Saturday, January 25, 2020

Applying Criminological Theories to Cyber Crime

Applying Criminological Theories to Cyber Crime Cybercrime The internet is perhaps today’s most influential technological invention and continues to change daily life for virtually everyone on Earth. Millions of people are plugged into cyberspace, and thousands more enter the online world every day. Not only has the Internet revolutionized the way we interact with others and learn, it has forever changed the way we live. As internet and computer technologies continue to thrive; criminals have found ways to use these technologies as a tool for their deviant acts. Cybercrimes are a new breed of crime that are perpetrated using computers, or are otherwise related to them. Cyber crime is different and more heinous than conventional crime in that the crime is committed through an electronic medium which makes it difficult to track and identify the criminal. The most common types of cybercrime include cyber fraud, defamation, hacking, bullying, and phishing. Within the field of criminology, a number of theories exist that attempt to explain why some people engage in deviant behavior, while others abstain from it. Although, these theories were originally meant to explain crimes committed in the ‘real world’, they can still be applied to cybercrime. These theories include social learning theory, low self-control theory, general strain theory, frustration aggression hypothesis, routine activity theory, and situational crime prevention theory. This paper will analyze aspects of the above theories, for the purpose of seeing which best explains the cause of cybercrime. Akers’ social learning theory is a general theory of crime and has been used to explain a diverse array of criminal behaviours. This work embodies within it four fundamental premises that include differential association, definitions, differential reinforcement and imitation (Burruss et al., 2012). Social learning theory is based on the idea that individuals develop motivations and skills to commit crime through the association with or exposure to others who are involved in crime (i.e., associating with deviant peers). Akers’s proposed that this exposure to deviant behavior provided individuals with definitions that are seen as either approving of or neutralizing the behaviour. These definitions become rationalizations for criminals when committing a crime. Differential reinforcement refers to the rewards that are associated with a particular criminal behavior. This criminal behavior is originally learned through the process of imitation, which occurs when individuals l earn actions and behavior by watching and listening to others. So, when an individual commits a crime, he or she is mimicking the actions that they have seen others engage in (Burruss et al., 2012). In regards to cybercrime, research has found that social learning theory can explain the development and ongoing issue of software piracy. In their study of software piracy, Burruss et al, found that individuals who associate with software piracy peers learn and subsequently accept the deviant conduct. Software piracy requires a certain degree of skills and knowledge to access and deviant peers to originally learn these skills from. Furthermore, the deviant individuals rationalize their criminal behavior and help in the fostering of a network that connects and teaches other individuals these rationalizations and behavior. The study also suggested that individuals are more likely to engage in software piracy when they see others experiences positive reinforcement for their participation ( Burruss et al., 2012). Not only does social control theory explain for software piracy, elements of this theory can be attributed in other cybercrimes. For example in any crime, the rationalizations and skills must be learned and behavior is reinforced through the association and observation of others. Thus, the main idea behind social learning theory is that we become who we are based on our surroundings and this explanation can be used to explain cybercrime. While social learning theory emphasizes the importance of external factors that influence criminal involvement, low self-control theory posits that low self-control is a key factor underlying criminality. This theory was originally developed by criminologists Michael Gottfredson and Travis Hirschi. They proposed that their self-control theory can explain all types of crimes, all the time (Burruss et al., 2012). Individuals with low self-control were characterized with being risk taking, short-sighted, impulsive and prefer simple and easy tasks. These characteristics inhibit an individuals ability to accurately calculate the consequences of deviance. According to this theory, crime is seen as a means of obtaining immediate gratification, and the ability to delay such short-term desires is linked to self-control. As such, those with a propensity for criminal involvement are thought to lack sufficient self-control. Also, people with low self-control act impulsively- without much thought and based on what they are feeling at the moment. This makes them risk takers as they do not consider the consequences of their actions. Finally, low self-control people are focused on themselves and lack empathy towards others (Burruss et al., 2012). According to Gottfredson and Hirschi, low self-control originates in early socialization when parents are ineffective in their parenting. Therefore, neglecting and uncaring parents are likely to fail to socialize their child to properly delay gratification, care about the feelings of others, and restrain their impulses. As a result, children with low levels of self-control end up being more prone to crime, and their criminal propensity continues into later life. The characteristics of low self-control can be applied to some simple forms of cybercrime, including software piracy. In their study, Burruss et al , stated that levels of low self-control are directly related to the act of software piracy. For instance, an individual is likel y to perform software piracy because they are impulsive and unable to wait to purchase a copy of the software. These individuals are not likely to be empathetic to the copyright holder and neglect any responsibility. Further, these individuals are likely to be attracted to the thrill and ease of engaging in software piracy. The study also found that low self-control does have an effect on software piracy and that social learning theory measures (i.e., associating with deviant peers and positive attitudes toward software piracy) condition this effect. Thus, from the characteristics of low self-control, those with low levels of self-control are likely to participate in deviant behavior both on and offline because of their desire of immediate gratification. Robert Agnew’s general strain theory proposes that strain leads to negative emotions, which may lead to a number of outcomes, including delinquency. The specific strains discussed in the theory include the failure to achieve positively valued goals (e.g., money), the removal of positively valued stimuli (e.g., loss of a valued possession), and the presentation of negatively valued stimuli (e.g., physical abuse) (Patchin Hinduja, 2011). The first strain looks at the gap between the expectations of the individual and what they actually achieve, which leads to disappointment and resentment. The second type of strain is caused when a positively valued stimulus is removed and the result is delinquency. This criminal behavior may present itself as an attempt to ease or replace the stimuli. The final type of strain occurs when confronted with negative stimuli. This may cause delinquency as a means to terminate or avoid the negative stimuli (Patchin Hinduja, 2011). According to Agne w, strain does not directly cause crime but rather promotes negative emotions like aggression and frustration. This is directly in conjunction with the frustration-aggression hypothesis by Yale university psychologists. They believed that anger comes before frustration, and frustration can manifest into both aggressive and non-aggressive behavior (Runions, 2013). In turn, these negative emotions necessitate coping responses as a way to relieve internal pressure. Coping via illegal behaviour and violence may be especially true for adolescents because of their limited resources and inability to escape frustrating environments. In their article, Patchin Hinduja, concluded that general strain theory can be used to explain illegal behavior such as cyber bullying among youth. Cyber bullying is a serious and growing problem that occurs when youth use electronics to harass or intimidate their peers in a deliberate attempt to inflict direct or indirect harm. There are some unique elements in the digital setting that are not present offline, such as: anonymity, constant connectivity, and permanence. This new technology allows victims to be attacked at anytime and the anonymity of cyber bullies makes it difficult to identify them. Agnew argues that strain makes people feel angry, frustrated, depressed, and essentially creates pressure for corrective action on the part of the victim. In response to this pressure, victims react by wanting to take a corrective action as a means to alleviate the bad feelings. Consequently for some victims, cyber bullying is one corrective action that adolescents might take to mitigate the bad feelings (Patchin Hinduja, 2011). Together, general strain theory and frustration aggression hypothesis, provide an understanding of how pe ople, especially youth, respond and deal with negative strain, whether it may be to bully others or do deviant acts to alleviate the strain. Routine Activity Theory was developed by Cohen and Felson to originally fill the shortcomings in existing models that failed to adequately address crime rate trends since the end of World War II. They suggested that the behavior of most victims is repetitive and predictable and that the likelihood of victimization is dependent on three elements: motivated offenders, suitable targets, and the absence of capable guardians (Reyns, 2013). The motivated offender is someone willing to commit a crime if an opportunity presents itself. A suitable target is one that the motivated offender values (e.g., credit card information). In addition to these, a capable guardian includes anything that obstructs the offender’s ability to acquire the target (e.g., antivirus, encryption). With the increasing use of the internet, criminals have found new opportunities to victimize their targets on a whole new platform. Researchers have found some support for applying the tenets of routine activity th eory to the study of cybercrime (Van Wilsem, 2011). People whose regular activities place them in situations where they have the possibility of interacting with offenders are at an increased risk of being victimized. Research has found that the amount of time spent online, more use of internet banking and online purchases, and risky online behavior make people more suitable to offenders. Individuals with these actions are more likely to be targeted for identity theft. Furthermore, the lack of antivirus and network security (capable guardians) is associated with more victimization (Reyns, 2013). So, routine activity theory can be used, to an extent, to explain certain types of cybercrime. Situational crime prevention is a crime prevention strategy that addresses specific crimes by manipulating the environment in a way that increases the risk to the offender, while reducing the potential reward for committing the crime (Hinduja Kooi, 2013). It is rooted in rational choice theory, routine activities theory, and crime pattern theory. Like other prevention measures, situational prevention focuses on reducing crime opportunities rather than the criminals. This theory differs from other criminological theories in that they do not look at why the offender did the crime, but rather how to prevent crime from altering the physical surroundings where the crime takes place. Essentially, it seeks to make the criminal act more difficult to commit in the first place. Like other primary crime prevention measures, situational prevention tends to focus on reducing crime opportunities rather than on the characteristics of criminals or potential criminals. In regards to cybercrime, ther e are ways in which space can be designed to prevent crime through: target hardening, access control, deflecting offenders, and controlling facilitators (Hinduja Kooi, 2013). Target hardening is the actual physical (or digital) barriers that reduce chances of crime, such as encrypting sensitive information. Access control involves strategies to prevent potential offenders from areas that a crime can occur. This includes photo ID cards, passwords, and check-in booths. Deflecting offenders is concerned with initiatives to move potential offenders away from their crime targets. For example, storing valuable data off-site would deter potential offenders from searching for it. Controlling facilitators involves checking elements that may cause a crime, such as doing background checks on employees or restricting unauthorized installations on computers (Hinduja Kooi, 2013). Research has found that situational crime prevention strategies can be used to reduce cyber stalking and other onlin e victimization crimes. Also, prevention strategies can be applied InfoSec to effectively protect the assets of organizations from being exploited online (Hinduja Kooi, 2013). Theoretically, if used effectively, the principles of situational crime prevention seem to be able to prevent most types of cyber crime. Computers and the internet have become common place in today’s society. This new technology has resulted in the development of a new form of crime, cybercrime. I think that criminal behavior cannot be explained entirely by one theory; it requires the combination of various theories. Different aspects of each theory can be used in conjunction to compensate for what each individual theory failed to explain. For example, social learning theory believes that crime is learned through association with deviant peers and research has already shown that there is a relationship between the number of deviant peers an individual has and his or her participation in software piracy (Burruss et al., 2012). But, researchers have not examined whether social learning theory applies to all types of cybercrimes or just certain cybercrimes. On the other hand, low self control theory asserts that low self control is the cause of crime all the time. This may be true for some criminals, but many crim inals, like those involved in white collar crimes, do not adhere to the principles of low self control. However, while self-control theory is useful in explaining why individuals may act in a certain way, it does not explain the situations that must be met for a crime to occur. Routine activity theory describes the situational factors that must be present for a crime to occur. It is more difficult to apply this theory to cybercrime because the offender and victim do not necessarily have to meet for the crime to occur. Similar to low self control theory, strain theory maintains that when an individual cannot achieve his or her goals, he or she experiences strain and as a result they may turn to crime (Patchin Hinduja, 2011). But, researchers could further study whether an individual’s strain in the ‘real world’ affects their deviant behavior in the virtual world. So, an individual’s low self-control and negative strain combined with his or her deviant asso ciations and regular activities can increase an individual’s risk of being victimized online. Future studies of cybercrime victimization may draw benefit from using a combination of these theories to explore the problem. Cybercrime research will be important to our understanding of crime as our society becomes more and more dependent on technology. References Burruss, George W., Bossler, Adam M. And Holt, Thomas J. (2012). Assessing the mediation of a fuller social learning model on low self-control’s influence on software piracy. Crime and Delinquency, 59(5), 1157-1184 Hinduja, Sameer and Kooi, Brandon. (2013). Curtailing cyber and information security vulnerabilities through situational crime prevention. Security Journal, 26(4), 383-402 Patchin, Justin W. and Hinduja, Sameer. (2011). Traditional and non-traditional bullying among youth: A test of general strain theory. Youth Society, 43(2), 727-751. Reyns, Bradford W. (2013). Online routines and identity theft victimization: Further explaining routine activity theory beyond direct-control offenses. Journal of Research in Crime and Delinquency, 50(2), 216-238 Runions, Kevin C. (2013). Toward a conceptual model of motive and self-control in cyber-aggression: Rage, reward and recreation. Journal of Youth and Adolescence, 42(5), 751-771. Van Wilsem, Johan. (2011). Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization. European Journal of Criminology, 8(2), 115-127

Friday, January 17, 2020

Complexometric Determination of Water Hardness Essay

Abstract: Using complexometric method of calculating water hardness, an EDTA solution was made and calculated to be around .00209M. This EDTA solution was then used to titrate a water sample with unknown hardness. The sample used was sample #18. The hardness of the sample was calculated to be 180505 ppm. This is within normal levels for the Mesa area. Introduction: This experiment focuses on titration with EDTA. Titration is the determination of a given component in solution by addition of a liquid reagent of known strength until the endpoint is reached when the component has been consumed by reaction with the reagent. An indicator called Eriochrome Black T will enable detection when the EDTA has completely chelated the metal impurities. Chelation happens when a ligand (with more than one binding site) forms a complex with a metal ion. Ligands are complexes that form when the electron donating groups form coordinate covalent bonds through empty orbitals on the metal ion. This experiment contains Ammonium chloride buffer which is an inhalation irritant. Procedure: About 500 mL of approximately 0.004 M disodium EDTA solution needed. The solution should have between 0.7–0.8 g of Na2EDTA and dissolve in about 500Â  mL deionized water in a plastic bottle. The bottled is Sealed and shaken vigorously for a few minutes to dissolve the salt. Standardize the Na2EDTA solution using a stock calcium ion solution as the primary standard. Using a 10-mL transfer pipet to add 10.00 mL of standardized calcium ion stock solution (1.000 g CaCO3/L solution) to a 250-mL Erlenmeyer flask which will have an additional 30 ml of deionized water to this titration flask. Adding a magnetic stir-bar the solution was then stirred. about 3 mL of ammonia/ammonium chloride buffer is added to the solution. Just prior to titrating the flask, adding four drops of Eriochrome Black T indicator solution will be needed. At the endpoint, the color will change from pink to violet to blue. This will repeat two more times. Then Choose one prepared unknown water sample as provided. Record the unknown code in a notebook, then titrate this water sample with your standardized disodium EDTA solution. Transferring 25.00 mL of the prepared water sample to a 250-mL Erlenmeyer flask will be done. Then Add about 20 ml of DI water to the titration flask, which will have a magnetic stir-bar. The solution will have an added portion of 3 mL of ammonia/ammonium chloride buffer. The solution will then change color as previously examined in the first portion. This procedure will be repeated twice more. Results and Discussion: EDTA solution Initial Reading (mL) (mL) delivered 0.0mL 50.01mL 0.0mL 47.05mL 0.0mL 46.10mL The average of the mL delivered of the three results is 47.72 mL The Molarity of the EDTA solution was calculated and is shown below. Ppt: 15.99 for 50.01 mL delivered Ppt: 4.68 for 47.05 mL delivered Ppt: 11.31 for 46.10 mL delivered Unknown solution Initial Reading(mL) (mL) delivered 0.0mL 22.9mL 0.0mL 21.41mL 0.0mL 20.41mL The average of the mL delivered of the three results is 21.57 The hardness of the unknown water sample was calculated using the Molarity of the EDTA solution standardized in the first portion of the lab. The calculation is shown below. Ppt: 20.55 for 22.9 mL delivered Ppt: 2.47 for 21.41 mL delivered Ppt: 17.92 for 20.41 mL delivered The tables reveal a difference in (mL) delivered in comparing the first experiment to the unknown. The unknown must have a weaker tolerance to the indicator in which the first experiment is stronger. Conclusion: The water hardness in Mesa ranges from 12 gpg (grains per gallon) to 22 gpg (1). The Ppt of the unknown and EDTA do and don’t fall within Mesa’s range. There are some numbers that fall within the range and there are some that may fall out. Overall the data has some proof that the water hardness of the EDTA and unknown can potential match up to Mesa’s. Sources: (1) http://www.mesaaz.gov/water/hard_water.aspx

Thursday, January 9, 2020

Adding Emphasis in English Special Forms

There are a number of ways to add emphasis to your sentences in English. Use these forms to emphasize your statements when you are expressing your opinions, disagreeing, making strong suggestions, expressing annoyance, etc. Use of the Passive The passive voice is used when focusing on the person or thing affected by an action. Generally, more emphasis is given to the beginning of a sentence. By using a passive sentence, we emphasize by showing what happens to something rather than who or what does something. Example: Reports are expected by the end of the week. In this example, attention is called to what is expected of students (reports). Inversion Invert the word order by placing a prepositional phrase or another expression (at no time, suddenly into, little, seldom, never, etc.) at the beginning of the sentence followed by inverted word order. Examples: At no time did I say you couldnt come.Hardly had I arrived when he started complaining.Little did I understand what was happening.Seldom have I felt so alone. Note that the auxiliary verb is placed before the subject which is followed by the main verb. Expressing Annoyance Use the continuous form modified by always, forever, etc. to express annoyance at another persons action. This form is considered an exception as it used to express a routine rather than an action occurring at a particular moment in time. Examples: Martha is always getting into trouble.Peter is forever asking tricky questions.George was always being reprimanded by his teachers. Note that this form is generally used with the present or past continuous (he is always doing, they were always doing). Cleft Sentences: It Sentences introduced by It, like It is or It was, are often used to emphasize a specific subject or object. The introductory clause is then followed by a relative pronoun. Examples: It was I who received the promotion.It is the awful weather that drives him crazy. Cleft Sentences: What Sentences introduced by a clause beginning with What are also used to emphasize a specific subject or object. The clause introduced by What is employed as the subject of the sentence as is followed by the verb to be. Examples: What we need is a good long shower.What he thinks isnt necessarily true. Exceptional Use of Do or Did You have probably learned that the auxiliary verbs do and did are not used in positive sentences - for example, He went to the store. NOT He did go to the store. However, in order to emphasize something we feel strongly these auxiliary verbs can be used as an exception to the rule. Examples: No thats not true. John did speak to Mary.I do believe that you should think twice about this situation. Note this form is often used to express something contrary to what another person believes.

Wednesday, January 1, 2020

Gender Neutral Bathrooms A Hot Topic Of Discussion Essay

The idea of having gender neutral bathrooms has been a hot topic of discussion lately. Recent events such as the New York bill about gender neutral bathrooms getting approved has drawn this issue into the public eye. The very controversial decision that Target made to make all of their restrooms gender neutral has also shed light on this issue. Many colleges across the country are also installing gender neutral bathrooms. With the way our society is always advancing, our rules and regulations must be advanced too. Gender neutral bathrooms can help to make our society more inclusive, therefore gender neutral bathrooms should be provided in most public bathroom areas. The main group of people whose lives would be easier if gender neutral bathrooms were installed, are transgender and non-binary people. Our world is becoming more progressive and more inclusive to people that are different. Gender neutral bathrooms would be a huge step to equality for trans people. If these types of bathr ooms were installed in public areas transgender and non-binary people would have a safe environment to use the restroom. This would eliminate the harassment and anxiety that many of these people face when doing something as simple as using the restroom. The pressure of whether or not to use the bathroom of their assigned gender or of their current gender that they identify as is a daily issue that transgender people have to face. Whichever they choose, they are almost always subject toShow MoreRelatedB and Q Marketing Strategies in China23218 Words   |  93 Pages...............................................................62 4.3.2 Observations of DIY stores ......................................................................63 Marketing Dissertation 2006 BQ’s Marketing Strategies v Chapter 5 - Discussion ..................................................................................................65 5.1 Product ...............................................................................................................65 5.1.1 Quality..Read MoreFundamentals of Hrm263904 Words   |  1056 PagesEmployee Involvement Implications for HRM 20 Other HRM Challenges 21 Recession 21 Off Shoring 21 Mergers 22 A Look at Ethics 22 Summary 23 Demonstrating Comprehension: Questions for Review 24 Key Terms 24 HRM Workshop 25 Linking Concepts to Practice: Discussion Questions 25 Developing Diagnostic and Analytical Skills 25 Case 1: Work/Life Balance at Baxter 25 Working with a Team: Understanding Diversity Issues 25 Learning an HRM Skill: Guidelines for Acting Ethically 26 Enhancing Your Communication SkillsRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 PagesCharacteristics of the U.S. Workforce 41 †¢ Levels of Diversity 42 †¢ Discrimination 42 Biographical Characteristics 44 Age 44 †¢ Sex 46 †¢ Race and Ethnicity 48 †¢ Disability 48 †¢ Other Biographical Characteristics: Tenure, Religion, Sexual Orientation, and Gender Identity 50 Ability 52 Intellectual Abilities 52 †¢ Physical Abilities 55 †¢ The Role of Disabilities 56 Implementing Diversity Management Strategies 56 Attracting, Selecting, Developing, and Retaining Diverse Employees 56 †¢ Diversity in Groups 58 â € ¢Read MoreLogical Reasoning189930 Words   |  760 Pagesdemonstrates the usefulness of logical reasoning as a means to making more effective decisions about your own life—decisions about what to believe and decisions about what to do. The chapter begins a systematic program of study of all the major topics regarding logical reasoning. Along the way, the book focuses on developing the following five skills: (1) writing logically, (2) detecting inconsistency and lack of clarity in a group of sentences, (3) spotting issues and arguments, (4) detectingRead Morepreschool Essay46149 Words   |  185 Pagesthan what is generally considered healthy for a given height. A child who has a BMI-for-age that falls at the 95th percentile or higher is considered obese. An adult who has a BMI of 30 or higher is considered obese. BMI for children is age- and gender-specific and is best determined by using a BMI calculator. overweight. A child with a BMI-for-age that falls between the 85th to less than the 95th percentile is considered overweight. An adult who has a BMI between 25 and 29.9 is consideredRead More_x000C_Introduction to Statistics and Data Analysis355457 Words   |  1422 Pages To Carol, Allie, and Teri. J. D. ââ€"   About the Authors puter Teacher of the Year award in 1988 and received the Siemens Award for Advanced Placement in mathematics in 1999. Chris is a frequent contributor to the AP Statistics Electronic Discussion Group and has reviewed materials for The Mathematics Teacher, the AP Central web site, The American Statistician, and the Journal of the American Statistical Association. He currently writes a column for Stats magazine. Chris graduated from IowaRead MoreInnovators Dna84615 Words   |  339 Pageschapters on building the innovator’s DNA in your organization and team describe how you too can actively encourage and support others’ innovation efforts. Why the Ideas in This Book Should Matter to You Over the last decade, many books on the topic of innovation and creativity have been written. Some books focus on disruptive innovation, such as Clayton Christensen’s The Innovator’s Dilemma and The Innovator’s Solution. Others, such as Ten Rules for Strategic Innovators (Govindarajan and Trimble)Read MoreMarketing Management130471 Words   |  522 Pagesthe process of developing and marketing products and services. The marketing concept continues to be at the root of most marketing efforts, though the concept does have its own problems (e.g., doesn’t help much with marketing new technologies) a discussion of which is beyond the scope of this tutorial. But overall marketers have learned they can no longer limit their marketing effort to just getting customers to purchase more. They must have an in-depth understanding of who their customers are andRead MoreMarketing Management 14th Edition Test Bank Kotler Test Bank173911 Words   |  696 Pagesvery difficult to hold baking dishes, resulting in frequent spills. Jill brought her findings to the research department, and her company leveraged its engineering and design competencies to develop a new hand-held hot-pad that allows for significantly greater dexterity in handling hot cooking implements, while protecting the cook from burns. This is an example of the ________ element of the holistic marketing framework. A) integrated marketing B) value creation C) negative demand D) value networking