Cyber Crime

Cyber-Crime in Theory
Ava T. Nelson
Brandman University
SOCU 420
June 26, 2011
Stephen Schlereth


The theory of crime is this; there is a reason behind every criminal act committed or attempted. What we hope to come to know is who is susceptible to become the deviant behind that act and who will the most likely victim be of the said act. In this day and time the method in which crime is committed has changed with the advances in technology; these types of crimes can at time occur without any knowledge of it for several years after the fact. A theory is an attempt at formulating the meaning of the act by explaining the content of a definite class of experiences; if that ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

the Internet [HYPERLINK:]; physical presence is not necessary for cyber-crime to take place. The Department of Justice categorizes computer crime in three ways; they are the computer as a target - attacking the computers of others, the computer as a weapon - using a computer to commit "traditional crime" that we see in the physical world (such as fraud or illegal gambling), and the computer as an accessory - using a computer as a "fancy filing cabinet" to store illegal or stolen information. Along with the phenomenal growth of the Internet has come the growth of cyber-crime opportunities. As a result of rapid adoption of the Internet globally computer crimes include not only hacking and cracking, but now also include extortion, child pornography, money laundering, fraud, software pirating, and corporate espionage, to name a few. What is the difference between deviance and crime? Deviance in a sociological context describes actions or behaviors ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.

Already a member? Login

Melton theory assumes the opposite. The theory assumes that deviance will occur if society encourages it by pressuring individuals to commit the act. In American culture there is a lot of emphases put on success and wealth; Merton believes that if society pushes all socioeconomic levels to strive for success there are some people that will try to obtain success by any means. Therefore, less fortunate are pushed to commit deviant acts to obtain it.

The most popular form of response is conformity; it involves accepting both the culture goal of success and the use of legitimate means of working towards that goal. Presumably most of us choose this response. Largely found among lower-class ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


Cyber Crime. (2012, August 11). Retrieved February 18, 2019, from
"Cyber Crime.", 11 Aug. 2012. Web. 18 Feb. 2019. <>
"Cyber Crime." August 11, 2012. Accessed February 18, 2019.
"Cyber Crime." August 11, 2012. Accessed February 18, 2019.
Join today and get instant access to this and 50,000+ other essays

Added: 8/11/2012 06:49:26 PM
Submitted By: taquan34
Category: Computers
Type: Premium Paper
Words: 2526
Pages: 10

Save | Report


Save and find your favorite essays easier

COMPUTER CRIME Hackers And Secu...
Crime Free Children of Today, C...
The Arrival Of The Internet
Uses Of Networking
Identity Theft
Internet Security
United States of America V. Dep...
Information Security
Online Banking Security
Copyright | Cancel | Contact Us

Copyright © 2019 Essayworld. All rights reserved