1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
the common law definition of _____ (and the one used by the FBI) is “the taking or attempting to take anything of value from the care, custody or control of a person or persons by force or threat of force or violence and/or by putting the victim in fear”
Robbery
Criminologist Cathy Widom hypothesized that a childhood history of physical abuse predisposes the survivor to becoming violent themselves in later years. Her hypothesis commonly is called ____
The cycle of violence
____ refers to sexual relations between an underage minor and an adult
Statutory rape
____ can also be a result of otherwise legal behavior that is performed in a negligent manner and results in death.
Involuntary manslaughter
Armed military bands, typically located in rural areas, that attack officials to destabilize the existing government are known as ____.
Guerillas
David Fahey, a businessman in a medium-sized Ohio town, decides to run for city council. He has a master’s degree, is married, has three sons, and is a respected member of society. He fears he may lose the upcoming city council election to a newcomer, Keith Joseph, who recently moved back to town after establishing himself in South Carolina. David hires his best friend, John, to call in a bomb threat on election day to a precinct where his rival, Keith Joseph, is expected to garner majority support. This act is an example of _____.
Election fraud
Which of the following is a term describing terrorism that occurs when a repressive government regime forces its citizens into obedience?
State-sponsored terrorism
Although some political crimes are committed by people who oppose the state, others are perpetrated by state authorities against the people they are supposed to serve; this is referred to as _____
State political crime
Which term involves using illegal means to cheat an organizations, its consumers, or both, on a regular basis?
Chiseling
_____ are professional shoplifters who steal with the intent to resell merchandise to fences or pawn shops.
Boosters
______ rely on the threat of economic sanctions or civil penalties (rather than criminal cases) to control potential violators.
Compliance strategies
The three views of green-collar crime include environmental justice, legalistic, and _____.
Biocentric
The ______ view considers the person engaging in prostitution a victim of male dominance and a clear example of gender exploitation.
Sexual equality
Drug addiction does not turn _____ persons who commit crimes into violent persons who commit crimes, but active addiction increases the frequency of criminal activity.
Nonviolent
According to the theory of social harm, immoral acts can be distinguished from crimes on the basis of the _____ they cause.
Injury
Tying drug use to factors such as racial prejudice, low self-esteem, poor socioeconomic status, and the high levels of mistrust, negativism, and defiance found in impoverished areas describes which casual explanation of drug use?
Subcultural view
The Trafficking Victims Protection Act (TVPA) created the first comprehensive federal law to address trafficking. The law provides a three-pronged approach: prevention, protection and _____
Prosecution
______ organized crime is usually structured along hierarchical lines - a chieftain supported by close advisers, lower subordinates, and so on.
Transnational
Cassandra receives an email telling her that a friend suggested her for a work-from-home job. The email contains enough personal info that Cassandra believes the offer is legitimate and opens the attachments, which, unbeknownst to her, allow malwear to harvest her personal information. Cassandra was a victim of ______
Spear-phishing
Chinese hackers used a phishing email to breach a contractor for the US Office of Personnel Management, which exposed the records of 21 million civil service employees. This is an example of _____
Cyberespionage