Criminology Chapter 1 Test
The first federal statute that explicitly penalized industrial espionage was passed in _____.
1996
What percentage of reported index crime is cleared by arrest each year?
20 %
A recent study on peer relations and crime found that kids involved in delinquency are __________ times more likely that non-offenders to associate with delinquent youth.
5
According to the National Institute on Alcohol Abuse and Alcoholism, almost ________ percent of people 18 years and older report they drank alcohol.
55
Surveys show that more than __________ percent of the general public has been victimized by crime in their lifetime.
75
According to critical feminist criminologists, crime is a vehicle for men to ___________ because it separates them from the weak and allows them to demonstrate physical bravery.
According to critical feminist criminologists, crime is a vehicle for men to ___________ because it separates them from the weak and allows them to demonstrate physical bravery.
_________ rape is a variety of forcible rape that occurs when sexuality becomes a means of expressing and discharging pent-up rage.
Anger
Election fraud includes a variety of behaviors designed to give a candidate or his/her party an unfair advantage. Which one of the following is NOT considered to be one of these types of behaviors?
Concealment
_______________ theory suggests that a strong self-image insulates a youth from the pressures and pulls of negative influences found in their environment.
Containment
__________ refers to the use of the Internet, email or other electronic devices to repeatedly harass or threaten another person.
Cyberstalking
According to your author, which of the following is NOT one of the major positive policy initiatives that have resulted from the work on developmental theories?
DARE
Which of the following is NOT one the positive social programs that have resulted from the social structure theories?
DARE
____________ refers to the practice of obtaining information about a government, organization, or society that is considered secret or confidential without the permission of the holder of the information.
Espionage
___________ theory states that the competition for scarce resources has influenced and shaped the human species.
Evolutionary
________ occurs when the victim has a clear right to expect a service and the offender threatens to withhold the service unless an additional payment or bribe is forthcoming.
Exploitation
In 1973, critical theory was given a powerful academic boost when British scholars Taylor, Walton, and Young published __________.
In 1973, critical theory was given a powerful academic boost when British scholars Taylor, Walton, and Young published __________.
__________ crimes are those committed by indigent people to compensate for the lack of legitimate economic opportunity.
Instrumental
Which of the following is NOT an explanation for the "aging out of crime" phenomenon?
It is a deterrent effect of the criminal justice system.
The historical roots of critical criminology can be traced back to the work of ____________.
Karl Marx
______________ precipitation occurs because of personal or social characteristics that make victims attractive targets.
Passive
____________ theory suggests that humanism can reduce crime and advocates conflict resolution strategies to reduce crime.
Peacemaking
Criminologists who devote themselves to the sociology of law engage in a number of different tasks. Which of the following is one of these tasks?
Researching the impact of legal change on society
The mafia originated in __________ in about 1860.
Sicily
__________ law is a branch of criminal law that defines both crimes and their corresponding punishments.
Substantive
_______________ usually involves a political crime that emphasizes violence as a mechanism to promote change.
Terrorism
_____________ is a term used to describe an act of disloyalty to one's nation or state.
Treason
The most important crime data collected from local law enforcement by the Federal Bureau of Investigation comes from the __________.
Uniform Crime Reports
__________ is a term used to describe the process of illegally obtaining software and then "cracking" or "ripping" its copyright protections before posting it on the Internet for other members to use for free or for a price.
Warez
According to political scientist James Q. Wilson in his classic 1975 book entitled Thinking About Crime, whom does he suggest commits a vast majority of crime?
Wicked
In the U.S., what percentage of evening calls to police departments involve domestic disputes?
a. 60-70 percent
According to historian David Courtwright, an authority on sociocultural violence, what has accounted for high violent crime rates in the United States?
a. A frontier culture characterized by racism and personal honor
What is the main contention of Marcus Felson's notion about cars and crime?
a. Cars transport teens outside parental control.
Which of the following is NOT one of the major federal environmental laws used to combat green-collar crime in the U.S.?
a. Chemical Reduction and Control Act
__________ is a type of white-collar crime that includes price-fixing, false advertising, and anti-trust violations.
a. Corporate crime
Congress began treating computer-related crime as a distinct federal offense with the passage of the ________________ Act in 1984.
a. Counterfeit Access Device and Computer Fraud and Abuse
Which of the following statements correctly applies to the crime of stalking?
a. Many stalking cases are dropped by the courts even though the stalkers often have extensive criminal histories.
_____________ theories maintain that all people have the potential to violate the law and that modern society present many opportunities for illegal activity.
a. Social control
________________ refers to the interactions people have with various organizations, institutions, and processes of society.
a. Socialization
An investment fraud that involves the purported returns to existing investors from funds contributed by new investors is called ____________.
a. a Ponzi scheme
Content analysis of web page defacements indicate that __________.
a. about 70 percent are pranks by hackers
According to your text, the link between substance abuse and violence appears in multiple forms. Which of the following is NOT one of these forms?
a. breakdown of social institutions
Who did Sutherland suggest has the greatest impact on teaching a person criminal behavior?
a. close friends or relatives
Psychologists with a __________ focus on mental health processes and how people perceive and mentally represent the world around them.
a. cognitive perspective
What term does William Julius Wilson use to describe the effect of middle- and working-class families fleeing inner-city areas and leaving the impoverished masses behind?
a. concentration effect
According to Cohen's deviant subculture theory, which of the following subculture categories is the most common response to middle-class rejection?
a. corner boy
The view that business enterprises cause white-collar crime by placing excessive demands on employees is known as the __________.
a. corporate culture view
The intentional or negligent discharge of a toxic or contaminating substance into the bio system that is known to have an adverse effect on the natural environment or life defines __________.
a. criminal environmental pollution
Both life course and latent trait theories maintain that most persistent offenders are ___________, beginning their delinquent careers in their adolescence and persisting into adulthood.
a. early starters
Which factor did the Glueck's research identify as being the most important to persistent offending?
a. family relations
Where did skilled thieves congregate in large cities, such as London, during the 18th century?
a. flash houses
When looking at gender and desistance, research indicates that __________.
a. for females, the path to crime is different than for males
A form of contemporary transnational crime that involves buying and selling human beings with the aim of exploiting them in such activities as prostitution, forced labor, or slavery is known as __________.
a. human trafficking
According to Gottfredson and Hirschi's general theory of crime, what are the two traits linked to the propensity to commit crime?
a. impulsive personality and lack of self control
One of the biggest concerns regarding General Strain Theory is its___________.
a. inability to explain gender differences in the crime rate
David Huh's study of delinquency and parenting found that __________.
a. increases in adolescent behavior problems result in a decrease in parental control and support
According to your text, all of the following are considered to be major forms of cybervandalism except __________.
a. logic bombs
Who is more likely to commit an act of workplace violence?
a. middle-aged white males
In her classic 1960 study of shoplifting, Mary Owen Cameron discovered that_____________.
a. most are amateurs
According to Wright and Becker, most professional burglars are motivated by the _________.
a. need for cash in order to get high
A large majority of child abuse cases in the U.S. involve ________ as the primary offenders.
a. parents
Empirical evidence supports the view that labeling __________.
a. plays a significant role in persistent offending
The Department of Homeland Security is engaged in all of the following activities except _________.
a. preventing money laundering
According to Edwin Lemert, __________ involves crimes that have very little influence on the actor and can be quickly forgotten.
a. primary deviance
An emerging form of violent emotional abuse in which a partner tries to damage a person's relationship with friends by spreading false rumors or revealing private information is _______.
a. relational aggression
Sociologist Joseph Gusfield asserts that the purpose of outlawing immoral acts is to _______.
a. show the moral superiority of those who condemn the acts over those who partake of them
The perception by community members that the outside world has set out to destroy the neighborhood is referred to as __________.
a. siege mentality
Which theory holds that the conditions within the urban environment will affect crime rates?
a. social disorganization theory
Which one of the following is NOT one of the theoretical explanations for terrorism discussed in the text?
a. social learning
By integrating the concepts of ____________ and criminality, Gottfredson and Hirschi help explain why some people who lack self-control can escape criminality, and conversely, why some people who have self-control might not escape.
a. socialization
According to the concept of _______________, kids who have the propensity to commit crime will find that this latent trait profoundly and permanently disrupts normal socialization.
a. state dependence
The type of crime arising from the efforts of the government to maintain power or uphold the race and gender advantages of those who support the government is _________.
a. state political crime
Sexual relations between an underage individual and an adult is defined as _________.
a. statutory rape
According to recent statistics, most child abuse is committed by __________.
a. the child's mother
Which of the following factors does NOT determine whether a theft will be considered as petty or grand larceny in most state statutes?
a. the insurance settlement
The life careers that alter the development of a criminal career are referred to commonly as _______________.
a. turning points
The use of __________ is controversial because there seems to be no agreement on whether it is torture or a relatively harmless instrument of interrogation.
a. water boarding
The ____________ view of terrorism states that a lack of economic opportunity and recessionary economies are positively connected with acts of terrorism.
alienation
Most credit card abuse is the work of __________.
amateurs
According to ____________ theory, for a variety of genetic and environmental reasons, some people's brains function differently in response to environmental stimuli including responses centered upon thrill seeking criminal actions.
arousal
Sociologist Wayne Wooden refers to a juvenile between the ages of 4 and 9 who starts fires because his or her parents are careless as a __________ fire setter.
b. "playing with matches"
According to the Uniform Crime Report, the gender ratio for arrests for prostitution is __________.
b. 2 to 1 - female to male
Which of the following Constitutional Amendments repealed the prohibition of alcohol?
b. 21st Amendment
Which of the following statements is FALSE regarding the crime of assault?
b. Assault victims tend to be female.
____________, considered to be the founder of sociology, applied scientific methods to the study of society.
b. Auguste Comte
____________ hypothesized that a certain segment of society was in fact "born criminal" and actually resembled prehistoric cavemen.
b. Cesare Lombroso
Which of the following is NOT one of the three independent, yet overlapping branches of the social structure perspective on crime?
b. Conflict theory
The first international treaty to address the definition and enforcement of cybercrime is the __________.
b. Convention on Cybercrime
____________ theory focuses on the effects of gender inequality and the unequal power of men and women in a capitalist society.
b. Critical feminist
_______________ is a type of cybercrime which is typically designed to harass or extort money from legitimate users of Internet services by threatening to prevent access to service.
b. Denial of service attack
What is the name of Edwin Sutherland's classic social learning theory?
b. Differential association theory
____________ theory centers upon the premise that people in all strata of society share the same success goals but that those in the lower class have limited means of achieving them.
b. Differential opportunity
What is a common criticism of Hirschi's social control theory?
b. It does not adequately explain serious criminal acts.
________________ crimes are acts defined by law as criminal and committed by state officials, either elected or appointed, in pursuit of their jobs as government representatives.
b. State organized
A __________________ is a computer program that looks like a benign application but contains illicit codes that damage the system's operation.
b. Trojan horse
What large-scale event created fertile soil for the spread of conflict theory in the late 1960s and early 1970s?
b. Vietnam War
A peacemaking technique in which offenders, victims and other community members are brought together to formulate a sanction is called _________.
b. a sentencing circle
According to the Cambridge study in delinquent development, __________.
b. a significant number of delinquent youths have criminal fathers
Studies conducted in the United States show that __________.
b. children who experience abuse are more crime prone than children who do not experience abuse
The behavioral treatment which seeks to help patients recognize, avoid, and cope with the situations in which they are most likely to abuse drugs is __________.
b. cognitive-behavioral therapy
A typosquat website is a website where __________.
b. deliberately registered web names with typos direct people surfing the Internet to pornography sites by mistake
Evidence of the positive influence of labeling theory on the criminal justice system can be found in the development of _________.
b. diversion programs
One of the fastest and largest growing environmental problems is the disposal of millions of tons of obsolete electronic devices referred to commonly as ___________.
b. e-waste
The lower-class subculture in cultural deviance theories stresses __________.
b. fearlessness
Quetelet's pioneering research of crime in the 19th century _________:
b. identified many relationships between crime and social phenomena that serve as a basis for criminology today.
A type of Internet securities fraud where an individual makes securities recommendations and fails to disclose that they are being paid to disseminate their favorable opinions is _______.
b. illegal touting
The view that anomie pervades the U.S. culture because the drive for material wealth dominates and undermines social and community values is known as _________.
b. institutional anomie
A woman who employs prostitutes, supervises the behavior and receives a fee for her services is a __________.
b. madam
The project on human development in Chicago discovered that young teens who witness gun violence are __________ likely as non-witnesses to commit a violent crime themselves in the following years.
b. more than twice as
There is strong evidence linking the desire to rape with ___________________ disorder, a pattern of traits and behaviors that indicate infatuation and fixation with one's self to the exclusion of all others.
b. narcissistic personality
What type of non-professional fence would keep some of the booty for themselves and sell the rest in the neighborhood?
b. neighborhood hustlers
Which of the following is not a cost associated with victimization?
b. observer costs
According to Loeber and associates, which pathway to crime may begin with bullying, progress to physical fighting, and then progress to serious violence?
b. overt pathway
Research has indicated that antisocial behavior will be reduced if parents provide the type of structure that integrates children into families, while giving them the ability to assert their individuality and regulate their own behavior - a process referred to as _____________.
b. parent efficacy
According to the_________________ view, crime is one among a group of interrelated antisocial behaviors that cluster together and typically involve family dysfunction, sexual and physical abuse, substance abuse, smoking, precious sexuality, and suicide attempts.
b. problem behavior syndrome
The Minnesota Twin Family Study concluded that __________.
b. similarities between twins are due to genes, not the environment
Critical Criminologist Richard Quinney proclaimed that crime is a function of power relations and an inevitable result of ___________.
b. social conflict
According to your author, what distinguishes crimes from acts deemed immoral in our society?
b. social harm
According to Lawrence Kohlberg's Stages of Moral Development, criminal offenders are more likely to be classified in __________.
b. stages 1 and 2 of moral reasoning
Based on the typologies in your text, the typical armed robber is likely to __________.
b. target people walking along the street
Divisions of terrorist group affiliates, each of which may be functionally independent so that each member has little knowledge of the others are called __________.
b. terror cells
Which of the following domestic terrorists is not considered a right-wing political group?
b. the Black Panther party
According to Engels, working people commit crimes because __________.
b. their choice is a slow death of starvation or a speedy one at the hands of the law
According to the Rand Corporation, which of the following is not a step required to defeat Jihadist groups such as Al-Qaeda?
b. use of military force again Jihadist groups
According to the social process theories, __________.
b. whether or not one becomes a criminal depends on socialization
Some traits theorists believe ___________ conditions, including those that are genetically predetermined and those acquired through diet and environment, control and influence antisocial behavior.
biochemical
Which Constitutional Amendment protects the outlawing of material depicting nudity and sexual situations?
c. 1st Amendment
______________ is the willful and repeated harm inflicted through the medium of electronic text.
c. Cyberbullying
Which distinguished criminologist was the first to use the phrase "white-collar" crime?
c. Edwin Sutherland
The term terrorism first became popular as a result of the ______________.
c. French Revolution
Which historical debate did Travis Hirschi and Michael Hindelang resurrect after it had remained dormant for a great period of time?
c. IQ-crime debate
______________ is a type of cybercrime that occurs when a person uses the Internet to impersonate the victim to conduct illegal financial or other unauthorized transactions.
c. Identity theft
_______________ refers to the taking of another's life by the commission of a negligent act, without regard for the harm they may cause others.
c. Involuntary manslaughter
What is a common criticism of GTC theory in regard to explaining crime patterns?
c. It fails to address any ecological variation of crime.
_____________theory views criminality as a dynamic process influenced by a multitude of individual characteristics, traits, and social experiences.
c. Life course
Which of the explanations below does NOT explain why marriage helps people desist from crime?
c. Marriage increases income.
__________________ is a general term used to describe bizarre or abnormal sexual practices involving recurrent sexual urges.
c. Paraphilia
__________ suggests that girls are controlled more closely than boys in traditional, male-dominated households, and is used to explain gender differences in the crime rate as a function of both class and gender conflict.
c. Power-control theory
The _______________ Act is a federal law that outlaws conspiracies between corporations designed to control the marketplace and artificially maintain prices.
c. Sherman Antitrust
What argument do some criminologists use to dispute the tenets of conflict theory in regard to crime rates?
c. Some highly capitalist countries have low crime rates.
Most people arrested for burglary are __________.
c. White adults
The word "hooker" is derived from _____________.
c. a Civil War general
A malicious software program that disrupts or destroys existing programs is often referred to as _______________.
c. a computer virus
According to trajectory theory, this group's conventional behavior makes them deviant because offending is the norm.
c. abstainers
Most life course theories suggest that persistent criminal careers are affected mainly by_________.
c. age of onset
As a result of the famous Supreme Court decision in Lawrence v. Texas, __________.
c. all sodomy laws in the United States were declared unconstitutional and unenforceable
Restoration can be used for all of the following except __________.
c. as a retributive process
Children who show a developmentally inappropriate lack of attention, impulsivity, and excessive motor activity while asleep display symptoms of __________.
c. attention deficit hyperactivity disorder
According to Loeber and associates, which pathway to crime would be indicative of a person exhibiting stubborn behavior at an early age?
c. authority conflict pathway
Which of Walter B. Miller's "focal concerns" values being independent of authority figures such as police, teacher, and parents?
c. autonomy
The cohesion among neighborhood residents combined with shared expectations of informal social control of public space promotes __________.
c. collective efficacy
The __________ type of robbery occurs in businesses ranging from banks to liquor stores.
c. commercial
A condition in which repeated negative experiences in adolescence undermine life changes and reduce employability is known as __________.
c. cumulative disadvantage
A view of criminal behavior that places emphasis on the changes people go through over the life course is known as __________.
c. developmental criminology
One major criticism of genetic research and crime is the __________.
c. fact that environment and genetic function are so interrelated that it is impossible to separate them
White-collar ___________ often take bribes in order to use their positions to grant favors and sell information to which their co-conspirators are not entitled.
c. influence peddlers
Security traders using inside business information for personal profit is known as ________________.
c. insider trading
Which of Hirschi's four bonds is illustrated by membership in school activities, religious groups, and social clubs?
c. involvement
According to the text, which of the following is NOT an example of a possible latent trait?
c. low self-control
The first terrorist activities were committed by members of minority religious groups who engaged in violence to __________.
c. meet the requirements of the bloodthirsty gods they worshipped
Public order crimes often trace their origin to _____________ who seek to shape law toward their own thinking.
c. moral crusaders
In which of the following type of families does the father assume the traditional role of breadwinner, while mothers remain at home to supervise domestic matters?
c. paternalistic families
The creation of websites that look legitimate, but are designed to gain illegal access to a victim's personal information, is known as __________.
c. phishing
What element(s) did differential reinforcement theory add to differential association theory?
c. positive and negative stimuli
Which of the following causes of rape discussed in the text proposes that rapists suffer from some type of personality disorder?
c. psychological abnormality
Which of the following is one of the characteristics of a hate crime according to King and Sutto's research?
c. publicity to make the event known to the public
A study by Richard Petts on the effects of religion on youth misbehavior found that __________.
c. religion helps reduce deviant behavior
Treatment programs aimed at helping offenders after they are identified is a __________.
c. secondary prevention program
According to social ecologists, fear found in urban communities is reinforced by the constant presence of graffiti, trash, prostitutes, drug-dealers, burned-out buildings, and other constant reminders of crime - elements often referred to as __________.
c. social and physical incivilities
What was the focus of the Chicago School sociologists conducting research on crime during the early 1900s?
c. social forces
The theory that posits that people are not born with the ability to act violently, but they learn to be aggressive through their life experiences is __________.
c. social learning theory
According to __________ theory, sharp divisions between the rich and poor create an atmosphere of envy and mistrust that may lead to violence and aggression.
c. strain
What type of treatment program is required as part of a probation order or diversionary sentence?
c. tertiary prevention program
According to Stuart Green, the main reason white-collar criminals are treated more leniently than lower class offenders is __________.
c. the perception that white collar crime is clouded by moral ambiguity
Studies measuring neurological impairment have found that violent criminals have impairment of __________.
c. the prefrontal lobes of the brain
According to statistics, women are likely to report rape when _________.
c. the rapist used a weapon
According to the American "culture of poverty concept," which of the following is NOT one of the characteristics passed from one generation to the next?
concern
According to Freud, which of the following is a component of the superego part of the personality?
conscience
The __________ view of crime links illegal behavior to the concept of social harm.
consensus
If a lifeguard knows a swimmer is in danger and does nothing about it and the swimmer drowns, the lifeguard is legally responsible for the death under the concept of responsibility by __________.
contractual relationships
The goal of a political criminal involving crime as a way to achieve social improvement is known as __________.
conviction
According to your text, all of the following are major forms of cybercrime, except:
cybersex
According to political crime expert Randy Borum, the second cognitive stage to becoming a political criminal is referred to as ______________
d. "It's not fair."
Which of the following are common elements of all developmental theories?
d. A criminal career must be understood as a passage along which people travel
A person neutralizing a deviant act by suggesting it was for the betterment of all humankind, and considers themselves somewhat of a hero, is following which technique of neutralization?
d. Appeal to higher loyalties
Which of the following was not one of Travis Hirschi's findings from his self-report study?
d. Attachment to parents had no impact on delinquency.
Whose work on human evolution helped to popularize the positivist tradition that all human activity could be verified by scientific principles?
d. Charles Darwin
The _______________ clause of the U.S. Constitution gives the federal government the authority to regulate white-collar crime.
d. Commerce
What do instrumental Marxists consider as essential to do to criminal justice systems?
d. Demystify the true purpose of law and justice.
____________ refers to a program where efforts to prevent one crime helps prevent another.
d. Diffusion of benefits
Which of the following is NOT considered a Uniform Crime Report Type I (Index) crime?
d. Drug trafficking
Which of the following reasons does NOT justify decriminalizing drugs?
d. Drug users could increase their daily intake.
______________ theory holds that crime rates are influenced and controlled by the threat and/or application of criminal punishment.
d. General deterrence
_________ theory states that intelligence is largely determined genetically and that low intelligence is linked to criminal behavior.
d. Nature
Which of the following is an anti-organized crime law passed by Congress?
d. Racketeer Influenced and Corrupt Organization Act
_____________ is defined as a repeated pattern of cruel and demeaning behavior.
d. Sadistic personality disorder
__________ theory says that everyone has the potential to become a criminal, but most people do not because of their bonds to society.
d. Social control
All of the following major issues are chief concerns of contemporary critical criminologists, except:
d. The lack of educational opportunities for American youth
According to the text, which of the following is NOT one of major diverging views on the association between the economy and crime rates?
d. There is a strong relation between the economy and crime.
____________ theory proclaims that there is more than a single path to crime; thus there are different classes and types of criminals.
d. Trajectory
A popular target of moral crusaders today is __________.
d. abortion clinics
A relatively new phenomenon known as "_______________", combines element of a brothel and call girl rings.
d. call houses
The __________ suggests that a subpopulation of men has evolved with genes that incline them toward extremely low parental involvement.
d. cheater theory
A recent change in the motivational pattern for vehicle theft suggests that cars are being stolen for __________.
d. chop shops and export rings
Prostitutes who service the entire crew at a construction site and then move elsewhere are referred to as __________.
d. circuit travelers
The fastest-growing type of fraudulent check today is the __________.
d. counterfeit check
Labeling theory holds that __________.
d. deviance is the property conferred on behavior by the audience which witnesses them
According to critical thinkers, high schools in poverty-stricken neighborhoods where the completion rate is 40 percent or less are referred to as __________.
d. dropout factories
Research of social reaction theories can be classified into two categories: 1) focuses on the characteristics of those chosen to be labeled and 2) _____________..
d. effects of the labeling process
A nation whose government has lost control of its own territory is a(n) ________.
d. failed state
Which of the following sources of strain produce negative affective states?
d. failure to achieve goals
The crime of ________________ differs from traditional larceny because the victims willingly give their possessions to the offender, and the crime does not involve a "trespass in the taking."
d. false pretenses
The type of violence used in an attempt to improve the financial or social position of the criminal is __________.
d. instrumental violence
Proving guilt in a rape case is challenging for prosecutors because __________.
d. jurors are sometimes swayed by the insinuation that the rape was victim precipitated
The most common criminal offense in the United States according to the FBI is _________.
d. larceny
According to the National Survey on Drug Use and Health, the most widely illicit drug(s) is/are __________.
d. marijuana
Which of the following is NOT a type of state-organized crime?
d. multi-level marketing crime
Which of the following is NOT a typical goal of political crime?
d. personal profit
A conspiracy to set and control the value of a necessary commodity is considered _______.
d. price-fixing
According to Marx's "Communist Manifesto," the people who do the actual labor in society are known as __________.
d. proletariat
What does John Braithwaite suggest might lower crime rates?
d. reintegrative shaming
All of the following are considered to be reasons why an amateur thief would steal a car, except:
d. retaliation
Positive relations with individuals and institutions that are life sustaining are called __________.
d. social capital
Shaw and McKay's ____________theory proposed that crime was the result of transitional neighborhoods comprised of poor ethnic minorities who were trying to survive their difficult economic situations.
d. social disorganization
Which of the following did Emile Durkheim study to indicate the presence of an anomic society?
d. suicide rates
The victims of public corruption are __________.
d. the general public
According to the Foreign Corrupt Practices Act (FCPA), it is a criminal offense _________.
d. to bribe foreign officials
What does the Mann Act of 1925 prohibit?
d. transportation of women into the country for purposes of prostitution
Which of the following is NOT one of the key stages of the "violentization process" offered by criminologist Lonnie Athens?
d. uncontrollable violence stage
This crime occurs when someone who is trusted with property fraudulently keeps it for his or her own use.
embezzlement
Which of the following paraphiliatic behaviors involves the non-consensual touching of a person in a crowded area?
frotteurism
The process of creating transnational markets and political and legal systems in an effort to sustain a world economy is known as __________.
globalization
Criminals involved in cybervandalism are generally NOT motivated by __________.
greed
A(n) ________ is the term used to describe a political movement that may use terror tactics to achieve control of the existing government.
insurgency
The use of law enforcement and military personnel to intercept drugs and drugs supplies as they enter the country is an example of a(n) ___________ strategy for controlling illegal drug trafficking.
interdiction
Critical criminologists view __________.
law as an instrument of power used to control society
During the 1930s, Harry Anslinger, then head of the Bureau of Narcotics, used magazines articles, public appearances, and public testimony to sway public opinion about the dangers of __________, which until the time was legal to use and possess.
marijuana
According to William Sheldon's Somatotype School, the body type most likely to become criminal was the __________.
mesomorph
Interest in corporate crime first emerged in the 1900s, when a group of writers, known as ___________, targeted the monopolistic business practices of John D. Rockefeller and other corporate tycoons.
muckrakers
According to this theory, criminality is the result of the neutralization of accepted social values through the learning of a set of techniques that allow people to counteract the dilemmas posed by illegal behavior.
neutralization
Studies estimate that about one in every __________ shoppers steals from department stores.
nine
Which of the following is NOT a principle of life course theory?
no an
According to your author, out of all the commonly practiced paraphiliatic behaviors, _________ is the one that most concerns the general public.
pedophilia
Well-known criminologist Edwin Sutherland referred to a jewel thief who replaces real jewels with fakes as a __________.
pennyweighter
By the 18th century in Europe, three categories of thieves were common. Which of the following was NOT one of these categories?
pirates
Ecoterrorists, such as the Earth Liberation Front (ELF), are a sub-group of what type of terrorism?
political
The most serious forms of psychological disturbances will result in a mental illness referred to as ___________, which causes a person to exhibit illogical and incoherent thought processes and a lack of insight into their behavior.
psychosis
The influence of labeling theory can be viewed in the development of diversion and ______________ programs.
restitution
Of all business establishments, __________ are burglars' favorite targets.
retail stores
A __________ terrorist is not nationalistic, political, or revolutionary. Their desire is to impose their religious and social code on others.
