Deck 2: Researching and Theorizing Cybercrime

ملء الشاشة (f)
exit full mode
سؤال
This notion posits that human beings are willing to surrender some of their freedoms to be protected from those whose unfettered exercise of freedom harms others.?

A) Social contract theory
B) Cultural theory
C) Basic social theory
D) Environmental theory
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is not one of Beccaria's three components of effective punishment?

A) They should be swift in execution
B) The offender should be publicly scrutinized
C) Punishment should be sufficiently severe
D) The offender should be certain that punishment will occur
سؤال
This theory assumes that offenders conduct cost-benefit analyses before conducting criminal behaviour.?

A) Social learning theory
B) Labelling theory
C) Social disorganization theory
D) Rational choice theory
سؤال
This theory credits the propensity to commit crime to intimate peer groups which encourage favourable definitions to crime.?

A) Social disorganization theory
B) Radical criminological theory
C) Differential association theory
D) General strain theory
سؤال
According to Merton (1938), which of the five adaptations of strain describe individuals who accept both the institutionally approved goals and means?

A) Conformists
B) Retreatist
C) Innovators
D) Ritualists
سؤال
According to Merton (1938), which of the five adaptations of strain describe individuals who reject the culturally approved goals while accepting socially approved means to do so?

A) Rebels
B) Ritualists
C) Conformists
D) Innovators
سؤال
Sykes and Matza (1957) state that delinquents will provide justification for their behaviour before engaging in criminal activity in attempts to nullify dominant social controls. What do they call this phenomenon?

A) Techniques of neutralization
B) Neutralization theory
C) Delinquent drift
D) Containment theory
سؤال
Gottfredson and Hirschi's (1990) general theory of crime states that crimes, simply put, are a product of _______________.?

A) low impulsivity
B) low intelligence
C) low self-control
D) low self-esteem
سؤال
Edwin Lemert (1951) described the process through which a person could be so intensely stigmatized that their future behaviour was driven toward deviance. What did he call this?

A) The "dramatization of evil"
B) Primary deviance
C) Secondary deviance
D) Societal rationalization
سؤال
Which of the following is not an area of life which Steffensmeier and Allan (1996) state inhibit female crime while encouraging male crime?

A) Sexuality
B) Physical strength and aggression
C) Gender norms
D) Media influences
سؤال
Miller (2002) views crime as a result of gendered _______________.?

A) biology
B) performances
C) history
D) psychology
سؤال
What was the 'GamerGate' fiasco?

A) A conspiracy theory detailing how video game developers remove content from games in development only to sell it later as 'downloadable content'
B) An event where hackers claimed to have successfully penetrated a video game company and began to 'leak' information of a game that was being released
C) A cyberharassment campaign carried out against a female video game developer
D) A high-profile case where the CEO of a video game company was cyberstalked for months
سؤال
Which of the following is not one of Robert Agnew's three sources of strain?

A) Failure to achieve positively valued stimuli
B) Removal of negating stimuli
C) Removal of positively valued stimuli
D) Presentation of negative stimuli
سؤال
According to Goldsmith and Brewer (2015), the internet is said to present an interactive environment that empowers individuals through anonymity, provides a cornucopia of relatively easy-to-access information, and acts as a 'facilitator of encounters' with individuals and opportunities conducive to criminal engagement. This context is conducive to what they call _______________.?

A) Digital drift
B) Restrictive deterrence
C) Techniques of neutralization
D) Differential association
سؤال
_______________ argue that the dominant mode of production--capitalism--shapes motivations and opportunities to engage in crime as well as the processes of criminalization and crime control.?

A) Feminist criminologists
B) Social disorganization theorists
C) Radical criminologists
D) Constitutive criminologists
سؤال
According to Yar, _______________ refers to the domination of field by businesses regarding the provision of information security services and solutions.?

A) computer crime control industry
B) cybercrime prevention nexus
C) cybercrime-commercial complex
D) computer crime prevention coalition
سؤال
_______________ is the idea that instead of avoiding committing a crime entirely, a criminal may change the way they engage in a crime when confronted with threat of punishment.?

A) Perceptual deterrence
B) General deterrence
C) Specific deterrence
D) Restrictive deterrence
سؤال
Which of the following is NOT one of the methodological approaches used by criminologists to study cybercrime discussed in Chapter 2?

A) Self-report surveys
B) Interviews
C) Experimental/quasi-experimental designs
D) Autoethnography
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/18
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Researching and Theorizing Cybercrime
1
This notion posits that human beings are willing to surrender some of their freedoms to be protected from those whose unfettered exercise of freedom harms others.?

A) Social contract theory
B) Cultural theory
C) Basic social theory
D) Environmental theory
A
2
Which of the following is not one of Beccaria's three components of effective punishment?

A) They should be swift in execution
B) The offender should be publicly scrutinized
C) Punishment should be sufficiently severe
D) The offender should be certain that punishment will occur
B
3
This theory assumes that offenders conduct cost-benefit analyses before conducting criminal behaviour.?

A) Social learning theory
B) Labelling theory
C) Social disorganization theory
D) Rational choice theory
D
4
This theory credits the propensity to commit crime to intimate peer groups which encourage favourable definitions to crime.?

A) Social disorganization theory
B) Radical criminological theory
C) Differential association theory
D) General strain theory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
5
According to Merton (1938), which of the five adaptations of strain describe individuals who accept both the institutionally approved goals and means?

A) Conformists
B) Retreatist
C) Innovators
D) Ritualists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
6
According to Merton (1938), which of the five adaptations of strain describe individuals who reject the culturally approved goals while accepting socially approved means to do so?

A) Rebels
B) Ritualists
C) Conformists
D) Innovators
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
7
Sykes and Matza (1957) state that delinquents will provide justification for their behaviour before engaging in criminal activity in attempts to nullify dominant social controls. What do they call this phenomenon?

A) Techniques of neutralization
B) Neutralization theory
C) Delinquent drift
D) Containment theory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
8
Gottfredson and Hirschi's (1990) general theory of crime states that crimes, simply put, are a product of _______________.?

A) low impulsivity
B) low intelligence
C) low self-control
D) low self-esteem
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
9
Edwin Lemert (1951) described the process through which a person could be so intensely stigmatized that their future behaviour was driven toward deviance. What did he call this?

A) The "dramatization of evil"
B) Primary deviance
C) Secondary deviance
D) Societal rationalization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is not an area of life which Steffensmeier and Allan (1996) state inhibit female crime while encouraging male crime?

A) Sexuality
B) Physical strength and aggression
C) Gender norms
D) Media influences
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
11
Miller (2002) views crime as a result of gendered _______________.?

A) biology
B) performances
C) history
D) psychology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
12
What was the 'GamerGate' fiasco?

A) A conspiracy theory detailing how video game developers remove content from games in development only to sell it later as 'downloadable content'
B) An event where hackers claimed to have successfully penetrated a video game company and began to 'leak' information of a game that was being released
C) A cyberharassment campaign carried out against a female video game developer
D) A high-profile case where the CEO of a video game company was cyberstalked for months
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is not one of Robert Agnew's three sources of strain?

A) Failure to achieve positively valued stimuli
B) Removal of negating stimuli
C) Removal of positively valued stimuli
D) Presentation of negative stimuli
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
14
According to Goldsmith and Brewer (2015), the internet is said to present an interactive environment that empowers individuals through anonymity, provides a cornucopia of relatively easy-to-access information, and acts as a 'facilitator of encounters' with individuals and opportunities conducive to criminal engagement. This context is conducive to what they call _______________.?

A) Digital drift
B) Restrictive deterrence
C) Techniques of neutralization
D) Differential association
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
15
_______________ argue that the dominant mode of production--capitalism--shapes motivations and opportunities to engage in crime as well as the processes of criminalization and crime control.?

A) Feminist criminologists
B) Social disorganization theorists
C) Radical criminologists
D) Constitutive criminologists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
16
According to Yar, _______________ refers to the domination of field by businesses regarding the provision of information security services and solutions.?

A) computer crime control industry
B) cybercrime prevention nexus
C) cybercrime-commercial complex
D) computer crime prevention coalition
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
17
_______________ is the idea that instead of avoiding committing a crime entirely, a criminal may change the way they engage in a crime when confronted with threat of punishment.?

A) Perceptual deterrence
B) General deterrence
C) Specific deterrence
D) Restrictive deterrence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is NOT one of the methodological approaches used by criminologists to study cybercrime discussed in Chapter 2?

A) Self-report surveys
B) Interviews
C) Experimental/quasi-experimental designs
D) Autoethnography
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.