Digital Crime Theory

Good Essays
One day after finishing CIS 170’s class, the professor asked everyone in the class to select two of the theories suggested in chapter three of the text that a researcher could use to explain the cause of digital crime.

To begin with, there are many theories to explain the cause of digital crime, however the most important or most popular rather are, Choice theory, and Social structure theory. The purpose of the two stated here being the most significant are as follows. To start, choice theory is very important when it comes to any act. Choice theory is basically premeditation. An individual only does things whether good or bad, because it makes them feel great as they’re committing it. Its fact that everyone in society wants something out
…show more content…
This being important to digital crimes because it’s stated that only the poor and less fortunate were the main cause of digital crimes. As the crimes got higher and the digital criminals were successful, brought this assumption about only the poor do bad to be opinionated. It’s a proven fact that not only does the poor and less fortunate do crimes, but also the rich and famous as well. It can be also proven that maybe this is how some rich people gotten rich or stay rich. Many does this as a career, while very few does it as a side gig. The two sub categories for social structure theories are, Strain theory and Subculture …show more content…
As far as for subculture theory, this theory is like a church congregation, instead what they do isn’t by God. The purpose of stating that they’re like a church’s congregation was to say that whatever their leader tells them, they do it. They do this with passionate because this is what they believe in, and won’t let anyone stop them from believing in it. Their different than any other gang, group, etc. They don’t follow anyone. They have their own true values, norms, and beliefs. If anything they do brings them to the court of law, so be it. If anything they do leads them to their death, so be it. If anything they do leads them to killing, raping, robbing, setting up, kidnapping, so be it. All and all, these individual are so head strong on their beliefs till they show no remorse. It’s like they don’t have hearts. Now tying these individuals back to the topic of digital crimes will be as follows. Committing crimes like electronic transfer’s funds, sexual content and harassment, and identity theft from these guys is normal. They find these acts very fascinating and don’t care what the outcome be. They only care about what they leader asks of them. If the leader says to do identity theft, then that’s what they’ll commit. If they’re told to set someone up on the internet in order to take all their personal accounts, and goods, then they’ll do that as well. It doesn’t matter what it is, they’ll do it. They do all things simply because they’re strong

Related Documents

  • Decent Essays

    Hackers uses this collecteddata to find a way which will help them executing an attack on the Operating System, Installed Software, Open Ports, IP Addresses or user accounts. Hacker uses this accumulated informationfor gaining access to the system which is the third phase of ethical hacking. They do tedious amount of work to break the passwords and often utilizes tools like legion. Only gaining access to the system isn 't everything, but to maintain their access in it, they develops a different system paththrough which he can intrude the system as an anonymous. Thisanonymous hacker does its best toremove all the evidences of the system thats being hack, defy the intrusion detection alarms and thus avoid any form of legal actions against him.…

    • 1032 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Dangers Of Cybercrime

    • 997 Words
    • 4 Pages

    Sun Tzu says, if you know your enemy and you know yourself you need not fear the results of a hundred battles and to know your enemy, you must become your enemy. We must know the hackers motive, means, and opportunity behind the attack. We really cannot prevent the hackers motive or means, but we can affect the opportunity. We no longer have to only worry about the criminals around us but also in the online world now too. The computer viruses and malicious software are no longer done as hobbies, they are being done by professional criminals who are making millions with their attacks.…

    • 997 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    What Is Cyber Security?

    • 1268 Words
    • 6 Pages

    They much occur when system hackers exploit employees through scams and social engineering. With the sophistication and advancement in technology, hackers are becoming more sophisticated also at searching for loopholes and crack in corporate security systems and can easily gain access to protected files and data, staging a noble cyber security threat. Spear phishing is also a major security concern to the It industry (Shoemaker & Sigler, 2014). As opposed to regular phishing emails that randomly target people, victims who normally sphere head spear phishing scams are by all means looking for profitable business or private information to earn them money. Spear phishing occurs when malicious hackers target employees via emails that may appear conversant and by so doing gain access and steal personal information.…

    • 1268 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    In criminalistics of computer forensics class I have learned all types of crimes from auction fraud, credit card fraud, cellular fraud and my absolute favorite topic which is identity theft. Everyone probably doesn’t think that identity theft is a real crime. Believe it or not identity theft is one of the topic crimes in America today. Identity theft is often in the news. It is sad because someone will profit off of another loses.…

    • 1648 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Essay On Cyber Stalking

    • 1445 Words
    • 6 Pages

    makes a man perplexed for his/her wellbeing. There are numerous basic qualities are distinguished in cyber spooks, which is the most typical kind of cyberbullying among adults. Cyber stalking can have characterized as the utilization of innovation, especially the Internet, to bug somebody. Regular attributes incorporate false allegations, checking, dangers, fraud, and information annihilation or control. Cyber stalking likewise incorporates misuse of minors, be it sexual or otherwise.…

    • 1445 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Logos is all about the word choice and the way how they write, which is affected by the choice of the audience. The author starts out with telling what cyber-attacks are and what types are there, so the audience can understand what they are saying later in the article. The author writes in a friendly-serious tone because he/she wants to show how cyber-attacks are not good but not to influence the readers that the author is yelling at them. One sentence that the FBI gives is "…cyber crimes that are most dangerous to our national security and to our economy" ("Cyber Crime", n.d., para. 8).…

    • 869 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Mission Mobilization

    • 1696 Words
    • 7 Pages

    Initially this requires a church to focus on worship. This is not the general form of worship through song, but it is the authentic, holistic worship of living for the glory of God. Whatever the church does, they should strive to worship. Further than that, they should strive to get others to worship. According to John Piper “Missions exists because worship doesn’t.…

    • 1696 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    This is why people refure to human trafficking as a gender crime. Anyone can be targeted but the main victims are women or and young children. These victims get lured into traps by traffickers and are now in the control of the trafficker. The trafficker then can do as he pleases with the victim, and the victim has no say in what happens. Human trafficking is a serious crime; there is always the victim, the trafficker and a very…

    • 1532 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Predatory vs. Affective vs. Hostile vs. Instrumental? Bundy would use predatory aggression, once he had his victims lured in he planned to hurt and kill them. He was a very organized serial killer, which is why he was able to stay off of the radar of the police (SOURCE 4).…

    • 1675 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    It is easy for them to make fake profiles and say what they want with little to no emotion on how their victims may feel. As a society we need to stand up and teach our youth how to handle cyberbullies for if they were to become victims. They need to also be able to recognize a cyberbully to stand up and help someone else who may be a victim. We as a society need to stand up and say enough is enough and help put a stop to cyberbullying on social media sites. What does this say about you if you are to be scrolling though one of the hundreds of social media sites and witness someone being bullied?…

    • 1453 Words
    • 6 Pages
    Decent Essays