SlideShare uma empresa Scribd logo
1 de 11
A Presentation By:

                                      DEEPIKA JOSHI
                                      Asst. Prof. (IT & HR)
                                      Jaipuria Institute of Management Studies
                                      Indirapuram, Ghaziabad, India

                                      Email Id : dsagta@gmail.com
                                      Mobile : 9899882346




                      Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011   Jaipuria Institute of Management Studies,
                      Ghaziabad.
Oh what a tangled web we weave, when first we practice to deceive”
                                                           : Sir Walter Scott


      With the information highway having entered
      our very homes, we are all at increasing risk of
      being affected by Cybercrime.

      Everything about our lives is in some manner
      affected    by    computers.      Under    the
      circumstances its high time we sat up and took
      notice of the events shaping our destinies on
      the information highway.

      Cybercrime is everyone’s problem. And its
      time we did something to protect ourselves.
      Information is the best form of protection.



                              Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011           Jaipuria Institute of Management Studies,
                              Ghaziabad.
“Technology changes everything, crime included” (Clarke, 2004)




   BIG numbers and online crime go together. One
   well-worn assertion is that cybercrime revenues
   exceed those from the global trade in illegal
   drugs. Another nice round number is the $1
   trillion-worth of intellectual property that, one
   senator claimed earlier this year, cybercriminals
   snaffle annually.

                Source: Economist.com 14/Nov/2011



                              Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011           Jaipuria Institute of Management Studies,
                              Ghaziabad.
"What your mind can conceive and believe, it can achieve".
                                                                             Napoleon Hill

   As we foster our self with special
   acquaintance and special aptitude in
   society, along with that power, comes
   accountability to use it for the
   betterment of the society.


   Living in a society is governed by few
   norms of social behavior accepted by all.
   Although living in a real society and in an
   e-society is entirely different as in real
   society we know our boundaries and the
   socially accepted behavior whereas in e-
   society boundaries are blurred and we are
   not aware of the fact that the things we are
   doing are accepted by the e-society or not.




                                 Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011              Jaipuria Institute of Management Studies,
                                 Ghaziabad.
Types of Cyber crimes
   •   Credit card frauds
   •   Cyber pornography
   •   Sale of illegal articles-narcotics,
       weapons, wildlife
   •   Online gambling
   •   Intellectual Property crimes- software
       piracy, copyright infringement,
       trademarks violations, theft of                                             Crime
       computer source code                                             Crime      Against
   •   Email spoofing                                                   Against    Govt.
   •   Forgery                                              Crime       Property
   •   Defamation                                           against
   •   Cyber stalking (section 509 IPC)                     Person
   •   Phising
   •   Cyber terrorism




                                Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011             Jaipuria Institute of Management Studies,
                                Ghaziabad.
Risks at Cyberspace


                      Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011   Jaipuria Institute of Management Studies,
                      Ghaziabad.
In the News…….
     Cyber crime is now a bigger threat to India Inc than physical crime. In a recent survey by IBM, a
     greater number of companies (44%) listed cyber crime as a bigger threat to their profitability
     than physical crime (31%).


     The cost of cyber crime stems primarily from loss of revenue, loss of market capitalization,
     damage to the brand, and loss of customers, in that order.


     About 67% local Chief Information Officers (CIOs) who took part in the survey perceived cyber
     crime as more costly, compared to the global benchmark of 50%.


     •   1 out of 5 children received a sexual solicitation or approach over the Internet in a
         one-year period of time (www.missingchildren.com)

     •   California warns of massive ID theft – personal data stolen from computers at
         University of California, Berkeley (Oct 21, 2004 IDG news service)

     •   Microsoft and Cisco announced a new initiative to work together to increase
         internet security (Oct 18, 2004 www.cnetnews.com)



                                   Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011                Jaipuria Institute of Management Studies,
                                   Ghaziabad.
THEORIES BEHIND THE CRIMES




TRADITIONAL                                                           NEW

   SOCIAL PROCESS THEORY: SOCIAL INFLUENCES
                                                                    BMC THEORY:   BULGING    MIDDLE
                                                                    CLASS
   SOCIAL STRUCTURE THEORY: RUNDOWN
                                                                    ANTI-SOCIAL PROCESS THEORY:
   TRAIT THEORY: BASIC NATURE
                                                                    Because They Are Being Groomed
   RATIONAL CHOICE THEORY: WILLINGNESS                              To Commit the Crime

   SOCIAL CONFLICT THEORY: SOCIETAL FORCES                          AGOG THEORY: CURIOSITY    LEADS
                                                                    THEM TO ENJOYMENT.


