9 Sep 2022

131

Criminological Theories Explaining Digital Crime

Format: APA

Academic level: College

Paper type: Research Paper

Words: 1210

Pages: 4

Downloads: 0

In today’s world, technology has brought tremendous improvements in many sectors. In spite of its significant role in bringing about development, technology has also led to the emergence of new crimes. One of the most common crimes noted in this digital era is known as a digital crime (Hui, Chow & Yiu, 2007) . Scholars define digital crime as any offense that entails the use of computer and the internet to facilitate fraud, phishing, and identity theft. Nowadays, researchers have developed different theories to explain the cause of digital crimes. The contents of this report will discuss the routine activity and the deterrence theories pertaining to causes digital crimes. The article will use various explanations to justify the how the above theories contribute to the issue. Moreover, an additional theory will be included to provide insight into the cause of both digital and non-digital crimes. Notably, the paper will include examples to support the contributions of theories mentioned herein in the development of digital crime. 

Deterrence Theory and Digital Crimes 

The deterrence theory is perceived to the best strategy that would prevent the prevalence of cyber offenses or rather digital crimes. The deterrence theory, notably, holds that creating a credible retaliatory capacity would prevent criminals from engaging in digital crimes since they understand that if they attack negative consequences will befall them (Guitton, 2012) . The concept of this theory coincides with that of the choice theory whereby their immediate needs guide the actions of individuals. The difference is that choice theory perceives that people will pursue their goals regardless of the consequences of their actions. On the other hand, the deterrence theory believes that when people are aware of the repercussions of their actions they will cease to engage in certain criminal activities. The central concept of the deterrent theory is the importance of punishment in deterring illegal activities. The deterrence theory has two main components namely the general and specific deterrence. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Under the general deterrence, the theory believes that the threat that a punishment poses would prevent offenders from committing criminal activities (Guitton, 2012) . Mainly, general deterrence takes place when a person opts not to engage in illegal activities because he or she fears the punishment associated with the offense. Typically, general deterrence impacts the entire population since the society understands that misbehavior would attract severe punishment. Scholars have also indicated that general deterrence has significant effects where a criminal’s life was impacted negatively with the penalty. On the other hand, specific deterrence typically imposes sanctions on an offender so that he or she cannot commit the same crime in the future. 

The deterrence theory can be used to explain digital crimes and how they can be prevented. As the theory suggests, the actions that people make is influenced by the choices they make and their needs at that particular time (Guitton, 2012) . For instance, a person involved in fraudulent acts often seeks to gain financially. Nevertheless, the deterrence theory states that people would always have to weigh the risks and merits involved in their actions. Actually, the theory believes that people would always act cautiously. Through both the general and specific deterrence, people would be aware that their actions would always have consequences. As such, individuals will shun activities that attract punishment. 

The Rational Choice Theory 

The rational choice theory can be used to explain the cause of digital and non-digital crimes. According to this theory, the behaviors manifested among individuals are not a coincidence. Rather, they are chosen. The theory thus indicates that a person commits a crime because s/he has decided to do so. Actually, before an individual opting to act in a particular way, he or she must have weighed the benefits against the risks involved. Typically, the theory suggests that people often chose to engage in certain criminal activities after examining the positive and negative results of his or her actions (Bachmann, 2008) . In most cases, the person committing the act will spot a chance to make money or cause a distraction regardless of the repercussions his or her actions. Many types of crimes (both digital and non-digital) exist that can be associated with the rational choice theory. These include but not limited to robbery, fraud, theft, and hacking. When people commit these types of crimes, they usually take into account the consequences of their actions. However, they will continue with their activities despite understanding that what they are doing is wrong. To them, their actions are justified by their needs at that particular point. 

The choice model can be used to explain the cause of digital crimes. For instance, some well-educated individuals get involved in digital crimes commonly referred to as white-collar crimes. White-collar crimes refer to a nonaggressive form of offenses which are committed to benefiting an individual financially. Examples of this type of crimes include money laundering, embezzlement, securities and corporate fraud (Bachmann, 2008) . Fraud is the most common type of digital crime. Most organizational workers have been accused of fraudulent activities whereby they use money from investors and their organizations for selfish reasons. As such, scholars can use this theory to illustrate the cause of digital crime since the theory shows that peoples needs will always influence their choices at a particular moment. 

Routine Activities Theory 

Many scholars identify this theory as the primary cause digital crimes. Apparently, this is related to the manner in which criminals commit crimes based on their choices and types of crimes. The theory suggests that there are certain factors within the society that motivates individuals to commit crimes. Researchers have further noted that the motivators of criminal activities are constant. Notably, the community presents people with many opportunities to commit digital crimes. For instance, a hacker might be motivated to hack into an individual’s computer since he or she understands that it lacks proper protection. Many supporters of this theory indicate that crime is normal. However, it depends on the opportunities presented. As such, if an opportunity presents itself and the reward is satisfactory, chances of a crime being committed is high. The theory also takes into account cases of victimization. It notes that individuals in the society are likely to be victimized (Leukfeldt & Yar, 2016) . Notably, some offenders may share or rather release information that might taint the image of fellow workmates or schoolmates. In the workplace, this would affect the reputation of the concerned individuals thereby affecting their chances of getting a promotion. 

The routine activity model relates to causes of digital and non-digital crimes. Notably, technology is ever changing. Therefore, the challenges posed by technology will continue to evolve. On the other hand, this makes people susceptible to digital crimes. Nowadays, for instance, hackers keep creating new computer viruses. In that regard, if a person’s computer lacks proper protection, a hacker might infect the person’s computer with viruses such as Trojan thereby causing significant data loss. Reports also indicate that cases of digital crime are likely to continue since individuals spend most of their time on the internet (Leukfeldt & Yar, 2016) . The theory also demonstrates that many forms of non-digital crimes exist that a motivated criminal can commit on a person to inflict harm. A non-digital crime can occur when there is an illegal act that can lead to direct physical contact between the criminal and the victim. Notably, this can include rape, robbery with violence or burglary among others. 

Conclusion 

Various theories can be used to explain the causes of digital crimes. These include the deterrence, rational choice and routine behavior theories among others. Both the deterrence and rational choice theories suggest that peoples immediate needs guide their actions. Nevertheless, the choice theory states that people will pursue their goals regardless of the consequences of their actions. The deterrence theory, on the other hand, believes that when people are aware of the repercussions of their actions they will cease to engage in certain criminal activities. Lastly, the routine activities theory shows that the society creates numerous opportunities for propagating digital crimes. 

References 

Bachmann, M. (2008). What makes them click? Applying the rational choice perspective to the hacking underground . Retrieved from http://stars.library.ucf.edu/cgi/viewcontent.cgi?article=4790&context=etd. 

Guitton, C. (2012). Criminals and cyber attacks: The missing link between attribution and deterrence. International Journal of Cyber Criminology , 6 (2), 1030. 

Hui, L., Chow, K., & Yiu, S. (2007). Tools and technology for computer forensics: research and development in Hong Kong. Information Security Practice and Experience , 11-19. 

Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior , 37 (3), 263-280. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Criminological Theories Explaining Digital Crime.
https://studybounty.com/criminological-theories-explaining-digital-crime-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 165

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 183

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 252

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration