Exam 13: Cyberdeviance

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Phillipe sells counterfeit copies of popular computer programs, such as Adobe Acrobat. What kind of cybercrime is this?

Free
(Multiple Choice)
4.8/5
(25)
Correct Answer:
Verified

D

MotherofFlagons is driven to explore what computers can do. She is curious and will spend days at a time testing government security systems and designing work-arounds for accessing systems she is not supposed to access. She intends no harm, she just loves the challenge. What category of cyberdeviant is MotherofFlagons?

Free
(Multiple Choice)
5.0/5
(32)
Correct Answer:
Verified

B

Which theory of cyberdeviance would focus on the way that cyberdeviants can reject both the conventional goals and the conventional means of attaining those goals, replacing them with new, cyber-centric, means and goals?

Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
Verified

D

A cracker with the handle DeathFromAbove rationalizes her cyberdeviance by explaining that she only steals from corporate bank accounts in order to donate money to public libraries. What technique of neutralization is she using?

(Multiple Choice)
4.9/5
(26)

Distinguish between the seven types of cybercriminals identified by Donn Parker.

(Essay)
4.8/5
(30)

Describe three primary forms of unauthorized computer use.

(Essay)
4.8/5
(32)

Grace walks into the offices of a major movie studio, downloads thousands of confidential files, and uses this information to blackmail several people. What kind of cybercrime is this?

(Multiple Choice)
4.8/5
(32)

The majority of members within the cyberdeviant subculture believe that computers make life worse.

(True/False)
4.8/5
(37)

A cyberdeviant named ScareBear systematically violates the security programs guarding a country's nuclear power plants. He intends to gain political concessions by threatening to initiate a nuclear meltdown. What category of cyberdeviant is ScareBear?

(Multiple Choice)
4.9/5
(32)

Why do elite hackers value disembodied anonymity?

(Multiple Choice)
4.7/5
(26)

Which of the following is an ethical standard of elite cyberdeviants?

(Multiple Choice)
5.0/5
(28)

What are salami attacks used for?

(Multiple Choice)
4.7/5
(32)

Most cyberdeviants are motivated by financial gain.

(True/False)
4.8/5
(30)

Distinguish between technovandalism and technotrespass.

(Essay)
4.9/5
(34)

What is a primary issue when drafting legislation against computer crime?

(Multiple Choice)
4.9/5
(37)

Distinguish between the four categories of computer crime.

(Essay)
4.8/5
(46)

Jackalope4U is able to interact with message boards without revealing any clues of their social status, race, class, age, or gender. As an elite hacker, they value this ______, because it means they are judged on their accomplishments alone.

(Multiple Choice)
4.8/5
(34)

What is the primary motivation of most cyberdeviants?

(Multiple Choice)
4.8/5
(41)

What makes cyberdeviant subculture possible?

(Multiple Choice)
4.8/5
(31)

What is the "Robin Hood" syndrome?

(Multiple Choice)
4.7/5
(26)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)