General Theory of Crime (GTC)

 

Top of Class

Top of Class

Get An A+ Paper

Get An A+ Paper

Get Started

Get Started

General Theory of Crime (GTC)

General Theory of Crime (GTC) . Students are to select one of the case studies (Child exploitation ‐ Playpen case, Data breach ‐ US Office of Personnel Mgt, Hacking ‐ Alexsey Belan, Romance fraud ‐ Audrey Elaine Elrod, Cyber terrorism ‐ Ardit Ferizi

Students then apply BOTH an individual and situational theory from the list provided on the course Learning@Griffith site to the case study.

The basic requirements are that the case study must:

(a) Provide a brief overview of the case

(b) Introduce and demonstrate a conceptual understanding of the selected theories/perspectives

(c) Apply the theories/perspectives in a manner that clearly demonstrates the applicability of each theory/perspective for understanding how and why the case occurred

(d) Drawing upon the theories/perspectives offer suggestions for prevention strategies applicable to the case and that type of cybercrime more broadly

Criteria & Marking: 

General Theory of Crime (GTC)

More detailed marking criteria will be provided on the course Learning@Griffith site.

Case Overview

– Describes key features of the case

Theory Description and Review

– Describes and explains the selected theories
– Reviews the selected theories

Application of Theory

– Applies theories to the case

Implications of Theory for Prevention

– Provides theory-driven prevention strategies
– Provides support for prevention strategies

Presentation

– Complies with academic writing and structure
– Presentation and referencing

Assessment Item 1: Case Study

 Theory Choice:

General Theory of Crime (GTC)

Choose ONE theory from Column A and choose ONE theory from Column B

 

Column A – choose ONE theory Column B – choose ONE theory
General Theory of Crime (GTC)  Routine Activities Approach/Theory
Social Learning Theory  Lifestyle Exposure Theory
Space Transition Theory  Opportunity Model of Victimology
  1. Case Study Choice:

Choose ONE case study from the list below

  • Case Study 1: Child exploitation ‐ Playpen case
  • Case Study 2: Data breach ‐ US Office of Personnel Mgt
  • Case Study 3: Hacking ‐ Alexsey Belan
  • Case Study 4: Romance fraud ‐ Audrey Elaine Elrod
  • Case Study 5: Cyber terrorism ‐ Ardit Ferizi

Order 100% Plagiarism free Essay Now

Share this

Freebies

 
error: Content is protected !!