Summarize the theoretical framework used in each study (e.g. how routine activities theory is applied to explain the cyber crime/cyber deviance/cyber victimization as it is examined in the study).

Description

Final Essay

Required Articles:

Routine Activities: Maimon, D., Wilson, T., Ren W., and Berenblum, T. (2015). On the Relevance of Spatial and Temporal Dimensions in Assessing Computer Susceptibility to System Trespassing Incidents. British Journal of Criminology 55 (3): 615-634. Download link: Maimon Wilson Ren Berenblum 2015 On the Relevance of Spatial and Temporal Dimensions in Assessing Computer Susceptibility to System Trespassing Incidents British Journal of Criminology.pdfPreview the document

Social learning and the general theory of crime: Burruss, G.W., Bossler, A.M., and Holt, T.J. (2013). Assessing the mediation of a fuller social learning model on low self-control’s influence on software piracy. Crime & Delinquency, 59, 1157-1184. Download link: Burruss Bossler Holt 2013 Assessing the mediation of a fuller social learning model on low self-control influence on software piracy Crime Delinquency.pdfPreview the document

General strain theory: Patchin, J.W., & Hinduja, S. (2011). Traditional and nontraditional bullying among youth: A test of general strain theory. Youth and Society, 43, 727-752. Download link: Patchin Hinduja 2011 Traditional and nontraditional bullying among youth A test of general strain theory Youth and Society.pdfPreview the document

For each article cited above, complete the answers to 5 steps below:

Summarize the theoretical framework used in each study (e.g. how routine activities theory is applied to explain the cybercrime/cyberdeviance/cybervictimization as it is examined in the study). Do not put unnecessary info here. Just put the relevant info as to how a theory X explains the motivation for the cybercrime mentioned in the study.

Describe the data source used in this study? Describe (e.g. sample size, sample characteristics such as are they students, adults, the population of the study etc. (example: X number of students are sampled from the City Y in State Z.)

Write down the measures of each study and briefly explain the questions used to measure these concepts (if there are more than 4 questions, just write four questions used to create that measure).

Example: Dependent variable is phishing victimization via email.

Independent variables are;

A-Low self-control: Questions used to measure low self-control:

I act on the spur of the moment (1=Strongly Agree; 5=Strongly Disagree)

2-……

3-……

4-…..

B-

What are the findings of the study? Briefly summarize the findings in your own words; you do not need to mention the statistical techniques used in the analysis since you did not learn how to apply them). Example: low self-control is significantly related to phishing victimization via email. More specifically, low self-control increases the risk of victimization.

What are the limitations of this study (Look at the Discussion and Conclusions section)?

5 to 7 pages long (excluding the references page)

Use numbers in front of your answers for each paper

Times New Roman 12 pts

Add a references page to the end of your paper

© 2020 Essaylane.com. All Rights Reserved. | Disclaimer: for assistance purposes only. These custom papers should be used with proper reference.