                                                                     BRAGGER   THEORY:   IMPRESSION
                                                                     MAKING




                                 Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011              Jaipuria Institute of Management Studies,
                                 Ghaziabad.
CONCLUSION

    Traditional crime theory presents crime stimulating factors as:-

    •Choice,
    •Social process,
    •Heredity & Upbringing,
    •Societal Forces & Mental Disorders

    Whereas, in the present Techno-Era ,criminals are much more
    educated, technically equipped with higher IQ and the targeted
    people to look upon as criminals (i.e. Poor people) in traditional
    theories have been overlapped by the Bulging Middle Class
    theory.


                         Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011      Jaipuria Institute of Management Studies,
                         Ghaziabad.
Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011   Jaipuria Institute of Management Studies,
                      Ghaziabad.
QUESTIONS




                      Deepika Joshi, Asst. Prof. (IT & HR),
Monday: 28/Nov/2011   Jaipuria Institute of Management Studies,
                      Ghaziabad.

Mais conteúdo relacionado

Destaque (9)

StyleUp project presentation
StyleUp project presentationStyleUp project presentation
StyleUp project presentation
 
Orthodontic Procedures Presentation
Orthodontic Procedures PresentationOrthodontic Procedures Presentation
Orthodontic Procedures Presentation
 
Quickstep laminate brochure
Quickstep laminate brochureQuickstep laminate brochure
Quickstep laminate brochure
 
Case study - Application Peugeot of my birth year
Case study -  Application Peugeot of my birth yearCase study -  Application Peugeot of my birth year
Case study - Application Peugeot of my birth year
 
Annnual report JSC IDGC of Center and Volga Region 2011
Annnual report JSC IDGC of Center and Volga Region 2011Annnual report JSC IDGC of Center and Volga Region 2011
Annnual report JSC IDGC of Center and Volga Region 2011
 
2
22
2
 
Tarian Tradisional
Tarian TradisionalTarian Tradisional
Tarian Tradisional
 
Pres nlc 2013 net
Pres nlc 2013 netPres nlc 2013 net
Pres nlc 2013 net
 
Crowcon Portable Gas Detectors
Crowcon Portable Gas DetectorsCrowcon Portable Gas Detectors
Crowcon Portable Gas Detectors
 

Semelhante a Cyber Crimes a Behavioral Study

Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...
Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...
Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...
AJHSSR Journal
 
Personal identity Management
Personal identity ManagementPersonal identity Management
Personal identity Management
George Roberts
 
ZDoolyconfAI.pdf
ZDoolyconfAI.pdfZDoolyconfAI.pdf
ZDoolyconfAI.pdf
zdooly
 

Semelhante a Cyber Crimes a Behavioral Study (20)

Simone Scardapane - The dark side of deep learning - Codemotion Milan 2017
Simone Scardapane - The dark side of deep learning - Codemotion Milan 2017Simone Scardapane - The dark side of deep learning - Codemotion Milan 2017
Simone Scardapane - The dark side of deep learning - Codemotion Milan 2017
 
Accelerating innovation through diversity in Artificial Intelligence
Accelerating innovation through diversity in Artificial Intelligence  Accelerating innovation through diversity in Artificial Intelligence
Accelerating innovation through diversity in Artificial Intelligence
 
The causes of corruption
The causes of corruptionThe causes of corruption
The causes of corruption
 
Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...
Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...
Debate on Artificial Intelligence in Justice, in the Democracy of the Future,...
 
20240104 HICSS Panel on AI and Legal Ethical 20240103 v7.pptx
20240104 HICSS  Panel on AI and Legal Ethical 20240103 v7.pptx20240104 HICSS  Panel on AI and Legal Ethical 20240103 v7.pptx
20240104 HICSS Panel on AI and Legal Ethical 20240103 v7.pptx
 
How do we train AI to be Ethical and Unbiased?
How do we train AI to be Ethical and Unbiased?How do we train AI to be Ethical and Unbiased?
How do we train AI to be Ethical and Unbiased?
 
Testing slides
Testing slidesTesting slides
Testing slides
 
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
 
Let's Talk: fundamentals of conversational design
Let's Talk: fundamentals of conversational designLet's Talk: fundamentals of conversational design
Let's Talk: fundamentals of conversational design
 
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
 
Togy Jose: Organizational Network Analytics - Revealing the Real Networks
Togy Jose: Organizational Network Analytics - Revealing the Real NetworksTogy Jose: Organizational Network Analytics - Revealing the Real Networks
Togy Jose: Organizational Network Analytics - Revealing the Real Networks
 
Personal identity Management
Personal identity ManagementPersonal identity Management
Personal identity Management
 
ZDoolyconfAI.pdf
ZDoolyconfAI.pdfZDoolyconfAI.pdf
ZDoolyconfAI.pdf
 
Research & Business about Artificial Intelligence: A Point of View
Research & Business about Artificial Intelligence: A Point of ViewResearch & Business about Artificial Intelligence: A Point of View
Research & Business about Artificial Intelligence: A Point of View
 
The Principle of Non-Discrimination in the Infosphere: A New Ethics
The Principle of Non-Discrimination in the Infosphere:  A New EthicsThe Principle of Non-Discrimination in the Infosphere:  A New Ethics
The Principle of Non-Discrimination in the Infosphere: A New Ethics
 
Automatic group happiness intensity analysis.
Automatic group happiness intensity analysis.Automatic group happiness intensity analysis.
Automatic group happiness intensity analysis.
 
Foresight Friday 19.01.2018 - Kari Hiekkanen
Foresight Friday 19.01.2018 - Kari Hiekkanen Foresight Friday 19.01.2018 - Kari Hiekkanen
Foresight Friday 19.01.2018 - Kari Hiekkanen
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
 
artificial intelligence - in need of an ethical layer?
artificial intelligence - in need of an ethical layer?artificial intelligence - in need of an ethical layer?
artificial intelligence - in need of an ethical layer?
 
Algorithmic Bias - What is it? Why should we care? What can we do about it?
Algorithmic Bias - What is it? Why should we care? What can we do about it? Algorithmic Bias - What is it? Why should we care? What can we do about it?
Algorithmic Bias - What is it? Why should we care? What can we do about it?
 

Mais de Uttarakhand Open University

Importance of Learning Governance in Distance Education by information and co...
Importance of Learning Governance in Distance Education by information and co...Importance of Learning Governance in Distance Education by information and co...
Importance of Learning Governance in Distance Education by information and co...
Uttarakhand Open University
 

Mais de Uttarakhand Open University (11)

University 2.0
University 2.0University 2.0
University 2.0
 
Transforming Universities for e-learning
Transforming Universities  for e-learningTransforming Universities  for e-learning
Transforming Universities for e-learning
 
Mobile learning a new approach in teacher education
Mobile learning   a new approach in teacher educationMobile learning   a new approach in teacher education
Mobile learning a new approach in teacher education
 
Importance of Learning Governance in Distance Education by information and co...
Importance of Learning Governance in Distance Education by information and co...Importance of Learning Governance in Distance Education by information and co...
Importance of Learning Governance in Distance Education by information and co...
 
E Teaching strategies
E  Teaching strategiesE  Teaching strategies
E Teaching strategies
 
Integrating ICT into Teaching Learning
Integrating ICT into Teaching LearningIntegrating ICT into Teaching Learning
Integrating ICT into Teaching Learning
 
ICTs for Teaching and Learning in ODL – A Study
ICTs for Teaching and Learning in ODL – A StudyICTs for Teaching and Learning in ODL – A Study
ICTs for Teaching and Learning in ODL – A Study
 
Challenges in ICT for Education
Challenges in ICT for EducationChallenges in ICT for Education
Challenges in ICT for Education
 
Academic Support Through E-Learning To Open And Distance Learners: A Case Stu...
Academic Support Through E-Learning To Open And Distance Learners: A Case Stu...Academic Support Through E-Learning To Open And Distance Learners: A Case Stu...
Academic Support Through E-Learning To Open And Distance Learners: A Case Stu...
 
