Deck 10: Policing the Internet
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/17
Play
Full screen (f)
Deck 10: Policing the Internet
1
Many scholars argue that policing cybercrime has become more 'pluralized,' meaning that _______________.?
A) the recruitment of policemen and women has increased substantially
B) law enforcement agencies are involving other actors in policing activity
C) law enforcement agencies have been expanding their inventory of policing tools and technology
D) the police are focused more towards computer-mediated crime rather than street crime
A) the recruitment of policemen and women has increased substantially
B) law enforcement agencies are involving other actors in policing activity
C) law enforcement agencies have been expanding their inventory of policing tools and technology
D) the police are focused more towards computer-mediated crime rather than street crime
B
2
Wall (2007) states that cybercrimes may fall into 'the de minimis trap.' In other words, _______________.?
A) law enforcement agencies become solely fixated on cybercrime issues that they tend to ignore proximate issues, such as street crimes within neighbourhoods
B) a high-profile cybercrime case will eventually cause a 'moral panic' among the populous
C) cybercrimes tend to fall below the threshold of seriousness since they are perceived as low-impact in nature
D) state and local governments will use cybercrimes to advance their own agendas
A) law enforcement agencies become solely fixated on cybercrime issues that they tend to ignore proximate issues, such as street crimes within neighbourhoods
B) a high-profile cybercrime case will eventually cause a 'moral panic' among the populous
C) cybercrimes tend to fall below the threshold of seriousness since they are perceived as low-impact in nature
D) state and local governments will use cybercrimes to advance their own agendas
C
3
The _______________ in the UK absorbed both the Serious and Organised Crime Agency (SOCA) and the Police Central e-crime Unit (PCeU), which handles cybercrime cases.?
A) National Cybercrime Unit
B) State Cybercrime Police Force
C) National Cybercrime Task Force
D) National Digital Forensics Unit
A) National Cybercrime Unit
B) State Cybercrime Police Force
C) National Cybercrime Task Force
D) National Digital Forensics Unit
A
4
In terms of cybercrime units, Willits and Nowacki (2016) state that _______________.?
A) smaller agencies are more likely to have a cybercrime unit than larger agencies
B) agencies with a higher crime rate are more likely to have a cybercrime unit than areas with low rates of crime
C) agencies with higher levels of recruitment are more likely to have cybercrime units than those whose agencies are stagnant
D) larger agencies with more resources are more likely to have cybercrime units than smaller agencies
A) smaller agencies are more likely to have a cybercrime unit than larger agencies
B) agencies with a higher crime rate are more likely to have a cybercrime unit than areas with low rates of crime
C) agencies with higher levels of recruitment are more likely to have cybercrime units than those whose agencies are stagnant
D) larger agencies with more resources are more likely to have cybercrime units than smaller agencies
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is not a challenge law enforcement face in combating and policing cybercrime?
A) Cybercrime is increasingly becoming a transnational issue
B) Police officers lack understanding and knowledge of cybercrime issues
C) Law enforcement agencies are hyper-focused on cybercrimes, thereby neglecting the resolutions of other types of crime
D) The established culture and ethos of policing within law enforcement agencies are resistant to prioritize cybercrime
A) Cybercrime is increasingly becoming a transnational issue
B) Police officers lack understanding and knowledge of cybercrime issues
C) Law enforcement agencies are hyper-focused on cybercrimes, thereby neglecting the resolutions of other types of crime
D) The established culture and ethos of policing within law enforcement agencies are resistant to prioritize cybercrime
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
6
What is the 'digital divide'?
A) Social exclusion from new ICTs serve to exacerbate existing patterns of social inequality
B) Transnational divisions where pockets of the Internet remain closed off from particular regions of the world
C) Generational differences where older individuals unfamiliar with technology are less likely to use them (e.g. smartphones)
D) A phenomenon reflective of gender hierarchies where males are more likely to become involved in computer science than women
A) Social exclusion from new ICTs serve to exacerbate existing patterns of social inequality
B) Transnational divisions where pockets of the Internet remain closed off from particular regions of the world
C) Generational differences where older individuals unfamiliar with technology are less likely to use them (e.g. smartphones)
D) A phenomenon reflective of gender hierarchies where males are more likely to become involved in computer science than women
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
7
This is a form of governance wherein the government is not the central authority within a cooperative, but just one of the actors involved.?
A) Single-actor governance
B) Coincidental governance
C) Spacious governance
D) Nodal governance
A) Single-actor governance
B) Coincidental governance
C) Spacious governance
D) Nodal governance
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
8
From an individual consumer perspective, the greatest investment in Internet policing technologies falls in the areas of _______________.?
A) computer science education
B) self-help books about technology
C) preventative software
D) police-community programs
A) computer science education
B) self-help books about technology
C) preventative software
D) police-community programs
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is typically not an IT security service offered by 'for-profit,' or private sector entities?
A) Training for organizations and employees
B) Software that aids in the detection of user authentication
C) Programs that detect and combat 'malicious' software
D) Legal consultation for the protection and handling of digital evidence
A) Training for organizations and employees
B) Software that aids in the detection of user authentication
C) Programs that detect and combat 'malicious' software
D) Legal consultation for the protection and handling of digital evidence
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
10
This term refers to non-state actors who work to punish or bring others to account in response to a perceived or actual dearth of institutional remedies.?
A) Piracy
B) Digilantism
C) Trolling
D) Phishing
A) Piracy
B) Digilantism
C) Trolling
D) Phishing
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
11
This organisation was founded in 1996 in the UK with an initial intent to combat child pornography, then later expanded to cover both criminally obscene (but non-child-oriented) content and instances of hate speech on the Internet.?
A) Perverted Justice
B) Computer Fraud and Abuse Act
C) The Internet Watch Foundation
D) The Internet Corporation for Assigned Names and Numbers
A) Perverted Justice
B) Computer Fraud and Abuse Act
C) The Internet Watch Foundation
D) The Internet Corporation for Assigned Names and Numbers
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
12
This organisation was founded by lawyers, policy analysts, activists, and technologists in 1990 to preserve and defend free speech online and to combat attempts at censorship via litigation against the US government and large corporations.?
A) The Entertainment Software Rating Board
B) The Electronic Frontier Foundation
C) The Simon Wiesenthal Centre
D) The National White Collar Crime Centre
A) The Entertainment Software Rating Board
B) The Electronic Frontier Foundation
C) The Simon Wiesenthal Centre
D) The National White Collar Crime Centre
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
13
_______________ is the principle that holds that freedom from criminal predation, and protection from it, is the right of all citizens. This is a principle said to be compromised by the privatization of information security.?
A) Liberty
B) Jurisdiction
C) Equity
D) Parens patriae
A) Liberty
B) Jurisdiction
C) Equity
D) Parens patriae
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
14
What is the purpose of a Faraday bag?
A) To hold law enforcement field devices until they are ready to be used. Failure to properly secure such forensic devices may result in compromised evidence gathering capabilities
B) The long-term storage of ready-access memory to facilitate long term storage of digital evidence
C) To scrub a hard disc drive of sensitive information before being disposed of after an investigation
D) To prevent an electronic device from being accessed and augmented remotely
A) To hold law enforcement field devices until they are ready to be used. Failure to properly secure such forensic devices may result in compromised evidence gathering capabilities
B) The long-term storage of ready-access memory to facilitate long term storage of digital evidence
C) To scrub a hard disc drive of sensitive information before being disposed of after an investigation
D) To prevent an electronic device from being accessed and augmented remotely
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
15
_______________ involves the collecting analysing and reporting on digital data in a way that is legally admissible.?
A) Digital forensics
B) Cyber forensics
C) Virtual forensics
D) Electronic forensics
A) Digital forensics
B) Cyber forensics
C) Virtual forensics
D) Electronic forensics
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
16
In 1998, the Clinton Administration created this organization which was tasked with the management of internet domain names and IP addresses as well as promoting the operational stability of the internet.?
A) IWF
B) EFF
C) ACORN
D) ICANN
E) JTIC
A) IWF
B) EFF
C) ACORN
D) ICANN
E) JTIC
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
17
The Association of Sites Advocating Child Protection is an alliance of _______________.?
A) Pornographic content providers
B) Religious organizations
C) Victims-rights advocates
D) Internet service providers
E) Online civil liberties organizations
A) Pornographic content providers
B) Religious organizations
C) Victims-rights advocates
D) Internet service providers
E) Online civil liberties organizations
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck