Deck 2: Researching and Theorizing Cybercrime
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
Play
Full screen (f)
Deck 2: Researching and Theorizing Cybercrime
1
This notion posits that human beings are willing to surrender some of their freedoms to be protected from those whose unfettered exercise of freedom harms others.?
A) Social contract theory
B) Cultural theory
C) Basic social theory
D) Environmental theory
A) Social contract theory
B) Cultural theory
C) Basic social theory
D) Environmental theory
A
2
Which of the following is not one of Beccaria's three components of effective punishment?
A) They should be swift in execution
B) The offender should be publicly scrutinized
C) Punishment should be sufficiently severe
D) The offender should be certain that punishment will occur
A) They should be swift in execution
B) The offender should be publicly scrutinized
C) Punishment should be sufficiently severe
D) The offender should be certain that punishment will occur
B
3
This theory assumes that offenders conduct cost-benefit analyses before conducting criminal behaviour.?
A) Social learning theory
B) Labelling theory
C) Social disorganization theory
D) Rational choice theory
A) Social learning theory
B) Labelling theory
C) Social disorganization theory
D) Rational choice theory
D
4
This theory credits the propensity to commit crime to intimate peer groups which encourage favourable definitions to crime.?
A) Social disorganization theory
B) Radical criminological theory
C) Differential association theory
D) General strain theory
A) Social disorganization theory
B) Radical criminological theory
C) Differential association theory
D) General strain theory
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
According to Merton (1938), which of the five adaptations of strain describe individuals who accept both the institutionally approved goals and means?
A) Conformists
B) Retreatist
C) Innovators
D) Ritualists
A) Conformists
B) Retreatist
C) Innovators
D) Ritualists
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
According to Merton (1938), which of the five adaptations of strain describe individuals who reject the culturally approved goals while accepting socially approved means to do so?
A) Rebels
B) Ritualists
C) Conformists
D) Innovators
A) Rebels
B) Ritualists
C) Conformists
D) Innovators
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
Sykes and Matza (1957) state that delinquents will provide justification for their behaviour before engaging in criminal activity in attempts to nullify dominant social controls. What do they call this phenomenon?
A) Techniques of neutralization
B) Neutralization theory
C) Delinquent drift
D) Containment theory
A) Techniques of neutralization
B) Neutralization theory
C) Delinquent drift
D) Containment theory
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
Gottfredson and Hirschi's (1990) general theory of crime states that crimes, simply put, are a product of _______________.?
A) low impulsivity
B) low intelligence
C) low self-control
D) low self-esteem
A) low impulsivity
B) low intelligence
C) low self-control
D) low self-esteem
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
Edwin Lemert (1951) described the process through which a person could be so intensely stigmatized that their future behaviour was driven toward deviance. What did he call this?
A) The "dramatization of evil"
B) Primary deviance
C) Secondary deviance
D) Societal rationalization
A) The "dramatization of evil"
B) Primary deviance
C) Secondary deviance
D) Societal rationalization
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is not an area of life which Steffensmeier and Allan (1996) state inhibit female crime while encouraging male crime?
A) Sexuality
B) Physical strength and aggression
C) Gender norms
D) Media influences
A) Sexuality
B) Physical strength and aggression
C) Gender norms
D) Media influences
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
Miller (2002) views crime as a result of gendered _______________.?
A) biology
B) performances
C) history
D) psychology
A) biology
B) performances
C) history
D) psychology
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
What was the 'GamerGate' fiasco?
A) A conspiracy theory detailing how video game developers remove content from games in development only to sell it later as 'downloadable content'
B) An event where hackers claimed to have successfully penetrated a video game company and began to 'leak' information of a game that was being released
C) A cyberharassment campaign carried out against a female video game developer
D) A high-profile case where the CEO of a video game company was cyberstalked for months
A) A conspiracy theory detailing how video game developers remove content from games in development only to sell it later as 'downloadable content'
B) An event where hackers claimed to have successfully penetrated a video game company and began to 'leak' information of a game that was being released
C) A cyberharassment campaign carried out against a female video game developer
D) A high-profile case where the CEO of a video game company was cyberstalked for months
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is not one of Robert Agnew's three sources of strain?
A) Failure to achieve positively valued stimuli
B) Removal of negating stimuli
C) Removal of positively valued stimuli
D) Presentation of negative stimuli
A) Failure to achieve positively valued stimuli
B) Removal of negating stimuli
C) Removal of positively valued stimuli
D) Presentation of negative stimuli
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
According to Goldsmith and Brewer (2015), the internet is said to present an interactive environment that empowers individuals through anonymity, provides a cornucopia of relatively easy-to-access information, and acts as a 'facilitator of encounters' with individuals and opportunities conducive to criminal engagement. This context is conducive to what they call _______________.?
A) Digital drift
B) Restrictive deterrence
C) Techniques of neutralization
D) Differential association
A) Digital drift
B) Restrictive deterrence
C) Techniques of neutralization
D) Differential association
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
_______________ argue that the dominant mode of production--capitalism--shapes motivations and opportunities to engage in crime as well as the processes of criminalization and crime control.?
A) Feminist criminologists
B) Social disorganization theorists
C) Radical criminologists
D) Constitutive criminologists
A) Feminist criminologists
B) Social disorganization theorists
C) Radical criminologists
D) Constitutive criminologists
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
According to Yar, _______________ refers to the domination of field by businesses regarding the provision of information security services and solutions.?
A) computer crime control industry
B) cybercrime prevention nexus
C) cybercrime-commercial complex
D) computer crime prevention coalition
A) computer crime control industry
B) cybercrime prevention nexus
C) cybercrime-commercial complex
D) computer crime prevention coalition
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
_______________ is the idea that instead of avoiding committing a crime entirely, a criminal may change the way they engage in a crime when confronted with threat of punishment.?
A) Perceptual deterrence
B) General deterrence
C) Specific deterrence
D) Restrictive deterrence
A) Perceptual deterrence
B) General deterrence
C) Specific deterrence
D) Restrictive deterrence
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is NOT one of the methodological approaches used by criminologists to study cybercrime discussed in Chapter 2?
A) Self-report surveys
B) Interviews
C) Experimental/quasi-experimental designs
D) Autoethnography
A) Self-report surveys
B) Interviews
C) Experimental/quasi-experimental designs
D) Autoethnography
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck