Each question must have more than 1
reference and the reference must follow each question. APA guidelines, correct
English and grammar. This is one reference that must be used along with other
reference. 750 words or more for all question together. Reference: Cardon, P. (2013). Business Communication: Developing Leaders
for a Networked World. McGraw-Hill,
1. Computer hacking is broadly defined as
intentionally accessing a computer without authorization or exceeding
authorized access. To date, most studies have focused almost exclusively on the
victims of computer hackers; therefore, the research concerning the actual
hacker has been limited to a select few studies. In chapter 16, the author
conducts an in-depth qualitative study in which hackers are interviewed so that
we can learn more concerning their motives and methods.
Explain how the author applied Sykes and Matza’s (1957) Techniques of
Neutralization theory to explain the hackers’ motivation in engaging in this
type of cyber crime.
2. How is Best and LuckenBill’s (1994)
Social Organization Framework theory used to explain the social organizations
of hackers are formed, maintained, and operated based on your readings?
3. Computer hackers represent a unique, yet
deviant subculture of sophisticated computer program specialists. As the
Special Agent in Charge of your state Attorney General’s Office, you have been
tasked with infiltrating the Defcon group, which although is a legitimate
organization, is believed to be behind the most recent computer attack of XYZ
How would you proceed in infiltrating this organization?