Deck 14: Criminology, Technology, and Privacy

Full screen (f)
exit full mode
Question
Which is not an effect of technology on the criminal justice system?

A) Technology has given offenders more opportunities to break the law.
B) The criminal justice system uses technology to discover, apprehend, process, and incarcerate offenders.
C) Technology has made the crime rate go down.
D) Technology has altered the public's concept of privacy.
Use Space or
up arrow
down arrow
to flip the card.
Question
After World War II, the reasons for developing a decentralized national computer network were _____ and _____.

A) cultural and criminological
B) capitalist and sociological
C) altruistic and experimental
D) military and scientific
Question
This officially went online in October 1969 with a test message sent from UCLA to the Stanford Research Institute.

A) ARPANET
B) INTERNET
C) W3
D) NSFNet
Question
In 1987, this agency over responsibility for ARPANET's civilian nodes and created the system eventually known as the Internet.

A) National Foundation for the Arts
B) National Science Foundation
C) NASA
D) Advanced Research Projects Agency
Question
This is a part of the World Wide Web that is accessible only with certain types of software or authorization.

A) Internet
B) no-net
C) DW3
D) dark web
Question
This legislation specifically prohibits pretexting to obtain consumers' personal financial information, such as bank balances, from financial institutions.

A) Gramm-Leach-Bliley Act
B) CAN-SPAM Act
C) Volstead Act
D) Telephone Records and Privacy Protection Act
Question
Despite the increased level of sophistication required to commit offenses such as robbery and theft that has resulted from the advances in technology, these offenses are mostly an extension of this type of crime.

A) street
B) white-collar
C) organized
D) political
Question
Technological efforts at protecting banks utilize situational crime prevention. This is an extension of which theory?

A) routine activities
B) rational choice
C) strain
D) conflict
Question
What is the security focus of modern banking?

A) target hardening
B) situational crime prevention
C) loss limitation
D) physical security
Question
Concerns about which offense led to the development of technological innovations such as fingerprint scanners and voice recognition software?

A) counterfeiting
B) robbery
C) identity theft
D) burglary
Question
Crime is _____ defined.

A) socially
B) normatively
C) individually
D) actively
Question
One key consequence the Internet has had for traditional criminal justice is its effect on this.

A) the law
B) jurisdiction
C) society
D) technology
Question
Legal jurisdiction can be established by all but which of the following?

A) the victim's nationality
B) geography
C) political boundaries
D) the nature of the offense
Question
This is the unauthorized use of an information system or network.

A) phishing
B) hacking
C) scamming
D) spamming
Question
Why did perpetrators of early technology-based crime, such as "the Whistler" and "Cap'n Crunch" break the law?

A) to get jobs in the industry
B) to make money
C) to gain knowledge
D) for revenge
Question
Which of the following is not a characteristic common to computer networks on which crime is common?

A) They offer some degree of anonymity.
B) They have limited access.
C) They are large.
D) They are versatile.
Question
This is unsolicited e-mail advertising a product or service that is sent in bulk to large numbers of people.

A) junk mail
B) spam
C) trash mail
D) phish
Question
Which of the following theories explains Internet crime by suggesting that people behave differently online than they do offline?

A) space transition theory
B) neutralization theory
C) routine activity theory
D) opportunity theory
Question
Which federal agency coordinates responses to computer-based attacks in the United States?

A) US-CERT
B) National Cyber Security Division Mission
C) FBI Cyber Investigations
D) Internet Crime Complaint Center
Question
According to opportunity theory, the opportunity for crime on the Internet is increased because of this.

A) It is harder to prevent online offenders from using techniques of neutralization.
B) It is not bound by physical place.
C) People behave differently in different spaces.
D) Suitable guardians are rare.
Question
This involves manipulating individuals so that they give away information or perform actions.

A) social manipulation
B) social engineering
C) social psychology
D) social persuasion
Question
This involves committing a network break-in by persuading someone to reveal the system passwords, rather than by cracking them.

