Deck 14: The Investigation of Fraud and Computer-Related Crimes
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/41
Play
Full screen (f)
Deck 14: The Investigation of Fraud and Computer-Related Crimes
1
______ occurs when anything of value is offered in exchange for influence in decisions or actions of the taker.
A) Tax evasion
B) Forgery
C) Extortion
D) Bribery
A) Tax evasion
B) Forgery
C) Extortion
D) Bribery
Bribery
2
______ occurs when one person obtains property from another as a result of actual or threatened force or fear or under authority of an official office.
A) Tax evasion
B) Forgery
C) Extortion
D) Bribery
A) Tax evasion
B) Forgery
C) Extortion
D) Bribery
Extortion
3
______ refers to all the ways a person can falsely represent a fact in order to get someone to surrender something of value.
A) Fraud
B) Robbery
C) Burglary
D) Larceny
A) Fraud
B) Robbery
C) Burglary
D) Larceny
Fraud
4
______ is when illegally obtained money is being invested in a legitimate corporation to hide the original source of the money.
A) Insider trading
B) Money laundering
C) Investment fraud
D) Insurance fraud
A) Insider trading
B) Money laundering
C) Investment fraud
D) Insurance fraud
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is NOT a type of identity theft?
A) criminal identity theft
B) civil identity theft
C) financial identity theft
D) identity cloning
A) criminal identity theft
B) civil identity theft
C) financial identity theft
D) identity cloning
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
6
______ involves using someone else's personal information to assume that person's identity in daily life.
A) Criminal identity theft
B) Civil identity theft
C) Financial identity theft
D) Identity cloning
A) Criminal identity theft
B) Civil identity theft
C) Financial identity theft
D) Identity cloning
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following are NOT ways in which criminals may obtain personal information about someone else?
A) going through someone's garbage
B) stealing purses
C) hacking into large databases
D) buy identities from the victim
A) going through someone's garbage
B) stealing purses
C) hacking into large databases
D) buy identities from the victim
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
8
What is a goal of identity theft investigation?
A) discovering the identity of the victim
B) finding other potential victims associated with the perpetrator
C) discovering why people commit these crimes
D) finding out common locations of these crimes
A) discovering the identity of the victim
B) finding other potential victims associated with the perpetrator
C) discovering why people commit these crimes
D) finding out common locations of these crimes
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
9
What is not one of the most common methods by which offenders fraudulently use stolen cards or checks?
A) the passing and cashing of worthless checks
B) the alteration of money orders
C) the card-not-present purchase method
D) the denial of receiving a legitimate purchase
A) the passing and cashing of worthless checks
B) the alteration of money orders
C) the card-not-present purchase method
D) the denial of receiving a legitimate purchase
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is NOT an investigative action of the police when a card or check fraud is reported?
A) Obtain a hard copy of the fraudulent documents.
B) Search a suspect's possessions for the stolen check or card.
C) Record and investigate the date, time, and place of the fraudulent use of the check or card.
D) Ask witnesses for information detailing the activities of the victim.
A) Obtain a hard copy of the fraudulent documents.
B) Search a suspect's possessions for the stolen check or card.
C) Record and investigate the date, time, and place of the fraudulent use of the check or card.
D) Ask witnesses for information detailing the activities of the victim.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
11
What is the second most common form of drug abuse that is often not reported to the police?
A) prescription drugs
B) cocaine
C) ecstasy
D) marijuana
A) prescription drugs
B) cocaine
C) ecstasy
D) marijuana
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
12
In what ways do offenders not obtain prescription drugs?
A) theft through robbery or burglary
B) forged prescriptions
C) doctor shopping
D) purchasing drugs legally on the Internet
A) theft through robbery or burglary
B) forged prescriptions
C) doctor shopping
D) purchasing drugs legally on the Internet
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
13
What is not one of the ways that prescription fraud comes to the attention of the police?
A) third-party notification
B) police discovery
C) doctor's office or pharmacy report
D) self-surrender
A) third-party notification
B) police discovery
C) doctor's office or pharmacy report
D) self-surrender
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
14
______ are crimes where the computer system is the target.
A) Cyber-attacks
B) Cyberbullying
C) Digital-attacks
D) Computer crimes
A) Cyber-attacks
B) Cyberbullying
C) Digital-attacks
D) Computer crimes
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
15
Cyberbullying does not involve ______.
A) sending or posting mean or false messages
B) starting or circulating rumors
C) stealing e-mail passwords and sending messages
D) students getting bullied in school
A) sending or posting mean or false messages
B) starting or circulating rumors
C) stealing e-mail passwords and sending messages
D) students getting bullied in school
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
16
______ is a form of cyberbullying that often leads to criminal charges.
A) Bribery
B) Sextortion
C) Blackmail
D) Forgery
A) Bribery
B) Sextortion
C) Blackmail
D) Forgery
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
17
Which aspect of child pornography involves the creation of pornographic images through cell phones or web cameras?
A) production
B) distribution
C) downloading or possession
D) watching
A) production
B) distribution
C) downloading or possession
D) watching
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
18
What is an IP address?
A) an identifying number that is associated with a computer
B) an identifying number that is associated with a fraudulent account
C) an identifying number associated with an individual's identity
D) an identifying number associated with an individual's medical account
A) an identifying number that is associated with a computer
B) an identifying number that is associated with a fraudulent account
C) an identifying number associated with an individual's identity
D) an identifying number associated with an individual's medical account
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
19
Which is NOT one of the ways child pornography crimes often come to the attention of the police?
A) the public
B) computer technicians
C) victims
D) perpetrators
A) the public
B) computer technicians
C) victims
D) perpetrators
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
20
______ involves the dissemination of pornographic images through e-mail, instant messages, newsgroups, bulletin boards, chat rooms, and other Internet networks.
A) Production
B) Distribution
C) Downloading or possession
D) None of these
A) Production
B) Distribution
C) Downloading or possession
D) None of these
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
21
______ is when someone who is entrusted with the money of a corporation keeps it for their own purposes.
A) Tax evasion
B) Bribery
C) Embezzlement
D) Forgery
A) Tax evasion
B) Bribery
C) Embezzlement
D) Forgery
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
22
What is not correct about cyberattacks?
A) Investigations of these crimes can be highly technical.
B) These attacks most often involve individuals.
C) They consist of computer viruses and other things.
D) The target are computer systems.
A) Investigations of these crimes can be highly technical.
B) These attacks most often involve individuals.
C) They consist of computer viruses and other things.
D) The target are computer systems.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
23
Law enforcement agencies often lack ______ to address cyber attacks
A) knowledge
B) victims
C) personnel
D) offenders
A) knowledge
B) victims
C) personnel
D) offenders
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
24
Which is NOT a type of evidence needed to establish that fraud occurred?
A) an injury to the alleged offender
B) intention to deceive the victim
C) false statement
D) the offender's knowledge that the statement was false
A) an injury to the alleged offender
B) intention to deceive the victim
C) false statement
D) the offender's knowledge that the statement was false
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
25
______ occurs when a person who sells an item pays the buyer part of the proceeds from that sale.
A) Investment fraud
B) Kickback
C) Insurance fraud
D) Money laundering
A) Investment fraud
B) Kickback
C) Insurance fraud
D) Money laundering
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
26
Racketeering is when accidents or injuries are falsely reported in order to collect insurance benefits.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
27
Identity theft has a financial motive, though revenge and embarrassment can also be motivators.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
28
The FACT Act is meant to increase detection of identity theft.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
29
Jurisdiction of the crime goes to the location of the first fraudulent identity use.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
30
There are security measures that are put in place to prevent the fraudulent use of checks and credit or debit cards.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
31
A large majority of check or credit card fraud is reported to the police because of the amount of losses experienced by the victims.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
32
Pain relievers and stimulants are often the prescription drugs of choice for criminals.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
33
Because prescription drugs are fraudulently obtained for the purpose of profit, apprehension is a good policing strategy. Police only have to follow the money.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
34
Sextortion typically involves the victim sending compromising photos to a person who is claiming to be someone he/she is not. The person receiving the photos then threatens to distribute the photos unless the victim agrees to some demand.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
35
Child pornography can be widely distributed through the Internet, further complicating the crime through the use of anonymity and accessibility.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
36
Downloading or possession of pornographic images involves the viewing of images via the Internet.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
37
What are some investigative actions that the police can perform for check and credit card fraud?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
38
Discuss the investigation of child pornography.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
39
Discuss cyberbullying.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
40
Discuss the investigation of identity theft.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
41
Name the various computer-facilitated crimes discussed in the book and get into more detail about the nature and investigation of one of them.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck