What is the overlap between criminal justice and cybercrime? How does this overlap relate to other disciplines discussed in this class?
One of the primary goals for criminal justice researchers and scholars is to focus on developing strategies that aid in protecting different entities from crimes. This can be further applied in a technological sense to protect against cybercrime victimization. The main overlap between the cybercrime and criminal justice comes from the application of criminal justice strategies and tools that aid scholars in understanding the minds/thought process’ and actions of cybercriminals, which allows for various mechanisms to be put into place to prevent those crimes from happening. A collection of tools that’s regularly used are theories, which when applied give a criminological explanation of various cybercrimes; the most popular of these theories are the neutralization theory, the self-control theory, the learning theory, and the routine activities theory. The neutralization theory states that although people know right from wrong, they try to rationalize their actions to justify the crime they’re committing. The self-control theory states criminals act because they have low self-control. The learning theory states that criminals learn how to commit crimes, as well as the reasoning and motives behind committing crimes, from interactions with others. Lastly, the routine theory states that three elements must be present at the same time and place for a crime to occur. Although these theories can be applies to various facets of criminal justice, when applied to cybercrimes specifically it allows researchers to establish safeguards for prevention. This is incredibly useful for corporations and businesses when it comes to creating a framework, as they’re able to create a defense based off patterns commonly seen from cybercriminals, thanks to to criminal justice tools. It can also be useful for businesses, and truly anyone looking to protect their digital private information, since understanding how cybercriminals operate will not only allow for more caution, but the establishment of preventative measures (even something as simple as a complex password) to protect their private information.