intro to crimj final exam- coastal carolina university

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/75

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

76 Terms

1
New cards

arson

the willful, malicious burning of a home, building, or vehicle

2
New cards

blue-collar crimes

traditional common-law theft crimes such as larceny, burglary, and arson

3
New cards

booster (heel)

professional shoplifter who steals with the intention of reselling stolen merchandise

4
New cards

booster box

device with a false bottom that can be opened and shut by a professional shoplifter, lined with metal or some other substance to prevent security tags from setting off alarms, placed over merchandise

5
New cards

burglary

entering a home by force, threat, or deception with intent to commit a crime

6
New cards

car cloning

using a vehicle identification number (VIN) from a legally registered car to hide the identity of a stolen vehicle for resale

7
New cards

chiseling

using illegal means to cheat an organization, its consumers, or both, on a regular basis

8
New cards

compliance strategies

methods of controlling white-collar crime that rely on the threat of economic sanctions rather than civil penalties to control potential violators, creating a marketplace incentive to obey the law

9
New cards

confidence game

a swindle, usually involving a get-rich-quick scheme, often with illegal overtones, so that the victim will be afraid or embarrassed to call the police

10
New cards

constructive possession

a legal fiction that applies to situations in which persons voluntarily give up physical custody of their property but still retain legal ownership

11
New cards

corporate (organizational) crime

powerful institutions or their representatives willfully violate the laws that restrain these institutions from doing social harm or require them to do social good

12
New cards

criminal environment pollution

a crime involving the intentional or negligent discharge into the biosystem of a toxic waste that destroys plant or animal life

13
New cards

deterrence strategies

methods of controlling white-collar crime that rely on the punishment of individual offenders to deter other would-be violators

14
New cards

economic crime

an act committed in violation of the criminal law for the purpose of monetary gain and financial benefits

15
New cards

embezzlement

taking the possessions of another (fraudulent conversion) that have been placed in the thief's lawful possession for safekeeping, such as a bank teller misappropriating deposits or a stockbroker making off with a customer's account

16
New cards

exploitation

forcing victims to pay for services or contracts to which they have a clear right

17
New cards

false pretenses (fraud)

misrepresenting a fact in a way that causes a deceived victim to give money or property to the offender

18
New cards

fence

a buyer and seller of stolen merchandise

19
New cards

grand larceny

theft of money or property from substantial value, punished as a felony

20
New cards

green-collar crimes

crimes that damage the environment and violate laws designed for its protection

21
New cards

influence peddling

using one's institutional position to grant favors and sell information to which one's co-conspirators are not entitled

22
New cards

insider trading

illegal buying of stock in a company on the basis of information provided by someone who has a fiduciary interest in the company

23
New cards

larceny

taking for one's own use the property of another, by means other than force or threats on the victim or forcibly breaking into a person's home or workplace; simple theft

24
New cards

mark

the target of a con artist

25
New cards

merchant privilege laws

legislation that protects retailers and their employees from lawsuits if they arrest or detain a suspected shoplifter on reasonable grounds

26
New cards

naive check forgers

amateurs who cash bad checks because of some financial crisis but have little identification with a criminal subculture

27
New cards

occasional criminals

offenders who do not define themselves by a criminal role or view themselves as committed career criminals but are willing to commit crime if the occasion arises

28
New cards

petit (petty) larceny

theft of a small amount of money or property, punished as a misdemeanor

29
New cards

pigeon drop

a con game in which a package or wallet containing money is "found" by a con artist, and the victims are bilked out of money they are asked to put up as collateral

30
New cards

professional criminals

offenders who make a significant portion of their income from crime

31
New cards

sherman antitrust act

federal law that subjects to criminal or civil sanctions any person "who shall make any contract or engage in any combination or conspiracy" in restraint of interstate commerce

32
New cards

shoplifting

the taking of goods from retail stores

33
New cards

situational inducement

short-term influence on a person's behavior, such as financial problems or peer pressure, which increases risk taking

34
New cards

snitch

amateur shoplifter who does not self-identify as a thief but who systematically steals merchandise for personal use

35
New cards

systematic forgers

professionals who make a living by passing bad checks

36
New cards

target hardening strategies

making one's home or business crime proof through the use of locks, bars, alarms, and other devices

37
New cards

target removal strategies

displaying dummy or disabled goods as a means of preventing shoplifting

38
New cards

theft

the intentional taking, keeping, or using of another's property without authorization or permission

39
New cards

white-collar crimes

crimes of business enterprise such as embezzlement, price fixing, and bribery

40
New cards

binge drinking

having five or more drinks on the same occasion (that is, at the same time or within a couple hours of each other

41
New cards

drug-dependent personality

a personal trait characterized by a pervasive psychological dependence on mood-altering substances

42
New cards

moral entrepreneur

a person who creates moral rules, which thus reflect the values of those in power, rather than any objective, universal standards of right and wrong

43
New cards

narcotic

a drug that produces sleep and relieves pain, such as heroin, morphine, and opium; a habit-forming drug

44
New cards

obscenity

material that violates community standards or morality or decency and has no redeeming social value

45
New cards

paraphilia

bizarre or abnormal sexual practices that may involve nonhuman objects, humiliation, or children

46
New cards

pornography

sexually explicit books, magazines, films, and DVDs intended to provide sexual titillation and excitement for paying customers

47
New cards

prohibition

the period from 1919 until 1933, when the eighteenth amendment to the united states constitution outlawed the sale of alcohol; also known as the "noble experiment"

48
New cards

prostitution

the granting of non marital sexual access for remuneration

49
New cards

public order crime

behavior that is outlawed because it threatens the general well-being of society and challenges its accepted moral principles

50
New cards

social harm

the injury caused to others by willful wrongful conduct

51
New cards

temperance movement

the drive to prohibit the sale of alcohol in the united states, culminating in ratification of the eighteenth amendment in 1919

52
New cards

victimless crime

public order crime that violates the moral order but has no specific victim other than society as a whole

53
New cards

atm skimming*

using an electronic device or camera on an atm that copies information from a bank card's magnetic strip whenever a computer uses the machine or photographs their key strokes

54
New cards

computer worms

programs that attack computer networks (or the internet) by self-replicating and sending themselves o other users, generally via email, without the aid of the operator

55
New cards

cyberbullying

willful and repeated harm inflicted through the medium of electronic text

56
New cards

cybercrime

the use of modern technology for criminal purposes

57
New cards

cyberespionage

efforts by intelligence agencies to penetrate computer networks of an enemy nation in order to steal important data

58
New cards

cyberspying

illegally using the internet to gather information that is considered private and confidential

59
New cards

cyberstalking

use of the internet, email, or other electronic communications devices to stalk another person. some cyberstalkers pursue minors through online chat rooms; others harass their victims electronically

60
New cards

cyberterrorism

internet attacks against an enemy nation's technological infrastructure.

61
New cards

cybertheft

use of computer networks for criminal profits. illegal copyright infringement, identity theft, and internet securities fraud are examples of cybertheft

62
New cards

cybervandalism

malicious attacks aimed at disrupting, defacing, and destroying technology

63
New cards

cyberwar

using cyberspace for acts of war, including spying and disrupting an enemy's computer network

64
New cards

darknet

computer network that can only be accessed using nonstandard communications protocols and ports, with restricted access that can only be opened with specific software configurations

65
New cards

denial-of-service attack (dos)

extorting money from an internet service user by threatening to prevent the user from having access to the service

66
New cards

etailing fraud

illegally buying and/or selling merchandise on the internet

67
New cards

identity theft

using the internet to steal someone's identity and/or impersonate the victim in order to conduct illicit transactions such as committing fraud using the victim's name and identity

68
New cards

logic bomb

a program that is secretly attached to a computer system, monitors the network's output, and waits for a particular signal such as a date to appear. also called a slag code, it is a type of delayed action virus that may be set off when a program user makes certain input that sets it in motion. a logic bomb may cause a variety of problems ranging from displaying or printing a spurious message to deleting or corrupting data

69
New cards

malware

a malicious software program

70
New cards

phishing

sometimes called carding or brand spoofing, phishing is a scam where the perpetrator sends out emails appearing to come from legitimate web enterprises such as ebay, amazon, or paypal in an effort to get the recipient to reveal personal and financial information

71
New cards

racketeer influenced and corrupt organizations (rico) act

federal legislation that enables prosecutors to bring additional criminal or civil charges against people whose multiple criminal acts constitute a conspiracy. rico features monetary penalties that allow the government to confiscate all profits derived from criminal activities. originally intended to be used against organized criminals, rico has also been used against white-collar criminals

72
New cards

spear-phishing

targeting specific victims, sending them emails that contain accurate information about their lives obtained from social networking sites, and asking them to open an email attachment from malware harvests details such as the victim's usernames and passwords, bank account details, credit card numbers, and other personal information

73
New cards

transnational organized crime

a criminal enterprise that involves the planning and execution of the distribution of illicit materials or services by groups or networks of individuals working in more than one country

74
New cards

trojan horse

a computer program that looks like a benign application but contains illicit codes that can damage the system operations. though trojan horses do not replicate themselves like viruses, they can be just as destructive

75
New cards

warez

a term computer hackers and software pirates use to describe a game or application that is made available for use on the internet in violation of its copyright protection

76
New cards

website defacement

a type of cybervandalism that occurs when a computer hacker intrudes on another person's website by inserting or substituting codes that expose visitors to the site to misleading or provocative information. defacement can range from installing humorous graffiti to sabotaging or corrupting the site