Embedded

Title: Embedded
Category: /Science & Technology
Details: Words: 4135 | Pages: 15 (approximately 235 words/page)
Embedded
Abstract This thesis explores the relatively new criminal phenomena of computer crime, or as it is more commonly termed, hacking. The foundation for the examination is based on how well traditional psychological theories of crime and deviance explain this new behaviour. Dominant theories in each of the categories of psychoanalytic, learning and control are discussed. The thesis concludes that for the most part, traditional psychological theories are deficient with regard to explaining criminal computer behaviour. …showed first 75 words of 4135 total…
You are viewing only a small portion of the paper.
Please login or register to access the full copy.
…showed last 75 words of 4135 total…computer behavior: An exploratory study. Unpublished dissertation. Stoll, C. (1985). The cuckoos egg: Tracking a spy through the maze of computer espionage. New York: Mass Market Paperback. Sutherland, E. (1947). Principles of criminology (4th ed.). Philadelphia: Lippincott. Taylor, P. (1998). Hackers: the hawks and the doves-enemies & friends. Unpublished manuscript. West, D. (1988). Psychological contributions to criminology. British Journal of Criminology, 28, 77-92. Wired News. (1998). Analyzer takes notoriety to the bank. Available HTTP: www.wired.com/news/news/technology/story/11534.html

Need a custom written paper?