There are several psychological theories that have been applied to criminal activity. These theories are believed to impact moral growth and personality ailments in relation to crime. White-collar crimes and strain theory which is a social structure theory as well as hackers and learning theories which is a social process theory are discussed. Social structure theory states that poor individuals are the ones that commit crimes over middle and rich individuals. Criminals who do not have an equal opportunity are strained and will more likely to be involved in crime states the strain theory. This is on the premise that the primary goal of citizens is material wealth. Which contradicts the criminals who usually commit digital crimes, who …show more content…
Basically social process theories analyze peer pressure situations. The particular theory researched was hackers and learning theories. Hackers have their own culture and have established their own values, which are bad with illegal intent but others that are set to help their society. Yes, some hackers steal millions of dollars from banks, but other legitimately commit legal actions. Which are rationalized due to what they may accomplish by their skill and ability, within the hacker community. One example of a hacking situation, are the exploits of the world’s most attractive hacker. In 2010, one of the largest cybercriminal cases had been investigate. Kristina Svechinskaya and 37 others allegedly used dummy bank accounts, fake passports and a Zeus Trojan to steal $3 million from U.S. banks and another $9 million British banks (Ingersoll, 2013). Svechinskaya's role was to allegedly open at least five accounts under her own name, along with two other aliases "Anastasia Opokina" and "Svetlana Makarova (Ingersoll, 2013)." The accounts were opened at Bank of America and Wachovia, which had $35,000 in fraudulent deposits. Svechinskaya and associates had withdrawn approximately $11,000 from three …show more content…
Svechinskaya, one of four New York University students involved in the heist. Investigators say the crime was organized and planned in Eastern Europe, and eventually implemented in New York. This is known as one of the largest cybercriminal cases in relation to a Trojan keylogger used to steal account passwords. The criminals then used the passwords to obtain at least "$2 million" a month (Ingersoll, 2013). Svechinskaya pled guilty on Nov. 19, 2010, and faced up to 40 years in jail but she signed a personal recognizance bond and was released under $25,000 bail. She was later ordered to pay $35,000 in damages and restitution (Ingersoll, 2013). Hackers are often motivated by the prospect of a big payday. Psychological theories explain what motivates criminal to attack. If you can understand who would want to do anyone harm and what can be gained. Law enforcement can better protect an organization and their client’s information.
Chisholm, J. F. (2014). Review of the status of cyberbullying and cyberbullying prevention. Journal of Information Systems Education, 77.
Ingersoll, G. (2013, March 5). 'World's Sexiest Computer Hacker' To Be Sentenced This Spring. Retrieved from Business insider: http://www.businessinsider.com/kristina-svechinskaya-verdict-in-spring-2013-3
Rivituso, J. (2014). Cyberbullying victimization among college
Click here to unlock this and over one million essaysShow More
On November 2, 2017, United States District Judge Marvin J. Garbis in Baltimore, Maryland sentenced Tara Kathleen Whyte, age 30, of Hollywood, Florida, and Gambrills, Maryland to 54 months in federal prison for bank fraud conspiracy and aggravated identity theft stemming from a banking scheme involving over $1 million in losses. Judge Garbis also ordered Whyte pay restitution in the amount of $77,422.06 (The Bay Net, 2017). Whyte was one of 13 members of a nationwide group of fraudsters known as the “Felony Lane Gang.” These individuals traveled from Florida to Maryland and other states broke into vehicles parked at recreation areas, sports fields, gyms, fitness centers, and other locations, and stole wallets, purses and other items left
Case 38 – 2006 The complications associated with case arose in trying to find who committed the crime and what the amount of stolen money totaled to. In trying to find out who was guilty, multiple options were presented within the context of the case. The case entry from the Department of Education only cites the owner of a student loan debt collection agency as the offender in the title. Reading further into the case, more offenders are cited.
A person is not born as a criminal, it is watched and picked up on by the individual through social influences. The theory can predict whether an individual will turn to a criminal path rather than one that abides by the laws. If a person watches crime be committed and is around crimes and deviant behvavior during their impressionable years, it is much more likely that they will follow in those footsteps and become a criminal themselves. The motivation for crime could be heightened by being low-class or living in a high-crime community. One of the main critiques is that people can be individually motivated.
Criminal and conflict gang whose primarily intent of crimes for tangible gains. Social structure theorists consider that the main components to illegal behavior are the ascendancy of social and economic influences that are distinguished in rundown communities where the population is predominantly lower-class citizens (Siegel, 2010). This following theory goes into helping us comprehend ways the human behavior, is the result of physical
Cyber Attacks In the early 1970s the internet was introduced to the world and few people were using it. But now millions of people are using internet all the time either in home, work, driving, or in malls. This discovery has introduced a new type of crimes which called cybercrimes or computer crimes. The people behind cybercrimes are called hackers and what they do is hacking into other computers to steal form them.
Why do people commit crimes? What goes through their minds before they actually commit a crime? These are questions asked from society to criminologist every time one decides they want to commit a crime. Criminologists has given us different crime causations, theories, to explain the answer to these questions. A theory is a speculation about how phenomena, behavior, or process are caused and what takes place after the cause is determined (Anderson, 2015).
They seek to gain answers to what really happens on the streets, police stations, behind prison bars and courtrooms, They collect much of their information by analyzing data sets and statistical studies mainly on topics relating to drug use and homicide rates. Not only does it attempt to explain crimes within a societal background and the variations between our society, but this brings me to the three distinct theories as stated in the book on page 67, that attempt to explain why criminals behave in a certain
Social structure theorist believes that the solutions to why criminals commit crime is the neighborhoods they grew up in (Criminology and Justice). All the theories that fall under the social structure theory helps theorist determine why individuals join gangs as well. Significant studies by theorist was researched that the subcultural values affect a person decision (Criminology and Justice). Theorist believe that once a person is bought up in such a deviant environment they feel they have no other way
According to Andrews and Bonta (2010) the psychology of criminal conduct ( PCC) can be defined as an approach to scientifically understand the criminal behavior of individuals through a systematic approach. Additionally, the psychology of criminal conduct is considered to be interdisciplinary, and considers all aspects of science that will assist in the further comprehension of an individuals criminal behavior, and the causes of criminal behavior (Andrews and Bonta , 2010). Andrews and Bonta ( 2010) stated that the psychology of criminal conduct can be considered a subfield of criminology and psychology due to common beliefs and common interests with both disciplines. Furthermore, the psychology of criminal conduct can be described as using
The Social Learning Theory (SLT) maintains that children develop patterns of violent or delinquent behavior through imitation. For instance, if a child is being beaten at home, then the child will revert to doing so to other children at school. The Social Control Theory (SCT) says that individuals have a natural tendency towards crime and violence
Annotated Bibliography Brody, N., & Vangelisti, A. L. (2017). Cyberbullying: Topics strategies, and sex differences. Computers in Human Behaviors, 75, 739-748. Doi:10.1016/j.chb.2017.06.020 There are multiple strategies to cyberbullying, the most common strategies include public and private comments, photographs, and status updates. Cyberbullies use these strategies to make someone feel less than what they are.
Information about hackers: There are 3 Types of hackers; White hat hackers aka ethical hackers, black hat hackers, and gray hat hackers. All these hat hackers, they are all really talented hackers but they all have different intents. The first type of hacker is the “good guy” hacker, this type of hacker is a called white hat hacker. These hackers hack to see any bugs and security holes and report it to the government.they also help the government with foiling heists etc.
Social structure theories look at the formal and informal economic and social arrangements of society that cause crime and deviance. The negative aspects of social structure such as disorganization within a family, poverty, and disadvantages because of lack of success in educational areas are looked upon as the producers of criminal behavior (Schmalleger, 2012). The three major types of social structure theories are Social Disorganization, Strain, and Culture Conflict (Schmalleger, 2012). Social disorganization theory is based on the idea that changes, conflict, and the lack of social consensus in society are the reasons for criminal behavior. This theory views society as a living organism and that criminal behavior is compared to a disease.
Technology is getting bigger and bigger each day. With the advance of smart phones, tablets, and laptops it’s become much easier for people to keep in contact with their social media. People can easily stay in touch with friends all the time on Facebook, Twitter, Snapchat, and Instagram and by texting. Many people are taking advantage of that opportunity and that seems like people are becoming more sociable but actually it is making people less sociable. People are spending too much time on their phones instead of having a face to face conversation.
Becoming the victim of cybercrime can have long-lasting effects on your life. One common technique scammers employ is phishing, sending false emails purporting to come from a bank or other financial institution requesting personal information. If you hand over this information, it can allow the criminal to access your bank and credit accounts, as well as open new accounts and destroy your credit rating. According to EWeek (2012) a survey of large companies found an average expenditure of $8.9 million per year on cyber security, with 100 percent of firms surveyed reporting at least one malware incident in the preceding 12 months and 71 percent reporting the hijacking of company computers