Friday, May 3, 2019

Criminal justice comprehensive exam Essay Example | Topics and Well Written Essays - 2500 words

Criminal justice comprehensive exam - Essay usageThe perpetrators of such crimes have been known to create and distribute viruses that have been known to disrupt a companys effortless operations. Cybercrimes vary in their nature there argon those criminals who use the internet to accomplish other handed-down crimes like drug trafficking while there are those who utilize this technology to carry out the expert crimes like bank fraud and identity theft (P whizmon Institute, 2012). Compare your findings above in (a) to previous years. In 2011, the average cost of cybercrime was estimated at $8.4 million which represented a 6 portion increase in cost from a previous study (Ponemon Institute, 2012). The number of attacks also increased by 42 percent from 72 successful attacks per week to 102 successful attacks per week (Ponemon Institute, 2012). The Identity Theft Resource Center (ITRC) account that there was a decrease in data breech in 2011 (n=419). It was also reported that this even out came after there had been an increase in 2006 (n=662) of breeches which characterized a wide range of cybercrimes (Finklea & Theorhary, 2013). Apply a criminological theory (just one) to describe why this particular crime problem exists to the extent that it does, The psychoanalytic theory of crime was developed by Sigmund Freud to explain some of the causes of crime in the world. In his theory, the merciful personality has three psychic structures commonly referred to as the identity, the self-importance and the super ego (Toch, 1979). Through the identity, one seeks to pursue instant needs without any thoughts or analysis. Through the ego, one seeks to pursue needs that are influenced by their educational status and socialization processes. The super ego on the other hand results from all(a) lessons that individuals have learned from their parents. Therefore, crime will often result when a persons identity surpasses their super ego resulting in actions that are only fueled by apparent need without further thought of their consequences. Therefore, the navvy will per somatic body the classical psychological crime because of their apparent need for social rewards in the form of fame or money. They do so without paying attention to the obvious consequences like punishment by the law. The structures of education and family lessons have failed to take root in this persons identity because they are still driven by material needs. It is because of this that programs to prevent hacking are developed that focus on administration of computer ethics education at the early stages of life of a child (Ponemon Institute, 2012). According to the theory in (c), explain the changes in the design of the crime from previous years compared to today There has been a significant increase in the be that have been incurred in cybercrime in 2011. This can be attributed to the policy that was introduced to enhance cyber space security. This was the National dodge for Trusted Identities in Cyberspace Enhancing Online Choice, Efficiency, Security, and Privacy that was released in April 2011 (Finklea & Theorhary, 2013). this policy was meant to create an identity ecosystem whereby individuals were to authenticate their on-line(a) identities and the identities of their digital devices. Through the establishment of these laws, hackers perceived a challenge presented by the President and sought to connect with their identities (Sigmund Freuds theory). Hence in order to seek fame and powers that had been denied by the enactment of this policy, hackers increased

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.