Criminology Chapter 14 Quiz

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/43

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

44 Terms

1
New cards

Which act is not considered a form of cybercrime?

cyber violence

2
New cards

About ________ of US companies report being hit by computer network attacks each year.

60 percent

3
New cards

_____________ refers to the process by which thieves place an electronic device on a card that steals personal information and customer account information.

ATM skimming

4
New cards

You access a website you think gives you the scores of your favorite team, but a pop-up message from the FBI shows that you have violated some federal law and that your computer will remain locked until you pay a fine. This is an example of (a) ___________.

ransomware

5
New cards

Warez is ________.

a term that describes hacking a game or application that has copyright protection.

6
New cards

Thieves acquire a legitimate receipt from a store, either by buying something or taking one from the trash, and then return to the store and take an identical item to the return department. This is sometimes known as ____________.

shoplisting

7
New cards

Which of the following is not a motive behind cybervandalism?

a desire to earn a profit from their crime

8
New cards

The process of calling 911 and faking an emergency is called _______.

swatting

9
New cards

About _______ LGBT students have been verbally harassed at school.

8 in 10

10
New cards

Which of the following occurs when cyberbullies want to stalk victims?

cat fishing

11
New cards

The costs of cybercrime are estimated to be as high as _______________.

$575 billion

12
New cards

_________ is defined as illegally using the Internet to gather information that is considered private or confidential.

cyberspying

13
New cards

The ________ is the act that criminalizes the use of recording equipment that makes copies of films while in movie theaters.

Artists rights and theft prevention act

14
New cards

The ________ maintains the Electronic Crimes Task Force, which focuses on identifying and locating international cybercriminals connected to cyber intrusions, bank fraud and other computer-related crimes.

Secret Service

15
New cards

At the start of the second Gulf War, US agents sent emails to Iraqi military officers telling them they would not be harmed if they left their tanks and weapons parked on the side of the road and went home. This would be an example of ____________. ___________.

cyber war

16
New cards

n 2014, 500 million Yahoo accounts were hacked and personal information was stolen. This act was an example of ___________________. _________.

cyber espionage

17
New cards

One recent tactic used by terrorist groups is to _________________.

make contributions through fraudulent charitable organizations to distribute funds

18
New cards

You are asked in a press conference about the differences between transnational organized crime and traditional organized crime, or the Mafia. You answer that ____________.

there are only a few differences between the Mafia and networks of individuals working in more than one state or nation to conduct illegal business ventures

19
New cards

Which of the following is not considered a main activity of transnational organized crime?

burglary

20
New cards

Which transnational gang is not based primarily on ethnicity or family structure, but is instead based on economic necessity?

Russian gangs

21
New cards

An estimated ________ percent of cocaine entering the United States comes from Mexico.

90 percents

22
New cards

Industry experts estimate that the worldwide criminality of traditional Italian organized crime equals approximately ________annually.

100 billion

23
New cards

You are a federal prosecutor attempting to use the Racketeering Influenced and Corrupt Organization (RICO) Act against an Asian organized crime group THAT operates a legitimate international clothing manufacturer in Brooklyn, New York. What provision of the RICO statutes are you going to use?

acquiring an interest in or control of any enterprise engaged in interstate of foreign commerce

24
New cards

A large part of the problem relating to eradicating transnational organized crime is that _________.

profits are too great for countries to look the other way

25
New cards

One problem with combating cybercrime is that _____________.

existing laws are sometimes inadequate to address the problem

26
New cards
According to the theory of social harm, immoral acts can be distinguished from crimes on the basis of the ____they cause.
injury
27
New cards
After World War I, prostitution became associated with ____, and the desire to protect young servicemen from harm helped to end all experiments with legalization in the United States.
disease
28
New cards
Attaining sexual pleasure through sexual activity with prepubescent children is referred to as ______.
pedophilia
29
New cards
Becky obtains a legitimate receipt from a store and returns to the store, shops, and picks up the identical item return to the service desk to get a refund. Becky has just committed _______.
shoplisting
30
New cards
David Smith pleaded guilty to state and federal charges and was sentenced to 20 months in prison for his $80 million dollar cyber attack in the form of a ______.
​computer worm
31
New cards
Ethan Nadelmann argues that drugs should be legalized because ______.
the use of mood-altering substances is customary in almost all human societies
32
New cards
Gloria would most likely fit into which category of prostitute?
​Call girl
33
New cards
_________is a disturbing behavior whereby men travel overseas to places such as Thailand in order to engage in illicit sexual behavior with young girls who have been sold into prostitution.
Sex tourism
34
New cards
​Opium was first discovered in 1887 by Josef Mendelson as a derivative for the harsh medications used for relaxation at the time.
False
35
New cards
​Similar to a salami slice fraud but on a much larger and usually more complex scale, ________________ sometimes is perpetrated as a "one-off kamikaze" fraud.
manipulation of accounts
36
New cards
​The creation of false emails or websites that look legitimate but are designed to gain illegal access to a victim's personal information
phishing
37
New cards
One of the primary issues for combating transnational drug crime is that the United States has little influence in some key drug-producing areas, such as Taliban-held Afghanistan and Myanmar. ​
True
38
New cards
The following illustrates the story of Rebecca Caine who was terrorized by her ex-boyfriend Peter Atkinson who bombarded her with hundreds of texts and calls a day and even posted nude pictures of her online. His actions are characterized as ______. ​
​cyberstalking
39
New cards
​The theft and/or destruction of information, resources, or funds via computers, computer networks, or the Internet.
Cybercrime
40
New cards
What does research indicate about the effects of legalizing prostitution?
Legalization leads to massive expansion of the trade, both legal and illegal.
41
New cards
​Which of the following is an Asian transnational group involved in manufacturing and trafficking methamphetamine who originated in Thailand?
​Red Wa
42
New cards
Which of the following is false in regard to cyberbullying?
Girls are more likely to post harmful videos or pictures, while boys are more likely to spread rumors.
43
New cards
Which of the following is not a condition present in a commercial sexual transaction?
Felonious violence
44
New cards
Which of the following would be an example of a cyber smear scam?
​Bill writes a fictional column about Exxon Mobile closing, hence driving down stock prices for his friends to purchase