- Published: September 13, 2022
- Updated: September 13, 2022
- University / College: The Australian National University
- Language: English
- Downloads: 35
The routine activity’s theory is something that occurs when you have all of the three opportunities that allow you to commit a crime successfully without being obtained or persecuted. The three opportunities being a likely offender, proper target, and lack of guardian. In digital crime, this theory is something that could occur massively in accordance with fraud. These three opportunities needed to complete this theory is easily completed or easily accessed due to hackers not immediately being recognized and taken down. This being because the likely offender would be the hacker, while the proper target has already been accessed before trying this attempt. In saying that the lack of guardian would mean that the guardian would merely mean a firewall, or something prohibiting them from accessing your information.
Although the motivation of offenders may have changed, what makes cyberspace an attractive platform for cybercriminals is the variety of opportunities created by virtual and networked environments (Geer, 2007; Levi, 2001; Wall, 2001, 2007a, Behzat Yucedal ). This something that is hard to do because there is always a way to hack someone. When hackers tend to access peoples files it is to commit identity theft or some type of achievement for themselves. Although all of them are not immediately after an identity they are still seeking immediate gain. In saying this “ Extrapolating this percentage to the 221 million Internet users would translate into nearly 25 million fraud victims—roughly 18 times the number of murder, rape, armed robbery, and aggravated assault victims combined (U. S. Department of Justice 2008).”(Travis C. Pratt, Kristy Holtfreter, and Michael D. Reisig, 2010).
This shows that just as much crime exists online as it does on the streets. In saying this routine activities theory breaks down the fact that those who commit internet, or digital crimes will have it more easy to access the three correspondents that could potentially help them commit such crimes. They are able to achieve these crimes, and the only thing stopping them is the access to the wanted IP address. If they are protected enough even though still this does not stop them from being able to achieve data or information, mainly because the digital world is not just within an IP address. There are many outlets such as a phone, tablet, and other types of objects. Neutralizing Potential and Self-reported Digital Piracy was based on the findings in a college setting. It was mainly observed through university students. it was to see how these students happened to deal with certain types of digital fraud presented. they presented them through surveys which was suppose to help present the results in a more accurate way.(2009, Morris, Higgins)