Wk 6 Assignment 2 CIS

Topics: Morality, Crime, Terrorism Pages: 7 (1371 words) Published: June 14, 2015

Assignment 2: Digital Crime Theories Assignment
Angela Marshall
Professor Christopher Young
Strayer University/Information Technology in Crime
February 14, 2015

Select two (2) of the theories, suggested in Chapter 3 of the text that a researcher could use to explain the cause of digital crime. Provide a rationale to support your response. Theories Explaining the Cause of Digital Crime

Moral Development
Moral Development: is a sequential stage in moral reasoning that individuals pass through as they develop. As each stage right and wrong is made for different reasons. Crime, including computer crime; can be explained by development of moral reasoning of certain stages. The connection among moral development and crime focuses on cognitive development. Cognitive development assumes individuals develop in a sequential routine, passing through one step at a time. Kohlberg argues that as each person develops, each person passes through a sequential stage of moral reasoning of what is right and what is wrong; each made for different reasoning’s. According to Kohlberg there are 6 stages of moral development (Taylor, Fritsch, & Liederbach, 2015). Stage 1: Punishment and Obedience

Stage 2: Hedonistic
Stage 3: Interpersonal
Stage 4: Law and Order
Stage 5: Social Contract
Stage 6: Orientation to Universal Ethical Principles
So where do criminals and non-criminals fall in this moral stage of development? Research has shown that criminals usually fall into stage one and two of moral development, where non-criminals usually fall in between stages three and four. In stage 1, children comply with authority out of fear. Leaving the assumption that something is viewed morally correct if punishment is avoided. Therefore, individuals that did not progress through this stage will think that their criminal behavior is acceptable as long as they go unpunished for the criminal act. In stage two children define what is right by having their needs satisfied; defining what is right if they are not punished for it (stage 1) and it satisfies their needs. What is right or wrong is whether or not they get punished and their needs were satisfied (Taylor, Fritsch, & Liederbach, 2015). Ex: Hacking is a digital crime, whether it be for status quo, pleasure or criminal intent, all aspects of hacking is considered a digital crime. Most hackers, hack for status quo or pleasure, and feel as if they are not committing a crime as no harm is done. While some computer and of digital communication intrusion is caught, there are much that goes un-noticed, and unpunished. Leaving Hackers in the mindset that their criminal acts are acceptable and correct, as their needs are satisfied, and their criminal acts go unpunished. Pedophiles

Pedophiles: are those that develop a sexual interest over a long period of time. Commit their crimes for a variety of reasons and go on committing their crimes with little hopes of rehabilitation. The internet serves purpose to many pedophiles today, allowing them to commit a crime and computer crime. Many experts agree that pedophiles develop a sexual interest over a long period of time. Most commonly pedophiles are subject to some form of sexual abuse or trauma at a young age. Other common reasons are abuse or some other related problem during sexual development, as a result they develop an interest in children as sexual objects. According to some of the pedophiles arrested they stated that they developed an interest in children as sexual objects as a result of seeing such images over the internet (Taylor, Fritsch, & Liederbach, 2015)  Ex: Pedophiles can commit digital crime by viewing child pornography, selling child pornography, or betraying to be a child to another child over the internet.  Most pedophiles betray to be other children, grooming their victims, convincing their victims to send nude pictures, or videos with sexual content. In many cases lowering...

References: A&E Networks. (2015). 9/11 Attacks. Retrieved from A+E Networks: http://www.history.com/topics/9-11-attacks
FBI. (2011, 05 11). Child Predators. Retrieved from The FBI Federal Bureau of Investigation : http://www.fbi.gov/news/stories/2011/may/predators_051711/predators_051711
Raddatz, M. (2015, 02 08). Video Appearing to Show Jordanian Pilot 's Burning Death 'Absolutely ' Backfired Against ISIS. Retrieved from abcNews: http://abcnews.go.com/International/video-appearing-show-jordanian-pilots-burning-death-absolutely/story?id=28810372
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). The Criminology of Computer Crime. In R. W. Taylor, E. J. Fritsch, & J. Liederbach, Digitial Crime and Digital Terrorism (pp. 47-50). Upper Saddle River, NJ: Pearson Inc.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • CIS 348 ASSIGNMENT 1 Essay
  • CIS 515 Assignment 3 Essay
  • WK 2 INDIVIDUAL ASSIGNMENT Essay
  • wk 2 individual assignment Essay
  • Bus620 Wk 2 Assignment Essay
  • wk 2 individual assignment Essay
  • MAT222 Wk 2 Assignment Essay
  • Individual Assignment Wk 2 Essay

Become a StudyMode Member

Sign Up - It's Free
Yellow Dog Linux 6.0. | Microsoft Windows 10 Pro Professional 32/64bit Genuine Product Key License Code | Ah! My Goddess: The Adventures of Mini-Goddess (48)