SlideShare a Scribd company logo
1 of 2
Download to read offline
Motive is one of the main themes that law enforcement must identify in order to prevent future
crimes. Law enforcement utilizes the science of criminology to understand criminality and
identify potential criminals.
Identify at least two criminology theories.
Apply these theories to computer crimes and to the individuals’ motives for using technology to
further their crimes.
Solution
CRIMINOLOGY THEORIES
1.Learning theories tend to follow the lead of Edwin Sutherland's theory of differential
association, developed in 1947, although ideas about imitation or modeling go back to 1890.
Often oversimplified as "peer group" theories, learning is much more than that, and involves
the analysis of what is positively and negatively rewarding (reinforcing) for individuals.
2. Psychological criminology has been around since 1914, and attempts to explain the consistent
finding that there is an eight-point IQ difference between criminals and noncriminals. That gap
isn't enough to notice, but it might make them more impulsive and foolhardy, and even smart
people with high IQs are vulnerable to folly. Other psychocriminologists focus on personality
disorders, like the psychopaths, sociopaths, and antisocial personalities.
Criminology theories of computer crimes
Psychoanalytic Theories
Psychoanalytic theory, as developed by Freud, has taken a somewhat indirect approach in
explaining criminal behaviour. It relies on the pathological process by which criminal acts are
thought to be manifested (Blackburn, 1993).
Freud believed that there was an inner moral agency (superego) governing conduct, whose
development depends primarily on satisfying parent-child relationships (Blackburn, 1993).
Inadequate superego formation and function accounts for criminal behaviour (Blackburn, 1993).
Behaviour therefore depends on the balance of the psychic energy system. A disturbance in this
system or any component structure produces maladaptive development (Blackburn, 1993).
Learning Theories
Learning theory approaches to explaining criminal behaviour have links to one of the core
sociological theories of crime, the differential association theory
Criminology theories to the individuals
Critical Theory: Critical theory upholds the belief that a small few, the elite of the society, decide
laws and the definition of crime; those who commit crimes disagree with the laws that were
created to keep control of them.
Critical criminology sees crime as a product of oppression of workers, (particularly, the poorer
sections) and less advantaged groups within society, such as women and ethnic minorities, are
seen to be the most likely to suffer oppressive social relations based upon class division, sexism
and racism. More simply, critical criminology may be defined as any criminological topic area
that takes into account the contextual factors of crime or critiques topics covered in mainstream
criminology
Choice Theory – Choice theory is the belief that individuals choose to commit a crime, looking
at the opportunities before them, weighing the benefit versus the punishment, and deciding
whether to proceed or not. This cost-benefit analysis primarily focuses on the idea that we all
have the choice to proceed with our actions. Because of the punishment involved, we are
deterred from committing the crime.

More Related Content

More from fabmallkochi

Establish the identity sin (2theta)[costheta+cos(3theta)]=-cos(2the.pdf
Establish the identity sin (2theta)[costheta+cos(3theta)]=-cos(2the.pdfEstablish the identity sin (2theta)[costheta+cos(3theta)]=-cos(2the.pdf
Establish the identity sin (2theta)[costheta+cos(3theta)]=-cos(2the.pdffabmallkochi
 
Discuss the requirements for developing a Security Education, Tranin.pdf
Discuss the requirements for developing a Security Education, Tranin.pdfDiscuss the requirements for developing a Security Education, Tranin.pdf
Discuss the requirements for developing a Security Education, Tranin.pdffabmallkochi
 
Determine whether or not the vectors are linearly dependent. Determi.pdf
Determine whether or not the vectors are linearly dependent. Determi.pdfDetermine whether or not the vectors are linearly dependent. Determi.pdf
Determine whether or not the vectors are linearly dependent. Determi.pdffabmallkochi
 
DBA1. Provide five reasons for creating a conceptual data model..pdf
DBA1. Provide five reasons for creating a conceptual data model..pdfDBA1. Provide five reasons for creating a conceptual data model..pdf
DBA1. Provide five reasons for creating a conceptual data model..pdffabmallkochi
 
By using MIMO technique, the throughput can be increased greatly wit.pdf
By using MIMO technique, the throughput can be increased greatly wit.pdfBy using MIMO technique, the throughput can be increased greatly wit.pdf
By using MIMO technique, the throughput can be increased greatly wit.pdffabmallkochi
 
Between 1840 and 1850, the United States gained one-third more land .pdf
Between 1840 and 1850, the United States gained one-third more land .pdfBetween 1840 and 1850, the United States gained one-third more land .pdf
Between 1840 and 1850, the United States gained one-third more land .pdffabmallkochi
 
An ethic of virtue implies that moral relativism is correct, while.pdf
An ethic of virtue implies that moral relativism is correct, while.pdfAn ethic of virtue implies that moral relativism is correct, while.pdf
An ethic of virtue implies that moral relativism is correct, while.pdffabmallkochi
 
A survey of large Latin American firms showed that many have expande.pdf
A survey of large Latin American firms showed that many have expande.pdfA survey of large Latin American firms showed that many have expande.pdf
A survey of large Latin American firms showed that many have expande.pdffabmallkochi
 
April 18, 2018, Lora and Andrew Buck come to your law office for an .pdf
April 18, 2018, Lora and Andrew Buck come to your law office for an .pdfApril 18, 2018, Lora and Andrew Buck come to your law office for an .pdf
April 18, 2018, Lora and Andrew Buck come to your law office for an .pdffabmallkochi
 
4. Which pair of elements has the smaller element listed first (a) A.pdf
4. Which pair of elements has the smaller element listed first (a) A.pdf4. Which pair of elements has the smaller element listed first (a) A.pdf
4. Which pair of elements has the smaller element listed first (a) A.pdffabmallkochi
 
6. Compare the Populist and Progressive movements. Critically analy.pdf
6. Compare the Populist and Progressive movements. Critically analy.pdf6. Compare the Populist and Progressive movements. Critically analy.pdf
6. Compare the Populist and Progressive movements. Critically analy.pdffabmallkochi
 
Why do we believe galaxy clusters are rich in dark matter What is b.pdf
Why do we believe galaxy clusters are rich in dark matter  What is b.pdfWhy do we believe galaxy clusters are rich in dark matter  What is b.pdf
Why do we believe galaxy clusters are rich in dark matter What is b.pdffabmallkochi
 
Write a C code to perform the following tasks In main Define an arr.pdf
Write a C code to perform the following tasks In main Define an arr.pdfWrite a C code to perform the following tasks In main Define an arr.pdf
Write a C code to perform the following tasks In main Define an arr.pdffabmallkochi
 
Which of the following is trueThe definition of tool is too variabl.pdf
Which of the following is trueThe definition of tool is too variabl.pdfWhich of the following is trueThe definition of tool is too variabl.pdf
Which of the following is trueThe definition of tool is too variabl.pdffabmallkochi
 
Who are we as a country With all the demographic changes currently .pdf
Who are we as a country With all the demographic changes currently .pdfWho are we as a country With all the demographic changes currently .pdf
Who are we as a country With all the demographic changes currently .pdffabmallkochi
 
Using Theodore Levitt’s central thesis of The Globalization of mar.pdf
Using Theodore Levitt’s central thesis of The Globalization of mar.pdfUsing Theodore Levitt’s central thesis of The Globalization of mar.pdf
Using Theodore Levitt’s central thesis of The Globalization of mar.pdffabmallkochi
 
1. Give five reasons why a person might want to extract DNA from cel.pdf
1. Give five reasons why a person might want to extract DNA from cel.pdf1. Give five reasons why a person might want to extract DNA from cel.pdf
1. Give five reasons why a person might want to extract DNA from cel.pdffabmallkochi
 
Transfer taxes are handled under which tax topics Transfer ta.pdf
Transfer taxes are handled under which tax topics  Transfer ta.pdfTransfer taxes are handled under which tax topics  Transfer ta.pdf
Transfer taxes are handled under which tax topics Transfer ta.pdffabmallkochi
 
This project creates a custom linked list structure. It serves.pdf
This project creates a custom linked list structure.      It serves.pdfThis project creates a custom linked list structure.      It serves.pdf
This project creates a custom linked list structure. It serves.pdffabmallkochi
 
The researchers found RNA, but that was not enough to conclude that t.pdf
The researchers found RNA, but that was not enough to conclude that t.pdfThe researchers found RNA, but that was not enough to conclude that t.pdf
The researchers found RNA, but that was not enough to conclude that t.pdffabmallkochi
 

More from fabmallkochi (20)

Establish the identity sin (2theta)[costheta+cos(3theta)]=-cos(2the.pdf
Establish the identity sin (2theta)[costheta+cos(3theta)]=-cos(2the.pdfEstablish the identity sin (2theta)[costheta+cos(3theta)]=-cos(2the.pdf
Establish the identity sin (2theta)[costheta+cos(3theta)]=-cos(2the.pdf
 
Discuss the requirements for developing a Security Education, Tranin.pdf
Discuss the requirements for developing a Security Education, Tranin.pdfDiscuss the requirements for developing a Security Education, Tranin.pdf
Discuss the requirements for developing a Security Education, Tranin.pdf
 
Determine whether or not the vectors are linearly dependent. Determi.pdf
Determine whether or not the vectors are linearly dependent. Determi.pdfDetermine whether or not the vectors are linearly dependent. Determi.pdf
Determine whether or not the vectors are linearly dependent. Determi.pdf
 
DBA1. Provide five reasons for creating a conceptual data model..pdf
DBA1. Provide five reasons for creating a conceptual data model..pdfDBA1. Provide five reasons for creating a conceptual data model..pdf
DBA1. Provide five reasons for creating a conceptual data model..pdf
 
By using MIMO technique, the throughput can be increased greatly wit.pdf
By using MIMO technique, the throughput can be increased greatly wit.pdfBy using MIMO technique, the throughput can be increased greatly wit.pdf
By using MIMO technique, the throughput can be increased greatly wit.pdf
 
Between 1840 and 1850, the United States gained one-third more land .pdf
Between 1840 and 1850, the United States gained one-third more land .pdfBetween 1840 and 1850, the United States gained one-third more land .pdf
Between 1840 and 1850, the United States gained one-third more land .pdf
 
An ethic of virtue implies that moral relativism is correct, while.pdf
An ethic of virtue implies that moral relativism is correct, while.pdfAn ethic of virtue implies that moral relativism is correct, while.pdf
An ethic of virtue implies that moral relativism is correct, while.pdf
 
A survey of large Latin American firms showed that many have expande.pdf
A survey of large Latin American firms showed that many have expande.pdfA survey of large Latin American firms showed that many have expande.pdf
A survey of large Latin American firms showed that many have expande.pdf
 
April 18, 2018, Lora and Andrew Buck come to your law office for an .pdf
April 18, 2018, Lora and Andrew Buck come to your law office for an .pdfApril 18, 2018, Lora and Andrew Buck come to your law office for an .pdf
April 18, 2018, Lora and Andrew Buck come to your law office for an .pdf
 
4. Which pair of elements has the smaller element listed first (a) A.pdf
4. Which pair of elements has the smaller element listed first (a) A.pdf4. Which pair of elements has the smaller element listed first (a) A.pdf
4. Which pair of elements has the smaller element listed first (a) A.pdf
 
6. Compare the Populist and Progressive movements. Critically analy.pdf
6. Compare the Populist and Progressive movements. Critically analy.pdf6. Compare the Populist and Progressive movements. Critically analy.pdf
6. Compare the Populist and Progressive movements. Critically analy.pdf
 
Why do we believe galaxy clusters are rich in dark matter What is b.pdf
Why do we believe galaxy clusters are rich in dark matter  What is b.pdfWhy do we believe galaxy clusters are rich in dark matter  What is b.pdf
Why do we believe galaxy clusters are rich in dark matter What is b.pdf
 
Write a C code to perform the following tasks In main Define an arr.pdf
Write a C code to perform the following tasks In main Define an arr.pdfWrite a C code to perform the following tasks In main Define an arr.pdf
Write a C code to perform the following tasks In main Define an arr.pdf
 
Which of the following is trueThe definition of tool is too variabl.pdf
Which of the following is trueThe definition of tool is too variabl.pdfWhich of the following is trueThe definition of tool is too variabl.pdf
Which of the following is trueThe definition of tool is too variabl.pdf
 
Who are we as a country With all the demographic changes currently .pdf
Who are we as a country With all the demographic changes currently .pdfWho are we as a country With all the demographic changes currently .pdf
Who are we as a country With all the demographic changes currently .pdf
 
Using Theodore Levitt’s central thesis of The Globalization of mar.pdf
Using Theodore Levitt’s central thesis of The Globalization of mar.pdfUsing Theodore Levitt’s central thesis of The Globalization of mar.pdf
Using Theodore Levitt’s central thesis of The Globalization of mar.pdf
 
1. Give five reasons why a person might want to extract DNA from cel.pdf
1. Give five reasons why a person might want to extract DNA from cel.pdf1. Give five reasons why a person might want to extract DNA from cel.pdf
1. Give five reasons why a person might want to extract DNA from cel.pdf
 
Transfer taxes are handled under which tax topics Transfer ta.pdf
Transfer taxes are handled under which tax topics  Transfer ta.pdfTransfer taxes are handled under which tax topics  Transfer ta.pdf
Transfer taxes are handled under which tax topics Transfer ta.pdf
 
This project creates a custom linked list structure. It serves.pdf
This project creates a custom linked list structure.      It serves.pdfThis project creates a custom linked list structure.      It serves.pdf
This project creates a custom linked list structure. It serves.pdf
 
The researchers found RNA, but that was not enough to conclude that t.pdf
The researchers found RNA, but that was not enough to conclude that t.pdfThe researchers found RNA, but that was not enough to conclude that t.pdf
The researchers found RNA, but that was not enough to conclude that t.pdf
 

Recently uploaded

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 

Motive is one of the main themes that law enforcement must identify .pdf

  • 1. Motive is one of the main themes that law enforcement must identify in order to prevent future crimes. Law enforcement utilizes the science of criminology to understand criminality and identify potential criminals. Identify at least two criminology theories. Apply these theories to computer crimes and to the individuals’ motives for using technology to further their crimes. Solution CRIMINOLOGY THEORIES 1.Learning theories tend to follow the lead of Edwin Sutherland's theory of differential association, developed in 1947, although ideas about imitation or modeling go back to 1890. Often oversimplified as "peer group" theories, learning is much more than that, and involves the analysis of what is positively and negatively rewarding (reinforcing) for individuals. 2. Psychological criminology has been around since 1914, and attempts to explain the consistent finding that there is an eight-point IQ difference between criminals and noncriminals. That gap isn't enough to notice, but it might make them more impulsive and foolhardy, and even smart people with high IQs are vulnerable to folly. Other psychocriminologists focus on personality disorders, like the psychopaths, sociopaths, and antisocial personalities. Criminology theories of computer crimes Psychoanalytic Theories Psychoanalytic theory, as developed by Freud, has taken a somewhat indirect approach in explaining criminal behaviour. It relies on the pathological process by which criminal acts are thought to be manifested (Blackburn, 1993). Freud believed that there was an inner moral agency (superego) governing conduct, whose development depends primarily on satisfying parent-child relationships (Blackburn, 1993). Inadequate superego formation and function accounts for criminal behaviour (Blackburn, 1993). Behaviour therefore depends on the balance of the psychic energy system. A disturbance in this system or any component structure produces maladaptive development (Blackburn, 1993). Learning Theories Learning theory approaches to explaining criminal behaviour have links to one of the core sociological theories of crime, the differential association theory Criminology theories to the individuals Critical Theory: Critical theory upholds the belief that a small few, the elite of the society, decide laws and the definition of crime; those who commit crimes disagree with the laws that were
  • 2. created to keep control of them. Critical criminology sees crime as a product of oppression of workers, (particularly, the poorer sections) and less advantaged groups within society, such as women and ethnic minorities, are seen to be the most likely to suffer oppressive social relations based upon class division, sexism and racism. More simply, critical criminology may be defined as any criminological topic area that takes into account the contextual factors of crime or critiques topics covered in mainstream criminology Choice Theory – Choice theory is the belief that individuals choose to commit a crime, looking at the opportunities before them, weighing the benefit versus the punishment, and deciding whether to proceed or not. This cost-benefit analysis primarily focuses on the idea that we all have the choice to proceed with our actions. Because of the punishment involved, we are deterred from committing the crime.