Exam 10: Interpersonal Cybercrime
Exam 1: Cybercrime and Cybercriminals: The Development of Cybercriminology30 Questions
Exam 2: Measuring Cybercrime30 Questions
Exam 3: Cybervictimization30 Questions
Exam 4: Cybercrime, Rational Choice, and Emotions: Punishment and Reduction of Cyberoffending29 Questions
Exam 5: Cybercrime and the Propensity to Offend30 Questions
Exam 6: Cybercrime, Culture, and Inequality30 Questions
Exam 7: Conformity, Learning, and Sources of Social Control30 Questions
Exam 8: Constructing and Reacting to Cybercrime: Labeling and Moral Panics30 Questions
Exam 9: Conflict Cybercriminology: Cybercrime, Power, and Gender30 Questions
Exam 10: Interpersonal Cybercrime30 Questions
Exam 11: Cybertrespass, Cybervandalism, and Cybertheft30 Questions
Exam 12: Deviant Cyberacts and Public Order Cybercrimes: Paraphilia, Prostitution, Substance Abuse, and Gambling29 Questions
Exam 13: Organized Cybercrime30 Questions
Exam 14: Political Cybercrime30 Questions
Select questions type
________ are individuals who are sexually aroused by prepubescent adolescents.
Free
(Short Answer)
4.8/5
(43)
Correct Answer:
Pedophiles
Tertiary prevention programs target children most at risk of being bullied, harassed, stalked, or harmed in any way.
Free
(True/False)
4.8/5
(40)
Correct Answer:
False
The terms cyberharassment and cyberbullying are often used interchangeably.
Free
(True/False)
4.9/5
(35)
Correct Answer:
True
_______ occurs when a perpetrator threatens to disseminate sexually explicit photos or videos of the victim online if sexual demands are not met or if sexually explicit images or videos are not sent to the perpetrator.
(Short Answer)
4.7/5
(29)
Netiquette refers to the appropriate rules of behavior in online forums.
(True/False)
4.8/5
(33)
_______ depicts sexual acts with animals or dead bodies and/or that endanger a person's life or can cause extreme physical harm to breasts, genitals, and/or the anus of an individual.
(Short Answer)
4.8/5
(31)
_______ is a term used to describe the use of sexually explicit photos or videos of the victim without the victim's consent to cause the victim distress, humiliation, or harm in some way.
(Short Answer)
4.8/5
(38)
Which coping strategy is used by victims of cyberbullying in response to the crime committed against them?
(Multiple Choice)
4.8/5
(31)
A preferential sex offender accesses material opportunistically and impulsively, often to satisfy a sexual need or curiosity or for economic reasons.
(True/False)
4.7/5
(43)
A situational offender is driven by sexual desires for children and will actively look for child pornography.
(True/False)
4.9/5
(35)
________ refers to the manipulation tactics an offender uses to gain the victim's trust and ultimately lead him or her to engage in sexual activities.
(Short Answer)
4.7/5
(40)
_________ prevention programs are implemented after an undesirable behavior or illicit act has occurred.
(Multiple Choice)
4.9/5
(34)
An example/examples of unprotected speech is/are _____________.
(Multiple Choice)
4.9/5
(34)
Which coping strategy is not often used by victims of cyberbullying in response to the crime committed against them and is not considered as useful as other strategies?
(Multiple Choice)
4.8/5
(38)
_______ refers to the generation of sexually explicit content (e.g., nude photos) distributed through messaging services on mobile phones or via the Internet.
(Short Answer)
4.9/5
(36)
Showing 1 - 20 of 30
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)