Deck 3: Cybervictimization
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
Play
Full screen (f)
Deck 3: Cybervictimization
1
Victimology refers to the comprehensive scientific study of cybervictims, including the _________________.
A) victims' physical characteristics
B) behavior before, during, and after the crime
C) medical, psychological, and criminal history
D) victims' home life
E) all of the above
A) victims' physical characteristics
B) behavior before, during, and after the crime
C) medical, psychological, and criminal history
D) victims' home life
E) all of the above
E
2
___________ refers to the characteristics of a victim that make the individual more likely than others to become a victim of a crime.
A) Victim proneness
B) Victim contribution
C) Victim provocation
D) Victim profile
E) None of the above
A) Victim proneness
B) Victim contribution
C) Victim provocation
D) Victim profile
E) None of the above
A
3
____________ refers to the activities of a victim that make the individual susceptible to crime.
A) Victim proneness
B) Victim contribution
C) Victim provocation
D) Victim profile
E) None of the above
A) Victim proneness
B) Victim contribution
C) Victim provocation
D) Victim profile
E) None of the above
B
4
______ views the victim as the cause of his or her victimization.
A) Victim proneness
B) Victim contribution
C) Victim provocation
D) Victim profile
E) None of the above
A) Victim proneness
B) Victim contribution
C) Victim provocation
D) Victim profile
E) None of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
__________ is a theory of victimology.
A) Expected utility theory
B) Rational choice theory
C) Social control theory
D) Lifestyle exposure theory
E) All of the above
A) Expected utility theory
B) Rational choice theory
C) Social control theory
D) Lifestyle exposure theory
E) All of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
_________ is a theory of victimology.
A) Social learning theory
B) Strain theory
C) Routine activity theory
D) Anomie theory
E) All of the above
A) Social learning theory
B) Strain theory
C) Routine activity theory
D) Anomie theory
E) All of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
An individual whose personal and professional life does not expose the individual to crime is known as a ____________.
A) low-exposure victim
B) medium-exposure victim
C) high-exposure victim
D) low-exposure offender
E) high-exposure offender
A) low-exposure victim
B) medium-exposure victim
C) high-exposure victim
D) low-exposure offender
E) high-exposure offender
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
An individual whose personal and professional life can expose him or her to crime is known as a __________.
A) low-exposure offender
B) high-exposure offender
C) low-exposure victim
D) medium-exposure victim
E) high-exposure victim
A) low-exposure offender
B) high-exposure offender
C) low-exposure victim
D) medium-exposure victim
E) high-exposure victim
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
An individual whose personal and professional life continually exposes the individual to crime is known as a__________.
A) medium-exposure victim
B) high-exposure victim
C) low-exposure offender
D) high-exposure offender
E) low-exposure victim
A) medium-exposure victim
B) high-exposure victim
C) low-exposure offender
D) high-exposure offender
E) low-exposure victim
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
A _________ is a skilled cybercriminal and engages in meticulous planning and preparation before, during, and after a crime.
A) situational offender
B) modus operandi offender
C) contradictory offender
D) high-exposure offender
E) low-exposure offender
A) situational offender
B) modus operandi offender
C) contradictory offender
D) high-exposure offender
E) low-exposure offender
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
_______ refers to the scientific study of online victimization, the impact of the cybercrime on the cybervictims, and the types of victims who experience cybercrime.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
______ holds that the victim is in some way responsible for the victimization.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
______ occurs when the victim experiences victimization from the negative attitudes and behaviors of others after the crime or cybercrime.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
______ holds that the lifestyle of a person determines whether he or she becomes a victim.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
______ refers to the vulnerability to detection and apprehension because of personality traits of the criminal and the environment within which the criminal operates.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
______ refers to the likelihood of detection and capture of an offender through the offender's MO.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
A ______ is an action of an offender that is designed to evade detection and capture by authorities.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
A ______ refers to offender behaviors that increase the likelihood of his or her detection and apprehension by authorities before, during, and after a crime.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
An individual who is a ______ has few skills and lacks the necessary foresight and planning before, during, and after the crime; as such, he or she is more likely to be detected by authorities.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
Routine activity theory holds that for crime to be committed, two elements must be present-a ______ and a ______-and one element must be absent, that is, a ______.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
A cybervictim can be a person, a public or private organization, or society at large.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
With primary cybervictimization, the victim is the indirect target of the crime secondary cybervictimization.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
With tertiary cybervictimization, the victim is the target of the cybercrime.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
Tertiary cybervictimization refers to the impact of cybercrime on society.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
The reality is that one profile does not fit all cybervictims, not even for similar cybercrimes.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
A target's suitability is determined by four criteria, value, inertia, visibility, and accessibility, which can be summed up by the acronym VIVA.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
Social guardianship refers to the measures taken to protect a user and his or her digital devices and frustrate the attempts of cybercriminals to commit crime.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
Physical guardianship refers to the presence of third parties that could discourage crime because of their presence.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
Criminogenic is the term used to describe a state or situation that causes or tends to cause crime.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
Passive physical guardianship includes protective measures that largely go unnoticed by users and automatically shape users' behaviors.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck