SlideShare a Scribd company logo
Motive is one of the main themes that law enforcement must identify in order to prevent future
crimes. Law enforcement utilizes the science of criminology to understand criminality and
identify potential criminals.
Identify at least two criminology theories.
Apply these theories to computer crimes and to the individuals’ motives for using technology to
further their crimes.
Solution
CRIMINOLOGY THEORIES
1.Learning theories tend to follow the lead of Edwin Sutherland's theory of differential
association, developed in 1947, although ideas about imitation or modeling go back to 1890.
Often oversimplified as "peer group" theories, learning is much more than that, and involves
the analysis of what is positively and negatively rewarding (reinforcing) for individuals.
2. Psychological criminology has been around since 1914, and attempts to explain the consistent
finding that there is an eight-point IQ difference between criminals and noncriminals. That gap
isn't enough to notice, but it might make them more impulsive and foolhardy, and even smart
people with high IQs are vulnerable to folly. Other psychocriminologists focus on personality
disorders, like the psychopaths, sociopaths, and antisocial personalities.
Criminology theories of computer crimes
Psychoanalytic Theories
Psychoanalytic theory, as developed by Freud, has taken a somewhat indirect approach in
explaining criminal behaviour. It relies on the pathological process by which criminal acts are
thought to be manifested (Blackburn, 1993).
Freud believed that there was an inner moral agency (superego) governing conduct, whose
development depends primarily on satisfying parent-child relationships (Blackburn, 1993).
Inadequate superego formation and function accounts for criminal behaviour (Blackburn, 1993).
Behaviour therefore depends on the balance of the psychic energy system. A disturbance in this
system or any component structure produces maladaptive development (Blackburn, 1993).
Learning Theories
Learning theory approaches to explaining criminal behaviour have links to one of the core
sociological theories of crime, the differential association theory
Criminology theories to the individuals
Critical Theory: Critical theory upholds the belief that a small few, the elite of the society, decide
laws and the definition of crime; those who commit crimes disagree with the laws that were
created to keep control of them.
Critical criminology sees crime as a product of oppression of workers, (particularly, the poorer
sections) and less advantaged groups within society, such as women and ethnic minorities, are
seen to be the most likely to suffer oppressive social relations based upon class division, sexism
and racism. More simply, critical criminology may be defined as any criminological topic area
that takes into account the contextual factors of crime or critiques topics covered in mainstream
criminology
Choice Theory – Choice theory is the belief that individuals choose to commit a crime, looking
at the opportunities before them, weighing the benefit versus the punishment, and deciding
whether to proceed or not. This cost-benefit analysis primarily focuses on the idea that we all
have the choice to proceed with our actions. Because of the punishment involved, we are
deterred from committing the crime.

More Related Content

More from fabmallkochi

Establish the identity sin (2theta)[costheta+cos(3theta)]=-cos(2the.pdf
Establish the identity sin (2theta)[costheta+cos(3theta)]=-cos(2the.pdfEstablish the identity sin (2theta)[costheta+cos(3theta)]=-cos(2the.pdf
Establish the identity sin (2theta)[costheta+cos(3theta)]=-cos(2the.pdf
fabmallkochi
 
Discuss the requirements for developing a Security Education, Tranin.pdf
Discuss the requirements for developing a Security Education, Tranin.pdfDiscuss the requirements for developing a Security Education, Tranin.pdf
Discuss the requirements for developing a Security Education, Tranin.pdf
fabmallkochi
 
Determine whether or not the vectors are linearly dependent. Determi.pdf
Determine whether or not the vectors are linearly dependent. Determi.pdfDetermine whether or not the vectors are linearly dependent. Determi.pdf
Determine whether or not the vectors are linearly dependent. Determi.pdf
fabmallkochi
 
DBA1. Provide five reasons for creating a conceptual data model..pdf
DBA1. Provide five reasons for creating a conceptual data model..pdfDBA1. Provide five reasons for creating a conceptual data model..pdf
DBA1. Provide five reasons for creating a conceptual data model..pdf
fabmallkochi
 
By using MIMO technique, the throughput can be increased greatly wit.pdf
By using MIMO technique, the throughput can be increased greatly wit.pdfBy using MIMO technique, the throughput can be increased greatly wit.pdf
By using MIMO technique, the throughput can be increased greatly wit.pdf
fabmallkochi
 
