What are the major social structure theories

Assignment Help Computer Engineering
Reference no: EM132107632

Reply to the given article with APA format reference.

What are the major social structure theories that apply to digital crime?

Two major subtypes of social structure theories apply to digital crime: strain theory and subculture theory. Robert Merton presented the most prominent strain theory. Merton believed that the cultural goal of American society is economic success. The common ideas of economic success are often promoted through mechanisms such as the media and cultural transmission.

He believed that there is often a conflict between an individual's aspirations and their ability to achieve those expectations which causes the individual to suffer from strain. He also noted that a lack of opportunity to access institutionalized means of achieving one's goals adds to the strain. He developed five models to explain how individuals adapt to strains.

The models of adaptation include: conformity, ritualism, innovation, retreatism, and rebellion. More recently, much broader strain theories have emerged such as general strain theory presented by Robert Agnew. His theory attempts to explain why individuals suffering from strains are more likely to commit crimes. This theory differs from Morton's in that the focus is not on the widely-accepted idea that economic success is the ultimate goal in the U.S.

This theory claims that individuals are more likely to commit crimes if they are suffering from negative affective states. Some of the negative affective states that may contribute to crime are: frustration, disappointment, anger, fear and depression. Subculture theory attributes crime to the morals and beliefs of the offender. "A subculture is a set of values, norms, and beliefs that differ from the dominant culture" (Taylor, 2018).

The idea of subculture theory is that people who commit crimes do so because it is in line with their values, norms, and beliefs. In many cases subculture values, norms and beliefs conflict with the law which is based on the values, norms and beliefs of the dominant culture. Some computer crimes have been attributed to the existence of subcultures.

Explain how cyber stalking and harassment could be the result of strains. General strain theory can be used to explain why cyber stalking and harassment could be the result of strains.

Negative affective states such as frustration, disappointment, anger, fear and depression can contribute to both cyber abuse.

Depression, anger and frustration can lead offenders to harass or stalk others that the offender perceives to be doing better in life. These negative affective states can also lead to lowered self-control which may inflate the offenders desire to commit cyber abuse. Taylor, R. E. (2018). Cyber Crime and Cyber Terrorism (4th ed.). Upper Saddle River, NJ: Pearson.

Verified Expert

The present solution is based on a given article, which is provided in form of a summary. The solution comprises of more than 250 words and references are given in APA format. The solution is free from any type of plagiarism.

Reference no: EM132107632

Questions Cloud

How much of the charitable contribution should pat deduct : In the year of her death, Pat had AGI of $300,000. In completing her final income tax return, how much of charitable contribution should Pat's executor deduct
Demonstrate the projects value to centervale apparel : Your boss wants to ensure this project will be prioritized over other projects on the list and will be implemented in the coming year.
What is the cost per equivalent unit for conversion costs : At Sunrise Corporation, direct materials are added at the beginning of the process, What is the cost per equivalent unit for conversion costs
Determine jose self-employment tax : He earned $52050 at the architectural firm. His net income from his sole proprietorship was $67400. Determine Jose's self-employment tax for 2015
What are the major social structure theories : What are the major social structure theories that apply to digital crime - Explain how cyber stalking and harassment could be the result of strains
How companies are using business intelligence systems : What are the costs of this massive expansion of information available to managers and other business users?
Prepare amortization tables for issuance of the bonds sold : Wempe Co. sold $3,477,000, 10%, 10-year bonds on January 1, 2014. Prepare amortization tables for issuance of the bonds sold at 104 for first three interest
Occi campanion animal facility : What are the major steps in the process of obtaining approval from an OCCI campanion animal facility?
Distinguish between the use of primary and secondary data : New researchers often assume that because secondary data do not involve human participants, there are no ethical procedures or processes to consider.

Reviews

inf2107632

11/28/2018 12:02:37 AM

I got a perfectly written Computer Engineering assignment with accurate solution and delivered within deadline. I was able to score well just due to the support from Experts Mind and team. The solution was explained in very detailed manner and accurately..

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd