Deck 1: Cybercrime and Cybercriminals: The Development of Cybercriminology
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
Play
Full screen (f)
Deck 1: Cybercrime and Cybercriminals: The Development of Cybercriminology
1
________ refers to unauthorized access to computer systems and digital devices utilizing the Internet, computers, and related technology.
A) Cybertrespass
B) Cybervandalism
C) Cybertheft
D) Cyberdeviance
E) Public order cybercrime
A) Cybertrespass
B) Cybervandalism
C) Cybertheft
D) Cyberdeviance
E) Public order cybercrime
A
2
________ refers to the virtual defacement of someone else's property.
A) Cybertrespass
B) Cybervandalism
C) Cybertheft
D) Cyberdeviance
E) Public order cybercrime
A) Cybertrespass
B) Cybervandalism
C) Cybertheft
D) Cyberdeviance
E) Public order cybercrime
B
3
________ involves the preying on children, adults, and the elderly through communications, information, and computer technologies.
A) Cyberdeviance
B) Public order cybercrime
C) Cybervice
D) Cyberpredation
E) None of the above
A) Cyberdeviance
B) Public order cybercrime
C) Cybervice
D) Cyberpredation
E) None of the above
D
4
________ is an act wherein an individual places a hoax call to emergency services that a crime or other critical incident that requires an emergency police response is underway.
A) Hacking
B) Website defacement
C) Swatting
D) Wardriving
E) None of the above
A) Hacking
B) Website defacement
C) Swatting
D) Wardriving
E) None of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
_______ refers to the use of the Internet, computers, and related technology to engage in conduct that violates social norms and expectations.
A) Cyberdeviance
B) Cybertrespass
C) Cybervandalism
D) Cyberpredation
E) None of the above
A) Cyberdeviance
B) Cybertrespass
C) Cybervandalism
D) Cyberpredation
E) None of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
_______ involves the planning and executing of illegal business ventures online by either hierarchical groups or decentralized networks that often conduct their operations from more than one country.
A) Cyberdeviance
B) Cybervice
C) Cybervandalism
D) Organized cybercrime
E) None of the above
A) Cyberdeviance
B) Cybervice
C) Cybervandalism
D) Organized cybercrime
E) None of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
_______ is a cybercrime committed by individuals, groups, or nations in furtherance of some political goal or agenda.
A) Public order cybercrime
B) Political cybercrime
C) Cybervice
D) Organized cybercrime
E) None of the above
A) Public order cybercrime
B) Political cybercrime
C) Cybervice
D) Organized cybercrime
E) None of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
_________ is a crime committed via the Internet, computers, and related technology that offends the public's shared norms, morals, values, and customs.
A) Public order cybercrime
B) Political cybercrime
C) Cybervice
D) Organized cybercrime
E) None of the above
A) Public order cybercrime
B) Political cybercrime
C) Cybervice
D) Organized cybercrime
E) None of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
Cybercrime ______________.
A) occurs on a far greater scale than traditional crime
B) transcends borders
C) has the ability to reach and affect individuals around the globe
D) all of the above
E) none of the above
A) occurs on a far greater scale than traditional crime
B) transcends borders
C) has the ability to reach and affect individuals around the globe
D) all of the above
E) none of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
Cyberspace has transformed and enhanced __________.
A) the way information is viewed, exchanged, and retrieved
B) the way in which individuals develop and maintain relationships
C) trade
D) the way money is moved
E) all of the above
A) the way information is viewed, exchanged, and retrieved
B) the way in which individuals develop and maintain relationships
C) trade
D) the way money is moved
E) all of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
A ______ is an act that violates existing laws.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
A _______ is a person who violates the law.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
A _______ is an illicit act that targets digital devices or is committed via the Internet, computers, and related technology.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
A ______ is a person who utilizes the Internet, computers, and related technology to violate the law.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
_____ is the system of rules that regulate the public's actions and provide penalties for noncompliance.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
Those engaging in _____ drive around areas looking for vulnerable Wi-Fi networks to hack into.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
_______ is the environment within which communications and other online activities through Internet-enabled digital devices take place.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
Cybercrime can fall under ______ proposed typologies.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
______ is the scientific study of the causes of crime, the scope of crime, the responses to crime by the public, media, social and political institutions, and criminal justice systems, and the ways to control, mitigate, and prevent crime.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
______ is the study of cybercrime through the lens of criminology.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
Cybertheft refers to the stealing of personal information, medical information, financial information, and/or money via the Internet, computers, and related technology for personal or other use.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
A cybervice is a crime committed via communications, information, and computer technologies against an individual with whom the perpetrator is communicating or has some form of relationship (real or imagined).
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
An example of an interpersonal cybercriminal is an online child sexual predator.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
A cybervice is online behavior that is deemed immoral because it violates accepted codes of conduct.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
An example of cyberdeviance is online paraphilia.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
Biastophilia involves abnormal sexual desires obtained from violent assaults.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
Impersonation fraud involves the manipulation of financial markets or the defrauding of investors through deception; it has also been perpetrated online.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
Skimmers are electronic devices that are used to steal the personal information stored on users' credit or debit cards and to record the users' PIN numbers.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
Impersonation fraud takes advantage of people's interest in important news stories and celebrities to get individuals to click on links that surreptitiously download malware onto a user's machine.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
Lulz is a term used to describe actions that occur at someone's expense to hurt the individual or create mayhem for enjoyment purposes.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck

