SlideShare a Scribd company logo
1 of 866
HIT 372
Assessment 01
Marks: 20
Create two more virtual machine, name it ServerDC2 and
ServerDM2 and install Win Server
2016 in it. For this assignment we will only require running 2
VMs at a time, ServerDC2 (which
will be the Domain Controller) and ServerDM2. ServerSA1,
ServerDC1 and ServerDM1
should be Powered Off.
Task 1
Your first task is to bring both ServerDC2 and ServerDM2
under the same network, known as
ABCnet. Configure the VirtualBox and IP Configuration
settings for the two VMs to complete
the task. Once done, PING from both the ends to check
connectivity. Attach the most relevant
screenshots and a short description after each of the screenshots
showing the complete process
that you have used.
Task 2
As the network Admin of ABC Corporation, you have decided it
is best to set up an Active
Directory based authentication and management services for the
company network. So to start
off, create the Active Directory Forest on ServerDC2, note that
DNS should also be installed as
part of the AD installation, and it is necessary to promote the
server as the Domain Controller.
Name the Domain domainabc.com. Note that as part of the
process, you also have to set up a
domain-wide admin account (name it abcadmin). Once
installation is completed, verify that the
domain has been properly setup. Rename the newly created
Domain Controller as PrimaryDC.
Attach screenshots for each of the steps and a short description
after each of the screenshots
showing the complete process that you have used. Provide the
screenshots for domain
verification and renaming as well.
Task 3
Now as the DC has been setup, it’s time to adding machines to
the domain. Thus, rename
ServerDM2 to Acc1 and add it to abcdomain. ABC Corporation
at this moment will be divided
into 2 Organizational Units (OUs), Accounting and Marketing.
Create these OUs and add at least
2 users in each of these OUs. Once done, create a group called
NoBackgroundChange. Add one
member from each of the OUs to this group and set up a GPO
Policy in such a way so that
members of the group will not be able to change their Desktop
Backgrounds once they login. In
addition, bring Acc1 under the Accounting OU.
Attach the most relevant screenshots and a short description
after each of the screenshots.
________________________
Task 3 constitutes 50% of the marks, while Task 1 and 2 make
up the remaining 50% with
25% each
Submissions are expected in PDF Format
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
Beccaria Kant Brockway Mabbott
On Crimes and Punishment (1764) Philosophy The
American Punishment
of Law (1887) Reformatory (1910) (1939)
Bentham Bentham
Moral Calculus (1789) The Rationale
of Punishment (1830)
ORIGIN
Classical Theory
CONTEMPORARY THEORY
Rational Choice Theory (p.92)
Maudsley Tarde Freud
Pathology of Mind Penal General Introduction
(1867) Philosophy to Psychoanalysis
(1912) (1920)
Pinel Healy
Treatise on Insanity (1800) The Individual Deliquent
(1915)
Marx Bonger Rusche & Kircheimer
Communist Manifesto (1848) Criminality and
Punishment and Social
Economic Structure (1939)
Conditions (1916)
Glueck & Glueck
500 Criminal Careers
(1930)
Mead Sutherland
The Psychology Principles of
of Punitive Justice Criminology
(1917) (1939)
Sutherland Sutherland
Criminology (1924) The Professional
Thief (1937)
Quetelet Durkheim Park, Burgess, Merton
The Propensity The Division of & McKenzie Social
Structure
of Crime (1831) Labor in Society The City (1925) and
Anomi (1938)
(1893) Shaw et al. (1925)
Delinquency Areas Sellin
Thrasher Culture, Conflict
The Gang (1926) and Crime (1938)
ORIGIN
Positivist Theory
CONTEMPORARY THEORY
Biological Trait Theory (p.129)
ORIGIN
Positivist Theory
CONTEMPORARY THEORY
Psychological Trait Theory (p.136)
ORIGIN
Marxist Theory
CONTEMPORARY THEORY
Critical Criminology (p.232)
ORIGIN
Sociological Theory
CONTEMPORARY THEORY
Social Structure Theory (p.158)
ORIGIN
Sociological Theory
CONTEMPORARY THEORY
Social Process Theory (p.194)
ORIGIN
Multifactor/Integrated Theory
CONTEMPORARY THEORY
Life Course Theory (p.268)
ORIGIN
Multifactor/Integrated Theory
CONTEMPORARY THEORY
Propensity Theory (p.276)
Gall Lombroso Garofalo Kretschmer Hooton
Cranioscopy/Phrenology Criminal Man Criminology
Physique and American
(1800) (1863) (1885) Character (1921) Criminal (1939)
Dugdale Ferri Goring
The Jukes Criminal The English Convict (1913)
(1877) Sociology (1884)
Timeline of Criminological Theories
1775 1800 1825 1850 1875 1900 1925 1939
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
Andenaes Martinson Cohen & Felson Clarke
General Preventive Effects What Works (1974) Routine
Activities (1979) Situational Crime Prevention (1992)
of Punishment (1966)
Packer Newman J. Q. Wilson Katz
The Limits of Criminal Defensible Thinking About Crime
(1975) Seductions of Crime (1988)
Sanction (1968) Space (1973)
Montagu Jeffery E. O. Wilson Mednick & Volavka Rowe
Harris
Man and Crime Sociobiology (1975) Biology and Crime
(1980) The Limits of The Nurture
Aggression Prevention Family Influence
Assumption (1998)
(1968) (1971) (1995)
Sheldon Dalton Ellis
Varieties of Delinquent Youth (1949) The Premenstrual
Syndrome (1971) Evolutionary Sociobiology (1989)
Friedlander Eysenck Bandura Hirschi & Hindelang Henggeler
Moffitt Wilson & Daly
Psychoanalytic Crime and Aggression (1973) Intelligence and
Delinquency in Neuropsychology Evolutionary Psychology
Approach to Personality (1964) Delinquency (1977)
Adolescence (1989) of Crime (1992) (1997)
Delinquency (1947)
Murray & Herrnstein
The Bell Curve (1994)
Vold Chambliss & Seidman Lea & Young Hagan Braithwaite
Zehr & Mika
Theoretical Criminology Law, Order and Power (1971) Left
Realism (1984) Structural Criminology (1989) Crime, Shame,
and Fundamental Concepts of
(1958) Reintegration (1989) Restorative Justice (1998)
Dahrendorf Taylor, Walton, & Young Daly & Chesney-Lind
Quinney & Pepinsky Barak & Henry
Class and Class Conflict The New Criminology Feminist
Theory Criminology as An Integrative-Constitutive
in Industrial Society (1959) (1973) (1988) Peacemaking (1991)
Theory of Crime (1999)
Cloward & Ohlin Kornhauser Wilson Agnew Courtwright
Anderson
Delinquency and Opportunity Social Sources The Truly
General Strain Theory Violent Land (1996) Code of the Street
(1960) of Delinquency (1978) Disadvantaged (1987) (1992)
(1999)
Lewis Blau & Blau Messner & Rosenfeld LaFree
The Culture of Poverty (1966) The Cost of Inequality (1982)
Crime and the American Losing Legitimacy
Dream (1994) (1998)
Lemert Hirschi Schur Akers Kaplan Akers
Social Causes of Labeling Deviant Deviant Behavior (1977)
General Theory Social Learning and
Pathology (1951) Delinquency (1969) Behavior (1972) of
Deviance (1992) Social Structure (1998)
Becker Heimer & Matsueda
Outsiders (1963) Differential Social Control (1994)
Glueck & Glueck West & Farrington Thornberry Sampson &
Laub Loeber
Unraveling Juvenile Delinquency Delinquent Way of Life
Interactional Crime in the Making (1993) Pathways to
Delinquency
(1950) (1977) Theory (1987) (1998)
Weis Moffitt
Social Development Adolescence-Limited and Life-Course
Theory (1981) Persistent Antisocial Behavior (1995)
Hathaway & Monachesi Wolfgang, Figlio, & Sellin Wilson &
Herrnstein Tittle
Analyzing and Predicting Delinquency in Birth Cohorts
Crime and Human Control Balance: Toward a General
Juvenile Delinquency (1972) Nature (1985) Theory of
Deviance (1995)
with the MMPI (1953)
Eysenck Gottfredson & Hirschi
Crime and Personality General Theory of Crime (1990)
(1964)
1947 1969 1975 1980 1991 1995 1997 1998
Timeline of Criminological Theories (continued)
Colvin Farrington Zimmerman, Botchkovar,
Crime and Coercion (2000) “Developmental and Life-Course
Antonaccio, & Hughes “Low Self-
Criminology” (2003) Control in ‘Bad’ Neighborhoods” (2015)
Piquero, Farrington, Boutwell, Barnes, Deaton, &
Nagin, & Moffitt Beaver “On the Evolutionary Origins of
Trajectories of Offending (2010) Life-course Persistent
Offending” (2013)
Conger
Long-term Consequences of Economic
Hardship on Romantic Relationships (2015)
Laub & Sampson Agnew Larson & Sweeten Bersani &
Doherty
Shared Beginnings, Divergent Why Do Criminals Offend?
“Breaking Up Is “When the Ties That
Lives (2003) (2005) Hard to Do” (2012) Bind Unwind” (2013)
Topalli “When Being Good Conger
Is Bad: An Expansion of “Family Functioning and Crime”
(2014)
Neutralization Theory” (2005)
Maruna
Making Good: How Ex-convicts
Reform and Rebuild Their Lives (2001)
Sampson & Raudenbush LeBlanc Wilson & Taub There Goes
the Neighborhood: Wilson
Disorder in Urban Neighborhoods— Random Family: Love,
Drugs, Trouble, Racial, Ethnic, and Class Tensions in Four
Chicago More Than Just Race (2009)
Does It Lead to Crime? (2001) and Coming of Age in the Bronx
(2003) Neighborhoods and Their Meaning for America (2006)
Sullivan & Tifft Western
Restorative Justice (2001) Punishment and Inequality in
America (2010)
Hagan and Wymond-Richmond Chesney-Lind & Morash
Darfur and the Crime of Genocide (2009) “Transformative
Feminist Criminology” (2013)
Bushman & Anderson Dorn, Volavka &
Media Violence (2001) Johnson “Mental Disorder
and Violence” (2012)
Ellis & Hoskin
“Criminality and the 2D:4D Ratio: Testing
the Prenatal Androgen Hypothesis” (2015)
Schoenthaler Friedman Beaver Wright & Cullen Barnes &
Jacobs
Intelligence, Academic Performance, “Violence and Mental
Biosocial Criminology (2009) “The Future of Biosocial
“Genetic Risk for Violent
and Brain Function (2000) Illness” (2006) Criminology”
(2012) Behavior” (2013)
Lott Felson Steffensmeier & Ulmer Simon Petrossian & Clarke
More Guns, Less Crime (2000) Crime and Everyday Life
Confessions of a Dying Thief: Understanding Governing
Through Crime (2010) “The CRAVED Theft Model” (2014)
(2002) Criminal Careers and Illegal Enterprise (2005)
Levitt
Understanding Why
Crime Fell in the 1990s (2004)
2000 2001 2002 2003 2004 2005 2010 2016
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
CRIMINOLOGY
THE CORE
Larry J. Siegel
University of Massachusetts, Lowell
7
Australia ● Brazil ● Mexico ● Singapore ● United Kingdom ●
United States
EDITION
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
This is an electronic version of the print textbook. Due to
electronic rights restrictions,
some third party content may be suppressed. Editorial review
has deemed that any suppressed
content does not materially affect the overall learning
experience. The publisher reserves the right
to remove content from this title at any time if subsequent
rights restrictions require it. For
valuable information on pricing, previous editions, changes to
current editions, and alternate
formats, please visit www.cengage.com/highered to search by
ISBN#, author, title, or keyword for
materials in your areas of interest.
Important Notice: Media content referenced within the product
description or the product
text may not be available in the eBook version.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
requests online at
Cengage
USA
Criminology: The Core,
Larry J. Siegel
Meier
Printed in the United States of America
Print Number: 01 Print Year: 2017
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
This book is dedicated to
my children, Eric, Julie, Rachel, and Andrew;
my grandchildren, Jack, Brooke, and Kayla Jean;
my sons-in-law, Jason Macy and Patrick Stephens;
and my wife, partner, and best friend, Therese J. Libby.
L. J. S.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
LARRY J. SIEGEL was born in the Bronx. While liv-
ing on Jerome Avenue and attending City College of
New York in the 1960s, he was swept up in the social
and political currents of the time. He became intrigued
with the influence contemporary culture had on
individual behavior: Did people shape society, or did
society shape people? He applied his interest in social
forces and human behavior to the study of crime and
justice. Graduating from college in 1968, he was accepted into
the
first class of the newly opened program in criminal justice at
the
State University of New York at Albany, where he earned both
his MA and PhD degrees. Dr. Siegel began his teaching career
at
Northeastern University, where he was a faculty member for
nine
years. He also held teaching positions at the University of
Nebraska–
Omaha and Saint Anselm College in New Hampshire before
being
appointed a full professor in the School of Criminology and Jus -
tice Studies at the University of Massachusetts, Lowell. Dr.
Siegel
retired from full-time classroom teaching in 2015 and now
teaches
exclusively online. He has written extensively in the area of
crime
and justice, including books on juvenile law, delinquency,
criminol-
ogy, criminal justice, corrections, and criminal procedure. He is
a
court-certified expert on police conduct and has testified in
numer-
ous legal cases. The father of four and grandfather of three,
Larry
Siegel and his wife, Terry, now reside in Naples, Florida, with
their
two dogs, Watson and Cody.
Therese J. Libby and Larry J. Siegel
ABOUT THE AUTHOR
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
PART 1 Concepts of Crime, Law, and Criminology
Chapter 1 Crime and Criminology 2
Chapter 2 The Nature and Extent of Crime 30
Chapter 3 Victims and Victimization 64
PART 2 Theories of Crime Causation
Chapter 4 Rational Choice Theory 98
Chapter 5 Trait Theory 132
Chapter 6 Social Structure Theory 170
Chapter 7 Social Process Theory 210
Chapter 8 Social Conflict, Critical Criminology, and
Restorative
Justice 248
Chapter 9 Developmental Theories: Life Course, Propensity,
and Trajectory 284
PART 3 Crime Typologies
Chapter 10 Violent Crime 318
Chapter 11 Political Crime and Terrorism 366
Chapter 12 Economic Crimes: Blue-Collar, White-Collar,
and Green-Collar 404
Chapter 13 Public Order Crimes 444
Chapter 14 Crimes of the New Millennium: Cybercrime and
Transnational
Organized Crime 488
Brief Contents
v
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
Preface xv
PART 1
Concepts of Crime, Law,
and Criminology
CHAPTER 1
Crime and Criminology 2
What Criminologists Do: The Elements
of Criminology 4
Criminal Statistics/Crime Measurement 4
Sociology of Law/Law and Society/Sociolegal Studies 5
Developing Theories of Crime Causation 6
Explaining Criminal Behavior 7
Penology: Punishment, Sanctions, and Corrections 7
Victimology 8
A Brief History of Criminology 8
Classical Criminology 9
Positivist Criminology 9
Sociological Criminology 10
Conflict Criminology 11
Developmental Criminology 12
Contemporary Criminology 12
Deviant or Criminal? How Criminologists
Define Crime 13
Becoming Deviant 14
The Concept of Crime 15
Jo
e
Ra
ed
le
/G
et
ty
Im
ag
es
N
ew
s/
G
et
ty
Im
ag
es
Profiles in Crime
A SHOOTING IN FERGUSON 16
A Definition of Crime 17
Criminology and the Criminal Law 17
Common Law 18
Contemporary Criminal Law 18
The Evolution of Criminal Law 19
Criminology and Criminal Justice 19
The Criminal Justice System 20
The Process of Justice 21
Policies and Issues in Criminology
HATE CRIME IN GEORGIA 23
Ethical Issues in Criminology 24
CHAPTER 2
The Nature and Extent
of Crime 30
Primary Sources of Crime Data 32
Official Records: The Uniform Crime Report 32
NIBRS: The Future of the Uniform Crime Report 35
Survey Research 35
The National Crime Victimization Survey (NCVS) 35
Self-Report Surveys 36
Evaluating Crime Data 38
Crime Trends 39
Contemporary Trends 40
Trends in Victimization 41
Ch
ris
tia
n
Po
ve
da
/A
ge
nc
e
VU
/R
ed
ux
Contents
vii
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
viii CONTENTS
Policies and Issues in Criminology
INTERNATIONAL CRIME TRENDS 42
Policies and Issues in Criminology
EXPLAINING TRENDS IN CRIME RATES 44
What the Future Holds 46
Policies and Issues in Criminology
ARE IMMIGRANTS CRIME PRONE? 47
Crime Patterns 48
Place, Time, Season, Climate 48
Co-Offending and Crime 49
Gender and Crime 49
Race and Crime 51
Use of Firearms 52
Social Class and Crime 53
Unemployment and Crime 54
Age and Crime 54
Chronic Offenders/Criminal Careers 55
What Causes Chronicity? 56
Implications of the Chronic Offender Concept 56
CHAPTER 3
Victims and Victimization 64
The Victim’s Role 66
The Costs of Victimization 66
Societal-Level Costs 66
Individual-Level Costs 67
Legal Costs of Victimization 69
Policies and Issues in Criminology
THE IMPACT OF WRONGFUL CONVICTIONS ON
CRIME VICTIMS 70
The Nature of Victimization 72
The Social Ecology of Victimization 72
The Victim’s Household 73
Victim Characteristics 73
Policies and Issues in Criminology
ELDER VICTIMS 74
A
P
Im
ag
es
/J
im
C
ol
e
Victims and Their Criminals 78
Theories of Victimization 78
Victim Precipitation Theory 78
Lifestyle Theories 79
Deviant Place Theory 81
Routine Activities Theory 82
Caring for the Victim 84
Victim Service Programs 85
Victims’ Rights 89
Victim Advocates 89
Self-Protection 89
PART 2
Theories of Crime Causation
CHAPTER 4
Rational Choice Theory 98
Development of Rational Choice
Theory 100
Concepts of Rational Choice 101
Evaluating the Risks of Crime 101
Offense-Specific/Offender-Specific 102
Structuring Criminality 103
Structuring Crime 104
Is Crime Truly Rational? 106
Is Drug Use Rational? 106
Profiles in Crime
PLANNING TO STEAL 107
Is Violence Rational? 108
Is Hate Crime Rational? 108
Is Sex Crime Rational? 109
Analyzing Rational Choice Theory 109
Situational Crime Prevention 110
Crime Prevention Strategies 111
Evaluating Situational Crime Prevention 113
Th
om
as
B
ar
w
ic
k/
D
ig
ita
lV
is
io
n/
G
et
ty
Im
ag
es
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
ixCONTENTS
General Deterrence 114
Perception and Deterrence 114
Marginal and Restrictive Deterrence 114
Punishment and Deterrence 115
Policies and Issues in Criminology
DOES THE DEATH PENALTY DISCOURAGE
MURDER? 116
Evaluating General Deterrence 118
Specific Deterrence 119
Toughen Punishment? 119
Incapacitation 120
Policies and Issues in Criminology
RACIAL DISPARITY IN STATE PRISONS 122
Criminal Justice and Rational
Choice Theory 123
Police and Rational Choice Theory 123
Courts, Sentencing, and Rational Choice Theory 123
Corrections and Rational Choice Theory 124
CHAPTER 5
Trait Theory 132
Development of Trait Theory 134
Contemporary Trait Theory 135
Individual Vulnerability vs. Differential
Susceptibility 136
Biological Trait Theories 136
Biochemical Conditions and Crime 137
Neurophysiological Conditions and Crime 139
Genetics and Crime 142
Evolutionary Views of Crime 143
Psychological Trait View 144
The Psychodynamic Perspective 145
The Behavioral Perspective: Social Learning Theory 145
Policies and Issues in Criminology
VIOLENT MEDIA/VIOLENT BEHAVIOR? 146
Cognitive Theory 149
A
P
Im
ag
es
/M
ic
ha
el
S
ul
liv
an
/
N
ew
s-
Re
vi
ew
Personality and Crime 150
Policies and Issues in Criminology
CRIMINAL SUSCEPTIBILITY 151
Psychopathic/Antisocial Personality 151
Profiles in Crime
THE ICEMAN: A TRUE SOCIOPATH 153
Intelligence and Criminality 154
Mental Disorders and Crime 155
Crime and Mental Illness 155
Profiles in Crime
ADAM LANZA AND THE NEWTOWN MASSACRE 157
Evaluation of Trait Theory 157
Social Policy and Trait Theory 158
Policy and Issues in Criminology
COGNITIVE BEHAVIORAL THERAPY 159
CHAPTER 6
Social Structure Theory 170
Economic Structure and American Society 172
Living in Poverty 172
Child Poverty 173
Minority Group Poverty 173
Problems of the Lower Class 174
Social Structure and Crime 175
Policies and Issues in Criminology
LABOR’S LOVE LOST 176
Social Structure Theories 177
Social Disorganization Theory 177
The Work of Shaw and McKay 178
The Social Ecology School 180
Collective Efficacy 183
Strain Theories 186
Theory of Anomie 186
Institutional Anomie Theory 187
Relative Deprivation Theory 188
General Strain Theory (GST) 189
A
P
Im
ag
es
/S
te
ve
n
Se
nn
e
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
Cultural Deviance Theory 192
Focal Concerns 192
Policies and Issues in Criminology
THE CODE OF THE STREETS 194
Theory of Delinquent Subculture 195
Theory of Differential Opportunity 197
Social Structure Theory and Public Policy 198
Broken Windows 199
CHAPTER 7
Social Process Theory 210
Institutions of Socialization 213
Family Relations 213
Educational Experience 215
Peer Relations 216
Religion and Belief 217
Social Learning Theories 218
Differential Association Theory 218
Profiles in Crime
THE AFFLUENZA CASE 221
Differential Reinforcement Theory 222
Neutralization Theory 222
Policies and Issues in Criminology
WHITE-COLLAR NEUTRALIZATION 225
Evaluating Learning Theories 226
Social Control Theory 226
Hirschi’s Social Control Theory 226
Testing Social Control Theory: Supportive Research 228
Critiquing Social Control Theory 229
Social Reaction (Labeling) Theory 230
Consequences of Labeling 231
Primary and Secondary Deviance 233
Criminal Careers 233
Differential Enforcement 234
G
ab
rie
lle
L
ur
ie
/A
FP
/G
et
ty
Im
ag
es
Long-Term Effects of Labeling 234
Is Labeling Theory Valid? 235
Social Process Theory and Public Policy 236
CHAPTER 8
Social Conflict, Critical
Criminology, and Restorative
Justice 248
Origins of Critical Criminology 250
Critical Criminology in the United States 252
Contemporary Critical Criminology 253
How Critical Criminologists
Define Crime 253
How Critical Criminologists View the Cause
of Crime 254
Failing Social Institutions 255
Globalization 255
State-Organized Crime 257
Policies and Issues in Criminology
ARE WRONGFUL CONVICTIONS A STATE
CRIME? 260
Instrumental vs. Structural Theory 261
Instrumental Theory 261
Profiles in Crime
RUSSIAN STATE-ORGANIZED CRIME 262
Structural Theory 263
Research on Critical Criminology 263
Race and Justice 263
Alternative Views of Critical Theory 264
Left Realism 264
Policies and Issues in Criminology
LEFT REALISM AND TERROR 265
Critical Feminist Theory: Gendered Criminology 266
Power–Control Theory 269
Peacemaking Criminology 270
A
ni
k
Ra
hm
an
/R
ed
ux
x CONTENTS
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
Critical Theory and Public Policy: Restorative
Justice 271
The Concept of Restorative Justice 271
Reintegrative Shaming 272
The Process of Restoration 273
The Challenge of Restorative Justice 276
CHAPTER 9
Developmental Theories:
Life Course, Propensity,
and Trajectory 284
Foundations of Developmental Theory 286
Three Views of Criminal Career Development 287
Population Heterogeneity vs. State Dependence 288
Life Course Theory 289
Age of Onset 290
Problem Behavior Syndrome 291
Continuity of Crime 291
Age-Graded Theory 292
Policies and Issues in Criminology
HUMAN AGENCY, PERSONAL ASSESSMENT, CRIME,
AND DESISTANCE 296
Social Schematic Theory (SST) 297
Policies and Issues in Criminology
SHARED BEGINNINGS, DIVERGENT LIVES 298
Latent Trait/Propensity Theory 300
Crime and Human Nature 300
General Theory of Crime (GTC) 301
Trajectory Theory 304
Age and Offending Trajectories 304
Personality and Offending Trajectories 305
Chronic Offenders and Non-offenders 305
Pathways to Crime 306
Adolescent-Limited and Life Course Persistent
Offenders 306
Public Policy Implications of Developmental
Theory 308
H
ar
tf
or
d
Co
ur
an
t/
Tr
ib
un
e
N
ew
s
Se
rv
ic
e/
G
et
ty
Im
ag
es
; A
P
Im
ag
es
/
Co
nn
ec
tic
ut
D
ep
ar
tm
en
t o
f C
or
re
ct
io
n
PART 3
Crime Typologies
CHAPTER 10
Violent Crime 318
Causes of Violence 320
Personal Traits 320
Child Abuse and Neglect 321
Human Instinct 321
Policies and Issues in Criminology
VIOLENCE AND HUMAN NATURE 322
Exposure to Violence 323
Substance Abuse 323
Firearm Availability 323
Cultural Values 324
National Values 324
Policies and Issues in Criminology
AMERICAN CULTURE AND HOMICIDE 325
Rape 325
Incidence of Rape 326
Patterns of Rape and Sexual Assault 327
Types of Rapists 327
Types of Rape 328
Causes of Rape 331
Rape and the Law 332
Murder and Homicide 334
Degrees of Murder 335
Nature and Extent of Murder 336
Murderous Relations 336
Policies and Issues in Criminology
HONOR KILLINGS 338
Serial Killers, Mass Murderers, and Spree
Killers 340
Policies and Issues in Criminology
MASS SHOOTERS: WHY DO SOME LIVE AND WHY
DO SOME DIE? 344
A
P
Im
ag
es
/G
ra
ce
B
ea
hm
xiCONTENTS
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
Assault and Battery 345
Nature and Extent of Assault 345
Acquaintance and Family Assaults 345
Dating Violence 347
Robbery 347
Robbers in Action 348
Choosing Targets 348
Contemporary Forms of Interpersonal Violence 350
Hate Crimes 350
Workplace Violence 352
Stalking 353
CHAPTER 11
Political Crime and
Terrorism 366
Political Crime 369
Profiles in Crime
EDWARD SNOWDEN 370
The Nature of Political Crimes 370
Becoming a Political Criminal 371
Types of Political Crimes 372
Election Fraud 372
Abuse of Office/Public Corruption 374
Treason 374
Espionage 375
State Political Crime 377
Terrorism 378
Defining Terrorism 378
Terrorist and Guerilla 379
Terrorist and Insurgent 380
Terrorist and Revolutionary 380
A Brief History of Terrorism 381
Contemporary Forms of Terrorism 382
Political Terrorism 382
Revolutionary Terrorism 384
Nationalist Terrorism 384
Retributive Terrorism 385
A
P
Im
ag
es
/M
ar
ku
s
Sc
hr
ei
be
r
Policies and Issues in Criminology
THE ISLAMIC STATE 386
State-Sponsored Terrorism 387
Lone Actor Terrorists 388
What Motivates the Terrorist? 389
Psychological View 389
Alienation View 390
Family Conflict View 390
Political View 391
Socialization/Friendship View 391
Ideological View 391
Explaining State-Sponsored Terrorism 392
Extent of the Terrorism Threat 392
Criminal Justice Response to Terrorism 393
Combating Terrorism with Law Enforcement 393
Combating Terrorism with the Law 396
Combating Terrorism with Politics 398
CHAPTER 12
Economic Crimes: Blue-
Collar, White-Collar, and
Green-Collar 404
History of Economic Crimes 406
Development of White-Collar and Green-Collar Crime 407
Blue-Collar Crimes and Criminals 408
Larceny 408
Burglary 413
Arson 414
White-Collar Crime 415
Business Frauds and Swindles 416
Profiles in Crime
FERTILITY FRAUD 417
Chiseling 418
Exploitation 418
Influence Peddling 419
Employee Fraud and Embezzlement 421
Client Fraud 422
Corporate Crime 423
A
P
Im
ag
es
/D
ar
ro
n
Cu
m
m
in
gs
; F
lo
rid
a
D
ep
ar
tm
en
t o
f C
or
re
ct
io
ns
xii CONTENTS
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
Green-Collar Crime 425
Defining Green-Collar Crime 425
Forms of Green Crime 426
Policies and Issues in Criminology
THE DEEPWATER HORIZON 430
Theories of White-Collar and Green-Collar
Crime 431
Rational Choice: Greed 431
Rational Choice: Need 431
Rationalization/Neutralization View 432
Cultural View 432
Self-Control View 432
Controlling White-Collar and Green-Collar
Crime 433
Environmental Laws 433
Enforcing the Law 434
Deterrence vs. Compliance 435
CHAPTER 13
Public Order Crimes 444
Law and Morality 446
Are Victimless Crimes Victimless? 447
The Theory of Social Harm 448
Moral Crusaders and Moral Crusades 449
Sex-Related Offenses 450
Paraphilias 451
Pedophilia 451
Prostitution 452
History of Prostitution 453
Policies and Issues in Criminology
SEX WORK IN CONTEMPORARY SOCIETY 454
Incidence of Prostitution 454
Policies and Issues in Criminology
THE INTERNATIONAL SEX TRADE 456
Types of Prostitutes 458
Becoming a Prostitute 459
Legalize Prostitution? 460
Jo
hn
L
am
b/
Sh
el
ly
s/
D
ig
ita
lV
is
io
n/
G
et
ty
Im
ag
es
Pornography 461
Is Pornography Harmful? 462
Does Viewing Pornography Cause Violence? 462
Pornography and the Law 463
Substance Abuse 464
When Did Drug Use Begin? 465
Alcohol and Its Prohibition 465
Extent of Substance Abuse 466
Causes of Substance Abuse 467
Policies and Issues in Criminology
THE OPIOID EPIDEMIC 468
Policies and Issues in Criminology
SUBSTANCE ABUSE AND PSYCHOSIS 469
Substance Abuse and Crime 471
Drugs and the Law 472
Drug Control Strategies 473
Legalization of Drugs 478
CHAPTER 14
Crimes of the New Millennium:
Cybercrime and Transnational
Organized Crime 488
Contemporary Cybercrime 490
Cybertheft: Cybercrimes for Profit 491
Theft from ATMs 491
Distributing Illicit or Illegal Services and Material 492
Distributing Dangerous Drugs 493
Profiles in Crime
THE LOST BOY CASE 494
Denial-of-Service Attack 495
Internet Extortion/Ransomware 495
Illegal Copyright Infringement 496
Internet Securities Fraud 497
Identity Theft 497
Etailing Fraud 499
Cybervandalism: Cybercrime with Malicious
Intent 500
Worms, Viruses, Trojan Horses, Logic Bombs, and Spam 501
Website Defacement 502
Is
ab
el
P
av
ia
/M
om
en
t/
G
et
ty
Im
ag
es
xiiiCONTENTS
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
Cyberstalking 502
Cyberbullying 503
Policies and Issues in Criminology
UPSKIRTING, DOWNBLOUSING, AND REVENGE PORN:
SHOULD NONCONSENSUAL PORNOGRAPHY BE
CRIMINALIZED? 504
Cyberspying 507
The Costs of Cybercrime 507
Combating Cybercrime 508
International Treaties 509
Cybercrime Enforcement Agencies 509
Cyberwar: Politically Motivated Cybercrime 510
Cyberespionage 511
Cyberterrorism 511
Policies and Issues in Criminology
TERRORISM ON THE NET 512
Combating Cyberwar 514
Transnational Organized Crime 514
Characteristics of Transnational Organized Crime 515
Activities of Transnational Organized Crime 515
Transnational Gangs 516
Controlling Transnational Crime 520
Glossary G-1
Name Index NI-1
Subject Index SI-1
xiv CONTENTS
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
I
n 2017, the operator of the world’s largest child pornography
website was sen-
tenced to serve 30 years in prison. The case began in August
2014, when Steven
Chase created the Playpen, a website using the Tor Project
hidden service pro-
tocol, which allows for an open network on the Internet where
users can com-
municate anonymously. Tor software conceals its users’
identities and their online
activity from surveillance and traffic analysis by separating
identification and routing.
It encrypts and then randomly bounces communications through
a network of relays
run by volunteers around the globe.
Chase served as lead administrator of Playpen, through which
he and more than
150,000 other members viewed tens of thousands of postings of
young victims, sorted
by age, sex, and the type of sexual activity involved. In addition
to Tor, website mem-
bers employed other advanced technological means to thwart
identification, includ-
ing elaborate file encryption.
Chase chose the name of the website, selected and made
payments to the website
hosting company, regularly updated the site with new features
and security fixes,
promoted several site members to administrator and moderator
status to assist with
the administration of the criminal enterprise, and spent
hundreds of hours logged in,
personally authoring hundreds of postings. He was arrested
following a court-autho-
rized search of his home that revealed he was in possession of
thousands of images
depicting the sexual abuse of children as young as infants and
toddlers.
Following Chase’s arrest, federal agents pierced through the
anonymity provided
by the Tor network and obtained IP addresses and other
information to identify other
site users. As a result of the investigation, at least 350 US-
based individuals have been
arrested, 25 producers of child pornography have been
prosecuted, 51 alleged hands-
on abusers have been prosecuted, and 55 American children who
were subjected to
sexual abuse have been successfully identified or rescued. The
ongoing international
investigation has led to least 520 arrests, and the successful
identification and rescue
of at least 186 children who were subjected to sexual abuse.
The Playpen case demonstrates the complex nature of crime
today. Contem-
porary criminals, whether they be pornographers, gang
members, or terrorists, are
adept at using the Internet to carry out their criminal enterprise
schemes. While
some crimes are local, others are global in their reach. It is not
surprising that many
Americans are concerned about crime and worried about
becoming victims of crime
themselves. We alter our behavior to limit the risk of
victimization and question
whether legal punishment alone can control criminal offenders.
We watch movies
and TV shows about law firms and their clients, fugitives, and
stone-cold killers. We
are shocked when the news media offers graphic accounts of
school shootings, po-
lice brutality, and sexual assaults. We are swayed when
politicians claim that crime
is on the upswing and that we must arm ourselves to protect
loved ones. Is any-
where safe? Twenty years ago, no states had laws that allowed
guns on university
campuses. Today, 10 states have signed such laws, while 20
others are considering
college carry laws.
I, too, have had a lifelong interest in crime, law, and justice.
Why do people be-
have the way they do? What causes someone like Steven Chase
to operate a global
kiddie porn site? Was his behavior the result of a diseased mind
and personality? And
xv
Preface
Steven Chase
m
ec
kl
en
bu
rg
co
un
ty
nc
.g
ov
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
xvi PREFACE
what should be done with people who commit such horrendous
crimes? Is 30 years
in prison too severe a sentence for someone who distributes
child pornography, or too
lenient? Can draconian punishments convince others that “crime
does not pay”?
Goals of This Book
For more than 40 years, I have channeled my fascination with
issues related to crime
and justice into a career as a student and teacher of
criminology. My goal in writing
this text is to help students share the same enthusiasm for
criminology that has sus-
tained me during my teaching career. What could be more
important or fascinating
than a field of study that deals with such wide-ranging topics as
the motivation for
mass murder, the effects of violent media on young people, drug
abuse, and orga-
nized crime? Criminology is a dynamic field, changing
constantly with the release of
major research studies, Supreme Court rulings, and
governmental policy. Its dyna-
mism and diversity make it an important and engrossing area of
study.
One reason why the study of criminology is so important is that
debates continue
over the nature and extent of crime and the causes and
prevention of criminality.
Some view criminals as society’s victims who are forced to
violate the law because of
poverty and lack of opportunity. Others view antisocial
behavior, such as the Playpen
website, as a product of mental and physical abnormalities,
present at birth or soon
after, that are stable over the life course. Still another view is
that crime is a function
of the rational choice of greedy, selfish people who can be
deterred from engaging in
criminal behavior only by the threat of harsh punishments. It all
comes down to this:
Why do people do the things they do? How can we explain the
intricacies and diver-
sity of human behavior?
Because interest in crime and justice is so great and so timely,
this text is designed
to review these ongoing issues and cover the field of
criminology in an organized and
comprehensive manner. It is meant as a broad overview of the
field, an introduction
to whet the reader’s appetite and encourage further and more in-
depth exploration.
I try to present how the academic study of criminology
intersects with real-world
issues. For example, diversity is a key issue in criminology and
a topic that has im-
portant real-world consequences. Therefore, the text attempts to
integrate issues of
racial, ethnic, gender, and cultural diversity throughout. The
book covers the killing
of Michael Brown in Ferguson, Missouri, and racial differences
in economic and so-
cial factors related to crime.
My primary goals in writing this text were as follows:
1. To separate the facts from the fiction about crime and
criminality
2. To provide students with comprehensive and wide-ranging
knowledge of crimi-
nology and show its diversity and intellectual content
3. To be as thorough and up-to-date as possible
4. To be objective and unbiased
5. To describe current theories, crime types, and methods of
social control, and to
analyze their strengths and weaknesses
6. To show how criminological thought has influenced social
policy
Features
FACT OR FICTION? A main goal of this edition is to expose
some of the myths that
cloud people’s thinking about crime and criminals. The media
often paints a distorted
picture of the crime problem in America and focuses only on the
most sensational
cases. Is the crime rate really out of control? Are unemployed
people inclined to com-
mit crime? Are immigrants more crime prone than the native-
born, as some politi-
cians suggest? Are married people less crime prone than
singles? Distinguishing what
is true from what is merely legend is one of the greatest
challenges for instructors in
criminology courses. Therefore, a goal of this text is disabuse
students of incorrect
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
xviiPREFACE
notions, perceptions, and biases. Each chapter opens with a set
of statements high-
lighting common perceptions about crime that are related to the
material discussed
in the chapter. In the text, these statements are revisited so the
student will become
skilled at distinguishing the myths from the reality of crime and
criminality.
CONCEPT SUMMARY There are ongoing debates about the
nature and extent of
crime and the causes and prevention of criminality. I try to
present the various view-
points on each topic and then draw a conclusion based on the
weight of the existing
evidence. Students become familiar with this kind of analysis
by examining Concept
Summary boxes that compare different viewpoints, reviewing
both their main points
and their strengths.
THINKING LIKE A CRIMINOLOGIST It is important for
students to think critically
about law and justice and to develop a critical perspective
toward the social insti-
tutions and legal institutions entrusted with crime control.
Throughout the book,
students are asked to critique research highlighted in boxed
material and to think
“outside the box,” as it were. To aid in this task, each chapter
ends with a brief section
called Thinking Like a Criminologist, which presents a scenario
that can be analyzed
with the help of material found in the chapter and a suggested
writing assignment to
expand knowledge on the issue.
POLICIES AND ISSUES IN CRIMINOLOGY Throughout the
book, every attempt is
made to access the most current research and scholarship
available. Most people who
use the book have told me that this is one of its strongest
features. I have attempted
to present current research in a balanced fashion, even though
this approach can be
frustrating to students. It is comforting to reach an unequivocal
conclusion about an
important topic, but sometimes that simply is not possible. In an
effort to be objec-
tive and fair, I have presented each side of important
criminological debates in full.
Throughout the text, boxed features titled Policies and Issues in
Criminology review
critically important research topics. In Chapter 13, for example,
this feature covers
the current opioid epidemic that is sweeping the United States
and analyzes its cause
and effects.
PROFILES IN CRIME These features are designed to present to
students actual crimes
that help illustrate the position or views within the chapter. In
Chapter 12, a Profiles
in Crime feature entitled “Fertility Fraud” looks at the case of
Allison Layton, who
owned a company called Miracles Egg Donation. Layton earned
a prison sentence for
cheating vulnerable would-be parents out of tens of thousands
of dollars for phony
egg donation and surrogacy services.
CONNECTIONS are short inserts that help link the material to
other areas covered in
the book. A Connections insert in Chapter 14 points out how
cyberspace is being used
to facilitate public order crimes (covered in Chapter 13) by
being a conduit to illegally
distribute prescription drugs, advertise prostitution, and
disseminate pornography.
CHAPTER OUTLINES provide a roadmap to coverage and
serve as a useful review
tool.
LEARNING OBJECTIVES spell out what students should learn
in each chapter and
are reinforced via a direct link to the end-of-chapter summary
as well as all of the
text’s ancillary materials.
A RUNNING GLOSSARY in the margins ensures that students
understand words and
concepts as they are introduced.
In sum, the text has been carefully structured to cover relevant
material in a
comprehensive, balanced, and objective fashion. Every attempt
has been made to
make the presentation of material interesting and contemporary.
No single political or
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
xviii PREFACE
theoretical position dominates the text; instead, the many
diverse views that are con-
tained within criminology and characterize its interdisciplinary
nature are presented.
While the text includes analysis of the most important scholarly
works and scientific
research reports, it also includes a great deal of topical
information on recent cases
and events, such as the story of Owen Labrie and the St. Paul’s
School rape case and
Dylann Roof and the Charleston massacre.
Topic Areas
Criminology: The Core is a thorough introduction to this
fascinating field and is intended
for students in introductory courses in criminology. It is divided
into three main sec-
tions or topic areas.
PART 1 provides a framework for studying criminology. The
first chapter defines the
field and discusses its most basic concepts: the definition of
crime, the component
areas of criminology, the history of criminology, the concept of
criminal law, and the
ethical issues that arise in this field. Chapter 2 covers
criminological research meth-
ods, as well as the nature, extent, and patterns of crime. Chapter
3 is devoted to the
concept of victimization, including the nature of victims,
theories of victimization,
and programs designed to help crime victims.
PART 2 contains six chapters that cover criminological theory:
Why do people be-
have the way they do? Why do they commit crimes? These
views focus on choice
(Chapter 4), biological and psychological traits (Chapter 5),
social structure and cul-
ture (Chapter 6), social process and socialization (Chapter 7),
social conflict (Chapter
8), and human development (Chapter 9).
PART 3 is devoted to the major forms of criminal behavior. The
chapters in this sec-
tion cover violent crime (Chapter 10), political crime and
terrorism (Chapter 11),
blue-collar, white-collar, and green-collar crimes (Chapter 12),
public order crimes,
including sex offenses and substance abuse (Chapter 13), and
cybercrime and trans-
national organized crime (Chapter 14).
What’s New in This Edition:
Chapter-by-Chapter Changes
Chapter 1
Chapter 1 now begins with a vignette on the 2015 terror attack
in San Bernardino,
California, that killed 14 people and wounded 22 others. There
is discussion of Glossip v.
Gross, a case that illustrates how the Supreme Court relies on
social science research to
reach decisions. There is also a review of research aimed at
determining whether people
who view pornography are also more likely to commit violence
against women. A Pro-
files in Crime feature entitled “A Shooting in Ferguson”
reviews the case of Michael
Brown, an African American youth killed in what proved to be a
highly controversial
confrontation with a police officer. There is new information on
drug legalization: a
number of states have now legalized recreational use of
marijuana, while others have
legalized it for medical purposes. A Policies and Issues in
Criminology feature, “Hate
Crime in Georgia,” considers whether the punishment was
appropriate to the crime.
Chapter 2
Chapter 2’s opening vignette looks at a recent crime committed
by members of MS-13, a
violent international criminal organization based in El Salvador
and Honduras. The data
on crime and victimization have been updated. There is new
information in the Policies
and Issues features on international crime trends and factors
that shape criminal activity.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
xixPREFACE
Chapter 3
Chapter 3 begins with the discussion of the infamous St. Paul’s
School rape case in which
a young student was sexually assaulted by a classmate as part of
a ritual in which senior
boys attempt to seduce freshman girls. There is a new
discussion on the different meth-
ods that have been developed to measure the cost of
victimization to American society.
A new section looks at the stress abuse victims encounter in
childhood that endures into
adulthood. There is recent data from the National Center for
Educational Statistics on
victimization among students. Research is covered that shows
that racial stereotypes af-
fect criminal decision making. Research showing that people
with particular and distinct
mental and physical traits are more likely to suffer victimization
is discussed.
Chapter 4
Chapter 4 begins with a vignette on an Ohio man, Michael
Wymer, whose case aptly
illustrates the concept of rational choice in criminal decision
making. There is a new
section on criminal competence, which may be an important
element in structuring
criminality. Research is covered that shows that criminals
choose targets in familiar
places, where they know their way around and won’t get lost or
trapped. Research
now shows that neighborhoods with medical marijuana
dispensaries have a high risk
of armed robbery and resulting murders. A new section called
“Getting Away” dis-
cusses escape mechanisms employed during criminal acts. A
new Profiles in Crime
feature looks at how auto thieves plan their crimes. There is an
updated section on
the installation of closed-circuit television (CCTV) surveillance
cameras and improved
street lighting. Another new section looks at criminal
compulsion. A Policies and Is-
sues in Criminology feature looks at racial disparity in state
prisons. There are new
sections on courts, sentencing, corrections, and rational choice
theory.
Chapter 5
Chapter 5 begins with a vignette on Chris Harper Mercer, a
troubled young man
who opened fire at Umpqua Community College in Oregon,
killing nine people and
wounding seven others before being killed after exchanging
gunfire with responding
police officers. There is new data on adolescent boys with
antisocial substance disor-
der (ASD) who repeatedly engage in risky antisocial behavior.
Research is covered
that shows that antisocial children have lower resting heart rates
than the general
population. Meta-analysis of existing research finds that lack of
attachment predicts
involvement in a broad spectrum of criminal activity. A new
Policies and Issues in
Criminology feature entitled “Criminal Susceptibility” argues
that the link between
personality traits and crime flows through an individual’s
resistance or susceptibility
to crime-promoting experiences. A new Profiles in Crime
feature covers Adam Lanza
and the Sandy Hook Elementary School massacre.
Chapter 6
Chapter 6 begins with a vignette on the tragic case of Aaron
Hernandez, the pro-foot-
ball star who could not shake the street values that shaped hi s
early life. New material
on economic structure and American society reviews such issues
as stratification, class
economic disparity, white privilege, and racial conflict. A new
Policies and Issues in
Criminology feature entitled “Labor’s Love Lost” reviews the
book by Andrew Cherlin
that provides an explanation of the toll income and educational
inequality take on soci-
ety. Research is presented on how destructive commercial
institutions can destabilize a
neighborhood and increase the rate of violent crimes.
Chapter 7
Chapter 7’s opening vignette looks at the case of Stanford
University student ath-
lete Brock Turner, who was convicted of sexually assaulting an
unconscious woman
behind a dumpster and received a six-month jail sentence for his
crime. New research
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
xx PREFACE
shows that youth who are suspended or expelled from school are
the ones most likely
to have problems over the life course. A Profiles in Cr ime
feature entitled “The Af-
fluenza Case” looks at what happened to Ethan Couch, a 16-
year-old Texas boy, who
killed four people while driving drunk. A new Policies and
Issues in Criminology fea-
ture, “White-Collar Neutralization,” reviews research that
shows that white-collar
criminals use neutralization techniques before engaging in
business crimes. There is a
new section covering Per-Olof H. Wikstrom’s Situational
Action Theory (SAT), which
maintains that when people are socialized to have a strong sense
of morality, if con-
fronted or exposed to criminal opportunity, their sense of ethics
and principles will
guide their behavior. There is also a new section on the long-
term effects of labeling.
Chapter 8
Chapter 8 opens with a vignette on the political conflict that
dominated the 2016 pres-
idential election. There is new coverage of income including
research sponsored by
the Pew Foundation that shows that the wealth gap between
America’s high-income
group and everyone else has now reached record high levels.
There is a new section
on justice system inequality that discusses how critical thinkers
believe that racial and
ethnic minorities are now the target of racist police officers and
unfair prosecutorial
practices. A Policies and Issues in Criminology box asks the
provocative question “Are
Wrongful Convictions a State Crime?” There is discussion on
how critical feminists
show that sexual and other victimization of girls is a function of
male socialization
because so many young males learn to be aggressive and to
exploit women.
Chapter 9
Chapter 9’s opening vignette covers the horrific murders of
Jennifer, Michaela, and
Hayley Petit during a home invasion in Cheshire, Connecticut.
A new Policies and
Issues in Criminology feature entitled “Human Agency,
Personal Assessment, Crime,
and Desistance” looks at the research of Robert Agnew and
Steven Messner, which
shows that human agency plays a major role in shaping personal
assessments and
behaviors. A new section entitled “Personality and Offending
Trajectories” shows that
the reason why some offenders start early, others late, and some
not at all may be
linked to psychological problems and disturbance.
Chapter 10
Chapter 10 opens with an update on the Dylann Roof case; he
was sentenced to
death after being convicted in federal court on 33 hate crime
charges. Randol Con-
treras’s influential book Stickup Kids: Race, Drugs, Violence,
and the American Dream is
covered. A Policies and Issues in Criminology feature entitled
“American Culture and
Homicide” covers the work of social historian Randolph Roth,
who charts changes
in the homicide rate in the United States from colonial times to
the present. There
is a section that looks at date and acquaintance rape on college
campuses; data from
a national survey of sexual assault on campus are presented. A
new section, “Sex in
Authority Relations,” reviews the legislation making it a crime
for people in power
to have sexual relations with those they control or supervise. A
Policies and Issues in
Criminology feature looks at mass shooters: Why do some live
and some die? A new
section, “Targeting Criminals,” reviews how some robbers
target fellow criminals—for
example, drug dealers—because they are inviting targets.
Chapter 11
Chapter 11 updates the case of Julian Assange and WikiLeaks,
and how the 2016
presidential election was influenced by the release of emails
hacked from Clinton
campaign computers. A Profiles in Crime feature covers the
Edward Snowden case.
Voting fraud is now covered in some detail. A Policies and
Issues in Criminology fea-
ture on the history and activities of the Islamic State has been
updated. We also re-
view the US Freedom Act, which replaced the Patriot Act.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
xxiPREFACE
Chapter 12
Chapter 12 reviews the activities of the Cuban Mob, a gang of
commercial thieves
who made off with $60 million worth of pharmaceuticals. Data
are updated on shop-
lifting and retail theft: in a given year, total retail losses are
approximately $44 billion.
There is new information on the increase in highly organized
professionals involved
in auto theft. A Profiles in Crime feature entitled “Fertility
Fraud” looks at the crimes
of Allison Layton, who cheated would-be parents at her fertility
clinic. There is cover-
age of recent Foreign Corrupt Practices Act (FCPA) cases,
illegal logging, and importa-
tion of wildlife that has brought some species, such as the
northern white rhinoceros
and the western black rhinoceros, to near extinction.
Chapter 13
Chapter 13 begins with a vignette on Larry Nassar, a central
figure in USA gymnastics,
and how his downfall began when young female athletes
accused him of sexual assault
and federal investigators found child pornography on his
computer. The most challenged
or banned library books are set out. There is new material on
the history of prostitution,
including how in 1908 officials in Salt Lake City, Utah, hired
Dora Topham, the leading
madam of Ogden, to operate a legal red-light district called the
stockade. The Policies
and Issues in Criminology feature “Sex Work in Contemporary
Society” is updated to
include survival sex among LGBTQ youth. Another Policies and
Issues feature, “The In-
ternational Sex Trade,” is updated with the latest report by the
UN on human trafficking.
There is a new Policies and Issues in Criminology feature on the
opioid epidemic that is
sweeping the country. There is new material on the link between
drugs and crime; re-
search projects find that they are highly correlated.
Chapter 14
Chapter 14 begins with the case of Kassandra Cruz, a Miami
woman sent to prison for
cyberstalking and extortion. New data are presented on how the
crime rate in Eng-
land and Wales doubled in 2015 when cybercrime began to be
included. New data
are presented that show that a conservative estimate of the
annual cost to the global
economy from cybercrime is now more than $400 billion and
losses may be as high
as $575 billion. A new section entitled “Internet
Extortion/Ransomware” discusses
how computers around the world are attacked by hackers. There
is a new Policies and
Issues in Criminology box on revenge porn and efforts to
penalize people who post
non-consensual sexually explicit photos online. Data are
presented on cyberbullying
that show on average about 28 percent of kids experience this
form of harassment.
A Policies and Issues in Criminology feature discusses how the
Islamic State uses the
Internet to recruit and raise funds.
Supplements
An extensive package of supplemental aids is available for
instructor and student
use with this edition of Criminology: The Core. Supplements
are available to qualified
adopters. Please consult your local sales representative for
details.
For the Instructor
ONLINE INSTRUCTOR’S MANUAL The manual includes
learning objectives, key
terms, a detailed chapter outline, student activities, and media
tools. The learning ob-
jectives are correlated with the discussion topics, student
activities, and media tools.
The manual is available for download on the password-protected
website and can
also be obtained by e-mailing your local Cengage Learning
representative.
ONLINE TEST BANK Each chapter of the test bank contains
questions in multiple-
choice, true/false, completion, and essay formats, with a full
answer key. The test
bank is coded to the learning objectives that appear in the main
text, references to
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
xxii PREFACE
the section in the main text where the answers can be found, and
Bloom’s taxonomy.
Finally, each question in the test bank has been carefully
reviewed by experienced
criminal justice instructors for quality, accuracy, and content
coverage. The Test Bank
is available for download on the password-protected website
and can also be obtained
by e-mailing your local Cengage Learning representative.
CENGAGE LEARNING TESTING, POWERED BY COGNERO
This assessment software
is a flexible, online system that allows you to import, edit, and
manipulate test bank
content from the Criminology: The Core test bank or elsewhere,
including your own fa-
vorite test questions; create multiple test versions in an instant;
and deliver tests from
your LMS, your classroom, or wherever you want.
ONLINE POWERPOINT® LECTURES Helping you make your
lectures more engag-
ing while effectively reaching your visually oriented students,
these handy Microsoft
PowerPoint slides outline the chapters of the main text in a
classroom-ready presenta-
tion. The PowerPoint slides are updated to reflect the content
and organization of the
new edition of the text and feature some additional examples
and real-world cases
for application and discussion. Available for download on the
password-protected in-
structor companion website, the presentations can also be
obtained by e-mailing your
local Cengage Learning representative.
For the Student
MINDTAP FOR CRIMINOLOGY With MindTap™ Criminal
Justice for Criminology: The
Core, you have the tools you need to better manage your limited
time, with the abil-
ity to complete assignments whenever and wherever you are
ready to learn. Course
material that is specially customized for you by your instructor
in a proven, easy-
to-use interface keeps you engaged and active in the course.
MindTap helps you
achieve better grades today by cultivating a true understanding
of course concepts,
and with a mobile app to keep you on track. With a wide array
of course-specific tools
and apps—from note taking to flashcards—you can feel
confident that MindTap is a
worthwhile and valuable investment in your education.
You will stay engaged with MindTap’s video cases and career
scenarios and
remain motivated by information that shows where you stand at
all times—both
individually and compared to the highest performers in class.
MindTap eliminates the
guesswork, focusing on what’s most important with a learning
path designed specifi-
cally by your instructor and for your criminology course.
Master the most important
information with built-in study tools such as visual chapter
summaries and integrated
learning objectives that will help you stay organized and use
your time efficiently.
Acknowledgments
The preparation of this book would not have been possible
without the aid of my col-
leagues who helped by reviewing the previous editions and gave
me important sug-
gestions for improvement.
My partners at Cengage Learning have done their typically
outstanding job of
aiding me in the preparation of this text and putting up with my
yearly angst. Caro-
lyn Henderson Meier, my wonderful product team manager, is
always an inspiration;
Shelley Murphy is both my content developer and dear friend.
Kim Adams Fox did
an outstanding job on photo research. Both Mary Kanable and
Susan Gall are excel-
lent proofreaders and I’m grateful for their thoughtful and smart
comments. Linda
Jupiter, the book’s production editor, is another confidant and
friend. I really appreci-
ate the help of Lunaea Weatherstone, who in addition to being a
great copy editor is
also my oracle and personal life coach. The sensational Christy
Frame is an extraordi-
nary senior content project manager, and senior marketing
manager Mark Linton is
equally fantastic.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
CRIMINOLOGY
THE CORE
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
Joe Raedle/Getty Images News/Getty Images
Crime and Criminology
Learning Objectives
LO1 Explain the various elements of criminology.
LO2 Differentiate between crime and deviance.
LO3 Analyze the three different views of the definition of
crime.
LO4 Articulate the different purposes of the criminal law.
LO5 Outline the criminal justice process.
LO6 Summarize the ethical issues in criminology.
Syed Rizwan Farook Tashfeen Malik
H
an
do
ut
/G
et
ty
Im
ag
es
N
ew
s/
G
et
ty
Im
ag
es
H
an
do
ut
/F
BI
/G
et
ty
Im
ag
es
N
ew
s/
G
et
ty
Im
ag
es
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
3
O
n December 2, 2015, Syed Rizwan
Farook and Tashfeen Malik, residents of
Redlands, California, attacked a holiday
party being held for employees at the
San Bernardino County Department of Public
Health. Armed with semi-automatic weapons, they
killed 14 people; 22 others were seriously injured.
Farook, who worked for the health department,
was an American-born citizen of Pakistani decent,
while Malik, his wife, was Pakistani-born and a
lawful permanent resident; they had a 6-month-old
daughter. After the shooting, the couple fled the
scene in a rented SUV and were killed in a shootout
with pursuing police.
Farook and Malik are considered homegrown
violent extremists, inspired by but not directed by
a foreign group; they were not part of any known
terrorist cell. Farook visited Pakistan in 2014 and
returned with Malik, who traveled on a Pakistani
passport with a fiancée visa. They also visited Saudi
Arabia, but their radicalization is believed to have
been via the Internet. After they returned from
abroad, the couple began to stockpile weapons,
thousands of rounds of ammunition, and bomb-
making equipment in their home.1
The San Bernardino attack was all too reminiscent
of other terrorist incidents on American soil:
●● On April 15, 2013, Dzhokhar and Tamerlan
Tsarnaev set off bombs at the Boston Marathon
finish line, killing three people, and maiming
and injuring at least 264. The Tsarnaev brothers,
though born abroad and of Chechen descent,
had prospered in the United States; Dzhokhar
was attending a state university. Nonetheless,
the brothers clung to radical Islamic views and
blamed the US government for conducting a war
against Islam in Iraq and Afghanistan.2 ▸
1
Chapter Outline
What Criminologists Do: The Elements
of Criminology
Criminal Statistics/Crime Measurement
Sociology of Law/Law and Society/Sociolegal Studies
Developing Theories of Crime Causation
Explaining Criminal Behavior
Penology: Punishment, Sanctions, and Corrections
Victimology
A Brief History of Criminology
Classical Criminology
Positivist Criminology
Sociological Criminology
Conflict Criminology
Developmental Criminology
Contemporary Criminology
Deviant or Criminal?
How Criminologists Define Crime
Becoming Deviant
The Concept of Crime
Profiles in Crime
A SHOOTING IN FERGUSON
A Definition of Crime
Criminology and the Criminal Law
Common Law
Contemporary Criminal Law
The Evolution of Criminal Law
Criminology and Criminal Justice
The Criminal Justice System
The Process of Justice
Policies and Issues in Criminology
HATE CRIME IN GEORGIA
Ethical Issues in Criminology
FACT OR FICTION?
▸▸ Sex offender registration lists help deter
potential offenders and reduce the
incidence of child molestation.
▸▸ It’s a crime to ignore a drowning person’s
cries for help.
▸▸ The definitions of long-established
common-law crimes such as rape,
robbery, and murder never change.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
4
●● On November 28, 2016, Somali refugee Abdul Razak Ali
Artan
deliberately drove his car into pedestrians at Ohio State
University.
Getting out of the car, he then attacked others with a butcher
knife
before being shot and killed by the first responding OSU police
officer.
Thirteen people were injured in the attack. Investigators believe
that
Artan was inspired by terrorist propaganda from the Islamic
State (IS)
and radical Muslim cleric Anwar al-Awlaki.3 ■
These and other high-profile terrorist incidents have spurred an
ongoing national
debate over the proper response to terrorism. In 2017, President
Trump issued an
executive order that prohibited residents from seven
predominantly Muslim coun-
tries from visiting the US to work or study. Another executive
order focused on immi-
grants who “pose a risk to public safety” and thereby made
millions of undocumented
people a priority for deportation.4 The ban provoked even
greater debate. Supporters
believed Tump's order enhanced national security. Critics
countered that the ban was
unconstitutional; federal judges sided with the latter and
blocked its implementation.
Widely publicized criminal acts, including terror attacks, have
stimulated interest
in criminology, an academic discipline that uses the scientific
method to study the
nature, extent, cause, and control of criminal behavior. This
involves using valid and
reliable procedures for the systematic collection, testing, and
analysis of empirical evi-
dence relevant to the problem under study.
What motivates people like Farook and Malik to turn on
coworkers and people
they knew in the name of Jihad? Or was that their real motive?
Was their crime a
matter of rational choice and decision making or the outcome of
delusional thinking
and mental illness?
Unlike political figures and media commentators, whose
opinions about crime
may be colored by personal experiences, biases, and election
concerns, criminolo-
gists remain objective as they study crime and its
consequences.5 The field itself is
far reaching, and subject matter ranges from street level drug
dealing to interna-
tional organized crime, from lone wolf terrorism to control of
kiddie porn. It is an
interdisciplinary field: while many criminologists have attended
academic programs
that award degrees in criminology or criminal justice, many
criminologists have a
background in other academic disciplines, including sociology,
psychology, and legal
studies.
In this chapter, we review the components of this diverse field
of study, how this
field developed, and how criminologists view crime and justice.
We begin by examin-
ing the focus and concerns of this intriguing academic
discipline.
What Criminologists Do:
The Elements of Criminology
Several subareas exist within the broader arena of criminology.
Some criminologists
specialize in one area while ignoring others, and some are
generalists whose research
interests are wide ranging. What then are the most important
subareas in the field?
Criminal Statistics/Crime Measurement
The subarea of criminal statistics/crime measurement involves
creating methodolo-
gies that are able to accurately measure activities, trends, and
patterns in crime and
then using these tools to calculate amounts and developments in
criminal activity:
How much crime occurs annually? Who commits it? When and
where does it occur?
Which crimes are the most serious?
criminology
The scientific study of the nature,
extent, cause, and control of
criminal behavior.
LO1 Explain the various
elements of criminology.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
5Chapter 1 ■ CRiMe and CRiMinology
Criminologists interested in computing criminal statistics focus
on creating
valid and reliable measures of criminal behavior:
●● Criminologists help formulate techniques for collecting and
analyzing official
measures of criminal activities, such as crimes reported to the
police.
●● To measure unreported criminal activity criminologists
develop survey instru-
ments designed to have victims report loss and injury that may
not have been
reported to the police.
●● Criminologists design methods that make it possible to
investigate the cause of
crime. They may create a self-administered survey with
questions measuring
an adolescent’s delinquent behaviors as well as social
characteristics, education
and occupation of parents, friendship patterns, and school
activities. These sur-
vey items can later be correlated in order to determine the
associations among a
variety of social factors and criminal activities, such as whether
school failure is
related to drug abuse.
Sociology of Law/Law and Society/Sociolegal Studies
Variously called sociology of law, law and society, or
sociolegal studies, this subarea
of criminology is concerned with the social, political, and
intellectual influences of
law and legal activity; the sociology of legal institutions and
legal processes; and
consequences of law on society. According to the American
Sociological Associa-
tion, the sociology of law involves linking the study of law with
such core socio-
logical issues as social change and stability, order and disorder,
the nation-state and
capitalism. Research on sociolegal issues involves
methodologically sophisticated
empirical investigations as the central means of studying the
dynamics of law in
society.6
Criminologists who study the impact of law on society focus
their attention on
the role that social forces play in shaping criminal law and the
role of criminal law
in shaping society. They might investigate the history of legal
thought in an effort to
understand how criminal acts (such as theft, rape, and murder)
evolved into their
present form. They may also play an active role in suggesting
legal changes that
benefit society.
Criminologists who are interested in sociolegal
scholarship evaluate the impact that new laws have
on society. Take sex offender registration laws, which
require convicted sex offenders to register with local
law enforcement agencies whenever they move into a
community. These provisions are often called Megan’s
Laws, in memory of 7-year-old Megan Kanka. Megan
was killed in 1994 by sex offender Jesse Timmendequas,
who had moved unannounced into her New Jersey
neighborhood. When criminologists conducted an
in-depth study of the effectiveness of the New Jersey
registration law they found that, although it was main-
tained at great cost to the state, the system did not pro-
duce effective results: Sex offense rates in New Jersey
were in steep decline before the system was installed,
and the rate of decline actually slowed down after 1995
when the law took effect; in some states arrests for sex
offenses increased after the law took effect. Megan’s Law
did not reduce the number of rearrests for sex offenses,
nor did it have any demonstrable effect on the time
between when sex offenders were released from prison
and the time they were rearrested for any new offense,
such as a drug offense, theft, or another sex offense.7
Such sociolegal scholarship helps policy makers deter-
mine the effectiveness of legal change.
valid measure
A measure that actually measures
what it purports to measure; a
measure that is factual.
reliable measure
A measure that produces
consistent results from one
measurement to another.
Sex offender registration lists
help deter potential offenders
and reduce the incidence of
child molestation.
FICTION Research indicates
that registration has little
effect on either offenders or
rates of child molesting.
FACT OR FICTION?
Criminologists interested in the sociology of law conduct
research
on the effects of legal change on society. Take for example the
Supreme Court’s ruling in Miller v. Alabama, barring
mandatory life
sentences for juveniles convicted of murder. Criminologists may
be
called upon to test public opinion on whether young offenders
have
the potential for rehabilitation. They may also try to explore
whether
adolescent brains have developed sufficiently to fully
understand
the consequences of their behavior.
M
on
ic
a
A
lm
ei
da
/N
ew
Y
or
k
Ti
m
es
/R
ed
ux
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
6 Part 1 ■ CONCEPTS OF CRIME, LAW, AND
CRIMINOLOGY
Criminological research is also used extensively by the Supreme
Court in shaping
their decision making and creating legal precedence.8 Take
what happened in these
two important cases:
●● In Miller v. Alabama, the Supreme Court relied on social
research that conclusively
showed that juveniles are not fully capable of anticipating the
consequences of
their actions. This finding led the justices to conclude that it
would be inappropri-
ate and unconstitutional for juveniles to receive mandatory life
sentences with-
out the possibility of parole. If juveniles have a different mental
capacity than
adults, it seemed illogical that they should receive the same
punishment; this
would amount to cruel and unusual punishment.9
●● In Glossip v. Gross, Justices Breyer and Ginsburg relied on
social science research
by sociolegal scholar Samuel Gross and his colleagues showing
that there is a sig-
nificant likelihood of a wrongful conviction in death penalty
cases. Why is this so?
Because capital cases typically involve horrendous murders, and
they generate
intense community pressure on police, prosecutors, and jurors
to secure a convic-
tion. This pressure creates a greater likelihood of convicting the
wrong person.10
Here a legal opinion was informed by social science research.
Developing Theories of Crime Causation
Criminologists also explore the causes of crime. How do the
mechanisms of past
experience influence an individual’s propensity to offend? Is
past behavior the best
predictor of future behavior? Are the seeds of a criminal career
planted early in life or
do life events upend a person’s normal life course?
Some criminologists focus on the individual and look for an
association between
decision making, psychological and biological traits, and
antisocial behaviors. Those
who have a psychological orientation view crime as a function
of personality, develop-
ment, social learning, or cognition. Others investigate the
biological correlates of anti-
social behavior and study the biochemical, genetic, and
neurological linkages to crime.
Those with a sociological orientation look at the social forces
producing criminal
behavior, including neighborhood conditions, poverty,
socialization, and group inter-
action. Their belief is that people are a “product of their
environment” and anyone
living in substandard conditions could be at risk to crime. Kids
are deeply affected by
what goes on in their family, school, and neighborhood, and
these are the keys to
understanding the development of antisocial behavior.
on november 13, 2015, 130 people were killed and
another 350 injured in a series of terror attacks across
Paris, including at the Stade de France (the French
national stadium), at cafés and restaurants, and at the
Bataclan Theater, where a concert was taking place.
The attacks began when bombs were set off outside the
Stade de France during a soccer match between France
and germany. Hundreds of people ran from the stadium
in panic. The islamic State (iS) claimed responsibility
for the attacks, which involved groups of jihadists who
simultaneously attacked numerous sites in the city.
Soon after, French President François Hollande closed
the nation’s borders and declared a state of emergency.
The Paris attacks prompted massive retaliation on iS
installations by France, the United States, and Russia.
Criminologists conduct research on discovering what
prompts people to join terror groups and what can be
done to dissuade them from joining.
A
P
Im
ag
es
/C
hr
is
to
ph
e
En
a
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
7Chapter 1 ■ CRiMe and CRiMinology
Pinning down “one true cause” of crime remains a difficult
problem because
most people, even those living in the poorest disorganized
neighborhood, or who
suffered abuse and neglect as children, do not become
criminals. If they did, there
would be a lot more crimes committed each year than now
occur. Since most of
us are law abiding, despite enduring many social and
psychological problems, it’s
tough to pinpoint the conditions that inevitably lead to a
criminal way of life. Crim-
inologists are still unsure why, given similar conditions, some
people choose crimi-
nal solutions to their problems, whereas others conform to
accepted social rules of
behavior.
Explaining Criminal Behavior
Another subarea of criminology involves research on specific
criminal types and pat-
terns: violent crime, theft crime, public order crime, organized
crime, and so on. Nu-
merous attempts have been made to describe and understand
particular crime types.
Marvin Wolfgang’s 1958 study Patterns in Criminal Homicide is
a landmark analysis of
the nature of homicide and the relationship between victim and
offender. Wolfgang
discovered that in many instances victims caused or precipitated
the violent con-
frontation that led to their death, spawning the term victim-
precipitated homicide.11
Edwin Sutherland’s pioneering analysis of business-related
offenses also helped
coin a new phrase, white-collar crime, to describe economic
crime activities of the
affluent.12
Criminologists are constantly broadening the scope of their
inquiry because
new crimes and crime patterns are constantly emerging.
Whereas 50 years ago they
might have focused their attention on rape, murder, and
burglary, they now may be
looking at stalking, environmental crimes, cybercrime,
terrorism, and hate crimes.
Take for instance Internet porn, something that began being
widely used in the
1990s and has been more frequently viewed ever since,
especially by the younger
generation.13 Today 46 percent of men and 16 percent of
women between the ages
of 18 and 39 intentionally view pornography in a given week.14
At the same time,
there has been public outrage over sexual assaults on college
campuses; several
studies indicate that a substantial proportion of female
students—between 18 and
20 percent—experience rape or some other form of sexual
assault during their col-
lege years.15 Is there a link between these two phenomena? To
answer this ques-
tion, criminologists are conducting research aimed at
determining whether people
who view pornography are also more likely to commit violence
against women. So
far the evidence finds a connection: watching Internet porn and
sexual violence
may actually be related.16
Penology: Punishment, Sanctions, and Corrections
The study of penology involves efforts to control crime through
the correction of
criminal offenders. Some criminologists advocate a therapeutic
approach to crime
prevention that relies on the application of rehabilitation
services; they direct their
efforts at identifying effective treatment strategies for
individuals convicted of law
violations, such as relying on community sentencing rather than
prison. Others argue
that crime can be prevented only through the application of
formal social control,
through such measures as mandatory sentences for serious
crimes and even the use
of capital punishment as a deterrent to murder.
Criminologists interested in penology direct their research
efforts at evaluating
the effectiveness of crime control programs and searching for
effective treatments
that can significantly lower recidivism rates. An evaluation of
the Risk-Need-
Responsivity (RNR) program, which classifies people on
probation and orders the
placement of some in anger management and cognitive
behavioral therapy pro-
grams, has been found to cut the recidivism of high-risk
offenders by as much as
20 percent.17
Not all penological measures work as expected. One might
assume that inmates
placed in the most punitive high-security prisons will “learn
their lesson” and not
victim-precipitated homicide
Refers to those killings in which
the victim is a direct, positive
precipitator of the incident.
white-collar crime
Illegal acts that capitalize on a
person’s status in the marketplace.
White-collar crimes may include
theft, embezzlement, fraud, market
manipulation, restraint of trade, and
false advertising.
penology
Subarea of criminology that
focuses on the correction and
control of criminal offenders.
rehabilitation
Treatment of criminal offenders
that is aimed at preventing future
criminal behavior.
mandatory sentences
A statutory requirement that a
certain penalty shall be carried
out in all cases of conviction for
a specified offense or series of
offenses.
capital punishment
The execution of criminal
offenders; the death penalty.
recidivism
Relapse into criminal behavior
after apprehension, conviction,
and correction for a previous crime.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Copyright 2019 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part.
WCN 02-200-203
8 Part 1 ■ CONCEPTS OF CRIME, LAW, AND
CRIMINOLOGY
dare to repeat their criminal offense. However, research shows
that being sent to a
high-security prison exposes inmates to the most violent peers
who have a higher
propensity for crime. This exposure may actually increase
criminal behavior, rein-
force antisocial attitudes, and ultimately increase recidivism—a
finding that supports
the need for careful penological research.18
Victimology
Criminologists recognize that the victim plays a critical role in
the criminal process
and that the victim’s behavior is often a key determinant of
crime.19 Victimology
includes the following areas of interest:
●● Using victim surveys to measure the nature and extent of
criminal behavior and
to calculate the actual costs of crime to victims
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor
HIT 372 Assessment 01 Marks 20 Create two mor

More Related Content

Similar to HIT 372 Assessment 01 Marks 20 Create two mor

Civil Disobedience Essay. College essay: Civil disobedience thoreau essay
Civil Disobedience Essay. College essay: Civil disobedience thoreau essayCivil Disobedience Essay. College essay: Civil disobedience thoreau essay
Civil Disobedience Essay. College essay: Civil disobedience thoreau essayxdqflrobf
 
How To Write A Short Essay 8Th Grade. Online assignment writing service.
How To Write A Short Essay 8Th Grade. Online assignment writing service.How To Write A Short Essay 8Th Grade. Online assignment writing service.
How To Write A Short Essay 8Th Grade. Online assignment writing service.Natalie Taylor
 
Lit Analysis Essay Example
Lit Analysis Essay ExampleLit Analysis Essay Example
Lit Analysis Essay ExampleMichelle Green
 
Essay About Mango Fruit In Tamil
Essay About Mango Fruit In TamilEssay About Mango Fruit In Tamil
Essay About Mango Fruit In TamilChristy Williams
 
Example Of Research Design In Research Paper
Example Of Research Design In Research PaperExample Of Research Design In Research Paper
Example Of Research Design In Research PaperAmanda Detwiler
 
Essay On Solar System In Tamil
Essay On Solar System In TamilEssay On Solar System In Tamil
Essay On Solar System In TamilAmi Hall
 

Similar to HIT 372 Assessment 01 Marks 20 Create two mor (7)

Civil Disobedience Essay. College essay: Civil disobedience thoreau essay
Civil Disobedience Essay. College essay: Civil disobedience thoreau essayCivil Disobedience Essay. College essay: Civil disobedience thoreau essay
Civil Disobedience Essay. College essay: Civil disobedience thoreau essay
 
LINED PAPER Nxsone45
LINED PAPER Nxsone45LINED PAPER Nxsone45
LINED PAPER Nxsone45
 
How To Write A Short Essay 8Th Grade. Online assignment writing service.
How To Write A Short Essay 8Th Grade. Online assignment writing service.How To Write A Short Essay 8Th Grade. Online assignment writing service.
How To Write A Short Essay 8Th Grade. Online assignment writing service.
 
