The Computer Underground


NORTHERN ILLINOIS UNIVERSITY
THE SOCIAL ORGANIZATION OF
A THESIS SUBMITTED TO THE GRADUATE SCHOOL IN PARTIAL
FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE
MASTER OF ARTS
DEPARTMENT OF SOCIOLOGY
BY
%CompuServe: 72307,1502% %GEnie: GRMEYER%
DEKALB, ILLINOIS


ABSTRACT

Mame: Gordon R. Meyer Department: Sociology Title: The Social Organization
of the Computer Underground Major: Criminology Degree: M.A. Aproved by:
Date: _____________________________________ ___________
Tesis Director

NORTHERN ILLINOIS UNIVERSITY

...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

the computer
underground, it is organized primarily on the level of colleagues, with
only small groups approaching peer relationships.

Certification: In accordance with departmental and Graduate
School policies, this thesis
is accepted in partial fulfillment of degree
requirements.

______________________
Thesis Director

______________________
Date

ACKNOWLEDGMENTS
FOR CRITIQUE, ADVICE, AND COMMENTS:
DR. JAMES L. MASSEY
DR. JIM THOMAS
DR. DAVID F. LUCKENBILL
FOR SUPPORT AND ENCOURAGEMENT:
GALE GREINKE
SPECIAL THANKS TO:
D.C., T.M., T.K., K.L., D.P.,
M.H., AND G.Z.
THIS WORK IS DEDICATED TO:
GEORGE HAYDUKE
AND
BARRY FREED

...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

question of how the "underground" is organized will be
answered, rather than the technical question of how CU participants perform
their acts.

Best and Luckenbill (1982) describe three basic approaches to the
study of "deviant" groups. The first approach is from a social
psychological level, where analysis focuses on the needs, motives, and
individual characteristics of the actors involved. Secondly, deviant
groups can be studied at a socio-structural level. Here the emphasis is on
the distribution and consequences of deviance within the society as a whole.
The third approach, the one adopted by this work, forms a middle ground
between the former two by addressing the ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

The Computer Underground. (2008, August 18). Retrieved September 20, 2017, from http://www.essayworld.com/essays/The-Computer-Underground/88527
"The Computer Underground." Essayworld.com. Essayworld.com, 18 Aug. 2008. Web. 20 Sep. 2017. <http://www.essayworld.com/essays/The-Computer-Underground/88527>
"The Computer Underground." Essayworld.com. August 18, 2008. Accessed September 20, 2017. http://www.essayworld.com/essays/The-Computer-Underground/88527.
"The Computer Underground." Essayworld.com. August 18, 2008. Accessed September 20, 2017. http://www.essayworld.com/essays/The-Computer-Underground/88527.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 8/18/2008 07:28:47 PM
Category: Computers
Type: Premium Paper
Words: 15764
Pages: 58

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
The Computer Underground
The Computer Underground.
The Future Of Computer Crime In...
Computer Software Piracy And It...
The Computer
America And The Computer Indust...
IBM's Dominance Of The Computer...
History Of The Computer Indust
History Of The Computer Industr...
The Evolution Of The Computer
Copyright | Cancel | Contact Us

Copyright © 2017 Essayworld. All rights reserved