Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Criminal Justice
Study Set
Criminology Study Set 1
Quiz 18: Cybercrime and Cyberdeviance
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
Which of the following can best be described as ripping?
Question 2
Multiple Choice
Which of the following can best be described as spamming?
Question 3
Multiple Choice
Which of the following does not represent a critical infrastructure site that would be subject to a cyber-terrorist attack?
Question 4
Multiple Choice
Which of the following statements best reflects the findings of Raskauskas and Stoltz (2007) ,that the most common form of electronic victimization among adolescents was text messaging via mobile device?
Question 5
Multiple Choice
To better understand online victimization,the textbook argues that research on cyberbullying and cyber-victimology must include an assessment of risk.Which of the following best represents the focus of such a risk assessment?
Question 6
Multiple Choice
Cyberbullying Reporter employed critical discourse analysis and corpus linguistics to aggressive or antisocial online exchanges.What was the purpose of this exercise?
Question 7
Multiple Choice
Within the context of cybercrime,which of the following best reflects the term "technological determinism"?
Question 8
Multiple Choice
What is the name applied to a parallel Internet that exists beneath the surface of conventional browsers,features sites not indexed by search engines,is unregulated,and is rife with criminal activity and illegal transactions?
Question 9
Multiple Choice
Which of the following terms refer to the use of software and hardware to steal data (usually related to credit cards) by intercepting e-transmissions,which then enable the cloning or counterfeiting of specific financial instruments (credit cards,bank cards,etc. ) for the purposes of theft and fraud?
Question 10
Multiple Choice
Which of the following would not be considered a cyberactivity?
Question 11
Multiple Choice
Which of the following can best be described as hacking?
Question 12
Multiple Choice
Which of the following statements is true in the context of how best to ensure the Internet is a safe place for Canadian users that is not used for criminal purposes?
Question 13
Multiple Choice
Hayward (2012) has noted that the Internet-and by extension digital culture generally-has broken down traditional barriers between life stages and has led to generational and demographic confusion,thus bringing about unforeseen online collisions between groups of people with different value systems.Which of the following scenarios best reflects this statement?
Question 14
Multiple Choice
Which of the following terms refer to the use of misleading e-mail purportedly from a bank requesting sensitive personal information or password data with the intention of compromising the victim's banking or credit accounts?