preview

Criminological Enterprise

Decent Essays
Open Document

The criminological enterprise is essentially a library of areas of criminology that can be studied and utilized to help the overall aspect of understanding crime and its effects. In this library you can find multiple subareas of criminology that criminologists study and research in order to obtain the full realm of comprehension of crime and criminal behavior, statistics, predictions law and so on. Take for example; criminal behavior systems and crime typologies, this subarea is used for, “Determining the nature and cause of specific crime patterns” (Siegel, 9). A criminologist that specializes in this area would focus their research on patterns of violent crime, public order crime and organized crime. “White-collar crime” was coined by …show more content…

This area allows us to have better information in how we should approach crime in specific areas of our Country. But, that is not all that this area focuses on; it also “identifies the victims of crime; create surveys designed to have victim report loss and injury that may have not been reported to the police” (Siegel, 6).
Now we have the sociology of law and or law and society, in which “they measure the forces that can change laws and society” (Siegel, 12). This subarea puts its sights on how social forces shape criminal law and conversely how criminal law shapes society (Siegel, 7). They study origins of laws, how they affected society, how, historically, society has changed in order to need a new law and also how to establish effective laws that would fight crime.
Theory construction and testing is a subarea that aims to predict individual behavior. For instance, criminologist may want to see if incestuous behavior is learned. If a father is having sexual relations with his niece, but has a son with his own wife, would that son, too, begin having sexual relations within his family as well? Just like sexual abuse by parents, or pedophiles. This testing allows us to gain a better understanding of the connections of behaviors of

Get Access