Deck 15: Violent Economic Crime, Cybercrime, and Crimes of Intimidation

Full screen (f)
exit full mode
Question
Persistent,youthful firesetters tend to exhibit all of the following except

A) hyperactivity.
B) impulsiveness.
C) cruelty to animals
D) violence outside of firesetting.
Use Space or
up arrow
down arrow
to flip the card.
Question
Research on repetitive arsonists has concluded that this behavior is associated with

A) poverty.
B) psychological problems.
C) caregiving.
D) sexual deviations.
Question
The primary motive for juvenile arsons appears to be

A) parental revenge.
B) crime concealment.
C) financial gain.
D) vandalism.
E) fame.
Question
It is generally acknowledged that approximately ________ percent of the fires set by juveniles are reported.

A) 10
B) 20
C) 25
D) 30
Question
Which type of robbery occurs in urban areas and is less likely to be planned?

A) Commercial robbery
B) Bank robbery
C) Street robbery
D) Amateur robbery
Question
Research by Wright et al.(2006)found that all of the following are characteristics of American street culture except

A) hedonistic pursuit of sensory stimulation.
B) disdain for conventional living.
C) future orientation.
D) image and status.
Question
A major difference between robbery and other property crime is that

A) robbery involves direct contact with a victim.
B) robbers are less likely to be apprehended.
C) robbers are more likely to rationalize their behavior.
D) on average, robbery brings in more money for the offender.
Question
In hostage-taking situations,those hostages who,after release,have considerable difficulty dealing with the after-effects of the incident are called

A) survivors.
B) pseudo-victims.
C) masked depressed survivors.
D) succumbers.
Question
Which pattern of firesetting is often linked to the cover-up of other crimes?

A) Instrumental-object pattern
B) Expressive-object pattern
C) Intentional-expressive pattern
D) Expressive-person pattern
Question
A hostage is most likely to survive a hostage situation if she

A) plays the subordinate role and not attract attention to oneself.
B) attempts to reason with the hostage takers.
C) becomes assertive and argumentative.
D) pleads for mercy.
Question
In dealing with a barricade situation,which of the following is not recommended to hostage negotiators?

A) Denying the hostage taker's desired excitement or stimulation
B) Calm handling
C) Threatening to involve the hostage-taker's family in negotiations
D) Providing minimum media attention
Question
What are the two favored targets for robbery?

A) Resorts and banks
B) Universities and malls
C) Fast-food restaurants and convenience stores
D) Convenience stores and liquor stores
Question
The backgrounds of persistent firesetters reveal that they were often

A) the target of punishment where fire was used as the painful stimulus.
B) from families with alcoholic parents.
C) sexually abused.
D) the youngest child in a family of at least four children.
Question
Refusal by hostages to do what captors expect during a hostage situation is called

A) Stockholm syndrome.
B) Markov syndrome.
C) Paris syndrome.
D) London syndrome.
Question
According to Miron and Goldstein's typology of hostage-taking offenses,a hostage taker who kidnaps a child and holds the child for ransom is demonstrating

A) instrumental conduct.
B) expressive aphasia.
C) receptive conduct.
D) expressive conduct.
Question
All of the following are categories of hostage takers except

A) prisoners.
B) criminals.
C) politicals.
D) terrorists.
Question
Which type of stalker does not seek a personal relationship with their targets?

A) Love obsession
B) Possessive
C) Vengeance
D) Erotomania
Question
The primary motive for adult arsons appears to be

A) revenge.
B) crime concealment.
C) financial gain.
D) vandalism.
Question
In order for the Stockholm syndrome to occur all of the following must occur except

A) the hostage must somehow resist the hostage taker.
B) the hostage must be in direct social contact during the incident.
C) the hostage taker must treat the hostages kindly.
D) the hostage taker and victim must be together for a significant length of time.
Question
A serious mental disorder characterized by abnormal fascination with fire is called

A) firesetting.
B) arson obsession.
C) anhedonia.
D) pyromania.
Question
Which of the following is one of the developmental stages of persistent firesetting outlined by Gaynor (1996)?

A) Extinction
B) Arson obsession
C) Fireplay
D) Pyromania
Question
This category of stalking accounts for the majority of stalking and is illustrated by the comment,"If I can't have you,nobody will."

A) Possessive stalking
B) Vengeance stalking
C) Love obsession stalking
D) Simple obsession stalking
Question
The most frequent and identifiable motive for arson is financial gain.
Question
The fastest growing computer crime is

A) theft.
B) hacking.
C) fraud.
D) cyberbullying.
E) theft.
Question
Cyberbullying is not considered a form of cybercrime.
Question
The FBI's Uniform Crime Reports considers arson a violent crime.
Question
Doris Hall (1998)reports that the experience of being stalked for an extended period of time is akin to

A) mind-game playing.
B) bullying.
C) rape.
D) psychological terrorism.
Question
Which of the following is an example of a commercial house?

A) An apartment
B) A school
C) A church
D) A supermarket
Question
The impetus for California's 1990 antistalking legislation was

A) the stalking of Steven Spielberg's seven children.
B) the murder of actress Rebecca Schaeffer.
C) the stalking and homicide of two government officials.
D) the murders of four Orange County women who were killed despite restraining orders against their assailants.
Question
Research suggests hostage-taking incidents are rarely perpetrated by mentally disordered individuals.
Question
A robbery in which the main weapon used is one's own body rather than guns,knives,or other weapons is called ________ robbery.

A) street
B) strong-arm
C) kinesthetic
D) tertiary
Question
Most bank robberies are carried out by a single offender.
Question
At which age range is fascination with fire typical?

A) Between ages 1 and 3
B) Between ages 5 and 7
C) Between ages 10 and 12
D) Between ages 13 and 15
Question
Cyberstalking is considered a crime of

A) intimidation.
B) passion.
C) opportunity.
D) communication.
Question
Both criminal and prisoner hostage-taking situations are instrumental in nature.
Question
A relatively new phenomenon in which students send via email harmful,threatening,or cruel text to another students is specifically called internet fraud.
Question
The Stockholm syndrome is a rare occurrence.
Question
Next to deaths caused by motor vehicle accidents,fires are the leading cause of death among young children.
Question
From a psychological perspective,many arsonists have no intention of harming people.
Question
Current research has revealed that a large portion of the persistent firesetters are boys at a ratio of ________ to 1 to girls.