Lit Analysis Essay Example
Lit Analysis Essay ExampleLit Analysis Essay Example
Lit Analysis Essay Example
 
Essay About Mango Fruit In Tamil
Essay About Mango Fruit In TamilEssay About Mango Fruit In Tamil
Essay About Mango Fruit In Tamil
 
Example Of Research Design In Research Paper
Example Of Research Design In Research PaperExample Of Research Design In Research Paper
Example Of Research Design In Research Paper
 
Essay On Solar System In Tamil
Essay On Solar System In TamilEssay On Solar System In Tamil
Essay On Solar System In Tamil
 

More from SusanaFurman449

Please read the description of the Religion ethnography carefully an.docx
Please read the description of the Religion ethnography carefully an.docxPlease read the description of the Religion ethnography carefully an.docx
Please read the description of the Religion ethnography carefully an.docxSusanaFurman449
 
PLEASE read the question carefully.  The creation of teen ido.docx
PLEASE read the question carefully.  The creation of teen ido.docxPLEASE read the question carefully.  The creation of teen ido.docx
PLEASE read the question carefully.  The creation of teen ido.docxSusanaFurman449
 
Please reflect on the relationship between faith, personal disciplin.docx
Please reflect on the relationship between faith, personal disciplin.docxPlease reflect on the relationship between faith, personal disciplin.docx
Please reflect on the relationship between faith, personal disciplin.docxSusanaFurman449
 
Please read the following questions and answer the questions.docx
Please read the following questions and answer the questions.docxPlease read the following questions and answer the questions.docx
Please read the following questions and answer the questions.docxSusanaFurman449
 
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docxPRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docxSusanaFurman449
 
Must Be a hip-hop concert!!!!attend a .docx
Must Be a             hip-hop concert!!!!attend a           .docxMust Be a             hip-hop concert!!!!attend a           .docx
Must Be a hip-hop concert!!!!attend a .docxSusanaFurman449
 
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docxMini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docxSusanaFurman449
 
Please write these 2 assignments in first person.docx
Please write these 2 assignments in                 first person.docxPlease write these 2 assignments in                 first person.docx
Please write these 2 assignments in first person.docxSusanaFurman449
 
Personal Leadership Training plan AttributesColumbia South.docx
Personal Leadership Training plan  AttributesColumbia South.docxPersonal Leadership Training plan  AttributesColumbia South.docx
Personal Leadership Training plan AttributesColumbia South.docxSusanaFurman449
 
Need help on researching why women join gangs1.How does anxi.docx
Need help on researching why women join gangs1.How does anxi.docxNeed help on researching why women join gangs1.How does anxi.docx
Need help on researching why women join gangs1.How does anxi.docxSusanaFurman449
 
Jung Typology AssessmentThe purpose of this assignment is to ass.docx
Jung Typology AssessmentThe purpose of this assignment is to ass.docxJung Typology AssessmentThe purpose of this assignment is to ass.docx
Jung Typology AssessmentThe purpose of this assignment is to ass.docxSusanaFurman449
 
Journal of Organizational Behavior J. Organiz. Behav. 31, .docx
Journal of Organizational Behavior J. Organiz. Behav. 31, .docxJournal of Organizational Behavior J. Organiz. Behav. 31, .docx
Journal of Organizational Behavior J. Organiz. Behav. 31, .docxSusanaFurman449
 
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docxLDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docxSusanaFurman449
 
In this paper, you will select an ethics issue from among the topics.docx
In this paper, you will select an ethics issue from among the topics.docxIn this paper, you will select an ethics issue from among the topics.docx
In this paper, you will select an ethics issue from among the topics.docxSusanaFurman449
 
In the past few weeks, you practiced observation skills by watchin.docx
In the past few weeks, you practiced observation skills by watchin.docxIn the past few weeks, you practiced observation skills by watchin.docx
In the past few weeks, you practiced observation skills by watchin.docxSusanaFurman449
 
Overview After analyzing your public health issue in Milestone On.docx
Overview After analyzing your public health issue in Milestone On.docxOverview After analyzing your public health issue in Milestone On.docx
Overview After analyzing your public health issue in Milestone On.docxSusanaFurman449
 
Judicial OpinionsOverview After the simulation, justices writ.docx
Judicial OpinionsOverview After the simulation, justices writ.docxJudicial OpinionsOverview After the simulation, justices writ.docx
Judicial OpinionsOverview After the simulation, justices writ.docxSusanaFurman449
 
IntroductionReview the Vila Health scenario and complete the int.docx
IntroductionReview the Vila Health scenario and complete the int.docxIntroductionReview the Vila Health scenario and complete the int.docx
IntroductionReview the Vila Health scenario and complete the int.docxSusanaFurman449
 
In studying Social Problems, sociologists (and historians) identify .docx
In studying Social Problems, sociologists (and historians) identify .docxIn studying Social Problems, sociologists (and historians) identify .docx
In studying Social Problems, sociologists (and historians) identify .docxSusanaFurman449
 
I need help correcting an integrative review.This was the profes.docx
I need help correcting an integrative review.This was the profes.docxI need help correcting an integrative review.This was the profes.docx
I need help correcting an integrative review.This was the profes.docxSusanaFurman449
 

More from SusanaFurman449 (20)

Please read the description of the Religion ethnography carefully an.docx
Please read the description of the Religion ethnography carefully an.docxPlease read the description of the Religion ethnography carefully an.docx
Please read the description of the Religion ethnography carefully an.docx
 
PLEASE read the question carefully.  The creation of teen ido.docx
PLEASE read the question carefully.  The creation of teen ido.docxPLEASE read the question carefully.  The creation of teen ido.docx
PLEASE read the question carefully.  The creation of teen ido.docx
 
Please reflect on the relationship between faith, personal disciplin.docx
Please reflect on the relationship between faith, personal disciplin.docxPlease reflect on the relationship between faith, personal disciplin.docx
Please reflect on the relationship between faith, personal disciplin.docx
 
Please read the following questions and answer the questions.docx
Please read the following questions and answer the questions.docxPlease read the following questions and answer the questions.docx
Please read the following questions and answer the questions.docx
 
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docxPRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
 
Must Be a hip-hop concert!!!!attend a .docx
Must Be a             hip-hop concert!!!!attend a           .docxMust Be a             hip-hop concert!!!!attend a           .docx
Must Be a hip-hop concert!!!!attend a .docx
 
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docxMini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
 
Please write these 2 assignments in first person.docx
Please write these 2 assignments in                 first person.docxPlease write these 2 assignments in                 first person.docx
Please write these 2 assignments in first person.docx
 
Personal Leadership Training plan AttributesColumbia South.docx
Personal Leadership Training plan  AttributesColumbia South.docxPersonal Leadership Training plan  AttributesColumbia South.docx
Personal Leadership Training plan AttributesColumbia South.docx
 
Need help on researching why women join gangs1.How does anxi.docx
Need help on researching why women join gangs1.How does anxi.docxNeed help on researching why women join gangs1.How does anxi.docx
Need help on researching why women join gangs1.How does anxi.docx
 
Jung Typology AssessmentThe purpose of this assignment is to ass.docx
Jung Typology AssessmentThe purpose of this assignment is to ass.docxJung Typology AssessmentThe purpose of this assignment is to ass.docx
Jung Typology AssessmentThe purpose of this assignment is to ass.docx
 
Journal of Organizational Behavior J. Organiz. Behav. 31, .docx
Journal of Organizational Behavior J. Organiz. Behav. 31, .docxJournal of Organizational Behavior J. Organiz. Behav. 31, .docx
Journal of Organizational Behavior J. Organiz. Behav. 31, .docx
 
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docxLDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
 
In this paper, you will select an ethics issue from among the topics.docx
In this paper, you will select an ethics issue from among the topics.docxIn this paper, you will select an ethics issue from among the topics.docx
In this paper, you will select an ethics issue from among the topics.docx
 
In the past few weeks, you practiced observation skills by watchin.docx
In the past few weeks, you practiced observation skills by watchin.docxIn the past few weeks, you practiced observation skills by watchin.docx
In the past few weeks, you practiced observation skills by watchin.docx
 
Overview After analyzing your public health issue in Milestone On.docx
Overview After analyzing your public health issue in Milestone On.docxOverview After analyzing your public health issue in Milestone On.docx
Overview After analyzing your public health issue in Milestone On.docx
 
Judicial OpinionsOverview After the simulation, justices writ.docx
Judicial OpinionsOverview After the simulation, justices writ.docxJudicial OpinionsOverview After the simulation, justices writ.docx
Judicial OpinionsOverview After the simulation, justices writ.docx
 
IntroductionReview the Vila Health scenario and complete the int.docx
IntroductionReview the Vila Health scenario and complete the int.docxIntroductionReview the Vila Health scenario and complete the int.docx
IntroductionReview the Vila Health scenario and complete the int.docx
 
In studying Social Problems, sociologists (and historians) identify .docx
In studying Social Problems, sociologists (and historians) identify .docxIn studying Social Problems, sociologists (and historians) identify .docx
In studying Social Problems, sociologists (and historians) identify .docx
 
I need help correcting an integrative review.This was the profes.docx
I need help correcting an integrative review.This was the profes.docxI need help correcting an integrative review.This was the profes.docx
I need help correcting an integrative review.This was the profes.docx
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

HIT 372 Assessment 01 Marks 20 Create two mor

  • 1. HIT 372 Assessment 01 Marks: 20 Create two more virtual machine, name it ServerDC2 and ServerDM2 and install Win Server 2016 in it. For this assignment we will only require running 2 VMs at a time, ServerDC2 (which will be the Domain Controller) and ServerDM2. ServerSA1, ServerDC1 and ServerDM1 should be Powered Off. Task 1 Your first task is to bring both ServerDC2 and ServerDM2 under the same network, known as ABCnet. Configure the VirtualBox and IP Configuration settings for the two VMs to complete the task. Once done, PING from both the ends to check connectivity. Attach the most relevant screenshots and a short description after each of the screenshots
  • 2. showing the complete process that you have used. Task 2 As the network Admin of ABC Corporation, you have decided it is best to set up an Active Directory based authentication and management services for the company network. So to start off, create the Active Directory Forest on ServerDC2, note that DNS should also be installed as part of the AD installation, and it is necessary to promote the server as the Domain Controller. Name the Domain domainabc.com. Note that as part of the process, you also have to set up a domain-wide admin account (name it abcadmin). Once installation is completed, verify that the domain has been properly setup. Rename the newly created Domain Controller as PrimaryDC. Attach screenshots for each of the steps and a short description after each of the screenshots showing the complete process that you have used. Provide the screenshots for domain verification and renaming as well.
  • 3. Task 3 Now as the DC has been setup, it’s time to adding machines to the domain. Thus, rename ServerDM2 to Acc1 and add it to abcdomain. ABC Corporation at this moment will be divided into 2 Organizational Units (OUs), Accounting and Marketing. Create these OUs and add at least 2 users in each of these OUs. Once done, create a group called NoBackgroundChange. Add one member from each of the OUs to this group and set up a GPO Policy in such a way so that members of the group will not be able to change their Desktop Backgrounds once they login. In addition, bring Acc1 under the Accounting OU. Attach the most relevant screenshots and a short description after each of the screenshots. ________________________
  • 4. Task 3 constitutes 50% of the marks, while Task 1 and 2 make up the remaining 50% with 25% each Submissions are expected in PDF Format Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 Beccaria Kant Brockway Mabbott On Crimes and Punishment (1764) Philosophy The American Punishment of Law (1887) Reformatory (1910) (1939) Bentham Bentham Moral Calculus (1789) The Rationale of Punishment (1830) ORIGIN Classical Theory CONTEMPORARY THEORY Rational Choice Theory (p.92) Maudsley Tarde Freud
  • 5. Pathology of Mind Penal General Introduction (1867) Philosophy to Psychoanalysis (1912) (1920) Pinel Healy Treatise on Insanity (1800) The Individual Deliquent (1915) Marx Bonger Rusche & Kircheimer Communist Manifesto (1848) Criminality and Punishment and Social Economic Structure (1939) Conditions (1916) Glueck & Glueck 500 Criminal Careers (1930) Mead Sutherland The Psychology Principles of of Punitive Justice Criminology (1917) (1939) Sutherland Sutherland Criminology (1924) The Professional Thief (1937) Quetelet Durkheim Park, Burgess, Merton The Propensity The Division of & McKenzie Social Structure of Crime (1831) Labor in Society The City (1925) and Anomi (1938) (1893) Shaw et al. (1925) Delinquency Areas Sellin Thrasher Culture, Conflict The Gang (1926) and Crime (1938)
  • 6. ORIGIN Positivist Theory CONTEMPORARY THEORY Biological Trait Theory (p.129) ORIGIN Positivist Theory CONTEMPORARY THEORY Psychological Trait Theory (p.136) ORIGIN Marxist Theory CONTEMPORARY THEORY Critical Criminology (p.232) ORIGIN Sociological Theory CONTEMPORARY THEORY Social Structure Theory (p.158) ORIGIN
  • 7. Sociological Theory CONTEMPORARY THEORY Social Process Theory (p.194) ORIGIN Multifactor/Integrated Theory CONTEMPORARY THEORY Life Course Theory (p.268) ORIGIN Multifactor/Integrated Theory CONTEMPORARY THEORY Propensity Theory (p.276) Gall Lombroso Garofalo Kretschmer Hooton Cranioscopy/Phrenology Criminal Man Criminology Physique and American (1800) (1863) (1885) Character (1921) Criminal (1939) Dugdale Ferri Goring The Jukes Criminal The English Convict (1913) (1877) Sociology (1884) Timeline of Criminological Theories 1775 1800 1825 1850 1875 1900 1925 1939
  • 8. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 Andenaes Martinson Cohen & Felson Clarke General Preventive Effects What Works (1974) Routine Activities (1979) Situational Crime Prevention (1992) of Punishment (1966) Packer Newman J. Q. Wilson Katz The Limits of Criminal Defensible Thinking About Crime (1975) Seductions of Crime (1988) Sanction (1968) Space (1973) Montagu Jeffery E. O. Wilson Mednick & Volavka Rowe Harris Man and Crime Sociobiology (1975) Biology and Crime (1980) The Limits of The Nurture Aggression Prevention Family Influence Assumption (1998) (1968) (1971) (1995) Sheldon Dalton Ellis Varieties of Delinquent Youth (1949) The Premenstrual Syndrome (1971) Evolutionary Sociobiology (1989)
  • 9. Friedlander Eysenck Bandura Hirschi & Hindelang Henggeler Moffitt Wilson & Daly Psychoanalytic Crime and Aggression (1973) Intelligence and Delinquency in Neuropsychology Evolutionary Psychology Approach to Personality (1964) Delinquency (1977) Adolescence (1989) of Crime (1992) (1997) Delinquency (1947) Murray & Herrnstein The Bell Curve (1994) Vold Chambliss & Seidman Lea & Young Hagan Braithwaite Zehr & Mika Theoretical Criminology Law, Order and Power (1971) Left Realism (1984) Structural Criminology (1989) Crime, Shame, and Fundamental Concepts of (1958) Reintegration (1989) Restorative Justice (1998) Dahrendorf Taylor, Walton, & Young Daly & Chesney-Lind Quinney & Pepinsky Barak & Henry Class and Class Conflict The New Criminology Feminist Theory Criminology as An Integrative-Constitutive in Industrial Society (1959) (1973) (1988) Peacemaking (1991) Theory of Crime (1999) Cloward & Ohlin Kornhauser Wilson Agnew Courtwright Anderson Delinquency and Opportunity Social Sources The Truly General Strain Theory Violent Land (1996) Code of the Street (1960) of Delinquency (1978) Disadvantaged (1987) (1992) (1999) Lewis Blau & Blau Messner & Rosenfeld LaFree The Culture of Poverty (1966) The Cost of Inequality (1982) Crime and the American Losing Legitimacy Dream (1994) (1998)
  • 10. Lemert Hirschi Schur Akers Kaplan Akers Social Causes of Labeling Deviant Deviant Behavior (1977) General Theory Social Learning and Pathology (1951) Delinquency (1969) Behavior (1972) of Deviance (1992) Social Structure (1998) Becker Heimer & Matsueda Outsiders (1963) Differential Social Control (1994) Glueck & Glueck West & Farrington Thornberry Sampson & Laub Loeber Unraveling Juvenile Delinquency Delinquent Way of Life Interactional Crime in the Making (1993) Pathways to Delinquency (1950) (1977) Theory (1987) (1998) Weis Moffitt Social Development Adolescence-Limited and Life-Course Theory (1981) Persistent Antisocial Behavior (1995) Hathaway & Monachesi Wolfgang, Figlio, & Sellin Wilson & Herrnstein Tittle Analyzing and Predicting Delinquency in Birth Cohorts Crime and Human Control Balance: Toward a General Juvenile Delinquency (1972) Nature (1985) Theory of Deviance (1995) with the MMPI (1953) Eysenck Gottfredson & Hirschi Crime and Personality General Theory of Crime (1990) (1964) 1947 1969 1975 1980 1991 1995 1997 1998 Timeline of Criminological Theories (continued)
  • 11. Colvin Farrington Zimmerman, Botchkovar, Crime and Coercion (2000) “Developmental and Life-Course Antonaccio, & Hughes “Low Self- Criminology” (2003) Control in ‘Bad’ Neighborhoods” (2015) Piquero, Farrington, Boutwell, Barnes, Deaton, & Nagin, & Moffitt Beaver “On the Evolutionary Origins of Trajectories of Offending (2010) Life-course Persistent Offending” (2013) Conger Long-term Consequences of Economic Hardship on Romantic Relationships (2015) Laub & Sampson Agnew Larson & Sweeten Bersani & Doherty Shared Beginnings, Divergent Why Do Criminals Offend? “Breaking Up Is “When the Ties That Lives (2003) (2005) Hard to Do” (2012) Bind Unwind” (2013) Topalli “When Being Good Conger Is Bad: An Expansion of “Family Functioning and Crime” (2014) Neutralization Theory” (2005) Maruna Making Good: How Ex-convicts Reform and Rebuild Their Lives (2001) Sampson & Raudenbush LeBlanc Wilson & Taub There Goes the Neighborhood: Wilson Disorder in Urban Neighborhoods— Random Family: Love, Drugs, Trouble, Racial, Ethnic, and Class Tensions in Four Chicago More Than Just Race (2009) Does It Lead to Crime? (2001) and Coming of Age in the Bronx
  • 12. (2003) Neighborhoods and Their Meaning for America (2006) Sullivan & Tifft Western Restorative Justice (2001) Punishment and Inequality in America (2010) Hagan and Wymond-Richmond Chesney-Lind & Morash Darfur and the Crime of Genocide (2009) “Transformative Feminist Criminology” (2013) Bushman & Anderson Dorn, Volavka & Media Violence (2001) Johnson “Mental Disorder and Violence” (2012) Ellis & Hoskin “Criminality and the 2D:4D Ratio: Testing the Prenatal Androgen Hypothesis” (2015) Schoenthaler Friedman Beaver Wright & Cullen Barnes & Jacobs Intelligence, Academic Performance, “Violence and Mental Biosocial Criminology (2009) “The Future of Biosocial “Genetic Risk for Violent and Brain Function (2000) Illness” (2006) Criminology” (2012) Behavior” (2013) Lott Felson Steffensmeier & Ulmer Simon Petrossian & Clarke More Guns, Less Crime (2000) Crime and Everyday Life Confessions of a Dying Thief: Understanding Governing Through Crime (2010) “The CRAVED Theft Model” (2014) (2002) Criminal Careers and Illegal Enterprise (2005) Levitt Understanding Why Crime Fell in the 1990s (2004)
  • 13. 2000 2001 2002 2003 2004 2005 2010 2016 Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 CRIMINOLOGY THE CORE Larry J. Siegel University of Massachusetts, Lowell 7 Australia ● Brazil ● Mexico ● Singapore ● United Kingdom ● United States EDITION Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage
  • 14. Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Important Notice: Media content referenced within the product description or the product text may not be available in the eBook version. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  • 15. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 requests online at Cengage USA Criminology: The Core, Larry J. Siegel Meier Printed in the United States of America Print Number: 01 Print Year: 2017 Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  • 16. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 This book is dedicated to my children, Eric, Julie, Rachel, and Andrew; my grandchildren, Jack, Brooke, and Kayla Jean; my sons-in-law, Jason Macy and Patrick Stephens; and my wife, partner, and best friend, Therese J. Libby. L. J. S. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 LARRY J. SIEGEL was born in the Bronx. While liv- ing on Jerome Avenue and attending City College of
  • 17. New York in the 1960s, he was swept up in the social and political currents of the time. He became intrigued with the influence contemporary culture had on individual behavior: Did people shape society, or did society shape people? He applied his interest in social forces and human behavior to the study of crime and justice. Graduating from college in 1968, he was accepted into the first class of the newly opened program in criminal justice at the State University of New York at Albany, where he earned both his MA and PhD degrees. Dr. Siegel began his teaching career at Northeastern University, where he was a faculty member for nine years. He also held teaching positions at the University of Nebraska– Omaha and Saint Anselm College in New Hampshire before being appointed a full professor in the School of Criminology and Jus - tice Studies at the University of Massachusetts, Lowell. Dr.
  • 18. Siegel retired from full-time classroom teaching in 2015 and now teaches exclusively online. He has written extensively in the area of crime and justice, including books on juvenile law, delinquency, criminol- ogy, criminal justice, corrections, and criminal procedure. He is a court-certified expert on police conduct and has testified in numer- ous legal cases. The father of four and grandfather of three, Larry Siegel and his wife, Terry, now reside in Naples, Florida, with their two dogs, Watson and Cody. Therese J. Libby and Larry J. Siegel ABOUT THE AUTHOR Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any
  • 19. time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 PART 1 Concepts of Crime, Law, and Criminology Chapter 1 Crime and Criminology 2 Chapter 2 The Nature and Extent of Crime 30 Chapter 3 Victims and Victimization 64 PART 2 Theories of Crime Causation Chapter 4 Rational Choice Theory 98 Chapter 5 Trait Theory 132 Chapter 6 Social Structure Theory 170 Chapter 7 Social Process Theory 210 Chapter 8 Social Conflict, Critical Criminology, and Restorative Justice 248 Chapter 9 Developmental Theories: Life Course, Propensity, and Trajectory 284 PART 3 Crime Typologies Chapter 10 Violent Crime 318
  • 20. Chapter 11 Political Crime and Terrorism 366 Chapter 12 Economic Crimes: Blue-Collar, White-Collar, and Green-Collar 404 Chapter 13 Public Order Crimes 444 Chapter 14 Crimes of the New Millennium: Cybercrime and Transnational Organized Crime 488 Brief Contents v Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does
  • 21. not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 Preface xv PART 1 Concepts of Crime, Law, and Criminology CHAPTER 1 Crime and Criminology 2 What Criminologists Do: The Elements of Criminology 4 Criminal Statistics/Crime Measurement 4 Sociology of Law/Law and Society/Sociolegal Studies 5 Developing Theories of Crime Causation 6 Explaining Criminal Behavior 7 Penology: Punishment, Sanctions, and Corrections 7 Victimology 8 A Brief History of Criminology 8
  • 22. Classical Criminology 9 Positivist Criminology 9 Sociological Criminology 10 Conflict Criminology 11 Developmental Criminology 12 Contemporary Criminology 12 Deviant or Criminal? How Criminologists Define Crime 13 Becoming Deviant 14 The Concept of Crime 15 Jo e Ra ed le /G et ty Im ag es N
  • 23. ew s/ G et ty Im ag es Profiles in Crime A SHOOTING IN FERGUSON 16 A Definition of Crime 17 Criminology and the Criminal Law 17 Common Law 18 Contemporary Criminal Law 18 The Evolution of Criminal Law 19 Criminology and Criminal Justice 19 The Criminal Justice System 20 The Process of Justice 21 Policies and Issues in Criminology HATE CRIME IN GEORGIA 23 Ethical Issues in Criminology 24 CHAPTER 2
  • 24. The Nature and Extent of Crime 30 Primary Sources of Crime Data 32 Official Records: The Uniform Crime Report 32 NIBRS: The Future of the Uniform Crime Report 35 Survey Research 35 The National Crime Victimization Survey (NCVS) 35 Self-Report Surveys 36 Evaluating Crime Data 38 Crime Trends 39 Contemporary Trends 40 Trends in Victimization 41 Ch ris tia n Po ve da /A ge nc
  • 25. e VU /R ed ux Contents vii Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 viii CONTENTS Policies and Issues in Criminology INTERNATIONAL CRIME TRENDS 42 Policies and Issues in Criminology EXPLAINING TRENDS IN CRIME RATES 44 What the Future Holds 46
  • 26. Policies and Issues in Criminology ARE IMMIGRANTS CRIME PRONE? 47 Crime Patterns 48 Place, Time, Season, Climate 48 Co-Offending and Crime 49 Gender and Crime 49 Race and Crime 51 Use of Firearms 52 Social Class and Crime 53 Unemployment and Crime 54 Age and Crime 54 Chronic Offenders/Criminal Careers 55 What Causes Chronicity? 56 Implications of the Chronic Offender Concept 56 CHAPTER 3 Victims and Victimization 64 The Victim’s Role 66 The Costs of Victimization 66 Societal-Level Costs 66 Individual-Level Costs 67
  • 27. Legal Costs of Victimization 69 Policies and Issues in Criminology THE IMPACT OF WRONGFUL CONVICTIONS ON CRIME VICTIMS 70 The Nature of Victimization 72 The Social Ecology of Victimization 72 The Victim’s Household 73 Victim Characteristics 73 Policies and Issues in Criminology ELDER VICTIMS 74 A P Im ag es /J im C ol e Victims and Their Criminals 78 Theories of Victimization 78 Victim Precipitation Theory 78
  • 28. Lifestyle Theories 79 Deviant Place Theory 81 Routine Activities Theory 82 Caring for the Victim 84 Victim Service Programs 85 Victims’ Rights 89 Victim Advocates 89 Self-Protection 89 PART 2 Theories of Crime Causation CHAPTER 4 Rational Choice Theory 98 Development of Rational Choice Theory 100 Concepts of Rational Choice 101 Evaluating the Risks of Crime 101 Offense-Specific/Offender-Specific 102 Structuring Criminality 103 Structuring Crime 104 Is Crime Truly Rational? 106
  • 29. Is Drug Use Rational? 106 Profiles in Crime PLANNING TO STEAL 107 Is Violence Rational? 108 Is Hate Crime Rational? 108 Is Sex Crime Rational? 109 Analyzing Rational Choice Theory 109 Situational Crime Prevention 110 Crime Prevention Strategies 111 Evaluating Situational Crime Prevention 113 Th om as B ar w ic k/ D ig ita lV
  • 30. is io n/ G et ty Im ag es Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 ixCONTENTS General Deterrence 114 Perception and Deterrence 114 Marginal and Restrictive Deterrence 114
  • 31. Punishment and Deterrence 115 Policies and Issues in Criminology DOES THE DEATH PENALTY DISCOURAGE MURDER? 116 Evaluating General Deterrence 118 Specific Deterrence 119 Toughen Punishment? 119 Incapacitation 120 Policies and Issues in Criminology RACIAL DISPARITY IN STATE PRISONS 122 Criminal Justice and Rational Choice Theory 123 Police and Rational Choice Theory 123 Courts, Sentencing, and Rational Choice Theory 123 Corrections and Rational Choice Theory 124 CHAPTER 5 Trait Theory 132 Development of Trait Theory 134 Contemporary Trait Theory 135 Individual Vulnerability vs. Differential Susceptibility 136
  • 32. Biological Trait Theories 136 Biochemical Conditions and Crime 137 Neurophysiological Conditions and Crime 139 Genetics and Crime 142 Evolutionary Views of Crime 143 Psychological Trait View 144 The Psychodynamic Perspective 145 The Behavioral Perspective: Social Learning Theory 145 Policies and Issues in Criminology VIOLENT MEDIA/VIOLENT BEHAVIOR? 146 Cognitive Theory 149 A P Im ag es /M ic ha el S ul liv
  • 33. an / N ew s- Re vi ew Personality and Crime 150 Policies and Issues in Criminology CRIMINAL SUSCEPTIBILITY 151 Psychopathic/Antisocial Personality 151 Profiles in Crime THE ICEMAN: A TRUE SOCIOPATH 153 Intelligence and Criminality 154 Mental Disorders and Crime 155 Crime and Mental Illness 155 Profiles in Crime ADAM LANZA AND THE NEWTOWN MASSACRE 157 Evaluation of Trait Theory 157 Social Policy and Trait Theory 158 Policy and Issues in Criminology
  • 34. COGNITIVE BEHAVIORAL THERAPY 159 CHAPTER 6 Social Structure Theory 170 Economic Structure and American Society 172 Living in Poverty 172 Child Poverty 173 Minority Group Poverty 173 Problems of the Lower Class 174 Social Structure and Crime 175 Policies and Issues in Criminology LABOR’S LOVE LOST 176 Social Structure Theories 177 Social Disorganization Theory 177 The Work of Shaw and McKay 178 The Social Ecology School 180 Collective Efficacy 183 Strain Theories 186 Theory of Anomie 186 Institutional Anomie Theory 187 Relative Deprivation Theory 188
  • 35. General Strain Theory (GST) 189 A P Im ag es /S te ve n Se nn e Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 Cultural Deviance Theory 192
  • 36. Focal Concerns 192 Policies and Issues in Criminology THE CODE OF THE STREETS 194 Theory of Delinquent Subculture 195 Theory of Differential Opportunity 197 Social Structure Theory and Public Policy 198 Broken Windows 199 CHAPTER 7 Social Process Theory 210 Institutions of Socialization 213 Family Relations 213 Educational Experience 215 Peer Relations 216 Religion and Belief 217 Social Learning Theories 218 Differential Association Theory 218 Profiles in Crime THE AFFLUENZA CASE 221 Differential Reinforcement Theory 222 Neutralization Theory 222 Policies and Issues in Criminology
  • 37. WHITE-COLLAR NEUTRALIZATION 225 Evaluating Learning Theories 226 Social Control Theory 226 Hirschi’s Social Control Theory 226 Testing Social Control Theory: Supportive Research 228 Critiquing Social Control Theory 229 Social Reaction (Labeling) Theory 230 Consequences of Labeling 231 Primary and Secondary Deviance 233 Criminal Careers 233 Differential Enforcement 234 G ab rie lle L ur ie /A FP /G et
  • 38. ty Im ag es Long-Term Effects of Labeling 234 Is Labeling Theory Valid? 235 Social Process Theory and Public Policy 236 CHAPTER 8 Social Conflict, Critical Criminology, and Restorative Justice 248 Origins of Critical Criminology 250 Critical Criminology in the United States 252 Contemporary Critical Criminology 253 How Critical Criminologists Define Crime 253 How Critical Criminologists View the Cause of Crime 254 Failing Social Institutions 255 Globalization 255 State-Organized Crime 257 Policies and Issues in Criminology
  • 39. ARE WRONGFUL CONVICTIONS A STATE CRIME? 260 Instrumental vs. Structural Theory 261 Instrumental Theory 261 Profiles in Crime RUSSIAN STATE-ORGANIZED CRIME 262 Structural Theory 263 Research on Critical Criminology 263 Race and Justice 263 Alternative Views of Critical Theory 264 Left Realism 264 Policies and Issues in Criminology LEFT REALISM AND TERROR 265 Critical Feminist Theory: Gendered Criminology 266 Power–Control Theory 269 Peacemaking Criminology 270 A ni k Ra hm an /R
  • 40. ed ux x CONTENTS Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 Critical Theory and Public Policy: Restorative Justice 271 The Concept of Restorative Justice 271 Reintegrative Shaming 272 The Process of Restoration 273 The Challenge of Restorative Justice 276 CHAPTER 9 Developmental Theories: Life Course, Propensity, and Trajectory 284
  • 41. Foundations of Developmental Theory 286 Three Views of Criminal Career Development 287 Population Heterogeneity vs. State Dependence 288 Life Course Theory 289 Age of Onset 290 Problem Behavior Syndrome 291 Continuity of Crime 291 Age-Graded Theory 292 Policies and Issues in Criminology HUMAN AGENCY, PERSONAL ASSESSMENT, CRIME, AND DESISTANCE 296 Social Schematic Theory (SST) 297 Policies and Issues in Criminology SHARED BEGINNINGS, DIVERGENT LIVES 298 Latent Trait/Propensity Theory 300 Crime and Human Nature 300 General Theory of Crime (GTC) 301 Trajectory Theory 304 Age and Offending Trajectories 304 Personality and Offending Trajectories 305 Chronic Offenders and Non-offenders 305
  • 42. Pathways to Crime 306 Adolescent-Limited and Life Course Persistent Offenders 306 Public Policy Implications of Developmental Theory 308 H ar tf or d Co ur an t/ Tr ib un e N ew s Se rv
  • 44. t o f C or re ct io n PART 3 Crime Typologies CHAPTER 10 Violent Crime 318 Causes of Violence 320 Personal Traits 320 Child Abuse and Neglect 321 Human Instinct 321 Policies and Issues in Criminology VIOLENCE AND HUMAN NATURE 322 Exposure to Violence 323 Substance Abuse 323 Firearm Availability 323 Cultural Values 324
  • 45. National Values 324 Policies and Issues in Criminology AMERICAN CULTURE AND HOMICIDE 325 Rape 325 Incidence of Rape 326 Patterns of Rape and Sexual Assault 327 Types of Rapists 327 Types of Rape 328 Causes of Rape 331 Rape and the Law 332 Murder and Homicide 334 Degrees of Murder 335 Nature and Extent of Murder 336 Murderous Relations 336 Policies and Issues in Criminology HONOR KILLINGS 338 Serial Killers, Mass Murderers, and Spree Killers 340 Policies and Issues in Criminology MASS SHOOTERS: WHY DO SOME LIVE AND WHY DO SOME DIE? 344
  • 46. A P Im ag es /G ra ce B ea hm xiCONTENTS Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 Assault and Battery 345 Nature and Extent of Assault 345
  • 47. Acquaintance and Family Assaults 345 Dating Violence 347 Robbery 347 Robbers in Action 348 Choosing Targets 348 Contemporary Forms of Interpersonal Violence 350 Hate Crimes 350 Workplace Violence 352 Stalking 353 CHAPTER 11 Political Crime and Terrorism 366 Political Crime 369 Profiles in Crime EDWARD SNOWDEN 370 The Nature of Political Crimes 370 Becoming a Political Criminal 371 Types of Political Crimes 372 Election Fraud 372 Abuse of Office/Public Corruption 374
  • 48. Treason 374 Espionage 375 State Political Crime 377 Terrorism 378 Defining Terrorism 378 Terrorist and Guerilla 379 Terrorist and Insurgent 380 Terrorist and Revolutionary 380 A Brief History of Terrorism 381 Contemporary Forms of Terrorism 382 Political Terrorism 382 Revolutionary Terrorism 384 Nationalist Terrorism 384 Retributive Terrorism 385 A P Im ag es /M ar
  • 49. ku s Sc hr ei be r Policies and Issues in Criminology THE ISLAMIC STATE 386 State-Sponsored Terrorism 387 Lone Actor Terrorists 388 What Motivates the Terrorist? 389 Psychological View 389 Alienation View 390 Family Conflict View 390 Political View 391 Socialization/Friendship View 391 Ideological View 391 Explaining State-Sponsored Terrorism 392 Extent of the Terrorism Threat 392 Criminal Justice Response to Terrorism 393
  • 50. Combating Terrorism with Law Enforcement 393 Combating Terrorism with the Law 396 Combating Terrorism with Politics 398 CHAPTER 12 Economic Crimes: Blue- Collar, White-Collar, and Green-Collar 404 History of Economic Crimes 406 Development of White-Collar and Green-Collar Crime 407 Blue-Collar Crimes and Criminals 408 Larceny 408 Burglary 413 Arson 414 White-Collar Crime 415 Business Frauds and Swindles 416 Profiles in Crime FERTILITY FRAUD 417 Chiseling 418 Exploitation 418 Influence Peddling 419 Employee Fraud and Embezzlement 421
  • 51. Client Fraud 422 Corporate Crime 423 A P Im ag es /D ar ro n Cu m m in gs ; F lo rid a D ep ar tm
  • 52. en t o f C or re ct io ns xii CONTENTS Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 Green-Collar Crime 425 Defining Green-Collar Crime 425 Forms of Green Crime 426 Policies and Issues in Criminology
  • 53. THE DEEPWATER HORIZON 430 Theories of White-Collar and Green-Collar Crime 431 Rational Choice: Greed 431 Rational Choice: Need 431 Rationalization/Neutralization View 432 Cultural View 432 Self-Control View 432 Controlling White-Collar and Green-Collar Crime 433 Environmental Laws 433 Enforcing the Law 434 Deterrence vs. Compliance 435 CHAPTER 13 Public Order Crimes 444 Law and Morality 446 Are Victimless Crimes Victimless? 447 The Theory of Social Harm 448 Moral Crusaders and Moral Crusades 449 Sex-Related Offenses 450 Paraphilias 451 Pedophilia 451
  • 54. Prostitution 452 History of Prostitution 453 Policies and Issues in Criminology SEX WORK IN CONTEMPORARY SOCIETY 454 Incidence of Prostitution 454 Policies and Issues in Criminology THE INTERNATIONAL SEX TRADE 456 Types of Prostitutes 458 Becoming a Prostitute 459 Legalize Prostitution? 460 Jo hn L am b/ Sh el ly s/ D ig ita
  • 55. lV is io n/ G et ty Im ag es Pornography 461 Is Pornography Harmful? 462 Does Viewing Pornography Cause Violence? 462 Pornography and the Law 463 Substance Abuse 464 When Did Drug Use Begin? 465 Alcohol and Its Prohibition 465 Extent of Substance Abuse 466 Causes of Substance Abuse 467 Policies and Issues in Criminology THE OPIOID EPIDEMIC 468 Policies and Issues in Criminology SUBSTANCE ABUSE AND PSYCHOSIS 469
  • 56. Substance Abuse and Crime 471 Drugs and the Law 472 Drug Control Strategies 473 Legalization of Drugs 478 CHAPTER 14 Crimes of the New Millennium: Cybercrime and Transnational Organized Crime 488 Contemporary Cybercrime 490 Cybertheft: Cybercrimes for Profit 491 Theft from ATMs 491 Distributing Illicit or Illegal Services and Material 492 Distributing Dangerous Drugs 493 Profiles in Crime THE LOST BOY CASE 494 Denial-of-Service Attack 495 Internet Extortion/Ransomware 495 Illegal Copyright Infringement 496 Internet Securities Fraud 497 Identity Theft 497
  • 57. Etailing Fraud 499 Cybervandalism: Cybercrime with Malicious Intent 500 Worms, Viruses, Trojan Horses, Logic Bombs, and Spam 501 Website Defacement 502 Is ab el P av ia /M om en t/ G et ty Im ag es xiiiCONTENTS Copyright 2019 Cengage Learning. All Rights Reserved. May
  • 58. not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 Cyberstalking 502 Cyberbullying 503 Policies and Issues in Criminology UPSKIRTING, DOWNBLOUSING, AND REVENGE PORN: SHOULD NONCONSENSUAL PORNOGRAPHY BE CRIMINALIZED? 504 Cyberspying 507 The Costs of Cybercrime 507 Combating Cybercrime 508 International Treaties 509 Cybercrime Enforcement Agencies 509 Cyberwar: Politically Motivated Cybercrime 510 Cyberespionage 511 Cyberterrorism 511
  • 59. Policies and Issues in Criminology TERRORISM ON THE NET 512 Combating Cyberwar 514 Transnational Organized Crime 514 Characteristics of Transnational Organized Crime 515 Activities of Transnational Organized Crime 515 Transnational Gangs 516 Controlling Transnational Crime 520 Glossary G-1 Name Index NI-1 Subject Index SI-1 xiv CONTENTS Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
  • 60. I n 2017, the operator of the world’s largest child pornography website was sen- tenced to serve 30 years in prison. The case began in August 2014, when Steven Chase created the Playpen, a website using the Tor Project hidden service pro- tocol, which allows for an open network on the Internet where users can com- municate anonymously. Tor software conceals its users’ identities and their online activity from surveillance and traffic analysis by separating identification and routing. It encrypts and then randomly bounces communications through a network of relays run by volunteers around the globe. Chase served as lead administrator of Playpen, through which he and more than 150,000 other members viewed tens of thousands of postings of young victims, sorted by age, sex, and the type of sexual activity involved. In addition to Tor, website mem- bers employed other advanced technological means to thwart identification, includ- ing elaborate file encryption. Chase chose the name of the website, selected and made payments to the website hosting company, regularly updated the site with new features and security fixes, promoted several site members to administrator and moderator status to assist with
  • 61. the administration of the criminal enterprise, and spent hundreds of hours logged in, personally authoring hundreds of postings. He was arrested following a court-autho- rized search of his home that revealed he was in possession of thousands of images depicting the sexual abuse of children as young as infants and toddlers. Following Chase’s arrest, federal agents pierced through the anonymity provided by the Tor network and obtained IP addresses and other information to identify other site users. As a result of the investigation, at least 350 US- based individuals have been arrested, 25 producers of child pornography have been prosecuted, 51 alleged hands- on abusers have been prosecuted, and 55 American children who were subjected to sexual abuse have been successfully identified or rescued. The ongoing international investigation has led to least 520 arrests, and the successful identification and rescue of at least 186 children who were subjected to sexual abuse. The Playpen case demonstrates the complex nature of crime today. Contem- porary criminals, whether they be pornographers, gang members, or terrorists, are adept at using the Internet to carry out their criminal enterprise schemes. While some crimes are local, others are global in their reach. It is not surprising that many Americans are concerned about crime and worried about becoming victims of crime themselves. We alter our behavior to limit the risk of
  • 62. victimization and question whether legal punishment alone can control criminal offenders. We watch movies and TV shows about law firms and their clients, fugitives, and stone-cold killers. We are shocked when the news media offers graphic accounts of school shootings, po- lice brutality, and sexual assaults. We are swayed when politicians claim that crime is on the upswing and that we must arm ourselves to protect loved ones. Is any- where safe? Twenty years ago, no states had laws that allowed guns on university campuses. Today, 10 states have signed such laws, while 20 others are considering college carry laws. I, too, have had a lifelong interest in crime, law, and justice. Why do people be- have the way they do? What causes someone like Steven Chase to operate a global kiddie porn site? Was his behavior the result of a diseased mind and personality? And xv Preface Steven Chase m ec kl en
  • 63. bu rg co un ty nc .g ov Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 xvi PREFACE what should be done with people who commit such horrendous crimes? Is 30 years in prison too severe a sentence for someone who distributes child pornography, or too lenient? Can draconian punishments convince others that “crime does not pay”?
  • 64. Goals of This Book For more than 40 years, I have channeled my fascination with issues related to crime and justice into a career as a student and teacher of criminology. My goal in writing this text is to help students share the same enthusiasm for criminology that has sus- tained me during my teaching career. What could be more important or fascinating than a field of study that deals with such wide-ranging topics as the motivation for mass murder, the effects of violent media on young people, drug abuse, and orga- nized crime? Criminology is a dynamic field, changing constantly with the release of major research studies, Supreme Court rulings, and governmental policy. Its dyna- mism and diversity make it an important and engrossing area of study. One reason why the study of criminology is so important is that debates continue over the nature and extent of crime and the causes and prevention of criminality. Some view criminals as society’s victims who are forced to violate the law because of poverty and lack of opportunity. Others view antisocial behavior, such as the Playpen website, as a product of mental and physical abnormalities, present at birth or soon after, that are stable over the life course. Still another view is that crime is a function of the rational choice of greedy, selfish people who can be deterred from engaging in criminal behavior only by the threat of harsh punishments. It all comes down to this:
  • 65. Why do people do the things they do? How can we explain the intricacies and diver- sity of human behavior? Because interest in crime and justice is so great and so timely, this text is designed to review these ongoing issues and cover the field of criminology in an organized and comprehensive manner. It is meant as a broad overview of the field, an introduction to whet the reader’s appetite and encourage further and more in- depth exploration. I try to present how the academic study of criminology intersects with real-world issues. For example, diversity is a key issue in criminology and a topic that has im- portant real-world consequences. Therefore, the text attempts to integrate issues of racial, ethnic, gender, and cultural diversity throughout. The book covers the killing of Michael Brown in Ferguson, Missouri, and racial differences in economic and so- cial factors related to crime. My primary goals in writing this text were as follows: 1. To separate the facts from the fiction about crime and criminality 2. To provide students with comprehensive and wide-ranging knowledge of crimi- nology and show its diversity and intellectual content 3. To be as thorough and up-to-date as possible 4. To be objective and unbiased 5. To describe current theories, crime types, and methods of social control, and to
  • 66. analyze their strengths and weaknesses 6. To show how criminological thought has influenced social policy Features FACT OR FICTION? A main goal of this edition is to expose some of the myths that cloud people’s thinking about crime and criminals. The media often paints a distorted picture of the crime problem in America and focuses only on the most sensational cases. Is the crime rate really out of control? Are unemployed people inclined to com- mit crime? Are immigrants more crime prone than the native- born, as some politi- cians suggest? Are married people less crime prone than singles? Distinguishing what is true from what is merely legend is one of the greatest challenges for instructors in criminology courses. Therefore, a goal of this text is disabuse students of incorrect Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203
  • 67. xviiPREFACE notions, perceptions, and biases. Each chapter opens with a set of statements high- lighting common perceptions about crime that are related to the material discussed in the chapter. In the text, these statements are revisited so the student will become skilled at distinguishing the myths from the reality of crime and criminality. CONCEPT SUMMARY There are ongoing debates about the nature and extent of crime and the causes and prevention of criminality. I try to present the various view- points on each topic and then draw a conclusion based on the weight of the existing evidence. Students become familiar with this kind of analysis by examining Concept Summary boxes that compare different viewpoints, reviewing both their main points and their strengths. THINKING LIKE A CRIMINOLOGIST It is important for students to think critically about law and justice and to develop a critical perspective toward the social insti- tutions and legal institutions entrusted with crime control. Throughout the book, students are asked to critique research highlighted in boxed material and to think “outside the box,” as it were. To aid in this task, each chapter ends with a brief section called Thinking Like a Criminologist, which presents a scenario
  • 68. that can be analyzed with the help of material found in the chapter and a suggested writing assignment to expand knowledge on the issue. POLICIES AND ISSUES IN CRIMINOLOGY Throughout the book, every attempt is made to access the most current research and scholarship available. Most people who use the book have told me that this is one of its strongest features. I have attempted to present current research in a balanced fashion, even though this approach can be frustrating to students. It is comforting to reach an unequivocal conclusion about an important topic, but sometimes that simply is not possible. In an effort to be objec- tive and fair, I have presented each side of important criminological debates in full. Throughout the text, boxed features titled Policies and Issues in Criminology review critically important research topics. In Chapter 13, for example, this feature covers the current opioid epidemic that is sweeping the United States and analyzes its cause and effects. PROFILES IN CRIME These features are designed to present to students actual crimes that help illustrate the position or views within the chapter. In Chapter 12, a Profiles in Crime feature entitled “Fertility Fraud” looks at the case of Allison Layton, who owned a company called Miracles Egg Donation. Layton earned a prison sentence for cheating vulnerable would-be parents out of tens of thousands
  • 69. of dollars for phony egg donation and surrogacy services. CONNECTIONS are short inserts that help link the material to other areas covered in the book. A Connections insert in Chapter 14 points out how cyberspace is being used to facilitate public order crimes (covered in Chapter 13) by being a conduit to illegally distribute prescription drugs, advertise prostitution, and disseminate pornography. CHAPTER OUTLINES provide a roadmap to coverage and serve as a useful review tool. LEARNING OBJECTIVES spell out what students should learn in each chapter and are reinforced via a direct link to the end-of-chapter summary as well as all of the text’s ancillary materials. A RUNNING GLOSSARY in the margins ensures that students understand words and concepts as they are introduced. In sum, the text has been carefully structured to cover relevant material in a comprehensive, balanced, and objective fashion. Every attempt has been made to make the presentation of material interesting and contemporary. No single political or Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed
  • 70. from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 xviii PREFACE theoretical position dominates the text; instead, the many diverse views that are con- tained within criminology and characterize its interdisciplinary nature are presented. While the text includes analysis of the most important scholarly works and scientific research reports, it also includes a great deal of topical information on recent cases and events, such as the story of Owen Labrie and the St. Paul’s School rape case and Dylann Roof and the Charleston massacre. Topic Areas Criminology: The Core is a thorough introduction to this fascinating field and is intended for students in introductory courses in criminology. It is divided into three main sec- tions or topic areas. PART 1 provides a framework for studying criminology. The first chapter defines the field and discusses its most basic concepts: the definition of
  • 71. crime, the component areas of criminology, the history of criminology, the concept of criminal law, and the ethical issues that arise in this field. Chapter 2 covers criminological research meth- ods, as well as the nature, extent, and patterns of crime. Chapter 3 is devoted to the concept of victimization, including the nature of victims, theories of victimization, and programs designed to help crime victims. PART 2 contains six chapters that cover criminological theory: Why do people be- have the way they do? Why do they commit crimes? These views focus on choice (Chapter 4), biological and psychological traits (Chapter 5), social structure and cul- ture (Chapter 6), social process and socialization (Chapter 7), social conflict (Chapter 8), and human development (Chapter 9). PART 3 is devoted to the major forms of criminal behavior. The chapters in this sec- tion cover violent crime (Chapter 10), political crime and terrorism (Chapter 11), blue-collar, white-collar, and green-collar crimes (Chapter 12), public order crimes, including sex offenses and substance abuse (Chapter 13), and cybercrime and trans- national organized crime (Chapter 14). What’s New in This Edition: Chapter-by-Chapter Changes Chapter 1 Chapter 1 now begins with a vignette on the 2015 terror attack
  • 72. in San Bernardino, California, that killed 14 people and wounded 22 others. There is discussion of Glossip v. Gross, a case that illustrates how the Supreme Court relies on social science research to reach decisions. There is also a review of research aimed at determining whether people who view pornography are also more likely to commit violence against women. A Pro- files in Crime feature entitled “A Shooting in Ferguson” reviews the case of Michael Brown, an African American youth killed in what proved to be a highly controversial confrontation with a police officer. There is new information on drug legalization: a number of states have now legalized recreational use of marijuana, while others have legalized it for medical purposes. A Policies and Issues in Criminology feature, “Hate Crime in Georgia,” considers whether the punishment was appropriate to the crime. Chapter 2 Chapter 2’s opening vignette looks at a recent crime committed by members of MS-13, a violent international criminal organization based in El Salvador and Honduras. The data on crime and victimization have been updated. There is new information in the Policies and Issues features on international crime trends and factors that shape criminal activity. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  • 73. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 xixPREFACE Chapter 3 Chapter 3 begins with the discussion of the infamous St. Paul’s School rape case in which a young student was sexually assaulted by a classmate as part of a ritual in which senior boys attempt to seduce freshman girls. There is a new discussion on the different meth- ods that have been developed to measure the cost of victimization to American society. A new section looks at the stress abuse victims encounter in childhood that endures into adulthood. There is recent data from the National Center for Educational Statistics on victimization among students. Research is covered that shows that racial stereotypes af- fect criminal decision making. Research showing that people with particular and distinct mental and physical traits are more likely to suffer victimization is discussed. Chapter 4 Chapter 4 begins with a vignette on an Ohio man, Michael Wymer, whose case aptly
  • 74. illustrates the concept of rational choice in criminal decision making. There is a new section on criminal competence, which may be an important element in structuring criminality. Research is covered that shows that criminals choose targets in familiar places, where they know their way around and won’t get lost or trapped. Research now shows that neighborhoods with medical marijuana dispensaries have a high risk of armed robbery and resulting murders. A new section called “Getting Away” dis- cusses escape mechanisms employed during criminal acts. A new Profiles in Crime feature looks at how auto thieves plan their crimes. There is an updated section on the installation of closed-circuit television (CCTV) surveillance cameras and improved street lighting. Another new section looks at criminal compulsion. A Policies and Is- sues in Criminology feature looks at racial disparity in state prisons. There are new sections on courts, sentencing, corrections, and rational choice theory. Chapter 5 Chapter 5 begins with a vignette on Chris Harper Mercer, a troubled young man who opened fire at Umpqua Community College in Oregon, killing nine people and wounding seven others before being killed after exchanging gunfire with responding police officers. There is new data on adolescent boys with antisocial substance disor- der (ASD) who repeatedly engage in risky antisocial behavior. Research is covered
  • 75. that shows that antisocial children have lower resting heart rates than the general population. Meta-analysis of existing research finds that lack of attachment predicts involvement in a broad spectrum of criminal activity. A new Policies and Issues in Criminology feature entitled “Criminal Susceptibility” argues that the link between personality traits and crime flows through an individual’s resistance or susceptibility to crime-promoting experiences. A new Profiles in Crime feature covers Adam Lanza and the Sandy Hook Elementary School massacre. Chapter 6 Chapter 6 begins with a vignette on the tragic case of Aaron Hernandez, the pro-foot- ball star who could not shake the street values that shaped hi s early life. New material on economic structure and American society reviews such issues as stratification, class economic disparity, white privilege, and racial conflict. A new Policies and Issues in Criminology feature entitled “Labor’s Love Lost” reviews the book by Andrew Cherlin that provides an explanation of the toll income and educational inequality take on soci- ety. Research is presented on how destructive commercial institutions can destabilize a neighborhood and increase the rate of violent crimes. Chapter 7 Chapter 7’s opening vignette looks at the case of Stanford University student ath- lete Brock Turner, who was convicted of sexually assaulting an unconscious woman
  • 76. behind a dumpster and received a six-month jail sentence for his crime. New research Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 xx PREFACE shows that youth who are suspended or expelled from school are the ones most likely to have problems over the life course. A Profiles in Cr ime feature entitled “The Af- fluenza Case” looks at what happened to Ethan Couch, a 16- year-old Texas boy, who killed four people while driving drunk. A new Policies and Issues in Criminology fea- ture, “White-Collar Neutralization,” reviews research that shows that white-collar criminals use neutralization techniques before engaging in business crimes. There is a new section covering Per-Olof H. Wikstrom’s Situational Action Theory (SAT), which maintains that when people are socialized to have a strong sense of morality, if con-
  • 77. fronted or exposed to criminal opportunity, their sense of ethics and principles will guide their behavior. There is also a new section on the long- term effects of labeling. Chapter 8 Chapter 8 opens with a vignette on the political conflict that dominated the 2016 pres- idential election. There is new coverage of income including research sponsored by the Pew Foundation that shows that the wealth gap between America’s high-income group and everyone else has now reached record high levels. There is a new section on justice system inequality that discusses how critical thinkers believe that racial and ethnic minorities are now the target of racist police officers and unfair prosecutorial practices. A Policies and Issues in Criminology box asks the provocative question “Are Wrongful Convictions a State Crime?” There is discussion on how critical feminists show that sexual and other victimization of girls is a function of male socialization because so many young males learn to be aggressive and to exploit women. Chapter 9 Chapter 9’s opening vignette covers the horrific murders of Jennifer, Michaela, and Hayley Petit during a home invasion in Cheshire, Connecticut. A new Policies and Issues in Criminology feature entitled “Human Agency, Personal Assessment, Crime, and Desistance” looks at the research of Robert Agnew and Steven Messner, which
  • 78. shows that human agency plays a major role in shaping personal assessments and behaviors. A new section entitled “Personality and Offending Trajectories” shows that the reason why some offenders start early, others late, and some not at all may be linked to psychological problems and disturbance. Chapter 10 Chapter 10 opens with an update on the Dylann Roof case; he was sentenced to death after being convicted in federal court on 33 hate crime charges. Randol Con- treras’s influential book Stickup Kids: Race, Drugs, Violence, and the American Dream is covered. A Policies and Issues in Criminology feature entitled “American Culture and Homicide” covers the work of social historian Randolph Roth, who charts changes in the homicide rate in the United States from colonial times to the present. There is a section that looks at date and acquaintance rape on college campuses; data from a national survey of sexual assault on campus are presented. A new section, “Sex in Authority Relations,” reviews the legislation making it a crime for people in power to have sexual relations with those they control or supervise. A Policies and Issues in Criminology feature looks at mass shooters: Why do some live and some die? A new section, “Targeting Criminals,” reviews how some robbers target fellow criminals—for example, drug dealers—because they are inviting targets. Chapter 11
  • 79. Chapter 11 updates the case of Julian Assange and WikiLeaks, and how the 2016 presidential election was influenced by the release of emails hacked from Clinton campaign computers. A Profiles in Crime feature covers the Edward Snowden case. Voting fraud is now covered in some detail. A Policies and Issues in Criminology fea- ture on the history and activities of the Islamic State has been updated. We also re- view the US Freedom Act, which replaced the Patriot Act. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 xxiPREFACE Chapter 12 Chapter 12 reviews the activities of the Cuban Mob, a gang of commercial thieves who made off with $60 million worth of pharmaceuticals. Data are updated on shop- lifting and retail theft: in a given year, total retail losses are approximately $44 billion.
  • 80. There is new information on the increase in highly organized professionals involved in auto theft. A Profiles in Crime feature entitled “Fertility Fraud” looks at the crimes of Allison Layton, who cheated would-be parents at her fertility clinic. There is cover- age of recent Foreign Corrupt Practices Act (FCPA) cases, illegal logging, and importa- tion of wildlife that has brought some species, such as the northern white rhinoceros and the western black rhinoceros, to near extinction. Chapter 13 Chapter 13 begins with a vignette on Larry Nassar, a central figure in USA gymnastics, and how his downfall began when young female athletes accused him of sexual assault and federal investigators found child pornography on his computer. The most challenged or banned library books are set out. There is new material on the history of prostitution, including how in 1908 officials in Salt Lake City, Utah, hired Dora Topham, the leading madam of Ogden, to operate a legal red-light district called the stockade. The Policies and Issues in Criminology feature “Sex Work in Contemporary Society” is updated to include survival sex among LGBTQ youth. Another Policies and Issues feature, “The In- ternational Sex Trade,” is updated with the latest report by the UN on human trafficking. There is a new Policies and Issues in Criminology feature on the opioid epidemic that is sweeping the country. There is new material on the link between drugs and crime; re- search projects find that they are highly correlated.
  • 81. Chapter 14 Chapter 14 begins with the case of Kassandra Cruz, a Miami woman sent to prison for cyberstalking and extortion. New data are presented on how the crime rate in Eng- land and Wales doubled in 2015 when cybercrime began to be included. New data are presented that show that a conservative estimate of the annual cost to the global economy from cybercrime is now more than $400 billion and losses may be as high as $575 billion. A new section entitled “Internet Extortion/Ransomware” discusses how computers around the world are attacked by hackers. There is a new Policies and Issues in Criminology box on revenge porn and efforts to penalize people who post non-consensual sexually explicit photos online. Data are presented on cyberbullying that show on average about 28 percent of kids experience this form of harassment. A Policies and Issues in Criminology feature discusses how the Islamic State uses the Internet to recruit and raise funds. Supplements An extensive package of supplemental aids is available for instructor and student use with this edition of Criminology: The Core. Supplements are available to qualified adopters. Please consult your local sales representative for details. For the Instructor ONLINE INSTRUCTOR’S MANUAL The manual includes
  • 82. learning objectives, key terms, a detailed chapter outline, student activities, and media tools. The learning ob- jectives are correlated with the discussion topics, student activities, and media tools. The manual is available for download on the password-protected website and can also be obtained by e-mailing your local Cengage Learning representative. ONLINE TEST BANK Each chapter of the test bank contains questions in multiple- choice, true/false, completion, and essay formats, with a full answer key. The test bank is coded to the learning objectives that appear in the main text, references to Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 xxii PREFACE the section in the main text where the answers can be found, and Bloom’s taxonomy.
  • 83. Finally, each question in the test bank has been carefully reviewed by experienced criminal justice instructors for quality, accuracy, and content coverage. The Test Bank is available for download on the password-protected website and can also be obtained by e-mailing your local Cengage Learning representative. CENGAGE LEARNING TESTING, POWERED BY COGNERO This assessment software is a flexible, online system that allows you to import, edit, and manipulate test bank content from the Criminology: The Core test bank or elsewhere, including your own fa- vorite test questions; create multiple test versions in an instant; and deliver tests from your LMS, your classroom, or wherever you want. ONLINE POWERPOINT® LECTURES Helping you make your lectures more engag- ing while effectively reaching your visually oriented students, these handy Microsoft PowerPoint slides outline the chapters of the main text in a classroom-ready presenta- tion. The PowerPoint slides are updated to reflect the content and organization of the new edition of the text and feature some additional examples and real-world cases for application and discussion. Available for download on the password-protected in- structor companion website, the presentations can also be obtained by e-mailing your local Cengage Learning representative. For the Student MINDTAP FOR CRIMINOLOGY With MindTap™ Criminal
  • 84. Justice for Criminology: The Core, you have the tools you need to better manage your limited time, with the abil- ity to complete assignments whenever and wherever you are ready to learn. Course material that is specially customized for you by your instructor in a proven, easy- to-use interface keeps you engaged and active in the course. MindTap helps you achieve better grades today by cultivating a true understanding of course concepts, and with a mobile app to keep you on track. With a wide array of course-specific tools and apps—from note taking to flashcards—you can feel confident that MindTap is a worthwhile and valuable investment in your education. You will stay engaged with MindTap’s video cases and career scenarios and remain motivated by information that shows where you stand at all times—both individually and compared to the highest performers in class. MindTap eliminates the guesswork, focusing on what’s most important with a learning path designed specifi- cally by your instructor and for your criminology course. Master the most important information with built-in study tools such as visual chapter summaries and integrated learning objectives that will help you stay organized and use your time efficiently. Acknowledgments The preparation of this book would not have been possible without the aid of my col- leagues who helped by reviewing the previous editions and gave
  • 85. me important sug- gestions for improvement. My partners at Cengage Learning have done their typically outstanding job of aiding me in the preparation of this text and putting up with my yearly angst. Caro- lyn Henderson Meier, my wonderful product team manager, is always an inspiration; Shelley Murphy is both my content developer and dear friend. Kim Adams Fox did an outstanding job on photo research. Both Mary Kanable and Susan Gall are excel- lent proofreaders and I’m grateful for their thoughtful and smart comments. Linda Jupiter, the book’s production editor, is another confidant and friend. I really appreci- ate the help of Lunaea Weatherstone, who in addition to being a great copy editor is also my oracle and personal life coach. The sensational Christy Frame is an extraordi- nary senior content project manager, and senior marketing manager Mark Linton is equally fantastic. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 86. WCN 02-200-203 CRIMINOLOGY THE CORE Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 Joe Raedle/Getty Images News/Getty Images Crime and Criminology Learning Objectives LO1 Explain the various elements of criminology. LO2 Differentiate between crime and deviance. LO3 Analyze the three different views of the definition of crime. LO4 Articulate the different purposes of the criminal law. LO5 Outline the criminal justice process. LO6 Summarize the ethical issues in criminology. Syed Rizwan Farook Tashfeen Malik
  • 88. /F BI /G et ty Im ag es N ew s/ G et ty Im ag es Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May
  • 89. not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 3 O n December 2, 2015, Syed Rizwan Farook and Tashfeen Malik, residents of Redlands, California, attacked a holiday party being held for employees at the San Bernardino County Department of Public Health. Armed with semi-automatic weapons, they killed 14 people; 22 others were seriously injured. Farook, who worked for the health department, was an American-born citizen of Pakistani decent, while Malik, his wife, was Pakistani-born and a lawful permanent resident; they had a 6-month-old daughter. After the shooting, the couple fled the scene in a rented SUV and were killed in a shootout with pursuing police.
  • 90. Farook and Malik are considered homegrown violent extremists, inspired by but not directed by a foreign group; they were not part of any known terrorist cell. Farook visited Pakistan in 2014 and returned with Malik, who traveled on a Pakistani passport with a fiancée visa. They also visited Saudi Arabia, but their radicalization is believed to have been via the Internet. After they returned from abroad, the couple began to stockpile weapons, thousands of rounds of ammunition, and bomb- making equipment in their home.1 The San Bernardino attack was all too reminiscent of other terrorist incidents on American soil: ●● On April 15, 2013, Dzhokhar and Tamerlan Tsarnaev set off bombs at the Boston Marathon finish line, killing three people, and maiming and injuring at least 264. The Tsarnaev brothers, though born abroad and of Chechen descent,
  • 91. had prospered in the United States; Dzhokhar was attending a state university. Nonetheless, the brothers clung to radical Islamic views and blamed the US government for conducting a war against Islam in Iraq and Afghanistan.2 ▸ 1 Chapter Outline What Criminologists Do: The Elements of Criminology Criminal Statistics/Crime Measurement Sociology of Law/Law and Society/Sociolegal Studies Developing Theories of Crime Causation Explaining Criminal Behavior Penology: Punishment, Sanctions, and Corrections Victimology A Brief History of Criminology Classical Criminology Positivist Criminology Sociological Criminology Conflict Criminology Developmental Criminology Contemporary Criminology Deviant or Criminal? How Criminologists Define Crime Becoming Deviant The Concept of Crime Profiles in Crime A SHOOTING IN FERGUSON
  • 92. A Definition of Crime Criminology and the Criminal Law Common Law Contemporary Criminal Law The Evolution of Criminal Law Criminology and Criminal Justice The Criminal Justice System The Process of Justice Policies and Issues in Criminology HATE CRIME IN GEORGIA Ethical Issues in Criminology FACT OR FICTION? ▸▸ Sex offender registration lists help deter potential offenders and reduce the incidence of child molestation. ▸▸ It’s a crime to ignore a drowning person’s cries for help. ▸▸ The definitions of long-established common-law crimes such as rape, robbery, and murder never change. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any
  • 93. time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 4 ●● On November 28, 2016, Somali refugee Abdul Razak Ali Artan deliberately drove his car into pedestrians at Ohio State University. Getting out of the car, he then attacked others with a butcher knife before being shot and killed by the first responding OSU police officer. Thirteen people were injured in the attack. Investigators believe that Artan was inspired by terrorist propaganda from the Islamic State (IS) and radical Muslim cleric Anwar al-Awlaki.3 ■ These and other high-profile terrorist incidents have spurred an ongoing national debate over the proper response to terrorism. In 2017, President Trump issued an executive order that prohibited residents from seven predominantly Muslim coun-
  • 94. tries from visiting the US to work or study. Another executive order focused on immi- grants who “pose a risk to public safety” and thereby made millions of undocumented people a priority for deportation.4 The ban provoked even greater debate. Supporters believed Tump's order enhanced national security. Critics countered that the ban was unconstitutional; federal judges sided with the latter and blocked its implementation. Widely publicized criminal acts, including terror attacks, have stimulated interest in criminology, an academic discipline that uses the scientific method to study the nature, extent, cause, and control of criminal behavior. This involves using valid and reliable procedures for the systematic collection, testing, and analysis of empirical evi- dence relevant to the problem under study. What motivates people like Farook and Malik to turn on coworkers and people they knew in the name of Jihad? Or was that their real motive? Was their crime a matter of rational choice and decision making or the outcome of delusional thinking and mental illness? Unlike political figures and media commentators, whose opinions about crime may be colored by personal experiences, biases, and election concerns, criminolo- gists remain objective as they study crime and its consequences.5 The field itself is far reaching, and subject matter ranges from street level drug
  • 95. dealing to interna- tional organized crime, from lone wolf terrorism to control of kiddie porn. It is an interdisciplinary field: while many criminologists have attended academic programs that award degrees in criminology or criminal justice, many criminologists have a background in other academic disciplines, including sociology, psychology, and legal studies. In this chapter, we review the components of this diverse field of study, how this field developed, and how criminologists view crime and justice. We begin by examin- ing the focus and concerns of this intriguing academic discipline. What Criminologists Do: The Elements of Criminology Several subareas exist within the broader arena of criminology. Some criminologists specialize in one area while ignoring others, and some are generalists whose research interests are wide ranging. What then are the most important subareas in the field? Criminal Statistics/Crime Measurement The subarea of criminal statistics/crime measurement involves creating methodolo- gies that are able to accurately measure activities, trends, and patterns in crime and then using these tools to calculate amounts and developments in criminal activity: How much crime occurs annually? Who commits it? When and where does it occur?
  • 96. Which crimes are the most serious? criminology The scientific study of the nature, extent, cause, and control of criminal behavior. LO1 Explain the various elements of criminology. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 5Chapter 1 ■ CRiMe and CRiMinology Criminologists interested in computing criminal statistics focus on creating valid and reliable measures of criminal behavior: ●● Criminologists help formulate techniques for collecting and analyzing official measures of criminal activities, such as crimes reported to the police.
  • 97. ●● To measure unreported criminal activity criminologists develop survey instru- ments designed to have victims report loss and injury that may not have been reported to the police. ●● Criminologists design methods that make it possible to investigate the cause of crime. They may create a self-administered survey with questions measuring an adolescent’s delinquent behaviors as well as social characteristics, education and occupation of parents, friendship patterns, and school activities. These sur- vey items can later be correlated in order to determine the associations among a variety of social factors and criminal activities, such as whether school failure is related to drug abuse. Sociology of Law/Law and Society/Sociolegal Studies Variously called sociology of law, law and society, or sociolegal studies, this subarea of criminology is concerned with the social, political, and intellectual influences of law and legal activity; the sociology of legal institutions and legal processes; and consequences of law on society. According to the American Sociological Associa- tion, the sociology of law involves linking the study of law with such core socio- logical issues as social change and stability, order and disorder, the nation-state and capitalism. Research on sociolegal issues involves methodologically sophisticated empirical investigations as the central means of studying the
  • 98. dynamics of law in society.6 Criminologists who study the impact of law on society focus their attention on the role that social forces play in shaping criminal law and the role of criminal law in shaping society. They might investigate the history of legal thought in an effort to understand how criminal acts (such as theft, rape, and murder) evolved into their present form. They may also play an active role in suggesting legal changes that benefit society. Criminologists who are interested in sociolegal scholarship evaluate the impact that new laws have on society. Take sex offender registration laws, which require convicted sex offenders to register with local law enforcement agencies whenever they move into a community. These provisions are often called Megan’s Laws, in memory of 7-year-old Megan Kanka. Megan was killed in 1994 by sex offender Jesse Timmendequas, who had moved unannounced into her New Jersey neighborhood. When criminologists conducted an in-depth study of the effectiveness of the New Jersey registration law they found that, although it was main- tained at great cost to the state, the system did not pro- duce effective results: Sex offense rates in New Jersey were in steep decline before the system was installed, and the rate of decline actually slowed down after 1995 when the law took effect; in some states arrests for sex offenses increased after the law took effect. Megan’s Law did not reduce the number of rearrests for sex offenses, nor did it have any demonstrable effect on the time between when sex offenders were released from prison
  • 99. and the time they were rearrested for any new offense, such as a drug offense, theft, or another sex offense.7 Such sociolegal scholarship helps policy makers deter- mine the effectiveness of legal change. valid measure A measure that actually measures what it purports to measure; a measure that is factual. reliable measure A measure that produces consistent results from one measurement to another. Sex offender registration lists help deter potential offenders and reduce the incidence of child molestation. FICTION Research indicates that registration has little effect on either offenders or rates of child molesting. FACT OR FICTION? Criminologists interested in the sociology of law conduct research on the effects of legal change on society. Take for example the Supreme Court’s ruling in Miller v. Alabama, barring mandatory life sentences for juveniles convicted of murder. Criminologists may be called upon to test public opinion on whether young offenders have
  • 100. the potential for rehabilitation. They may also try to explore whether adolescent brains have developed sufficiently to fully understand the consequences of their behavior. M on ic a A lm ei da /N ew Y or k Ti m es /R ed ux Copyright 2019 Cengage Learning. All Rights Reserved. May
  • 101. not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 6 Part 1 ■ CONCEPTS OF CRIME, LAW, AND CRIMINOLOGY Criminological research is also used extensively by the Supreme Court in shaping their decision making and creating legal precedence.8 Take what happened in these two important cases: ●● In Miller v. Alabama, the Supreme Court relied on social research that conclusively showed that juveniles are not fully capable of anticipating the consequences of their actions. This finding led the justices to conclude that it would be inappropri- ate and unconstitutional for juveniles to receive mandatory life sentences with- out the possibility of parole. If juveniles have a different mental capacity than adults, it seemed illogical that they should receive the same punishment; this would amount to cruel and unusual punishment.9
  • 102. ●● In Glossip v. Gross, Justices Breyer and Ginsburg relied on social science research by sociolegal scholar Samuel Gross and his colleagues showing that there is a sig- nificant likelihood of a wrongful conviction in death penalty cases. Why is this so? Because capital cases typically involve horrendous murders, and they generate intense community pressure on police, prosecutors, and jurors to secure a convic- tion. This pressure creates a greater likelihood of convicting the wrong person.10 Here a legal opinion was informed by social science research. Developing Theories of Crime Causation Criminologists also explore the causes of crime. How do the mechanisms of past experience influence an individual’s propensity to offend? Is past behavior the best predictor of future behavior? Are the seeds of a criminal career planted early in life or do life events upend a person’s normal life course? Some criminologists focus on the individual and look for an association between decision making, psychological and biological traits, and antisocial behaviors. Those who have a psychological orientation view crime as a function of personality, develop- ment, social learning, or cognition. Others investigate the biological correlates of anti- social behavior and study the biochemical, genetic, and neurological linkages to crime. Those with a sociological orientation look at the social forces
  • 103. producing criminal behavior, including neighborhood conditions, poverty, socialization, and group inter- action. Their belief is that people are a “product of their environment” and anyone living in substandard conditions could be at risk to crime. Kids are deeply affected by what goes on in their family, school, and neighborhood, and these are the keys to understanding the development of antisocial behavior. on november 13, 2015, 130 people were killed and another 350 injured in a series of terror attacks across Paris, including at the Stade de France (the French national stadium), at cafés and restaurants, and at the Bataclan Theater, where a concert was taking place. The attacks began when bombs were set off outside the Stade de France during a soccer match between France and germany. Hundreds of people ran from the stadium in panic. The islamic State (iS) claimed responsibility for the attacks, which involved groups of jihadists who simultaneously attacked numerous sites in the city. Soon after, French President François Hollande closed the nation’s borders and declared a state of emergency. The Paris attacks prompted massive retaliation on iS installations by France, the United States, and Russia. Criminologists conduct research on discovering what prompts people to join terror groups and what can be done to dissuade them from joining. A P Im ag
  • 104. es /C hr is to ph e En a Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 7Chapter 1 ■ CRiMe and CRiMinology Pinning down “one true cause” of crime remains a difficult problem because most people, even those living in the poorest disorganized neighborhood, or who suffered abuse and neglect as children, do not become
  • 105. criminals. If they did, there would be a lot more crimes committed each year than now occur. Since most of us are law abiding, despite enduring many social and psychological problems, it’s tough to pinpoint the conditions that inevitably lead to a criminal way of life. Crim- inologists are still unsure why, given similar conditions, some people choose crimi- nal solutions to their problems, whereas others conform to accepted social rules of behavior. Explaining Criminal Behavior Another subarea of criminology involves research on specific criminal types and pat- terns: violent crime, theft crime, public order crime, organized crime, and so on. Nu- merous attempts have been made to describe and understand particular crime types. Marvin Wolfgang’s 1958 study Patterns in Criminal Homicide is a landmark analysis of the nature of homicide and the relationship between victim and offender. Wolfgang discovered that in many instances victims caused or precipitated the violent con- frontation that led to their death, spawning the term victim- precipitated homicide.11 Edwin Sutherland’s pioneering analysis of business-related offenses also helped coin a new phrase, white-collar crime, to describe economic crime activities of the affluent.12 Criminologists are constantly broadening the scope of their inquiry because
  • 106. new crimes and crime patterns are constantly emerging. Whereas 50 years ago they might have focused their attention on rape, murder, and burglary, they now may be looking at stalking, environmental crimes, cybercrime, terrorism, and hate crimes. Take for instance Internet porn, something that began being widely used in the 1990s and has been more frequently viewed ever since, especially by the younger generation.13 Today 46 percent of men and 16 percent of women between the ages of 18 and 39 intentionally view pornography in a given week.14 At the same time, there has been public outrage over sexual assaults on college campuses; several studies indicate that a substantial proportion of female students—between 18 and 20 percent—experience rape or some other form of sexual assault during their col- lege years.15 Is there a link between these two phenomena? To answer this ques- tion, criminologists are conducting research aimed at determining whether people who view pornography are also more likely to commit violence against women. So far the evidence finds a connection: watching Internet porn and sexual violence may actually be related.16 Penology: Punishment, Sanctions, and Corrections The study of penology involves efforts to control crime through the correction of criminal offenders. Some criminologists advocate a therapeutic approach to crime prevention that relies on the application of rehabilitation
  • 107. services; they direct their efforts at identifying effective treatment strategies for individuals convicted of law violations, such as relying on community sentencing rather than prison. Others argue that crime can be prevented only through the application of formal social control, through such measures as mandatory sentences for serious crimes and even the use of capital punishment as a deterrent to murder. Criminologists interested in penology direct their research efforts at evaluating the effectiveness of crime control programs and searching for effective treatments that can significantly lower recidivism rates. An evaluation of the Risk-Need- Responsivity (RNR) program, which classifies people on probation and orders the placement of some in anger management and cognitive behavioral therapy pro- grams, has been found to cut the recidivism of high-risk offenders by as much as 20 percent.17 Not all penological measures work as expected. One might assume that inmates placed in the most punitive high-security prisons will “learn their lesson” and not victim-precipitated homicide Refers to those killings in which the victim is a direct, positive precipitator of the incident. white-collar crime
  • 108. Illegal acts that capitalize on a person’s status in the marketplace. White-collar crimes may include theft, embezzlement, fraud, market manipulation, restraint of trade, and false advertising. penology Subarea of criminology that focuses on the correction and control of criminal offenders. rehabilitation Treatment of criminal offenders that is aimed at preventing future criminal behavior. mandatory sentences A statutory requirement that a certain penalty shall be carried out in all cases of conviction for a specified offense or series of offenses. capital punishment The execution of criminal offenders; the death penalty. recidivism Relapse into criminal behavior after apprehension, conviction, and correction for a previous crime. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed
  • 109. from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2019 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 8 Part 1 ■ CONCEPTS OF CRIME, LAW, AND CRIMINOLOGY dare to repeat their criminal offense. However, research shows that being sent to a high-security prison exposes inmates to the most violent peers who have a higher propensity for crime. This exposure may actually increase criminal behavior, rein- force antisocial attitudes, and ultimately increase recidivism—a finding that supports the need for careful penological research.18 Victimology Criminologists recognize that the victim plays a critical role in the criminal process and that the victim’s behavior is often a key determinant of crime.19 Victimology includes the following areas of interest: ●● Using victim surveys to measure the nature and extent of criminal behavior and to calculate the actual costs of crime to victims