retributive
A _____________ is a term used to describe a group that engages in civil war against a sovereign power that holds control of the land.
revolutionary
What type of terrorists use violence to frighten those in power and their supporters in order to replace the existing government with a regime that holds acceptable political or religious views?
revolutionary
_________ murder refers to three or more killings during three or more separate events with a "cooling off" period in between.
serial
Women prostitutes who barter drugs for sex are called __________.
skeezers
A type of computer software that gathers personal information involving web browser histories, emails, and online purchases and transmits them to the installer is known as __________.
spyware
Which of the following individuals is most likely to victimize a man in a violent attack?
stranger
Cybervandals have developed a new form of "entertainment" known as __________, which involves calling 911 and faking a major emergency or crime that draws a quick response from law enforcement officials.
swatting
Which of the following types of crime is spread most evenly throughout the social structure?
theft
One of the two new forms of theft that appeared in the 19th century was __________.
train robbery
Criminologists conduct research on the links between different kinds of crimes and criminals; this is referred to as crime__________.
typology
What did the temperance movement at the turn of the 20th century suggest was a threat to the lifestyle of the nation's population?
urbanism
Which of the following is NOT included in Edwin Sutherland's typology of professional thieves?
wholesaler
Which of the following factors has the greatest influence on crime rates?
age
In their study, Tracy and Kempf-Leonard found that __________ of delinquent offenders desisted from crime as adults.
b. 2/3
The objectivity of criminological research may be questioned if studies __________.
. are funded by organizations that have a vested interest in the outcome of the research
Which 18th century reformer's writings helped to create the classical view of criminology?
Cesare Beccaria
________________ law refers to a set of rules governing relations between private parties, including both businesses and governments.
Civil
____________ criminologists suggest that economic systems control all facets of human life and consequently people's lives revolve around the capitalist's means of production.
Conflict
Regardless of its source, all criminal law in the United States must conform to the rules of the U.S. _____________.
Constitution
According to the textbook, which of the following is NOT one of the four broad categories of law in the U.S.?
Constitutional
__________ is a term used to refer to actions that depart from social norms, values, and beliefs.
Deviance
Which of the following criminologists is considered a pioneer in the development of the interactionist view of crime?
George Herbert Mead
What time of year do most reported crimes occur?
July and August
__________theory suggests that one's lifestyle, such as carrying a weapon, makes one more prone to victimization.
Lifestyle
What program was developed by the FBI during the past 30 years to provide more detailed information about criminal incidents?
NIBRS
___________ refers to a condition caused by a disturbing event. Symptoms may include anger, depression, anxiety, and self-destructive behavior.
PTSD
Which of the following crime measurement instruments is most useful for compiling data about drug abuse, such as the Monitoring the Future (MTF) Study?
Self-report surveys
The early set of written laws of the ancient world which established a system of crime and punishment based on physical retaliation is __________.
The Code of Hammurabi
____________estimate(s) that the annual number of victimizations that occur in the U.S. is roughly 25 million per year.
The NCVS (National Crime Victim Survey)
Which of the following views asserts that elder abuse results from the abusive individual learning to use violence to resolve conflicts?
The social learning view
According to the text, what ethical concern is often raised against criminologists who tend to only focus upon the poor and desperate in their studies of crime?
Their efforts lead to harsh measures taken against the lower classes.
According to your text, which of the following is NOT one of the most significant demographic characteristics regarding both victims and non-victims of crime?
c. education level
According to Ronald Clarke's CRAVED model of theft, the appropriation of property is most likely to occur when the target is __________.
a. a mobile item
Which of the following are generally included in a victim's bill of rights?
a. a speedy trial
Temperature may affect crime rates in an inverted U-shaped curve, meaning __________.
a. as the temperature continues to rise, crime rates will increase and then begin to decline when it gets too hot
Crime data show that most criminal offenders __________.
a. commit a single criminal act, and upon arrest, discontinue their criminal activity
Since 1991, the crime rate in the United States __________.
a. has been in decline
According to the National Crime Victim Survey, which of the following is most vulnerable to crime?
a. homes in the West
The __________ reduces crime by placing offenders behind bars during their prime crime years lessening their opportunity to commit crime.
a. incapacitation effect theory
This theory holds that after experiencing criminal sanctions that are swift, severe, and powerful, the criminal will not repeat his/her criminal acts.
a. specific deterrence
Which of the following is NOT one of the three methods used in the Uniform Crime Report (UCR) to express crime data?
a. types and amounts of harm caused
The federal legislative act that recognizes the right of the victim to be protected from the accused in the case is the __________.
b. Justice for All Act
This type of law, often times referred to as "_____________," allows the average citizen to use deadly force when they reasonably believe that their homes or vehicles have been wrongfully invaded.
b. Stand Your Ground
How would lifestyle theorists recommend a person avoid becoming a victim of crime?
b. Stay home at night.
____________ is a phrase used to describe an individual's proactive attempts to lessen the likelihood of future victimizations by crime-proofing their house, car, business, property, etc.
b. Target hardening
According to deterrence theory, not only does the actual chance of punishment influence criminality, so too does the
b. perception of punishment.
This theory of crime assumes that human behavior is both "willful and determined."
b. rational-choice theory
Which victimization theory would suggest target hardening as a way to reduce crime?
b. routine activities theory
According to the 18th century social philosopher, _____________, people choose to act after weighing costs and benefits; they believe that their actions will bring them an increase in pleasure and a reduction in pain.
c. Jeremy Bentham
_______________ theory states that some people may initiate the confrontation that eventually leads to their injury or death.
c. Victim precipitation
______________ programs are designed to facilitate face-to-face encounters between victims and offenders so that restitution agreements can be established and, possibly, resolution between the two parties involved.
c. Victim-offender reconciliation
The overwhelming majority of criminologists believe that capital punishment has _________.
c. little if any deterrent effect
The __________ hypothesis states as the percentage of minorities in the population increases, so does the amount of social control that police direct at minority group members.
c. racial threat
According to Sutherland and Cressy, one of the most important areas of interest to criminalists is the area of crime where criminologists believe that social factors are at the root cause of crime. This area is known as __________.
crime is a social phenomenon
According to the __________, people who are the victims of abuse in adolescence are likely to engage in violent behavior as adults.
d. cycle of violence phenomenon
What does the term "edgework" refer to?
d. integration of danger, risk, and skill
The secondary source of crime data highlighted in the textbook that involves gathering data from a number of previous studies is __________.
d. meta-analysis
Some rational choice theorists contend that some crimes are __________, meaning that offenders are not robots who engage in unthinking, unplanned random acts of criminal behavior.
d. offender-specific
According to the text, "boosters" are __________.
d. professional shoplifters
The three interrelated variables of suitable targets, incapable guardians, and motivated offenders are central to which theory?
d. routine activities
A research approach that requires subjects to reveal their own participation in delinquent or criminal acts is/are _________.
d. self-report surveys
The type of characteristic that increases the potential for victimization because the victim's physical weakness or psychological distress renders them incapable of resisting is called __________.
d. target vulnerability
Of the offenders victimizing females, about __________ are someone the victim knew or with whom they live.
d. three-quarters
Criminologists maintain that if the certainty of punishment could be increased to a critical level, the so-called __________, then the deterrent effect would kick in and crime rates would decline.
d. tipping point
According to the Sherman and Bork study of domestic violence in Minneapolis, _______.
d. when police arrested the offenders, recidivism was substantially less
Which category of people has the highest risk of victimization?
d. young African American males
Criminologists are mainly concerned with the cause of crime, while criminal justice scholars spend their time identifying __________.
effective methods of crime control
Which age group is particularly resistant to crime?
elderly over age 65
What term applies when a crime reduction program increases rather than decreases the potential for crime?
encouragement
The social goal of criminal law to formally prohibit behaviors believed to threaten societal well being or challenge authority is classified as __________.
enforcing social control
According to your text, which category of "crime discouragers" is comprised of parole officers and parents?
handlers
For most of the 20th century, criminology's primary orientation was sociological, but today it can be viewed as a(n) __________ approach to the study of criminal behavior.
integrated
In most situations, for an act to constitute a crime, it must be done with __________.
intent
According to this perspective, people and events are viewed subjectively and labeled as good or evil according to the interpretation of the evaluator.
interactionist
According to the U.S. Constitution, a criminal law forbidding adults to engage in "immoral behavior" could not be enforced because __________.
it is too vague
According to the interactionist view of crime, __________ use their influence to shape the legal process in the way they see fit.
moral entrepreneurs
The National Crime Victim Survey shows that violent crimes are more likely to take place in a __________.
park
Which of the following is NOT a sentence geared toward a chronic or career offender?
parole
A common criticism of the Uniform Crime Report data is that __________.
police officials may deliberately alter reported crimes to improve their department's image
What did Hans von Hentig and Stephan Schafer suggest was a key determinant of crime?
role of the victim
Crime prevention can be achieved by reducing opportunities people have to commit particular crimes; this is a crime prevention strategy known as_________________ crime prevention.
situational
Which region of the United States has consistently high crime rates, to the degree that some criminologists have suggested the existence of a subculture of violence?
southern states
The view that women who commit crimes have biological and psychological traits similar to those of men is __________.
the masculinity hypothesis
The study of the role of the victim in the crime equation is known as __________.
victimology
To satisfy the requirements of Actus Reus, guilty actions must be __________.
voluntary
A recent study of immigration and crime in California found that noncitizen men ages 18 to 40 ________.
were 8 times less likely than US-born men to be in a correctional setting