. I am a member of the Institute of Corporate Directors as well as the American Bar Association Business Section, Cyber Law and Governance Committees. I have the knowledge, skill, and experience to contribute significantly to the Board of the Royal Canadian Mint.…

    • 348 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    There are theories such as: Sociological This theory is one of the main causes of crime and it focuses on the crime being committed because of the social pressure and society. Individual’s behaviour is learned and maintained with punishments or rewards for instance if a young individual is growing up in a bad environment and someone tells the individual to do something bad and then rewards him the individual thinks that it is right to do that. One of the enduring and influential attempts to provide a broad sociological framework fo the understanding the deviant behaviour ,.Robert K. Merton’s developed the concept of ‘anomie’ to describe this in balance between cultural goals and institutionalised means.…

    • 1784 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Today, crime is not a new matter. In fact, crime and violence have been existent in the United States for more than two centuries. We can trace crime all the way to the Old West to the inner cities of the early 1900s. Since then, criminal activity has constantly been evolving along with our nation. In order to protect the safety of the public, government agencies were created for the purpose of combating and deterring crime.…

    • 876 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    In a research paper published by Png & Wang in 2007, using event study analysis found that computer crime is reduced by 36% in a 15-day window surrounding government enforcement against computer hacks. This shows that deterrence is a clear factor in an individual decided to commit a computer crime. This is due to the fact that there is much less obstacles needed to be deterred, and when an increase in deterrence is presented to the criminal, there is a direct relationship with the decrease in crime committee (Png & Wang, 11). Another empirical analysis conducted on computer crime found that within an hour of instant messaging with a non-stranger, harassment was 6% more likely to occur and an astounding increase of almost 80% chance of a non-stranger engaging in sexual harassment (783). Social control theory could explain this statistic, because the social norms of the situation are removed and the harasser does not have to does not have to confront the victim face to face.…

    • 562 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Sociology Personal Statement I first became hooked by sociology when I started it back in GCSE years, and since then I have realised that the world we live in isn’t quite as simple as we once thought it was, and how society can be affected by different things in different ways. I wish to be able to know, how a person can act differently in one area than somebody from a different area, also how the society in which somebody is socialised can cause them to turn to crime whether it be through material deprivation or pressure from their peers. My favourite area of Sociology to learn about is Crime, I am so interested in the ways in which crime can affect our lives in both bad and good ways, and also learn how something that can be perceived as a crime to one person can be seen as perfectly acceptable to another. I carried Sociology onto A-Level and this just went further into detail on the things that I was interested and I can’t wait to be able to go even deeper into why things happen in a society the way that they do.…

    • 727 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The foundation of computer crimes lies with The Computer Fraud and Abuse Act (CFAA) of 1986, 18 U.S.C. 1030. According to Easttom and Taylor (2011), the CFAA was a federal act which provided protection of computer systems that were part of a federal entity or financial-institution. Over time and through a series of congressional hearings, lawmakers have amended and tailored language in a manner to protect the government's interest in computer crimes while striking a balance with the ability of the states to mount their own initiative in a state's prosecution (Department of Justice, n.d.). Congress has continued to amend the CFAA just as cyber crimes continue to take advantage of the evolution of the computer and cyber communications.…

    • 386 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Introduction When it comes to digital crimes, various methods are used to commit such acts. These include: Hacking, malicious software as well as cyber stalking, to name a few takes place day in and day out. The names that are attached to these crimes in fact explains the what and now, the why has to be explained. In this body of work however, it will be discussed theories surrounding digital crimes. Space Transition Theory and Social Learning Theory will provide detail and insight as to the why factor: why was the crime committed, the rationale of the response, how it relates to crime in general.…

    • 795 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    century policing, the shift from the police being solely responsible for policing cyberspace have been extending to the people that need the policing as well as partner agencies both private and governmental. Following Nolan’s standard of conduct in Public Office namely: Selflessness, Integrity, Openness, Objectivity, Honesty and Accountability, each failure listed can be found to be lacking in one or more of these standards. It is the lessons learned and the recommendations from these inquiries that will guide a general policing strategy that is embracing in all aspect of policing. Below are some of the scandals and enquiries that have and are still shaping policing from the twentieth to twenty-first centuries.…

    • 1173 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Crime and the 21st Century: Applying the Strain Theory Crime in the 21st century as a whole is on the decline. From 2003 until 2012, there was a 12.2 percent drop in violent crime and a -14 percent drop in property crime. In 2012, according to the UCR data on violent crime and property crime, there were 1,214,462 violent crimes reported and 8,975,438 property crimes reported. (FBI, 2013).…

    • 1435 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Crime Pattern Theory (Brantingham and Brantingham 2008) examines people’s activity patterns, especially when traveling to, or gathering at particular places, in terms of ‘paths, nodes and edges’; and whether places are ‘crime generators’ (many crimes happen there simply because lots of people are passing through, some of whom happen to be opportunistic criminals) or ‘crime attractors’ (criminals are specifically attracted there because of features that make crime less risky, less effort or more rewarding). Broken Windows is a specific theory (Wilson and Kelling 1982) that suggests that if we fail to maintain the environment (for example by leaving broken windows unrepaired, or allowing litter to build up and public places to become dirty and…

    • 1236 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Despite the fact, other countries are becoming more reliant upon the internet for business and government purposes they are at jeopardy too. Computer crimes are threatening the forthcoming of communication and confidentiality of companies and establishments. “Defining computer crime is a daunting and difficult task.”. (Taylor, Fritsch, & John, 2015) First, using the computer as a target this means that the computer itself is the target.…

    • 940 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    •The threat of computer criminals. As technology has advanced, a class of people who take advantage of networked computers to steal data has emerged. In some cases, they are operating for benign (or malicious) kicks or to prove to themselves or to their friends that they can do it .In some cases, they are operating for personal gain (stealing credit card information, engaging in fraudulent transactions).…

    • 1079 Words
    • 5 Pages
    Great Essays

Related Topics