Criminal Law: Rational Theory, Routine Activities Theory, Computer Criminal Profiling, Suspicious Behaviour Detection, and Criminological Approaches
VerifiedAdded on 2023/05/28
|7
|1476
|56
AI Summary
This article discusses rational theory, routine activities theory, computer criminal profiling, suspicious behaviour detection, and criminological approaches in criminal law. It explores the predictors for different forms of cybercrime and deviance.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Criminal law
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TABLE OF CONTENTS
Question 1........................................................................................................................................3
Question 2........................................................................................................................................3
Question 3........................................................................................................................................4
Question 4........................................................................................................................................5
References........................................................................................................................................6
Question 1........................................................................................................................................3
Question 2........................................................................................................................................3
Question 3........................................................................................................................................4
Question 4........................................................................................................................................5
References........................................................................................................................................6
QUESTION 1
The rational theory is dependent on the basic beliefs of classical criminology, which hold that
populace liberally in choosing their actions and are provoked by the evasion of pain and the
chase of pleasure. Persons assess their choice of actions in agreement with every option's
aptitude to create benefit, enjoyment and pleasure (Simpson, and Paternoster, 2017). The micro
viewpoint is provided by rational choice on why entity offenders make a decision to commit
precise offences; people make a decision to connect with crime as it can be satisfying, simple,
pleasing and enjoyable. The major principle of this theory is that people are rational beings
whose performance can be forbidden or modified by fear of penalty. Therefore it can be
supposed that offenders can be convinced to cease from criminal by growing their fear of
penalty. For setting the quantum of penalty, as per the approach sanctions must be limited to
what is essential to discourage public from going into crime (Lambert, 2017).
On the other hand Routine activities theory is supplementary of rational choice theory. It is
introduced by Cohen and Felson, in 1979. As per the routine activities approach for the
happening of the crime it requires three important elements that are an aggravated criminal with
wrong intentions and the aptitude to take action on this proclivity, an appropriate fatality or
objective, and the nonappearance of a competent protector who can stop the crime from
occurring. However, these three elements should be meeting on time and space for an offence to
take place (Felson, 2017).
Routine activities theory provides a worldwide outlook on crime in that it forecast how
alterations in social and economic conditions pressure the overall crime and persecution rate
(Pyrooz et al. 2015).
QUESTION 2
Yes, it is impossible for the computer criminal to stereotype as criminal activity is not of one
kind in involves offenses in various areas for example information technology infrastructure, as
well as prohibited access (illegal access), against the law interception (data meddling (illegal
damaging, removal, worsening, modification or containment of computer data), systems
The rational theory is dependent on the basic beliefs of classical criminology, which hold that
populace liberally in choosing their actions and are provoked by the evasion of pain and the
chase of pleasure. Persons assess their choice of actions in agreement with every option's
aptitude to create benefit, enjoyment and pleasure (Simpson, and Paternoster, 2017). The micro
viewpoint is provided by rational choice on why entity offenders make a decision to commit
precise offences; people make a decision to connect with crime as it can be satisfying, simple,
pleasing and enjoyable. The major principle of this theory is that people are rational beings
whose performance can be forbidden or modified by fear of penalty. Therefore it can be
supposed that offenders can be convinced to cease from criminal by growing their fear of
penalty. For setting the quantum of penalty, as per the approach sanctions must be limited to
what is essential to discourage public from going into crime (Lambert, 2017).
On the other hand Routine activities theory is supplementary of rational choice theory. It is
introduced by Cohen and Felson, in 1979. As per the routine activities approach for the
happening of the crime it requires three important elements that are an aggravated criminal with
wrong intentions and the aptitude to take action on this proclivity, an appropriate fatality or
objective, and the nonappearance of a competent protector who can stop the crime from
occurring. However, these three elements should be meeting on time and space for an offence to
take place (Felson, 2017).
Routine activities theory provides a worldwide outlook on crime in that it forecast how
alterations in social and economic conditions pressure the overall crime and persecution rate
(Pyrooz et al. 2015).
QUESTION 2
Yes, it is impossible for the computer criminal to stereotype as criminal activity is not of one
kind in involves offenses in various areas for example information technology infrastructure, as
well as prohibited access (illegal access), against the law interception (data meddling (illegal
damaging, removal, worsening, modification or containment of computer data), systems
intrusions (intrusive with the performance of a computer system by inputting, broadcasting ,
destructive, deleting, worsening, changing or stifling computer data), mistreatment of devices,
fake and electronic deception(Kappeler, and Potter, 2017).
Various efforts are made on profiling virtual criminal, and moreover, computers have considered
the criminals whose main objective relates to the computers (Schultz, 2002). For instance, as per
the investigation computer criminals were divided among the following category – Computer
crackers which include groups and persons, Computer criminals include spying and
deception/abuse, Vandals includes strangers and users. In another investigation, hackers were
labelled as, middle-class, white, obsessive antisocial males among 12 and 28 years old, with an
inadequacy multifaceted and probable history of corporeal and sexual mistreatment (Roberts,
2018). Apart from these various efforts are made to create general profiles of computer criminals
with the help of data available from media reports, criminal interviews, and subjective
observations. However, such efforts to generate inductive outline give a common impression of
precedent criminals and perhaps helpful for identifying and treating connected mental
confusions, they are of inadequate use in a study of criminology (Merriam-Webster, 2017).
QUESTION 3
A unified framework is suggested to examine the behaviour of the agent from prior information
and external explanation for detecting suspicious behaviour. A novel efficient encoding is
proposed from the perspective of behaviour analysis and that in refereed as a spatial-activity
matrix. Matrix is competent to detain behaviour dynamics in a precise time period by means of
spatiotemporal features. Moreover, its visualization allows for the visual evaluation of diverse
behaviour patterns (Jiang, Cui, and Faloutsos, 2016). Furthermore, a feature extraction technique
is offered which depends on principal component analysis, for reducing the dimensionality of the
spatial activity matrix. Further, a clear problem report is presented which is useful in setting up a
theoretical framework for detecting irregular and doubtful behaviour. Agent traces the behaviour
for demonstrating how optimally perform detection. The well-known theoretical framework is
extended to demonstrate and to carry out findings when the agent is experiential over longer
periods of time, and no major event is adequate to arrive at a decision. Various conditions are
identified which any sensible detector be supposed to satisfy, examine numerous detectors, and
destructive, deleting, worsening, changing or stifling computer data), mistreatment of devices,
fake and electronic deception(Kappeler, and Potter, 2017).
Various efforts are made on profiling virtual criminal, and moreover, computers have considered
the criminals whose main objective relates to the computers (Schultz, 2002). For instance, as per
the investigation computer criminals were divided among the following category – Computer
crackers which include groups and persons, Computer criminals include spying and
deception/abuse, Vandals includes strangers and users. In another investigation, hackers were
labelled as, middle-class, white, obsessive antisocial males among 12 and 28 years old, with an
inadequacy multifaceted and probable history of corporeal and sexual mistreatment (Roberts,
2018). Apart from these various efforts are made to create general profiles of computer criminals
with the help of data available from media reports, criminal interviews, and subjective
observations. However, such efforts to generate inductive outline give a common impression of
precedent criminals and perhaps helpful for identifying and treating connected mental
confusions, they are of inadequate use in a study of criminology (Merriam-Webster, 2017).
QUESTION 3
A unified framework is suggested to examine the behaviour of the agent from prior information
and external explanation for detecting suspicious behaviour. A novel efficient encoding is
proposed from the perspective of behaviour analysis and that in refereed as a spatial-activity
matrix. Matrix is competent to detain behaviour dynamics in a precise time period by means of
spatiotemporal features. Moreover, its visualization allows for the visual evaluation of diverse
behaviour patterns (Jiang, Cui, and Faloutsos, 2016). Furthermore, a feature extraction technique
is offered which depends on principal component analysis, for reducing the dimensionality of the
spatial activity matrix. Further, a clear problem report is presented which is useful in setting up a
theoretical framework for detecting irregular and doubtful behaviour. Agent traces the behaviour
for demonstrating how optimally perform detection. The well-known theoretical framework is
extended to demonstrate and to carry out findings when the agent is experiential over longer
periods of time, and no major event is adequate to arrive at a decision. Various conditions are
identified which any sensible detector be supposed to satisfy, examine numerous detectors, and
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
suggest a new approach, which is known as an F-UPR detector, that helps to generalize utility-
based plan gratitude with arbitrary utility functions(Pereira and Symantec Corp, 2015).
QUESTION 4
In routine life internet and computers plays an essential role in providing knowledge regarding
the dynamics of cybercrime and those mistreated by (Luo, at.el, 2016).The
anthology Cybercrime and Criminological Theory are helpful in primary Readings on Piracy,
Hacking, Harassment, and Theft. These approaches discover the predictors for contribution in
different forms of cybercrime and deviance. It includes widespread troubles such as media
piracy, to more diverse crimes like computer hacking. Mainly criminological approaches were
come into practice to report the street crimes; consequently, it is indistinct those how such
theories might be relevant to virtual criminal. Therefore it offers critical insight into the
usefulness of several theories to describe cybercrimes (Clinard, 2017).
Cybercrime and Criminological approaches provide direct insight within the rates and
occurrence of cybercrime. It provides a fundamental understanding to the readers, moreover
approval for diverse forms of cybercrime, and outlines potential predictors together for criminal
and persecution. These approaches are helpful to improve the lawful, technological, and strategic
responses to cybercrimes (Cohen, 2017).
based plan gratitude with arbitrary utility functions(Pereira and Symantec Corp, 2015).
QUESTION 4
In routine life internet and computers plays an essential role in providing knowledge regarding
the dynamics of cybercrime and those mistreated by (Luo, at.el, 2016).The
anthology Cybercrime and Criminological Theory are helpful in primary Readings on Piracy,
Hacking, Harassment, and Theft. These approaches discover the predictors for contribution in
different forms of cybercrime and deviance. It includes widespread troubles such as media
piracy, to more diverse crimes like computer hacking. Mainly criminological approaches were
come into practice to report the street crimes; consequently, it is indistinct those how such
theories might be relevant to virtual criminal. Therefore it offers critical insight into the
usefulness of several theories to describe cybercrimes (Clinard, 2017).
Cybercrime and Criminological approaches provide direct insight within the rates and
occurrence of cybercrime. It provides a fundamental understanding to the readers, moreover
approval for diverse forms of cybercrime, and outlines potential predictors together for criminal
and persecution. These approaches are helpful to improve the lawful, technological, and strategic
responses to cybercrimes (Cohen, 2017).
REFERENCES
Clinard, M.B., (2017). Criminological theories of violations of wartime regulations. In White-
collar Criminal (pp. 3-19). Routledge.
Cohen, S., (2017). Against criminology. Routledge.
Felson, M., (2017). Linking criminal choices, routine activities, informal control, and criminal
outcomes. In The reasoning criminal (pp. 119-128). Routledge.
Jiang, M., Cui, P. and Faloutsos, C., (2016). Suspicious behavior detection: Current trends and
future directions. IEEE Intelligent Systems, 31(1), pp.31-39.
Kappeler, V.E. and Potter, G.W., (2017). The mythology of crime and criminal justice. Waveland
Press.
Lambert, R.D., (2017). Routine Activity and Rational Choice: Volume 5. Routledge.
Luo, P., Torres, R., Zhang, Z.L., Saha, S., Lee, S.J. and Nucci, A., Narus Inc, (2016). Detecting
suspicious network behaviours based on domain name service failures. U.S. Patent 9,245,121.
Merriam-Webster, (2017). Criminology expert at Lausanne University told Geneva’s daily
newspaper, Le Temps. [Online]. Available through
<https://www.merriam-webster.com/dictionary/criminology>. [Accessed on 13th January 2019].
Pereira, S., Symantec Corp, (2015). Systems and methods for scanning packed programs in
response to detecting suspicious behaviours. U.S. Patent 9,171,154.
Pyrooz, D.C., Decker, S.H. and Moule Jr, R.K., (2015). Criminal and routine activities in online
settings: Gangs, offenders, and the Internet. Justice Quarterly, 32(3), pp.471-499.
Roberts, J., (2018). Public opinion, crime, and criminal justice. Routledge.
Schultz, E.E. (2002). A framework for understanding and predicting insider attacks. Computers
& Security. 21(6) pp.526-531. DOI: 10.1016/S0167-4048(02)01009-X.
Clinard, M.B., (2017). Criminological theories of violations of wartime regulations. In White-
collar Criminal (pp. 3-19). Routledge.
Cohen, S., (2017). Against criminology. Routledge.
Felson, M., (2017). Linking criminal choices, routine activities, informal control, and criminal
outcomes. In The reasoning criminal (pp. 119-128). Routledge.
Jiang, M., Cui, P. and Faloutsos, C., (2016). Suspicious behavior detection: Current trends and
future directions. IEEE Intelligent Systems, 31(1), pp.31-39.
Kappeler, V.E. and Potter, G.W., (2017). The mythology of crime and criminal justice. Waveland
Press.
Lambert, R.D., (2017). Routine Activity and Rational Choice: Volume 5. Routledge.
Luo, P., Torres, R., Zhang, Z.L., Saha, S., Lee, S.J. and Nucci, A., Narus Inc, (2016). Detecting
suspicious network behaviours based on domain name service failures. U.S. Patent 9,245,121.
Merriam-Webster, (2017). Criminology expert at Lausanne University told Geneva’s daily
newspaper, Le Temps. [Online]. Available through
<https://www.merriam-webster.com/dictionary/criminology>. [Accessed on 13th January 2019].
Pereira, S., Symantec Corp, (2015). Systems and methods for scanning packed programs in
response to detecting suspicious behaviours. U.S. Patent 9,171,154.
Pyrooz, D.C., Decker, S.H. and Moule Jr, R.K., (2015). Criminal and routine activities in online
settings: Gangs, offenders, and the Internet. Justice Quarterly, 32(3), pp.471-499.
Roberts, J., (2018). Public opinion, crime, and criminal justice. Routledge.
Schultz, E.E. (2002). A framework for understanding and predicting insider attacks. Computers
& Security. 21(6) pp.526-531. DOI: 10.1016/S0167-4048(02)01009-X.
Simpson, S. and Paternoster, R., (2017). A rational choice theory of corporate crime. In Routine
activity and rational choice (pp. 37-58). Routledge.
activity and rational choice (pp. 37-58). Routledge.
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.