SlideShare a Scribd company logo
1 of 11
CJUS343-1302B-03 P5IP
P5IP
2
CJUS343-1302B-03 P5IP
Colorado Technical University
Instructor: Professor Smith
Connie Hutson
20 June 2013
CJUS343-1302B-03 P5IP
Colorado Technical University
Instructor: Professor Smith
Connie Hutson
20 June 2013
Crime is a social issue that affects the community. This is a
critical reason why many psychologists and sociologists have
presented many perspectives or theories to address the issue.
Scientists, to explain the most deviant characteristics among
criminals, have presented several theories. Both biological
theories and social theories try to explain the cause of criminal
traits in an individual. Several theories have alleged that
childhood traumatic experiences and post childhood traumatic
experiences cause some people to react abnormally to certain
actions in life. This is evident in the case of James, who was
exposed to a distressing livelihood when he was growing up.
This attributed to the violent life that his father exposed his
mother to, while he had to witness it, repeatedly.
The outstanding psychological theory that explains the
behavior depicted by James is the psychological theory of
deviance. The theory explains criminal behaviors based on the
following concepts: code of conduct, traumatic experiences and
the social environment that affect an individual. The first
concept is code of conduct. The theory alleges that individuals
are more susceptible to crime, because of the code of conduct
that the people are exposed to when growing up. James had a
parent who was exceptionally violent, resulting to his criminal
traits. The second concept is traumatic experiences. Traumatic
experiences play a vital role in shaping an individual to become
violent and adapt to criminal behaviors. This is unmistakable
because of the abnormal reaction to challenges in life. Lastly,
the social environment plays a crucial role in shaping an
individual to be a criminal (Herman, 1995). This is evident from
the labeling that the society plays on people who are associated
with crime. The society has to ensure that it accommodates the
reformed criminals, instead of labeling them. A good case is
James’s mother making him believe his father was extremely
violent by labeling his father as a violent person.
The exceptional sociological theory that explains the
behavior depicted by James is the control theory. The theory
affirms that several bonds play a significant role in modeling
the life of a child to crime. When these bonds are weak or
broken, the child is vulnerable to engaging in criminal
activities. The theory is structured on the following notions:
attachment, commitment, involvement and belief. First,
attachment is the bond that exists between parents and a child.
A failure of one parent to be attached to the child lets the child
deviate in his or her moral character. Second, commitment by
parents in terms of providing fundamental wants to the child
ensures that he or she does not engage in ill behaviors.
Involvement is another concept in the theory that makes certain
that a child does not deviate from the normal standards of the
society. Belief is the last concept, which complements the other
notions in making certain that an individual grows up to be a
normal person. A family with no belief subjects a child to adapt
to any belief, which may be contrary to the norms of human
society (Leigh, 2004).
According to both theories, James’ father plays a significant
role in making James to be susceptible to criminal traits. First,
he exposes James to a traumatic childhood as a violent father,
who beats up his mother. James’ father depicts a behavior that
is contrary to behaviors depicted in normal families. It is also
evident that James’ father has no attachment to his son. This is
evident when he decides to pull away from his son, James in
order to protect him from his own violent traits.
Fundamentally, the result is silence on all issues affecting
James. It is essentially crucial that all parents have an
attachment to their children, to ensure that they nurture and
guide the children according to well-established societal norms.
Finally, it is also noticeable that James’ father had no
commitment or involvement with his son. Commitment and
attachment play a pivotal role of nurturing trust and a parental
bond between a child and a parent. The trust and bond created
between a parent and child guarantees that the child is able to
speak out about all the challenges and problems that he or she
faces. This is contrary to the case of James. He completely
does not have any attachment to his father, as the father is not
committed to his child. The lack of attachment and commitment
by James’ father deviated James to engage in activities that are
converse to the conventional norm in our society.
Both of the two theories can have a negative impact in the
future life of generations. Based on the psychological theory of
deviance, it is apparent that when a generation is brought up in
a life that is traumatic and surrounded by a society, which is
ready to criticize the ills committed by that generation, they
will grow to be criminals. The case is even worse, especially if
the generation is a low class generation. Low class generations
are characterized with living in dilapidated conditions, high
number of school dropouts, living in urban areas that are
heavily congested, and the presence of many youth gangs. These
conditions play a role in making certain that the youths embrace
crime as a social mean to make a living (Herman, 1995).
On the second sociological theory of control, it is obvious
that a generation that is brought up without being attached to
parents, parents not getting committed or involved in their
development and growing process the generation, will grow up
to be a generation full of individuals with criminal traits. This
is attributed to the lack of parental guidance on the vital social
norms that ensure people grow up to become responsible and
law abiding citizens. In addition, parents have to make certain
that they provide an excellent environment for their children.
The environment has to be free from abusive relationships and
violence. Commitment of the parents is needed to provide for
the essential needs of all their children (Leigh, 2004). James’
life turns out to be characterized with criminal traits, all
because of the failure of his parents to take care of their
responsibilities in guiding and addressing the needs of James.
References
Herman, N. J. (1995). Deviance: a symbolic interactionist
approach. New York: General Hall.
