Digital Computer Theories
Dr. Donna Dansey
Digital Crime Theories
There are several theories in Chapter #3, but I choose two theories that called my attention on this chapter, which are Choice and Psychological Theories. Both theories have different functions and different concepts.
Choice theory according to the textbook, this theory focus on policy and implications. If an individual commits a crime he/she makes bad choices the benefits of committing the act depends how they outweigh of the punishment. For example if the offender commit a crime, the Judicial Policy will not focus on the offender its base on the offense; that is why this theory set policies and rules for the offenders who fear the punishment and place on the right place.
During 1970’s Choice Theory was famous for three rational reasons, People beliefs that crimes could be isolated, administrated and controlled. In my opinion choice theory based on rational decisions, basically, if it is good or bad decisions the consequence are not severe. (Robert W. Taylor, Eric J. Fritsch and John Liederbach),
Moreover, Psychological Theory is the opposite of the Choice Theory. Psychological refers to people’s who suffer of personality disorder, strange behavior and different ways of human development.
Psychological theory also has six stages of moral development which are Punishment, Hedonistic, Interpersonal concordance, Law and order orientation, Social contract, Orientation to universal ethical, each stage represents the individual stage where preadolescent and adolescence begin their criminal development. According to the textbook, each stage shows responsibility how people change during their stage and development; some behaviors are recognizing by the moral rights and age. Those stages help to see how people are developing according to the textbook.
Routine Theory is almost similar to the others theories. This theory is cause by the digital crime. Routine Theory depends on computer crime victimation, also known as Cybercrime. Cybercrime has been increase throughout the years and have affect everyone daily life. Computer criminals are using strategies and ways to have access victim’s accounts In addition, computer criminal acts became real threat to our society. For example, people can easily obtain someone’s information; Social Security, Personal information, and can easily purchase stuff online. According to textbook, the purpose of this theory is to estimate the computer crime and slightly see how much it had increase throughout the years. Routine Crime also refers to suitability component; it is the daily individual’s routine, cyberspace increase for computer victimation. It is important to prevent cybercrime victimation before the criminals take over the personal information.
In conclusion, all three theories are important to understand why people commit crimes and how each theory is handling and preventing. Over the years, continue exploring and combination the solutions in reducing types of crime.
Computer Crime Research Center,by Aghatise e. Joseph, June 28,2006.
Digital Crime and Digital Terrorism, Publisher by (Robert W. Taylor, 2015), pages45-50.
Choice Theory , Control Theory and Reality Therapy (William Glasser, 1998).