Exam 18: Cybercrime and Cyberdeviance
Exam 1: Crime, Criminals, and Criminology77 Questions
Exam 2: The Social Context of Dispute Settlement and the Rise of Law81 Questions
Exam 3: Criminal Law75 Questions
Exam 4: Counting Crime76 Questions
Exam 5: Correlates of Criminal Behaviour82 Questions
Exam 6: Feminism and Criminology81 Questions
Exam 7: Victimology, Victim Services, and Victim Rights in Canada82 Questions
Exam 8: Early Theories of Criminology82 Questions
Exam 9: Psychological Perspectives on Criminality83 Questions
Exam 10: Strain Theories75 Questions
Exam 11: Conflict Theories76 Questions
Exam 12: Contemporary Critical Criminology79 Questions
Exam 13: Interactionist Theories79 Questions
Exam 14: Social Control Theory77 Questions
Exam 15: Deterrence, Routine Activity, and Rational Choice Theories79 Questions
Exam 16: Organized Crime80 Questions
Exam 17: Corporate and White-Collar Crime81 Questions
Exam 18: Cybercrime and Cyberdeviance40 Questions
Select questions type
Compare and contrast cyberdeviance with cybercrime.Provide at least one example of each.
(Essay)
4.8/5
(30)
Cyberterrorism refers to the use a computer to orchestrate large-scale "attacks on information," including government or critical infrastructure servers or any database of interest to national security.
(True/False)
4.8/5
(28)
Which of the following statements is true in the context of how best to ensure the Internet is a safe place for Canadian users that is not used for criminal purposes?
(Multiple Choice)
4.9/5
(42)
Cyberterrorist generally focus on attacking human targets rather than institutional targets.
(True/False)
4.8/5
(35)
Unlike corporations and American government agencies,Canadian government agencies have thus far avoided cyberattacks.
(True/False)
4.7/5
(37)
Luring is when someone uses an Internet connection to access social media,chat rooms,or other places of electronic assembly to make contact with a child or person under 16 to meet for sexual purposes.
(True/False)
4.9/5
(34)
Skimming is an attempt to remotely circumvent the security or privacy measures of a website for the purposes of either stealing information or other malicious actions against the owner of the website.
(True/False)
4.8/5
(35)
Which of the following terms refer to the use of software and hardware to steal data (usually related to credit cards)by intercepting e-transmissions,which then enable the cloning or counterfeiting of specific financial instruments (credit cards,bank cards,etc. )for the purposes of theft and fraud?
(Multiple Choice)
4.8/5
(40)
Identify and discuss two types of sexual offences that are perpetrated over the Internet and other technologies.Compare these to traditional (offline)sexual offences.
(Essay)
4.8/5
(36)
Which of the following terms refer to the use of a network-enabled device to repeatedly make unwanted contact with a person (through e-mails,text messages,etc. )knowing that this behaviour is likely to cause fear or annoyance?
(Multiple Choice)
4.8/5
(29)
Chapter 18 argues that to better understand cybercrime and cyberdeviance one requires a broader understanding of computer technologies as being inherently criminogenic. What is mean by this statement? Describe some ways that computer technologies can be inherently criminogenic.
(Essay)
4.8/5
(37)
Within the context of exhibitionism,exposing one's body in explicit or suggestive fashion in the physical (offline)world is analogous to what in the digital (online)world?
(Multiple Choice)
4.8/5
(29)
Cyberbullying Reporter employed critical discourse analysis and corpus linguistics to aggressive or antisocial online exchanges.What was the purpose of this exercise?
(Multiple Choice)
4.7/5
(26)
Describe the cybercrimes of phishing,ripping,and skimming.Identify at least two characteristics they share and two characteristics that make each distinct from one another.
(Essay)
4.8/5
(39)
Ripping is the use of specially designed software to download original material from a protected media source (e.g. ,online movie)to a hard disk,for the purposes of resale or redistribution.
(True/False)
4.9/5
(48)
The application of routine activity theory to cybercrimes and cyberdeviance reveals that the future of guardianship on the Internet is difficult to predict.
(True/False)
4.9/5
(45)
Showing 21 - 40 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)