Reference no: EM132107632
Reply to the given article with APA format reference.
What are the major social structure theories that apply to digital crime?
Two major subtypes of social structure theories apply to digital crime: strain theory and subculture theory. Robert Merton presented the most prominent strain theory. Merton believed that the cultural goal of American society is economic success. The common ideas of economic success are often promoted through mechanisms such as the media and cultural transmission.
He believed that there is often a conflict between an individual's aspirations and their ability to achieve those expectations which causes the individual to suffer from strain. He also noted that a lack of opportunity to access institutionalized means of achieving one's goals adds to the strain. He developed five models to explain how individuals adapt to strains.
The models of adaptation include: conformity, ritualism, innovation, retreatism, and rebellion. More recently, much broader strain theories have emerged such as general strain theory presented by Robert Agnew. His theory attempts to explain why individuals suffering from strains are more likely to commit crimes. This theory differs from Morton's in that the focus is not on the widely-accepted idea that economic success is the ultimate goal in the U.S.
This theory claims that individuals are more likely to commit crimes if they are suffering from negative affective states. Some of the negative affective states that may contribute to crime are: frustration, disappointment, anger, fear and depression. Subculture theory attributes crime to the morals and beliefs of the offender. "A subculture is a set of values, norms, and beliefs that differ from the dominant culture" (Taylor, 2018).
The idea of subculture theory is that people who commit crimes do so because it is in line with their values, norms, and beliefs. In many cases subculture values, norms and beliefs conflict with the law which is based on the values, norms and beliefs of the dominant culture. Some computer crimes have been attributed to the existence of subcultures.
Explain how cyber stalking and harassment could be the result of strains. General strain theory can be used to explain why cyber stalking and harassment could be the result of strains.
Negative affective states such as frustration, disappointment, anger, fear and depression can contribute to both cyber abuse.
Depression, anger and frustration can lead offenders to harass or stalk others that the offender perceives to be doing better in life. These negative affective states can also lead to lowered self-control which may inflate the offenders desire to commit cyber abuse. Taylor, R. E. (2018). Cyber Crime and Cyber Terrorism (4th ed.). Upper Saddle River, NJ: Pearson.
How much of the charitable contribution should pat deduct
: In the year of her death, Pat had AGI of $300,000. In completing her final income tax return, how much of charitable contribution should Pat's executor deduct
|
Demonstrate the projects value to centervale apparel
: Your boss wants to ensure this project will be prioritized over other projects on the list and will be implemented in the coming year.
|
What is the cost per equivalent unit for conversion costs
: At Sunrise Corporation, direct materials are added at the beginning of the process, What is the cost per equivalent unit for conversion costs
|
Determine jose self-employment tax
: He earned $52050 at the architectural firm. His net income from his sole proprietorship was $67400. Determine Jose's self-employment tax for 2015
|
What are the major social structure theories
: What are the major social structure theories that apply to digital crime - Explain how cyber stalking and harassment could be the result of strains
|
How companies are using business intelligence systems
: What are the costs of this massive expansion of information available to managers and other business users?
|
Prepare amortization tables for issuance of the bonds sold
: Wempe Co. sold $3,477,000, 10%, 10-year bonds on January 1, 2014. Prepare amortization tables for issuance of the bonds sold at 104 for first three interest
|
Occi campanion animal facility
: What are the major steps in the process of obtaining approval from an OCCI campanion animal facility?
|
Distinguish between the use of primary and secondary data
: New researchers often assume that because secondary data do not involve human participants, there are no ethical procedures or processes to consider.
|