Kristyn Irene Hope Seiler
Information Technology in Criminal Justice – CIS170
Strayer University
Professor Carmen J. Flores
November 5, 2012
There are many different theories when it comes to digital crime. Some of the theories are the choice theory, the deterrence theory, the psychological theory, the strain theory and the routine activities theory. In this paper I will discuss the one theory to be the cause of digital crime, why the theory chosen could be recognized as the most relevant in terms of being the cause of digital crime and two examples of non-digital crime that could be considered caused by this theory. The one theory that I believe that caused digital crime is the routine activities theory. This is related to crime in general by the way that the criminals had made a rational choice to commit the crime. The rational activities theory can be related to crime in general by that the criminals have the choice of what victim that they want to commit the crime on. There are many different ways to commit this crime digitally. Three of the ways are a motivated offender, a suitable target and the absence of a capable guardian. The three ways to commit a digital crime and a crime in general is the same three ways. In any crime you need a many different opportunities that need to be in place before the crime happens. The reason that rational activities theory could be recognized as the most relevant in terms of digital crime is because of what can happen when these criminals want something. A motivated offender is like a hacker. A suitable target is like a vulnerable computer system. The absence of a capable guardian is like inadequate software protection. The criminals have to have these three things that need to be in place before the criminal needs to be able to commit the crime. They need to weigh the risks of what crime they are about to commit with the benefits that will come forward when you finished committing
References: Marsh, Ian and Melville, Gaynor (2006). Theories of Crime. pg 1-181 Decker, Scott H. and Barlow, Hugh D. (2010). Criminology and Public Policy: Putting Theory to Work. pg 1-272 Robert W. Taylor, Eric J. Frisch, John Liederbach, and Thomas J. Holt (2011). Digital Crime and Digital Terrorism. pg 8-15