What are the major social structure theories

Assignment Help Computer Engineering
Reference no: EM132107632

Reply to the given article with APA format reference.

What are the major social structure theories that apply to digital crime?

Two major subtypes of social structure theories apply to digital crime: strain theory and subculture theory. Robert Merton presented the most prominent strain theory. Merton believed that the cultural goal of American society is economic success. The common ideas of economic success are often promoted through mechanisms such as the media and cultural transmission.

He believed that there is often a conflict between an individual's aspirations and their ability to achieve those expectations which causes the individual to suffer from strain. He also noted that a lack of opportunity to access institutionalized means of achieving one's goals adds to the strain. He developed five models to explain how individuals adapt to strains.

The models of adaptation include: conformity, ritualism, innovation, retreatism, and rebellion. More recently, much broader strain theories have emerged such as general strain theory presented by Robert Agnew. His theory attempts to explain why individuals suffering from strains are more likely to commit crimes. This theory differs from Morton's in that the focus is not on the widely-accepted idea that economic success is the ultimate goal in the U.S.

This theory claims that individuals are more likely to commit crimes if they are suffering from negative affective states. Some of the negative affective states that may contribute to crime are: frustration, disappointment, anger, fear and depression. Subculture theory attributes crime to the morals and beliefs of the offender. "A subculture is a set of values, norms, and beliefs that differ from the dominant culture" (Taylor, 2018).

The idea of subculture theory is that people who commit crimes do so because it is in line with their values, norms, and beliefs. In many cases subculture values, norms and beliefs conflict with the law which is based on the values, norms and beliefs of the dominant culture. Some computer crimes have been attributed to the existence of subcultures.

Explain how cyber stalking and harassment could be the result of strains. General strain theory can be used to explain why cyber stalking and harassment could be the result of strains.

Negative affective states such as frustration, disappointment, anger, fear and depression can contribute to both cyber abuse.

Depression, anger and frustration can lead offenders to harass or stalk others that the offender perceives to be doing better in life. These negative affective states can also lead to lowered self-control which may inflate the offenders desire to commit cyber abuse. Taylor, R. E. (2018). Cyber Crime and Cyber Terrorism (4th ed.). Upper Saddle River, NJ: Pearson.

Verified Expert

The present solution is based on a given article, which is provided in form of a summary. The solution comprises of more than 250 words and references are given in APA format. The solution is free from any type of plagiarism.

Reference no: EM132107632

Questions Cloud

How much of the charitable contribution should pat deduct : In the year of her death, Pat had AGI of $300,000. In completing her final income tax return, how much of charitable contribution should Pat's executor deduct
Demonstrate the projects value to centervale apparel : Your boss wants to ensure this project will be prioritized over other projects on the list and will be implemented in the coming year.
What is the cost per equivalent unit for conversion costs : At Sunrise Corporation, direct materials are added at the beginning of the process, What is the cost per equivalent unit for conversion costs
Determine jose self-employment tax : He earned $52050 at the architectural firm. His net income from his sole proprietorship was $67400. Determine Jose's self-employment tax for 2015
What are the major social structure theories : What are the major social structure theories that apply to digital crime - Explain how cyber stalking and harassment could be the result of strains
How companies are using business intelligence systems : What are the costs of this massive expansion of information available to managers and other business users?
Prepare amortization tables for issuance of the bonds sold : Wempe Co. sold $3,477,000, 10%, 10-year bonds on January 1, 2014. Prepare amortization tables for issuance of the bonds sold at 104 for first three interest
Occi campanion animal facility : What are the major steps in the process of obtaining approval from an OCCI campanion animal facility?
Distinguish between the use of primary and secondary data : New researchers often assume that because secondary data do not involve human participants, there are no ethical procedures or processes to consider.

Reviews

inf2107632

11/28/2018 12:02:37 AM

I got a perfectly written Computer Engineering assignment with accurate solution and delivered within deadline. I was able to score well just due to the support from Experts Mind and team. The solution was explained in very detailed manner and accurately..

Write a Review

Computer Engineering Questions & Answers

  Define the function prototype

Implement wildcard pattern matching with support for '?' and '*'. '?' : Matches any single character. '*' : Matches any sequence of characters.

  Avoiding breaches in health care information system

Analyze the financial and privacy impacts of the breaches to health care information systems and make at least two recommendations in order to prevent such breaches in future.

  Explain what fields may be used as keys and indexes

select an information system in a health care organization that uses a database. The application can be simple or complex, but it must utilize a database that is part of an overall system to collect, store, process, and disseminate information.

  What is the size of the program counter

What is the size of the program counter in the PIC18F? What is the maximum size of the PIC18F program memory? Justify your answer.

  Create a new file in the nano editor

Create a new file in the Nano editor named hello.cpp. Compile the hello.cpp file into an executable file named hello using the command: g++ -o hello hello.cpp.

  Implement and test your own readval and writeval procedures

Implement and test your ReadVal and WriteVal procedures for unsigned integers. displayString should print string which is stored in a specified memory location.

  Write mips assembly language program that search for number

Linear Search: Write a MIPS assembly language program that can search for a number that entered by user in an array with 20 integer numbers and prints the index

  Why performing rotation in an n-node binary tree represented

Explain why performing a rotation in an n-node binary tree represented using an array list takes ?(n) time.

  Examine the behavior of airfoil

Write HW assignment written in Matlab airfoils have different C mc/4

  Write on digital video and electronic commerce

Write two page on digital video and electronic commerce

  Explain how you might use this information in practice

Interpret the meaning of the first and second bars from the left. Explain how you might use this information in practice.

  Create a pancakehousemenuiterator class

Create a PancakeHouseMenuIterator class and implement it in the PancakeHouseMenu. Create the Menu interface and implement it in your two menu types and WaiterBot.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd