Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
The Computer Underground - Online Term Paper

The Computer Underground


NORTHERN ILLINOIS UNIVERSITY
THE SOCIAL ORGANIZATION OF
A THESIS SUBMITTED TO THE GRADUATE SCHOOL IN PARTIAL
FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE
MASTER OF ARTS
DEPARTMENT OF SOCIOLOGY
BY
%CompuServe: 72307,1502% %GEnie: GRMEYER%
DEKALB, ILLINOIS


ABSTRACT

Mame: Gordon R. Meyer Department: Sociology Title: The Social Organization
of the Computer Underground Major: Criminology Degree: M.A. Aproved by:
Date: _____________________________________ ___________
Tesis Director

NORTHERN ILLINOIS UNIVERSITY

...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

the computer
underground, it is organized primarily on the level of colleagues, with
only small groups approaching peer relationships.

Certification: In accordance with departmental and Graduate
School policies, this thesis
is accepted in partial fulfillment of degree
requirements.

______________________
Thesis Director

______________________
Date

ACKNOWLEDGMENTS
FOR CRITIQUE, ADVICE, AND COMMENTS:
DR. JAMES L. MASSEY
DR. JIM THOMAS
DR. DAVID F. LUCKENBILL
FOR SUPPORT AND ENCOURAGEMENT:
GALE GREINKE
SPECIAL THANKS TO:
D.C., T.M., T.K., K.L., D.P.,
M.H., AND G.Z.
THIS WORK IS DEDICATED TO:
GEORGE HAYDUKE
AND
BARRY FREED

...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

question of how the "underground" is organized will be
answered, rather than the technical question of how CU participants perform
their acts.

Best and Luckenbill (1982) describe three basic approaches to the
study of "deviant" groups. The first approach is from a social
psychological level, where analysis focuses on the needs, motives, and
individual characteristics of the actors involved. Secondly, deviant
groups can be studied at a socio-structural level. Here the emphasis is on
the distribution and consequences of deviance within the society as a whole.
The third approach, the one adopted by this work, forms a middle ground
between the former two by addressing the ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

The Computer Underground. (2008, August 18). Retrieved August 11, 2022, from http://www.essayworld.com/essays/The-Computer-Underground/88527
"The Computer Underground." Essayworld.com. Essayworld.com, 18 Aug. 2008. Web. 11 Aug. 2022. <http://www.essayworld.com/essays/The-Computer-Underground/88527>
"The Computer Underground." Essayworld.com. August 18, 2008. Accessed August 11, 2022. http://www.essayworld.com/essays/The-Computer-Underground/88527.
"The Computer Underground." Essayworld.com. August 18, 2008. Accessed August 11, 2022. http://www.essayworld.com/essays/The-Computer-Underground/88527.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 8/18/2008 07:28:47 PM
Category: Computers
Type: Premium Paper
Words: 15764
Pages: 58

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
The Computer Underground.
The Computer Underground
Computer Software Piracy And It...
The Future Of Computer Crime In...
Hackers
Computer Crime
Computer Crimes: Laws Must Be P...
William Gibson And The Internet
Computer Crime In The 90's
Computer Crime
Copyright | Cancel | Contact Us

Copyright © 2022 Essayworld. All rights reserved