In addition qualitative techniques were utilized to categorize the interviewees as well for a more broad description of their dialogue. Some of the offenses that were committed by the hackers were in these three categories; hacking, software piracy, and phreaking. But in the end their actions and responses were defined by the Techniques of Neutralization to make it appear that they did not do anything wrong or with the intent to do harm. Here are some examples of the responses that were categorized as a neutralization technique (Schmallenger, F., & Pitarro, N., 2008). …show more content…
In one case an interviewee stated that he wrote a virus and sent it to someone whenever he wanted to retaliate against them without any remorse. He thought it was fun, exciting that he could tell the virus what to do, and he never meant to cause any harm. This was the denial of injury technique that was utilized by this hacker (Schmallenger, F., & Pitarro, N.,