Each question must have more than 1 reference and the reference must follow each question. APA guidelines, correct English and grammar. This is one reference that must be used along with other reference. 750 words or more for all question together. Reference: Cardon, P. (2013). Business Communication: Developing Leaders for a Networked World. McGraw-Hill,
1. Computer hacking is broadly defined as intentionally accessing a computer without authorization or exceeding authorized access. To date, most studies have focused almost exclusively on the victims of computer hackers; therefore, the research concerning the actual hacker has been limited to a select few studies. In chapter 16, the author conducts an in-depth qualitative study in which hackers are interviewed so that we can learn more concerning their motives and methods.
Explain how the author applied Sykes and Matza’s (1957) Techniques of Neutralization theory to explain the hackers’ motivation in engaging in this type of cyber crime.
2. How is Best and LuckenBill’s (1994) Social Organization Framework theory used to explain the social organizations of hackers are formed, maintained, and operated based on your readings?
3. Computer hackers represent a unique, yet deviant subculture of sophisticated computer program specialists. As the Special Agent in Charge of your state Attorney General’s Office, you have been tasked with infiltrating the Defcon group, which although is a legitimate organization, is believed to be behind the most recent computer attack of XYZ corporation. .
How would you proceed in infiltrating this organization?