![]() Third, it offers clear cues for policy and crime-prevention, as seen in “situational crime prevention” strategies that draw on RAT. Second, its clear analytical schema permits relatively straightforward application across a range of scenarios. First, it is an established and widely mobilized theory that has been used to analyze various forms of criminal behavior, including burglary (Cohen and Felson 1979), homicide (Messner and Tardiff 1985), automobile theft (Rice and Csmith 2002), and domestic violence (Mannon 1997). The choice of RAT as a “test case” for criminological theory’s purchase on cybercrime arises, perhaps, from a number of factors. The greater part of such discussion has focused on situational theories of crime, in particular the Routine Activities Theory (henceforth RAT) developed by Cohen and Felson ( 1979). This question turns on whether, if, or to what extent theoretical concepts developed in relation to the “terrestrial” world can be legitimately applied to a supposedly novel “virtual” environment. One of the more intriguing issues facing cybercrime scholarship relates to the efficacy or otherwise of established criminological theories in understanding or explaining patterns of on-line offending and victimization. ![]() Over the past two decades, there has emerged a substantial body of scholarship that addresses a wide range of on-line offenses, including computer “hacking,” the distribution of malicious software, software and media “piracy,” fraud, stalking, bullying, the distribution of obscene and hateful representations, and sexual victimization of both adults and children. The study of cybercrimes (offenses that involve and depend on the use of new communication technologies for their commission) is now an established area of criminological research.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |