Expanding upon with agnews general strain theory

Assignment Help Computer Engineering
Reference no: EM132107637

Reply to the article with references with APA format.

The reading about social structure theories to be very interesting.

With strain theory, as presented by Merton, an individual unable to accomplish the goal of material wealth, because the means to do so are unavailable, is under strain. Our text states, "If an individual is strained, how do they adapt to the strain? Merton developed five modes of adaptation" (Taylor, 2019). Conformity, ritualism, innovation, retreatism, and rebellion are the five modes.

Conformity is acceptance of the goal and the ways to achieve it and is unlikely to commit crime. Ritualism is lowering the bar of expectations and keeps working with the ways to achieve their goal and are unlikely to commit crime. Innovation is acceptance of the goals but does not believe in the ways in which to achieve it and thus attempts other more inventive ways to accomplish the goal, crime being okay to commit to get there.

Retreatism does not accept the goal or the ways to achieve it and thus tend to find their way to addiction and will commit crimes to support themselves. Rebellion is also rejects the goal and ways to achieve but uses different goals and and ways making them more like gangs or militia and thus committing crime.

Expanding upon this with Agnew's General Strain Theory gives a broader sense of the goals and means and allowing a better understanding like in the case of middle and upper class who might have material wealth but commit crime anyway as a means to secure even more wealth thinking their current ways are not enough.

General Strain Theory also breaks down the strains as any kind of negative effect on an individual which may not be the same from person to person. Cyber stalking and harassment could be the result of strains due to perceived negatives. Our text says middle and high school students act out because of they do not think they are popular or liked (Taylor, 2019, p.58).

The example given by the book is about a group of girls who may have felt angry or frustrated for some reason against their peer Piper Smith and lashed out with a YouTube video about ways to kill her. I believe we would have less crime and hurt feelings if more people would believe in Jesus.

The first verse that comes to mind is in Luke, "He answered, "'Love the Lord your God with all your heart and with all your soul and with all your strength and with all your mind'; and, 'Love your neighbor as yourself," (Luke 10:27, NIV) and the second is, "Do not store up for yourselves treasures on earth, where moths and vermin destroy, and where thieves break in and steal. 20 But store up for yourselves treasures in heaven, where moths and vermin do not destroy, and where thieves do not break in and steal," (Matthew 6:19-20, NIV).

As we keep sharing our love of Jesus with others, hopefully it continues to trickle out and there will be less strain and crime in our world! Taylor, R. W. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.

Verified Expert

The paper is the related to the views on the strain theory and the criminology theory. This paper also highlights the requirement of the need of the theories of the strain and presenting one own view. This paper has been prepared in Microsoft Word Document.

Reference no: EM132107637

Questions Cloud

What change would have occurred in dandy pretax profit : Total fixed cost were $250,000. There was no year in work in process inventory. If trendy had made this investment what change have occurred in Dandy profit
Identify a contemporary organization that is currently deal : Compare and contrast the concepts of environmental and organizational pressure. How do these pressures affect an organization?
Calculate the average amount invested in the asset : Calculate the average amount invested in the asset that should be used for calculating the accounting rate of return
Outline a communications plan the company could use : Outline a communications plan the company could use to make the strategies you recommend above known to all stakeholders.
Expanding upon with agnews general strain theory : Expanding upon with Agnew's General Strain Theory gives a broader sense of the goals and means - The example given by the book is about a group of girls
How much of the charitable contribution should pat deduct : In the year of her death, Pat had AGI of $300,000. In completing her final income tax return, how much of charitable contribution should Pat's executor deduct
Demonstrate the projects value to centervale apparel : Your boss wants to ensure this project will be prioritized over other projects on the list and will be implemented in the coming year.
What is the cost per equivalent unit for conversion costs : At Sunrise Corporation, direct materials are added at the beginning of the process, What is the cost per equivalent unit for conversion costs
Determine jose self-employment tax : He earned $52050 at the architectural firm. His net income from his sole proprietorship was $67400. Determine Jose's self-employment tax for 2015

Reviews

inf2107637

11/27/2018 12:37:12 AM

Very nicely work was done and delivered all the aspects of the assignment. Excellent Services and uick reply on Emails and completed the assignment before due date.

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd