Deck 2: Researching and Theorizing Cybercrime
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/18
العب
ملء الشاشة (f)
Deck 2: Researching and Theorizing Cybercrime
1
This notion posits that human beings are willing to surrender some of their freedoms to be protected from those whose unfettered exercise of freedom harms others.?
A) Social contract theory
B) Cultural theory
C) Basic social theory
D) Environmental theory
A) Social contract theory
B) Cultural theory
C) Basic social theory
D) Environmental theory
A
2
Which of the following is not one of Beccaria's three components of effective punishment?
A) They should be swift in execution
B) The offender should be publicly scrutinized
C) Punishment should be sufficiently severe
D) The offender should be certain that punishment will occur
A) They should be swift in execution
B) The offender should be publicly scrutinized
C) Punishment should be sufficiently severe
D) The offender should be certain that punishment will occur
B
3
This theory assumes that offenders conduct cost-benefit analyses before conducting criminal behaviour.?
A) Social learning theory
B) Labelling theory
C) Social disorganization theory
D) Rational choice theory
A) Social learning theory
B) Labelling theory
C) Social disorganization theory
D) Rational choice theory
D
4
This theory credits the propensity to commit crime to intimate peer groups which encourage favourable definitions to crime.?
A) Social disorganization theory
B) Radical criminological theory
C) Differential association theory
D) General strain theory
A) Social disorganization theory
B) Radical criminological theory
C) Differential association theory
D) General strain theory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
5
According to Merton (1938), which of the five adaptations of strain describe individuals who accept both the institutionally approved goals and means?
A) Conformists
B) Retreatist
C) Innovators
D) Ritualists
A) Conformists
B) Retreatist
C) Innovators
D) Ritualists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
6
According to Merton (1938), which of the five adaptations of strain describe individuals who reject the culturally approved goals while accepting socially approved means to do so?
A) Rebels
B) Ritualists
C) Conformists
D) Innovators
A) Rebels
B) Ritualists
C) Conformists
D) Innovators
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
7
Sykes and Matza (1957) state that delinquents will provide justification for their behaviour before engaging in criminal activity in attempts to nullify dominant social controls. What do they call this phenomenon?
A) Techniques of neutralization
B) Neutralization theory
C) Delinquent drift
D) Containment theory
A) Techniques of neutralization
B) Neutralization theory
C) Delinquent drift
D) Containment theory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
8
Gottfredson and Hirschi's (1990) general theory of crime states that crimes, simply put, are a product of _______________.?
A) low impulsivity
B) low intelligence
C) low self-control
D) low self-esteem
A) low impulsivity
B) low intelligence
C) low self-control
D) low self-esteem
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
9
Edwin Lemert (1951) described the process through which a person could be so intensely stigmatized that their future behaviour was driven toward deviance. What did he call this?
A) The "dramatization of evil"
B) Primary deviance
C) Secondary deviance
D) Societal rationalization
A) The "dramatization of evil"
B) Primary deviance
C) Secondary deviance
D) Societal rationalization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is not an area of life which Steffensmeier and Allan (1996) state inhibit female crime while encouraging male crime?
A) Sexuality
B) Physical strength and aggression
C) Gender norms
D) Media influences
A) Sexuality
B) Physical strength and aggression
C) Gender norms
D) Media influences
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
11
Miller (2002) views crime as a result of gendered _______________.?
A) biology
B) performances
C) history
D) psychology
A) biology
B) performances
C) history
D) psychology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
12
What was the 'GamerGate' fiasco?
A) A conspiracy theory detailing how video game developers remove content from games in development only to sell it later as 'downloadable content'
B) An event where hackers claimed to have successfully penetrated a video game company and began to 'leak' information of a game that was being released
C) A cyberharassment campaign carried out against a female video game developer
D) A high-profile case where the CEO of a video game company was cyberstalked for months
A) A conspiracy theory detailing how video game developers remove content from games in development only to sell it later as 'downloadable content'
B) An event where hackers claimed to have successfully penetrated a video game company and began to 'leak' information of a game that was being released
C) A cyberharassment campaign carried out against a female video game developer
D) A high-profile case where the CEO of a video game company was cyberstalked for months
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is not one of Robert Agnew's three sources of strain?
A) Failure to achieve positively valued stimuli
B) Removal of negating stimuli
C) Removal of positively valued stimuli
D) Presentation of negative stimuli
A) Failure to achieve positively valued stimuli
B) Removal of negating stimuli
C) Removal of positively valued stimuli
D) Presentation of negative stimuli
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
14
According to Goldsmith and Brewer (2015), the internet is said to present an interactive environment that empowers individuals through anonymity, provides a cornucopia of relatively easy-to-access information, and acts as a 'facilitator of encounters' with individuals and opportunities conducive to criminal engagement. This context is conducive to what they call _______________.?
A) Digital drift
B) Restrictive deterrence
C) Techniques of neutralization
D) Differential association
A) Digital drift
B) Restrictive deterrence
C) Techniques of neutralization
D) Differential association
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
15
_______________ argue that the dominant mode of production--capitalism--shapes motivations and opportunities to engage in crime as well as the processes of criminalization and crime control.?
A) Feminist criminologists
B) Social disorganization theorists
C) Radical criminologists
D) Constitutive criminologists
A) Feminist criminologists
B) Social disorganization theorists
C) Radical criminologists
D) Constitutive criminologists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
16
According to Yar, _______________ refers to the domination of field by businesses regarding the provision of information security services and solutions.?
A) computer crime control industry
B) cybercrime prevention nexus
C) cybercrime-commercial complex
D) computer crime prevention coalition
A) computer crime control industry
B) cybercrime prevention nexus
C) cybercrime-commercial complex
D) computer crime prevention coalition
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
17
_______________ is the idea that instead of avoiding committing a crime entirely, a criminal may change the way they engage in a crime when confronted with threat of punishment.?
A) Perceptual deterrence
B) General deterrence
C) Specific deterrence
D) Restrictive deterrence
A) Perceptual deterrence
B) General deterrence
C) Specific deterrence
D) Restrictive deterrence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is NOT one of the methodological approaches used by criminologists to study cybercrime discussed in Chapter 2?
A) Self-report surveys
B) Interviews
C) Experimental/quasi-experimental designs
D) Autoethnography
A) Self-report surveys
B) Interviews
C) Experimental/quasi-experimental designs
D) Autoethnography
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck

