Social Disorganization Theory
From the outset, we must posit that cybercrimes are relatively new phenomenon in the sociological discipline; therefore, the sociologists have to employ their sociological imaginations to ground these behaviors in the most appropriate framework by understanding, not only the paradigm that it was birth, but also blending historic terminologies with contemporary ideas to provide appropriate analyzations. Sociologists examines social phenomenon through the pedagogical lens of deviant actions from social groups and norms in regards to criminal behavior. It follows that sociologists have developed social structure theories in an effort to link behavioral patterns to social-economic control and other social factors (Kelly and Anderson 2000). Arising from the social structure theories is the social disorganization theory. This theory is selected an as empirical foundation for understanding the breaching of personnel security in work organizations.
The theory of social disorganization grew out of the research conducted at the University of Chicago by Shaw and McKay. Social disorganization occurs when there is a weakened social stability in a community. Shaw and McKay used this theory in understanding how crime and delinquency became prevalent in an urban area. They discovered that overtime criminals become accustomed to the culture and its vulnerabilities in which criminals could prey on which in turn led to the conclusion that neighborhoods ecological conditions shape crime rates over and above the characteristics of the individuals (Cantillon, Davidson, and Schweitzer 2003). Consistently in interdisciplinary research, the constituencies on the internet has been referred to as a community due to the identical factor that constitutes the historic definitions of community. Leaning on this understanding the tenets of social disorganization theory applies.
At its core, social disorganization theory focuses on the effects of access characteristics as it relates to crime. (Mustaine, Tewskbury and Stengel 2006). Communities lacking organizational social controls and are unable to provide essential services or protection. This leads to an inability of the organization to control its public which is why personnel security is particularly egregious (Krubrin and Weitzer 2003). Work organizations have a responsibility to secure sensitive and confidential information in a cyber “vault” to ensure that data breached do not occur for the integrity of its employees. Not doing so, whether intentionally or not, results in the organization being hacked and the personal information of all is attainable by criminals from all levels of the American social hierarchy and beyond. When this occurs, the organization is not longer able to function with integrity which will cause social disorganization or chaos in the workplace.