Between 1840 and 1850, the United States gained one-third more land .pdf
Between 1840 and 1850, the United States gained one-third more land .pdfBetween 1840 and 1850, the United States gained one-third more land .pdf
Between 1840 and 1850, the United States gained one-third more land .pdf
fabmallkochi
 
An ethic of virtue implies that moral relativism is correct, while.pdf
An ethic of virtue implies that moral relativism is correct, while.pdfAn ethic of virtue implies that moral relativism is correct, while.pdf
An ethic of virtue implies that moral relativism is correct, while.pdf
fabmallkochi
 
A survey of large Latin American firms showed that many have expande.pdf
A survey of large Latin American firms showed that many have expande.pdfA survey of large Latin American firms showed that many have expande.pdf
A survey of large Latin American firms showed that many have expande.pdf
fabmallkochi
 
April 18, 2018, Lora and Andrew Buck come to your law office for an .pdf
April 18, 2018, Lora and Andrew Buck come to your law office for an .pdfApril 18, 2018, Lora and Andrew Buck come to your law office for an .pdf
April 18, 2018, Lora and Andrew Buck come to your law office for an .pdf
fabmallkochi
 
4. Which pair of elements has the smaller element listed first (a) A.pdf
4. Which pair of elements has the smaller element listed first (a) A.pdf4. Which pair of elements has the smaller element listed first (a) A.pdf
4. Which pair of elements has the smaller element listed first (a) A.pdf
fabmallkochi
 
6. Compare the Populist and Progressive movements. Critically analy.pdf
6. Compare the Populist and Progressive movements. Critically analy.pdf6. Compare the Populist and Progressive movements. Critically analy.pdf
6. Compare the Populist and Progressive movements. Critically analy.pdf
fabmallkochi
 
Why do we believe galaxy clusters are rich in dark matter What is b.pdf
Why do we believe galaxy clusters are rich in dark matter  What is b.pdfWhy do we believe galaxy clusters are rich in dark matter  What is b.pdf
Why do we believe galaxy clusters are rich in dark matter What is b.pdf
fabmallkochi
 
Write a C code to perform the following tasks In main Define an arr.pdf
Write a C code to perform the following tasks In main Define an arr.pdfWrite a C code to perform the following tasks In main Define an arr.pdf
Write a C code to perform the following tasks In main Define an arr.pdf
fabmallkochi
 
Which of the following is trueThe definition of tool is too variabl.pdf
Which of the following is trueThe definition of tool is too variabl.pdfWhich of the following is trueThe definition of tool is too variabl.pdf
Which of the following is trueThe definition of tool is too variabl.pdf
fabmallkochi
 
Who are we as a country With all the demographic changes currently .pdf
Who are we as a country With all the demographic changes currently .pdfWho are we as a country With all the demographic changes currently .pdf
Who are we as a country With all the demographic changes currently .pdf
fabmallkochi
 
Using Theodore Levitt’s central thesis of The Globalization of mar.pdf
Using Theodore Levitt’s central thesis of The Globalization of mar.pdfUsing Theodore Levitt’s central thesis of The Globalization of mar.pdf
Using Theodore Levitt’s central thesis of The Globalization of mar.pdf
fabmallkochi
 
1. Give five reasons why a person might want to extract DNA from cel.pdf
1. Give five reasons why a person might want to extract DNA from cel.pdf1. Give five reasons why a person might want to extract DNA from cel.pdf
1. Give five reasons why a person might want to extract DNA from cel.pdf
fabmallkochi
 
Transfer taxes are handled under which tax topics Transfer ta.pdf
Transfer taxes are handled under which tax topics  Transfer ta.pdfTransfer taxes are handled under which tax topics  Transfer ta.pdf
Transfer taxes are handled under which tax topics Transfer ta.pdf
fabmallkochi
 
This project creates a custom linked list structure. It serves.pdf
This project creates a custom linked list structure.      It serves.pdfThis project creates a custom linked list structure.      It serves.pdf
This project creates a custom linked list structure. It serves.pdf
fabmallkochi
 
The researchers found RNA, but that was not enough to conclude that t.pdf
The researchers found RNA, but that was not enough to conclude that t.pdfThe researchers found RNA, but that was not enough to conclude that t.pdf
The researchers found RNA, but that was not enough to conclude that t.pdf
fabmallkochi
 

More from fabmallkochi (20)

Establish the identity sin (2theta)[costheta+cos(3theta)]=-cos(2the.pdf
Establish the identity sin (2theta)[costheta+cos(3theta)]=-cos(2the.pdfEstablish the identity sin (2theta)[costheta+cos(3theta)]=-cos(2the.pdf
Establish the identity sin (2theta)[costheta+cos(3theta)]=-cos(2the.pdf
 
Discuss the requirements for developing a Security Education, Tranin.pdf
Discuss the requirements for developing a Security Education, Tranin.pdfDiscuss the requirements for developing a Security Education, Tranin.pdf
Discuss the requirements for developing a Security Education, Tranin.pdf
 
Determine whether or not the vectors are linearly dependent. Determi.pdf
Determine whether or not the vectors are linearly dependent. Determi.pdfDetermine whether or not the vectors are linearly dependent. Determi.pdf
Determine whether or not the vectors are linearly dependent. Determi.pdf
 
DBA1. Provide five reasons for creating a conceptual data model..pdf
DBA1. Provide five reasons for creating a conceptual data model..pdfDBA1. Provide five reasons for creating a conceptual data model..pdf
DBA1. Provide five reasons for creating a conceptual data model..pdf
 
By using MIMO technique, the throughput can be increased greatly wit.pdf
By using MIMO technique, the throughput can be increased greatly wit.pdfBy using MIMO technique, the throughput can be increased greatly wit.pdf
By using MIMO technique, the throughput can be increased greatly wit.pdf
 
Between 1840 and 1850, the United States gained one-third more land .pdf
Between 1840 and 1850, the United States gained one-third more land .pdfBetween 1840 and 1850, the United States gained one-third more land .pdf
Between 1840 and 1850, the United States gained one-third more land .pdf
 
An ethic of virtue implies that moral relativism is correct, while.pdf
An ethic of virtue implies that moral relativism is correct, while.pdfAn ethic of virtue implies that moral relativism is correct, while.pdf
An ethic of virtue implies that moral relativism is correct, while.pdf
 
A survey of large Latin American firms showed that many have expande.pdf
A survey of large Latin American firms showed that many have expande.pdfA survey of large Latin American firms showed that many have expande.pdf
A survey of large Latin American firms showed that many have expande.pdf
 
April 18, 2018, Lora and Andrew Buck come to your law office for an .pdf
April 18, 2018, Lora and Andrew Buck come to your law office for an .pdfApril 18, 2018, Lora and Andrew Buck come to your law office for an .pdf
April 18, 2018, Lora and Andrew Buck come to your law office for an .pdf
 
4. Which pair of elements has the smaller element listed first (a) A.pdf
4. Which pair of elements has the smaller element listed first (a) A.pdf4. Which pair of elements has the smaller element listed first (a) A.pdf
4. Which pair of elements has the smaller element listed first (a) A.pdf
 
6. Compare the Populist and Progressive movements. Critically analy.pdf
6. Compare the Populist and Progressive movements. Critically analy.pdf6. Compare the Populist and Progressive movements. Critically analy.pdf
6. Compare the Populist and Progressive movements. Critically analy.pdf
 
Why do we believe galaxy clusters are rich in dark matter What is b.pdf
Why do we believe galaxy clusters are rich in dark matter  What is b.pdfWhy do we believe galaxy clusters are rich in dark matter  What is b.pdf
Why do we believe galaxy clusters are rich in dark matter What is b.pdf
 
Write a C code to perform the following tasks In main Define an arr.pdf
Write a C code to perform the following tasks In main Define an arr.pdfWrite a C code to perform the following tasks In main Define an arr.pdf
Write a C code to perform the following tasks In main Define an arr.pdf
 
Which of the following is trueThe definition of tool is too variabl.pdf
Which of the following is trueThe definition of tool is too variabl.pdfWhich of the following is trueThe definition of tool is too variabl.pdf
Which of the following is trueThe definition of tool is too variabl.pdf
 
Who are we as a country With all the demographic changes currently .pdf
Who are we as a country With all the demographic changes currently .pdfWho are we as a country With all the demographic changes currently .pdf
Who are we as a country With all the demographic changes currently .pdf
 
Using Theodore Levitt’s central thesis of The Globalization of mar.pdf
Using Theodore Levitt’s central thesis of The Globalization of mar.pdfUsing Theodore Levitt’s central thesis of The Globalization of mar.pdf
Using Theodore Levitt’s central thesis of The Globalization of mar.pdf
 
1. Give five reasons why a person might want to extract DNA from cel.pdf
1. Give five reasons why a person might want to extract DNA from cel.pdf1. Give five reasons why a person might want to extract DNA from cel.pdf
1. Give five reasons why a person might want to extract DNA from cel.pdf
 
Transfer taxes are handled under which tax topics Transfer ta.pdf
Transfer taxes are handled under which tax topics  Transfer ta.pdfTransfer taxes are handled under which tax topics  Transfer ta.pdf
Transfer taxes are handled under which tax topics Transfer ta.pdf
 
This project creates a custom linked list structure. It serves.pdf
This project creates a custom linked list structure.      It serves.pdfThis project creates a custom linked list structure.      It serves.pdf
This project creates a custom linked list structure. It serves.pdf
 
The researchers found RNA, but that was not enough to conclude that t.pdf
The researchers found RNA, but that was not enough to conclude that t.pdfThe researchers found RNA, but that was not enough to conclude that t.pdf
The researchers found RNA, but that was not enough to conclude that t.pdf
 

Recently uploaded

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 

Recently uploaded (20)

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 

Motive is one of the main themes that law enforcement must identify .pdf

  • 1. Motive is one of the main themes that law enforcement must identify in order to prevent future crimes. Law enforcement utilizes the science of criminology to understand criminality and identify potential criminals. Identify at least two criminology theories. Apply these theories to computer crimes and to the individuals’ motives for using technology to further their crimes. Solution CRIMINOLOGY THEORIES 1.Learning theories tend to follow the lead of Edwin Sutherland's theory of differential association, developed in 1947, although ideas about imitation or modeling go back to 1890. Often oversimplified as "peer group" theories, learning is much more than that, and involves the analysis of what is positively and negatively rewarding (reinforcing) for individuals. 2. Psychological criminology has been around since 1914, and attempts to explain the consistent finding that there is an eight-point IQ difference between criminals and noncriminals. That gap isn't enough to notice, but it might make them more impulsive and foolhardy, and even smart people with high IQs are vulnerable to folly. Other psychocriminologists focus on personality disorders, like the psychopaths, sociopaths, and antisocial personalities. Criminology theories of computer crimes Psychoanalytic Theories Psychoanalytic theory, as developed by Freud, has taken a somewhat indirect approach in explaining criminal behaviour. It relies on the pathological process by which criminal acts are thought to be manifested (Blackburn, 1993). Freud believed that there was an inner moral agency (superego) governing conduct, whose development depends primarily on satisfying parent-child relationships (Blackburn, 1993). Inadequate superego formation and function accounts for criminal behaviour (Blackburn, 1993). Behaviour therefore depends on the balance of the psychic energy system. A disturbance in this system or any component structure produces maladaptive development (Blackburn, 1993). Learning Theories Learning theory approaches to explaining criminal behaviour have links to one of the core sociological theories of crime, the differential association theory Criminology theories to the individuals Critical Theory: Critical theory upholds the belief that a small few, the elite of the society, decide laws and the definition of crime; those who commit crimes disagree with the laws that were
  • 2. created to keep control of them. Critical criminology sees crime as a product of oppression of workers, (particularly, the poorer sections) and less advantaged groups within society, such as women and ethnic minorities, are seen to be the most likely to suffer oppressive social relations based upon class division, sexism and racism. More simply, critical criminology may be defined as any criminological topic area that takes into account the contextual factors of crime or critiques topics covered in mainstream criminology Choice Theory – Choice theory is the belief that individuals choose to commit a crime, looking at the opportunities before them, weighing the benefit versus the punishment, and deciding whether to proceed or not. This cost-benefit analysis primarily focuses on the idea that we all have the choice to proceed with our actions. Because of the punishment involved, we are deterred from committing the crime.