...CIS 170 ASSIGNMENT 2 DIGITAL CRIME THEORIES To purchase this visit following link: https://coursehomework.com/product/cis-170-assignment-2-digital-crime-theories/ Contact us at: HELP@COURSEHOMEWORK.COM CIS 170 ASSIGNMENT 2 DIGITAL CRIME THEORIES Assignment 2 Digital Crime Theories Course Home Work aims to provide quality study notes and tutorials to the students of CIS 170 Assignment 2 Digital Crime Theories Strayer Latest in order to ace their studies. CIS 170 ASSIGNMENT 2 DIGITAL CRIME THEORIES To purchase this visit following link: https://coursehomework.com/product/cis-170-assignment-2-digital-crime-theories/ Contact us at: HELP@COURSEHOMEWORK.COM CIS 170 ASSIGNMENT 2 DIGITAL CRIME THEORIES Assignment 2 Digital Crime Theories Course Home Work aims to provide quality study notes and tutorials to the students of CIS 170 Assignment 2 Digital Crime Theories Strayer Latest in order to ace their studies. CIS 170 ASSIGNMENT 2 DIGITAL CRIME THEORIES To purchase this visit following link: https://coursehomework.com/product/cis-170-assignment-2-digital-crime-theories/ Contact us at: HELP@COURSEHOMEWORK.COM CIS 170 ASSIGNMENT 2 DIGITAL CRIME THEORIES Assignment 2 Digital Crime Theories Course Home Work aims to provide quality study notes and tutorials to the students of CIS 170 Assignment 2 Digital Crime Theories Strayer Latest in order to ace their studies. CIS 170 ASSIGNMENT 2 DIGITAL CRIME THEORIES To purchase this visit following link: https://coursehomework...
Words: 721 - Pages: 3
...Crime Theories Kristyn Irene Hope Seiler Information Technology in Criminal Justice – CIS170 Strayer University Professor Carmen J. Flores November 5, 2012 There are many different theories when it comes to digital crime. Some of the theories are the choice theory, the deterrence theory, the psychological theory, the strain theory and the routine activities theory. In this paper I will discuss the one theory to be the cause of digital crime, why the theory chosen could be recognized as the most relevant in terms of being the cause of digital crime and two examples of non-digital crime that could be considered caused by this theory. The one theory that I believe that caused digital crime is the routine activities theory. This is related to crime in general by the way that the criminals had made a rational choice to commit the crime. The rational activities theory can be related to crime in general by that the criminals have the choice of what victim that they want to commit the crime on. There are many different ways to commit this crime digitally. Three of the ways are a motivated offender, a suitable target and the absence of a capable guardian. The three ways to commit a digital crime and a crime in general is the same three ways. In any crime you need a many different opportunities that need to be in place before the crime happens. The reason that rational activities theory could be recognized as the most relevant in terms of digital crime is because...
Words: 704 - Pages: 3
...Crimes Theory Ontavia Johnson Strayer University Information Technology in Crime 170 Dr. Wesley E. Phillips, Jr. Crime Theory There are many digital crimes that are produced through the life of technology. Differential Association Theory is well known to be the cause of digital crime. This theory originated in the Chicago School of Criminological Theories, which embraces the sociological approach, that criminologist use to analyzing criminality. Differential Association Theory was introduced by Edwin Sutherland in 1947. He was one of the first to take an interest in the classical individualist theories of criminal behavior and concluded the Differential Association Theory. The Differential Association Theory is recognize the most relevant terms of digitals crimes, and well as can be used to clarify non-digital crimes using motivation, rationalization, and attitudes necessary for the crime. Testing several criminological theories, including strain theory, techniques of neutralization, social learning theory, and self-control theory, Morris and Higgins found that differential association was the most pronounced theoretical predictor in self-reported piracy (Morris, R. G., & Higgins, G. E. 2009). Normative conflict at the individual level is translated into individual acts of delinquency through differential association learned through communication usually in intimate groups (Sutherland, 1947). In further arguments peer pressure and peer attitudes are an influence...
Words: 843 - Pages: 4
...wealth. Strain theory as it relates to digital crime involves the feeling of people in the lower and middle social classes that they do not have equal opportunities or access to those same educational and occupational opportunities. Instead of pursuing legal means to increase their wealth, some of the people who commit white collar crimes are those from the lower and middle classes who are stressed and strained due to finances and their jobs. (Robert W. Taylor, 2011) According to the strain theory, individuals who commit white collar digital crimes feel a sense of entitlement to financial and occupational success because life hasn’t been fair. They have been divorced, lost a significant other, lost their job, or had some other sort of negative situation in their lives. When an individual feels as though they are a failure, they may be more likely to turn to crime as a means of success. (Robert W. Taylor, 2011) The strain theory is the most relevant theory as to why people may turn to committing digital crimes because at one point or another in our lives everyone has had a feeling of inadequacy or failure in some aspect of our lives. Since it is not an uncommon feeling, the strain theory provides an explanation as to why certain people are more inclined to commit white collar digital crimes. If an individual has been successful and suddenly experiences financial or occupational failure, their inability to cope with that failure may push them to engage in digital criminal activities...
Words: 753 - Pages: 4
...Assignment 2: Crime Theories Charles Faust Professor Jesse Witherspoon CIS 170-Information Technology in Criminal Justice 11/3/13 Abstract “In any society the benefits or affluence is not equally distributed and there are individual differences in personality profiles, and different groups are able to cope with strain and therefore psychological, social environmental factors, official crime control methods, values and beliefs, as well psychological factors, biological factors and social factors interact in different degrees on individuals and groups and therefore give birth to the commitment of crime (Fickle p.32).” This in essence is the theory of crime as it is related to today’s world and how I view digital crime. Psychological issues are at the leading forefront for the cause of digital crime. Psychological Theories “There are several psychological theories that have been applied to criminal activity (Taylor p. 39).” I will look at the impact of how moral development and personality disorders have certain effects on crime. Moral development theories allow you to look at the differences that exist between criminals and noncriminal, whereas personalities show that there are specific behaviors that show can lead to crime. Moral Development. Considering the relative influence of nature and nurture in the determination of criminal behavior is obviously crucial. There has been some research that considers the importance of genetic factors and some that considers...
Words: 1092 - Pages: 5
...Assignment 1: Crime Theories Professor George CIS 170 Information Technology in Criminology May 5, 2014 Control theory can be as major theories of crime developed by Hirschi, Reckless, Gottfredson, Hagan, etc. According to them, everyone desires to commit crimes. Instead of asking why people commit crimes, the well-known question they ask is ‘why people do not commit crimes?' There, the lack of control is the main reason of encouraging people to commit crimes. This can be done not only because of the lack of social bonds and laws, but also because of the lack of self-control. "Exposure to control also might differ by social location and the historical period, such as the changing level and control given to males and females." (Cullen and Agnew, 2002) Crime can be known, as an act done in violation of those duties, which are individual, owes to the community, and for the breach of which the law has provided with a punishment. Anyhow, though the criminal law of the country had not recognized some behaviors as crimes, some behaviors extremely harm the peaceful continuance of the society. Thus, "today, however, despite popular belief is to the contrary, the proportion of criminal law in regard to the totality of the legal system has shrunk dramatically." (Weeramantry, 2009) Because of that, Digital crime, which can be considered as such a crime was recognized and included as a separate crime. With the development of information and communication technology, in twenty first...
Words: 982 - Pages: 4
...INFORMATION TECHNOLOGY AND CRIME: AN ANALYSIS 1.Introduction In the era of technology all activities are being conducted with the help of technology in all over the world. Now it is considered that ‘information is power’ and so the widely used term ‘information’ is combined with ‘technology’ that encompasses the term ‘information technology’. Information technology generally means processing and distribution of data using computer hardware and software, telecommunications and digital electronics. So the common medium of information technology is computer, internet, and mostly used cellular phone. This system helps us take the optimum benefit from this ‘Global Ocean of knowledge’ that much our every day needs. The strength of internet in which everybody’s knowledge is open for use by everybody within a global village for better living standards. On the other hand crime is a social and economic phenomenon and is as old as the human society has become a legal concept and has the sanction of the law. So in combination the term of information technology and crime if positive relation then makes a definition that information technological crime is those facts which is made by digital way getting economical and social benefit illegally and legally prohibited by law, on the other hand if opposite relation then make definition is a method if reducing crime by digital way in the digital era. From the view of positive technology stimulates not only a free trade and economic...
