Deck 15: Cybercrime and the Future of Crime

Full screen (f)
exit full mode
Question
______ refers to crime that is committed using a computer.

A) Trojan horse
B) Bot crime
C) Cybercrime
D) Identity theft
Use Space or
up arrow
down arrow
to flip the card.
Question
Why is botnet crime a type of cybercrime that is difficult to fight?

A) because "bot-herders" are particularly clever in avoiding police
B) Because most computer owners do not know their computers have been infected
C) Because botnets do not leave a trace
D) Because hackers send out many botnets at one time
Question
Which of the following countries are continually accused of cyberspuing on the United States?

A) China and North Korea
B) South Korea and Japan
C) Egypt and Turkey
D) France and Russia
Question
The internet was originally created in the United States for the ______.

A) Department of Justice
B) Department of Education
C) Department of Defense
D) Department of Homeland Security
Question
People who illegally reproduce and use software and subsequently cost manufacturers billions of dollars a year in lost revenue are called ______.

A) cyberpunks
B) cyber zombies
C) neuromancer
D) software pirates
Question
All of the following are a part of Wall's (2001) typology of cybercrime except ______.

A) cyberdeceptions
B) cyberhackers
C) cyberpornography
D) cybertrespass
Question
It is estimated that ______ percent of computer crimes are committed by "insiders" or employees.

A) 20
B) 50
C) 80
D) 95
Question
The illegal production of computer software is a big business in ______ countries.

A) North American
B) Southeast Asian
C) Western European
D) Middle Eastern
Question
All of the following are examples of cybercrime except ______.

A) high-tech espionage
B) telecommunications fraud
C) bullying
D) online pedophilia
Question
Spernow's (1995) typology of cybercrime includes all of the following except for ______.

A) cyberviolence
B) insider crime
C) high-tech espionage
D) malicious hacking
Question
According to Wall (2001), which of the following refers to crossing boundaries into other people's property?

A) cyberdeceptions
B) cyberviolence
C) cyberpornography
D) cybertrespass
Question
According to Wall (2001), which of the following applies to crimes such as credit card fraud and priacy?

A) cyberdeceptions
B) cyberviolence
C) cyberpornography
D) cybertrespass
Question
According to Wall (2001), which of the following refers to breaching laws on obscenity and decency?

A) cyberdeceptions
B) cyberviolence
C) cyberpornography
D) cybertrespass
Question
According to Wall (2001), doing psychological harm to or inciting harm against others is known as ______.

A) cyberdeceptions
B) cyberviolence
C) cyberpornography
D) cybertrespass
Question
What is the term for ill-intentioned hackers who attempt to break into computer systems?

A) crackers
B) insiders
C) pilferers
D) bait-and-switchers
Question
______ involve programming a computer to continuously send fake authentication messages to a targeted server, keeping it constantly busy and forcing out legitimate users.

A) Password phishing
B) Web spoofing
C) Denial of service attacks
D) Sniffers
Question
Software programs such as Cracker are used to assist in which of the following types of attacks?

A) denial of service attacks
B) e-mail bombs
C) dictionary attacks
D) worms
Question
______ creates a false (shadow) version of a website that is controlled by the attacker.

A) Web spoofing
B) Worms
C) Password phishing
D) Sniffers
Question
Which of the following refers to a subprogram that contains a virus, bomb, or other harmful feature?

A) web spoofing
B) worms
C) password phishing
D) Trojan horse
Question
______ entails a cracker stealing password, account, or credit card education.

A) Phishing
B) Worms
C) Trojan horse
D) Key loggers
Question
Which of the following are similar to viruses that reproduce themselves and subvert computer systems?

A) phishing
B) worms
C) Trojan horse
D) key loggers
Question
______ are used to gain passwords to access accounts.

A) Phishing
B) Sniffer programs
C) Trojan horse
D) Key loggers
Question
What are vaccines?

A) computer hackers who develop harmful programs
B) computer programs that perform a task, such as printing a message or destroying data, on a certain date
C) rogue programs that copy themselves onto other programs
D) computer programs that seek out and destroy viruses
Question
Which of the following best describes computer hackers who develop harmful programs?

A) time bombs
B) viruses
C) vaccines
D) cyberpunks
Question
Which of the following best describes rogue programs that copy themselves into other programs or disks?

A) time bombs
B) viruses
C) vaccines
D) cyberpunks
Question
______ are computer programs that perform a task, such as printing a message or destroying data, on a certain date.

A) Time bombs
B) Viruses
C) Vaccines
D) Cyberpunks
Question
A majority of children who are victims of online predator are ______.

A) younger than 9 years old
B) 9 to 13 years old
C) 14 to 17 years old
D) older than 17 years old
Question
______ are the unanticipated, unintended, hidden functions of social change.

A) Manifest functions
B) Latent functions
C) Cultural lag
D) Hacker's ethics
Question
The idea that change takes place unevenly is referred to as ______.

A) manifest functions
B) latent functions
C) cultural lag
D) hacker's ethics
Question
______ are the anticipated or intended consequences of, for instance, new technology.

A) Manifest functions
B) Latent functions
C) Cultural lag
D) Hacker's ethics
Question
______ attempts to identify future developments (trends or events that might influence crime).

A) Environment scanning
B) Focus groups
C) Qualitative methodology
D) Triangulation
Question
______ are procedures that ask a panel of experts to predict the future.

A) Boosters
B) Delphi techniques
C) Hot products
D) Police Futurists International
Question
______ attempts to describe how present developments might appear in the future.

A) Boosters
B) Delphi techniques
C) Hot products
D) Scenario writing
Question
What is the purpose of Police Futurists International?

A) It is an organization that exists for the purpose of predicting the future of policing.
B) It is an organization that follows the trends of governmental policies.
C) It is an organization that follows the trends of street crime versus white collar crime.
D) It is an organization that responds to the increasing needs of the FBI.
Question
What does the term "biometric spoofing" mean?

A) Criminals in the future may be able to use the same technology as crime fighters to commit crimes.
B) There will be an increase in scams related to virtual worlds, such as Second Life.
C) Robotics and cloning will lead the way in crime.
D) Mathematical models and quantitative data can predict computer crimes.
Question
Bennett (1987) in Crimewarps, made all of the following predictions except for ______.

A) the computer will be the biggest generator of crime in the future
B) the concentraiton of crime in the U.S. will shift to the South
C) low birth rates and high work rates will leave homes ungaurded during the day
D) industries with older workers will experience less theft
Question
All of the following were identified as predictions in Digital Crime and Digital Terrorism (2006) except that ______.

A) organized crime groups will increasingly use the computer as a criminal instrument
B) espionage will continue to evolve
C) cyber terrorism will be the largest computer problem
D) some hacker groups will evolve into networked criminal enterprises
Question
British Home Office predictions include all of the following except for ______.

A) virtual-reality addition may increase
B) drugs will no longer pose challenges for crime control
C) alcopops and designer alcoholic drinks will continue to increase in popularity in underage drinkers
D) decreases in the use of cash will continue to result in greater theft involving credi cards and checks
Question
______ are items that are in high demand to be stolen.

A) Hot products
B) Crackers
C) Spoofs
D) Alcopops
Question
Which of the following theories provies some explanation of cybercrime?

A) social disorganiztion
B) strain
C) differential association
D) cultural lag
Question
Whole units of the Chinese military spend their entire time stealing secrets of government and private corporation computers.
Question
The computer is a tool that can be used in the commission of a variety of crimes.
Question
Software pirates, those who illegally reproduce and use software, cost manufacturers billions of dollars a year in lost revenue.
Question
Most cybercrimes are reported to the police.
Question
Online pedophiles tend target young "wannabe" hackers and participants in chat rooms.
Question
Individuals involved in high-tech espionage are often industrial spies who sell their knowledge to rivals or foreign bidders.
Question
Key loggers are secret programs that record a user's keystrokes.
Question
Both viruses and works can spread with no assistance.
Question
Network scanning programs are used to find vulnerable networked computers.
Question
"Phone-phreaking" refers to automatic speed dialers used by computer hackers.
Question
Experts suggest that parents should play a more proactive role in monitoring their child's use of the internet.
Question
Stalking online is usually of adolescents and not young children.
Question
Many predators use romance and seduction to corner their victims, and a surprising number are not known to the youth in person.
Question
Virus attacks can cripple internet operations.
Question
Trojan horses, worms, logic bombs, and eavesdropping sniffers can all be used to compromise the integrity of or deny access to data.
Question
Cybercrime is not a separate type of crime.
Question
The latent functions of social change are the anticipated or intended consequences of new technology.
Question
Latent functions are the anticipated or intended consequences of, for instance, new technology.
Question
Manifest functions are the unanticipated, unintended, hidden functions of this same change.
Question
The replacement of human mental processes by machines is referred to as cybernetics.
Question
Mathematical models use qualitative case studies to forecast crime trends.
Question
Delphi techniques are procedures that ask a panel of experts to predict the future.
Question
Scenario writing attempts to describe how present developments might appear in the future.
Question
According to crime predictions, urban robbery rates will most likely decline.
Question
Electronic tagging, DNA analysis, and recognition systems based on retinas or fingerprints could all be used to tackle crime in the twenty-first century.
Question
Crimewarps predicts that a reduction in rates of AIDS will increase demand for streetwalkers.
Question
Crimewarps predicts that the growth in the elderly population will increase medical quackery and insurance fraud.
Question
Financial crime by employees will be the largest computer problem in the future.
Question
More women in the work-force and increased leisure activity outside the home will create new opportunities for criminals.
Question
According to the British Home Office predictions, virtual-reality addiction may decrease.
Question
TVs, tablets, and smartphones are examples of hot products.
Question
Most traditional theories do not specifically address computer crimes.
Question
According to Ogburn (1922), computers can change communications, commerce, and even dating behavior far more quickly than the capability of societal values and norms to keep pace.
Question
Cybercrime is considered a separate type of crime.
Question
Malicious hackers seek forbidden knowledge and support the hacker's ethic.
Question
Types of attacks on computers have generated their own argot.
Question
Environmental scanning and surveys are used to predict the future of crime.
Question
Define cybercrime.
Question
What is cyberviolence?
Question
Identify Wall's (2007) three types of online offending.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/98
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: Cybercrime and the Future of Crime
1
______ refers to crime that is committed using a computer.

A) Trojan horse
B) Bot crime
C) Cybercrime
D) Identity theft
C
2
Why is botnet crime a type of cybercrime that is difficult to fight?

A) because "bot-herders" are particularly clever in avoiding police
B) Because most computer owners do not know their computers have been infected
C) Because botnets do not leave a trace
D) Because hackers send out many botnets at one time
B
3
Which of the following countries are continually accused of cyberspuing on the United States?

A) China and North Korea
B) South Korea and Japan
C) Egypt and Turkey
D) France and Russia
A
4
The internet was originally created in the United States for the ______.

A) Department of Justice
B) Department of Education
C) Department of Defense
D) Department of Homeland Security
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
5
People who illegally reproduce and use software and subsequently cost manufacturers billions of dollars a year in lost revenue are called ______.

A) cyberpunks
B) cyber zombies
C) neuromancer
D) software pirates
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
6
All of the following are a part of Wall's (2001) typology of cybercrime except ______.

A) cyberdeceptions
B) cyberhackers
C) cyberpornography
D) cybertrespass
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
7
It is estimated that ______ percent of computer crimes are committed by "insiders" or employees.

A) 20
B) 50
C) 80
D) 95
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
8
The illegal production of computer software is a big business in ______ countries.

A) North American
B) Southeast Asian
C) Western European
D) Middle Eastern
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
9
All of the following are examples of cybercrime except ______.

A) high-tech espionage
B) telecommunications fraud
C) bullying
D) online pedophilia
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
10
Spernow's (1995) typology of cybercrime includes all of the following except for ______.

A) cyberviolence
B) insider crime
C) high-tech espionage
D) malicious hacking
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
11
According to Wall (2001), which of the following refers to crossing boundaries into other people's property?

A) cyberdeceptions
B) cyberviolence
C) cyberpornography
D) cybertrespass
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
12
According to Wall (2001), which of the following applies to crimes such as credit card fraud and priacy?

A) cyberdeceptions
B) cyberviolence
C) cyberpornography
D) cybertrespass
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
13
According to Wall (2001), which of the following refers to breaching laws on obscenity and decency?

A) cyberdeceptions
B) cyberviolence
C) cyberpornography
D) cybertrespass
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
14
According to Wall (2001), doing psychological harm to or inciting harm against others is known as ______.

A) cyberdeceptions
B) cyberviolence
C) cyberpornography
D) cybertrespass
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
15
What is the term for ill-intentioned hackers who attempt to break into computer systems?

A) crackers
B) insiders
C) pilferers
D) bait-and-switchers
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
16
______ involve programming a computer to continuously send fake authentication messages to a targeted server, keeping it constantly busy and forcing out legitimate users.

A) Password phishing
B) Web spoofing
C) Denial of service attacks
D) Sniffers
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
17
Software programs such as Cracker are used to assist in which of the following types of attacks?

A) denial of service attacks
B) e-mail bombs
C) dictionary attacks
D) worms
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
18
______ creates a false (shadow) version of a website that is controlled by the attacker.

A) Web spoofing
B) Worms
C) Password phishing
D) Sniffers
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following refers to a subprogram that contains a virus, bomb, or other harmful feature?

A) web spoofing
B) worms
C) password phishing
D) Trojan horse
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
20
______ entails a cracker stealing password, account, or credit card education.

A) Phishing
B) Worms
C) Trojan horse
D) Key loggers
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following are similar to viruses that reproduce themselves and subvert computer systems?

A) phishing
B) worms
C) Trojan horse
D) key loggers
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
22
______ are used to gain passwords to access accounts.

A) Phishing
B) Sniffer programs
C) Trojan horse
D) Key loggers
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
23
What are vaccines?

A) computer hackers who develop harmful programs
B) computer programs that perform a task, such as printing a message or destroying data, on a certain date
C) rogue programs that copy themselves onto other programs
D) computer programs that seek out and destroy viruses
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following best describes computer hackers who develop harmful programs?

A) time bombs
B) viruses
C) vaccines
D) cyberpunks
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following best describes rogue programs that copy themselves into other programs or disks?

A) time bombs
B) viruses
C) vaccines
D) cyberpunks
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
26
______ are computer programs that perform a task, such as printing a message or destroying data, on a certain date.

A) Time bombs
B) Viruses
C) Vaccines
D) Cyberpunks
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
27
A majority of children who are victims of online predator are ______.

A) younger than 9 years old
B) 9 to 13 years old
C) 14 to 17 years old
D) older than 17 years old
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
28
______ are the unanticipated, unintended, hidden functions of social change.

A) Manifest functions
B) Latent functions
C) Cultural lag
D) Hacker's ethics
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
29
The idea that change takes place unevenly is referred to as ______.

A) manifest functions
B) latent functions
C) cultural lag
D) hacker's ethics
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
30
______ are the anticipated or intended consequences of, for instance, new technology.

A) Manifest functions
B) Latent functions
C) Cultural lag
D) Hacker's ethics
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
31
______ attempts to identify future developments (trends or events that might influence crime).

A) Environment scanning
B) Focus groups
C) Qualitative methodology
D) Triangulation
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
32
______ are procedures that ask a panel of experts to predict the future.

A) Boosters
B) Delphi techniques
C) Hot products
D) Police Futurists International
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
33
______ attempts to describe how present developments might appear in the future.

A) Boosters
B) Delphi techniques
C) Hot products
D) Scenario writing
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
34
What is the purpose of Police Futurists International?

A) It is an organization that exists for the purpose of predicting the future of policing.
B) It is an organization that follows the trends of governmental policies.
C) It is an organization that follows the trends of street crime versus white collar crime.
D) It is an organization that responds to the increasing needs of the FBI.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
35
What does the term "biometric spoofing" mean?

A) Criminals in the future may be able to use the same technology as crime fighters to commit crimes.
B) There will be an increase in scams related to virtual worlds, such as Second Life.
C) Robotics and cloning will lead the way in crime.
D) Mathematical models and quantitative data can predict computer crimes.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
36
Bennett (1987) in Crimewarps, made all of the following predictions except for ______.

