Deck 18: Cybercrime and Cyberdeviance

Full screen (f)
exit full mode
Question
Which of the following can best be described as ripping?

A)the use of a network-enabled device to repeatedly make unwanted contact with a person using any number of means (e-mails,text messages,etc. ),and doing so knowing that this behaviour is likely to cause fear or annoyance
B)the use of specially designed software to download original material from a protected media source (e.g. ,online movie)to a hard disk,for the purposes of resale or redistribution
C)the attempt to remotely circumvent the security or privacy measures of an Internet website for the purposes of either stealing information or other malicious actions against the owner of the website
D)sending unsolicited and unwanted bulk e-mail messages to other users
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following can best be described as spamming?

A)sending unsolicited and unwanted bulk e-mail messages to other users
B)using software and hardware to steal data (usually related to credit cards)by intercepting e-transmissions,which then enable the cloning or counterfeiting of specific financial instruments (credit cards,bank cards,etc. )for the purposes of theft and fraud
C)sending an email purportedly from a bank requesting information on the target's bank account,including the password,with the intention of stealing money from that account
D)attempting to remotely circumvent the security or privacy measures of an Internet website for the purposes of either stealing information or other malicious actions against the owner of the website
Question
Which of the following does not represent a critical infrastructure site that would be subject to a cyber-terrorist attack?

A)water treatment facility
B)nuclear power plant
C)an airport
D)a major sports stadium
Question
Which of the following statements best reflects the findings of Raskauskas and Stoltz (2007),that the most common form of electronic victimization among adolescents was text messaging via mobile device?

A)Text messaging is the technology that is most vulnerable to cybercrimes.
B)Adolescents are the demographic group most frequently targeted by cybercriminals.
C)The architecture of text messaging through mobile devices makes it inherently criminogenic.
D)The architecture of a given digital environment and the dominant culture of that environment both play a major role in offending.
Question
To better understand online victimization,the textbook argues that research on cyberbullying and cyber-victimology must include an assessment of risk.Which of the following best represents the focus of such a risk assessment?

A)Computers might be classified according to a continuum of risk tolerance,ranging from infrequent use to frequent use.
B)Victims might be classified according to a continuum of risk tolerance,ranging from infrequent users to frequent users whose communications occur in or near real-time.
C)Offenders might be classified according to a continuum of risk tolerance,ranging from infrequent use to frequent use of the Internet.
D)Websites might be classified according to a continuum of risk tolerance,ranging from those visited infrequently to those visited frequently.
Question
Cyberbullying Reporter employed critical discourse analysis and corpus linguistics to aggressive or antisocial online exchanges.What was the purpose of this exercise?

A)to identify individuals involved in cybercrime
B)to identify the type of techniques used to commit cybercrimes
C)to identify the frequency of different cybercrimes
D)to identify a common bullying and harassment lexicon
Question
Within the context of cybercrime,which of the following best reflects the term "technological determinism"?

A)the need to examine computer technologies as being inherently deterministic
B)the need to examine computer technologies as being inherently criminogenic
C)the need to examine computer users as inherently technologically deterministic
D)the need to examine computer criminals as inherently criminogenic
Question
What is the name applied to a parallel Internet that exists beneath the surface of conventional browsers,features sites not indexed by search engines,is unregulated,and is rife with criminal activity and illegal transactions?

A)deep threat
B)deep throat
C)deep web
D)deep sea
Question
Which of the following terms refer to the use of software and hardware to steal data (usually related to credit cards)by intercepting e-transmissions,which then enable the cloning or counterfeiting of specific financial instruments (credit cards,bank cards,etc. )for the purposes of theft and fraud?

A)luring
B)hacking
C)skimming
D)phishing
Question
Which of the following would not be considered a cyberactivity?

A)browsing web pages on the Internet
B)text messaging through a smart phone
C)e-mailing someone from a tablet
D)watching television at home
Question
Which of the following can best be described as hacking?

A)the use of software and hardware to steal data (usually related to credit cards)by intercepting e-transmissions,which then enable the cloning or counterfeiting of specific financial instruments (credit cards,bank cards,etc. )for the purposes of theft and fraud
B)the use of specially designed software to download original material from a protected media source (e.g. ,online movie)to a hard disk,for the purposes of resale or redistribution
C)using an Internet connection to access social media,chat rooms,or other places of electronic assembly to make contact with a child or person under 16 to meet for sexual purposes
D)the attempt to remotely circumvent the security or privacy measures of an Internet website for the purposes of either stealing information or other malicious actions against the owner of the website
Question
Which of the following statements is true in the context of how best to ensure the Internet is a safe place for Canadian users that is not used for criminal purposes?

A)There is little debate anymore about how to balance privacy with public safety in a digital world.
B)Canadians remain conflicted in their opinions regarding the role of the police and lawmakers in regulating online behaviour.
C)Canadians are united in their opinion that the government should give police sweeping powers to regulate online behaviour.
D)The future of guardianship on the Internet is easy to predict.
Question
Hayward (2012)has noted that the Internet-and by extension digital culture generally-has broken down traditional barriers between life stages and has led to generational and demographic confusion,thus bringing about unforeseen online collisions between groups of people with different value systems.Which of the following scenarios best reflects this statement?

A)an adult pedophile posing as a 10-year-old girl looking to meet new friends in a Jason Bieber fan club chat room
B)e-mail spam attempting to sell shares in a non-existent company
C)the hacking of an online bank to steal the passwords of customers
D)the hacking of a website of a nuclear facility
Question
Which of the following terms refer to the use of misleading e-mail purportedly from a bank requesting sensitive personal information or password data with the intention of compromising the victim's banking or credit accounts?

A)ripping
B)phishing
C)hacking
D)luring
Question
According to the textbook,we need to step outside criminology to better understand cyberbullying and motives of online offenders.Why do we need to step outside of criminology?

A)to draw from terminologies used in other relevant fields,such as digital media and communications
B)to draw from legal terminologies concerning cybercriminality
C)to draw from more psychologically-based terminologies regarding criminal offending
D)to draw from more sociologically-based theories of criminality
Question
Which of the following best represents a goal of applying routine activity theory to cybercrimes?

A)to better understand guardianship that protects potential online victims
B)to better understand the paths and nodes used by offenders online
C)to better understand the rational decision making process of online offenders
D)to better understand the social environment of cyber offenders and how this contributes to their criminal offending
Question
Within the context of exhibitionism,exposing one's body in explicit or suggestive fashion in the physical (offline)world is analogous to what in the digital (online)world?

A)cyber-stalking
B)sexting
C)internet trolling
D)cyber-bullying
Question
Which of the following terms refer to the use of an Internet connection to access social media,chat rooms,or other places of electronic assembly to make contact with a child or person under 16 to meet for sexual purposes?

A)stalking
B)luring
C)spamming
D)trafficking
Question
What important theoretical school of thought does Chapter 18 state should be applied to determine where the line between crime and deviance is drawn in online communities?

A)the consensus model of crime
B)the conflict model of crime
C)symbolic interactionism
D)rational choice theory
Question
Which of the following terms refer to the use of a network-enabled device to repeatedly make unwanted contact with a person (through e-mails,text messages,etc. )knowing that this behaviour is likely to cause fear or annoyance?

A)stalking
B)luring
C)spamming
D)trafficking
Question
The application of routine activity theory to cybercrimes and cyberdeviance reveals that the future of guardianship on the Internet is difficult to predict.
Question
Skimming is an attempt to remotely circumvent the security or privacy measures of a website for the purposes of either stealing information or other malicious actions against the owner of the website.
Question
Compare and contrast cybercrime with cyber terrorism.
Question
Ripping is the use of specially designed software to download original material from a protected media source (e.g. ,online movie)to a hard disk,for the purposes of resale or redistribution.
Question
Luring is when someone uses an Internet connection to access social media,chat rooms,or other places of electronic assembly to make contact with a child or person under 16 to meet for sexual purposes.
Question
Unlike corporations and American government agencies,Canadian government agencies have thus far avoided cyberattacks.
Question
Describe how cyberdeviance often encompasses one or more of the traditional offline paraphilias.Identify three examples of traditional (offline)paraphilias and describe how they have been adapted to the online world.
Question
Phishing is when a fraudster sends an email purportedly from a bank requesting information on the target's bank account,including the password,with the intention of stealing money from that account.
Question
Cyberdeviance rarely encompasses one or more of the traditional offline paraphilias.
Question
Describe some ways that technologies have changed the landscape of criminality.Provide some examples of new forms of crime that have been created by the advent of the Internet.
Question
Cyberterrorist generally focus on attacking human targets rather than institutional targets.
Question
Describe the cybercrimes of phishing,ripping,and skimming.Identify at least two characteristics they share and two characteristics that make each distinct from one another.
Question
Describe what is meant by the term "deviant cybercommunities." Provide at least two examples of a deviant cybercommunity.
Question
Compare and contrast cyberdeviance with cybercrime.Provide at least one example of each.
Question
Cyberterrorism refers to the use a computer to orchestrate large-scale "attacks on information," including government or critical infrastructure servers or any database of interest to national security.
Question
Chapter 18 argues that to better understand cybercrime and cyberdeviance one requires a broader understanding of computer technologies as being inherently criminogenic. What is mean by this statement? Describe some ways that computer technologies can be inherently criminogenic.
Question
Differentiate between cybercrime and cyberdeviance providing one hypothetical example of each.
Question
Hacking is the use of software and hardware to steal data (usually related to credit cards)by intercepting e-transmissions,which then enable the cloning or counterfeiting of specific financial instruments (credit cards,bank cards,etc. )for the purposes of theft and fraud.
Question
What can we learn about cybercrime and cyberdeviance,and its control,by applying routine activity theory?
Question
Identify and discuss two types of sexual offences that are perpetrated over the Internet and other technologies.Compare these to traditional (offline)sexual offences.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 18: Cybercrime and Cyberdeviance
1
Which of the following can best be described as ripping?

A)the use of a network-enabled device to repeatedly make unwanted contact with a person using any number of means (e-mails,text messages,etc. ),and doing so knowing that this behaviour is likely to cause fear or annoyance
B)the use of specially designed software to download original material from a protected media source (e.g. ,online movie)to a hard disk,for the purposes of resale or redistribution
C)the attempt to remotely circumvent the security or privacy measures of an Internet website for the purposes of either stealing information or other malicious actions against the owner of the website
D)sending unsolicited and unwanted bulk e-mail messages to other users
B
2
Which of the following can best be described as spamming?

A)sending unsolicited and unwanted bulk e-mail messages to other users
B)using software and hardware to steal data (usually related to credit cards)by intercepting e-transmissions,which then enable the cloning or counterfeiting of specific financial instruments (credit cards,bank cards,etc. )for the purposes of theft and fraud
C)sending an email purportedly from a bank requesting information on the target's bank account,including the password,with the intention of stealing money from that account
D)attempting to remotely circumvent the security or privacy measures of an Internet website for the purposes of either stealing information or other malicious actions against the owner of the website
A
3
Which of the following does not represent a critical infrastructure site that would be subject to a cyber-terrorist attack?

A)water treatment facility
B)nuclear power plant
C)an airport
D)a major sports stadium
D
4
Which of the following statements best reflects the findings of Raskauskas and Stoltz (2007),that the most common form of electronic victimization among adolescents was text messaging via mobile device?

A)Text messaging is the technology that is most vulnerable to cybercrimes.
B)Adolescents are the demographic group most frequently targeted by cybercriminals.
C)The architecture of text messaging through mobile devices makes it inherently criminogenic.
D)The architecture of a given digital environment and the dominant culture of that environment both play a major role in offending.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
To better understand online victimization,the textbook argues that research on cyberbullying and cyber-victimology must include an assessment of risk.Which of the following best represents the focus of such a risk assessment?

A)Computers might be classified according to a continuum of risk tolerance,ranging from infrequent use to frequent use.
B)Victims might be classified according to a continuum of risk tolerance,ranging from infrequent users to frequent users whose communications occur in or near real-time.
C)Offenders might be classified according to a continuum of risk tolerance,ranging from infrequent use to frequent use of the Internet.
D)Websites might be classified according to a continuum of risk tolerance,ranging from those visited infrequently to those visited frequently.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
Cyberbullying Reporter employed critical discourse analysis and corpus linguistics to aggressive or antisocial online exchanges.What was the purpose of this exercise?

A)to identify individuals involved in cybercrime
B)to identify the type of techniques used to commit cybercrimes
C)to identify the frequency of different cybercrimes
D)to identify a common bullying and harassment lexicon
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
Within the context of cybercrime,which of the following best reflects the term "technological determinism"?

A)the need to examine computer technologies as being inherently deterministic
B)the need to examine computer technologies as being inherently criminogenic
C)the need to examine computer users as inherently technologically deterministic
D)the need to examine computer criminals as inherently criminogenic
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
What is the name applied to a parallel Internet that exists beneath the surface of conventional browsers,features sites not indexed by search engines,is unregulated,and is rife with criminal activity and illegal transactions?

A)deep threat
B)deep throat
C)deep web
D)deep sea
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following terms refer to the use of software and hardware to steal data (usually related to credit cards)by intercepting e-transmissions,which then enable the cloning or counterfeiting of specific financial instruments (credit cards,bank cards,etc. )for the purposes of theft and fraud?

A)luring
B)hacking
C)skimming
D)phishing
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following would not be considered a cyberactivity?

A)browsing web pages on the Internet
B)text messaging through a smart phone
C)e-mailing someone from a tablet
D)watching television at home
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following can best be described as hacking?

A)the use of software and hardware to steal data (usually related to credit cards)by intercepting e-transmissions,which then enable the cloning or counterfeiting of specific financial instruments (credit cards,bank cards,etc. )for the purposes of theft and fraud
B)the use of specially designed software to download original material from a protected media source (e.g. ,online movie)to a hard disk,for the purposes of resale or redistribution
C)using an Internet connection to access social media,chat rooms,or other places of electronic assembly to make contact with a child or person under 16 to meet for sexual purposes
D)the attempt to remotely circumvent the security or privacy measures of an Internet website for the purposes of either stealing information or other malicious actions against the owner of the website
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following statements is true in the context of how best to ensure the Internet is a safe place for Canadian users that is not used for criminal purposes?

A)There is little debate anymore about how to balance privacy with public safety in a digital world.
B)Canadians remain conflicted in their opinions regarding the role of the police and lawmakers in regulating online behaviour.
C)Canadians are united in their opinion that the government should give police sweeping powers to regulate online behaviour.
D)The future of guardianship on the Internet is easy to predict.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
Hayward (2012)has noted that the Internet-and by extension digital culture generally-has broken down traditional barriers between life stages and has led to generational and demographic confusion,thus bringing about unforeseen online collisions between groups of people with different value systems.Which of the following scenarios best reflects this statement?

A)an adult pedophile posing as a 10-year-old girl looking to meet new friends in a Jason Bieber fan club chat room
B)e-mail spam attempting to sell shares in a non-existent company
C)the hacking of an online bank to steal the passwords of customers
D)the hacking of a website of a nuclear facility
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following terms refer to the use of misleading e-mail purportedly from a bank requesting sensitive personal information or password data with the intention of compromising the victim's banking or credit accounts?

A)ripping
B)phishing
C)hacking
D)luring
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
According to the textbook,we need to step outside criminology to better understand cyberbullying and motives of online offenders.Why do we need to step outside of criminology?

A)to draw from terminologies used in other relevant fields,such as digital media and communications
B)to draw from legal terminologies concerning cybercriminality
C)to draw from more psychologically-based terminologies regarding criminal offending
D)to draw from more sociologically-based theories of criminality
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following best represents a goal of applying routine activity theory to cybercrimes?

A)to better understand guardianship that protects potential online victims
B)to better understand the paths and nodes used by offenders online
C)to better understand the rational decision making process of online offenders
D)to better understand the social environment of cyber offenders and how this contributes to their criminal offending
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
Within the context of exhibitionism,exposing one's body in explicit or suggestive fashion in the physical (offline)world is analogous to what in the digital (online)world?

A)cyber-stalking
B)sexting
C)internet trolling
D)cyber-bullying
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following terms refer to the use of an Internet connection to access social media,chat rooms,or other places of electronic assembly to make contact with a child or person under 16 to meet for sexual purposes?

A)stalking
B)luring
C)spamming
D)trafficking
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
What important theoretical school of thought does Chapter 18 state should be applied to determine where the line between crime and deviance is drawn in online communities?

A)the consensus model of crime
B)the conflict model of crime
C)symbolic interactionism
D)rational choice theory
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following terms refer to the use of a network-enabled device to repeatedly make unwanted contact with a person (through e-mails,text messages,etc. )knowing that this behaviour is likely to cause fear or annoyance?

A)stalking
B)luring
C)spamming
D)trafficking
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
The application of routine activity theory to cybercrimes and cyberdeviance reveals that the future of guardianship on the Internet is difficult to predict.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
Skimming is an attempt to remotely circumvent the security or privacy measures of a website for the purposes of either stealing information or other malicious actions against the owner of the website.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
Compare and contrast cybercrime with cyber terrorism.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
Ripping is the use of specially designed software to download original material from a protected media source (e.g. ,online movie)to a hard disk,for the purposes of resale or redistribution.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
Luring is when someone uses an Internet connection to access social media,chat rooms,or other places of electronic assembly to make contact with a child or person under 16 to meet for sexual purposes.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
Unlike corporations and American government agencies,Canadian government agencies have thus far avoided cyberattacks.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
Describe how cyberdeviance often encompasses one or more of the traditional offline paraphilias.Identify three examples of traditional (offline)paraphilias and describe how they have been adapted to the online world.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
Phishing is when a fraudster sends an email purportedly from a bank requesting information on the target's bank account,including the password,with the intention of stealing money from that account.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
Cyberdeviance rarely encompasses one or more of the traditional offline paraphilias.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
Describe some ways that technologies have changed the landscape of criminality.Provide some examples of new forms of crime that have been created by the advent of the Internet.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
Cyberterrorist generally focus on attacking human targets rather than institutional targets.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
Describe the cybercrimes of phishing,ripping,and skimming.Identify at least two characteristics they share and two characteristics that make each distinct from one another.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
Describe what is meant by the term "deviant cybercommunities." Provide at least two examples of a deviant cybercommunity.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
Compare and contrast cyberdeviance with cybercrime.Provide at least one example of each.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
Cyberterrorism refers to the use a computer to orchestrate large-scale "attacks on information," including government or critical infrastructure servers or any database of interest to national security.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
Chapter 18 argues that to better understand cybercrime and cyberdeviance one requires a broader understanding of computer technologies as being inherently criminogenic. What is mean by this statement? Describe some ways that computer technologies can be inherently criminogenic.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
Differentiate between cybercrime and cyberdeviance providing one hypothetical example of each.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
Hacking is the use of software and hardware to steal data (usually related to credit cards)by intercepting e-transmissions,which then enable the cloning or counterfeiting of specific financial instruments (credit cards,bank cards,etc. )for the purposes of theft and fraud.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
What can we learn about cybercrime and cyberdeviance,and its control,by applying routine activity theory?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
Identify and discuss two types of sexual offences that are perpetrated over the Internet and other technologies.Compare these to traditional (offline)sexual offences.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 40 flashcards in this deck.