Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Reply to the given article with APA format reference.

What are the major social structure theories that apply to digital crime?

Two major subtypes of social structure theories apply to digital crime: strain theory and subculture theory. Robert Merton presented the most prominent strain theory. Merton believed that the cultural goal of American society is economic success. The common ideas of economic success are often promoted through mechanisms such as the media and cultural transmission.

He believed that there is often a conflict between an individual's aspirations and their ability to achieve those expectations which causes the individual to suffer from strain. He also noted that a lack of opportunity to access institutionalized means of achieving one's goals adds to the strain. He developed five models to explain how individuals adapt to strains.

The models of adaptation include: conformity, ritualism, innovation, retreatism, and rebellion. More recently, much broader strain theories have emerged such as general strain theory presented by Robert Agnew. His theory attempts to explain why individuals suffering from strains are more likely to commit crimes. This theory differs from Morton's in that the focus is not on the widely-accepted idea that economic success is the ultimate goal in the U.S.

This theory claims that individuals are more likely to commit crimes if they are suffering from negative affective states. Some of the negative affective states that may contribute to crime are: frustration, disappointment, anger, fear and depression. Subculture theory attributes crime to the morals and beliefs of the offender. "A subculture is a set of values, norms, and beliefs that differ from the dominant culture" (Taylor, 2018).

The idea of subculture theory is that people who commit crimes do so because it is in line with their values, norms, and beliefs. In many cases subculture values, norms and beliefs conflict with the law which is based on the values, norms and beliefs of the dominant culture. Some computer crimes have been attributed to the existence of subcultures.

Explain how cyber stalking and harassment could be the result of strains. General strain theory can be used to explain why cyber stalking and harassment could be the result of strains.

Negative affective states such as frustration, disappointment, anger, fear and depression can contribute to both cyber abuse.

Depression, anger and frustration can lead offenders to harass or stalk others that the offender perceives to be doing better in life. These negative affective states can also lead to lowered self-control which may inflate the offenders desire to commit cyber abuse. Taylor, R. E. (2018). Cyber Crime and Cyber Terrorism (4th ed.). Upper Saddle River, NJ: Pearson.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93095101
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Computer Engineering

For the following c statement what is the corresponding

For the following C statement, what is the corresponding RISC-V assembly code? Assume that the variables f, g, h, and i are given and could be considered integers as declared in a C program. Use a minimal number of assem ...

Garber and skinner suggest that the large per capital

Garber and Skinner suggest that the large per capital health spending in the US (and relatively low returns to health) are due to productive and allocative inefficiencies. Which inefficiency (if either) do you think char ...

Identify at least two 2 factors that have led to the

Identify at least two (2) factors that have led to the explosive growth of digital crime over the past a few decades. Next, describe the most common forms of digital crime, and give your opinion as to why those forms you ...

You work in a veterinarians office and need to organize the

You work in a Veterinarian's office and need to organize the data on pets that you treat. In your database, you want to keep track of the following information: Customer information: Name Address City State ZIP Phone # Y ...

Discuss how the scope of computer security grew from

Discuss how the scope of computer security grew from physical security to include : Securing the data Limiting random and unauthorized access to that data. Involvement of personnel from multiple levels of the organizatio ...

Question search scholargooglecom for a company school or

Question: Search "scholar.google.com" for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to ...

Question develop a taxonomy of dsia document a taxonomy is

Question: Develop a "taxonomy" of DS/IA document. A taxonomy is a way of organizing something on a "group within group" basis. (Remember how the biological taxonomy is structured.) Initially, define data security and inf ...

Suppose two packets arrive to two different input ports of

Suppose two packets arrive to two different input ports of a router at exactly the same time. Also suppose there are no other packets anywhere in the router. a. Suppose the two packets are to be forwarded to two differen ...

Question a with respect to huffman coding devise a formula

Question : (a) With respect to Huffman Coding, devise a formula to compute the average compression based on the number of characters in a piece of text, n, and the number of unique characters in its alphabet, m. (b) Does ...

Objectivesthis assessment item relates to the unit learning

Objective(s) This assessment item relates to the unit learning outcomes as in the unit descriptors. This checks your understanding about basic constructs of C# programming. Details & Problems In this assignment, you are ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As