Exam 18: Cybercrime and Cyberdeviance

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following terms refer to the use of misleading email supposedly from a bank requesting sensitive personal information or password data with the intention of compromising the victim's banking or credit accounts?

(Multiple Choice)
4.8/5
(33)

Which of the following terms refer to the use of software and hardware to steal data (usually related to credit cards)by intercepting e-transmissions,which then enable the cloning or counterfeiting of specific financial instruments (credit cards,bank cards,etc.)for the purposes of theft and fraud?

(Multiple Choice)
4.8/5
(35)

Hacking is the use of software and hardware to steal data (usually related to credit cards)by intercepting e-transmissions,which then enable the cloning or counterfeiting of specific financial instruments (credit cards,bank cards,etc.)for the purposes of theft and fraud.

(True/False)
5.0/5
(39)

Technological changes drive changes in culture according to the theory of technological determinism.

(True/False)
4.9/5
(51)

Frequency of digital communications use is a strong predictor of risk of victimization.

(True/False)
4.7/5
(45)

Which of the following statements best reflects the findings with regard to electronic victimization among adolescents?

(Multiple Choice)
4.9/5
(33)

Ripping is the use of specially designed software to download original material from a protected media source (e.g.,online movie)to a hard disk,for the purposes of resale or redistribution.

(True/False)
4.8/5
(37)

Scatologia is an out dated paraphilic disorder that has not continued with the introduction of technology.

(True/False)
4.8/5
(30)

Cyberactivities are those that involve a number of activities involving the Internet.

(True/False)
4.9/5
(46)

Within the context of exhibitionism,exposing one's body in an explicit or suggestive fashion in the physical (offline)world is similar to what in the digital (online)world?

(Multiple Choice)
4.8/5
(35)

The application of routine activity theory to cybercrimes and cyberdeviance reveals that the future of guardianship on the Internet is difficult to predict.

(True/False)
4.9/5
(39)

According to the text,what is the primary difference between cybercrime and cyberterrorism?

(Multiple Choice)
4.9/5
(35)

What question is noted in the text as important in considering approaches to minimizing online victimization?

(Multiple Choice)
4.8/5
(36)

Which of the following statements is true in the context of how best to ensure the Internet is a safe place for Canadian users that is not used for criminal purposes?

(Multiple Choice)
4.9/5
(30)

Which of the following statements is true with regard to cyberbullying?

(Multiple Choice)
4.8/5
(40)

Most Canadians prefer privacy to law enforcement intrusion into their digital lives.

(True/False)
4.9/5
(32)
Showing 41 - 56 of 56
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)