Evaluate the Major Social Structure Theories That Apply to Cybersecurity

In a word document answer the following questions.  The total response should be 1-3 pages. 
How does white-collar crime fit within strain theory? 
What are five techniques of neutralization? Provide an example of each.  
List and describe the assumptions of deterrence theory. 
Explain how cyber stalking and harassment could be the result of strains.
Describe how hackers have formed their own subculture.