{"id":28200,"date":"2024-06-17T00:10:17","date_gmt":"2024-06-17T00:10:17","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/chapter-2-deterrence-and-rational-choice-theories-modern-deterrence-theory-rational-choice-theory-routine-activities-theory\/"},"modified":"2024-06-17T00:10:17","modified_gmt":"2024-06-17T00:10:17","slug":"chapter-2-deterrence-and-rational-choice-theories-modern-deterrence-theory-rational-choice-theory-routine-activities-theory","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/chapter-2-deterrence-and-rational-choice-theories-modern-deterrence-theory-rational-choice-theory-routine-activities-theory\/","title":{"rendered":"Chapter 2: Deterrence And Rational Choice Theories    Modern Deterrence Theory  Rational Choice Theory  Routine Activities Theory"},"content":{"rendered":"<div><\/div>\n<div>\n<h2 style=\"margin: 6px 0px; font-size: 1.8em; line-height: 1.5; cursor: auto; color: rgb(205, 205, 205);\"><span style=\"cursor: auto;\"><strong style=\"font-weight: bold; cursor: auto;\">The theories you will use for this assignment.<\/strong><\/span><\/h2>\n<p style=\"margin: 12px 0px; cursor: auto;\"><strong style=\"font-weight: bold; cursor: auto;\">Chapter 2: Deterrence And Rational Choice Theories &nbsp;<\/strong><\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto;\">\n<li style=\"cursor: auto;\" data-aria-level=\"2\" data-aria-posinset=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559683&quot;:1,&quot;335559684&quot;:-1,&quot;335559685&quot;:1440,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,4,46],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%2.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-listid=\"1\" data-font=\"Aptos\" data-leveltext=\"%2.\"><span style=\"cursor: auto;\" data-contrast=\"auto\">Modern Deterrence Theory<\/span><span style=\"cursor: auto;\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">&nbsp;<\/span><\/li>\n<\/ul>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto;\">\n<li style=\"cursor: auto;\" data-aria-level=\"2\" data-aria-posinset=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559683&quot;:1,&quot;335559684&quot;:-1,&quot;335559685&quot;:1440,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,4,46],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%2.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-listid=\"1\" data-font=\"Aptos\" data-leveltext=\"%2.\"><span style=\"cursor: auto;\" data-contrast=\"auto\">Rational Choice Theory<\/span><span style=\"cursor: auto;\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">&nbsp;<\/span><\/li>\n<\/ul>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto;\">\n<li style=\"cursor: auto;\" data-aria-level=\"2\" data-aria-posinset=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559683&quot;:1,&quot;335559684&quot;:-1,&quot;335559685&quot;:1440,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,4,46],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%2.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-listid=\"1\" data-font=\"Aptos\" data-leveltext=\"%2.\"><span style=\"cursor: auto;\" data-contrast=\"auto\">Routine Activities Theory<\/span><span style=\"cursor: auto;\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">&nbsp;<\/span><\/li>\n<\/ul>\n<h2 style=\"margin: 6px 0px; font-size: 1.8em; line-height: 1.5; cursor: auto; color: rgb(205, 205, 205);\"><span style=\"cursor: auto;\"><strong style=\"font-weight: bold; cursor: auto;\">There are 3 Steps for completing the assignment.<\/strong><\/span><\/h2>\n<h4 style=\"margin: 6px 0px; font-size: 18px; line-height: 1.5; cursor: auto; color: rgb(205, 205, 205);\"><span style=\"cursor: auto;\"><strong style=\"font-weight: bold; cursor: auto;\">STEP 1<\/strong><\/span><\/h4>\n<p style=\"margin: 12px 0px; cursor: auto;\">Read the book chapter and listen to the<span style=\"cursor: auto;\">&nbsp;<\/span><a style=\"cursor: auto;\" data-api-returntype=\"Page\" data-api-endpoint=\"https:\/\/tamuct.instructure.com\/api\/v1\/courses\/13533\/pages\/criminology-classical-criminology-rational-decision-making-and-deterrence\" data-published=\"true\" data-course-type=\"wikiPages\">narrated slides<\/a>.<\/p>\n<h4 style=\"margin: 6px 0px; font-size: 18px; line-height: 1.5; cursor: auto; color: rgb(205, 205, 205);\"><span style=\"cursor: auto;\"><strong style=\"font-weight: bold; cursor: auto;\">STEP 2<\/strong><\/span><\/h4>\n<p style=\"margin: 12px 0px; cursor: auto;\">Using the following the<span style=\"cursor: auto;\">&nbsp;<\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto;\">Crime Solutions Program Database<\/span><span style=\"cursor: auto;\"><span style=\"margin: -1px; cursor: auto;\">Links to an external site.<\/span><\/span><\/a><span style=\"cursor: auto;\">&nbsp;<\/span>of programs, locate 1 program that is based on deterrence or rational choice theories.<\/p>\n<table style=\"cursor: auto;\">\n<tbody style=\"cursor: auto;\">\n<tr style=\"cursor: auto;\">\n<td style=\"padding: 2px; cursor: auto;\">Under<span style=\"cursor: auto;\">&nbsp;<\/span><strong style=\"font-weight: bold; cursor: auto;\">Keyword Filte<\/strong>r type in any of the theories covered in the textbook and slides.&nbsp;&nbsp;<\/td>\n<\/tr>\n<tr style=\"cursor: auto;\">\n<td style=\"padding: 2px; cursor: auto;\">A list of programs will appear under the search filter box. These are the programs you can choose from. Read the summary to Click on the program<span style=\"cursor: auto;\">&nbsp;<\/span><strong style=\"font-weight: bold; cursor: auto;\">Title<\/strong><span style=\"cursor: auto;\">&nbsp;<\/span>to read about it.<\/td>\n<\/tr>\n<tr style=\"cursor: auto;\">\n<td style=\"padding: 2px; cursor: auto;\">Under the<span style=\"cursor: auto;\">&nbsp;<\/span><strong style=\"font-weight: bold; cursor: auto;\">Program Description<span style=\"cursor: auto;\">&nbsp;<\/span><\/strong>there is a section titled<span style=\"cursor: auto;\">&nbsp;<\/span><strong style=\"font-weight: bold; cursor: auto;\">Program Theory.<span style=\"cursor: auto;\">&nbsp;<\/span><\/strong>Most will have fairly detailed explanations of which theories a program is based on.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4 style=\"margin: 6px 0px; font-size: 18px; line-height: 1.5; cursor: auto; color: rgb(205, 205, 205);\"><\/h4>\n<h4 style=\"margin: 6px 0px; font-size: 18px; line-height: 1.5; cursor: auto; color: rgb(205, 205, 205);\"><strong style=\"font-weight: bold; cursor: auto;\"><span style=\"cursor: auto;\">STEP 3<\/span><\/strong><\/h4>\n<p style=\"margin: 12px 0px; cursor: auto;\"><strong style=\"font-weight: bold; cursor: auto;\">Submit the name of the theory&nbsp; and briefly explain how the program practices align with the theory. I provide an example below.&nbsp;<\/strong><\/p>\n<h2 style=\"margin: 6px 0px; font-size: 1.8em; line-height: 1.5; cursor: auto; color: rgb(205, 205, 205);\"><span style=\"cursor: auto;\"><strong style=\"font-weight: bold; cursor: auto;\">Here is an example of a good submission.<\/strong><\/span><\/h2>\n<p style=\"margin: 12px 0px; cursor: auto;\"><strong style=\"font-weight: bold; cursor: auto;\">(approximately 200 words)<\/strong><\/p>\n<p style=\"margin: 12px 0px; cursor: auto;\"><strong style=\"font-weight: bold; cursor: auto;\">Name of Theory:<\/strong><span style=\"cursor: auto;\">&nbsp;<\/span>Routine Activities Theory<\/p>\n<p style=\"margin: 12px 0px; cursor: auto;\"><strong style=\"font-weight: bold; cursor: auto;\">Program Selected:<span style=\"cursor: auto;\">&nbsp;<\/span><\/strong>Target Hardening in High Crime Areas<span style=\"cursor: auto;\">&nbsp;<\/span><span style=\"cursor: auto;\">(this<span style=\"cursor: auto;\">&nbsp;<\/span><strong style=\"font-weight: bold; cursor: auto;\">program<\/strong><span style=\"cursor: auto;\">&nbsp;<\/span>may not be used for the assignment)<\/span><\/p>\n<p style=\"margin: 12px 0px; cursor: auto;\"><span style=\"font-size: 1rem; cursor: auto;\">The Routine Activities Theory posits that three elements must converge for a crime to occur: a motivated offender, a suitable target, and the absence of a capable guardian. This theory emphasizes the importance of understanding individuals&#8217; daily routines and activities to prevent crime effectively. Target Hardening in High Crime Areas aligns with this theory by focusing on enhancing physical security measures within high-crime neighborhoods. By fortifying potential targets through measures such as installing security cameras, improving lighting, and reinforcing locks, the program aims to deter potential offenders and disrupt the routine activities necessary for criminal behavior to occur. This approach addresses the environmental factors outlined in the Routine Activities Theory, aiming to reduce the likelihood of crime in these areas. By making targets less suitable and increasing the presence of capable guardians, such as through community watch programs and increased police patrols, the program seeks to create an environment where criminal opportunities are minimized. This multi-faceted strategy, rooted in the principles of Routine Activities Theory, underscores the significance of environmental design and routine monitoring in effective crime prevention, ultimately fostering safer communities through proactive measures.<\/span><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The theories you will use for this assignment. Chapter 2: Deterrence And Rational Choice Theories &nbsp; Modern Deterrence Theory&nbsp; Rational Choice Theory&nbsp; Routine Activities Theory&nbsp; There are 3 Steps for completing the assignment. STEP 1 Read the book chapter and listen to the&nbsp;narrated slides. STEP 2 Using the following the&nbsp;Crime Solutions Program DatabaseLinks to an [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[34],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/28200"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=28200"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/28200\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=28200"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=28200"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=28200"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=28200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}