Exam 18: Cybercrime and Cyberdeviance

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Compare and contrast cyberdeviance with cybercrime.Provide at least one example of each.

(Essay)
4.8/5
(30)

Cyberterrorism refers to the use a computer to orchestrate large-scale "attacks on information," including government or critical infrastructure servers or any database of interest to national security.

(True/False)
4.8/5
(28)

Which of the following statements is true in the context of how best to ensure the Internet is a safe place for Canadian users that is not used for criminal purposes?

(Multiple Choice)
4.9/5
(42)

Cyberterrorist generally focus on attacking human targets rather than institutional targets.

(True/False)
4.8/5
(35)

Unlike corporations and American government agencies,Canadian government agencies have thus far avoided cyberattacks.

(True/False)
4.7/5
(37)

Luring is when someone uses an Internet connection to access social media,chat rooms,or other places of electronic assembly to make contact with a child or person under 16 to meet for sexual purposes.

(True/False)
4.9/5
(34)

Skimming is an attempt to remotely circumvent the security or privacy measures of a website for the purposes of either stealing information or other malicious actions against the owner of the website.

(True/False)
4.8/5
(35)

Which of the following terms refer to the use of software and hardware to steal data (usually related to credit cards)by intercepting e-transmissions,which then enable the cloning or counterfeiting of specific financial instruments (credit cards,bank cards,etc. )for the purposes of theft and fraud?

(Multiple Choice)
4.8/5
(40)

Which of the following can best be described as ripping?

(Multiple Choice)
4.9/5
(30)

Compare and contrast cybercrime with cyber terrorism.

(Essay)
4.7/5
(42)

Identify and discuss two types of sexual offences that are perpetrated over the Internet and other technologies.Compare these to traditional (offline)sexual offences.

(Essay)
4.8/5
(36)

Which of the following terms refer to the use of a network-enabled device to repeatedly make unwanted contact with a person (through e-mails,text messages,etc. )knowing that this behaviour is likely to cause fear or annoyance?

(Multiple Choice)
4.8/5
(29)

Chapter 18 argues that to better understand cybercrime and cyberdeviance one requires a broader understanding of computer technologies as being inherently criminogenic. What is mean by this statement? Describe some ways that computer technologies can be inherently criminogenic.

(Essay)
4.8/5
(37)

Within the context of exhibitionism,exposing one's body in explicit or suggestive fashion in the physical (offline)world is analogous to what in the digital (online)world?

(Multiple Choice)
4.8/5
(29)

Which of the following can best be described as spamming?

(Multiple Choice)
4.8/5
(34)

Cyberbullying Reporter employed critical discourse analysis and corpus linguistics to aggressive or antisocial online exchanges.What was the purpose of this exercise?

(Multiple Choice)
4.7/5
(26)

Describe the cybercrimes of phishing,ripping,and skimming.Identify at least two characteristics they share and two characteristics that make each distinct from one another.

(Essay)
4.8/5
(39)

Ripping is the use of specially designed software to download original material from a protected media source (e.g. ,online movie)to a hard disk,for the purposes of resale or redistribution.

(True/False)
4.9/5
(48)

Which of the following can best be described as hacking?

(Multiple Choice)
4.8/5
(38)

The application of routine activity theory to cybercrimes and cyberdeviance reveals that the future of guardianship on the Internet is difficult to predict.

(True/False)
4.9/5
(45)
Showing 21 - 40 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)