The micro-level theory is a theory that focuses on small group or offenders. This type of theory focuses on why certain people may want to commit criminal acts. Is there a genetic or personal trait that may make them more prone to committing crimes than a person that does not have the trait? In the documentary, The Rise of the Hackers, one micro-level theory is demonstrated as a reason why people may commit crimes through computer hacking. The theory that can describe why some people are more prone to commit criminal acts online through hacking is the self-control theory.
The self-control theory focuses on several factors of self-control that relate to why a person commits criminal behavior ( Moore, 274). This can be seen in the opening situation that is discussed in the documentary; offenders are hacking into a person’s online life. The first factor is that the criminal act provides instant gratification (Moore, 274). The hackers in the sit...
... middle of paper ...
... methods used to hack are numerous and vary depending on the skill of the hacker s and the skills required to commit the crime. The self-control theory helps to understand why certain people may look to hacking as a way to commit crimes as it allows for instant gratification and a thrill. The differential opportunity theory helps to discern between different types of hackers because different types commit the crime through various types of legitimate and illegitimate means. Teenage hackers would focus on illegitimate means to obtain their goals while government employes may commit their crimes through legitimate and illegitimate means. There is no active guardian that can actively protect against various types of hackers on a live and continuous basis. This has allowed hackers more freedom to commit their crimes as the risk of this crime can be potentially very low.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Multi-platform computer worms are a tool that computer hackers use to infect computers to gain control access. Computer worms are a dangerous virus because they are self-replicating, meaning that they multiply themselves and spread onto other computer networks seeking a lapse in internet security. Computer worms do not need to attach themselves onto an existing computer program to gain access to the victim computer files. The computer worm was created on accident by a Cornell student named Robert Morris; he was seeking a way of managing the internet in 1988.... [tags: Computer Hackers]
1873 words (5.4 pages)
- The documentary “Rize” by David LaChapelle, focuses on the lives of Black Americans who live in South Central Los Angeles and the struggles they go through in their daily lives. Moreover the film also introduces two types of dancing groups that they have in the community. These dance groups are meant to keep the youths and children occupied and distracted from all the problems that have been going on in their community, such as the LA riot. The two styles of dancing are Clowning and Krumping. Clowning was created by Tommy the Clown in 1992.... [tags: Self Reflection paper, documentary analysis]
947 words (2.7 pages)
- The frontline documentary shows the rise of ISIS in Afghanistan and the extent ISIS militants are willing to go to recruit young jihads. ISIS is an INTERNATIONAL TERRORISM organization that uses VIOLENCE against citizens with different political ideologies than their own in order to intimidate or coerce them into accepting their goals or idea. The documentary takes place In the Kunar province and shows the effect ISIS has had on the people living in this area. The most senior commander in the village, Abu Rashid, a former member of the Taliban who defected and joined ISIS, shows the frontline correspondent around the village introducing him to many ISIS fighters and the young people they are... [tags: Al-Qaeda, Taliban, Jihad, Western world]
1067 words (3 pages)
- Computer Hackers Hackers are popularly defined as computer experts who spend enormous amounts of time trying to breach the security of networks, web servers and email servers. Usually they use a selection of specialist software to identify any weaknesses, which they are then able to exploit. There are basically two main types of hackers, the first type is mainly consistent of intelligent adolescents who acquire their hacking knowledge by reading, by talking to people and by spending an excessive amount of time on their computer, learning the various programs, the source code and the commands.... [tags: Papers]
772 words (2.2 pages)
- HACKERS My paper is on hackers, who they are, what they do, and my personal view on the rights or wrongs of hacking. According to the Merriam-Webster Web dictionary, a hacker is 1: one who hacks, 2: a person who is inexperienced or unskilled at a particular activity, 3: an expert at programming and solving problems with a computer, and 4: a person who illegally gains access to and sometimes tampers with information in a computer system. The definition that is most associated with computer hackers in society today would be a person who illegally gains access to and sometimes tampers with information in a computer system.... [tags: essays research papers]
349 words (1 pages)
- Hackers It is the weekend you have nothing to do so you decide to play around on your computer . You turn it and than start up , calling people with your modem , conneciting to another world with people. This is all fine but what happens when you start getting into other people’s computer files , then it becomes a crime and who are the criminals. To begin i will start with hacking and hackers. Hacking is the act of breaking into computers and network of other poeple’s with out any permission .... [tags: Hacking Computers Technology Security Essays]
3691 words (10.5 pages)
- Computer hackers in today’s world are becoming more intelligent. They are realizing that people are constantly developing more hack proof systems. This presents the hackers with a bigger challenge and a bigger thrill. The government is realizing this and is working on making harsher laws to, hopefully, scare away potential hackers. With the increase in hacking and the hackers intelligence, governmental regulation of cyberspace hasn’t abolished the fact that it’s nearly impossible to bring a hacker to justice.... [tags: essays research papers]
618 words (1.8 pages)
- Hackers We are people who live among a society where obeying the laws is apart of our culture. Of course there will be people trying to break the rules and disrupt society for whatever reason. Crime is always a possibility just like in an online community or anywhere on the Internet in general. These criminals are known as Hackers because of their capabilities to steal or damage information on the Internet that can be very valuable like bank accounts or even top-secret government files. Capabilities like these must come from in-depth knowledge of the computer and Internet.... [tags: Technology Hacking Essays]
1342 words (3.8 pages)
- Hackers “...they are still hardly criminal in nature. The intention of most of these individuals is not to destroy or exploit systems but to learn in minute detail how they are used and what they are used for. The quest is purely intellectual, but the drive to learn is so overwhelming that any obstacle blocking its course will be circumvented. Unfortunately the obstacles are usually state and federal laws on unauthorized computer access...” This is a quote from Chris Goggans who was once a member of the hacker Legion of Doom club.... [tags: social issues]
972 words (2.8 pages)
- Hacking: "Slang word for a computer enthusiast. One who breaks into the computer system of a company or government." 1 Most hackers break into computers not to wreak havoc, but simply to explore and share information with one another. A small minority, however, do wish to create mischief. These individuals are the ones who have the public fearing hackers. They are genuinely responsible for the Media calling hackers criminals. These individuals and gangs purposely break into computers for personal financial gain, or to turn your six thousand dollar state of the art computer into a six thousand dollar paperweight.... [tags: essays research papers fc]
696 words (2 pages)