Criminology quizzes

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

the common law definition of _____ (and the one used by the FBI) is “the taking or attempting to take anything of value from the care, custody or control of a person or persons by force or threat of force or violence and/or by putting the victim in fear”

Robbery

2
New cards

Criminologist Cathy Widom hypothesized that a childhood history of physical abuse predisposes the survivor to becoming violent themselves in later years. Her hypothesis commonly is called ____

The cycle of violence

3
New cards

____ refers to sexual relations between an underage minor and an adult

Statutory rape

4
New cards

____ can also be a result of otherwise legal behavior that is performed in a negligent manner and results in death.

Involuntary manslaughter

5
New cards

Armed military bands, typically located in rural areas, that attack officials to destabilize the existing government are known as ____.

Guerillas

6
New cards

David Fahey, a businessman in a medium-sized Ohio town, decides to run for city council. He has a master’s degree, is married, has three sons, and is a respected member of society. He fears he may lose the upcoming city council election to a newcomer, Keith Joseph, who recently moved back to town after establishing himself in South Carolina. David hires his best friend, John, to call in a bomb threat on election day to a precinct where his rival, Keith Joseph, is expected to garner majority support. This act is an example of _____.

Election fraud

7
New cards

Which of the following is a term describing terrorism that occurs when a repressive government regime forces its citizens into obedience?

State-sponsored terrorism

8
New cards

Although some political crimes are committed by people who oppose the state, others are perpetrated by state authorities against the people they are supposed to serve; this is referred to as _____

State political crime

9
New cards

Which term involves using illegal means to cheat an organizations, its consumers, or both, on a regular basis?

Chiseling

10
New cards

_____ are professional shoplifters who steal with the intent to resell merchandise to fences or pawn shops.

Boosters

11
New cards

______ rely on the threat of economic sanctions or civil penalties (rather than criminal cases) to control potential violators.

Compliance strategies

12
New cards

The three views of green-collar crime include environmental justice, legalistic, and _____.

Biocentric

13
New cards

The ______ view considers the person engaging in prostitution a victim of male dominance and a clear example of gender exploitation.

Sexual equality

14
New cards

Drug addiction does not turn _____ persons who commit crimes into violent persons who commit crimes, but active addiction increases the frequency of criminal activity.

Nonviolent

15
New cards

According to the theory of social harm, immoral acts can be distinguished from crimes on the basis of the _____ they cause.

Injury

16
New cards

Tying drug use to factors such as racial prejudice, low self-esteem, poor socioeconomic status, and the high levels of mistrust, negativism, and defiance found in impoverished areas describes which casual explanation of drug use?

Subcultural view

17
New cards

The Trafficking Victims Protection Act (TVPA) created the first comprehensive federal law to address trafficking. The law provides a three-pronged approach: prevention, protection and _____

Prosecution

18
New cards

______ organized crime is usually structured along hierarchical lines - a chieftain supported by close advisers, lower subordinates, and so on.

Transnational

19
New cards

Cassandra receives an email telling her that a friend suggested her for a work-from-home job. The email contains enough personal info that Cassandra believes the offer is legitimate and opens the attachments, which, unbeknownst to her, allow malwear to harvest her personal information. Cassandra was a victim of ______

Spear-phishing

20
New cards

Chinese hackers used a phishing email to breach a contractor for the US Office of Personnel Management, which exposed the records of 21 million civil service employees. This is an example of _____

Cyberespionage