Choose a theory from the list below and describe how it might be particularly useful to employ from a life course perspective. Would any of the theories not work well in a life course perspective? Why?
a. Differential association/social learning
b. Social control or bonding
c. Self-control
d. Labeling
e. Conflict
f. Critical theories (feminist, peacemaking, and critical race theory)
Researchers concerned with:
o why do people begin to engage in deviance?
o why does deviance persist?
Theoretical approaches:
o Social control theory—fun, easy, and rewarding; lack the social controls and deviance persists because bonds remain weak
o Self-control theory—deviance is stable therefore deviance persists
o Strain theory—initial deviance is a reaction to frustration and anger, deviance persists because the structure of society means certain people remain in stressful conditions
o Social learning theory—definitions favorable to deviance outweigh definitions unfavorable to deviance
o Life course theory—concerned with the tail-end of the deviant career and how and why criminals and other deviants desist, “Getting Out of the Game”
You might also like to view...
Recent surveys showed that the threat of terrorism was the greatest security concern now facing Fortune 1000 companies
Indicate whether the statement is true or false
____________ model recognizes that there are aspects of planning and response that are common in many kinds of catastrophes and disasters regardless of causation
Fill in the blanks with correct word
Which of the following statements is most accurate regarding the use of new technologies by extremists in the era of the New Terrorism?
a. The Internet, e-mail, and social networking media are rarely used by extremists interested in the terrorist trade. b. The Internet, e-mail, and social networking media are used to send instructions about overall goals, specific tactics, new bomb-making techniques, and other facets of the terrorist trade. c. The Internet, e-mail, and social networking media are easily “hacked” by counterterrorist agencies. d. There is little evidence that the Internet, e-mail, and social networking media are used by extremists.
As of 2011, how many states had mandatory arrest policies?
A. 12 B. 20 C. 43 D. 32