Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Essay on internet crime
Essay on internet crime
Essay on internet crime
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Essay on internet crime
Crime theories are often used to understand and explain criminal behaviour. Using crime theories in the field of criminology allows criminologists to apply an understandable explanation of why an offender has committed a crime, and what may have influenced the act (Mazerolle 2015). A variety of explanations for crime exists through a range of theories. Routine activity theory, a psychological perspective, provides an ecological approach to what causes crime, and focuses on the environmental situation, which might encourage and facilitate crime (Akers 1994). Whereas, social learning theory, an interactionist perspective, focuses on the social environment, and how individuals are constantly observing different behaviours and learning from them (Mazerolle 2015). These theories can be used to examine internet crimes such as online child exploitation. This crime is an international problem …show more content…
According to The Australian Beauru of Statistics (ABS) (2016) in society today, it is recorded that there are over 12.9 million internet users in Australia. Since internet became known to the world, committing crime with the use of computers became exceptionally easy for offenders (Jewkes & Yar 2013). A common phrase for internet crime is 'old wine in new bottles' -meaning crimes were always going to be committed; with the use of internet it has become easier and opened up a whole new variety of crime (Yar & Prenzler 2015, p. 169). Internet crime is explained as offences committed through the use of computers that can also be committed without a computer (Yar & Prenzler 2015). The internet can often be misused, being a place for criminals to commit crimes in anonyomous ways (Yar & Prenzler 2015). In particular, crimes such as possessing pornographic images of children and child grooming are a particular concern on an international
People are uniquely different and because of this reason, they do have different behaviors. Crime is one kind of behavior that an individual can engage in. They are punishable by the law and may be prosecuted by the state (Helfgott, 2008). There are different theories existing that try to explain the actions of criminals. They deeply explain what causes an individual to commit a criminal activity. This paper discusses some examples of the biological theories, social theories and psychological theories of crime.
Winslow, R. W., & Zhang, S. (2008). Contemporary Theories of Crime. Criminology: a global perspective (). Upper Saddle River, N.J.: Pearson/Prentice Hall.
Australia is dependent on technology, everything from state security, economics and information collaboration is more accessible resulting in an increased reliance on digital networks. The rapid increase in cyber activity has a symbiotic relationship with cyber crime. The evolving nature of cyber crimes are constantly leaving counter measures obsolete in the face of these new technologies. Australia takes insufficient action against cyber crime, inaction is based on Australia’s previous focus on counter-terrorism. This study will use the Australia’s National Security Strategy 2013 to show the increasing trend towards cyber security. Unfortunately the Australia Government is lacking in the presence of this growing phenomenon. Recently cyber crimes including attacks from Anonymous and Wiki-leaks prove that no network is completely secure. This study will conclude that the exponential growth of the Internet has resulted in an inability to properly manage regardless of the governmental strategies being implemented.
High crime rates are an ongoing issue through the United States, however the motivation and the cause of crime has yet to be entirely identified. Ronald Akers would say that criminality is a behavior that is learned based on what an individual sees and observes others doing. When an individual commits a crime, he or she is acting on impulse based on actions that they have seen others engage in. Initially during childhood, individuals learn actions and behavior by watching and listening to others, and out of impulse they mimic the behavior that is observed. Theorist Ronald Akers extended Sutherland’s differential association theory with a modern viewpoint known as the social learning theory. The social learning theory states that individuals commit crime through their association with or exposure to others. According to Akers, people learn how to be offenders based on their observations around them and their association with peers. Theorist Akers states that for one, “people can become involved in crime through imitation—that is by modeling criminal conduct. Second, and most significant, Akers contended that definition and imitation are most instrumental in determining initial forays into crime” (Lilly, Cullen, and Ball 2011:57). Although Akers’ theory has been linked to juvenile delinquency in the past, it has also been tested as a possible cause of crime overall. Individuals learn from observation that criminal behavior is justifiable in certain circumstances. In connection with juvenile delinquency and crime, peers and intimate groups have the most effect on individuals when associated with criminal behavior. One is more likely to mimic the behavior of someone who they have close ties with, whether the behavior is justifiable or...
An integrated theory is a combination of 2 or 3 theories that offers many explanations on why crime is occurring, compared to a traditional criminal theory that just focus on one type of aspect (Lilly et al.2010). The purpose of integrated theories is to help explain many aspects into what causes criminal behavior and why one becomes delinquent. From this an argument arises can integrated theories be used to explain all criminal behavior. Integrated theories are successful in explaining certain aspects of crime on what causes one to become deviant; however one theory alone cannot explain why an individual engages in crime. This paper will examine three integrated theories and look in-depth how these theories can explain different aspects on why criminal behavior occurs and the weakness of each theory. The three integrated theories that will be discussed in this paper are Cloward and Ohlin Differential Opportunity theory, Robert Agnew General Strain theory, and lastly Travis Hirschi’s Social Bond theory.
Crime exists everywhere. It is exists in our country, in the big cities, the small towns, schools, and even in homes. Crime is defined as “any action that is a violation of law”. These violations may be pending, but in order to at least lower the crime rate, an understanding of why the crimes are committed must first be sought. There are many theories that are able to explain crimes, but three very important ones are rational choice theory, social disorganization theory and strain theory.
What are theories of crime? Why are they important? In this paper, will discuss two crime theories. Social learning theory and the labeling theory. We will compare both crime theories. It will also explain how these theories are related to specific crimes. The two theories discussed will also explain the policy implications. Finally, we will address what types of programs can be created to mitigate specific crimes related to the causation theories.
In order to identify the strengths and weaknesses of the criminal behavior theories, the word theory needs to be defined. “A theory is an explanation. It tells why or how things are related to each other. A theory of crime explains why or how a certain thing or certain things are related to criminal behavior.” (Bohn and Vogel)
Technology has opened new encounters and opportunities for the criminal justice system. There are so many new practices of criminal activity, such as computer crimes. There are different types of computer crimes that many people become victims of every day. Computer crime is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target ("Computer Crime: Chapter 2: What Are the Crimes?", n.d.). Crimes such as data diddling, pump and dump, social engineering and spoofing are computer crimes. Even though these crimes are difficult by privacy issues, the new technology has made investigations and prosecutions well organized and effective. Though views are different on the pros and cons of specific technological changes in the criminal justice system, there is an agreement the system has changed affectedly ("Effects of Technology in Criminal Justice | eHow", n.d.).
In today's society, many aspects of crime are committed on a regular basis. Civilians take advantage of people all the time using online resources such as fraudulent websites requiring credit card information to get a free monthly trial. Other examples of cyber crimes include online chat websites, full of predators, or websites needing a downloadable program that contains a hacking virus. Sadly, there are many cases of cyber crime all over the internet. The acts of cyber crimes are considered violent acts like any other.
Theories in criminology help us to understand the workings of the criminal justice system and the actors in the system. A theory can try to explain crime for a large social unit or area ,or it can attempt to explain crime at the individual or smaller unit level. Many theories have common traits, but differences among them exist. Understanding these differences is key to understanding the often contradictory views of crime.
There are many beliefs and theories in the world that try to explain why many people commit crimes and why they do. The theories of crime causation go as far back as the mid -1700s. Based from Sociological School of criminology one of the many reasons of crime causation is because an individual’s socioeconomic conditions and social interactions.
The 90's internet boom gave rise to new ways of writing in through access to cyberspace. What used to be printed or handwritten on physical surfaces such as paper, cardboard, or bulletin boards has changed to 0's and 1's, bits and bytes of digitized information that can be displayed thru the projections of computer screens. Moreover, the internet has made the process of publishing one's works, writing letters, or chatting with one another much easier and convenient for everyone around the globe. The internet became a universal tool, giving much freedom and flexibility to the users; it gave them opportunity to deliver their thoughts with little or no restrictions. Since it's impossible to regulate all cyber-activities, internet users are often unrestricted by the normal laws or authorities that would set boundaries around the various online transactions. More importantly, the fact that a net user can take on different identities in cyberspace brings about several ethical and social issues. These anonymous and unrestrictive characteristics of cyberspace often permite abusive users to easily involve themselves in serious cybercrimes such as cyberstalking, cyber-rape, and cyber-harassment through chatting services, emails, cyber communities, and other online communication.
Different schools of thought propose varying theoretical models of criminality. It is agreeable that criminal behaviour is deep rooted in societies and screams for attention. Biological, Social ecological and psychological model theories are key to helping researchers gain deeper comprehension of criminal behaviour and ways to avert them before they become a menace to society. All these theories put forward a multitude of factors on the outlooks on crime. All these theories have valid relevancy to continuous research on criminal behaviour.
Cybercrime is a global issue plaguing the world. The dictionary defines cybercrime as “crime conducted via the Internet or some other computer network”(Merriam-Webster). The definition remains very broad because the word “cyber” is defined as “relating to the culture of computers, information technology, and virtual reality.” Due to the growing number of people gaining access to the internet, rapid development of technology, and the globalization of the world, more of the world population is becoming susceptible to involvement in cybercrime – whether it be as a victim or a criminal. Cybercrime involves different levels of the world on both the victim and criminal side, from an individual citizen, to small groups, businesses, and the government, to the countries of the world.