Deck 14: Cyberstalking
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/31
العب
ملء الشاشة (f)
Deck 14: Cyberstalking
1
A stalker's ability to frighten and control a victim increases with the amount of information that he can gather, such as:
A) Telephone numbers
B) Addresses
C) Personal preferences
D) All of the above
A) Telephone numbers
B) Addresses
C) Personal preferences
D) All of the above
D
2
Stalkers use information to impinge on their victims' lives.
True
3
When a cyberstalker chooses victims at random, he is said to be an:
A) Opportunistic stalker
B) Power assertive stalker
C) Profit-oriented stalker
D) None of the above
A) Opportunistic stalker
B) Power assertive stalker
C) Profit-oriented stalker
D) None of the above
A
4
Cyberstalking works in a completely different way than stalking in the physical world.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
5
It is extremely important for the investigator to be extremely cautious when dealing with a stalking case because:
A) If the victim becomes offended by the investigator's methods, she is likely to go file a complaint.
B) If the investigation is conducted too openly, the offender may stop the harassment and move on to another victim.
C) The victim must be protected, in case the offender decides to escalate to physical violence.
D) The victims frequently become emotionally attached to the investigator.
A) If the victim becomes offended by the investigator's methods, she is likely to go file a complaint.
B) If the investigation is conducted too openly, the offender may stop the harassment and move on to another victim.
C) The victim must be protected, in case the offender decides to escalate to physical violence.
D) The victims frequently become emotionally attached to the investigator.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
6
The first state in the United States to enact a law to deal with cyberstalkers was:
A) Texas
B) Hawaii
C) California
D) New York
A) Texas
B) Hawaii
C) California
D) New York
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
7
Studies indicate that stalkers will always have prior acquaintance with their victims.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
8
Stalkers want to exert power over their victims, primarily through:
A) Fear
B) Anxiety
C) Autosuggestion
D) Peer pressure
A) Fear
B) Anxiety
C) Autosuggestion
D) Peer pressure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
9
That part of cyberstalking where the offender is using the Internet to find a victim is known as:
A) Profiling
B) Trolling
C) Surreptitious monitoring
D) None of the above.
A) Profiling
B) Trolling
C) Surreptitious monitoring
D) None of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
10
In determining how and why the offender selected a specific victim, the investigator should determine whether the cyberstalker:
A) Knew the victim
B) Learned about the victim through a personal web page
C) Noticed the victim in a chat room
D) All of the above
A) Knew the victim
B) Learned about the victim through a personal web page
C) Noticed the victim in a chat room
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
11
The first cyberstalking law in the US was passed in:
A) 1985
B) 1990
C) 1995
D) 2000
A) 1985
B) 1990
C) 1995
D) 2000
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
12
When a cyberstalking case is stalled, it is a good idea to interview the victim again, because:
A) The victim might have been withholding information during the first interview.
B) The information that investigators have gathered might help the victim recall additional details.
C) The time between the first and second interviews has given the victim time to seek counseling.
D) None of the above.
A) The victim might have been withholding information during the first interview.
B) The information that investigators have gathered might help the victim recall additional details.
C) The time between the first and second interviews has given the victim time to seek counseling.
D) None of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
13
In general stalkers want to exert power over their victims in some way, primarily through fear.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
14
A key aspect of developing victimology is determining victim and offender _________.
A) Hobbies
B) Likes and dislikes
C) Risks
D) Roles
A) Hobbies
B) Likes and dislikes
C) Risks
D) Roles
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
15
Stalkers have taken to the Internet because:
A) The cost of an Internet connection has dropped considerably.
B) They depend heavily on information and the Internet contains vast amounts.
C) They no longer have to go out to do their stalking.
D) None of the above.
A) The cost of an Internet connection has dropped considerably.
B) They depend heavily on information and the Internet contains vast amounts.
C) They no longer have to go out to do their stalking.
D) None of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
16
When searching for evidence of cyberstalking, it is useful to distinguish between an offender's harassing behaviors and _________behaviors.
A) Grooming
B) Surreptitious monitoring
C) Initial contact
D) Congenial
A) Grooming
B) Surreptitious monitoring
C) Initial contact
D) Congenial
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
17
The Internet contains a vast amount of personal information about people but it is relatively difficult to search for specific items.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
18
The initial stage in a cyberstalking investigation is to:
A) Search for additional digital evidence
B) Analyze crime scene characteristics
C) Conduct victimology and risk assessments
D) Interview the victim
A) Search for additional digital evidence
B) Analyze crime scene characteristics
C) Conduct victimology and risk assessments
D) Interview the victim
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
19
An excellent set of guidelines developed specifically for victims of stalking is available from:
A) The National Center for Victims of Crime
B) The National White Collar Crime Center
C) The Department of Justice
D) The National Institute of Justice
A) The National Center for Victims of Crime
B) The National White Collar Crime Center
C) The Department of Justice
D) The National Institute of Justice
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
20
An implication from studies indicating that many stalkers had prior acquaintance with their victims is that:
A) Part of the blame can be assigned to the victim.
B) The offender is likely to be found in the same area as the victim.
C) Investigators should pay particular attention to acquaintances of the victim.
D) Investigators should always check the immediate family.
A) Part of the blame can be assigned to the victim.
B) The offender is likely to be found in the same area as the victim.
C) Investigators should pay particular attention to acquaintances of the victim.
D) Investigators should always check the immediate family.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
21
When searching for evidence of cyberstalking, it is useful to distinguish between the offenders' harassing behaviors and surreptitious monitoring behaviors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
22
The victim is usually only aware of the harassing component of cyberstalking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
23
Investigators might not be able to define the primary crime scene clearly because digital evidence is often spread all over the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
24
There is never correlation between the victim's Internet activities and physical surroundings or real-world activities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
25
A key aspect of developing victimology is determining victim and offender risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
26
As part of the investigation, an investigator should ask why a particular stalker used the
Internet.
Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
27
The first step in a cyberstalking investigation is to conduct the victimology and risk assessment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
28
When interviewing the victim, investigators should be as tactful as possible while questioning everything, and assume nothing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
29
As part of the interview process, the investigator should tell the victim that the stalker will cease harassing them when they're no longer giving the desired response.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
30
Regardless of the type of investigation, investigators ask "who, what, when, where, and why" questions. However, when dealing with cyberstalking victims, those questions have to be asked tactfully, and without assigning blame.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
31
The primary aim of the motivational stage of the investigation is to understand the victim-offender relationship.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck

