Professional Documents
Culture Documents
Taylor CCCT4 PPT 03
Taylor CCCT4 PPT 03
Taylor CCCT4 PPT 03
Terrorism
Fourth Edition
Chapter 3
The Criminology of Computer Crime
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Learning Objectives (1 of 2)
•
3.1 Discuss the tenets of choice theory,
including routine activities theory, and its
applicability to cyber crimes.
•
3.2 Describe the assumptions of deterrence
theory and its utility.
•
3.3 Discuss the impact of personality
disorders on cyber crime.
•
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Learning Objectives (2 of 2)
•
3.4 Discuss the major social structure
theories that apply to cyber crime.
•
3.5 Discuss the learning and social
control theories that apply to cyber
crime.
•
3.6 Describe the relationship between
terrorism and political theory.
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Introduction
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Choice Theory (1 of 3)
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Choice Theory (2 of 3)
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Choice Theory (3 of 3)
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Routine Activities Theory (2 of 4)
•According to RAT, crime occurs when there is a
convergence in time and space of three factors:
–A motivated offender (e.g., a hacker)
–A suitable target (e.g., a vulnerable computer
system)
–The absence of a capable guardian (e.g., inadequate
software protection)
•All three factors must be present in order for crime to
occur.
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Routine Activities Theory (3 of 4)
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Routine Activities Theory (4 of 4)
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Deterrence Theory (1 of 4)
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Deterrence Theory (2 of 4)
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Deterrence Theory (4 of 4)
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Moral Development and Crime (1 of 2)
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Moral Development and Crime (2 of 2)
Kohlberg's six stages of moral development:
Stage 1 – Punishment and Obedience Orientation Stage – right is obedience to
power and rules and avoiding punishment;
Stage 2 –Hedonistic orientation stage – seeing one’s own needs met, taking
responsibility for oneself, and allowing others to do the same;
Stage 3 – Interpersonal Concordance Stage – right is having good intentions and
motives, and being concerned for others;
Stage 4 – Law and Order Orientation Stage – right is doing one’s duty to society
and others, and maintaining the rules of society;
Stage 5 – Social Contract, Legalistic Orientation Stage – right is based on
upholding the rules and values agreed upon by society – a social contract;
Stage 6 – Orientation to Universal Ethical Principles Stage – right is an assumed
obligation to principles such as justice and equality which apply to all individuals;
the individual recognizes the moral rightness of behavior.
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Personality Disorders
• Personality disorders
–Personality refers to the emotional and behavioral
attributes of an individual.
–Psychologists argue that certain personality characteristics
of an individual may influence crime.
• Sheldon and Glueck noted several personality characteristics
conducive to crime, including:
▪ Extroversion, Impulsivity, Lack of self-control
▪ Resentment, Suspicion of others, Destructiveness
▪ Less fearful of failure, Ambivalence toward authority
▪ Assertiveness, Feeling unappreciated
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Pedophiles and Psychological Theory
• Psychological theory has attempted to explain pedophilia.
–It is unclear why a person becomes a pedophile
– Internet has provided a huge outlet for the
dissemination of child pornography.
–Most experts agree that pedophiles develop a sexual
interest over a long period of time.
–Many pedophiles have been exposed to some type of
sexual abuse or trauma during childhood.
–Process of learning, cognitive reinforcement, and
psychological development.
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Social Structure Theories
• As originally developed social structure theories focused on why
lower-class individuals are more likely to commit crime than middle-
and upper-class individuals.
– Through the years social structure theories have been modified
and expanded to explain criminal behavioral by all classes.
– This is important in the study of digital crime because many
offenders come from the middle and upper classes.
– Traditionally, these theories focus on socioeconomic conditions
and cultural values as two prominent factors that impact crime.
– Two major subtypes of social structure theory are discussed
including strain theory and subculture theory.
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Strain Theory
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Merton: Strain Theory (1 of 2)
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Merton: Strain Theory (2 of 2)
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Merton: Strain Theory
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
White-Collar Crime and Strain Theory
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Agnew: General Strain Theory (1 of 2)
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Agnew: General Strain Theory (2 of 2)
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Learning Theory
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Sutherland: Differential Association Theory (1 of 3)
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Sutherland: Differential Association Theory (2 of 3)
• The nine propositions of differential association:
1. Criminal behavior is learned.
2. Criminal behavior is learned in interaction with other persons
in a process of communication.
3. The principal part of the learning of criminal behavior occurs
with intimate personal groups.
4. When criminal behavior is learned, the learning includes (1)
techniques of committing the crime, which are sometimes very
complicated, sometimes very simple, and (2) the specific
directions of motives, drives, rationalizations, and attitudes.
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Sutherland: Differential Association Theory (3 of 3)
5. The specific direction of motives and drives is learned from definitions of
legal codes as favorable or unfavorable.
6. A person becomes criminal because of an excess of definitions favorable to
violations of the law over definitions unfavorable to the violation of the law.
7. Differential associations may vary in frequency, duration, priority, and
intensity.
8. The process of learning criminal behavior by association with criminal and
anti-criminal patterns involves all the mechanisms that are involved in any
other learning.
9. While criminal behavior is an expression of general needs and values, it is
not explained by those, since noncriminal behavior is an expression of the
same needs and values.
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Akers: Social Learning Theory
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Sykes and Matza: Techniques of Neutralization/Drift
Theory (1 of 2)
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Hackers and Learning Theories
•By rejecting the goals and opportunities of the
dominant culture, the hacker subculture provides
the context in which hackers situation their
actions.
•There are three consistent ideas or values that
guide hacker behavior:
–Technology
–Secrecy
–Mastery
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Virus Writers and Learning Theories
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Social Control Theory
• Social control theory seeks to answer the question "Why don't
individuals commit crime?"
– This theory assumes that people will violate the law.
– The answer lies in the strength of an individual's ties to
conventional individuals and society.
– Those who have close ties with their families and noncriminal
friends as well as those who possess high self-esteem are
unlikely to commit criminal acts. These individuals are bonded to
the larger society.
– Individuals who are not bonded to the larger social order are
free from constraints to violate the law.
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Gottfredson and Hirschi: Self-Control Theory
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Terrorism and Political Theory
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
CLASS ACTIVITIES
Ask students to write down their habits with regards to their Phone/Computer. Questions to be answered:
1. Where do you keep your phone when you are not using it?
4. Do you keep a virtual wallet with your credit cards or do online banking on your Phone/Computer ?
Now have students look at their responses and see how they apply to the three tenets of routine activities theory:
How secure are they feeling about their Phone /Computer security?
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved
Copyright
Copyright © 2019, 2015, 2012 Pearson Education, Inc. All Rights Reserved