Exam 18: Cybercrime and Cyberdeviance

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Paraphilias are not easily translated into cybercrimes.

(True/False)
4.8/5
(37)

Within the context of cybercrime,which of the following best reflects the term "technological determinism"?

(Multiple Choice)
4.8/5
(29)

In what way are online predators like a bully who waits beside the path that a target usually takes to get home?

(Multiple Choice)
4.9/5
(39)

Who was pleased when the Bill to increase police powers to conduct online surveillance was scrapped?

(Multiple Choice)
4.9/5
(27)

Which of the following is the primary focus of police cybercrime units?

(Multiple Choice)
4.8/5
(45)

According to the textbook,we need to step outside criminology to better understand cyberbullying and motives of online offenders.Why do we need to step outside of criminology?

(Multiple Choice)
4.8/5
(42)

To better understand online victimization,the textbook argues that research on cyberbullying and cybervictimology must include an assessment of risk.Which of the following best represents the focus of such a risk assessment?

(Multiple Choice)
4.9/5
(43)

Cyberterrorist generally focus on attacking human targets rather than institutional targets.

(True/False)
4.7/5
(31)

Cyberbullying Reporter applied critical discourse analysis and corpus linguistics to aggressive or antisocial online exchanges.What was the purpose of this exercise?

(Multiple Choice)
4.8/5
(41)

Which of the following can best be described as spamming?

(Multiple Choice)
4.7/5
(35)

Skimming is an attempt to remotely circumvent the security or privacy measures of a website for the purposes of either stealing information or other malicious actions against the owner of the website.

(True/False)
4.9/5
(37)

Which of the following individuals is the most likely to be a victim of cybercrime?

(Multiple Choice)
5.0/5
(31)

Which of the following would be considered a cyberactivity?

(Multiple Choice)
4.7/5
(37)

Online "creeping" of a target's social media and sending anonymous messages or setting up fake accounts to track the target is similar to behaviours that are part of which paraphilia in the physical (offline)world?

(Multiple Choice)
4.8/5
(40)

What is the name of the activity that involves a group of Internet users all sending harassing messages to a single person?

(Multiple Choice)
4.8/5
(37)

What is the role of cybercrime units within police services in Canada?

(Multiple Choice)
4.7/5
(45)

Luring is when someone uses an Internet connection to access social media,chat rooms,or other places of electronic assembly to make contact with a child or person under 16 to meet for sexual purposes.

(True/False)
4.8/5
(36)

What was the identity of the market embedded in Darknet where bitcoin could purchase murder for hire?

(Multiple Choice)
4.8/5
(32)

According to the text,how has routine activities theory been applied to risk of victimization by online predators?

(Multiple Choice)
4.9/5
(40)

Cyberterrorism refers to the use a computer to orchestrate large-scale "attacks on information," including government or critical infrastructure servers or any database of interest to national security.

(True/False)
4.9/5
(44)
Showing 21 - 40 of 56
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)