Deck 18: Cybercrime and Cyberdeviance

Full screen (f)
exit full mode
Question
What would be the intent if one were to engage in a distributed denial-of-service attack (DDoS)?

A) to destroy a hard disk so that it can no longer be sold
B) to infiltrate and sabotage a host server
C) to enable the police to read an IP address
D) to send a blast of bulk messaging
Use Space or
up arrow
down arrow
to flip the card.
Question
What important theoretical school of thought doesChapter 18 state should be applied to determine where the line between crime and deviance is drawn in online communities?

A) the consensus model of crime
B) the conflict model of crime
C) symbolic interactionism
D) rational choice theory
Question
What was the identity of the market embedded in Darknet where bitcoin could purchase murder for hire?

A) Deep Realm
B) Dread Villa
C) Rave Ridge
D) Silk Road
Question
What is the role of cybercrime units within police services in Canada?

A) they are responsible taking the lead on all new crimes
B) this has not been clearly defined in most police agencies
C) there are no such units established yet
D) they are strictly responsible for luring potential offenders
Question
Which of the following would be considered a cyberactivity?

A) browsing through a computer store
B) telling the time with a smartphone
C) emailing someone from a tablet
D) watching television at home
Question
Which of the following terms refers to the use of a network-enabled device to repeatedly make unwanted contact with a person (through emails,text messages,etc.)knowing that this behaviour is likely to cause fear or annoyance?

A) stalking
B) luring
C) spamming
D) trafficking
Question
Which of the following statements best reflects the findings with regard to electronic victimization among adolescents?

A) Text messaging is the technology that is most vulnerable to cybercrimes.
B) Adolescents are the demographic group most frequently targeted by cybercriminals.
C) The architecture of text messaging through mobile devices makes it inherently criminogenic.
D) Access to social media platforms on mobile devices has consolidated primary methods of cyberbullying.
Question
Which of the following individuals is the most likely to be a victim of cybercrime?

A) a 35-year-old lesbian
B) a 20-year-old gay man
C) a 10-year-old heterosexual female
D) a 55-year-old heterosexual man
Question
Which of the following can best be described as hacking?

A) the use of software and hardware to steal data (usually related to credit cards)by intercepting e-transmissions,which then enable the cloning or counterfeiting of specific financial instruments (credit cards,bank cards,etc.)for the purposes of theft and fraud
B) the use of specially designed software to download original material from a protected media source (e.g.,online movie)to a hard disk,for the purposes of resale or redistribution
C) using an Internet connection to access social media,chat rooms,or other places of electronic assembly to make contact with a child or person under 16 to meet for sexual purposes
D) the attempt to remotely circumvent the security or privacy measures of an Internet website for the purposes of either stealing information or other malicious actions against the owner of the website
Question
Which of the following can best be described as spamming?

A) sending unsolicited and unwanted bulk email messages to other users
B) using software and hardware to steal data by intercepting e-transmissions
C) sending an email supposedly from a bank requesting information on the target's bank account
D) attempting to remotely circumvent the security or privacy measures of an Internet website
Question
Which of the following can best be described as ripping?

A) the use of a network-enabled device to repeatedly make unwanted contact with a person using any number of means (emails,text messages,etc.),and doing so knowing that this behaviour is likely to cause fear or annoyance
B) the use of specially designed software to download original material from a protected media source (e.g.,online movie)to a hard disk,for the purposes of resale or redistribution
C) the attempt to remotely circumvent the security or privacy measures of an Internet website for the purposes of either stealing information or other malicious actions against the owner of the website
D) sending unsolicited and unwanted bulk email messages to other users
Question
Which of the following terms refer to the use of misleading email supposedly from a bank requesting sensitive personal information or password data with the intention of compromising the victim's banking or credit accounts?

A) ripping
B) phishing
C) hacking
D) luring
Question
According to the text,what is the primary difference between cybercrime and cyberterrorism?

A) cybercrime targets individuals and cyberterrorism impacts national security
B) cybercrime involves single offenders and cyberterrorism includes multiple offenders
C) the penalties for cyberterrorism are much less than those for cybercrime
D) the two terms are interchangeable and there is no difference between them
Question
Which of the following is the primary focus of police cybercrime units?

A) exploitation of children
B) trafficking of controlled substances
C) spamming of pornography
D) identity theft
Question
Which of the following terms refer to the use of an Internet connection to access social media,chat rooms,or other places of electronic assembly to make contact with a child or person under 16 to meet for sexual purposes?

A) stalking
B) luring
C) spamming
D) trafficking
Question
Within the context of cybercrime,which of the following best reflects the term "technological determinism"?

A) the need to examine computer technologies as being inherently deterministic
B) the need to examine computer technologies as being inherently criminogenic
C) the need to examine computer users as inherently technologically deterministic
D) the need to examine computer criminals as inherently criminogenic
Question
What is the name applied to a parallel Internet that exists beneath the surface of conventional browsers,features sites not indexed by search engines,is unregulated,and is rife with criminal activity and illegal transactions?

A) deep threat
B) deep throat
C) deep web
D) deep sea
Question
Which of the following does not represent a critical infrastructure site that would be subject to a cyberterrorist attack?

A) water treatment facility
B) nuclear power plant
C) an airport
D) a major sports stadium
Question
Which of the following crosses the lines of cyberterrorism and cybercrime and could be part of either or both?

A) erotomania
B) deep web
C) cyberbullying
D) ransomware
Question
Which of the following terms refer to the use of software and hardware to steal data (usually related to credit cards)by intercepting e-transmissions,which then enable the cloning or counterfeiting of specific financial instruments (credit cards,bank cards,etc.)for the purposes of theft and fraud?

A) luring
B) hacking
C) skimming
D) phishing
Question
According to the text,how has routine activities theory been applied to risk of victimization by online predators?

A) Online predators and their victims usually know each other well.
B) Those who work long hours are at lower risk of victimization because they use social media less.
C) Individuals with low self-esteem tend to have fewer privacy settings in place and are easier targets for online predators.
D) Online predators tend to target those who use more than four social media sites.
Question
Ripping is the use of specially designed software to download original material from a protected media source (e.g.,online movie)to a hard disk,for the purposes of resale or redistribution.
Question
According to the textbook,we need to step outside criminology to better understand cyberbullying and motives of online offenders.Why do we need to step outside of criminology?

A) to draw from terminologies used in other relevant fields,such as digital media and communications
B) to draw from legal terminologies concerning cybercriminality
C) to draw from more psychologically-based terminologies regarding criminal offending
D) to draw from more sociologically-based theories of criminality
Question
As of 2015,all police services in Canada had established clear approaches to cybercrime.
Question
What is the name of the activity that involves a group of Internet users all sending harassing messages to a single person?

A) e-harrassment
B) group think
C) online stalking
D) cybermobbing
Question
Cyberactivities are those that involve a number of activities involving the Internet.
Question
What is thought to be the best legal response to cybercrimes?

A) create a public task force to investigate incidents
B) use existing laws to address the criminal behaviours
C) hire more police officers
D) infiltrate gangs responsible for most cybercrimes
Question
Who was pleased when the Bill to increase police powers to conduct online surveillance was scrapped?

A) the federal Privacy Commissioner
B) no one
C) the Canadian Police Chiefs
D) the Canadian Ombudsman
Question
Which of the following best represents a goal of applying routine activity theory to cybercrimes?

A) to better understand guardianship that protects potential online victims
B) to better understand the paths and nodes used by offenders online
C) to better understand the rational decision making process of online offenders
D) to better understand the social environment of cyberoffenders and how this contributes to their criminal offending
Question
Which of the following statements is true with regard to cyberbullying?

A) It carries a penalty of up to one year in jail.
B) It is punishable by a fine only.
C) It is deviant but not criminal.
D) It is an indictable offence.
Question
Within the context of exhibitionism,exposing one's body in an explicit or suggestive fashion in the physical (offline)world is similar to what in the digital (online)world?

A) cyberstalking
B) sexting
C) Internet trolling
D) cyberbullying
Question
Hayward (2012)has noted that the Internet has broken down traditional barriers between life stages bringing about online collisions between groups of people with different value systems.Which of the following scenarios best reflects this statement?

A) an adult pedophile posing as a 10-year-old girl looking to meet new friends in a pop singer's fan club chat room
B) email spam attempting to sell shares in a non-existent company
C) the hacking of an online bank to steal the passwords of customers
D) the hacking of a website of a nuclear facility
Question
Which of the following statements is true in the context of how best to ensure the Internet is a safe place for Canadian users that is not used for criminal purposes?

A) There is little debate anymore about how to balance privacy with public safety in a digital world.
B) Canadians remain conflicted in their opinions regarding the role of the police and lawmakers in regulating online behaviour.
C) Canadians are united in their opinion that the government should give police sweeping powers to regulate online behaviour.
D) The future of guardianship on the Internet is easy to predict.
Question
Phishing is when a fraudster sends an email supposedly from a bank requesting information on the target's bank account,including the password,with the intention of stealing money from that account.
Question
To better understand online victimization,the textbook argues that research on cyberbullying and cybervictimology must include an assessment of risk.Which of the following best represents the focus of such a risk assessment?

A) Computers might be classified according to a continuum of risk tolerance,ranging from infrequent use to frequent use.
B) Victims might be classified according to a continuum of risk tolerance,ranging from infrequent users to frequent users whose communications occur in or near real-time.
C) Offenders might be classified according to a continuum of risk tolerance,ranging from infrequent use to frequent use of the Internet.
D) Websites might be classified according to a continuum of risk tolerance,ranging from those visited infrequently to those visited frequently.
Question
In what way are online predators like a bully who waits beside the path that a target usually takes to get home?

A) They spend a great deal of time watching people and become experts at remembering small details.
B) They wait for online users to take risk with privacy protections that make them vulnerable.
C) They are older and usually unemployed.
D) They are often caught long after their first offence.
Question
Online "creeping" of a target's social media and sending anonymous messages or setting up fake accounts to track the target is similar to behaviours that are part of which paraphilia in the physical (offline)world?

A) erotomania
B) sexting
C) exhibitionism
D) scatologia
Question
What question is noted in the text as important in considering approaches to minimizing online victimization?

A) Can we go back to simpler times?
B) How is this happening?
C) What should the police do?
D) Who should be the guardians?
Question
What is the relationship between cyberdeviance and paraphilias?

A) Cyberdeviance has not been studied enough to know of such relationships.
B) Paraphilias are more difficult to prove online than offline.
C) Paraphilias are not usually found to be linked to online crimes.
D) Cyberdeviance often involves one or more traditional offline paraphilias.
Question
Cyberbullying Reporter applied critical discourse analysis and corpus linguistics to aggressive or antisocial online exchanges.What was the purpose of this exercise?

A) to identify individuals involved in cybercrime
B) to identify the type of techniques used to commit cybercrimes
C) to identify the frequency of different cybercrimes
D) to identify a common bullying and harassment vocabulary
Question
Luring is when someone uses an Internet connection to access social media,chat rooms,or other places of electronic assembly to make contact with a child or person under 16 to meet for sexual purposes.
Question
Unlike corporations and American government agencies,Canadian government agencies have thus far avoided cyberattacks.
Question
Cyberdeviance rarely encompasses one or more of the traditional offline paraphilias.
Question
Skimming is an attempt to remotely circumvent the security or privacy measures of a website for the purposes of either stealing information or other malicious actions against the owner of the website.
Question
Cyberterrorism refers to the use a computer to orchestrate large-scale "attacks on information," including government or critical infrastructure servers or any database of interest to national security.
Question
Technological changes drive changes in culture according to the theory of technological determinism.
Question
Most Canadians prefer privacy to law enforcement intrusion into their digital lives.
Question
Frequency of digital communications use is a strong predictor of risk of victimization.
Question
The application of routine activity theory to cybercrimes and cyberdeviance reveals that the future of guardianship on the Internet is difficult to predict.
Question
"Soft targets" are those that are weak or vulnerable to cybercriminals.
Question
Cyberbullying is one of the most well reported crimes.
Question
Scatologia is an out dated paraphilic disorder that has not continued with the introduction of technology.
Question
Paraphilias are not easily translated into cybercrimes.
Question
The Lori Drew case clearly outlined the fact that cyberbullying is not a cybercrime.
Question
Cyberterrorist generally focus on attacking human targets rather than institutional targets.
Question
Hacking is the use of software and hardware to steal data (usually related to credit cards)by intercepting e-transmissions,which then enable the cloning or counterfeiting of specific financial instruments (credit cards,bank cards,etc.)for the purposes of theft and fraud.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/56
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 18: Cybercrime and Cyberdeviance
1
What would be the intent if one were to engage in a distributed denial-of-service attack (DDoS)?

A) to destroy a hard disk so that it can no longer be sold
B) to infiltrate and sabotage a host server
C) to enable the police to read an IP address
D) to send a blast of bulk messaging
B
2
What important theoretical school of thought doesChapter 18 state should be applied to determine where the line between crime and deviance is drawn in online communities?

A) the consensus model of crime
B) the conflict model of crime
C) symbolic interactionism
D) rational choice theory
A
3
What was the identity of the market embedded in Darknet where bitcoin could purchase murder for hire?

A) Deep Realm
B) Dread Villa
C) Rave Ridge
D) Silk Road
D
4
What is the role of cybercrime units within police services in Canada?

A) they are responsible taking the lead on all new crimes
B) this has not been clearly defined in most police agencies
C) there are no such units established yet
D) they are strictly responsible for luring potential offenders
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following would be considered a cyberactivity?

A) browsing through a computer store
B) telling the time with a smartphone
C) emailing someone from a tablet
D) watching television at home
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following terms refers to the use of a network-enabled device to repeatedly make unwanted contact with a person (through emails,text messages,etc.)knowing that this behaviour is likely to cause fear or annoyance?

A) stalking
B) luring
C) spamming
D) trafficking
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following statements best reflects the findings with regard to electronic victimization among adolescents?

A) Text messaging is the technology that is most vulnerable to cybercrimes.
B) Adolescents are the demographic group most frequently targeted by cybercriminals.
C) The architecture of text messaging through mobile devices makes it inherently criminogenic.
D) Access to social media platforms on mobile devices has consolidated primary methods of cyberbullying.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following individuals is the most likely to be a victim of cybercrime?

A) a 35-year-old lesbian
B) a 20-year-old gay man
C) a 10-year-old heterosexual female
D) a 55-year-old heterosexual man
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following can best be described as hacking?

A) the use of software and hardware to steal data (usually related to credit cards)by intercepting e-transmissions,which then enable the cloning or counterfeiting of specific financial instruments (credit cards,bank cards,etc.)for the purposes of theft and fraud
B) the use of specially designed software to download original material from a protected media source (e.g.,online movie)to a hard disk,for the purposes of resale or redistribution
C) using an Internet connection to access social media,chat rooms,or other places of electronic assembly to make contact with a child or person under 16 to meet for sexual purposes
D) the attempt to remotely circumvent the security or privacy measures of an Internet website for the purposes of either stealing information or other malicious actions against the owner of the website
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following can best be described as spamming?

A) sending unsolicited and unwanted bulk email messages to other users
B) using software and hardware to steal data by intercepting e-transmissions
C) sending an email supposedly from a bank requesting information on the target's bank account
D) attempting to remotely circumvent the security or privacy measures of an Internet website
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following can best be described as ripping?

A) the use of a network-enabled device to repeatedly make unwanted contact with a person using any number of means (emails,text messages,etc.),and doing so knowing that this behaviour is likely to cause fear or annoyance
B) the use of specially designed software to download original material from a protected media source (e.g.,online movie)to a hard disk,for the purposes of resale or redistribution
C) the attempt to remotely circumvent the security or privacy measures of an Internet website for the purposes of either stealing information or other malicious actions against the owner of the website
D) sending unsolicited and unwanted bulk email messages to other users
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following terms refer to the use of misleading email supposedly from a bank requesting sensitive personal information or password data with the intention of compromising the victim's banking or credit accounts?

A) ripping
B) phishing
C) hacking
D) luring
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
13
According to the text,what is the primary difference between cybercrime and cyberterrorism?

A) cybercrime targets individuals and cyberterrorism impacts national security
B) cybercrime involves single offenders and cyberterrorism includes multiple offenders
C) the penalties for cyberterrorism are much less than those for cybercrime
D) the two terms are interchangeable and there is no difference between them
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is the primary focus of police cybercrime units?

A) exploitation of children
B) trafficking of controlled substances
C) spamming of pornography
D) identity theft
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following terms refer to the use of an Internet connection to access social media,chat rooms,or other places of electronic assembly to make contact with a child or person under 16 to meet for sexual purposes?

A) stalking
B) luring
C) spamming
D) trafficking
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
16
Within the context of cybercrime,which of the following best reflects the term "technological determinism"?

A) the need to examine computer technologies as being inherently deterministic
B) the need to examine computer technologies as being inherently criminogenic
C) the need to examine computer users as inherently technologically deterministic
D) the need to examine computer criminals as inherently criminogenic
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
17
What is the name applied to a parallel Internet that exists beneath the surface of conventional browsers,features sites not indexed by search engines,is unregulated,and is rife with criminal activity and illegal transactions?

A) deep threat
B) deep throat
C) deep web
D) deep sea
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following does not represent a critical infrastructure site that would be subject to a cyberterrorist attack?

A) water treatment facility
B) nuclear power plant
C) an airport
D) a major sports stadium
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following crosses the lines of cyberterrorism and cybercrime and could be part of either or both?

A) erotomania
B) deep web
C) cyberbullying
D) ransomware
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following terms refer to the use of software and hardware to steal data (usually related to credit cards)by intercepting e-transmissions,which then enable the cloning or counterfeiting of specific financial instruments (credit cards,bank cards,etc.)for the purposes of theft and fraud?

A) luring
B) hacking
C) skimming
D) phishing
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
21
According to the text,how has routine activities theory been applied to risk of victimization by online predators?

A) Online predators and their victims usually know each other well.
B) Those who work long hours are at lower risk of victimization because they use social media less.
C) Individuals with low self-esteem tend to have fewer privacy settings in place and are easier targets for online predators.
D) Online predators tend to target those who use more than four social media sites.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
22
Ripping is the use of specially designed software to download original material from a protected media source (e.g.,online movie)to a hard disk,for the purposes of resale or redistribution.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
23
According to the textbook,we need to step outside criminology to better understand cyberbullying and motives of online offenders.Why do we need to step outside of criminology?

A) to draw from terminologies used in other relevant fields,such as digital media and communications
B) to draw from legal terminologies concerning cybercriminality
C) to draw from more psychologically-based terminologies regarding criminal offending
D) to draw from more sociologically-based theories of criminality
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
24
As of 2015,all police services in Canada had established clear approaches to cybercrime.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
25
What is the name of the activity that involves a group of Internet users all sending harassing messages to a single person?

A) e-harrassment
B) group think
C) online stalking
D) cybermobbing
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
26
Cyberactivities are those that involve a number of activities involving the Internet.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
27
What is thought to be the best legal response to cybercrimes?

A) create a public task force to investigate incidents
B) use existing laws to address the criminal behaviours
C) hire more police officers
D) infiltrate gangs responsible for most cybercrimes
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
28
Who was pleased when the Bill to increase police powers to conduct online surveillance was scrapped?

A) the federal Privacy Commissioner
B) no one
C) the Canadian Police Chiefs
D) the Canadian Ombudsman
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following best represents a goal of applying routine activity theory to cybercrimes?

A) to better understand guardianship that protects potential online victims
B) to better understand the paths and nodes used by offenders online
C) to better understand the rational decision making process of online offenders
D) to better understand the social environment of cyberoffenders and how this contributes to their criminal offending
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following statements is true with regard to cyberbullying?

A) It carries a penalty of up to one year in jail.
B) It is punishable by a fine only.
C) It is deviant but not criminal.
D) It is an indictable offence.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
31
Within the context of exhibitionism,exposing one's body in an explicit or suggestive fashion in the physical (offline)world is similar to what in the digital (online)world?

A) cyberstalking
B) sexting
C) Internet trolling
D) cyberbullying
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
32
Hayward (2012)has noted that the Internet has broken down traditional barriers between life stages bringing about online collisions between groups of people with different value systems.Which of the following scenarios best reflects this statement?

A) an adult pedophile posing as a 10-year-old girl looking to meet new friends in a pop singer's fan club chat room
B) email spam attempting to sell shares in a non-existent company
C) the hacking of an online bank to steal the passwords of customers
D) the hacking of a website of a nuclear facility
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following statements is true in the context of how best to ensure the Internet is a safe place for Canadian users that is not used for criminal purposes?

A) There is little debate anymore about how to balance privacy with public safety in a digital world.
B) Canadians remain conflicted in their opinions regarding the role of the police and lawmakers in regulating online behaviour.
C) Canadians are united in their opinion that the government should give police sweeping powers to regulate online behaviour.
D) The future of guardianship on the Internet is easy to predict.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
34
Phishing is when a fraudster sends an email supposedly from a bank requesting information on the target's bank account,including the password,with the intention of stealing money from that account.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
35
To better understand online victimization,the textbook argues that research on cyberbullying and cybervictimology must include an assessment of risk.Which of the following best represents the focus of such a risk assessment?

A) Computers might be classified according to a continuum of risk tolerance,ranging from infrequent use to frequent use.
B) Victims might be classified according to a continuum of risk tolerance,ranging from infrequent users to frequent users whose communications occur in or near real-time.
C) Offenders might be classified according to a continuum of risk tolerance,ranging from infrequent use to frequent use of the Internet.
D) Websites might be classified according to a continuum of risk tolerance,ranging from those visited infrequently to those visited frequently.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
36
In what way are online predators like a bully who waits beside the path that a target usually takes to get home?

A) They spend a great deal of time watching people and become experts at remembering small details.
B) They wait for online users to take risk with privacy protections that make them vulnerable.
C) They are older and usually unemployed.
D) They are often caught long after their first offence.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
37
Online "creeping" of a target's social media and sending anonymous messages or setting up fake accounts to track the target is similar to behaviours that are part of which paraphilia in the physical (offline)world?

A) erotomania
B) sexting
C) exhibitionism
D) scatologia
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
38
What question is noted in the text as important in considering approaches to minimizing online victimization?

A) Can we go back to simpler times?
B) How is this happening?
C) What should the police do?
D) Who should be the guardians?
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
39
What is the relationship between cyberdeviance and paraphilias?

A) Cyberdeviance has not been studied enough to know of such relationships.
B) Paraphilias are more difficult to prove online than offline.
C) Paraphilias are not usually found to be linked to online crimes.
D) Cyberdeviance often involves one or more traditional offline paraphilias.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
40
Cyberbullying Reporter applied critical discourse analysis and corpus linguistics to aggressive or antisocial online exchanges.What was the purpose of this exercise?

A) to identify individuals involved in cybercrime
B) to identify the type of techniques used to commit cybercrimes
C) to identify the frequency of different cybercrimes
D) to identify a common bullying and harassment vocabulary
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
41
Luring is when someone uses an Internet connection to access social media,chat rooms,or other places of electronic assembly to make contact with a child or person under 16 to meet for sexual purposes.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
42
Unlike corporations and American government agencies,Canadian government agencies have thus far avoided cyberattacks.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
43
Cyberdeviance rarely encompasses one or more of the traditional offline paraphilias.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
44
Skimming is an attempt to remotely circumvent the security or privacy measures of a website for the purposes of either stealing information or other malicious actions against the owner of the website.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
45
Cyberterrorism refers to the use a computer to orchestrate large-scale "attacks on information," including government or critical infrastructure servers or any database of interest to national security.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
46
Technological changes drive changes in culture according to the theory of technological determinism.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
47
Most Canadians prefer privacy to law enforcement intrusion into their digital lives.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
48
Frequency of digital communications use is a strong predictor of risk of victimization.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
49
The application of routine activity theory to cybercrimes and cyberdeviance reveals that the future of guardianship on the Internet is difficult to predict.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
50
"Soft targets" are those that are weak or vulnerable to cybercriminals.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
51
Cyberbullying is one of the most well reported crimes.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
52
Scatologia is an out dated paraphilic disorder that has not continued with the introduction of technology.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
53
Paraphilias are not easily translated into cybercrimes.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
54
The Lori Drew case clearly outlined the fact that cyberbullying is not a cybercrime.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
55
Cyberterrorist generally focus on attacking human targets rather than institutional targets.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
56
Hacking is the use of software and hardware to steal data (usually related to credit cards)by intercepting e-transmissions,which then enable the cloning or counterfeiting of specific financial instruments (credit cards,bank cards,etc.)for the purposes of theft and fraud.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 56 flashcards in this deck.