ipl-logo

Analysis Of Delinquents Neutralization Technique

462 Words2 Pages

Sykes and Matza state that when delinquents violate the social norms, they justify their behavior by justifications, which they call neutralization techniques, which enables a person to neutralize their morals, beliefs, and attitudes temporarily. There are five neutralization techniques used by criminals to keep them from feeling guilty. They deny responsibility, they deny injury, deny that there is a victim, they condemn the condemners, and appeal to higher loyalties. Hackers are an exclusive and new form of deviance. In the studies, the author defined a set of categories that covered the hackers’ neutralization techniques, based on the hacking activities. Denial of Injury is one of the techniques they use according to the author; hackers do not believe they are not hurting anyone or that the harm is insignificant. …show more content…

Hacking is an offense in which the offender does not feel in the physical sense that damage is being done, because electronic information is an intangible thing, they cannot feel it or touch it. According to hackers, downloading information such as software, music, and programs is not hurting anyone or stealing, they feel that the owners have plenty of money and if they had to pay for it, it would create a hardship on them. Also hackers who offered accounts based on weak deterrents tried to show that, although their behavior was deviant, its consequences were insignificant. Hackers also explain that when they browse other people’s computer, that they are not doing any harm because the targets did not know and nothing was damaged. Hackers also use denial of victim. They feel what they do to other people is justified because they deserved punishment. Hackers can cause intentional damage to whoever they feel deserve it and makes the offense guilt-free. Hackers also use the technique of condemnation of the

Open Document