1,669
17
Essay, 2 pages (400 words)

The routine activity's theory

The routine activity’s theory is something that occurs when you have all of the three opportunities that allow you to commit a crime successfully without being obtained or persecuted. The three opportunities being a likely offender, proper target, and lack of guardian. In digital crime, this theory is something that could occur massively in accordance with fraud. These three opportunities needed to complete this theory is easily completed or easily accessed due to hackers not immediately being recognized and taken down. This being because the likely offender would be the hacker, while the proper target has already been accessed before trying this attempt. In saying that the lack of guardian would mean that the guardian would merely mean a firewall, or something prohibiting them from accessing your information.

Although the motivation of offenders may have changed, what makes cyberspace an attractive platform for cybercriminals is the variety of opportunities created by virtual and networked environments (Geer, 2007; Levi, 2001; Wall, 2001, 2007a, Behzat Yucedal ). This something that is hard to do because there is always a way to hack someone. When hackers tend to access peoples files it is to commit identity theft or some type of achievement for themselves. Although all of them are not immediately after an identity they are still seeking immediate gain. In saying this “ Extrapolating this percentage to the 221 million Internet users would translate into nearly 25 million fraud victims—roughly 18 times the number of murder, rape, armed robbery, and aggravated assault victims combined (U. S. Department of Justice 2008).”(Travis C. Pratt, Kristy Holtfreter, and Michael D. Reisig, 2010).

This shows that just as much crime exists online as it does on the streets. In saying this routine activities theory breaks down the fact that those who commit internet, or digital crimes will have it more easy to access the three correspondents that could potentially help them commit such crimes. They are able to achieve these crimes, and the only thing stopping them is the access to the wanted IP address. If they are protected enough even though still this does not stop them from being able to achieve data or information, mainly because the digital world is not just within an IP address. There are many outlets such as a phone, tablet, and other types of objects. Neutralizing Potential and Self-reported Digital Piracy was based on the findings in a college setting. It was mainly observed through university students. it was to see how these students happened to deal with certain types of digital fraud presented. they presented them through surveys which was suppose to help present the results in a more accurate way.(2009, Morris, Higgins)

Thank's for Your Vote!
The routine activity's theory. Page 1
The routine activity's theory. Page 2
The routine activity's theory. Page 3

This work, titled "The routine activity’s theory" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'The routine activity's theory'. 13 September.

Reference

AssignBuster. (2022, September 13). The routine activity's theory. Retrieved from https://assignbuster.com/the-routine-activitys-theory/

References

AssignBuster. 2022. "The routine activity's theory." September 13, 2022. https://assignbuster.com/the-routine-activitys-theory/.

1. AssignBuster. "The routine activity's theory." September 13, 2022. https://assignbuster.com/the-routine-activitys-theory/.


Bibliography


AssignBuster. "The routine activity's theory." September 13, 2022. https://assignbuster.com/the-routine-activitys-theory/.

Work Cited

"The routine activity's theory." AssignBuster, 13 Sept. 2022, assignbuster.com/the-routine-activitys-theory/.

Get in Touch

Please, let us know if you have any ideas on improving The routine activity’s theory, or our service. We will be happy to hear what you think: [email protected]