A) 2
B) 3
C) 5
D) 9
Question
Amateur bank robbers are highly ________ in their behavioral patterns.
Question
Some people who cyberstalk or cyberbully may be more inclined to act in a deviant manner because of the ________ that the Internet provides.
Question
The ________ hostage taker is considered the most frequent and the most dangerous type.
Question
Compare and contrast juvenile firesetters and adult arsonists.Include research on female arsonists.
Question
Less than 10 percent of fires set by ________ is reported.
Question
Choose any three crimes covered in this chapter and discuss them from the perspective of the psychological effects on the victims.
Question
Explain the motivations and situational dynamics behind street robbery.
Question
Although convenience stores have traditionally been a favorite robbery site,________ restaurants are now becoming a preferred target.
Question
Compare and contrast cyberstalking and cyberbullying.How do you think these crimes differ from bullying and stalking?
Question
The UCR considers arson a ________ crime.
Question
Cybercrime refers to any illegal act that involves a(n)________ system.
Question
Define Stockholm Syndrome and London Syndrome.Provide examples of each.
Question
The primary object of banks during a robbery is to ensure the ________ of employers and customers.
Question
Both the number of robberies reported to police and the robbery rate have ________ in recent years.
Question
It is likely that cybercriminals employ the same techniques of ________ as are employed by other offenders,particularly white collar criminals.
Question
Match between columns
Hacking
Robbery situations in which the group of offenders attempts to control their victims
Hacking
Sending or posting harmful or cruel text or images using the Internet or other digital communication devices
Hacking
Threatening or harassing email messages,instant messages,or blog entries,or websites dedicated solely to tormenting an individual
Hacking
Hostages who did not survive the ordeal,or upon rescue have difficulty dealing with the emotional trauma caused by the event
Hacking
An irresistible urge or passion to set fires along with an intense fascination with flames
Hacking
The stalker tries to elicit a particular response or change of behavior from the victim
Hacking
The stalker seeks power and control after a failed relationship with the victim
Hacking
Robbery without a weapon
Hacking
Unauthorized access to computers
Hacking
Any willful or malicious burning or attempt to burn,with or without intent to defraud,a dwelling house,public building,motor vehicle or aircraft,personal property of another
Pyromania
Robbery situations in which the group of offenders attempts to control their victims
Pyromania
Sending or posting harmful or cruel text or images using the Internet or other digital communication devices
Pyromania
Threatening or harassing email messages,instant messages,or blog entries,or websites dedicated solely to tormenting an individual
Pyromania
Hostages who did not survive the ordeal,or upon rescue have difficulty dealing with the emotional trauma caused by the event
Pyromania
An irresistible urge or passion to set fires along with an intense fascination with flames
Pyromania
The stalker tries to elicit a particular response or change of behavior from the victim
Pyromania
The stalker seeks power and control after a failed relationship with the victim
Pyromania
Robbery without a weapon
Pyromania
Unauthorized access to computers
Pyromania
Any willful or malicious burning or attempt to burn,with or without intent to defraud,a dwelling house,public building,motor vehicle or aircraft,personal property of another
Strong-arm robbery
Robbery situations in which the group of offenders attempts to control their victims
Strong-arm robbery
Sending or posting harmful or cruel text or images using the Internet or other digital communication devices
Strong-arm robbery
Threatening or harassing email messages,instant messages,or blog entries,or websites dedicated solely to tormenting an individual
Strong-arm robbery
Hostages who did not survive the ordeal,or upon rescue have difficulty dealing with the emotional trauma caused by the event
Strong-arm robbery
An irresistible urge or passion to set fires along with an intense fascination with flames
Strong-arm robbery
The stalker tries to elicit a particular response or change of behavior from the victim
Strong-arm robbery
The stalker seeks power and control after a failed relationship with the victim
Strong-arm robbery
Robbery without a weapon
Strong-arm robbery
Unauthorized access to computers
Strong-arm robbery
Any willful or malicious burning or attempt to burn,with or without intent to defraud,a dwelling house,public building,motor vehicle or aircraft,personal property of another
Vengeance stalking
Robbery situations in which the group of offenders attempts to control their victims
Vengeance stalking
Sending or posting harmful or cruel text or images using the Internet or other digital communication devices
Vengeance stalking
Threatening or harassing email messages,instant messages,or blog entries,or websites dedicated solely to tormenting an individual
Vengeance stalking
Hostages who did not survive the ordeal,or upon rescue have difficulty dealing with the emotional trauma caused by the event
Vengeance stalking
An irresistible urge or passion to set fires along with an intense fascination with flames
Vengeance stalking
The stalker tries to elicit a particular response or change of behavior from the victim
Vengeance stalking
The stalker seeks power and control after a failed relationship with the victim
Vengeance stalking
Robbery without a weapon
Vengeance stalking
Unauthorized access to computers
Vengeance stalking
Any willful or malicious burning or attempt to burn,with or without intent to defraud,a dwelling house,public building,motor vehicle or aircraft,personal property of another
Cyberharassment
Robbery situations in which the group of offenders attempts to control their victims
Cyberharassment
Sending or posting harmful or cruel text or images using the Internet or other digital communication devices
Cyberharassment
Threatening or harassing email messages,instant messages,or blog entries,or websites dedicated solely to tormenting an individual
Cyberharassment
Hostages who did not survive the ordeal,or upon rescue have difficulty dealing with the emotional trauma caused by the event
Cyberharassment
An irresistible urge or passion to set fires along with an intense fascination with flames
Cyberharassment
The stalker tries to elicit a particular response or change of behavior from the victim
Cyberharassment
The stalker seeks power and control after a failed relationship with the victim
Cyberharassment
Robbery without a weapon
Cyberharassment
Unauthorized access to computers
Cyberharassment
Any willful or malicious burning or attempt to burn,with or without intent to defraud,a dwelling house,public building,motor vehicle or aircraft,personal property of another
Simple obsession stalking
Robbery situations in which the group of offenders attempts to control their victims
Simple obsession stalking
Sending or posting harmful or cruel text or images using the Internet or other digital communication devices
Simple obsession stalking
Threatening or harassing email messages,instant messages,or blog entries,or websites dedicated solely to tormenting an individual
Simple obsession stalking
Hostages who did not survive the ordeal,or upon rescue have difficulty dealing with the emotional trauma caused by the event
Simple obsession stalking
An irresistible urge or passion to set fires along with an intense fascination with flames
Simple obsession stalking
The stalker tries to elicit a particular response or change of behavior from the victim
Simple obsession stalking
The stalker seeks power and control after a failed relationship with the victim
Simple obsession stalking
Robbery without a weapon
Simple obsession stalking
Unauthorized access to computers
Simple obsession stalking
Any willful or malicious burning or attempt to burn,with or without intent to defraud,a dwelling house,public building,motor vehicle or aircraft,personal property of another
Cyberbullying
Robbery situations in which the group of offenders attempts to control their victims
Cyberbullying
Sending or posting harmful or cruel text or images using the Internet or other digital communication devices
Cyberbullying
Threatening or harassing email messages,instant messages,or blog entries,or websites dedicated solely to tormenting an individual
Cyberbullying
Hostages who did not survive the ordeal,or upon rescue have difficulty dealing with the emotional trauma caused by the event
Cyberbullying
An irresistible urge or passion to set fires along with an intense fascination with flames
Cyberbullying
The stalker tries to elicit a particular response or change of behavior from the victim
Cyberbullying
The stalker seeks power and control after a failed relationship with the victim
Cyberbullying
Robbery without a weapon
Cyberbullying
Unauthorized access to computers
Cyberbullying
Any willful or malicious burning or attempt to burn,with or without intent to defraud,a dwelling house,public building,motor vehicle or aircraft,personal property of another
Dominance
Robbery situations in which the group of offenders attempts to control their victims
Dominance
Sending or posting harmful or cruel text or images using the Internet or other digital communication devices
Dominance
Threatening or harassing email messages,instant messages,or blog entries,or websites dedicated solely to tormenting an individual
Dominance
Hostages who did not survive the ordeal,or upon rescue have difficulty dealing with the emotional trauma caused by the event
Dominance
An irresistible urge or passion to set fires along with an intense fascination with flames
Dominance
The stalker tries to elicit a particular response or change of behavior from the victim
Dominance
The stalker seeks power and control after a failed relationship with the victim
Dominance
Robbery without a weapon
Dominance
Unauthorized access to computers
Dominance
Any willful or malicious burning or attempt to burn,with or without intent to defraud,a dwelling house,public building,motor vehicle or aircraft,personal property of another
Arson
Robbery situations in which the group of offenders attempts to control their victims
Arson
Sending or posting harmful or cruel text or images using the Internet or other digital communication devices
Arson
Threatening or harassing email messages,instant messages,or blog entries,or websites dedicated solely to tormenting an individual
Arson
Hostages who did not survive the ordeal,or upon rescue have difficulty dealing with the emotional trauma caused by the event
Arson
An irresistible urge or passion to set fires along with an intense fascination with flames
Arson
The stalker tries to elicit a particular response or change of behavior from the victim
Arson
The stalker seeks power and control after a failed relationship with the victim
Arson
Robbery without a weapon
Arson
Unauthorized access to computers
Arson
Any willful or malicious burning or attempt to burn,with or without intent to defraud,a dwelling house,public building,motor vehicle or aircraft,personal property of another
Succumbers
Robbery situations in which the group of offenders attempts to control their victims
Succumbers
Sending or posting harmful or cruel text or images using the Internet or other digital communication devices
Succumbers
Threatening or harassing email messages,instant messages,or blog entries,or websites dedicated solely to tormenting an individual
Succumbers
Hostages who did not survive the ordeal,or upon rescue have difficulty dealing with the emotional trauma caused by the event
Succumbers
An irresistible urge or passion to set fires along with an intense fascination with flames
Succumbers
The stalker tries to elicit a particular response or change of behavior from the victim
Succumbers
The stalker seeks power and control after a failed relationship with the victim
Succumbers
Robbery without a weapon
Succumbers
Unauthorized access to computers
Succumbers
Any willful or malicious burning or attempt to burn,with or without intent to defraud,a dwelling house,public building,motor vehicle or aircraft,personal property of another
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/56
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: Violent Economic Crime, Cybercrime, and Crimes of Intimidation
1
Persistent,youthful firesetters tend to exhibit all of the following except

A) hyperactivity.
B) impulsiveness.
C) cruelty to animals
D) violence outside of firesetting.
D
2
Research on repetitive arsonists has concluded that this behavior is associated with

A) poverty.
B) psychological problems.
C) caregiving.
D) sexual deviations.
B
3
The primary motive for juvenile arsons appears to be

A) parental revenge.
B) crime concealment.
C) financial gain.
D) vandalism.
E) fame.
D
4
It is generally acknowledged that approximately ________ percent of the fires set by juveniles are reported.

A) 10
B) 20
C) 25
D) 30
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
5
Which type of robbery occurs in urban areas and is less likely to be planned?

A) Commercial robbery
B) Bank robbery
C) Street robbery
D) Amateur robbery
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
6
Research by Wright et al.(2006)found that all of the following are characteristics of American street culture except

A) hedonistic pursuit of sensory stimulation.
B) disdain for conventional living.
C) future orientation.
D) image and status.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
7
A major difference between robbery and other property crime is that

A) robbery involves direct contact with a victim.
B) robbers are less likely to be apprehended.
C) robbers are more likely to rationalize their behavior.
D) on average, robbery brings in more money for the offender.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
8
In hostage-taking situations,those hostages who,after release,have considerable difficulty dealing with the after-effects of the incident are called

A) survivors.
B) pseudo-victims.
C) masked depressed survivors.
D) succumbers.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
9
Which pattern of firesetting is often linked to the cover-up of other crimes?

A) Instrumental-object pattern
B) Expressive-object pattern
C) Intentional-expressive pattern
D) Expressive-person pattern
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
10
A hostage is most likely to survive a hostage situation if she

A) plays the subordinate role and not attract attention to oneself.
B) attempts to reason with the hostage takers.
C) becomes assertive and argumentative.
D) pleads for mercy.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
11
In dealing with a barricade situation,which of the following is not recommended to hostage negotiators?

A) Denying the hostage taker's desired excitement or stimulation
B) Calm handling
C) Threatening to involve the hostage-taker's family in negotiations
D) Providing minimum media attention
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
12
What are the two favored targets for robbery?

A) Resorts and banks
B) Universities and malls
C) Fast-food restaurants and convenience stores
D) Convenience stores and liquor stores
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
13
The backgrounds of persistent firesetters reveal that they were often

A) the target of punishment where fire was used as the painful stimulus.
B) from families with alcoholic parents.
C) sexually abused.
D) the youngest child in a family of at least four children.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
14
Refusal by hostages to do what captors expect during a hostage situation is called

A) Stockholm syndrome.
B) Markov syndrome.
C) Paris syndrome.
D) London syndrome.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
15
According to Miron and Goldstein's typology of hostage-taking offenses,a hostage taker who kidnaps a child and holds the child for ransom is demonstrating

A) instrumental conduct.
B) expressive aphasia.
C) receptive conduct.
D) expressive conduct.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
16
All of the following are categories of hostage takers except

A) prisoners.
B) criminals.
C) politicals.
D) terrorists.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
17
Which type of stalker does not seek a personal relationship with their targets?

A) Love obsession
B) Possessive
C) Vengeance
D) Erotomania
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
18
The primary motive for adult arsons appears to be

A) revenge.
B) crime concealment.
C) financial gain.
D) vandalism.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
19
In order for the Stockholm syndrome to occur all of the following must occur except

A) the hostage must somehow resist the hostage taker.
B) the hostage must be in direct social contact during the incident.
C) the hostage taker must treat the hostages kindly.
D) the hostage taker and victim must be together for a significant length of time.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
20
A serious mental disorder characterized by abnormal fascination with fire is called

A) firesetting.
B) arson obsession.
C) anhedonia.
D) pyromania.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is one of the developmental stages of persistent firesetting outlined by Gaynor (1996)?

A) Extinction
B) Arson obsession
C) Fireplay
D) Pyromania
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
22
This category of stalking accounts for the majority of stalking and is illustrated by the comment,"If I can't have you,nobody will."

A) Possessive stalking
B) Vengeance stalking
C) Love obsession stalking
D) Simple obsession stalking
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
23
The most frequent and identifiable motive for arson is financial gain.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
24
The fastest growing computer crime is

A) theft.
B) hacking.
C) fraud.
D) cyberbullying.
E) theft.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
25
Cyberbullying is not considered a form of cybercrime.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
26
The FBI's Uniform Crime Reports considers arson a violent crime.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
27
Doris Hall (1998)reports that the experience of being stalked for an extended period of time is akin to

A) mind-game playing.
B) bullying.
C) rape.
D) psychological terrorism.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is an example of a commercial house?

A) An apartment
B) A school
C) A church
D) A supermarket
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
29
The impetus for California's 1990 antistalking legislation was

A) the stalking of Steven Spielberg's seven children.
B) the murder of actress Rebecca Schaeffer.
C) the stalking and homicide of two government officials.
D) the murders of four Orange County women who were killed despite restraining orders against their assailants.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
30
Research suggests hostage-taking incidents are rarely perpetrated by mentally disordered individuals.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
31
A robbery in which the main weapon used is one's own body rather than guns,knives,or other weapons is called ________ robbery.

A) street
B) strong-arm
C) kinesthetic
D) tertiary
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
32
Most bank robberies are carried out by a single offender.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
33
At which age range is fascination with fire typical?

A) Between ages 1 and 3
B) Between ages 5 and 7
C) Between ages 10 and 12
D) Between ages 13 and 15
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
34
Cyberstalking is considered a crime of

A) intimidation.
B) passion.
C) opportunity.
D) communication.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
35
Both criminal and prisoner hostage-taking situations are instrumental in nature.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
36
A relatively new phenomenon in which students send via email harmful,threatening,or cruel text to another students is specifically called internet fraud.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
37
The Stockholm syndrome is a rare occurrence.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
38
Next to deaths caused by motor vehicle accidents,fires are the leading cause of death among young children.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
39
From a psychological perspective,many arsonists have no intention of harming people.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
40
Current research has revealed that a large portion of the persistent firesetters are boys at a ratio of ________ to 1 to girls.

A) 2
B) 3
C) 5
D) 9
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
41
Amateur bank robbers are highly ________ in their behavioral patterns.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
42
Some people who cyberstalk or cyberbully may be more inclined to act in a deviant manner because of the ________ that the Internet provides.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
43
The ________ hostage taker is considered the most frequent and the most dangerous type.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
44
Compare and contrast juvenile firesetters and adult arsonists.Include research on female arsonists.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
45
Less than 10 percent of fires set by ________ is reported.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
46
Choose any three crimes covered in this chapter and discuss them from the perspective of the psychological effects on the victims.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
47
Explain the motivations and situational dynamics behind street robbery.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
48
Although convenience stores have traditionally been a favorite robbery site,________ restaurants are now becoming a preferred target.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
49
Compare and contrast cyberstalking and cyberbullying.How do you think these crimes differ from bullying and stalking?
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
50
The UCR considers arson a ________ crime.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
51
Cybercrime refers to any illegal act that involves a(n)________ system.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
52
Define Stockholm Syndrome and London Syndrome.Provide examples of each.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
53
The primary object of banks during a robbery is to ensure the ________ of employers and customers.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
54
Both the number of robberies reported to police and the robbery rate have ________ in recent years.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
55
It is likely that cybercriminals employ the same techniques of ________ as are employed by other offenders,particularly white collar criminals.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
56
Match between columns
Hacking
Robbery situations in which the group of offenders attempts to control their victims
Hacking
Sending or posting harmful or cruel text or images using the Internet or other digital communication devices
Hacking
Threatening or harassing email messages,instant messages,or blog entries,or websites dedicated solely to tormenting an individual
Hacking
Hostages who did not survive the ordeal,or upon rescue have difficulty dealing with the emotional trauma caused by the event
Hacking
An irresistible urge or passion to set fires along with an intense fascination with flames
Hacking
The stalker tries to elicit a particular response or change of behavior from the victim
Hacking
The stalker seeks power and control after a failed relationship with the victim
Hacking
Robbery without a weapon
Hacking
Unauthorized access to computers
Hacking
Any willful or malicious burning or attempt to burn,with or without intent to defraud,a dwelling house,public building,motor vehicle or aircraft,personal property of another
Pyromania
Robbery situations in which the group of offenders attempts to control their victims
Pyromania
Sending or posting harmful or cruel text or images using the Internet or other digital communication devices
Pyromania
Threatening or harassing email messages,instant messages,or blog entries,or websites dedicated solely to tormenting an individual
Pyromania
Hostages who did not survive the ordeal,or upon rescue have difficulty dealing with the emotional trauma caused by the event
Pyromania
An irresistible urge or passion to set fires along with an intense fascination with flames
Pyromania
The stalker tries to elicit a particular response or change of behavior from the victim
Pyromania
The stalker seeks power and control after a failed relationship with the victim
Pyromania
Robbery without a weapon
Pyromania
Unauthorized access to computers
Pyromania
Any willful or malicious burning or attempt to burn,with or without intent to defraud,a dwelling house,public building,motor vehicle or aircraft,personal property of another
Strong-arm robbery
Robbery situations in which the group of offenders attempts to control their victims
Strong-arm robbery
Sending or posting harmful or cruel text or images using the Internet or other digital communication devices
Strong-arm robbery
Threatening or harassing email messages,instant messages,or blog entries,or websites dedicated solely to tormenting an individual
Strong-arm robbery
Hostages who did not survive the ordeal,or upon rescue have difficulty dealing with the emotional trauma caused by the event
Strong-arm robbery
An irresistible urge or passion to set fires along with an intense fascination with flames
Strong-arm robbery
The stalker tries to elicit a particular response or change of behavior from the victim
Strong-arm robbery
The stalker seeks power and control after a failed relationship with the victim
Strong-arm robbery
Robbery without a weapon
Strong-arm robbery
Unauthorized access to computers
Strong-arm robbery
Any willful or malicious burning or attempt to burn,with or without intent to defraud,a dwelling house,public building,motor vehicle or aircraft,personal property of another
Vengeance stalking
Robbery situations in which the group of offenders attempts to control their victims
Vengeance stalking
Sending or posting harmful or cruel text or images using the Internet or other digital communication devices
Vengeance stalking
Threatening or harassing email messages,instant messages,or blog entries,or websites dedicated solely to tormenting an individual
Vengeance stalking
Hostages who did not survive the ordeal,or upon rescue have difficulty dealing with the emotional trauma caused by the event
Vengeance stalking
An irresistible urge or passion to set fires along with an intense fascination with flames
Vengeance stalking
The stalker tries to elicit a particular response or change of behavior from the victim
Vengeance stalking
The stalker seeks power and control after a failed relationship with the victim
Vengeance stalking
Robbery without a weapon
Vengeance stalking
Unauthorized access to computers
Vengeance stalking
Any willful or malicious burning or attempt to burn,with or without intent to defraud,a dwelling house,public building,motor vehicle or aircraft,personal property of another
Cyberharassment
Robbery situations in which the group of offenders attempts to control their victims
Cyberharassment
Sending or posting harmful or cruel text or images using the Internet or other digital communication devices
Cyberharassment
Threatening or harassing email messages,instant messages,or blog entries,or websites dedicated solely to tormenting an individual
Cyberharassment
Hostages who did not survive the ordeal,or upon rescue have difficulty dealing with the emotional trauma caused by the event
Cyberharassment
An irresistible urge or passion to set fires along with an intense fascination with flames
Cyberharassment
The stalker tries to elicit a particular response or change of behavior from the victim
Cyberharassment
The stalker seeks power and control after a failed relationship with the victim
Cyberharassment
Robbery without a weapon
Cyberharassment
Unauthorized access to computers
Cyberharassment
Any willful or malicious burning or attempt to burn,with or without intent to defraud,a dwelling house,public building,motor vehicle or aircraft,personal property of another
Simple obsession stalking
Robbery situations in which the group of offenders attempts to control their victims
Simple obsession stalking
Sending or posting harmful or cruel text or images using the Internet or other digital communication devices
Simple obsession stalking
Threatening or harassing email messages,instant messages,or blog entries,or websites dedicated solely to tormenting an individual
Simple obsession stalking
Hostages who did not survive the ordeal,or upon rescue have difficulty dealing with the emotional trauma caused by the event
Simple obsession stalking
An irresistible urge or passion to set fires along with an intense fascination with flames
Simple obsession stalking
The stalker tries to elicit a particular response or change of behavior from the victim
Simple obsession stalking
The stalker seeks power and control after a failed relationship with the victim
Simple obsession stalking
Robbery without a weapon
Simple obsession stalking
Unauthorized access to computers
Simple obsession stalking
Any willful or malicious burning or attempt to burn,with or without intent to defraud,a dwelling house,public building,motor vehicle or aircraft,personal property of another
Cyberbullying
Robbery situations in which the group of offenders attempts to control their victims
Cyberbullying
Sending or posting harmful or cruel text or images using the Internet or other digital communication devices
Cyberbullying
Threatening or harassing email messages,instant messages,or blog entries,or websites dedicated solely to tormenting an individual
Cyberbullying
Hostages who did not survive the ordeal,or upon rescue have difficulty dealing with the emotional trauma caused by the event
Cyberbullying
An irresistible urge or passion to set fires along with an intense fascination with flames
Cyberbullying
The stalker tries to elicit a particular response or change of behavior from the victim
Cyberbullying
The stalker seeks power and control after a failed relationship with the victim
Cyberbullying
Robbery without a weapon
Cyberbullying
Unauthorized access to computers
Cyberbullying
Any willful or malicious burning or attempt to burn,with or without intent to defraud,a dwelling house,public building,motor vehicle or aircraft,personal property of another
Dominance
Robbery situations in which the group of offenders attempts to control their victims
Dominance
Sending or posting harmful or cruel text or images using the Internet or other digital communication devices
Dominance
Threatening or harassing email messages,instant messages,or blog entries,or websites dedicated solely to tormenting an individual
Dominance
Hostages who did not survive the ordeal,or upon rescue have difficulty dealing with the emotional trauma caused by the event
Dominance
An irresistible urge or passion to set fires along with an intense fascination with flames
Dominance
The stalker tries to elicit a particular response or change of behavior from the victim
Dominance
The stalker seeks power and control after a failed relationship with the victim
Dominance
Robbery without a weapon
Dominance
Unauthorized access to computers
Dominance
Any willful or malicious burning or attempt to burn,with or without intent to defraud,a dwelling house,public building,motor vehicle or aircraft,personal property of another
Arson
Robbery situations in which the group of offenders attempts to control their victims
Arson
Sending or posting harmful or cruel text or images using the Internet or other digital communication devices
Arson
Threatening or harassing email messages,instant messages,or blog entries,or websites dedicated solely to tormenting an individual
Arson
Hostages who did not survive the ordeal,or upon rescue have difficulty dealing with the emotional trauma caused by the event
Arson
An irresistible urge or passion to set fires along with an intense fascination with flames
Arson
The stalker tries to elicit a particular response or change of behavior from the victim
Arson
The stalker seeks power and control after a failed relationship with the victim
Arson
Robbery without a weapon
Arson
Unauthorized access to computers
Arson
Any willful or malicious burning or attempt to burn,with or without intent to defraud,a dwelling house,public building,motor vehicle or aircraft,personal property of another
Succumbers
Robbery situations in which the group of offenders attempts to control their victims
Succumbers
Sending or posting harmful or cruel text or images using the Internet or other digital communication devices
Succumbers
Threatening or harassing email messages,instant messages,or blog entries,or websites dedicated solely to tormenting an individual
Succumbers
Hostages who did not survive the ordeal,or upon rescue have difficulty dealing with the emotional trauma caused by the event
Succumbers
An irresistible urge or passion to set fires along with an intense fascination with flames
Succumbers
The stalker tries to elicit a particular response or change of behavior from the victim
Succumbers
The stalker seeks power and control after a failed relationship with the victim
Succumbers
Robbery without a weapon
Succumbers
Unauthorized access to computers
Succumbers
Any willful or malicious burning or attempt to burn,with or without intent to defraud,a dwelling house,public building,motor vehicle or aircraft,personal property of another
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 56 flashcards in this deck.