Embedded
Abstract
This thesis explores the relatively new criminal phenomena of computer crime, or as it is more commonly termed, hacking. The foundation for the examination is based on how well traditional psychological theories of crime and deviance explain this new behaviour. Dominant theories in each of the categories of psychoanalytic, learning and control are discussed. The thesis concludes that for the most part, traditional psychological theories are deficient with regard to explaining criminal computer behaviour.
Is this Essay helpful? Join now to read this particular paper
and access over 480,000 just like this GET BETTER GRADES
and access over 480,000 just like this GET BETTER GRADES
computer behavior: An exploratory study. Unpublished dissertation.
Stoll, C. (1985). The cuckoos egg: Tracking a spy through the maze of computer espionage. New York: Mass Market Paperback.
Sutherland, E. (1947). Principles of criminology (4th ed.). Philadelphia: Lippincott.
Taylor, P. (1998). Hackers: the hawks and the doves-enemies & friends. Unpublished manuscript.
West, D. (1988). Psychological contributions to criminology. British Journal of Criminology, 28, 77-92.
Wired News. (1998). Analyzer takes notoriety to the bank. Available
HTTP: www.wired.com/news/news/technology/story/11534.html
Need a custom written paper? Let our professional writers save your time.