Retrieved 20 June 2013 from
http://www.scribd.com/doc/38386375/Explaining-Social-
Deviance
Leigh, J. R. (2004). Control theory. London: Institution of
Electrical Engineers. Retrieved 20
June 2013 from
http://openlibrary.org/books/OL3264652M/Essentials_of_nonlin
ear_
control theory
CJUS343
-
1302B
-
03 P5IP
CJUS343
-
1302B
-
03 P5IP
Colorado Technical University
Instructor: Professor Smith
Connie Hutson
20 June 2013
CJUS343-1302B-03 P5IP
CJUS343-1302B-03 P5IP
Colorado Technical University
Instructor: Professor Smith
Connie Hutson
20 June 2013
2
CRIMINAL LAW
Name:
Course:
College:
Tutor:
Date:
JANE DOE
Jane who works as a Janitress for the exclusive T-Partay
Condominium complex is lured and influenced by Jack in to
committing crime after been promised (bribed) some huge
amount of money if she plays along and plays her role in the
crime. Jane becomes an accomplice to a crime when she hands
over the keys to Mrs. Wealthy's apartment to Jack while she was
aware of Jacks plans. In the first place, if Jane would not have
wanted to engage herself in criminal activities she would have
reported Jack to the Police when he had first approached her
and proposed to her his criminal evil plan which she gladly
accepted after been promised quite a lamp of money.
Jane’s criminal acts
1) Bribery:
Jane can be convicted for bribery in a court of law. It is evident
that the 500 dollars that Jack promised her at the end of the
operation is what stirred up her and led to her to being an
accomplice in the crime. She accepts to participate in the crime
after she is bribed off with the amount of money promised to
her.
2) Accomplice to a crime
Jane plays along a crime scene making her as good as a
criminal. Were it not for her the whole criminal activity would
not have taken place. Her role in the whole event is the most
crucial since the crime starts with the handing over of the key to
jack[footnoteRef:1]. [1: R v Connor and Mirza (Conjoined
Appeals) [2004] HL
]
3) Unlawful possession of a gun
Jane is illegally in possession of a gun which is against the law
for one to possess any form of firearm. She even uses this
weapon to kill Jim, an associate sent by Jack to go and kill her.
4) Extortion
Jane can be accused of extortion which she fits quite well. Her
acceptance to participate in the crime makes her fall in this
category as an extortionist since she is made aware of the plan
by Jack which is to extort Mrs. Wealthy’s
money.[footnoteRef:2] [2: 2Identity theft, 18 U.S.C. §
1028(a)(7]
5) Homicide and theft
Jane falls in as a thief when she steals the key to Mrs. Wealthy's
apartment and hands it to Jack. Homicide on the contrary is
when Jane shoots dead Jim who was sent by Jack to kill her.
Thus she can also be sued of murder.[footnoteRef:3] [3: Janjua
& Choudhury, R v (1998) CA]
JACK
1. Bribery.
Jack bribes Jane by buying her off with 500 dollars if she plays
along a crime by stealing the key to Mrs. Wealthy's apartment
and giving it to her. I find Jack guilty of this criminal act.
2. Attempted murder
Jack attempts or rather conspires to kill Jane and even sends Jim
an ex-convict to go break in to her apartment and kill her.
Unfortunately, it turns sour when Jim is caught red handed by
Jane and is shot dead by her using her short gun.
3. Fraud
Theft is an all-encompassing term for the illegal acquisition of
property with the intent to permanently deprive. Theft can refer
to tangible items or effects, such as real estate or a purse, as
well as intangible things, such as intellectual property or
identity. The difference between theft and burglary is that the
perpetrator does not enter a structure illegally with or without
the use of force[footnoteRef:4]. Jack attempts many acts of
deceit. Bribing Jane is an act of fraud. After been given the key
to Mrs. Wealthy's apartment, he uses it to deceit Mrs. Wealthy
and once he is invited to her house, he goes ahead and steals her
no limit credit card and bank statement from her purse which is
theft by deception. Later on after returning to his gang, they
open fraud credit cards registered in Mrs. Wealthy's
name.[footnoteRef:5] [4: 4 Fraud by check, § 18-5-205
] [5: ]
4. Grand larceny
This is the illegally stealing of some extremely large amount of
property which is a criminal act that Jack commits. The
extortion of all Mrs. Wealthy's property that is evident by the
loss of all her entire wealth and life savings which forced her to
move into a homeless shelter.
5. Identity theft
This is just another different form fraud that involves the
stealing of the personal data and details of someone purposely
to be used to commit fraud. This is shown when Jack is invited
to Mrs. Wealthy house only to go into her purse and steal her no
limit credit card and bank statement that he uses later on extort
all of her wealth and savings.[footnoteRef:6] [6: 5 Identification
fraud, 18 U.S.C. § 1028(a)(1)-(6)
]
Mrs. Wealthy
She is the rich tycoon who is stolen or rather whose wealth and
property is extorted completely. This traumatizes her so much
that she has to quit her rich life in to a poor homeless person
which makes her lose her sanity which makes her shoot Jack at
the pack when she spots him.
1. Unlawful possession of a handgun Illinois Ill
A person commits the offense of unlawful possession of
firearms or firearm ammunition when: He has been a patient in
a mental hospital within the past 5 years and has any fire arms
or fire arm ammunition in his possession; or He is mentally
retarded and has any fire arms or fire arm ammunition in his
possession (Nicholson, 2003). Mrs. Wealthy health life events
makes her to lose her sanity and when she spots Jack in the
park, since she remembers him quite well, due to the harsh life
she is going through, she shoots him with an intention of
killing him.
2. Attempted man slaughter
This is the intentional act to kill some one. Mrs. Wealthy
attempts to kill Jack when she saw him on the park and she
pulled out a gun and shot at him. Though he did not die, she had
the intentions to kill him[footnoteRef:7]. [7: 6 Hancock and
Shankland, R v (1986) HL
]
These three persons are answerable in a court of law for the
crimes that they have committed. All of them have committed
crimes for being involved in illegal acts and they deserve to be
punished.
Bibliography
Fraud by check, § 18-5-205
Identification fraud, 18 U.S.C. § 1028(a)(1)-(6)
Identity theft, 18 U.S.C. § 1028(a)(7
Hancock and Shankland, R v (1986) HL
R v Connor and Mirza (Conjoined Appeals) [2004] HL
Janjua & Choudhury, R v (1998) CA
CRIMINAL LAW
Name:
Course:
College:
Tutor:
Date:
CRIMINAL LAW
Name:
Course:
College:
Tutor:
Date:

More Related Content

More from monicafrancis71118

1. Despite our rational nature, our ability to reason well is ofte.docx
1. Despite our rational nature, our ability to reason well is ofte.docx1. Despite our rational nature, our ability to reason well is ofte.docx
1. Despite our rational nature, our ability to reason well is ofte.docx
monicafrancis71118
 
1. Describe in your own words the anatomy of a muscle.  This sho.docx
1. Describe in your own words the anatomy of a muscle.  This sho.docx1. Describe in your own words the anatomy of a muscle.  This sho.docx
1. Describe in your own words the anatomy of a muscle.  This sho.docx
monicafrancis71118
 
1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx
1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx
1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx
monicafrancis71118
 
1. Date September 13, 2017 – September 15, 2017 2. Curr.docx
1. Date September 13, 2017 – September 15, 2017 2. Curr.docx1. Date September 13, 2017 – September 15, 2017 2. Curr.docx
1. Date September 13, 2017 – September 15, 2017 2. Curr.docx
monicafrancis71118
 
1. Compare and contrast Strategic and Tactical Analysis and its .docx
1. Compare and contrast Strategic and Tactical Analysis and its .docx1. Compare and contrast Strategic and Tactical Analysis and its .docx
1. Compare and contrast Strategic and Tactical Analysis and its .docx
monicafrancis71118
 
1. Coalition ProposalVaccination Policy for Infectious Disease P.docx
1. Coalition ProposalVaccination Policy for Infectious Disease P.docx1. Coalition ProposalVaccination Policy for Infectious Disease P.docx
1. Coalition ProposalVaccination Policy for Infectious Disease P.docx
monicafrancis71118
 
1. Company Description and Backgrounda. Weight Watchers was cr.docx
1. Company Description and Backgrounda. Weight Watchers was cr.docx1. Company Description and Backgrounda. Weight Watchers was cr.docx
1. Company Description and Backgrounda. Weight Watchers was cr.docx
monicafrancis71118
 
1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx
1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx
1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx
monicafrancis71118
 
1. Choose a case for the paper that interests you. Most choose a .docx
1. Choose a case for the paper that interests you.  Most choose a .docx1. Choose a case for the paper that interests you.  Most choose a .docx
1. Choose a case for the paper that interests you. Most choose a .docx
monicafrancis71118
 
1. Briefly describe the major components of a data warehouse archi.docx
1. Briefly describe the major components of a data warehouse archi.docx1. Briefly describe the major components of a data warehouse archi.docx
1. Briefly describe the major components of a data warehouse archi.docx
monicafrancis71118
 

More from monicafrancis71118 (20)

1. Dis. 7Should we continue to collect data on race and .docx
1. Dis. 7Should we continue to collect data on race and .docx1. Dis. 7Should we continue to collect data on race and .docx
1. Dis. 7Should we continue to collect data on race and .docx
 
1. Differentiate crisis intervention from other counseling therapeut.docx
1. Differentiate crisis intervention from other counseling therapeut.docx1. Differentiate crisis intervention from other counseling therapeut.docx
1. Differentiate crisis intervention from other counseling therapeut.docx
 
1. Despite our rational nature, our ability to reason well is ofte.docx
1. Despite our rational nature, our ability to reason well is ofte.docx1. Despite our rational nature, our ability to reason well is ofte.docx
1. Despite our rational nature, our ability to reason well is ofte.docx
 
1. Describe the ethical challenges faced by organizations operating .docx
1. Describe the ethical challenges faced by organizations operating .docx1. Describe the ethical challenges faced by organizations operating .docx
1. Describe the ethical challenges faced by organizations operating .docx
 
1. Describe in your own words the anatomy of a muscle.  This sho.docx
1. Describe in your own words the anatomy of a muscle.  This sho.docx1. Describe in your own words the anatomy of a muscle.  This sho.docx
1. Describe in your own words the anatomy of a muscle.  This sho.docx
 
1. Describe how your attitude of including aspects of health literac.docx
1. Describe how your attitude of including aspects of health literac.docx1. Describe how your attitude of including aspects of health literac.docx
1. Describe how your attitude of including aspects of health literac.docx
 
1. Choose a behavior (such as overeating, shopping, Internet use.docx
1. Choose a behavior (such as overeating, shopping, Internet use.docx1. Choose a behavior (such as overeating, shopping, Internet use.docx
1. Choose a behavior (such as overeating, shopping, Internet use.docx
 
1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx
1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx
1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx
 
1. Cryptography is used to protect confidential data in many areas. .docx
1. Cryptography is used to protect confidential data in many areas. .docx1. Cryptography is used to protect confidential data in many areas. .docx
1. Cryptography is used to protect confidential data in many areas. .docx
 
1. Compare and contrast steganography and cryptography.2. Why st.docx
1. Compare and contrast steganography and cryptography.2. Why st.docx1. Compare and contrast steganography and cryptography.2. Why st.docx
1. Compare and contrast steganography and cryptography.2. Why st.docx
 
1. Date September 13, 2017 – September 15, 2017 2. Curr.docx
1. Date September 13, 2017 – September 15, 2017 2. Curr.docx1. Date September 13, 2017 – September 15, 2017 2. Curr.docx
1. Date September 13, 2017 – September 15, 2017 2. Curr.docx
 
1. compare and contrast predictive analytics with prescriptive and d.docx
1. compare and contrast predictive analytics with prescriptive and d.docx1. compare and contrast predictive analytics with prescriptive and d.docx
1. compare and contrast predictive analytics with prescriptive and d.docx
 
1. Creating and maintaining relationships between home and schoo.docx
1. Creating and maintaining relationships between home and schoo.docx1. Creating and maintaining relationships between home and schoo.docx
1. Creating and maintaining relationships between home and schoo.docx
 
1. Compare and contrast Strategic and Tactical Analysis and its .docx
1. Compare and contrast Strategic and Tactical Analysis and its .docx1. Compare and contrast Strategic and Tactical Analysis and its .docx
1. Compare and contrast Strategic and Tactical Analysis and its .docx
 
1. Coalition ProposalVaccination Policy for Infectious Disease P.docx
1. Coalition ProposalVaccination Policy for Infectious Disease P.docx1. Coalition ProposalVaccination Policy for Infectious Disease P.docx
1. Coalition ProposalVaccination Policy for Infectious Disease P.docx
 
1. Company Description and Backgrounda. Weight Watchers was cr.docx
1. Company Description and Backgrounda. Weight Watchers was cr.docx1. Company Description and Backgrounda. Weight Watchers was cr.docx
1. Company Description and Backgrounda. Weight Watchers was cr.docx
 
1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx
1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx
1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx
 
1. Choose a case for the paper that interests you. Most choose a .docx
1. Choose a case for the paper that interests you.  Most choose a .docx1. Choose a case for the paper that interests you.  Most choose a .docx
1. Choose a case for the paper that interests you. Most choose a .docx
 
1. Briefly describe the major components of a data warehouse archi.docx
1. Briefly describe the major components of a data warehouse archi.docx1. Briefly describe the major components of a data warehouse archi.docx
1. Briefly describe the major components of a data warehouse archi.docx
 
1. Case Project 6-4 Network Firewall ComparisonUse the In.docx
1. Case Project 6-4 Network Firewall ComparisonUse the In.docx1. Case Project 6-4 Network Firewall ComparisonUse the In.docx
1. Case Project 6-4 Network Firewall ComparisonUse the In.docx
 

Recently uploaded

MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 

Recently uploaded (20)

REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 

CJUS343-1302B-03 P5IPP5IP .docx

  • 1. CJUS343-1302B-03 P5IP P5IP 2 CJUS343-1302B-03 P5IP Colorado Technical University Instructor: Professor Smith Connie Hutson 20 June 2013 CJUS343-1302B-03 P5IP Colorado Technical University Instructor: Professor Smith Connie Hutson 20 June 2013 Crime is a social issue that affects the community. This is a critical reason why many psychologists and sociologists have presented many perspectives or theories to address the issue. Scientists, to explain the most deviant characteristics among criminals, have presented several theories. Both biological theories and social theories try to explain the cause of criminal traits in an individual. Several theories have alleged that childhood traumatic experiences and post childhood traumatic experiences cause some people to react abnormally to certain actions in life. This is evident in the case of James, who was
  • 2. exposed to a distressing livelihood when he was growing up. This attributed to the violent life that his father exposed his mother to, while he had to witness it, repeatedly. The outstanding psychological theory that explains the behavior depicted by James is the psychological theory of deviance. The theory explains criminal behaviors based on the following concepts: code of conduct, traumatic experiences and the social environment that affect an individual. The first concept is code of conduct. The theory alleges that individuals are more susceptible to crime, because of the code of conduct that the people are exposed to when growing up. James had a parent who was exceptionally violent, resulting to his criminal traits. The second concept is traumatic experiences. Traumatic experiences play a vital role in shaping an individual to become violent and adapt to criminal behaviors. This is unmistakable because of the abnormal reaction to challenges in life. Lastly, the social environment plays a crucial role in shaping an individual to be a criminal (Herman, 1995). This is evident from the labeling that the society plays on people who are associated with crime. The society has to ensure that it accommodates the reformed criminals, instead of labeling them. A good case is James’s mother making him believe his father was extremely violent by labeling his father as a violent person. The exceptional sociological theory that explains the behavior depicted by James is the control theory. The theory affirms that several bonds play a significant role in modeling the life of a child to crime. When these bonds are weak or broken, the child is vulnerable to engaging in criminal activities. The theory is structured on the following notions: attachment, commitment, involvement and belief. First, attachment is the bond that exists between parents and a child. A failure of one parent to be attached to the child lets the child deviate in his or her moral character. Second, commitment by parents in terms of providing fundamental wants to the child ensures that he or she does not engage in ill behaviors. Involvement is another concept in the theory that makes certain
  • 3. that a child does not deviate from the normal standards of the society. Belief is the last concept, which complements the other notions in making certain that an individual grows up to be a normal person. A family with no belief subjects a child to adapt to any belief, which may be contrary to the norms of human society (Leigh, 2004). According to both theories, James’ father plays a significant role in making James to be susceptible to criminal traits. First, he exposes James to a traumatic childhood as a violent father, who beats up his mother. James’ father depicts a behavior that is contrary to behaviors depicted in normal families. It is also evident that James’ father has no attachment to his son. This is evident when he decides to pull away from his son, James in order to protect him from his own violent traits. Fundamentally, the result is silence on all issues affecting James. It is essentially crucial that all parents have an attachment to their children, to ensure that they nurture and guide the children according to well-established societal norms. Finally, it is also noticeable that James’ father had no commitment or involvement with his son. Commitment and attachment play a pivotal role of nurturing trust and a parental bond between a child and a parent. The trust and bond created between a parent and child guarantees that the child is able to speak out about all the challenges and problems that he or she faces. This is contrary to the case of James. He completely does not have any attachment to his father, as the father is not committed to his child. The lack of attachment and commitment by James’ father deviated James to engage in activities that are converse to the conventional norm in our society. Both of the two theories can have a negative impact in the future life of generations. Based on the psychological theory of deviance, it is apparent that when a generation is brought up in a life that is traumatic and surrounded by a society, which is ready to criticize the ills committed by that generation, they will grow to be criminals. The case is even worse, especially if the generation is a low class generation. Low class generations
  • 4. are characterized with living in dilapidated conditions, high number of school dropouts, living in urban areas that are heavily congested, and the presence of many youth gangs. These conditions play a role in making certain that the youths embrace crime as a social mean to make a living (Herman, 1995). On the second sociological theory of control, it is obvious that a generation that is brought up without being attached to parents, parents not getting committed or involved in their development and growing process the generation, will grow up to be a generation full of individuals with criminal traits. This is attributed to the lack of parental guidance on the vital social norms that ensure people grow up to become responsible and law abiding citizens. In addition, parents have to make certain that they provide an excellent environment for their children. The environment has to be free from abusive relationships and violence. Commitment of the parents is needed to provide for the essential needs of all their children (Leigh, 2004). James’ life turns out to be characterized with criminal traits, all because of the failure of his parents to take care of their responsibilities in guiding and addressing the needs of James.
  • 5. References Herman, N. J. (1995). Deviance: a symbolic interactionist approach. New York: General Hall. Retrieved 20 June 2013 from http://www.scribd.com/doc/38386375/Explaining-Social- Deviance Leigh, J. R. (2004). Control theory. London: Institution of Electrical Engineers. Retrieved 20 June 2013 from http://openlibrary.org/books/OL3264652M/Essentials_of_nonlin ear_ control theory CJUS343 - 1302B - 03 P5IP CJUS343 - 1302B
  • 6. - 03 P5IP Colorado Technical University Instructor: Professor Smith Connie Hutson 20 June 2013 CJUS343-1302B-03 P5IP CJUS343-1302B-03 P5IP Colorado Technical University Instructor: Professor Smith Connie Hutson 20 June 2013 2
  • 7. CRIMINAL LAW Name: Course: College: Tutor: Date: JANE DOE Jane who works as a Janitress for the exclusive T-Partay Condominium complex is lured and influenced by Jack in to committing crime after been promised (bribed) some huge amount of money if she plays along and plays her role in the crime. Jane becomes an accomplice to a crime when she hands over the keys to Mrs. Wealthy's apartment to Jack while she was aware of Jacks plans. In the first place, if Jane would not have wanted to engage herself in criminal activities she would have reported Jack to the Police when he had first approached her and proposed to her his criminal evil plan which she gladly accepted after been promised quite a lamp of money. Jane’s criminal acts 1) Bribery: Jane can be convicted for bribery in a court of law. It is evident that the 500 dollars that Jack promised her at the end of the operation is what stirred up her and led to her to being an accomplice in the crime. She accepts to participate in the crime after she is bribed off with the amount of money promised to her. 2) Accomplice to a crime Jane plays along a crime scene making her as good as a criminal. Were it not for her the whole criminal activity would not have taken place. Her role in the whole event is the most crucial since the crime starts with the handing over of the key to jack[footnoteRef:1]. [1: R v Connor and Mirza (Conjoined Appeals) [2004] HL ]
  • 8. 3) Unlawful possession of a gun Jane is illegally in possession of a gun which is against the law for one to possess any form of firearm. She even uses this weapon to kill Jim, an associate sent by Jack to go and kill her. 4) Extortion Jane can be accused of extortion which she fits quite well. Her acceptance to participate in the crime makes her fall in this category as an extortionist since she is made aware of the plan by Jack which is to extort Mrs. Wealthy’s money.[footnoteRef:2] [2: 2Identity theft, 18 U.S.C. § 1028(a)(7] 5) Homicide and theft Jane falls in as a thief when she steals the key to Mrs. Wealthy's apartment and hands it to Jack. Homicide on the contrary is when Jane shoots dead Jim who was sent by Jack to kill her. Thus she can also be sued of murder.[footnoteRef:3] [3: Janjua & Choudhury, R v (1998) CA] JACK 1. Bribery. Jack bribes Jane by buying her off with 500 dollars if she plays along a crime by stealing the key to Mrs. Wealthy's apartment and giving it to her. I find Jack guilty of this criminal act. 2. Attempted murder Jack attempts or rather conspires to kill Jane and even sends Jim an ex-convict to go break in to her apartment and kill her. Unfortunately, it turns sour when Jim is caught red handed by Jane and is shot dead by her using her short gun. 3. Fraud Theft is an all-encompassing term for the illegal acquisition of property with the intent to permanently deprive. Theft can refer to tangible items or effects, such as real estate or a purse, as well as intangible things, such as intellectual property or identity. The difference between theft and burglary is that the
  • 9. perpetrator does not enter a structure illegally with or without the use of force[footnoteRef:4]. Jack attempts many acts of deceit. Bribing Jane is an act of fraud. After been given the key to Mrs. Wealthy's apartment, he uses it to deceit Mrs. Wealthy and once he is invited to her house, he goes ahead and steals her no limit credit card and bank statement from her purse which is theft by deception. Later on after returning to his gang, they open fraud credit cards registered in Mrs. Wealthy's name.[footnoteRef:5] [4: 4 Fraud by check, § 18-5-205 ] [5: ] 4. Grand larceny This is the illegally stealing of some extremely large amount of property which is a criminal act that Jack commits. The extortion of all Mrs. Wealthy's property that is evident by the loss of all her entire wealth and life savings which forced her to move into a homeless shelter. 5. Identity theft This is just another different form fraud that involves the stealing of the personal data and details of someone purposely to be used to commit fraud. This is shown when Jack is invited to Mrs. Wealthy house only to go into her purse and steal her no limit credit card and bank statement that he uses later on extort all of her wealth and savings.[footnoteRef:6] [6: 5 Identification fraud, 18 U.S.C. § 1028(a)(1)-(6) ] Mrs. Wealthy She is the rich tycoon who is stolen or rather whose wealth and property is extorted completely. This traumatizes her so much that she has to quit her rich life in to a poor homeless person which makes her lose her sanity which makes her shoot Jack at the pack when she spots him. 1. Unlawful possession of a handgun Illinois Ill A person commits the offense of unlawful possession of firearms or firearm ammunition when: He has been a patient in
  • 10. a mental hospital within the past 5 years and has any fire arms or fire arm ammunition in his possession; or He is mentally retarded and has any fire arms or fire arm ammunition in his possession (Nicholson, 2003). Mrs. Wealthy health life events makes her to lose her sanity and when she spots Jack in the park, since she remembers him quite well, due to the harsh life she is going through, she shoots him with an intention of killing him. 2. Attempted man slaughter This is the intentional act to kill some one. Mrs. Wealthy attempts to kill Jack when she saw him on the park and she pulled out a gun and shot at him. Though he did not die, she had the intentions to kill him[footnoteRef:7]. [7: 6 Hancock and Shankland, R v (1986) HL ] These three persons are answerable in a court of law for the crimes that they have committed. All of them have committed crimes for being involved in illegal acts and they deserve to be punished. Bibliography Fraud by check, § 18-5-205 Identification fraud, 18 U.S.C. § 1028(a)(1)-(6) Identity theft, 18 U.S.C. § 1028(a)(7 Hancock and Shankland, R v (1986) HL R v Connor and Mirza (Conjoined Appeals) [2004] HL Janjua & Choudhury, R v (1998) CA CRIMINAL LAW