Exam 11: Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control
Exam 1: Cybercrime and the Internet an Introduction13 Questions
Exam 2: Researching and Theorizing Cybercrime18 Questions
Exam 3: Hackers, Crackers, and Viral Coders18 Questions
Exam 4: Political Hacking20 Questions
Exam 5: Virtual Pirates21 Questions
Exam 6: Cyber-Frauds, Scams and Cons19 Questions
Exam 7: Illegal, Harmful and Offensive Content Online: From Hate Speech to the Dangers of Pornography18 Questions
Exam 8: Child Pornography and Child Sex Abuse Imagery22 Questions
Exam 9: The Victimization of Individuals Online: Cyberstalking and Paedophilia19 Questions
Exam 10: Policing the Internet17 Questions
Exam 11: Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control18 Questions
Exam 12: Looking Toward the Future of Cybercrime6 Questions
Select questions type
This was the name of the program that allowed the NSA to access the servers of companies and services like Yahoo!, Google, Facebook, and YouTube for user data.?
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
A
_______________ are those who specialize in creating datasets of information about individuals which can then be sold.?
Free
(Multiple Choice)
4.7/5
(32)
Correct Answer:
B
What was the purpose in the creation of the European Union's General Data Protection Regulation (GDPR)?
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
B
The USA PATRIOT Act expended the powers provided by this law to conduct electronic searches without probably cause when gathering foreign intelligence.?
(Multiple Choice)
4.8/5
(33)
What is the basic premise of Michel Foucault's (1977) 'panopticism'?
(Multiple Choice)
4.9/5
(24)
This organization gained and retained data on up to 87 million Facebook users without their permission and are accused of having used that data to engage in "psychographic targeting" advertisements, including during the 2016 Trump presidential campaign.?
(Multiple Choice)
4.8/5
(38)
A _______________ attack attempts to break cryptographic protections by using a computer to run through all possible combinations of a key to break a cipher.?
(Multiple Choice)
4.7/5
(28)
This is a method where data is reordered according to a pattern specified by a key where, without access to this key, one does not know how to rearrange and view the content.?
(Multiple Choice)
5.0/5
(45)
This was an esoteric initiative where a network of satellite interception stations, microwave ground stations, spy satellites, radio listening posts, and secret facilities could examine almost any telephone call, fax transmission, and email around the world, daily.?
(Multiple Choice)
4.8/5
(28)
The first internet surveillance technology was _______________.?
(Multiple Choice)
4.7/5
(31)
Individuals leave behind data generated as a by-product of people's online activities in what Zuboff (2015) calls _______________.?
(Multiple Choice)
4.8/5
(41)
_______________ are small files created every time a user visits a website.?
(Multiple Choice)
4.8/5
(46)
Government actors have tried to introduce a so-called 'key deposit' or 'key-escrow' system, where _______________.?
(Multiple Choice)
4.9/5
(35)
How do most current social media platforms generate revenue?
(Multiple Choice)
4.7/5
(31)
A _______________ is a person or organization that collects massive amounts of personal data and sells them to companies.?
(Multiple Choice)
4.9/5
(31)
This individual used to be an employee for the US National Security Agency (NSA) where he leaked to journalists the details of a massive surveillance apparatus operated by the US government.?
(Multiple Choice)
4.8/5
(36)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)