Exam 14: Cyberstalking

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When interviewing the victim, investigators should be as tactful as possible while questioning everything, and assume nothing.

Free
(True/False)
4.9/5
(42)
Correct Answer:
Verified

True

When searching for evidence of cyberstalking, it is useful to distinguish between an offender's harassing behaviors and _________behaviors.

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

B

Regardless of the type of investigation, investigators ask "who, what, when, where, and why" questions. However, when dealing with cyberstalking victims, those questions have to be asked tactfully, and without assigning blame.

Free
(Essay)
4.8/5
(39)
Correct Answer:
Verified

Prepare a set of initial questions and discuss how you would ask those questions to a cyberstalking victim.

A key aspect of developing victimology is determining victim and offender risk.

(True/False)
4.9/5
(36)

Cyberstalking works in a completely different way than stalking in the physical world.

(True/False)
4.8/5
(36)

A key aspect of developing victimology is determining victim and offender _________.

(Multiple Choice)
4.9/5
(33)

Studies indicate that stalkers will always have prior acquaintance with their victims.

(True/False)
4.8/5
(38)

Investigators might not be able to define the primary crime scene clearly because digital evidence is often spread all over the Internet.

(True/False)
4.8/5
(43)

In general stalkers want to exert power over their victims in some way, primarily through fear.

(True/False)
4.9/5
(37)

The initial stage in a cyberstalking investigation is to:

(Multiple Choice)
4.9/5
(35)

The Internet contains a vast amount of personal information about people but it is relatively difficult to search for specific items.

(True/False)
4.8/5
(35)

An excellent set of guidelines developed specifically for victims of stalking is available from:

(Multiple Choice)
4.7/5
(25)

As part of the investigation, an investigator should ask why a particular stalker used the Internet.

(True/False)
4.8/5
(39)

When searching for evidence of cyberstalking, it is useful to distinguish between the offenders' harassing behaviors and surreptitious monitoring behaviors.

(True/False)
4.8/5
(30)

The victim is usually only aware of the harassing component of cyberstalking.

(True/False)
4.8/5
(41)

It is extremely important for the investigator to be extremely cautious when dealing with a stalking case because:

(Multiple Choice)
4.9/5
(34)

An implication from studies indicating that many stalkers had prior acquaintance with their victims is that:

(Multiple Choice)
4.7/5
(28)

In determining how and why the offender selected a specific victim, the investigator should determine whether the cyberstalker:

(Multiple Choice)
4.9/5
(44)

The first cyberstalking law in the US was passed in:

(Multiple Choice)
5.0/5
(44)

A stalker's ability to frighten and control a victim increases with the amount of information that he can gather, such as:

(Multiple Choice)
4.8/5
(39)
Showing 1 - 20 of 31
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)