Cyber Criminology Chapter 1

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

True

"Cyber" refers to almost anything "real" or "virtual" attached to a computer or network.

True

A great deal of effort is dedicated to computer security.

cybercrime.

According to the authors of the text, another term for digital crime is:

False

Case studies offer generalizations about trends in cybercriminality or patterns of offending.

Computer as incidental to crime

Child pornography is an example of which type of computer crime?

False

Computer crime is not an international problem.

False

Computerized theft never deprives a legitimate owner of a tangible asset.

True

Computers may be used as both criminal instruments and instruments of warfare.

Behavioral approaches of cybercriminals

Crimes associated with the prevalence of computers

virtually nonexistent; there is no centralized source.

Criminal statistics/data on computer crime are

True

Cybercrime has significantly increased since the 1990s.

True

Data alteration and denial directly targets the computer by attacking the useful information stored or processed by the computer.

Computer as a target

Data alteration, denial of service, network intrusions, thefts of information, and computer vandalism are examples of which type of computer crime?

False

Estimates on the cost of cybercrime are largely derived from criminal reports.

True

In general, the threat of computer crime victimization increases with industrialization

True

It can take months or even years to identify an actual monetary value for the loss of intellectual property.

False

It is relatively easy to place a monetary value on the loss of intellectual property.

True

Practitioners in both the criminal justice field and the computer science field typically have limited knowledge of each other's occupations.

True

Rapid growth in the computer security industry has largely occurred without adequate research on the nature of cybercrimes and criminals.

False

Research has shown that most dangers of economic computer crimes come from outsiders.

False

The Department of Justice systematically collects computer crime data.

True

The expanded use of Social Security numbers is the primary reason for the ease of identity theft.

True

The full extent of computer theft is unknown because many thefts go unreported.

intent of the intruder.

The primary difference between data alteration and network intrusion is the

True

The processes and dynamics involved in the production of digital crime and digital terrorism are virtually the same.

Computer as an instrument of a crime

The salami slice technique, pyramid schemes, and bunko schemes are examples of which type of computer crime?

True

The text seeks to merge knowledge of criminal justice and knowledge of computer science.

The ease with which criminals could misuse information. The observation that researchers felt that computer crime was not worthy of specific explicit research. The observation that losses increase substantially with intentional acts involving computers.

Which of the following is an example of Donn Parker's work as an early commentator on problems associated with computer crime?

Crimes that facilitate other crimes through the proper use of computers

Which of the following is not a characteristic noted by Anderson and colleagues in 2012?

Reputational damage Anti-virus software Loss of revenue

Which of the following is not considered in the calculation of costs associated with each type of computer crime?

Trans Credit

Which of the following is not one of the three major credit reporting bureaus that control the information on all persons applying for credit in the United States?

Computer as an instrument of a crime

Which type of computer crime describes actions in which the computer is used only to further a criminal end? In other words, the computer or data contained therein is not the object of the crime.

Crimes associated with the prevalence of computers

identity theft are examples of which type of computer crime?


Kaugnay na mga set ng pag-aaral

OB Review + Pre-Lecture Quiz #1-5

View Set

How are the two major political parties similar and how are they different?

View Set

Chapter 7: The International Monetary System and the Balance of Payments

View Set