A) phishing
B) dataveillence
C) phreaking
D) pretexting
Question
This involve(s) the use of an e-mail that resembles an important communication from a bank or other trusted institution.

A) phishing
B) pretexting
C) logic bombs
D) social engineering
Question
This type of attack is focused, with an e-mail being personalized to the receiver, often by information picked from a social media site.

A) pretexting
B) phreaking
C) spear phishing
D) hacking
Question
These often arrive in the form of e-mail attachments that appear interesting to recipients, promising exciting pictures, screensavers, music, or software.

A) hacking
B) pretexting
C) phishing
D) Trojan horses
Question
What is the first known computer virus?

A) Reaper
B) Elk Cloner
C) Creeper
D) Melissa
Question
This is software that purposefully damages, disables, or steals information from computers and computer systems.

A) badware
B) hackware
C) sadware
D) malware
Question
This attack is designed to make a computer or server so busy with meaningless activity that it is unavailable for useful activity.

A) logic bomb
B) Trojan horse
C) road apple
D) denial of service attack
Question
Peer-to-peer networks such as BitTorrent facilitate which type of offense?

A) spamming
B) theft of intellectual property
C) identity theft
D) social engineering
Question
According to one typology of child pornographers, this type pursues online relationships with children with the intent to establish a virtual or physical sexual relationship.

A) secure collector
B) producer
C) groomer
D) trawler
Question
According to the typology of child pornographers, this type actively seeks child pornography using openly available Web browsers using little to no security.

A) trawler
B) groomer
C) browser
D) non-secure collector
Question
In this case, a man was convicted for possessing images that focused on the clothed genital areas of young girls.

A) Terry v. Ohio
B) Argersinger v. Hamlin
C) Carpenter v. United States
D) United States v. Knox
Question
Which of the following is not one of the standards under federal law that apply to all forms of child pornography?

A) A child is anyone under the age of 18.
B) Possession, production, and distribution of child pornography are criminal offenses.
C) The electronic images must be retained (printed, saved to digital media, etc.) to be considered a criminal offense.
D) Any sexually explicit behavior is included, not just obscene behavior or nudity.
Question
Much of the federal funding for surveillance cameras is based on using the cameras for which purpose?

A) spotting potential terrorist activity
B) deterring potential street offenders
C) controlling crime
D) providing evidence in court
Question
This term refers to methods used to verify identity based on physiological or behavioral characteristics.

A) electronic monitoring
B) social engineering
C) pretexting
D) biometrics
Question
This is the primary criminal justice use of biometrics.

A) maintain security for prisons and jails
B) track offenders released on parole
C) increase the efficiency of probation officer contacts with offenders on probation
D) facilitate dataveillance
Question
This term describes an organized set of information.

A) jurisdiction
B) computer
C) program
D) database
Question
What his the systematic use of personal data systems in the investigation or monitoring of the actions or communications of one or more persons is called?

A) biometrics
B) dataveillance
C) RFID tagging
D) social engineering
Question
In this case, the U.S. Supreme Court affirmed that the police need a search warrant to collect information about where suspects have used their cell phones.

A) Terry v. Ohio
B) Argersinger v. Hamlin
C) Carpenter v. United States
D) United States v. Knox
Question
Which of the following statements about privacy and security is false?

A) Security is now a global concern.
B) Teenagers and young adults have different ideas about privacy than older adults.
C) The future relationship between privacy and security is reasonably predictable today.
D) Americans have voluntarily given up some of their privacy.
Question
List and explain the three main effects technology has had on the criminal justice system.
Question
Define social engineering and explain how it exploits human error. Explain different types of social engineering that rely on the use of computers.
Question
Discuss the pros and cons of the dark web. Is having a network with anonymous communication for political dissidents, journalists, law enforcement officers, and business professionals worth the crime that may occur on it?
Question
Explain the concept of electronic monitoring and discuss the advantages and criticisms of this type of technology.
Question
Explain the tension between privacy and security and the key issues affecting it.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Criminology, Technology, and Privacy
1
Which is not an effect of technology on the criminal justice system?

A) Technology has given offenders more opportunities to break the law.
B) The criminal justice system uses technology to discover, apprehend, process, and incarcerate offenders.
C) Technology has made the crime rate go down.
D) Technology has altered the public's concept of privacy.
C
2
After World War II, the reasons for developing a decentralized national computer network were _____ and _____.

A) cultural and criminological
B) capitalist and sociological
C) altruistic and experimental
D) military and scientific
D
3
This officially went online in October 1969 with a test message sent from UCLA to the Stanford Research Institute.

A) ARPANET
B) INTERNET
C) W3
D) NSFNet
A
4
In 1987, this agency over responsibility for ARPANET's civilian nodes and created the system eventually known as the Internet.

A) National Foundation for the Arts
B) National Science Foundation
C) NASA
D) Advanced Research Projects Agency
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
This is a part of the World Wide Web that is accessible only with certain types of software or authorization.

A) Internet
B) no-net
C) DW3
D) dark web
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
This legislation specifically prohibits pretexting to obtain consumers' personal financial information, such as bank balances, from financial institutions.

A) Gramm-Leach-Bliley Act
B) CAN-SPAM Act
C) Volstead Act
D) Telephone Records and Privacy Protection Act
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
Despite the increased level of sophistication required to commit offenses such as robbery and theft that has resulted from the advances in technology, these offenses are mostly an extension of this type of crime.

A) street
B) white-collar
C) organized
D) political
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Technological efforts at protecting banks utilize situational crime prevention. This is an extension of which theory?

A) routine activities
B) rational choice
C) strain
D) conflict
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
What is the security focus of modern banking?

A) target hardening
B) situational crime prevention
C) loss limitation
D) physical security
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
Concerns about which offense led to the development of technological innovations such as fingerprint scanners and voice recognition software?

A) counterfeiting
B) robbery
C) identity theft
D) burglary
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
Crime is _____ defined.

A) socially
B) normatively
C) individually
D) actively
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
One key consequence the Internet has had for traditional criminal justice is its effect on this.

A) the law
B) jurisdiction
C) society
D) technology
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
Legal jurisdiction can be established by all but which of the following?

A) the victim's nationality
B) geography
C) political boundaries
D) the nature of the offense
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
This is the unauthorized use of an information system or network.

A) phishing
B) hacking
C) scamming
D) spamming
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
Why did perpetrators of early technology-based crime, such as "the Whistler" and "Cap'n Crunch" break the law?

A) to get jobs in the industry
B) to make money
C) to gain knowledge
D) for revenge
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is not a characteristic common to computer networks on which crime is common?

A) They offer some degree of anonymity.
B) They have limited access.
C) They are large.
D) They are versatile.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
This is unsolicited e-mail advertising a product or service that is sent in bulk to large numbers of people.

A) junk mail
B) spam
C) trash mail
D) phish
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following theories explains Internet crime by suggesting that people behave differently online than they do offline?

A) space transition theory
B) neutralization theory
C) routine activity theory
D) opportunity theory
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
Which federal agency coordinates responses to computer-based attacks in the United States?

A) US-CERT
B) National Cyber Security Division Mission
C) FBI Cyber Investigations
D) Internet Crime Complaint Center
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
According to opportunity theory, the opportunity for crime on the Internet is increased because of this.

A) It is harder to prevent online offenders from using techniques of neutralization.
B) It is not bound by physical place.
C) People behave differently in different spaces.
D) Suitable guardians are rare.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
This involves manipulating individuals so that they give away information or perform actions.

A) social manipulation
B) social engineering
C) social psychology
D) social persuasion
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
This involves committing a network break-in by persuading someone to reveal the system passwords, rather than by cracking them.

A) phishing
B) dataveillence
C) phreaking
D) pretexting
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
This involve(s) the use of an e-mail that resembles an important communication from a bank or other trusted institution.

A) phishing
B) pretexting
C) logic bombs
D) social engineering
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
This type of attack is focused, with an e-mail being personalized to the receiver, often by information picked from a social media site.

A) pretexting
B) phreaking
C) spear phishing
D) hacking
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
These often arrive in the form of e-mail attachments that appear interesting to recipients, promising exciting pictures, screensavers, music, or software.

A) hacking
B) pretexting
C) phishing
D) Trojan horses
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
What is the first known computer virus?

A) Reaper
B) Elk Cloner
C) Creeper
D) Melissa
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
This is software that purposefully damages, disables, or steals information from computers and computer systems.

A) badware
B) hackware
C) sadware
D) malware
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
This attack is designed to make a computer or server so busy with meaningless activity that it is unavailable for useful activity.

A) logic bomb
B) Trojan horse
C) road apple
D) denial of service attack
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
Peer-to-peer networks such as BitTorrent facilitate which type of offense?

A) spamming
B) theft of intellectual property
C) identity theft
D) social engineering
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
According to one typology of child pornographers, this type pursues online relationships with children with the intent to establish a virtual or physical sexual relationship.

A) secure collector
B) producer
C) groomer
D) trawler
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
According to the typology of child pornographers, this type actively seeks child pornography using openly available Web browsers using little to no security.

A) trawler
B) groomer
C) browser
D) non-secure collector
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
In this case, a man was convicted for possessing images that focused on the clothed genital areas of young girls.

A) Terry v. Ohio
B) Argersinger v. Hamlin
C) Carpenter v. United States
D) United States v. Knox
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following is not one of the standards under federal law that apply to all forms of child pornography?

A) A child is anyone under the age of 18.
B) Possession, production, and distribution of child pornography are criminal offenses.
C) The electronic images must be retained (printed, saved to digital media, etc.) to be considered a criminal offense.
D) Any sexually explicit behavior is included, not just obscene behavior or nudity.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
Much of the federal funding for surveillance cameras is based on using the cameras for which purpose?

A) spotting potential terrorist activity
B) deterring potential street offenders
C) controlling crime
D) providing evidence in court
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
This term refers to methods used to verify identity based on physiological or behavioral characteristics.

A) electronic monitoring
B) social engineering
C) pretexting
D) biometrics
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
This is the primary criminal justice use of biometrics.

A) maintain security for prisons and jails
B) track offenders released on parole
C) increase the efficiency of probation officer contacts with offenders on probation
D) facilitate dataveillance
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
This term describes an organized set of information.

A) jurisdiction
B) computer
C) program
D) database
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
What his the systematic use of personal data systems in the investigation or monitoring of the actions or communications of one or more persons is called?

A) biometrics
B) dataveillance
C) RFID tagging
D) social engineering
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
In this case, the U.S. Supreme Court affirmed that the police need a search warrant to collect information about where suspects have used their cell phones.

A) Terry v. Ohio
B) Argersinger v. Hamlin
C) Carpenter v. United States
D) United States v. Knox
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following statements about privacy and security is false?

A) Security is now a global concern.
B) Teenagers and young adults have different ideas about privacy than older adults.
C) The future relationship between privacy and security is reasonably predictable today.
D) Americans have voluntarily given up some of their privacy.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
List and explain the three main effects technology has had on the criminal justice system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
Define social engineering and explain how it exploits human error. Explain different types of social engineering that rely on the use of computers.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
Discuss the pros and cons of the dark web. Is having a network with anonymous communication for political dissidents, journalists, law enforcement officers, and business professionals worth the crime that may occur on it?
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
Explain the concept of electronic monitoring and discuss the advantages and criticisms of this type of technology.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
Explain the tension between privacy and security and the key issues affecting it.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.