Deviant Behavior Test #3

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

True or False Men cannot be raped.

Fasle

Why do elite hackers value disembodied anonymity? A. It makes the subculture more egalitarian. B. It makes it easier to violate the law. C. It disconnects them from a society that does not appreciate them. D. It ensures they are protected from criminal hackers.

A. It makes the subculture more egalitarian.

Which of the following statements about the cost of cybercrime is true? A. The cost of cybercrime is increasing. B. Statistics on the costs of cybercrime vary wildly from year to year. C. The cost of cybercrime is decreasing. D. The cost of cybercrime is impossible to estimate.

A. The cost of cybercrime is increasing.

How can a virus infect a computer? A. The victim downloads a file. B. The victim leaves the log-in data on a public computer. C. The victim buys an item from an unsecured website. D. The victim sends personal information in an e-mail.

A. The victim downloads a file.

Which theory of cyberdeviance would focus on the way that cyberdeviants can reject both the conventional goals and the conventional means of attaining those goals, replacing them with new, cyber-centric, means and goals? A. anomie B. rational choice C. differential association D. social control

A. anomie

Individuals in a car company falsify emissions tests to increase the company's value. What kind of white-collar crime is this? A. corporate crime B. organized crime C. occupational crime D. elite crime

A. corporate crime

What makes cyberdeviant subculture possible? A. disembodied anonymity B. inadequate international laws C. the proliferation of smartphones D. lack of government oversight

A. disembodied anonymity

Which of the following is an ethical standard of elite cyberdeviants? A. do not irreparably damage a legitimate user's information B. leave a unique calling card to mark your successful breach of a target C. leave no trace of security breaches D. report security vulnerabilities

A. do not irreparably damage a legitimate user's information

MotherofFlagons is driven to explore what computers can do. She is curious and will spend days at a time testing government security systems and designing work-arounds for accessing systems she is not supposed to access. She intends no harm, she just loves the challenge. What category of cyberdeviant is MotherofFlagons? A. hacker B. cyberpunk C. coder D. cracker

A. hacker

Which of the following are included as part of the Federal Bureau of Investigation's Uniform Crime Report's definition of rape? A.attempts to commit rape B.incest C.sexual assault D.statutory rape

A.attempts to commit rape

What do all sports defined as "extreme" have in common?

All sports defined as "extreme" are high-risk, they are all potentially life-threatening, and they all involve the pursuit of a thrill that cannot be experienced when engaged in conventional activities.

Which of the following accurately describes who can commit a white-collar crime according to Sutherland? A.White-collar crime can only be committed by someone of respectability. B.White-collar crime cannot be committed by someone of higher social status. C.Only government officials can commit a white-collar crime. D.Anyone with a job can commit a white-collar crime.

B.White-collar crime cannot be committed by someone of higher social status.

Why is it challenging to enforce state and federal legislation against computer crimes? A. Those who wrote the laws are not current with the latest technology. B. Cybercriminals are innovative when committing computer crimes. C. Corporations do not like admitting their systems were vulnerable. D. Enforcement is financially prohibitive.

C. Corporations do not like admitting their systems were vulnerable.

A cracker with the handle MaxZoom rationalizes his cyberdeviance by explaining that he uploads pirated media files because it doesn't hurt people, just faceless corporations. What technique of neutralization is he using? A. condemnation of the condemners B. denial of injury C. denial of victim D. appeal to higher loyalties

C. denial of victim

Jackalope4U is able to interact with message boards without revealing any clues of their social status, race, class, age, or gender. As an elite hacker, they value this ______, because it means they are judged on their accomplishments alone. A. dialectical materialism B. antipathy gap C. disembodied anonymity D. ethical fluidity

C. disembodied anonymity

A cyberdeviant named ScareBear systematically violates the security programs guarding a country's nuclear power plants. He intends to gain political concessions by threatening to initiate a nuclear meltdown. What category of cyberdeviant is ScareBear? A. malicious hacker B. career criminal C. extreme advocate D. malcontent/addict

C. extreme advocate

Summarize methods of cyberdeviance.

