Exam 2: Researching and Theorizing Cybercrime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

According to Yar, _______________ refers to the domination of field by businesses regarding the provision of information security services and solutions.?

Free
(Multiple Choice)
4.9/5
(26)
Correct Answer:
Verified

A

_______________ is the idea that instead of avoiding committing a crime entirely, a criminal may change the way they engage in a crime when confronted with threat of punishment.?

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

D

According to Merton (1938), which of the five adaptations of strain describe individuals who reject the culturally approved goals while accepting socially approved means to do so?

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

B

Miller (2002) views crime as a result of gendered _______________.?

(Multiple Choice)
4.8/5
(26)

_______________ argue that the dominant mode of production--capitalism--shapes motivations and opportunities to engage in crime as well as the processes of criminalization and crime control.?

(Multiple Choice)
4.9/5
(36)

Sykes and Matza (1957) state that delinquents will provide justification for their behaviour before engaging in criminal activity in attempts to nullify dominant social controls. What do they call this phenomenon?

(Multiple Choice)
4.9/5
(39)

This notion posits that human beings are willing to surrender some of their freedoms to be protected from those whose unfettered exercise of freedom harms others.?

(Multiple Choice)
4.8/5
(30)

Gottfredson and Hirschi's (1990) general theory of crime states that crimes, simply put, are a product of _______________.?

(Multiple Choice)
4.9/5
(35)

Which of the following is not one of Beccaria's three components of effective punishment?

(Multiple Choice)
4.8/5
(32)

Edwin Lemert (1951) described the process through which a person could be so intensely stigmatized that their future behaviour was driven toward deviance. What did he call this?

(Multiple Choice)
4.9/5
(44)

This theory assumes that offenders conduct cost-benefit analyses before conducting criminal behaviour.?

(Multiple Choice)
4.9/5
(28)

Which of the following is not an area of life which Steffensmeier and Allan (1996) state inhibit female crime while encouraging male crime?

(Multiple Choice)
4.8/5
(37)

According to Merton (1938), which of the five adaptations of strain describe individuals who accept both the institutionally approved goals and means?

(Multiple Choice)
4.8/5
(34)

This theory credits the propensity to commit crime to intimate peer groups which encourage favourable definitions to crime.?

(Multiple Choice)
4.9/5
(31)

Which of the following is NOT one of the methodological approaches used by criminologists to study cybercrime discussed in Chapter 2?

(Multiple Choice)
4.7/5
(41)

Which of the following is not one of Robert Agnew's three sources of strain?

(Multiple Choice)
4.8/5
(25)

What was the 'GamerGate' fiasco?

(Multiple Choice)
4.8/5
(26)

According to Goldsmith and Brewer (2015), the internet is said to present an interactive environment that empowers individuals through anonymity, provides a cornucopia of relatively easy-to-access information, and acts as a 'facilitator of encounters' with individuals and opportunities conducive to criminal engagement. This context is conducive to what they call _______________.?

(Multiple Choice)
4.8/5
(27)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)