Exam 15: Crimes of the New Millennium: Cybercrime

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

What is meant by cyberbullying and how do cyberbullies "attack" their victims?

Free
(Essay)
5.0/5
(25)
Correct Answer:
Verified

Cyberbullying is defined as willful and repeated harm inflicted through the medium of electronic text. Like their real-world counterparts, cyberbullies are malicious aggressors who seek implicit or explicit pleasure or profit through the mistreatment of other individuals. Although power in traditional bullying might be physical (stature) or social (competency or popularity) in nature, online power may simply stem from Internet proficiency. Cyberbullies are able to navigate the Web and utilize technology in a way that puts them in a position of power relative to their victim. Bullies employ two major portals to harass their victims: (1) a cyberbully can use a computer and send harassing e-mails or instant messages, post obscene, insulting, and slanderous messages to online bulletin boards or social networking sites, or develop websites to promote and disseminate defamatory content;  (2) a cyberbully can use a cellphone to send harassing text messages to the victim.

Computer worms are similar to viruses except that they use computer networks or the Internet to:

Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
Verified

D

While many wonder how people can be so easily duped, the government's Internet fraud center receives 280,000 complaints yearly, and Internet scams result in over ____ in losses each year.

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

D

Using the Internet to steal someone's identity and/or impersonate the victim in order to conduct illicit transactions, such as committing fraud using the victim's name, is known as ______________.

(Short Answer)
4.9/5
(38)

To meet the increasing threat of phishing and identity theft, Congress passed the ___________ Act of 1998 (Identity Theft Act) to make these federal crimes.

(Short Answer)
4.8/5
(29)

Someone who collects and transfers money or goods acquired illegally, and then delivers them to a third party, is known as a _____________________.

(Short Answer)
4.9/5
(30)

The type of cyberthreat represented by Titan Rain is:

(Multiple Choice)
5.0/5
(40)

Cyberspying involves efforts by intelligence agencies to penetrate compute networks of an enemy nation in order to steal important data.

(True/False)
4.8/5
(28)

What does research show about the problems with cyberbullying in relation to young adults/adolescents?

(Essay)
4.8/5
(31)

Discuss the legal and enforcement efforts that have been implemented to control cybercrime.

(Essay)
4.8/5
(34)

Terrorists groups have used the Internet to fund their operations. How is such funding accomplished?

(Multiple Choice)
4.9/5
(38)

The widespread use of computers and the Internet has ushered in the age of information technology in most industrialized societies.

(True/False)
4.8/5
(38)

Forty-five percent of all search engine queries are related to pornography.

(True/False)
4.9/5
(36)

E-tailing is Internet jargon for the crime of cyberstalking.

(True/False)
4.8/5
(38)

Which is accurate about cyberbullying?

(Multiple Choice)
4.9/5
(32)

A logic bomb, also called slag code, is a type of delayed-action virus that may be set off when a program user enters certain input that sets the slag code in motion.

(True/False)
4.9/5
(32)

Commercial cyberspies target upcoming bids, customer lists, product designs, software source code, voice mail messages, and confidential e-mail messages.

(True/False)
4.8/5
(35)

What is the difference between a Trojan horse and a virus?

(Multiple Choice)
4.9/5
(40)

Which type of cybercrime consists of acts aimed at undermining the social, economic, and political system of an enemy nation?

(Multiple Choice)
4.8/5
(35)

Losses due to phishing and _______ are now in the billions of dollars and rising with the continuing growth of ecommerce. Stealing an individual's credit card number is an example.

(Short Answer)
4.9/5
(39)
Showing 1 - 20 of 113
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)