Use of OERs and Non-OERs at , Asia e University (AeU), Malaysia
Use of OERs and Non-OERs at , Asia e University (AeU), MalaysiaUse of OERs and Non-OERs at , Asia e University (AeU), Malaysia
Use of OERs and Non-OERs at , Asia e University (AeU), Malaysia
 
The Road to Excellence QAMLM
The Road to Excellence QAMLMThe Road to Excellence QAMLM
The Road to Excellence QAMLM
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Cyber Crimes a Behavioral Study

  • 1. A Presentation By: DEEPIKA JOSHI Asst. Prof. (IT & HR) Jaipuria Institute of Management Studies Indirapuram, Ghaziabad, India Email Id : dsagta@gmail.com Mobile : 9899882346 Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.
  • 2. Oh what a tangled web we weave, when first we practice to deceive” : Sir Walter Scott With the information highway having entered our very homes, we are all at increasing risk of being affected by Cybercrime. Everything about our lives is in some manner affected by computers. Under the circumstances its high time we sat up and took notice of the events shaping our destinies on the information highway. Cybercrime is everyone’s problem. And its time we did something to protect ourselves. Information is the best form of protection. Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.
  • 3. “Technology changes everything, crime included” (Clarke, 2004) BIG numbers and online crime go together. One well-worn assertion is that cybercrime revenues exceed those from the global trade in illegal drugs. Another nice round number is the $1 trillion-worth of intellectual property that, one senator claimed earlier this year, cybercriminals snaffle annually. Source: Economist.com 14/Nov/2011 Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.
  • 4. "What your mind can conceive and believe, it can achieve". Napoleon Hill As we foster our self with special acquaintance and special aptitude in society, along with that power, comes accountability to use it for the betterment of the society. Living in a society is governed by few norms of social behavior accepted by all. Although living in a real society and in an e-society is entirely different as in real society we know our boundaries and the socially accepted behavior whereas in e- society boundaries are blurred and we are not aware of the fact that the things we are doing are accepted by the e-society or not. Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.
  • 5. Types of Cyber crimes • Credit card frauds • Cyber pornography • Sale of illegal articles-narcotics, weapons, wildlife • Online gambling • Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of Crime computer source code Crime Against • Email spoofing Against Govt. • Forgery Crime Property • Defamation against • Cyber stalking (section 509 IPC) Person • Phising • Cyber terrorism Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.
  • 6. Risks at Cyberspace Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.
  • 7. In the News……. Cyber crime is now a bigger threat to India Inc than physical crime. In a recent survey by IBM, a greater number of companies (44%) listed cyber crime as a bigger threat to their profitability than physical crime (31%). The cost of cyber crime stems primarily from loss of revenue, loss of market capitalization, damage to the brand, and loss of customers, in that order. About 67% local Chief Information Officers (CIOs) who took part in the survey perceived cyber crime as more costly, compared to the global benchmark of 50%. • 1 out of 5 children received a sexual solicitation or approach over the Internet in a one-year period of time (www.missingchildren.com) • California warns of massive ID theft – personal data stolen from computers at University of California, Berkeley (Oct 21, 2004 IDG news service) • Microsoft and Cisco announced a new initiative to work together to increase internet security (Oct 18, 2004 www.cnetnews.com) Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.
  • 8. THEORIES BEHIND THE CRIMES TRADITIONAL NEW SOCIAL PROCESS THEORY: SOCIAL INFLUENCES BMC THEORY: BULGING MIDDLE CLASS SOCIAL STRUCTURE THEORY: RUNDOWN ANTI-SOCIAL PROCESS THEORY: TRAIT THEORY: BASIC NATURE Because They Are Being Groomed RATIONAL CHOICE THEORY: WILLINGNESS To Commit the Crime SOCIAL CONFLICT THEORY: SOCIETAL FORCES AGOG THEORY: CURIOSITY LEADS THEM TO ENJOYMENT. BRAGGER THEORY: IMPRESSION MAKING Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.
  • 9. CONCLUSION Traditional crime theory presents crime stimulating factors as:- •Choice, •Social process, •Heredity & Upbringing, •Societal Forces & Mental Disorders Whereas, in the present Techno-Era ,criminals are much more educated, technically equipped with higher IQ and the targeted people to look upon as criminals (i.e. Poor people) in traditional theories have been overlapped by the Bulging Middle Class theory. Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.
  • 10. Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.
  • 11. QUESTIONS Deepika Joshi, Asst. Prof. (IT & HR), Monday: 28/Nov/2011 Jaipuria Institute of Management Studies, Ghaziabad.