Exam 15: Cyberpatterns: Criminal Behavior on the Internet
Exam 1: A History of Criminal Profiling26 Questions
Exam 2: Criminal Profiling: Science, Logic, and Cognition31 Questions
Exam 3: Alternative Methods of Criminal Profiling31 Questions
Exam 4: Forensic Psychology, Forensic Psychiatry, and Criminal Profiling26 Questions
Exam 5: An Introduction to Behavioral Evidence Analysis25 Questions
Exam 6: An Introduction to Crime Scene Analysis25 Questions
Exam 7: Forensic Victimology31 Questions
Exam 8: Sexual Deviance26 Questions
Exam 9: Sexual Asphyxia24 Questions
Exam 10: False Reports32 Questions
Exam 11: An Introduction to Crime Reconstruction28 Questions
Exam 12: Crime Scene Characteristics32 Questions
Exam 13: Interpreting Motive29 Questions
Exam 14: Case Linkage: Offender Modus Operandi and Signature30 Questions
Exam 15: Cyberpatterns: Criminal Behavior on the Internet23 Questions
Exam 16: Fire and Explosives: Behavioral Aspects27 Questions
Exam 17: Inferring Offender Characteristics25 Questions
Exam 18: Psychopathy and Sadism25 Questions
Exam 19: Sex Crimes26 Questions
Exam 20: Domestic Homicide31 Questions
Exam 21: Mass Murder23 Questions
Exam 22: Serial Crime25 Questions
Exam 23: Understanding and Interviewing Terrorists23 Questions
Exam 24: Ethics and the Criminal Profiler23 Questions
Exam 25: Criminal Profiling on Trial23 Questions
Select questions type
A child left unattended in an Internet chat room talking with strangers in as example of a --------- risk victim.
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
C
It is productive for investigators to view cybertrails as an extension of the physical world.
Free
(True/False)
4.8/5
(37)
Correct Answer:
True
Explain the importance of victimology in assessing cybercrimes. Provide an example of online victim activity that may be relevant to an investigation.
Free
(Essay)
4.9/5
(30)
Correct Answer:
Given the growing number of people encountering and communicating with each other on the Internet, it is necessary to consider the possibility that the offender had contact with the victim using the Internet. In additional to exploring the possibility of an Internet link between the victim and offender, investigators can gain some understanding of the victim as an individual from his or her Internet activities.Examples include: the victim's regular Web pages, online accounts, access points to the Internet, and any discernable patterns in online activities.
An offender who uses anonymity provided by the Internet and performs covering behavior to avoid detection is an example of _________risk behavior.
(Multiple Choice)
4.8/5
(33)
To date, the majority of efforts to apply profiling to crimes involving computers have focused on what type of criminal?
(Multiple Choice)
4.9/5
(37)
It is important for a profiler to consider when digital evidence should be present but is absent.
(True/False)
4.8/5
(34)
An offender can use the Internet both proactively and reactively.
(True/False)
4.7/5
(39)
The Internet influences victim risk, putting an otherwise low-risk victim at high risk of certain crimes.
(True/False)
4.8/5
(37)
Define the term cybertrail. Provide 2 examples of techniques that offenders are employing in an attempt to reduce their cybertrails.
(Essay)
4.9/5
(46)
Which of the following is most revealing from a victimology standpoint and may suggest the way the offender crossed cybertrails with the victim?
(Multiple Choice)
5.0/5
(34)
_________refers to the process by which a sexual predatory offender gains control over his victim.
(Multiple Choice)
4.7/5
(23)
Criminal profiling can be most useful when a significant amount of information is known about the offender.
(True/False)
4.8/5
(26)
Individuals who engage in espionage and fraud/abuse are referred to as what?
(Multiple Choice)
4.8/5
(36)
An offender's Web page history may give insight into his or her motive and fantasy.
(True/False)
4.9/5
(41)
Risk assessment on the Internet works in the same way as in the physical world.
(True/False)
4.8/5
(41)
Which of the following is not a goal or criminal profiling in cyber investigations?
(Multiple Choice)
4.8/5
(33)
As offenders become more aware of digital forensic techniques, they are employing which of the following concealment tools and techniques?
(Multiple Choice)
4.8/5
(32)
_________occurs when one person or program successfully masquerades as another by falsifying data and gains an illegitimate advantage.
(Multiple Choice)
4.8/5
(37)
Investigators are currently encountering a decrease in the amount of digital evidence of witness, victim, and criminal activity.
(True/False)
4.8/5
(35)
Showing 1 - 20 of 23
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)