Exam 18: Cybercrime and Cyberdeviance
Exam 1: Crime,criminals,and Criminology71 Questions
Exam 2: The Social Context of Dispute Settlement and the Rise of Law68 Questions
Exam 3: Criminal Law70 Questions
Exam 4: Counting Crime64 Questions
Exam 5: Correlates of Criminal Behaviour69 Questions
Exam 6: Feminism and Criminology67 Questions
Exam 7: Victimology,victim Services,and Victim Rights in Canada70 Questions
Exam 8: Early Theories of Criminology69 Questions
Exam 9: Psychological Perspectives on Criminality68 Questions
Exam 10: Strain Theories61 Questions
Exam 11: Conflict Theories62 Questions
Exam 12: Critical Criminology in Canada64 Questions
Exam 13: Interactionist Theories63 Questions
Exam 14: Social Control Theory66 Questions
Exam 15: Deterrence,routine Activity,and Rational Choice Theories62 Questions
Exam 16: Organized Crime61 Questions
Exam 17: Corporate and White-Collar Crime67 Questions
Exam 18: Cybercrime and Cyberdeviance56 Questions
Select questions type
Which of the following best represents a goal of applying routine activity theory to cybercrimes?
Free
(Multiple Choice)
5.0/5
(42)
Correct Answer:
A
What would be the intent if one were to engage in a distributed denial-of-service attack (DDoS)?
Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
B
Which of the following can best be described as ripping?
Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
B
Hayward (2012)has noted that the Internet has broken down traditional barriers between life stages bringing about online collisions between groups of people with different value systems.Which of the following scenarios best reflects this statement?
(Multiple Choice)
4.8/5
(42)
What is the name applied to a parallel Internet that exists beneath the surface of conventional browsers,features sites not indexed by search engines,is unregulated,and is rife with criminal activity and illegal transactions?
(Multiple Choice)
4.8/5
(38)
Which of the following crosses the lines of cyberterrorism and cybercrime and could be part of either or both?
(Multiple Choice)
4.9/5
(40)
Phishing is when a fraudster sends an email supposedly from a bank requesting information on the target's bank account,including the password,with the intention of stealing money from that account.
(True/False)
4.8/5
(40)
Cyberdeviance rarely encompasses one or more of the traditional offline paraphilias.
(True/False)
4.8/5
(34)
Which of the following does not represent a critical infrastructure site that would be subject to a cyberterrorist attack?
(Multiple Choice)
4.8/5
(40)
"Soft targets" are those that are weak or vulnerable to cybercriminals.
(True/False)
4.9/5
(32)
What is thought to be the best legal response to cybercrimes?
(Multiple Choice)
4.9/5
(50)
What is the relationship between cyberdeviance and paraphilias?
(Multiple Choice)
4.9/5
(43)
Which of the following terms refers to the use of a network-enabled device to repeatedly make unwanted contact with a person (through emails,text messages,etc.)knowing that this behaviour is likely to cause fear or annoyance?
(Multiple Choice)
4.9/5
(33)
Which of the following terms refer to the use of an Internet connection to access social media,chat rooms,or other places of electronic assembly to make contact with a child or person under 16 to meet for sexual purposes?
(Multiple Choice)
4.8/5
(36)
As of 2015,all police services in Canada had established clear approaches to cybercrime.
(True/False)
4.8/5
(39)
What important theoretical school of thought doesChapter 18 state should be applied to determine where the line between crime and deviance is drawn in online communities?
(Multiple Choice)
4.8/5
(42)
The Lori Drew case clearly outlined the fact that cyberbullying is not a cybercrime.
(True/False)
4.9/5
(50)
Unlike corporations and American government agencies,Canadian government agencies have thus far avoided cyberattacks.
(True/False)
4.8/5
(38)
Showing 1 - 20 of 56
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)