Tech, Crime, & Society Quiz 2

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/52

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:43 PM on 4/30/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

53 Terms

1
New cards

Sextortion

Threatening to share someone's sexual images unless they send money, more images, or sexual favors.

2
New cards

Online Solicitation

When someone asks a minor to engage in sexual activity online.

3
New cards

Online Enticement

Using the internet to persuade or lure a minor into sexual activity.

4
New cards

Contact Victimization

When online abuse leads to in-person sexual abuse.

5
New cards

Online Sexual Victimization

Any sexual abuse or exploitation of a minor that involves the internet.

6
New cards

History (Online Sexual Victimization)

Increased with internet growth in the 1990s-2000s, especially with social media and smartphones.

7
New cards

Statistics

A significant percentage of youth report unwanted sexual exposure or solicitation online.

8
New cards

Vulnerable Populations

Youth who are lonely, LGBTQ+, have family conflict, prior abuse history, or high internet use.

9
New cards

Grooming

A process where an offender builds trust with a child to sexually exploit them.

10
New cards

Share Interests / Establish Rapport

Offender pretends to like the same hobbies to build connection.

11
New cards

Establish Trust

Offender becomes someone the child feels safe talking to.

12
New cards

Share Secrets

Encourages secrecy to isolate the child from others.

13
New cards

Break Down Barriers

Gradually introduces sexual topics or content.

14
New cards

Threats / Exploitation

Uses blackmail, guilt, or fear to control the victim.

15
New cards

Face-to-Face Meeting

Attempts to meet the child in person.

16
New cards

Youth Internet Safety Survey (YISS) - Where it was conducted

United States (national youth survey).

17
New cards

Youth Internet Safety Survey (YISS) - What it looked at

Online sexual solicitation, harassment, and unwanted exposure to sexual material.

18
New cards

Youth Internet Safety Survey (YISS) - Terminology

Defined terms like aggressive solicitation and unwanted exposure.

19
New cards

Aggressive Sexual Solicitation

Solicitation involving threats, attempts at contact, or repeated pressure.

20
New cards

Unwanted Exposure to Sexual Material

Accidentally or unwillingly seeing sexual images online.

21
New cards

Harassment

Repeated online behavior meant to upset, scare, or harm someone.

22
New cards

Distressing Incident

An online sexual experience that causes fear, shame, or emotional harm.

23
New cards

Child Sexual Abuse Imagery (CSAI) / Child Sexual Abuse Material (CSAM)

Images or videos showing the sexual abuse of a minor.

24
New cards

Applicable State/Federal Laws

Federal law (e.g., 18 U.S.C. § 2251-2252) criminalizes possession, production, and distribution.

25
New cards

Offender/Victim Patterns

Offenders often know the child; victims can be any gender, commonly minors under 18.

26
New cards

Possession / Distribution / Manufacture

Illegal to have, share, or create sexual images of minors.

27
New cards

Certain Uses of Computer Services Prohibited

Using the internet to exploit minors sexually is a federal crime.

28
New cards

Street Crimes

Traditional crimes committed in public spaces (robbery, assault).

29
New cards

White Collar Crimes

Non-violent crimes committed for financial gain, often by professionals.

30
New cards

White Collar Offenders

Typically educated individuals in positions of trust or authority.

31
New cards

Phishing

Fraudulent emails/messages pretending to be legitimate to steal information.

32
New cards

Spear Phishing

Targeted phishing aimed at a specific person or organization.

33
New cards

Embezzlement

Stealing money entrusted to you by an employer or organization.

34
New cards

Components of Embezzlement

Trust relationship, lawful access, intentional theft.

35
New cards

Embezzlement: Siphoning

Skimming small amounts of money over time.

36
New cards

Embezzlement: Salami

Taking tiny fractions of transactions repeatedly.

37
New cards

Ponzi Scheme

Fraud where returns to old investors are paid using money from new investors.

38
New cards

Transactional Fraud

Fraud involving unauthorized or deceptive financial transactions.

39
New cards

Overpayment Fraud

Scammer sends too much money and asks victim to refund the difference.

40
New cards

Advanced Fee Scam

Victim pays upfront fee for a promised reward that never comes.

41
New cards

419 Scam

Advance-fee scam originating from Nigeria (named after Nigerian law section 419).

42
New cards

Scambaiters

People who intentionally engage scammers to waste their time.

43
New cards

Romance Scams

Scammers fake romantic relationships to steal money.

44
New cards

"Pig Butchering"

Long-term scam where victim is "fattened up" with fake investment gains before large financial theft.

45
New cards

Identity Theft

Stealing someone's personal information to commit fraud.

46
New cards

Insider Trading

Illegally trading stocks using confidential company information.

47
New cards

Counterfeiting

Making fake currency or goods to deceive others.

48
New cards

Money Laundering

Hiding illegal money by making it appear legitimate.

49
New cards

Smurfing

Breaking large illegal transactions into smaller ones to avoid detection.

50
New cards

Delivery Methods

Ways malware spreads to devices.

51
New cards

Phishing (Malware context)

Malicious links or attachments sent through fake emails.

52
New cards

Spear Phishing (Malware context)

Targeted malicious messages designed for a specific victim.

53
New cards

Remote Desktop

Hackers gain control of a computer from a distance to install malware or steal data.