Words: 5282 - Pages: 22
...The Role of the Internet and Crime The internet has brought much advancement to our society. How we communicate with others and how we entertain ourselves has been greatly changed by the internet. We can stream videos, chat with friends, and purchase goods from any internet connected device. The internet has also brought many problems as well. Digital crime has been aided by the internet. The internet has given criminals a new avenue to do their deeds. Actions such as fraud, bullying, and sexual related crimes have all been aided by computers and their connection to the internet. Criminals have been committing fraud for ages. Fraud is defined as “an intentional deception made for personal gain or to damage another individual” (“Fraud”). Such things like the bait and switch have been going on well before the internet. A person is told that an item is being sold for a really low price so the person goes in to purchase said item. Once they get to the store, they are told the item is unavailable and are switched to a more costly item. With the internet has come advertising which can potentially do the same thing. Online dating sites also do this by posting fake profiles to entice people to join or once joined get messaged by a fake profile to entice you into upgrading your account to message back. A few years ago, seven online merchants that operated more than 40 web sites paid out a $765,000 settlement for a bait and switch scam (Katzmaier). Once the customer placed...
Words: 1950 - Pages: 8
...The Choice Theory By Adrienne Clarey CIS170 Professor Nick George The Theory that I selected was the Choice Theory according to the choice theory the individual commits the crime because he or she make a rational choice to do so by weighing the risks and benefits of committing the act. If the risk (e.g.,) (apprehension and punishment) out weight the benefits, then the person will not commit the act, and vice versa. But in a more perfect world that might be true. I think that the criminal mind does not have a rational thought process, because even if the crime has a negative outcome the criminal will still commit the crime. I think that it is more of a personal satisfaction more than anything else. The theory is related to earlier drift theory (Matza: 1964) where people use the techniques of neutralization to drift in and out of delinquent behavior, and the Systematic Crime Theory (an aspect of Social Disorganization Theory developed by the Chicago School), where Edwin Sutherland proposed that the failure of families and extended kin groups expands the realm of relationships no longer controlled by the community, and undermines governmental controls. This leads to persistent "systematic" crime and delinquency. He also believed that such disorganization causes and reinforces the cultural traditions and cultural conflicts that support antisocial activity. The systematic quality of the behavior was a reference to repetitive, patterned or organized offending as...
Words: 592 - Pages: 3
...History of Digital Crimes and Digital Terrorism and Their Common Current Forms Stephanie Fisk Strayer Universality CIS 170 Professor CIANCIOTTA Dec. 12th, 2013 Introduction Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Net crime refers to criminal exploitation of the internet. Dr. Debarati Halder and Dr. K. Jaishankar (2011) defines cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as internet chat rooms, emails, notice boards, groups, and mobile phone. Such crimes may threaten a nation’s security and financial health. Problems surrounding these types of crimes have become high profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Activity crossing international borders and involving the interests of at least one nation state is sometimes referred to as cyber warfare. The international legal system is attempting...
Words: 2411 - Pages: 10
...An Event-Based Digital Forensic Investigation Framework∗ Brian D. Carrier carrier@cerias.purdue.edu Eugene H. Spafford spaf@cerias.purdue.edu Center for Education and Research in Information Assurance and Security - CERIAS Purdue University West Lafayette, IN 47907 USA Abstract In this paper, we present a framework for digital forensics that includes an investigation process model based on physical crime scene procedures. In this model, each digital device is considered a digital crime scene, which is included in the physical crime scene where it is located. The investigation includes the preservation of the system, the search for digital evidence, and the reconstruction of digital events. The focus of the investigation is on the reconstruction of events using evidence so that hypotheses can be developed and tested. This paper also includes definitions and descriptions of the basic and core concepts that the framework uses. 1 Introduction Since the first Digital Forensic Research Workshop (DFRWS) in 2001 [Pal01], the need for a standard framework has been understood, yet there has been little progress on one that is generally accepted. A framework for digital forensics needs to be flexible enough so that it can support future technologies and different types of incidents. Therefore, it needs to be simple and abstract. On the other hand, if it is too simple and abstract then it is difficult to create tool requirements and test procedures for each phase. For this paper...
Words: 6869 - Pages: 28
...Crime Theories CIS 170 Information Technology in Criminal Justice There are many different theories that are related to crime but the main two that I want to talk about is subcultural theory and terrorism and political theory. These two theories caught my eye because these are the main reasons why there are terrorist in this world. The subcultural theory is a set of values, norms, and values that differ from the dominant culture. The book say that the main tenet of the subculture theory is that criminals, including computer criminals, hold values, norms, and beliefs that are in opposite to those held in the dominant culture. These individuals behave in a manner that is consistent with their values, norms, and beliefs, which many times will bring them in conflict with the law. To understand criminal justice, it is necessary to understand crime. Most policy-making in criminal justice is based on criminological theory, whether the people making those policies know it or not. In fact, most of the failed policies in criminal justice are due to misinterpretation, partial implementation, or ignorance of criminological theory. Much time and money could be saved if only policymakers had a thorough understanding of criminological theory. At one time, criminological theory was rather pure and abstract, with few practical implications, but that is not the case anymore. For example, almost all criminologists today use a legalistic rather than normative definition of crime...
Words: 541 - Pages: 3
...Even thought it may seem that criminals are getting smarter, and the crimes humanity faces are more sophisticated; underneath it all, they are simply using a new tool that is rapidly growing beyond it’s scope. In the information age, now reliant on cyber technology, we have a dense, reactionary, and mostly unskilled criminal justice system where cybercrime is poised to undermine the entire system, as we know it. To make matters even more atrocious, the pool of individuals seemingly prone to criminal behavior has mushroomed with the interconnection of the Internet to include the largest age range of criminal activity, with the most erratic demographics, on a worldwide basis. In this report, we will look at how practical jokes in the digital age are squandering tax dollars, and introducing a new kind of risk for traditional police forces and forcing the call for awareness and action against cyber criminals. Trending in today’s cyber world is a hoax mentality that is finding victims from frightened high-school students to high profile celebrities, and politicians, to video gamers who play live on the Internet, into an instantaneous public spectacle. Swatting is a type of prank calling or messaging where the person calls the police or a school reporting an alarming crime, such as a shooting or a bomb threat, which triggers massive police responses that are frequently described as highly trained Paramilitary swat operations. “The sick joke, known as swatting, takes advantage...
Words: 1279 - Pages: 6
...with others. (Siapera,2012). The rapidly development of social media have both advantages and shortcomings, there is no doubt that social media makes people communicate more convenient and can make more friends in this way and also keep a close connected with old friends. However, the weakness is the face-to-face communication will be reducing and excessive delay on the social media will influence the normal daily life. In this week, I recognized several overviews of the social media, such as Facebook, Twitter, YouTube and LinkedIn… and understood how to use designated computer software and the basic principles of web page design. And I tried to start to publish my own blog site using the theories that learnt in class. Apply knowledge of the social, political and cultural impacts of digital communication to real world situations. Moreover, I know how to demonstrate integrated creative, technical, and computer skills by developing publications at a professional standard for an online environment. In...
Words: 2244 - Pages: 9
...| How is Digital Piracy Hurting Modern Society? | | | Introduction Digital Piracy is a huge crime that is large hurting the entertainment business here in the United States and in other countries, but the question I ask myself is how digital piracy hurting modern society? What actions are our governments taking to stop people from downloading illegal music, movies, and software? How much of a profit loss is effecting the companies that are producing this digital material? If someone knows what the punishment is for downloading music, movies, and software would they still do it. This research will aim to understand what is digtal piracy is and why it is that people download illegal software, movies, and music. Literature review In the article Examine Digital Piracy: Self-Control, Punishment, and Self-Efficacy, the authors introduce what digital piracy is and how it changes on a constant basis. They show how the “United States government has been cooperating in the fight against digital piracy with the software, music and movie industries with the Digital Millennium Copyright Act (DCMA)” (Zhang, Smith, McDowell, 2009). They discuss how most people think that digital piracy is acceptable, it a soft crime and it does not hurt anyone, and most think that this information should be exchanged freely. The authors also did an online-survey study on college students who were taking Management Information Sciences (MIS) course at a public university in the southern United...
Words: 1689 - Pages: 7