Criminology MOd 11

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/112

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

113 Terms

1
New cards

All of the following are considered parts of a career-criminal's stages of activity:

break-in period

burnout period

stable period

2
New cards

Ken is a shoplifter who steals items that he then sells for the money. He is a(n) ________.

booster

3
New cards

________ is known as a "cold" crime because there is usually very little physical evidence to link the offender to the offense.

Burglary

4
New cards

In a ________, a person causes their own death, whereas in a ________ a person causes the death of another individual without legal justification.

suicide; criminal homicide

5
New cards

In 2002, ________ led to the loss of 33.6 billion dollars in property.

shoplifting

6
New cards

The increase in demand for crack cocaine is connected with a(n) ________ in robberies and a(n) ________ in burglaries.

increase; decrease

7
New cards

A professional car thief who focuses on luxury vehicles is known as a ________.

jockey

8
New cards

Violent crime can be distinguished from property crime by the focus (whether on a person or a thing), and the

use of force

9
New cards

________ is an example of a crime which can be considered as both a violent crime and a property crime.

Arson

10
New cards

The majority of vehicle theft in the United States occurs while the victim is ________.

asleep

11
New cards

Larceny is different from other types of crimes in that it ________.

does not involve force.

12
New cards

The vast majority of those involved in arson are ________.

juvenile offenders

13
New cards

Laura steals items of small monetary value for her own personal gratification. She is a(n) ________.

shoplifter

14
New cards

________ of household burglaries involve some type of economic loss.

Eighty-five percent

15
New cards

In the context of law enforcement, a fence is ________.

someone who buys and then resells stolen property.

16
New cards

Dustin has been in and out of jail for burglary, auto theft, and other theft-related offenses. Dustin can best be classified as a ________.

persistent thief

17
New cards

Burglary can be differentiated from other forms of theft by the fact that it requires ________ a dwelling or structure in order to commit the crime.

entering

18
New cards

The main difference between violent offenders and property offenders is ________.

both types of crimes have varying levels of planning involved.

19
New cards

Heroin falls into which category of illegal drugs?

narcotics

20
New cards

Which of the following factors reduces criminal penalties associated with the personal possession of a controlled substance?

decriminalization

21
New cards

Manufacturing, distributing, dispensing, importing, and exporting (or possession with intent to do the same) of a controlled substance or a counterfeit substance is called ________.

drug trafficking

22
New cards

Which illicit drug was most commonly used in 2002?

marijuana

23
New cards

Why are cocaine, LSD, and heroin easy to smuggle into the United States?

They are sold in small quantities and mixed with other substances to be sold on the streets.

24
New cards

Research on the correlation between drugs and crime has shown that ________.

crime increases with increased drug-usage.

25
New cards

Which study indicates that lucrative drug profits have the potential to corrupt official agents?

the Mollen Commission (1964)

26
New cards

Which of the following types of substances stimulate the central nervous system, increase the heart rate, elevate blood pressure, and increase mental activity?

stimulants

27
New cards

Most cocaine is brought into the United States using ________.

maritime vessels

28
New cards

What is the focus of the national drug control strategy?

to educate the young people about the dangers of illegal drugs, alcohol, and tobacco

29
New cards

Crimes in which drugs contribute to the offense are known as ________.

drug-related crimes

30
New cards

Which of the following policies do decriminalization and legalization belong to?

the alternative drug policy

31
New cards

During the 1960s and the 1970s drug abuse was linked with ________.

the psychoactive substances associated with the hippie movement

32
New cards

Drug users are more likely to have a criminal record than non-drug users. This indicates ________.

the relationship between drugs and crime

33
New cards

Which act established the office of the National Drug Control Policy?

the Anti Drug Abuse Act

34
New cards

Which program follows heroin trafficking?

heroin signature program

35
New cards

Which of the following types of criminals are generally in the age group of 16-25?

computer criminals

36
New cards

A scam that uses official-looking e-mail messages to steal valuable information is termed as ________.

phishing

37
New cards

What is the primary goal of computer criminals?

access to web sites and computer networks

38
New cards

Equity trading based on confidential information about the important events that may affect the price of the issue being traded is known as ________.

insider trading

39
New cards

Who is usually found to be in control of the most lucrative rackets in their cities?

Mafia leaders

40
New cards

In a technologically advanced age, what needs to be redefined in the context of the First and Fourth Amendments?

right to free speech, papers, communication, and home

41
New cards

One of the federal statutes of relevance to crime committed with or against computer equipment and software is ________.

the Cyber Security Enhancement Act Of 2002

42
New cards

Which of the following are organized criminal activities?

supplying illegal goods and services

43
New cards

Unauthorized and illegal copying of software programs, Internet piracy, and software counterfeiting come under the category of ________.

software piracy

44
New cards

The application of DNA technology is reliant on using information found through a person's ________.

bodily fluids or tissues

45
New cards

In the category of white collar crime, ________ includes commercial loan fraud, check fraud, counterfeit negotiable instruments, mortgage fraud, check kiting, and false credit applications.

financial institution fraud

46
New cards

Who signed the Sarbanes-Oxley corporate reform bill?

President George W. Bush

47
New cards

Internal computer crimes (malware), Internet and telecommunications crimes, support of criminal enterprises computer-manipulation crimes, hardware, software, and information theft are several kinds of ________.

technology crimes

48
New cards

Which of the following criminal groups are involved in loan sharking, large scale drug trafficking, gambling, and prostitution?

organized criminal groups

49
New cards

"Theories about theories and the theorizing process which they suggest may help to meld existing theories." What is defined in above statement?

Metatheories

50
New cards

Who recommended the adoption of victim impact statements?

the President's Task Force on Victims of Crime

51
New cards

Which of the following theories attempts to merge concepts drawn from different sources?

integrated theories

52
New cards

________ will be more oriented toward explaining white collar crimes.

Future crime theories

53
New cards

Neil was found guilty of petit larceny, and as part of his punishment he was ordered to repay the victim for the stolen property. What was the term for Neil's act of repayment?

restitution

54
New cards

A written document which describes the losses, suffering, and trauma experienced by the victim of a crime or survivors of the victim is termed as ________.

victim-impact statement

55
New cards

Which of the following is one of the issues likely to concern crime control policies in the future?

new criminal groups

56
New cards

Which administration developed policy initiatives in the areas of police, courts, and corrections with a focus on improving the justice system practices and reinstating the law's role in civilized governance?

the Hoover Administration

57
New cards

Which of the following is a punishment through imposed responsibility - in particular, payment of compensation by the offender to the victim?

restitution

58
New cards

What idea rests strictly upon the liability theory, government negligence theory, equal protection theory, humanitarian theory, social welfare theory, crime prevention theory, and political motives theory?

victim compensation

59
New cards

Which of the following rights is provided to the victim in the Crime Victims' Rights Act?

right to be reasonably protected from the accused

60
New cards

Which of the following is the earliest legal code describing the requirement of restitution?

Code of Hammurabi

61
New cards

The criminals of the future are expected to have what particular qualities?

Technical sophistication and a systems approach to crime

62
New cards

A professional thief can be characterized by all of the following EXCEPT ________.

spending extended periods of time incarcerated.

63
New cards

Which of the following is NOT considered high risk for burglary?

college campuses

64
New cards

What is the foremost priority of the National Drug-Control Policy?

reducing drug abuse

65
New cards

________ are classified into the following seven categories: stimulants, depressants, cannabis, narcotics, hallucinogens, anabolic steroids, and inhalants.

Controlled substances

66
New cards

Which recent legalization enlists iodine as a controlled substance?

Comprehensive Methamphetamine Control Act (CMCA)

67
New cards

When was drug abuse first associated with artists and fringe groups?

1800s and the early 1900s

68
New cards

Who investigates the violation of the Federal Computer Fraud and Abuse Act of 1984?

National Computer Crime Squad

69
New cards

Which of the following organizations focuses exclusively on the issues raised by computer and intellectual property crime?

Computer Crime and Intellectual Property Section under the U S Department of Justice

70
New cards

In early 20th century, which of the following gangs specialized in the intimidation of Italian immigrants?

the Jewish and Irish gang

71
New cards

Which of the following is the simplest technique to make future predictions based on the projection of existing trends?

trend extrapolation

72
New cards

What type of authority does the Crime Victims' Rights Act provide to the victim?

legal

73
New cards

There is a problem, research is conducted on the problem, recommendations are made based on the research, and recommended actions are taken, are the four assumptions of ________.

criminologists

74
New cards

economic crime

An act committed in violation of the criminal law for the purpose of monetary gain and financial benefits.

75
New cards

blue collar crimes

Traditional common law theft crimes such as larceny, burglary, and arson.

76
New cards

white-collar crimes

Crimes of business enterprise such as embezzlement, price fixing, and bribery.

77
New cards

green collar crimes

Crimes that affect the environment.

78
New cards

Prohibition

The period from 1919 until 1933, when the Eighteenth Amendment to the US Constitution outlawed the sale of alcohol; also known as the "noble experiment."

79
New cards

Cybercrime

the theft and/or destruction of information, resourcse, or funds via computers, computer networks, or the internet

80
New cards

transnational organized crime

Criminal conspiracies that cross national and international borders and involve the planning and execution of illicit ventures by groups or networks of individuals working in more than one country.

81
New cards

cyber theft

The use of computer networks for criminal profits. Copyright infringement, identity theft, and Internet securities fraud are examples of cybertheft.

82
New cards

cyber vandalism

Malicious attacks aimed at disrupting, defacing, and destroying technology.

83
New cards

warez

A term computer hackers and software pirates use to describe a game or application that is made available for use on the Internet in violation of its copyright protection.

84
New cards

salami slice fraud

Illegally removing small sums from the balances of a large number of accounts and converting them for personal use

85
New cards

denial-of-service attack

Extorting money from an Internet service user by threatening to prevent the user from having access to the service. Examples include:
• Attempts to flood a computer network, thereby preventing legitimate network traffic
• Attempts to disrupt connections within a computer network, thereby preventing
access to a service
• Attempts to prevent a particular individual from accessing a service
• Attempts to disrupt service to a specific system or person

86
New cards

pump and dump

Placing deceptive information online to get unsuspecting investors interested in a stock while those spreading the information sell previously purchased stock at an inflated price.

87
New cards

cyber smear

Negative information is spread online about a stock, driving down its price and enabling people to buy it at an artificially low price.

88
New cards

identity theft

Using the Internet to steal someone's identity and/or impersonate the victim in order to conduct illicit transactions such as committing fraud using the victim's name and identity.

89
New cards

phishing

The creation of false e-mails or websites that look legitimate but are designed to gain illegal access to a victim's personal information.

90
New cards

etailing fraud

Illegally buying and/or selling merchandise on the Internet.

91
New cards

computer virus

A program that disrupts or destroys existing programs and networks, causing them to perform the task for which the virus was designed.

92
New cards

malware

A malicious software program.

93
New cards

computer worms

Programs that attack computer networks (or the Internet) by self-replicating and sending themselves to other users, generally via e-mail without the aid of the operator.

94
New cards

Trojan horse

A computer program that looks like a benign application but contains illicit codes that can damage the system operations. Though Trojan horses do not replicate themselves like viruses, they can be just as destructive.

95
New cards

logic bomb

A program that is secretly attached to a computer system, monitors the network's work output, and waits for a particular signal such as a date to appear. Also called a slag code, it is a type of delayed action virus which may be set off when a program user makes certain input that sets it in motion. A logic bomb may cause a variety of problems ranging from displaying or printing a spurious message to deleting or corrupting data.

96
New cards

spam

An unsolicited advertisement or promotional material, typically in the form of an unwanted e-mail message. While e-mail is the most common form of spam, it can also be sent via instant messaging, newsgroup, and mobile phone messaging, among other media.

97
New cards

website defacement

A type of cybervandalism that occurs when a computer hacker intrudes on another person's website by inserting or substituting codes that expose visitors to the site to misleading or provocative information. Defacement can range from installing humorous graffiti to sabotaging or corrupting the site.

98
New cards

cyberstalking

cyberstalking
Use of the Internet, e-mail, or other electronic communications devices to stalk another person. Some cyberstalkers pursue minors through online chat rooms; others harass their victims electronically.

99
New cards

cyberspying

Illegally using the Internet to gather information that is considered private and confidential.

100
New cards

cyberespionage

Efforts by intelligence agencies to penetrate computer networks of an enemy nation in order to steal important data.