A) the computer will be the biggest generator of crime in the future
B) the concentraiton of crime in the U.S. will shift to the South
C) low birth rates and high work rates will leave homes ungaurded during the day
D) industries with older workers will experience less theft
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
37
All of the following were identified as predictions in Digital Crime and Digital Terrorism (2006) except that ______.

A) organized crime groups will increasingly use the computer as a criminal instrument
B) espionage will continue to evolve
C) cyber terrorism will be the largest computer problem
D) some hacker groups will evolve into networked criminal enterprises
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
38
British Home Office predictions include all of the following except for ______.

A) virtual-reality addition may increase
B) drugs will no longer pose challenges for crime control
C) alcopops and designer alcoholic drinks will continue to increase in popularity in underage drinkers
D) decreases in the use of cash will continue to result in greater theft involving credi cards and checks
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
39
______ are items that are in high demand to be stolen.

A) Hot products
B) Crackers
C) Spoofs
D) Alcopops
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following theories provies some explanation of cybercrime?

A) social disorganiztion
B) strain
C) differential association
D) cultural lag
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
41
Whole units of the Chinese military spend their entire time stealing secrets of government and private corporation computers.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
42
The computer is a tool that can be used in the commission of a variety of crimes.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
43
Software pirates, those who illegally reproduce and use software, cost manufacturers billions of dollars a year in lost revenue.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
44
Most cybercrimes are reported to the police.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
45
Online pedophiles tend target young "wannabe" hackers and participants in chat rooms.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
46
Individuals involved in high-tech espionage are often industrial spies who sell their knowledge to rivals or foreign bidders.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
47
Key loggers are secret programs that record a user's keystrokes.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
48
Both viruses and works can spread with no assistance.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
49
Network scanning programs are used to find vulnerable networked computers.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
50
"Phone-phreaking" refers to automatic speed dialers used by computer hackers.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
51
Experts suggest that parents should play a more proactive role in monitoring their child's use of the internet.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
52
Stalking online is usually of adolescents and not young children.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
53
Many predators use romance and seduction to corner their victims, and a surprising number are not known to the youth in person.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
54
Virus attacks can cripple internet operations.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
55
Trojan horses, worms, logic bombs, and eavesdropping sniffers can all be used to compromise the integrity of or deny access to data.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
56
Cybercrime is not a separate type of crime.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
57
The latent functions of social change are the anticipated or intended consequences of new technology.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
58
Latent functions are the anticipated or intended consequences of, for instance, new technology.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
59
Manifest functions are the unanticipated, unintended, hidden functions of this same change.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
60
The replacement of human mental processes by machines is referred to as cybernetics.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
61
Mathematical models use qualitative case studies to forecast crime trends.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
62
Delphi techniques are procedures that ask a panel of experts to predict the future.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
63
Scenario writing attempts to describe how present developments might appear in the future.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
64
According to crime predictions, urban robbery rates will most likely decline.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
65
Electronic tagging, DNA analysis, and recognition systems based on retinas or fingerprints could all be used to tackle crime in the twenty-first century.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
66
Crimewarps predicts that a reduction in rates of AIDS will increase demand for streetwalkers.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
67
Crimewarps predicts that the growth in the elderly population will increase medical quackery and insurance fraud.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
68
Financial crime by employees will be the largest computer problem in the future.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
69
More women in the work-force and increased leisure activity outside the home will create new opportunities for criminals.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
70
According to the British Home Office predictions, virtual-reality addiction may decrease.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
71
TVs, tablets, and smartphones are examples of hot products.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
72
Most traditional theories do not specifically address computer crimes.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
73
According to Ogburn (1922), computers can change communications, commerce, and even dating behavior far more quickly than the capability of societal values and norms to keep pace.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
74
Cybercrime is considered a separate type of crime.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
75
Malicious hackers seek forbidden knowledge and support the hacker's ethic.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
76
Types of attacks on computers have generated their own argot.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
77
Environmental scanning and surveys are used to predict the future of crime.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
78
Define cybercrime.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
79
What is cyberviolence?
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
80
Identify Wall's (2007) three types of online offending.
Unlock Deck
Unlock for access to all 98 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 98 flashcards in this deck.