Professional Documents
Culture Documents
Graduate Studies
Department of Psychology
University of Manitoba
Theories of Crime and Hacking 2
Abstract
the year 2003, the number will have risen to well over 200
1989).
Psychoanalytic Theories
1993).
1993).
criminal acts.
Learning Theories
Differential Association
(Hollin, 1989).
Operant Conditioning
(Blackburn, 1993).
Differential Reinforcement
(Blackburn, 1993).
1993).
Hollin, 1989).
1989).
1989).
Control Theories
1989).
Eysenck’s Theory
Hollin, 1989).
(Post, 1996).
Sterling, 1992).
3
Current studies indicate that hackers may have well developed social
skills, but these skills are non-traditional and are centered around
computer mediated interactions (i.e., chat groups, news groups etc.)
Theories of Crime and Hacking 20
Hafner & Markoff, 1995; Littman, 1995). This has led to the
(Wired, 1998).
the Internet.
Conclusions
accomplished.
Theories of Crime and Hacking 24
References
& Sons.
Reading: Addison-Wesley.
Schuster.
Routledge
Theories of Crime and Hacking 26
Unpublished Manuscript.
HTTP: www.cpsr.org/privacy.
& Company.
www.infowar.com
www.gocsi.com/preleas2.
Security Institute.
Market Paperback.
bank. Available
HTTP: www.wired.com/news/news/technology/story/11534.html