Exam 18: Cybercrime and Cyberdeviance
Exam 1: Crime,criminals,and Criminology71 Questions
Exam 2: The Social Context of Dispute Settlement and the Rise of Law68 Questions
Exam 3: Criminal Law70 Questions
Exam 4: Counting Crime64 Questions
Exam 5: Correlates of Criminal Behaviour69 Questions
Exam 6: Feminism and Criminology67 Questions
Exam 7: Victimology,victim Services,and Victim Rights in Canada70 Questions
Exam 8: Early Theories of Criminology69 Questions
Exam 9: Psychological Perspectives on Criminality68 Questions
Exam 10: Strain Theories61 Questions
Exam 11: Conflict Theories62 Questions
Exam 12: Critical Criminology in Canada64 Questions
Exam 13: Interactionist Theories63 Questions
Exam 14: Social Control Theory66 Questions
Exam 15: Deterrence,routine Activity,and Rational Choice Theories62 Questions
Exam 16: Organized Crime61 Questions
Exam 17: Corporate and White-Collar Crime67 Questions
Exam 18: Cybercrime and Cyberdeviance56 Questions
Select questions type
Which of the following terms refer to the use of misleading email supposedly from a bank requesting sensitive personal information or password data with the intention of compromising the victim's banking or credit accounts?
(Multiple Choice)
4.8/5
(33)
Which of the following terms refer to the use of software and hardware to steal data (usually related to credit cards)by intercepting e-transmissions,which then enable the cloning or counterfeiting of specific financial instruments (credit cards,bank cards,etc.)for the purposes of theft and fraud?
(Multiple Choice)
4.8/5
(35)
Hacking is the use of software and hardware to steal data (usually related to credit cards)by intercepting e-transmissions,which then enable the cloning or counterfeiting of specific financial instruments (credit cards,bank cards,etc.)for the purposes of theft and fraud.
(True/False)
5.0/5
(39)
Technological changes drive changes in culture according to the theory of technological determinism.
(True/False)
4.9/5
(51)
Frequency of digital communications use is a strong predictor of risk of victimization.
(True/False)
4.7/5
(45)
Which of the following statements best reflects the findings with regard to electronic victimization among adolescents?
(Multiple Choice)
4.9/5
(33)
Ripping is the use of specially designed software to download original material from a protected media source (e.g.,online movie)to a hard disk,for the purposes of resale or redistribution.
(True/False)
4.8/5
(37)
Scatologia is an out dated paraphilic disorder that has not continued with the introduction of technology.
(True/False)
4.8/5
(30)
Cyberactivities are those that involve a number of activities involving the Internet.
(True/False)
4.9/5
(46)
Within the context of exhibitionism,exposing one's body in an explicit or suggestive fashion in the physical (offline)world is similar to what in the digital (online)world?
(Multiple Choice)
4.8/5
(35)
The application of routine activity theory to cybercrimes and cyberdeviance reveals that the future of guardianship on the Internet is difficult to predict.
(True/False)
4.9/5
(39)
According to the text,what is the primary difference between cybercrime and cyberterrorism?
(Multiple Choice)
4.9/5
(35)
What question is noted in the text as important in considering approaches to minimizing online victimization?
(Multiple Choice)
4.8/5
(36)
Which of the following statements is true in the context of how best to ensure the Internet is a safe place for Canadian users that is not used for criminal purposes?
(Multiple Choice)
4.9/5
(30)
Which of the following statements is true with regard to cyberbullying?
(Multiple Choice)
4.8/5
(40)
Most Canadians prefer privacy to law enforcement intrusion into their digital lives.
(True/False)
4.9/5
(32)
Showing 41 - 56 of 56
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)