Premium Essay

Summary: Applying Criminological Theory

Submitted By
Words 370
Pages 2
Applying Criminological Theory to Policy
Through much this class we having been studying theories and how they explain criminal behavior. Many of the theories that were study in this text book help spark and make policy’s in the criminal justice system.
Classical School: Deterrence Theory
Criminologists and theoreticians in the filed do not consider deterrence theory to reduce illegal activity (Tibbetts,2012). It has been noted that Classical School has dominated the criminal justice system and it seen in most policies using three major components law enforcement, courts and corrections (Tibbetts,2012). Deterrence theory of crime associated with the classical school, which proposes that individuals will make rational decisions regarding

Similar Documents

Premium Essay

Asacdacad

...Kong, 2001, 2011. Reprinted 2015. All rights reserved. No part of this material may be reproduced in any form by any means without permission in writing from the President, The Open University of Hong Kong. Sale of this material is prohibited. The Open University of Hong Kong Ho Man Tin, Kowloon Hong Kong This course material is printed on environmentally friendly paper. Contents Introduction 1 The focus of criminology 4 What is criminology? Why study crime? 4 6 Developing theory: the foundations of criminology 8 Theorizing about crime before criminology: the classical perspective Positivist criminology 8 10 Sociological criminology The Chicago School Strain and subcultural theories of crime Control theories The labelling perspective Critical criminology 14 15 17 21 23 27 Environmental criminology 30 Jane Jacobs and Oscar Newman Routine activity theory Rational choice theory 30 33 35 Summary 39 References 41 Feedback on activities 43 Readings Unit 2 Introduction The purpose of this unit is to introduce you to the different kinds of theorizing about crime that have constituted the discipline of criminology. Criminology as an academic discipline has existed for well over 100 years. During this time, a number of distinct approaches have emerged, and it is these different approaches that this unit seeks to capture,...

Words: 19870 - Pages: 80

Premium Essay

Cyber Crime

...Activity Theory Katherine M. Grzybowski Arizona State University 1 March 2012 Cybercrime 1 TABLE OF CONTENTS 1. ABSTRACT .....................................................................................................3 2. INTRODUCTION...........................................................................................4 3. A REVIEW OF CYBERCRIME ...................................................................6 3.1 Cybercrime Legislation ............................................................................7 3.1.1 Federal Laws .................................................................................7 3.1.2 State Laws ......................................................................................9 3.2 Cybercrime Law Enforcement Agencies ................................................11 3.3 Classifying Cybercrime ............................................................................16 3.4 National Levels of Cybercrime ................................................................19 3.4.1 Business Cyber Victimization ......................................................20 3.4.2 Individual Cyber Victimization ...................................................22 4. A REVIEW OF THEORIES..........................................................................26 4.1 Self-control Theory ...................................................................................27 4.2 Routine Activity Theory ......

Words: 13816 - Pages: 56

Premium Essay

This Paper Provides an Overview of the Growing Cybercrime Problem and Reviews Two Criminological Theories That Have Been Applied to the Study of Cybercrime and Cybercrime Victimization. Legislation Which Defines

...and Routine Activity Theory Katherine M. Grzybowski Arizona State University 1 March 2012 Cybercrime 1 TABLE OF CONTENTS 1. ABSTRACT .....................................................................................................3 2. INTRODUCTION...........................................................................................4 3. A REVIEW OF CYBERCRIME ...................................................................6 3.1 Cybercrime Legislation ............................................................................7 3.1.1 3.1.2 Federal Laws .................................................................................7 State Laws ......................................................................................9 3.2 Cybercrime Law Enforcement Agencies ................................................11 3.3 Classifying Cybercrime ............................................................................16 3.4 National Levels of Cybercrime ................................................................19 3.4.1 3.4.2 Business Cyber Victimization ......................................................20 Individual Cyber Victimization ...................................................22 4. A REVIEW OF THEORIES..........................................................................26 4.1 Self-control Theory ...................................................................................27 4.2 Routine Activity Theory ......................

Words: 13816 - Pages: 56

Premium Essay

Theories of Criminology

...Theories of criminology Prof. Dr. Ayman Elzeiny Introduction :- What is Theory? Definitions of the theory Vold, Bernard, and Snipes defined it as :- “an explanation … a sensible relating of some particular phenomenon to the whole field of knowledge” On other hand Bohm defined it as “makes statements about the relationship between two classes of phenomena” Williams and McShane defined it as “generalizations of a sort; explains how two or more events are related” . According to Shoemaker the theory is : “a systematic collection of concepts and statements purporting to explain behavior” . And according to Hoover the theory is “a set of related propositions that suggest why events occur”. We can define theory as "Statement of a relationship between two or more propositions and concepts . which explains and/or predicts some behavior ". Introduction to Theories of criminology : There are many "theories" of criminology suggested by many writers. It would not be practical to list them all. a few only that have received some support. The almost prominent schools of criminology Were : The Classical School, "which began about 1755 to 1764" after Beccaria (1738-94) published his famous Essay on Crimes and Punishments; Along with Beccaria, the thinkers of the Classical School were Rousseau, Montesquieu, Voltaire, Jeremy Bentham, William Blackstone, Samuel Romilly, and others. The Positive School, " which began after the publication of Lombroso's L'uomo...

Words: 14451 - Pages: 58

Free Essay

Crime Causation

...after his conviction, the infamous killer (also known as “The Killer Clown”) said “I should have never been convicted of anything more serious than running a cemetery without a license” (Star Quotes, 2009, p. 1). Obviously, something intrusively wrong resonated in Gacy for him to make such a statement that negated the intensity of his actions. Gacy buried majority of his victims under the crawl space of his home and discarded other victims in the Des Plaines River (Bell & Bardsley, 2011). People often question what would make someone do such vicious and torturous acts on another person. Criminologists developed theories explaining the reasons people deviate from societal norms and commit immoral acts laws prohibit (Schmallenger, 2003). Particularly, in this case, John Wayne Gacy is a person suitable to study. Certainly, a few crime causation theories explain how his upbringing, life experiences, and other deep, underlying issues led him to committing crimes to the extent he did. Gacy’s Background Information Gacy was the only son of three children born to Marion and John Gacy. He had an older sister (Joanne) and younger sister (Karen). The Gacy’s were a middle-classed, Catholic family who lived on the north side of Chicago. As a young boy in middle school, Gacy kept busy by working part-time as a bag boy, delivering newspapers, and participating in Boy Scouts. Even though he was not popular, his teachers liked him, and he had many friends (Lohr, n.d.). To...

Words: 2302 - Pages: 10

Premium Essay

White Collar Crimes

...S E C T I O N II Understanding White-Collar Crime Definitions, Extent, and Consequences S ecti on Hi g h l i g h ts •• •• •• •• •• •• White-Collar Crime: An Evolving Concept Modern Conceptualizations of White-Collar Crime Extent of White-Collar Crime Consequences of White-Collar Crime Public Attitudes About White-Collar Crime Characteristics of White-Collar Offenders A 34 s noted in the introduction, Edwin Sutherland created the concept of white-collar crime more than 70 years ago to draw attention to the fact that crimes are committed by individuals in all social classes. As will be seen in this section, one of the largest difficulties in understanding white-collar crime has centered on an ongoing debate about how to define white-collar crime. After discussing various ways that white-collar crime can be defined, attention will be given to the extent of white-collar crime, the consequences of this illicit behavior, public attitudes about white-collar crime, and patterns describing the characteristics of white-collar offenders. Section II  Understanding White-Collar Crime 35 As a backdrop to this discussion, consider the following recent white-collar crimes described in the media: •• A jury convicted [then-Baltimore mayor Sheila] Dixon . . . of embezzling about $500 worth of gift cards donated to the city for needy families. Dixon then pleaded guilty last month to lying about thousands of dollars in gifts from her former boyfriend, a prominent developer...

Words: 20605 - Pages: 83

Free Essay

Employability of Ex-Convicts

...person with an agreed price or amount of salary. Having a stable job is one thing that every person strives for. It means having something that would help sustain not only the family’s basic needs for everyday life but also to secure one’s future. Unemployment is a stressful life event that can lead to financial difficulties, depression, anxiety, somatic symptoms, and increased substance use. (Wanberg 1999). It results to emotional health problems due to depression and anxiety as well as low self esteem and lose of respect from other people due to the inability to support one’s self and his family. In order to be employed, one of the most common requirements of an employer or a business establishment is that a person applying for work should be of good moral character. In most cases, a job applicant is required to secure clearances from either the National Bureau of Investigation or the Philippine National Police. The clearances serve as certificate of good moral character and behavior. The clearance reveals if a person has a clean police record or if he/she has been already convicted of a crime. The employment situations of ex-convicts are a different story because the certificate secured from the said law enforcement agency reveals that the applicant has a bad record on file. Employers tend to reject people with a criminal record for the following reasons: people with a criminal record are seen, generally, as undesirable, to show moral disapproval; concern...

Words: 9579 - Pages: 39

Premium Essay

Compstat

...MANAGING CRIME AND QUALITY OF LIFE USING COMPSTAT: SPECIFIC ISSUES IN IMPLEMENTATION AND PRACTICE By Dr. Vincent E. Henry* I. INTRODUCTION The highly effective management model or paradigm that has come to be known as Compstat was first developed within the New York Police Department in 1994 as a process for managing crime and quality of life in New York City. Compstat was developed in response to a very specific set of immediate needs confronting the NYPD at that time: the compelling need to bring spiralling rates of crime and disorder to within manageable bounds and to refocus the NYPD on its primary mission of effectively ensuring public safety by reducing crime and violence. Since its introduction in early 1994, Compstat has proven to be highly effective in achieving the goals for which it was initially intended. Over time it has also evolved and grown from a basic and fairly rudimentary process involving the collection and analysis of crime data as well as a mechanism for ensuring accountability and information-sharing into a more complex, more nuanced, and eminently more effective management paradigm. As Compstat grew and changed over time, so too did the issues and problems challenging the NYPD. As crime and public disorder offences declined to within more manageable limits, the agency had the luxury of turning its attention to a range of other management problems and issues. While reducing crime and disorder and increasing public safety have never lost their prominence...

Words: 11197 - Pages: 45

Free Essay

Role of Social Media in Promoting Religious Extremism

...RADIMED Explaining and understanding the role of exposure to new social media on violent extremism. An integrative quantitative and qualitative approach Summary en kwantitatieve benadering/ Commissioners Promoter/coordinator Co-promoters Researchers Belspo FOD Binnenlandse zaken – Directe algemene veiligheid Lieven PAUWELS - UGent Fabienne BRION - UCL Brice DE RUYVER – Ugent Marleen EASTON - Ugent Nele SCHILS – Ugent Julianne LAFFINEUR - UCL 1 1. Introduction Research problem Worldwide, both policy and research pay a lot of attention to extremism, and radicalization as the process leading to extremism (Van de Linde & Rademaker, 2010). Scholars and policymakers increasingly focus on unravelling the processes of radicalisation, hoping to prevent the violent radicalisation of their own youth and eventually political violence (Van de Line & Rademaker, 2010). The Internet and its constant technological developments in particular are causes of concern (Conway, 2012). Recently, we have seen a boom in new social media (NSM) and other web 2.0 applications, bearing a large potential for communication and networking (Conway, 2012). These developments have transformed the world in an online village, with every offline actor being represented online. It is therefore no surprise that criminals, radicals, violent extremists and terrorists also use this medium to their advantage (Benschop, 2006; Stevens & Neuhmann, 2009; Weimann, 2004). By means...

Words: 15802 - Pages: 64

Premium Essay

Nogo Railroad

...THE EFFECT OF SELF-LEADERSHIP AND LOCUS OF CONTROL ON WORK STRESS AMONGST MANAGERS IN THE FINANCIAL SERVICES SECTOR By Agnes Akwa Nde Student number: 2009103587 A Dissertation submitted in Accordance with the Requirements for the Award of a MAGISTER COMMERCII Degree In Industrial Psychology Faculty of Economic and Management Sciences The University of the Free State Supervisor: Prof. Ebben Van Zyl Co-Supervisors: Dr Petrus Nel & Dr Estelle Boshoff Bloemfontein, 2015 DECLARATION I declare that this dissertation hereby submitted by me for a Masters of Commerce degree at the University of the Free State is my own independent work and has not been previously been submitted by me at another university/faculty. I furthermore cede copyright of the dissertation in favour of The University of the Free State. .............................................................................. Signature .............................................................................. Date [ii] ACKNOWLEDGEMENTS A project of this nature could not have been complete without the support of some people. At this juncture, I will like to recognize the assistance of such people who made indispensable contributions towards the realisation of this work. I received much technical support from my supervisor Prof Ebben Van Zyl and cosupervisors Dr Petrus Nel and Dr Estelle Boshoff. I appreciate all the efforts they made in seeing that this study...

