Criminal Theories

Read Complete Research Material

CRIMINAL THEORIES

Criminal Theories

Criminal Theories

Cyber crimes:

Hacking is a matter of experience, because it assumes knowledge of interconnected cyber information flow and their functioning, which may not be within the exclusive prerogative of any man (Bandura 2000). Computer networks and related information channels have increased opportunities for new kinds of deviant behavior through a radical metamorphosis of our normative social structure, the creation of moral ambiguity and providing a place for criminal countercultures grow and prosper. Anti-hacking laws were ineffective because of their traditional approaches to crime deterrence.

Discussion

We can explore the underlying motives of hackers by deploying a major psychological and social learning based criminological theories such as psychoanalysis, conditioning, differential association and moral development (Yar 2000).

The common thread through all the theoretical explanations is the system of "rewards" as material and moral, for hackers. Need to erase the system by limiting the ability of large corporations hire hackers to notorious hefty gains. Secondly, there is an urgent need to somehow regulate the hacker community, which operated on the Internet. Separate online world comes into existence and the government should divert their resources to check the growth of the hacker culture by banning the hacker magazines and websites.

While such a move could be accused of over-voltage, but ultimately, social welfare will be much higher than the minimum inconvenience and, in fact, the right to expression and the need for social order and classes like "hacktivists", which supposedly represents the voice of subordinates in the majority of society cannot invoke immunity from common law on moral grounds (Britz 2008). Thirdly, it is necessary to shed the "one-size-fits-approach" to develop schedules of punishment as a hacker motives are broader spectrum. Legal measures to combat crime are ineffective or become worse if they do not take into account the social conditions in which they apply and are not careful social impact, especially penalty may refer in this context. Differential targeting of hacker classes, make a punitive law more efficient and streamlined. Finally, we live in an age of absolute moral uncertainty, where there is no consensus on the definition of right or wrong and subjective criteria to place any behavior in any of the categories. Hacking makes awards and seduces youth and lack of internal controls in the form of ethical standards, promotes the commission (Britz 2008). Thus, the proposed alternative strategies may include education on the ethics of the computer in the early stages of school to condition young minds.

Routine-Activity Theory

Routine activity theory "provides a simple and powerful understanding of the causes of crime problems. At its heart is the idea that in absence of effective monitoring, offenders will prey on attractive targets (Rotter1999). To have a crime motivated offender must come to the same place as an attractive target. If attractive target is never in the same place, the offender motivation, the goal will not be taken, damaged or attacked. There are also controllers, whose presence can prevent crime. If the controller is absent or present but powerless, ...
Related Ads