Exam 2: Researching and Theorizing Cybercrime
Exam 1: Cybercrime and the Internet an Introduction13 Questions
Exam 2: Researching and Theorizing Cybercrime18 Questions
Exam 3: Hackers, Crackers, and Viral Coders18 Questions
Exam 4: Political Hacking20 Questions
Exam 5: Virtual Pirates21 Questions
Exam 6: Cyber-Frauds, Scams and Cons19 Questions
Exam 7: Illegal, Harmful and Offensive Content Online: From Hate Speech to the Dangers of Pornography18 Questions
Exam 8: Child Pornography and Child Sex Abuse Imagery22 Questions
Exam 9: The Victimization of Individuals Online: Cyberstalking and Paedophilia19 Questions
Exam 10: Policing the Internet17 Questions
Exam 11: Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control18 Questions
Exam 12: Looking Toward the Future of Cybercrime6 Questions
Select questions type
According to Yar, _______________ refers to the domination of field by businesses regarding the provision of information security services and solutions.?
Free
(Multiple Choice)
4.9/5
(26)
Correct Answer:
A
_______________ is the idea that instead of avoiding committing a crime entirely, a criminal may change the way they engage in a crime when confronted with threat of punishment.?
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
D
According to Merton (1938), which of the five adaptations of strain describe individuals who reject the culturally approved goals while accepting socially approved means to do so?
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
B
Miller (2002) views crime as a result of gendered _______________.?
(Multiple Choice)
4.8/5
(26)
_______________ argue that the dominant mode of production--capitalism--shapes motivations and opportunities to engage in crime as well as the processes of criminalization and crime control.?
(Multiple Choice)
4.9/5
(36)
Sykes and Matza (1957) state that delinquents will provide justification for their behaviour before engaging in criminal activity in attempts to nullify dominant social controls. What do they call this phenomenon?
(Multiple Choice)
4.9/5
(39)
This notion posits that human beings are willing to surrender some of their freedoms to be protected from those whose unfettered exercise of freedom harms others.?
(Multiple Choice)
4.8/5
(30)
Gottfredson and Hirschi's (1990) general theory of crime states that crimes, simply put, are a product of _______________.?
(Multiple Choice)
4.9/5
(35)
Which of the following is not one of Beccaria's three components of effective punishment?
(Multiple Choice)
4.8/5
(32)
Edwin Lemert (1951) described the process through which a person could be so intensely stigmatized that their future behaviour was driven toward deviance. What did he call this?
(Multiple Choice)
4.9/5
(44)
This theory assumes that offenders conduct cost-benefit analyses before conducting criminal behaviour.?
(Multiple Choice)
4.9/5
(28)
Which of the following is not an area of life which Steffensmeier and Allan (1996) state inhibit female crime while encouraging male crime?
(Multiple Choice)
4.8/5
(37)
According to Merton (1938), which of the five adaptations of strain describe individuals who accept both the institutionally approved goals and means?
(Multiple Choice)
4.8/5
(34)
This theory credits the propensity to commit crime to intimate peer groups which encourage favourable definitions to crime.?
(Multiple Choice)
4.9/5
(31)
Which of the following is NOT one of the methodological approaches used by criminologists to study cybercrime discussed in Chapter 2?
(Multiple Choice)
4.7/5
(41)
Which of the following is not one of Robert Agnew's three sources of strain?
(Multiple Choice)
4.8/5
(25)
According to Goldsmith and Brewer (2015), the internet is said to present an interactive environment that empowers individuals through anonymity, provides a cornucopia of relatively easy-to-access information, and acts as a 'facilitator of encounters' with individuals and opportunities conducive to criminal engagement. This context is conducive to what they call _______________.?
(Multiple Choice)
4.8/5
(27)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)