Words: 58744 - Pages: 235

Free Essay

Deeepwater

...Western Michigan University ScholarWorks at WMU Dissertations Graduate College 8-1-2012 Deepwater, Deep Ties, Deep Trouble: A StateCorporate Environmental Crime Analysis of the 2010 Gulf of Mexico Oil Spill Elizabeth A. Bradshaw Western Michigan University, brads2ea@cmich.edu Follow this and additional works at: http://scholarworks.wmich.edu/dissertations Recommended Citation Bradshaw, Elizabeth A., "Deepwater, Deep Ties, Deep Trouble: A State-Corporate Environmental Crime Analysis of the 2010 Gulf of Mexico Oil Spill" (2012). Dissertations. Paper 53. This Dissertation-Open Access is brought to you for free and open access by the Graduate College at ScholarWorks at WMU. It has been accepted for inclusion in Dissertations by an authorized administrator of ScholarWorks at WMU. For more information, please contact maira.bundza@wmich.edu. DEEPWATER, DEEP TIES, DEEP TROUBLE: A STATE-CORPORATE ENVIRONMENTAL CRIME ANALYSIS OF THE 2010 GULF OF MEXICO OIL SPILL by Elizabeth A. Bradshaw A Dissertation Submitted to the Faculty of The Graduate College in partial fulfillment of the requirements for the Degree of Doctor of Philosophy Department of Sociology Advisor: Ronald C. Kramer, Ph.D. Western Michigan University Kalamazoo, Michigan August 2012 THE GRADUATE COLLEGE WESTERN MICHIGAN UNIVERSITY KALAMAZOO, MICHIGAN June 29, 2012 Date WE HEREBY APPROVE THE DISSERTATION SUBMITTED BY Elizabeth A. Bradshaw ENTITLED Deepwater, Deep Ties, Deep Trouble: A State-Corporate Environmental...

Words: 81631 - Pages: 327

Premium Essay

Integrated Case Study

...I ~ i APPLIED SOCIAL RESEARCH METHODS SERIES CASE Series Editors LEONARD BICKMAN, Peabody College, Vandelbilt University. Nashvine DEBRA J. ROO. Vanderbilt UnillelSity. Washington. DC I. SURVEY RESEARCH METHODS (ThIrd Edition) by FlOYD J. FOWLER, Jr. 2. SYNTHESIZING RESEARCH (ThIrd edition) by HARRIS COOPER 3. METHODS FOR POUCY RESEARCH by ANN MAJCHRZAK 4. SECONDARY RESEARCH (Second Edition) by DAVID W. STEWART and MICHAEL A. KAMINS 5. CASE sruDY RESEARCH (ThIrd edition) by ROBERT K. YIN 6. META-ANALY11C PROCEDURES FOR SOCIAL RESEARCH (Revl'" Edition) by ROBERT ROSENTHAL 7. TELEPHONE SURVEY METHODS (Second Edition) by PAUL J. LAVRAKAS 8. DIAGNOSING ORGANlZAnoNS (s.cond Edition) by MICHAEL I. HARRISON 9. GROUP TECHNIQUES FOR IDEA BUILDING (Second Edition, by CARL M. MOORE 10. NEED ANALYSI9 by JACK McKilliP II. UNKING AUDmNG AND META EVALUAnON by THOMAS A. SCHWANDT and EOINARD S. HALPERN 12. ETHICS AND VALUES IN APPUED SOCIAL RESEARCH by ALLAN J. KIMMEL 13. ON nME AND METHOD by JANICE R. KEllY and JOSEPH E. McGRATH 14. RESEARCH IN HEALTH CARE SEmNGS by KATHLEEN E. GRADY and BARBARA STRUDLER WALlSTON 15. PARnCIPANT OBSERVAnON by DANNY JORGENSEN 16. INTERPREnVE INTERACllONISM (Second Edition) by NORMAN K. DENZIN 17. ETHNOGRAPHY (Second Edition) by DAVID M. FETTERMAN 18. STANDARDIZED...

Words: 15482 - Pages: 62

Premium Essay

Cataolog

...ork2012 - 2013 Catalog A Message from the President “Sullivan University is truly a unique and student success focused institution.” I have shared that statement with numerous groups and it simply summarizes my basic philosophy of what Sullivan is all about. When I say that Sullivan is “student success focused,” I feel as President that I owe a definition of this statement to all who are considering Sullivan University. First, Sullivan is unique among institutions of higher education with its innovative, career-first curriculum. You can earn a career diploma or certificate in a year or less and then accept employment while still being able to complete your associate, bachelor’s, master’s or doctoral degree by attending during the day, evenings, weekends, or online. Business and industry do not expand or hire new employees only in May or June each year. Yet most institutions of higher education operate on a nine-month school year with almost everyone graduating in May. We remained focused on your success and education, and continue to offer our students the opportunity to begin classes or to graduate four times a year with our flexible, year-round full-time schedule of classes. If you really want to attend a school where your needs (your real needs) come first, consider Sullivan University. I believe we can help you exceed your expectations. Since words cannot fully describe the atmosphere at Sullivan University, please accept my personal invitation to visit and experience...

Words: 103133 - Pages: 413

Premium Essay

Ethics Trainin for Public Officers

...ACN Anti-Corruption Network for Eastern Europe and Central Asia Ethics Training for Public Officials A study prepared by the OECD Anti-Corruption Network for Eastern Europe and Central Asia (ACN) and SIGMA, a joint EU-OECD initiative, principally financed by the EU, in co-operation with the OECD Public Sector Integrity Network March 2013 ACN Anti-Corruption Network for Eastern Europe and Central Asia ETHICS TRAINING FOR PUBLIC OFFICIALS A study prepared by the OECD Anti-Corruption Network for Eastern Europe and Central Asia (ACN) and SIGMA, a joint EU-OECD initiative, principally financed by the EU, in co-operation with the OECD Public Sector Integrity Network This document has been produced with the financial assistance of the European Union. The views expressed herein can in no way be taken to reflect the official opinion of the European Union, and do not necessarily reflect the views of the OECD and its Member countries or of the beneficiary countries participating in the SIGMA Programme. This document and any map included herein are without prejudice to the status of or sovereignty over any territory, to the delimitation of international frontiers and boundaries and to the name of any territory, city or area. The OECD Anti-Corruption Network for Eastern and Central Europe The Anti-Corruption Network (ACN) is a regional outreach programme of the OECD Working Group on Bribery. The ACN is open to countries in Eastern Europe and Central Asia. The main counterparts are...

Words: 31902 - Pages: 128

Premium Essay

Damsel

...2014-2015 Undergraduate Academic Calendar and Course Catalogue Published June 2014 The information contained within this document was accurate at the time of publication indicated above and is subject to change. Please consult your faculty or the Registrar’s office if you require clarification regarding the contents of this document. Note: Program map information located in the faculty sections of this document are relevant to students beginning their studies in 2014-2015, students commencing their UOIT studies during a different academic year should consult their faculty to ensure they are following the correct program map. i Message from President Tim McTiernan I am delighted to welcome you to the University of Ontario Institute of Technology (UOIT), one of Canada’s most modern and dynamic university communities. We are a university that lives by three words: challenge, innovate and connect. You have chosen a university known for how it helps students meet the challenges of the future. We have created a leading-edge, technology-enriched learning environment. We have invested in state-of-the-art research and teaching facilities. We have developed industry-ready programs that align with the university’s visionary research portfolio. UOIT is known for its innovative approaches to learning. In many cases, our undergraduate and graduate students are working alongside their professors on research projects and gaining valuable hands-on learning, which we believe is integral...

Words: 195394 - Pages: 782