Deck 10: Interpersonal Cybercrime

Full screen (f)
exit full mode
Question
An example/examples of unprotected speech is/are _____________.

A) false statement of facts
B) incitement to violence
C) obscene speech
D) both B and C
E) All of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
_________ refers to use of the Internet, computers, and related technology to repeatedly threaten, harass, or frighten another individual.

A) Cyberextortion
B) Sexting
C) Cyberstalking
D) Revenge porn
E) All of the above
Question
_________ refers to use of the Internet and digital devices to intentionally alarm, annoy, attack, or verbally abuse another individual.

A) Cyberextortion
B) Sexting
C) Cyberharassment
D) Revenge porn
E) All of the above
Question
Cyberbullying _____________.

A) can occur at all hours of the day or night
B) is at times inescapable
C) can occur anonymously
D) both A and B
E) all of the above
Question
Cyberbullies use __________ to target victims.

A) mobile phones
B) chat rooms
C) social media
D) instant messaging
E) all of the above
Question
For cyberbullying, children can be ___________.

A) imprisoned
B) placed on probation
C) fined
D) given community service
E) all of the above
Question
Which coping strategy is used by victims of cyberbullying in response to the crime committed against them?

A) Retaliation
B) Ignoring the cyberbully
C) Seeking support
D) Utilizing technical solutions
E) All of the above
Question
Which coping strategy is not often used by victims of cyberbullying in response to the crime committed against them and is not considered as useful as other strategies?

A) Retaliation
B) Ignoring the cyberbully
C) Seeking support
D) Utilizing technical solutions
E) All of the above
Question
__________ prevention programs are proactive, dealing with problems before they occur.

A) Primary
B) Secondary
C) Tertiary
D) Crime
E) None of the above
Question
_________ prevention programs are implemented after an undesirable behavior or illicit act has occurred.

A) Primary
B) Secondary
C) Tertiary
D) Crime
E) None of the above
Question
_______ refers to use of the Internet and digital devices to intentionally alarm, annoy, attack, or verbally abuse another individual.
Question
_______ is a term used to describe the use of sexually explicit photos or videos of the victim without the victim's consent to cause the victim distress, humiliation, or harm in some way.
Question
_______ occurs when a perpetrator threatens to disseminate sexually explicit photos or videos of the victim online if sexual demands are not met or if sexually explicit images or videos are not sent to the perpetrator.
Question
________ are individuals who are sexually aroused by prepubescent adolescents.
Question
________ refers to the visual, audio, written, or other form of portrayal of sexual activity with a child under 18 years of age that is designed to sexually arouse a viewer.
Question
_______ depicts sexual acts with animals or dead bodies and/or that endanger a person's life or can cause extreme physical harm to breasts, genitals, and/or the anus of an individual.
Question
________ refers to the manipulation tactics an offender uses to gain the victim's trust and ultimately lead him or her to engage in sexual activities.
Question
When perpetrators travel to another country to engage in some form of child sexual exploitation, they engage in ________.
Question
A ______ is a fake website that serves no legitimate purpose other than to gather intelligence on criminal activity and to capture the information of child sexual predators who access the site to download child pornography.
Question
_______ refers to the generation of sexually explicit content (e.g., nude photos) distributed through messaging services on mobile phones or via the Internet.
Question
Trolls have been known to post highly offensive and inflammatory remarks on memorial pages, celebrity websites, and social media accounts, as well as to online forums utilized by everyday users.
Question
There are two primary U.S. federal laws that can be used to prosecute cyberstalking.
Question
There are international cyberstalking laws.
Question
There is no federal cyberharassment law in the United States.
Question
There is no federal cyberbullying law in the United States.
Question
The terms cyberharassment and cyberbullying are often used interchangeably.
Question
A preferential sex offender accesses material opportunistically and impulsively, often to satisfy a sexual need or curiosity or for economic reasons.
Question
A situational offender is driven by sexual desires for children and will actively look for child pornography.
Question
Netiquette refers to the appropriate rules of behavior in online forums.
Question
Tertiary prevention programs target children most at risk of being bullied, harassed, stalked, or harmed in any way.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Interpersonal Cybercrime
1
An example/examples of unprotected speech is/are _____________.

A) false statement of facts
B) incitement to violence
C) obscene speech
D) both B and C
E) All of the above
E
2
_________ refers to use of the Internet, computers, and related technology to repeatedly threaten, harass, or frighten another individual.

A) Cyberextortion
B) Sexting
C) Cyberstalking
D) Revenge porn
E) All of the above
C
3
_________ refers to use of the Internet and digital devices to intentionally alarm, annoy, attack, or verbally abuse another individual.

A) Cyberextortion
B) Sexting
C) Cyberharassment
D) Revenge porn
E) All of the above
C
4
Cyberbullying _____________.

A) can occur at all hours of the day or night
B) is at times inescapable
C) can occur anonymously
D) both A and B
E) all of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
Cyberbullies use __________ to target victims.

A) mobile phones
B) chat rooms
C) social media
D) instant messaging
E) all of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
For cyberbullying, children can be ___________.

A) imprisoned
B) placed on probation
C) fined
D) given community service
E) all of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
Which coping strategy is used by victims of cyberbullying in response to the crime committed against them?

A) Retaliation
B) Ignoring the cyberbully
C) Seeking support
D) Utilizing technical solutions
E) All of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
Which coping strategy is not often used by victims of cyberbullying in response to the crime committed against them and is not considered as useful as other strategies?

A) Retaliation
B) Ignoring the cyberbully
C) Seeking support
D) Utilizing technical solutions
E) All of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
__________ prevention programs are proactive, dealing with problems before they occur.

A) Primary
B) Secondary
C) Tertiary
D) Crime
E) None of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
_________ prevention programs are implemented after an undesirable behavior or illicit act has occurred.

A) Primary
B) Secondary
C) Tertiary
D) Crime
E) None of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
_______ refers to use of the Internet and digital devices to intentionally alarm, annoy, attack, or verbally abuse another individual.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
_______ is a term used to describe the use of sexually explicit photos or videos of the victim without the victim's consent to cause the victim distress, humiliation, or harm in some way.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
_______ occurs when a perpetrator threatens to disseminate sexually explicit photos or videos of the victim online if sexual demands are not met or if sexually explicit images or videos are not sent to the perpetrator.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
________ are individuals who are sexually aroused by prepubescent adolescents.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
________ refers to the visual, audio, written, or other form of portrayal of sexual activity with a child under 18 years of age that is designed to sexually arouse a viewer.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
_______ depicts sexual acts with animals or dead bodies and/or that endanger a person's life or can cause extreme physical harm to breasts, genitals, and/or the anus of an individual.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
________ refers to the manipulation tactics an offender uses to gain the victim's trust and ultimately lead him or her to engage in sexual activities.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
When perpetrators travel to another country to engage in some form of child sexual exploitation, they engage in ________.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
A ______ is a fake website that serves no legitimate purpose other than to gather intelligence on criminal activity and to capture the information of child sexual predators who access the site to download child pornography.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
_______ refers to the generation of sexually explicit content (e.g., nude photos) distributed through messaging services on mobile phones or via the Internet.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
Trolls have been known to post highly offensive and inflammatory remarks on memorial pages, celebrity websites, and social media accounts, as well as to online forums utilized by everyday users.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
There are two primary U.S. federal laws that can be used to prosecute cyberstalking.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
There are international cyberstalking laws.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
There is no federal cyberharassment law in the United States.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
There is no federal cyberbullying law in the United States.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
The terms cyberharassment and cyberbullying are often used interchangeably.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
A preferential sex offender accesses material opportunistically and impulsively, often to satisfy a sexual need or curiosity or for economic reasons.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
A situational offender is driven by sexual desires for children and will actively look for child pornography.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
Netiquette refers to the appropriate rules of behavior in online forums.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
Tertiary prevention programs target children most at risk of being bullied, harassed, stalked, or harmed in any way.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 30 flashcards in this deck.