Exam 18: Cybercrime and Cyberdeviance
Exam 1: Crime,criminals,and Criminology71 Questions
Exam 2: The Social Context of Dispute Settlement and the Rise of Law68 Questions
Exam 3: Criminal Law70 Questions
Exam 4: Counting Crime64 Questions
Exam 5: Correlates of Criminal Behaviour69 Questions
Exam 6: Feminism and Criminology67 Questions
Exam 7: Victimology,victim Services,and Victim Rights in Canada70 Questions
Exam 8: Early Theories of Criminology69 Questions
Exam 9: Psychological Perspectives on Criminality68 Questions
Exam 10: Strain Theories61 Questions
Exam 11: Conflict Theories62 Questions
Exam 12: Critical Criminology in Canada64 Questions
Exam 13: Interactionist Theories63 Questions
Exam 14: Social Control Theory66 Questions
Exam 15: Deterrence,routine Activity,and Rational Choice Theories62 Questions
Exam 16: Organized Crime61 Questions
Exam 17: Corporate and White-Collar Crime67 Questions
Exam 18: Cybercrime and Cyberdeviance56 Questions
Select questions type
Within the context of cybercrime,which of the following best reflects the term "technological determinism"?
(Multiple Choice)
4.8/5
(29)
In what way are online predators like a bully who waits beside the path that a target usually takes to get home?
(Multiple Choice)
4.9/5
(39)
Who was pleased when the Bill to increase police powers to conduct online surveillance was scrapped?
(Multiple Choice)
4.9/5
(27)
Which of the following is the primary focus of police cybercrime units?
(Multiple Choice)
4.8/5
(45)
According to the textbook,we need to step outside criminology to better understand cyberbullying and motives of online offenders.Why do we need to step outside of criminology?
(Multiple Choice)
4.8/5
(42)
To better understand online victimization,the textbook argues that research on cyberbullying and cybervictimology must include an assessment of risk.Which of the following best represents the focus of such a risk assessment?
(Multiple Choice)
4.9/5
(43)
Cyberterrorist generally focus on attacking human targets rather than institutional targets.
(True/False)
4.7/5
(31)
Cyberbullying Reporter applied critical discourse analysis and corpus linguistics to aggressive or antisocial online exchanges.What was the purpose of this exercise?
(Multiple Choice)
4.8/5
(41)
Skimming is an attempt to remotely circumvent the security or privacy measures of a website for the purposes of either stealing information or other malicious actions against the owner of the website.
(True/False)
4.9/5
(37)
Which of the following individuals is the most likely to be a victim of cybercrime?
(Multiple Choice)
5.0/5
(31)
Which of the following would be considered a cyberactivity?
(Multiple Choice)
4.7/5
(37)
Online "creeping" of a target's social media and sending anonymous messages or setting up fake accounts to track the target is similar to behaviours that are part of which paraphilia in the physical (offline)world?
(Multiple Choice)
4.8/5
(40)
What is the name of the activity that involves a group of Internet users all sending harassing messages to a single person?
(Multiple Choice)
4.8/5
(37)
What is the role of cybercrime units within police services in Canada?
(Multiple Choice)
4.7/5
(45)
Luring is when someone uses an Internet connection to access social media,chat rooms,or other places of electronic assembly to make contact with a child or person under 16 to meet for sexual purposes.
(True/False)
4.8/5
(36)
What was the identity of the market embedded in Darknet where bitcoin could purchase murder for hire?
(Multiple Choice)
4.8/5
(32)
According to the text,how has routine activities theory been applied to risk of victimization by online predators?
(Multiple Choice)
4.9/5
(40)
Cyberterrorism refers to the use a computer to orchestrate large-scale "attacks on information," including government or critical infrastructure servers or any database of interest to national security.
(True/False)
4.9/5
(44)
Showing 21 - 40 of 56
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)