Exam 3: Cybervictimization
Exam 1: Cybercrime and Cybercriminals: The Development of Cybercriminology30 Questions
Exam 2: Measuring Cybercrime30 Questions
Exam 3: Cybervictimization30 Questions
Exam 4: Cybercrime, Rational Choice, and Emotions: Punishment and Reduction of Cyberoffending29 Questions
Exam 5: Cybercrime and the Propensity to Offend30 Questions
Exam 6: Cybercrime, Culture, and Inequality30 Questions
Exam 7: Conformity, Learning, and Sources of Social Control30 Questions
Exam 8: Constructing and Reacting to Cybercrime: Labeling and Moral Panics30 Questions
Exam 9: Conflict Cybercriminology: Cybercrime, Power, and Gender30 Questions
Exam 10: Interpersonal Cybercrime30 Questions
Exam 11: Cybertrespass, Cybervandalism, and Cybertheft30 Questions
Exam 12: Deviant Cyberacts and Public Order Cybercrimes: Paraphilia, Prostitution, Substance Abuse, and Gambling29 Questions
Exam 13: Organized Cybercrime30 Questions
Exam 14: Political Cybercrime30 Questions
Select questions type
______ holds that the victim is in some way responsible for the victimization.
Free
(Short Answer)
5.0/5
(31)
Correct Answer:
Victim precipitation theory
______ holds that the lifestyle of a person determines whether he or she becomes a victim.
Free
(Short Answer)
4.8/5
(29)
Correct Answer:
Lifestyle exposure theory
An individual whose personal and professional life continually exposes the individual to crime is known as a__________.
Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
B
____________ refers to the activities of a victim that make the individual susceptible to crime.
(Multiple Choice)
4.8/5
(31)
Routine activity theory holds that for crime to be committed, two elements must be present-a ______ and a ______-and one element must be absent, that is, a ______.
(Short Answer)
4.9/5
(36)
A ______ is an action of an offender that is designed to evade detection and capture by authorities.
(Short Answer)
4.9/5
(34)
Criminogenic is the term used to describe a state or situation that causes or tends to cause crime.
(True/False)
4.9/5
(35)
___________ refers to the characteristics of a victim that make the individual more likely than others to become a victim of a crime.
(Multiple Choice)
4.7/5
(33)
An individual whose personal and professional life does not expose the individual to crime is known as a ____________.
(Multiple Choice)
4.8/5
(49)
Physical guardianship refers to the presence of third parties that could discourage crime because of their presence.
(True/False)
4.8/5
(35)
______ refers to the vulnerability to detection and apprehension because of personality traits of the criminal and the environment within which the criminal operates.
(Short Answer)
4.9/5
(40)
_______ refers to the scientific study of online victimization, the impact of the cybercrime on the cybervictims, and the types of victims who experience cybercrime.
(Short Answer)
4.8/5
(34)
Tertiary cybervictimization refers to the impact of cybercrime on society.
(True/False)
4.7/5
(36)
______ occurs when the victim experiences victimization from the negative attitudes and behaviors of others after the crime or cybercrime.
(Short Answer)
4.8/5
(31)
With primary cybervictimization, the victim is the indirect target of the crime secondary cybervictimization.
(True/False)
4.8/5
(36)
Passive physical guardianship includes protective measures that largely go unnoticed by users and automatically shape users' behaviors.
(True/False)
4.9/5
(40)
______ refers to the likelihood of detection and capture of an offender through the offender's MO.
(Short Answer)
4.8/5
(36)
Social guardianship refers to the measures taken to protect a user and his or her digital devices and frustrate the attempts of cybercriminals to commit crime.
(True/False)
4.7/5
(39)
Showing 1 - 20 of 30
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)