Deck 1: Cybercrime and Cybercriminals: The Development of Cybercriminology

ملء الشاشة (f)
exit full mode
سؤال
________ refers to unauthorized access to computer systems and digital devices utilizing the Internet, computers, and related technology.

A) Cybertrespass
B) Cybervandalism
C) Cybertheft
D) Cyberdeviance
E) Public order cybercrime
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
________ refers to the virtual defacement of someone else's property.

A) Cybertrespass
B) Cybervandalism
C) Cybertheft
D) Cyberdeviance
E) Public order cybercrime
سؤال
________ involves the preying on children, adults, and the elderly through communications, information, and computer technologies.

A) Cyberdeviance
B) Public order cybercrime
C) Cybervice
D) Cyberpredation
E) None of the above
سؤال
________ is an act wherein an individual places a hoax call to emergency services that a crime or other critical incident that requires an emergency police response is underway.

A) Hacking
B) Website defacement
C) Swatting
D) Wardriving
E) None of the above
سؤال
_______ refers to the use of the Internet, computers, and related technology to engage in conduct that violates social norms and expectations.

A) Cyberdeviance
B) Cybertrespass
C) Cybervandalism
D) Cyberpredation
E) None of the above
سؤال
_______ involves the planning and executing of illegal business ventures online by either hierarchical groups or decentralized networks that often conduct their operations from more than one country.

A) Cyberdeviance
B) Cybervice
C) Cybervandalism
D) Organized cybercrime
E) None of the above
سؤال
_______ is a cybercrime committed by individuals, groups, or nations in furtherance of some political goal or agenda.

A) Public order cybercrime
B) Political cybercrime
C) Cybervice
D) Organized cybercrime
E) None of the above
سؤال
_________ is a crime committed via the Internet, computers, and related technology that offends the public's shared norms, morals, values, and customs.

A) Public order cybercrime
B) Political cybercrime
C) Cybervice
D) Organized cybercrime
E) None of the above
سؤال
Cybercrime ______________.

A) occurs on a far greater scale than traditional crime
B) transcends borders
C) has the ability to reach and affect individuals around the globe
D) all of the above
E) none of the above
سؤال
Cyberspace has transformed and enhanced __________.

A) the way information is viewed, exchanged, and retrieved
B) the way in which individuals develop and maintain relationships
C) trade
D) the way money is moved
E) all of the above
سؤال
A ______ is an act that violates existing laws.
سؤال
A _______ is a person who violates the law.
سؤال
A _______ is an illicit act that targets digital devices or is committed via the Internet, computers, and related technology.
سؤال
A ______ is a person who utilizes the Internet, computers, and related technology to violate the law.
سؤال
_____ is the system of rules that regulate the public's actions and provide penalties for noncompliance.
سؤال
Those engaging in _____ drive around areas looking for vulnerable Wi-Fi networks to hack into.
سؤال
_______ is the environment within which communications and other online activities through Internet-enabled digital devices take place.
سؤال
Cybercrime can fall under ______ proposed typologies.
سؤال
______ is the scientific study of the causes of crime, the scope of crime, the responses to crime by the public, media, social and political institutions, and criminal justice systems, and the ways to control, mitigate, and prevent crime.
سؤال
______ is the study of cybercrime through the lens of criminology.
سؤال
Cybertheft refers to the stealing of personal information, medical information, financial information, and/or money via the Internet, computers, and related technology for personal or other use.
سؤال
A cybervice is a crime committed via communications, information, and computer technologies against an individual with whom the perpetrator is communicating or has some form of relationship (real or imagined).
سؤال
An example of an interpersonal cybercriminal is an online child sexual predator.
سؤال
A cybervice is online behavior that is deemed immoral because it violates accepted codes of conduct.
سؤال
An example of cyberdeviance is online paraphilia.
سؤال
Biastophilia involves abnormal sexual desires obtained from violent assaults.
سؤال
Impersonation fraud involves the manipulation of financial markets or the defrauding of investors through deception; it has also been perpetrated online.
سؤال
Skimmers are electronic devices that are used to steal the personal information stored on users' credit or debit cards and to record the users' PIN numbers.
سؤال
Impersonation fraud takes advantage of people's interest in important news stories and celebrities to get individuals to click on links that surreptitiously download malware onto a user's machine.
سؤال
Lulz is a term used to describe actions that occur at someone's expense to hurt the individual or create mayhem for enjoyment purposes.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Cybercrime and Cybercriminals: The Development of Cybercriminology
1
________ refers to unauthorized access to computer systems and digital devices utilizing the Internet, computers, and related technology.

A) Cybertrespass
B) Cybervandalism
C) Cybertheft
D) Cyberdeviance
E) Public order cybercrime
A
2
________ refers to the virtual defacement of someone else's property.

A) Cybertrespass
B) Cybervandalism
C) Cybertheft
D) Cyberdeviance
E) Public order cybercrime
B
3
________ involves the preying on children, adults, and the elderly through communications, information, and computer technologies.

A) Cyberdeviance
B) Public order cybercrime
C) Cybervice
D) Cyberpredation
E) None of the above
D
4
________ is an act wherein an individual places a hoax call to emergency services that a crime or other critical incident that requires an emergency police response is underway.

A) Hacking
B) Website defacement
C) Swatting
D) Wardriving
E) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
5
_______ refers to the use of the Internet, computers, and related technology to engage in conduct that violates social norms and expectations.

A) Cyberdeviance
B) Cybertrespass
C) Cybervandalism
D) Cyberpredation
E) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
6
_______ involves the planning and executing of illegal business ventures online by either hierarchical groups or decentralized networks that often conduct their operations from more than one country.

A) Cyberdeviance
B) Cybervice
C) Cybervandalism
D) Organized cybercrime
E) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
7
_______ is a cybercrime committed by individuals, groups, or nations in furtherance of some political goal or agenda.

A) Public order cybercrime
B) Political cybercrime
C) Cybervice
D) Organized cybercrime
E) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
8
_________ is a crime committed via the Internet, computers, and related technology that offends the public's shared norms, morals, values, and customs.

A) Public order cybercrime
B) Political cybercrime
C) Cybervice
D) Organized cybercrime
E) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
9
Cybercrime ______________.

A) occurs on a far greater scale than traditional crime
B) transcends borders
C) has the ability to reach and affect individuals around the globe
D) all of the above
E) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
10
Cyberspace has transformed and enhanced __________.

A) the way information is viewed, exchanged, and retrieved
B) the way in which individuals develop and maintain relationships
C) trade
D) the way money is moved
E) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
11
A ______ is an act that violates existing laws.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
12
A _______ is a person who violates the law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
13
A _______ is an illicit act that targets digital devices or is committed via the Internet, computers, and related technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
14
A ______ is a person who utilizes the Internet, computers, and related technology to violate the law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
15
_____ is the system of rules that regulate the public's actions and provide penalties for noncompliance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
16
Those engaging in _____ drive around areas looking for vulnerable Wi-Fi networks to hack into.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
17
_______ is the environment within which communications and other online activities through Internet-enabled digital devices take place.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
18
Cybercrime can fall under ______ proposed typologies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
19
______ is the scientific study of the causes of crime, the scope of crime, the responses to crime by the public, media, social and political institutions, and criminal justice systems, and the ways to control, mitigate, and prevent crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
20
______ is the study of cybercrime through the lens of criminology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
21
Cybertheft refers to the stealing of personal information, medical information, financial information, and/or money via the Internet, computers, and related technology for personal or other use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
22
A cybervice is a crime committed via communications, information, and computer technologies against an individual with whom the perpetrator is communicating or has some form of relationship (real or imagined).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
23
An example of an interpersonal cybercriminal is an online child sexual predator.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
24
A cybervice is online behavior that is deemed immoral because it violates accepted codes of conduct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
25
An example of cyberdeviance is online paraphilia.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
26
Biastophilia involves abnormal sexual desires obtained from violent assaults.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
27
Impersonation fraud involves the manipulation of financial markets or the defrauding of investors through deception; it has also been perpetrated online.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
28
Skimmers are electronic devices that are used to steal the personal information stored on users' credit or debit cards and to record the users' PIN numbers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
29
Impersonation fraud takes advantage of people's interest in important news stories and celebrities to get individuals to click on links that surreptitiously download malware onto a user's machine.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
30
Lulz is a term used to describe actions that occur at someone's expense to hurt the individual or create mayhem for enjoyment purposes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.