Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Cyber Crime - School Essays

Cyber Crime

Cyber-Crime in Theory
Ava T. Nelson
Brandman University
SOCU 420
June 26, 2011
Stephen Schlereth


Abstract

The theory of crime is this; there is a reason behind every criminal act committed or attempted. What we hope to come to know is who is susceptible to become the deviant behind that act and who will the most likely victim be of the said act. In this day and time the method in which crime is committed has changed with the advances in technology; these types of crimes can at time occur without any knowledge of it for several years after the fact. A theory is an attempt at formulating the meaning of the act by explaining the content of a definite class of experiences; if that ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

the Internet [HYPERLINK: http://en.wikipedia.org/wiki/Internet]; physical presence is not necessary for cyber-crime to take place. The Department of Justice categorizes computer crime in three ways; they are the computer as a target - attacking the computers of others, the computer as a weapon - using a computer to commit "traditional crime" that we see in the physical world (such as fraud or illegal gambling), and the computer as an accessory - using a computer as a "fancy filing cabinet" to store illegal or stolen information. Along with the phenomenal growth of the Internet has come the growth of cyber-crime opportunities. As a result of rapid adoption of the Internet globally computer crimes include not only hacking and cracking, but now also include extortion, child pornography, money laundering, fraud, software pirating, and corporate espionage, to name a few. What is the difference between deviance and crime? Deviance in a sociological context describes actions or behaviors ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

Melton theory assumes the opposite. The theory assumes that deviance will occur if society encourages it by pressuring individuals to commit the act. In American culture there is a lot of emphases put on success and wealth; Merton believes that if society pushes all socioeconomic levels to strive for success there are some people that will try to obtain success by any means. Therefore, less fortunate are pushed to commit deviant acts to obtain it.

The most popular form of response is conformity; it involves accepting both the culture goal of success and the use of legitimate means of working towards that goal. Presumably most of us choose this response. Largely found among lower-class ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Cyber Crime. (2012, August 11). Retrieved December 23, 2024, from http://www.essayworld.com/essays/Cyber-Crime/101349
"Cyber Crime." Essayworld.com. Essayworld.com, 11 Aug. 2012. Web. 23 Dec. 2024. <http://www.essayworld.com/essays/Cyber-Crime/101349>
"Cyber Crime." Essayworld.com. August 11, 2012. Accessed December 23, 2024. http://www.essayworld.com/essays/Cyber-Crime/101349.
"Cyber Crime." Essayworld.com. August 11, 2012. Accessed December 23, 2024. http://www.essayworld.com/essays/Cyber-Crime/101349.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 8/11/2012 06:49:26 PM
Submitted By: taquan34
Category: Computers
Type: Premium Paper
Words: 2526
Pages: 10

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» COMPUTER CRIME Hackers And Secu...
» Crime Free Children of Today, C...
» Cyberstalking
» Uses Of Networking
» Online Banking Security
» Information Security
» Internet Security
» Identity Theft
» The Arrival Of The Internet
» The Vast Cyber-frontier Is Bein...
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved