In this study are presented and analysed three theories regarding causation of Cyber crime phenomenon: Space Transition Theory, Routine Activities Theory and Social Learning Theory. Criminologists intend to collect important data about cyber crime and to interpret it from the scientific point of view. By development of some declarations empirically verified or of some hypotheses and their inclusion within the theories regarding causality of cyber-crimes, criminologists hope to identify the causes which determine perpetration of crimes in cyberspace. One of the important objectives in criminological research of cyber-crime is the elaboration of some valid and accurate theories regarding causation of crimes in cyberspace. Since Criminology noticed the occurrence of cyberspace as being a new place for the carrying out of crime activity, the necessity to elaborate a new theory to explain causes of perpetrating crimes in the cyberspace occurred. Thus, a theory specific to cyber-crime occurred, the Space Transition Theory, which explains the criminal behavior in cyberspace. The theory supports the idea that people behave differently when they move from physical space to cyberspace. Criminological researches relating to causes which determine the perpetration of cyber-crimes have been analysed in specialty literature from the point of view of criminological general theories. In this study, two general criminological theories applying to cyber-crime have been studied: Routine Activities Theory and Social Learning Theory. A criminological analysis has been carried out on the fact if Routine Activities Theory may address to a form of criminality which is not carried out in the physical space and time and which exists only in information systems, such as infection of computer with a malicious program. In order to approach this desideratum, it has been analysed the use of malicious programs by examining the hypotheses derived from the Routine Activities Theory. Applying the five concepts of the Social Learning Theory in using Internet by terrorists, a criminological analysis has been carried out in relation to the manner in which Internet network is used in order to develop terrorist activities. [ABSTRACT FROM AUTHOR]