Exam 15: Cyberpatterns: Criminal Behavior on the Internet

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A child left unattended in an Internet chat room talking with strangers in as example of a --------- risk victim.

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

C

It is productive for investigators to view cybertrails as an extension of the physical world.

Free
(True/False)
4.8/5
(37)
Correct Answer:
Verified

True

Explain the importance of victimology in assessing cybercrimes. Provide an example of online victim activity that may be relevant to an investigation.

Free
(Essay)
4.9/5
(30)
Correct Answer:
Verified

Given the growing number of people encountering and communicating with each other on the Internet, it is necessary to consider the possibility that the offender had contact with the victim using the Internet. In additional to exploring the possibility of an Internet link between the victim and offender, investigators can gain some understanding of the victim as an individual from his or her Internet activities.Examples include: the victim's regular Web pages, online accounts, access points to the Internet, and any discernable patterns in online activities.

An offender who uses anonymity provided by the Internet and performs covering behavior to avoid detection is an example of _________risk behavior.

(Multiple Choice)
4.8/5
(33)

To date, the majority of efforts to apply profiling to crimes involving computers have focused on what type of criminal?

(Multiple Choice)
4.9/5
(37)

It is important for a profiler to consider when digital evidence should be present but is absent.

(True/False)
4.8/5
(34)

An offender can use the Internet both proactively and reactively.

(True/False)
4.7/5
(39)

The Internet influences victim risk, putting an otherwise low-risk victim at high risk of certain crimes.

(True/False)
4.8/5
(37)

Define the term cybertrail. Provide 2 examples of techniques that offenders are employing in an attempt to reduce their cybertrails.

(Essay)
4.9/5
(46)

Which of the following is most revealing from a victimology standpoint and may suggest the way the offender crossed cybertrails with the victim?

(Multiple Choice)
5.0/5
(34)

_________refers to the process by which a sexual predatory offender gains control over his victim.

(Multiple Choice)
4.7/5
(23)

Criminal profiling can be most useful when a significant amount of information is known about the offender.

(True/False)
4.8/5
(26)

Which of the following is true regarding the Internet?

(Multiple Choice)
4.8/5
(33)

Individuals who engage in espionage and fraud/abuse are referred to as what?

(Multiple Choice)
4.8/5
(36)

An offender's Web page history may give insight into his or her motive and fantasy.

(True/False)
4.9/5
(41)

Risk assessment on the Internet works in the same way as in the physical world.

(True/False)
4.8/5
(41)

Which of the following is not a goal or criminal profiling in cyber investigations?

(Multiple Choice)
4.8/5
(33)

As offenders become more aware of digital forensic techniques, they are employing which of the following concealment tools and techniques?

(Multiple Choice)
4.8/5
(32)

_________occurs when one person or program successfully masquerades as another by falsifying data and gains an illegitimate advantage.

(Multiple Choice)
4.8/5
(37)

Investigators are currently encountering a decrease in the amount of digital evidence of witness, victim, and criminal activity.

(True/False)
4.8/5
(35)
Showing 1 - 20 of 23
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)