As I am coming closer to the end of my first psychology course I am beginning to realize the ways that taking this course will prove useful in my major. Being a criminal justice major, it isn’t to difficult to imagine how such a course will prove useful. The area of criminal justice has been one that has brought me much interest throughout my life, more specifically the criminal minds. With that being said, taking a course who’s bases is on that area specifically will most likely give me some new skills or acquire some new knowledge to aid me in my major and even more so a future career in that major. This course, being based around the human brain, may help me dive a little deeper into the criminal minds. This course could help me learn to think how they think, helping me figure out where or even why certain crimes may take place. Having knowledge in the area of psychology should most definitely give me an edge on the criminals by being familiar with the way that the human brain works and functions. Not only will this course do that, but also it will do it to the point of explaining how the brain will react in specific situations with specific variables. All of this can prove beneficial to any individual dealing with criminal activity, when trying to find, deal with, and apprehend these individuals. It is the information and theories that I have picked up in this course and will hopefully develop further that will definitely serve a beneficial purpose to my major and future career. The first theory that I wanted to address towards the field of criminal justice would be the” Social Identity Theory”. The Social Identity Theory is the portion of an individual’s self-concept derived from perceived membership in a relevant social group. Self-concept is all our thoughts and feelings we have about ourselves in order to answer the question “who am I”(Bodusek)? Social identity theory is best explained as a theory that predicts certain behavior between interacting groups on the basis of perceived group status differences, how legitimate those differences are seen, and the mentally seen ability to move fro on group to a different one. Basically someone achieves there social identity by in one way or another taking themselves and comparing it to those around them, and then deciding whether that is who they are, or figuring out how hard it would be to fit into another social group. By learning about this theory I am able to further understand how certain individuals may end up in certain criminal groups. By having an understanding of this theory and its operational value on the criminal world, I may prove more helpful in getting innocent people away from the grasp of these environment’s and pulling those who have fallen victim to it, out of it. I will be more able to do things like this by knowing how big of an influence your peers and surroundings are not only to yourself and your identity, but also directly on the functionality and chemistry of your brain. A very similar theory to Social Identity Theory can also be applied to my major and leads off of it, “Social Learning Theory”. I chose to put this in junction with my previous theory because of its relevance to not only the previous theory itself, but to my major in general. Social Learning theory is the theory that we learn social behavior by observing, imitating and by being rewarded or punished. In other words this theory is saying that we learn from the people around us. As humans we first learn and develop our minds naturally by watching what our parents to considering there are really the only thing around us in the early stages of our life. It’s the early stages of our life that our brains are the most absorbent so it is this stage that is the most important to protect and ensure that the behaviors the individual picks up aren’t of criminal or mischievous character. If a kid grows up around people that shoplift and get away with
Related Documents: Crime and Social Identity Essay
Identity Theft is it a problem Identify makes us who we are. Have u ever thought about this; a criminal is writing your name, address, and Social Security number on credit card applications and charge hundreds to thousands worth of merchandise on those credit cards? How do you know that this is not happening right now? Millions of people are victims of identity theft and they find out after thousands have been stolen using their names. Identify theft is a serious problem that claims millions…
Criminology and Ancient Crime Approaches to Criminology Legal - Crime is law-breaking behavior; punishment is what law does in response to crime Moral * Who is criminal? think they are immoral * Consequences in what is a definition of crime (some actions law breaking but not really immoral i.e. Speeding j-walking, things can be immoral but not law breaking behavior) * More universal than legal approach Social * Social customs, violating social customs could be more…
Legitimate Identification for Social Networks Many people do not take the internet serious these days. Not everyone is apprehensive about his or her own safety. A lot of people-mainly teenagers and children think of it as just another way to fill everyone in on his or her life not knowing who is viewing the information. People want to be safe and catch delinquents committing crimes, social networks should require every person to provide their real identification number proving whom a person on…
Identity Theft In today's society, there is a white-collar crime that has greatly risen in popularity among criminals. This crime is identity theft. Hundreds of thousands of people have their identities stolen each year. Identity theft is when these criminals obtain and use consumers personal information such as credit card numbers, bank account numbers, insurance information, and social security numbers to purchase goods or services fraudulently. According to the Federal Trade Commission…
Computer Crimes. Comp 129. Stephan D’Amato 11/28/2012 Today, we live in a modern world filled with technology. We as a society have so many different machines and gadgets to help make our lives and our daily tasks simpler. For the most part these machines and modern technology is used for the good. Whether it is to help find new cures for new diseases and cancers, designing the latest and greatest automobiles, meeting new people on social media, or social networking websites. However…
IDENTITY THEFT AMERICAN INTERCONTINENTAL UNIVERSITY CONSTITUTIONAL ISSUES IN CRIMINAL JUSTICE BY MICHELLE SUMMERS SEPTEMBER 28, 2014 Identity theft is when a person steals another person’s identity for whatever purpose. It is considered theft and fraud. The damages don’t have to be monetary. Even if they don’t go after your money they can steal your identity to commit a crime, get a fake identification, or to retain credit. Even if they don’t get to your money, just by stealing…
Running Head: CATEGORIES OF COMPUTER CRIME Categories of Computer Crime Daniel Lindsey Strayer University Author Note This paper was prepared for Information Technology in Criminal Justice, taught by Prof. Ulysses Weakley. ABSTRACT This research paper will discuss in detail the four common categories of computer crimes and provide at least one example for each. Explain which of these categories of computer crimes presents the greatest overall threat…
TA: Rhys Williams Professor: Tamy Superle “We must not say that an action shocks the conscience collective because it is criminal, but rather it is criminal because it shocks the conscience collective. We do not condemn it because it is a crime, but it is a crime because we condemn it” (Durkheim, 1972: 123-4) Throughout the years, professionals from many fields such as criminology, sociology, psychology etc., have attempted to understand criminality, criminal behavior and deviance in different ways…
Carleton University Department of Sociology and Anthropology Motorcycle Outlaws, and the identity of the One Percenter Introduction to Sociology I - SOCI 1001 C Fall 2014 To: Professor Charles Gibney From: Nickolaus Mclachlan-pollo Student ID: 100975146…
To steal one’s identity is a scam that has been around over the passage of time, but to take on someone’s identity through intangible manners is a new phenomenon of this century. In today’s society we face a threat with the usage of online activity. Internet users have placed themselves in a vulnerable position. These frequent users are susceptible to “hackers” obtaining personal information with the intent to exploit. Countless of internet users are having their information stolen through online…