Embedded
Title: Embedded
Category: /Science & Technology
Details: Words: 4135 | Pages: 15 (approximately 235 words/page)
Embedded
Category: /Science & Technology
Details: Words: 4135 | Pages: 15 (approximately 235 words/page)
Abstract
This thesis explores the relatively new criminal phenomena of computer crime, or as it is more commonly termed, hacking. The foundation for the examination is based on how well traditional psychological theories of crime and deviance explain this new behaviour. Dominant theories in each of the categories of psychoanalytic, learning and control are discussed. The thesis concludes that for the most part, traditional psychological theories are deficient with regard to explaining criminal computer behaviour.
showed first 75 words of 4135 total
You are viewing only a small portion of the paper.
Please login or register to access the full copy.
Please login or register to access the full copy.
showed last 75 words of 4135 total
computer behavior: An exploratory study. Unpublished dissertation.
Stoll, C. (1985). The cuckoos egg: Tracking a spy through the maze of computer espionage. New York: Mass Market Paperback.
Sutherland, E. (1947). Principles of criminology (4th ed.). Philadelphia: Lippincott.
Taylor, P. (1998). Hackers: the hawks and the doves-enemies & friends. Unpublished manuscript.
West, D. (1988). Psychological contributions to criminology. British Journal of Criminology, 28, 77-92.
Wired News. (1998). Analyzer takes notoriety to the bank. Available
HTTP: www.wired.com/news/news/technology/story/11534.html