The Computer Underground
NORTHERN ILLINOIS UNIVERSITY
THE SOCIAL ORGANIZATION OF
A THESIS SUBMITTED TO THE GRADUATE SCHOOL IN PARTIAL
FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE
MASTER OF ARTS
DEPARTMENT OF SOCIOLOGY
BY
%CompuServe: 72307,1502% %GEnie: GRMEYER%
DEKALB, ILLINOIS
ABSTRACT
Mame: Gordon R. Meyer Department: Sociology Title: The Social Organization
of the Computer Underground Major: Criminology Degree: M.A. Aproved by:
Date: _____________________________________ ___________
Tesis Director
NORTHERN ILLINOIS UNIVERSITY
...
Want to read the rest of this paper? Join Essayworld today to view this entire essay and over 50,000 other term papers
|
the computer
underground, it is organized primarily on the level of colleagues, with
only small groups approaching peer relationships.
Certification: In accordance with departmental and Graduate
School policies, this thesis
is accepted in partial fulfillment of degree
requirements.
______________________
Thesis Director
______________________
Date
ACKNOWLEDGMENTS
FOR CRITIQUE, ADVICE, AND COMMENTS:
DR. JAMES L. MASSEY
DR. JIM THOMAS
DR. DAVID F. LUCKENBILL
FOR SUPPORT AND ENCOURAGEMENT:
GALE GREINKE
SPECIAL THANKS TO:
D.C., T.M., T.K., K.L., D.P.,
M.H., AND G.Z.
THIS WORK IS DEDICATED TO:
GEORGE HAYDUKE
AND
BARRY FREED
...
Get instant access to over 50,000 essays. Write better papers. Get better grades.
Already a member? Login
|
question of how the "underground" is organized will be
answered, rather than the technical question of how CU participants perform
their acts.
Best and Luckenbill (1982) describe three basic approaches to the
study of "deviant" groups. The first approach is from a social
psychological level, where analysis focuses on the needs, motives, and
individual characteristics of the actors involved. Secondly, deviant
groups can be studied at a socio-structural level. Here the emphasis is on
the distribution and consequences of deviance within the society as a whole.
The third approach, the one adopted by this work, forms a middle ground
between the former two by addressing the ...
Succeed in your coursework without stepping into a library. Get access to a growing library of notes, book reports, and research papers in 2 minutes or less.
|
CITE THIS PAGE:
The Computer Underground. (2008, August 18). Retrieved May 16, 2025, from http://www.essayworld.com/essays/The-Computer-Underground/88527
"The Computer Underground." Essayworld.com. Essayworld.com, 18 Aug. 2008. Web. 16 May. 2025. <http://www.essayworld.com/essays/The-Computer-Underground/88527>
"The Computer Underground." Essayworld.com. August 18, 2008. Accessed May 16, 2025. http://www.essayworld.com/essays/The-Computer-Underground/88527.
"The Computer Underground." Essayworld.com. August 18, 2008. Accessed May 16, 2025. http://www.essayworld.com/essays/The-Computer-Underground/88527.
|