CC 201-001 Week 5 Class 8
CC 201-001 Week 5 Class 8 CC 201-001
Popular in Introduction to Cyber Criminology
Popular in Cyber Criminology
This 3 page Class Notes was uploaded by Jennifer Gintovt on Thursday September 22, 2016. The Class Notes belongs to CC 201-001 at University of Alabama - Tuscaloosa taught by Adam Ghazi-Tehrani in Fall 2016. Since its upload, it has received 11 views. For similar materials see Introduction to Cyber Criminology in Cyber Criminology at University of Alabama - Tuscaloosa.
Reviews for CC 201-001 Week 5 Class 8
Report this Material
What is Karma?
Karma is the currency of StudySoup.
Date Created: 09/22/16
Theory of Victimization Routine Activities Theory: • Created in early 1900s by Marcus Fleson and Lawrence Cohen • “crime opportunity” theory that focuses on the situations around crimes instead of the offenders themselves o Ex. Gang members that sell drugs are more likely to be the victims of crime relating to their drugs being stolen • Premise of theory is that crime is relatively unaffected by social causes o Ex. Poverty, inequality, and unemployment • Used post WWII America to describe: o Economy of Western Countries was booming and welfare states were expanding o Despite this, crime rose significantly during this time o The argument that people need/want things causes them to steal no longer worked • Argued that the increase in prosperity created more opportunities for crime to occur o There is now more to steal because more people own valuable possessions Controversy: • RAT has been criticized by many sociologists/criminologists because theory makes a large assumption o There will always be criminals or “motivated offenders” o RAT explains VICTIMIZATION RAT: • For a crime to occur, you need: o A likely offender o A suitable target o The absence of a capable guardian § physical convergence of time and space Motivated offender: • have to be capable of committing crime • must be willing to commit crime Suitable target: • person or object • usually things that are seen as vulnerable or attractive to offender Absence of Capable guardian • no police, guard dog, cameras, locks, etc. RAT: • primary theory used for explaining cyber victimization • infinite amount of motivated offenders (hackers) • computers contain desirable information (ex. bank account info, pics (suitable targets))some computers are hacked and some aren’t o ones that are hacked are the ones that do not have “capable guardians” • looking at things on the macro-level (the big picture) • computers that are well protected are the ones that are not successfully hacked Example: The neighborhood • houses that have dogs, street lights/motion lights, white picket fences, are located in the middle of the block = least likely to get burgled 2 • Houses with no lights, tall fences, a lot of trees, etc. = most likely to get burgled Example: Hotels • “murder room” located closest to stairs/elevator • more statistically likely to be attacked on top floor/ in rooms located in corners of the hotel Target Hardening: • RAT practice • Making yourself less likely to become a victim o Anti-virus programs o Strong passwords o Two step identification o Don’t share passwords 3