Preview

Neutralization Theory

Good Essays
Open Document
Open Document
1098 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Neutralization Theory
Sykes and Matza techniques of the neutralization theory explains the motives that hackers use when committing a cybercrime. The theory is said to be that hackers are deviant, this way they feel no guilt towards their victims. The five neutralizations explain concerning this theory rely on the thoughts of the hackers. The first one being in denial of responsibility, this gives the hacker the opportunity to justify their actions. When doing so they often blame their criminal acts on a force that is out of there control. In addition, the hacker would think that there was no harm caused with the victim. Nevertheless, the denial of injury corresponds with the hacker’s unremorseful behavior. This is because they feel that the victim can afford to …show more content…
Furthermore, the denial of victim explorers through the hacker mind as revenge towards the person, a specific group, or race of people. “When they violate social norms, they justify their behavior by means of a specific set of justification, called neutralization techniques, which enable them to drift back and forth between conventional and illegitimate behaviors” (Schmallenger & Pittaro, 2008, p.317). Hackers crave the need for self-development and self-fulfillment while praying on their victim’s lifestyles. Although, there are many types of deviants. Some of the things that these hackers have in common is the blame game and that their actions were for a good reason. The neutralization theory has become very successful, not with just hackers but with others different deviants also. For Instance, these deviants can range from multiple criminal suspects. Such as with a robbery, murder, and child predator’s suspects. Each deviant expresses their own internal justifications. “To justify an act is to assert its positive value in the face of a claim to the contrary” (Schmallenger & Pittaro, 2008, …show more content…
“The four groups were characterized as associates between deviance, participation in deviant individually or collectively, the division of labor within the group, and how long their deviant activities extend over time and space” (Schmallenger & Pittaro, 2008, p.338). These groups formed five different deviant groups. Loners like to act alone but they also share with each member of the group which means they are the lease sophisticated. Colleagues are more of a subculture group. They share their knowledge and skills with members of the group but they also choose to act alone by separation and division of labor. However, peers offend together but have no division of labor. Furthermore, teams last if they are progressive in finding new methods for engaging in deviant. “The formal organization is the most sophisticated deviant organization that Best and Luckenbill include in their framework. Formal organizations have all the elements of teams, as well as extended duration across time and space” (Schmallenger & Pittaro, 2008, p.338). The deviant groups experience short-term and long-term involvements with these activities. Loners being the least and formal organizations being the most effective. The impact that deviants have is that they can organize in different societies, different ways, and at different

You May Also Find These Documents Helpful

  • Best Essays

    Nt1110 Unit 11 Lab

    • 2482 Words
    • 10 Pages

    Choi, K.(2008) Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2(1), 308-333.…

    • 2482 Words
    • 10 Pages
    Best Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    When studying crime and deviance, in particular the causes of crime, it is often useful to look at the reasons behind why people commit crimes in the first place. For interactionists, crime and deviance is a product of labelling. They believe that when a crime is committed, it is because a public application of a negative description of a powerless individual has occurred and that is the reason why a crime has been committed by that individual. Labelling is deterministic of your future life. Interactionists reject official statistics on crime, seeing them as little more than a social construction. They maintain that they vastly underestimate the extent of crime and do not present an accurate picture of crime in society.…

    • 1669 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Kingpin Ananlytical Essay

    • 377 Words
    • 2 Pages

    Introduction: Below I will present an argument that that shows the computer hacking by Max Butler, the main character, demonstrated in the book Kingpin by Kevin Poulsen, was unethical in nature. Max’s actions illustrate computer crime defined as, “any incident involving an intentional act where a victim suffered or could have suffered a loss, and a perpetrator made or could have made a gain and is associated with computers” (Parker, 1976). Max utilized his hacking skills in a malicious manner to victimize individuals by taking their personal property.…

    • 377 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In his first chapter, Erikson gives regard to a foremost leader in sociology; Emile Durkheim. As he notes, crime is really a natural kind of social activity. If crime is a natural part of society, there is definitely an indication that it is necessary, much like Darwin would argue that survival of the fittest is pertinent to the continuation of a species. Erikson claims that non-deviants come together in a phenomenal way to express outrage over deviants, therefore solidifying a tighter bond between eachother. This sense of mutuality, Erikson further explains, reiterates awareness to the common goals of the social organization at stake. In his analysis of “abnormal behavior”, deviance is defined as conduct which the people of a group consider so dangerous or embarrassing that they bring special sanctions against those persons. Furthermore, Erikson gives the title of “community” to this form of social unit.…

    • 1059 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    W., & Campbell, E. Q. (1977). Assessing the linkage of norms, environments, and deviance. Social Forces, 56(2), 532-550. doi: 10.1093/sf/56.2.532…

    • 1561 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Essay On Labelling Theory

    • 600 Words
    • 3 Pages

    The criminal career is composed of re-offenses due to lack of social integration, exclusion from mainstream structures and in some cases renegation of the societal norms. The deviant is theorized to perceive no other choice but further deviance because the label attached to their discovery turns them into untrustworthy or even dangerous individuals. The social response only creates a backlash that manifests as acceptance of the label, retreatment from society or…

    • 600 Words
    • 3 Pages
    Good Essays
  • Good Essays

    SOC 101

    • 1215 Words
    • 5 Pages

    The Sociological concept of “deviance” is any behavior that disobeys the usual conduct or expectations of a group within a society. A deviance act can be one that is punishable by law or it can be one that is not a criminal behavior. Individuals turn out to be deviance when their actions disagree with the set of rules imposed by the society. For instance, from my culture piercing or body tattoos could be labeled as a deviance behavior because body tattoos are associated with criminals or gangs members. There are three approaches to explaining deviance Functionalists Perspective, Interactionist Perspective, and finally Conflict Theory. The functionalist theorists define deviance as normal and can have both positive and negative consequences. The Conflict Theory points out that people with power protect their own interests and define deviance to suit their own needs (Schaefer, 2010, p173). Lastly, the Interactionist Perspective explains deviance in two ways, the cultural transmission and routine activity theories.…

    • 1215 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    8. The theoretical perspective that views deviance as “a common part of human existence, with positive as well as negative consequences for social stability”…

    • 383 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Justice

    • 327 Words
    • 2 Pages

    The five propositions for deviant organizations are divided into these forms. They are the loners, colleagues, peers, mobs, and formal organizations. These forms are discussed so that it can be determined how their behaviors (such as loners being anti-social or colleagues and peers social life) affect how it can cause them to commit crimes or other mischief in the…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    However, as Downes and Rock point out, 'ambiguity' is clearly the whole issue in the analysis of crime and deviance: the authors state that it is socially recognised the difficulty of identifying situations or people as deviant and it all starts conforming to the group reaction (2004:5). That is not only about the criminal subject: assumed that sociological behaviour is performance, most of people tend to behave conforming to the situation and, then, to that series of attitudes that are considered moral. So is deviance just a conforming to the wrong side? Most of criminals and deviants are, indeed, influenced by peers despite mass media depict criminals as solitary weirdos (Krohm, 2009:401-402). Erickson, cited in Gibbs (1966:11) formulate an interesting (and prettily sociological) consideration stating that the study of crime and deviance becomes critical focusing on 'the social audience' that refers some individuals as being deviant in order to gain control since it is necessary to react against these people. That is the basis of the criminal law but, since some behaviours do not conform with civil norms, what about informal norms? Stipulating these rules and then conforming to them is the making-of the social culture, which according to Downes and Rock substantially consists in 'traditional ways of solving problems' (2003:145-146) and these problems refer to all those issues and situations that are not considered ordinary, usual and normal. Subsequently, the people who consider that side as the 'outside' are the same that behave affected by moral panic, nowadays generally spread by the mass media; meanwhile, in the Middle Age deviants for example were the left-hand writer or the witches and, in the last century, they were the homosexuals or the mods and the rockers. What makes the former ones ‘more normal’ than the latter…

    • 781 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Deviant Behavior/Tattoos

    • 692 Words
    • 3 Pages

    Beginning from a child we begin to experience different situations and interactions with others. We start getting taught the difference between right and wrong, what may be considered good and what is considered bad, and also taught the things we should and should not do. As we grow older we try to refrain from behavior of which society may disapprove of. Society see’s certain types of behavior as being deviant. First let’s begin by explaining what is a deviant behavior? Deviant behavior can be any behavior that does not conform to what people may consider normal, a behavior that does not meet with many expectations in society. Societies are both social structure and culture. Robert K Merton developed structural strain theory which is a perspective on what is deviance (Crossman, (n.d.)).…

    • 692 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There are 5 basic techniques of managing deviance. There is secrecy, manipulating the physical setting, rationalizations, change to non-d`eviance, and joining deviant subcultures. The act of secrecy is easily defined as the word itself. The deviant keeps secrets from those around them. The thought behind it being that if nobody ever knows about their deviant behavior there is no one who can place negative sanctions upon the deviant. Next, manipulating the physical setting, the deviant chooses to avoid negative sanctions by appearing to be legitimate in their reasons for taking part in the act or situation. For example a prostitute may work under the guise of being an escort or masseuse. Another technique of managing deviance is rationalizations. An example of a rationalization would be a shoplifter who justifies their actions by saying that the store has insurance and can afford to suffer the loss. A fourth technique of managing deviance would be to make a change to non-deviance. For example, criminals will refer to the technique as "going straight." The fifth and final technique of managing deviance is to join a deviant subculture. Joining the subculture makes the deviant feel like they are less deviant because they are surrounded by their deviance.…

    • 459 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The sting or “running the wire” is a great tool on the grifter’s belt because it allows them to pull of major scams with ease. Sometimes though the sting is ran opposite of the traditional patterns, when this happens the reverse sting is created. Now most of us when we hear the term computer hacker imagine a picture of an anti-social, introverted nerd who is obsessed with computers. Mitnick tells us in this book that images is actually false and the actual…

    • 1284 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Hacker

    • 1123 Words
    • 5 Pages

    The advancement of information technology spans a lot of areas of our lives. Information technology has made a huge difference in industry, agriculture and services. This in turn boosts up the productivity of the society. However, the development of computer technology also leads to many security problems in our modern society. There has emerged a group of computer savvy people who seeks and exploits weaknesses in a computer system or computer network. Their motivation has put many questions on debating table. On the one hand, many people contend that a hacker is a dangerous person who will probably destroy the whole world’s computer system. On the other hand, others argue that hackers are not dangerous and not causing harm. This essay will discuss the two sides of the coin with regard to hackers with relevant examples.…

    • 1123 Words
    • 5 Pages
    Better Essays