Deck 14: Cyberstalking

ملء الشاشة (f)
exit full mode
سؤال
A stalker's ability to frighten and control a victim increases with the amount of information that he can gather, such as:

A) Telephone numbers
B) Addresses
C) Personal preferences
D) All of the above
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Stalkers use information to impinge on their victims' lives.
سؤال
When a cyberstalker chooses victims at random, he is said to be an:

A) Opportunistic stalker
B) Power assertive stalker
C) Profit-oriented stalker
D) None of the above
سؤال
Cyberstalking works in a completely different way than stalking in the physical world.
سؤال
It is extremely important for the investigator to be extremely cautious when dealing with a stalking case because:

A) If the victim becomes offended by the investigator's methods, she is likely to go file a complaint.
B) If the investigation is conducted too openly, the offender may stop the harassment and move on to another victim.
C) The victim must be protected, in case the offender decides to escalate to physical violence.
D) The victims frequently become emotionally attached to the investigator.
سؤال
The first state in the United States to enact a law to deal with cyberstalkers was:

A) Texas
B) Hawaii
C) California
D) New York
سؤال
Studies indicate that stalkers will always have prior acquaintance with their victims.
سؤال
Stalkers want to exert power over their victims, primarily through:

A) Fear
B) Anxiety
C) Autosuggestion
D) Peer pressure
سؤال
That part of cyberstalking where the offender is using the Internet to find a victim is known as:

A) Profiling
B) Trolling
C) Surreptitious monitoring
D) None of the above.
سؤال
In determining how and why the offender selected a specific victim, the investigator should determine whether the cyberstalker:

A) Knew the victim
B) Learned about the victim through a personal web page
C) Noticed the victim in a chat room
D) All of the above
سؤال
The first cyberstalking law in the US was passed in:

A) 1985
B) 1990
C) 1995
D) 2000
سؤال
When a cyberstalking case is stalled, it is a good idea to interview the victim again, because:

A) The victim might have been withholding information during the first interview.
B) The information that investigators have gathered might help the victim recall additional details.
C) The time between the first and second interviews has given the victim time to seek counseling.
D) None of the above.
سؤال
In general stalkers want to exert power over their victims in some way, primarily through fear.
سؤال
A key aspect of developing victimology is determining victim and offender _________.

A) Hobbies
B) Likes and dislikes
C) Risks
D) Roles
سؤال
Stalkers have taken to the Internet because:

A) The cost of an Internet connection has dropped considerably.
B) They depend heavily on information and the Internet contains vast amounts.
C) They no longer have to go out to do their stalking.
D) None of the above.
سؤال
When searching for evidence of cyberstalking, it is useful to distinguish between an offender's harassing behaviors and _________behaviors.

A) Grooming
B) Surreptitious monitoring
C) Initial contact
D) Congenial
سؤال
The Internet contains a vast amount of personal information about people but it is relatively difficult to search for specific items.
سؤال
The initial stage in a cyberstalking investigation is to:

A) Search for additional digital evidence
B) Analyze crime scene characteristics
C) Conduct victimology and risk assessments
D) Interview the victim
سؤال
An excellent set of guidelines developed specifically for victims of stalking is available from:

A) The National Center for Victims of Crime
B) The National White Collar Crime Center
C) The Department of Justice
D) The National Institute of Justice
سؤال
An implication from studies indicating that many stalkers had prior acquaintance with their victims is that:

A) Part of the blame can be assigned to the victim.
B) The offender is likely to be found in the same area as the victim.
C) Investigators should pay particular attention to acquaintances of the victim.
D) Investigators should always check the immediate family.
سؤال
When searching for evidence of cyberstalking, it is useful to distinguish between the offenders' harassing behaviors and surreptitious monitoring behaviors.
سؤال
The victim is usually only aware of the harassing component of cyberstalking.
سؤال
Investigators might not be able to define the primary crime scene clearly because digital evidence is often spread all over the Internet.
سؤال
There is never correlation between the victim's Internet activities and physical surroundings or real-world activities.
سؤال
A key aspect of developing victimology is determining victim and offender risk.
سؤال
As part of the investigation, an investigator should ask why a particular stalker used the
Internet.
سؤال
The first step in a cyberstalking investigation is to conduct the victimology and risk assessment.
سؤال
When interviewing the victim, investigators should be as tactful as possible while questioning everything, and assume nothing.
سؤال
As part of the interview process, the investigator should tell the victim that the stalker will cease harassing them when they're no longer giving the desired response.
سؤال
Regardless of the type of investigation, investigators ask "who, what, when, where, and why" questions. However, when dealing with cyberstalking victims, those questions have to be asked tactfully, and without assigning blame.
سؤال
The primary aim of the motivational stage of the investigation is to understand the victim-offender relationship.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/31
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Cyberstalking
1
A stalker's ability to frighten and control a victim increases with the amount of information that he can gather, such as:

A) Telephone numbers
B) Addresses
C) Personal preferences
D) All of the above
D
2
Stalkers use information to impinge on their victims' lives.
True
3
When a cyberstalker chooses victims at random, he is said to be an:

A) Opportunistic stalker
B) Power assertive stalker
C) Profit-oriented stalker
D) None of the above
A
4
Cyberstalking works in a completely different way than stalking in the physical world.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
5
It is extremely important for the investigator to be extremely cautious when dealing with a stalking case because:

A) If the victim becomes offended by the investigator's methods, she is likely to go file a complaint.
B) If the investigation is conducted too openly, the offender may stop the harassment and move on to another victim.
C) The victim must be protected, in case the offender decides to escalate to physical violence.
D) The victims frequently become emotionally attached to the investigator.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
6
The first state in the United States to enact a law to deal with cyberstalkers was:

A) Texas
B) Hawaii
C) California
D) New York
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
7
Studies indicate that stalkers will always have prior acquaintance with their victims.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
8
Stalkers want to exert power over their victims, primarily through:

A) Fear
B) Anxiety
C) Autosuggestion
D) Peer pressure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
9
That part of cyberstalking where the offender is using the Internet to find a victim is known as:

A) Profiling
B) Trolling
C) Surreptitious monitoring
D) None of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
10
In determining how and why the offender selected a specific victim, the investigator should determine whether the cyberstalker:

A) Knew the victim
B) Learned about the victim through a personal web page
C) Noticed the victim in a chat room
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
11
The first cyberstalking law in the US was passed in:

A) 1985
B) 1990
C) 1995
D) 2000
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
12
When a cyberstalking case is stalled, it is a good idea to interview the victim again, because:

A) The victim might have been withholding information during the first interview.
B) The information that investigators have gathered might help the victim recall additional details.
C) The time between the first and second interviews has given the victim time to seek counseling.
D) None of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
13
In general stalkers want to exert power over their victims in some way, primarily through fear.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
14
A key aspect of developing victimology is determining victim and offender _________.

A) Hobbies
B) Likes and dislikes
C) Risks
D) Roles
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
15
Stalkers have taken to the Internet because:

A) The cost of an Internet connection has dropped considerably.
B) They depend heavily on information and the Internet contains vast amounts.
C) They no longer have to go out to do their stalking.
D) None of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
16
When searching for evidence of cyberstalking, it is useful to distinguish between an offender's harassing behaviors and _________behaviors.

A) Grooming
B) Surreptitious monitoring
C) Initial contact
D) Congenial
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
17
The Internet contains a vast amount of personal information about people but it is relatively difficult to search for specific items.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
18
The initial stage in a cyberstalking investigation is to:

A) Search for additional digital evidence
B) Analyze crime scene characteristics
C) Conduct victimology and risk assessments
D) Interview the victim
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
19
An excellent set of guidelines developed specifically for victims of stalking is available from:

A) The National Center for Victims of Crime
B) The National White Collar Crime Center
C) The Department of Justice
D) The National Institute of Justice
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
20
An implication from studies indicating that many stalkers had prior acquaintance with their victims is that:

A) Part of the blame can be assigned to the victim.
B) The offender is likely to be found in the same area as the victim.
C) Investigators should pay particular attention to acquaintances of the victim.
D) Investigators should always check the immediate family.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
21
When searching for evidence of cyberstalking, it is useful to distinguish between the offenders' harassing behaviors and surreptitious monitoring behaviors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
22
The victim is usually only aware of the harassing component of cyberstalking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
23
Investigators might not be able to define the primary crime scene clearly because digital evidence is often spread all over the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
24
There is never correlation between the victim's Internet activities and physical surroundings or real-world activities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
25
A key aspect of developing victimology is determining victim and offender risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
26
As part of the investigation, an investigator should ask why a particular stalker used the
Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
27
The first step in a cyberstalking investigation is to conduct the victimology and risk assessment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
28
When interviewing the victim, investigators should be as tactful as possible while questioning everything, and assume nothing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
29
As part of the interview process, the investigator should tell the victim that the stalker will cease harassing them when they're no longer giving the desired response.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
30
Regardless of the type of investigation, investigators ask "who, what, when, where, and why" questions. However, when dealing with cyberstalking victims, those questions have to be asked tactfully, and without assigning blame.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
31
The primary aim of the motivational stage of the investigation is to understand the victim-offender relationship.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 31 في هذه المجموعة.