Cyberdeviance can be committed via trap doors or Trojan horses and can take the form of viruses, worms, salamis, timing attacks, and logic bombs. Trap doors are installed in computer software to allow programmers to make changes without going through complicated access procedures. Sometimes a trap door is left in place, and a cybercriminal can gain access to system programs. Trojan horses are used to infiltrate a computer system with the intention of disabling the system. They are programs disguised in some way, but within a Trojan horse hides viruses, worms, logic bombs, or salamis. Timing attacks refer to the destruction or alteration of data in a computer before being processed. Viruses are computer programs that have the ability to reproduce themselves within a computer, damaging or destroying data or rendering disk space or memory unusable. Viruses may infect a computer in two ways. First, the virus may be transmitted in an e-mail message that, when opened, replicates inside the victim's computer. Second, the victim may unwittingly download an infected file. Worms are a more powerful version of a virus, spreading between computers. Similar to viruses, worms may attack computer software, destroying data and operating procedures. A logic bomb instructs the computer to execute a certain function under certain conditions, usually on a given date and time. Salami attacks alter financial data by slicing small amounts of money from a much larger account.

Why is it challenging to enforce state and federal legislation against computer crimes? A. Cybercriminals are innovative when committing computer crimes. B. Those who wrote the laws are not current with the latest technology. C. Enforcement is financially prohibitive. D. Corporations do not like admitting their systems were vulnerable.

D. Corporations do not like admitting their systems were vulnerable.

Which of the following accounts for a significant amount of organized criminal activity? A.globalization B.social media C.fraud D.illicit drug trafficking

D.illicit drug trafficking

If Dr. Morooka decides that white-collar crime occurs when the offenders believe the money that they can earn outweighs the risk of being caught and arrested, he is using ______ to understand white-collar crime. A.techniques of neutralization B.differential association C.culture conflict theory D.rational choice theory

D.rational choice theory

Dr. Adebayo suggests that sexual assault occurs when there is a motivated offender, a suitable target, and no witnesses. Which theory is Dr. Adebayo using to explain sexual assault? A.feminist theory B.subcultures of violence theory C.differential identification theory D.routine activities theory

D.routine activities theory

Describe Edelhertz's typology of white-collar crime.

Edelhertz defined white-collar crime as illegal acts committed without violence and by concealment or guile to obtain money or property, to avoid loss of money or property, or to obtain business or personal advantage. His definition focused on the type of crime and how it was carried out. He identified four types. Personal crimes were committed by persons operating on an individual basis for personal gain in a nonbusiness context. Abuse of trust crimes were committed by people in the course of their occupations from within an institution, in violation of their duty of loyalty to an employer or client. Business crimes were crimes incidental to or in furtherance of business operations, but not the central purposes or such business operations. Finally, con games involve the commission of white-collar crime as a business, or as the central activity of the business.

True of False The Bureau of Justice Statistics defines sexual assault as a category of rape.

False

True of False The majority of members within the cyberdeviant subculture believe that computers make life worse.

False

True or False A situational stress offender commits rape because of sexual uncertainty.

False

True or False According to rational choice theory, cyberdeviants commit their crimes impulsively.

False

True or False Any sport, when overplayed by an individual, is clinically diagnosed as extreme sport addiction.

False

True or False Bar girls provide the cheapest form of prostitution.

False

True or False China is the most frequent point of origin for cybercrime offenses.

False

True or False Corporate, government, and other types of white-collar crimes are the easiest crimes to detect.

False

True or False Crimes that benefit businesses instead of individuals are called elite crimes.

False

True or False Cyberdeviant subculture is organized into a hierarchy along strict race and gender lines.

False

True or False Edwin Sutherland borrowed the term "white-collar crime" from retired United States Justice Department prosecutor Herbert Edelhertz.

False

Define, and provide examples of, grooming.

Grooming is a nonviolent way of manipulating a target into performing sexual activity. Specifically, grooming refers to attempts to manipulate or coerce someone into performing sexual acts for a proposed reward. The offender tries to build the trust of a target to get what he or she ultimately wants. For example, an offender may take their target shopping to build trust and affection and then parlay that into a sexual exchange.

What is a key component of the World Health Organization definition of "gaming addiction?"

Prioritizing gaming over family and friends

Describe three primary forms of unauthorized computer use.

There are three primary forms of unauthorized computer use. The first is computer voyeurism, which involves confidential documents without altering them in any way. The second is changing data, in which records and financial accounts are altered. The third is deleting data, in which computer files are deleted or are sabotaged.

Which of the following accurately describes extreme forms of everyday behavior?

They are not crimes.

True of False Compared to other advanced industrial nations, workers in the United States now spend the most hours on the job.

True

True of False Sutherland would agree that associating with those who think using the Internet 12 hr a day is normal would increase the likelihood of Internet addiction.

True

Apply the rational choice theory to cybercrime.

Varies. Rational choice theory explains the commission of cybercrime as the result of a cost-benefit analysis, in which the offender is seeking to maximize pleasure while minimizing pain. Cybercriminals deliberately weigh the possibility of the rewards that may attend the commission of a computer crime against the costs involved (arrest; damage to reputation). If the rewards outweigh the risk, offenders commit cybercrime.

How is a worm different from a virus?

Viruses are computer programs that have the ability to reproduce themselves within a system. Unlike viruses, worms are computer programs that exist independently of other programs. Worms are more powerful than viruses. A worm invades a computer by means of the Internet and begins to search for other computers attached to the original victim.

How did Tomlinson categorize extreme sports?

by where they take place

In Merton's typology, a person fitting into the ______ or ______ category is least likely to engage in extreme sports or workaholism.

conformist; ritualist

What is the most common long-term effect of childhood sexual abuse? A.higher rates of mental health issues B.obesity C.inappropriate sexual behavior D.promiscuity

higher rates of mental health issues

What is time-deepening?

multitasking

When diagnosing Internet addiction, what does tolerance refer to?

requiring an increasing amount of computer time to feel satisfied

Which theory primarily focuses on the way that extreme forms of everyday behavior can be adopted as alternatives to existing social relationships that create negative emotions and stress?

strain

What is the source of the core values, hard work, thrift, and self-reliance that are present in U.S. culture?

the Protestant Ethic

What is it called when children are victimized by more than one type of sexual abuse?

polyvictimization

Distinguish between a hacker and a cracker.

The difference between "hackers" and "crackers" is primarily in their intent. Hackers are not trying to do harm and they are motivated by the challenge of overcoming another computer system. Unlike hackers, crackers intend to damage, manipulate, or destroy the computer operations of others. While crackers frequently use viruses, worms, logic bombs, and salamis, hackers do not.

Which statement accurately compares victims of child sexual abuse to non-victims? A. Victims of childhood sexual abuse are less likely to experience intimate partner violence. B. Victims of childhood sexual abuse are more likely to become prostitutes as adults. C. Victims of childhood sexual abuse are less likely to experience sexual victimization as adults. D. Victims of childhood sexual abuse are more likely to experience sexual victimization as adults.

D. Victims of childhood sexual abuse are more likely to experience sexual victimization as adults.

According to Edelhertz's typology, a company selling flavored brown water as apple juice exemplifies ______. A. personal crime B. con games C. abuse of trust D. business crime

D. business crime

True or False In the United States, Michigan has the highest rate of reported rape.

False

What do international studies tell us about the rates of sexual offending?

First, international studies suggest that it is difficult to accurately measure rates of sexual offending. The United Nations' survey of crime trends provides data on rape rates, or the number of rapes per 100,000 people in the general population. These numbers reveal reported rates are highest for Sweden and Iceland. Another study suggested that when victims self-report on whether they were sexually victimized during the previous year, the United States and Iceland have the highest incidence of rape.

True or False When committing occupational crime, offenders act primarily in their own interest and do not benefit their employers.

True

Kevin often takes the subway. He finds women and touches them without their consent to achieve sexual arousal. What is this called? A. voyeurism B. sexual indecency C. exhibitionism D. frottage

D. frottage

True or False Differential association theory might suggest that participants in organized crime learned their behavior with peers already within an organized crime network.

True

True or False If an older male arranges to meet an underage victim found online to have sex, it is considered a traveler case.

True

True or False Males commit nearly all officially recorded forcible rapes.

True

True or False Murder is not a white-collar crime.

True

True or False Some motivations for rape include power, anger, and sadism.

True

True or False The opportunity structures approach to understanding organized crime is a macro-level approach.

True

True or False Victims of childhood sexual assault are at greater risk for sexual victimization later in life.

True

List the three criteria for diagnosing pedophilia used in the American Psychiatric Association's Diagnostic and Statistical Manual of Mental Disorder-- DSM-5.

The first criterion used to diagnose an individual as a pedophile is whether the patient has arousing fantasies or sexual urges for children. Engaging in sexual behaviors with children or experiencing significant stress as a result of the desire to engage in sexual behaviors with children is included under the second criterion. Finally, the age of the individual (at least 16) and the age difference between the individual and the underage object of their desire (at least 5 years) is considered.

True or False A Trojan horse is one kind of virus delivery system.

True

True or False A hacker's status, power, and prestige depend upon recognition from others within the hacker subculture.

True

True or False Becker would agree that rewarding those who take exercising to an extreme with an Olympic gold medal makes overexercising more likely.

True

True or False Compared to other advanced industrial nations, workers in the United States now spend the most hours on the job.

True

True or False Crackers are a kind of cybercriminals.

True

True or False If Cheryl is simultaneously watching television, chatting on Facebook messenger, and folding laundry, she is engaged in time-deepening.

True

True or False Mae would be classified a hacker, because she has no intention of committing cybercrime, though she likes to test her skills by attempting to breach financial institutions' computer network.

True

True or False Organized crime groups use violence to defend their interests against competing groups.

True

True or False Sutherland would agree that associating with those who think using the Internet 12 hr a day is normal would increase the likelihood of Internet addiction.

True

True or False The highest rate of rape and sexual assault occurs among girls aged 12-15.

True

True or False The majority of members within the cyberdeviant subculture believe that information should be free.

True

True or False There is no legislation against cybercrime at the federal level.

True

True or False Work involvement, a feeling of being driven to work, and work enjoyment are the three components of the "workaholic triad."

True

Apply techniques of neutralization that offenders may use to justify cyberdeviance.

Varies. Sykes and Matza identified five techniques of neutralization employed by criminals to rationalize their criminal activity: denial of responsibility, denial of injury, denial of the victim, condemnation of the condemners, and appeal to higher loyalties. Cybercriminals may deny that an injury (denial of injury) has occurred or that there is a real victim involved (denial of victim) when they are using computers to break into otherwise secure computer systems. If the cybercrime involves the violation of copyright law, the cybercriminal may contend that their loyalties to their fellow computer users override the need to obey the law (appeal to higher loyalties). The cybercriminal may argue that if they steal computer technology or software, the companies that own the technology probably developed it by exploiting underpaid workers (condemnation of the condemners) or that they had no choice because of peer pressure to obtain the latest technology (denial of responsibility).

Which of the following statements accurately explains the connection between social norms and everyday behaviors?

Social norms guide our everyday behaviors.

According to the social reactionist perspective, what makes individuals more likely to engage in extreme sports?

positive reinforcement for those already engaged in extreme sports

True or False On average, businesses lose very little money due to white-collar crimes.

False

True or False Sociopathic rapists offend to satisfy sexual desires.

False

True or False The culture conflict theory can be used to explain white-collar crime but not organized crime.

False

True or False The cyberdeviant subculture is based on real-world commonalities.

False

True or False The demographic category with the highest rate of loss to cybercrime is those aged 50-59.

False

Bureau of Justice Statistics includes ______ under the offense "attempted rape." A. verbal threats of rape B. revoked consent C. date rape D. sexual assault

A. verbal threats of rape

True or False The highest rate of rape and sexual assault occurs among girls aged 12-15.

False

True or False The majority of members within the cyberdeviant subculture believe that computers make life worse.

False

True or False Trap doors have no purpose beyond allowing cybercriminal access to otherwise secure data.

False

True or False White-collar crimes are crimes committed by people during the course of their occupation.

False

How does Roberts explain the increasing popularity of extreme sports over time?

As social policies increased overall safety, the need to create risk-taking opportunities increased.

Why are corporations unwilling to admit they were the victim of cybercrime? A. They will be charged in connection with any crime that affects consumers. B. Consumer confidence may erode. C. They will be targeted for additional crimes. D. Corporations commit most computer crimes.

B. Consumer confidence may erode.

Which of the following statements about elite hackers is true? A. Elite hackers enforce a code of behavior for lesser hackers. B. Elite hackers view themselves as part of an inner circle. C. Elite hackers see themselves as elite spies. D. Elite hackers are strong individualists.

B. Elite hackers view themselves as part of an inner circle.

What is a primary issue when drafting legislation against computer crime? A. Laws must allow for technological innovation. B. Laws must not infringe on constitutionally protected rights. C. Laws must not be too broad. D. Laws must cover a wide variety of possible crimes.

B. Laws must not infringe on constitutionally protected rights.

What is the primary motivation of most cyberdeviants? A. destroying corporations B. a sense of accomplishment C. creating disorder D. anarchy

B. a sense of accomplishment

A cracker with the handle DeathFromAbove rationalizes her cyberdeviance by explaining that she only steals from corporate bank accounts in order to donate money to public libraries. What technique of neutralization is she using? A. denial of responsibility B. appeal to higher loyalties C. denial of injury D. denial of victim

B. appeal to higher loyalties

Grace walks into the offices of a major movie studio, downloads thousands of confidential files, and uses this information to blackmail several people. What kind of cybercrime is this? A. crime associated with the prevalence of computers B. computer as a target C. computer as incidental to other crime D. computers as instruments of crime

B. computer as a target

Sarah walks for 1 hr every morning, rain or shine. Benji, an Olympic gold medalist, treats exercise as his job, working with a trainer 10 hr a day to ensure a top-level performance. He has a hard time stopping, even to eat or sleep. Graciela, who is training for a Spartan Race, wakes up at 5 a.m. for a jog and a weight training session 5 days a week. Who is engaging in an extreme form of everyday behavior?

Benji

What three forms of Internet addiction are recognized by Block?

Block identified three forms of Internet addiction: excessive gaming, sexual preoccupations, and e-mail/text messaging.

Why do elite hackers value disembodied anonymity? A. It makes it easier to violate the law. B. It ensures they are protected from criminal hackers. C. It makes the subculture more egalitarian. D. It disconnects them from a society that does not appreciate them.

C. It makes the subculture more egalitarian.

What is the "Robin Hood" syndrome? A. the idea that repressive governments actually create cybercriminals B. a rationalization that cybercriminals are actually helping identify vulnerabilities in security systems C. a justification that cybercriminals use for stealing from large corporations D. the idea that cybercriminals are psychologically immature

C. a justification that cybercriminals use for stealing from large corporations

According to Sutherland, which of the following is not an example of white-collar crime? A. a chief financial officer embezzling company money B. a bank officer accepting a bribe to approve a loan C. an executive murdering a whistleblower D. a small business owner falsifying invoices to create the appearance of higher profits

C. an executive murdering a whistleblower

Phillipe sells counterfeit copies of popular computer programs, such as Adobe Acrobat. What kind of cybercrime is this? A. computer as incidental to other crime B. computers as instruments of crime C. crime associated with the prevalence of computers D. computer as a target

C. crime associated with the prevalence of computers

Graciela is debugging a program for her company using installed computer software that allows her to make changes without going through complicated access procedures. What is this kind of software called? A. logic bomb B. Trojan horse C. trap door D. workaround

C. trap door

According to Donn Parker, how do cyberdeviants justify what they do? A. They argue that their targets commit more cybercrime than they do. B. They argue that they provide an important security service. C. They argue the government is too restrictive. D. They argue the harm they do is limited to computers.

D. They argue the harm they do is limited to computers.

How would Jack Katz explain white-collar crime? A. White-collar crime is motivated by financial gain. B. Offenders rationalize white-collar crime as victimless. C. Cultural differences cause white-collar crime. D. White-collar crime offers an illicit thrill.

D. White-collar crime offers an illicit thrill.

What category of cybercrime is using a computer to store client lists for illegal gambling operations? A. crime associated with the prevalence of computers B. computers as instruments of crime C. computer as a target D. computer as incidental to other crime

D. computer as incidental to other crime

Which of the following is not one of the motivations for government crime identified by Alex Thio? A. the acquisition of power B. monetary gain C. condescending attitudes of government officials D. cover-up misdeeds

D. cover-up misdeeds

What is a major ethical position of elite cyberdeviants? A. sharing government secrets in public forums B. collecting the private information of others C. networking with other elite hackers D. protecting the property of others against destruction

D. protecting the property of others against destruction

Any sport, when overplayed by an individual, is clinically diagnosed as extreme sport addiction.

False

True or False Extreme sports first became popular in the 1980s.

False

True or False It is easy to draft cybercrime legislation that is both constitutionally defensible and legally enforceable.

False

True or False Most cyberdeviants are motivated by financial gain.

False

True or False Net compulsion refers to the undue fascination with the availability of increasing amounts of information and data from around the world.

False

Distinguish between the four types of workaholics identified by Machlowitz.

Machlowitz defined four types of workaholics: dedicated, integrated, diffused, and intense. Dedicated workaholics are single-minded and one-dimensional, involved in their work to the extent that any other activity is viewed as an intrusion to be avoided. Integrated workaholics occupy jobs that require nonworking activities. Travel and entertainment are "integrated" into their work and viewed as essential to the performance of their jobs. Diffused workaholics are typically involved in several projects at the same time. They are able to juggle unrelenting demands on their time, retain the details of their various job-related commitments, and appear to be in control of their daily lives. Intense workaholics pursue leisure with the same passion, purposefulness, and pace as work. If told to relax and rest, they will do so with dogged intensity and on schedule.

Describe the common characteristics of workaholics.

Machlowitz identified five common characteristics that workaholics have in common. First, workaholics have strong self-doubts and are often gripped by a fear that they cannot accomplish their tasks. Second, workaholics prefer labor to leisure. Workaholics derive their greatest pleasure from the work they do. All other activities--family activities, recreation, socializing--take a second place to work, and are to be avoided, with the result that every spare moment is devoted to accomplishing work tasks. Third, workaholics make the most of their time. There is a need to maximize every moment; time is not to be wasted--something must be accomplished. Fourth, workaholics are vigilant about their use of time, always striving to devise time-saving strategies and ways to do more things simultaneously. Time-deepening, also known as multitasking, can lead workaholics to work even while eating and driving. Finally, workaholics blur the distinctions between business and pleasure. Since business is their primary source of pleasure, there is no line dividing the two.

Distinguish between the seven types of cybercriminals identified by Donn Parker.

Parker identified seven different types of cybercriminals: (1) pranksters, (2) hacksters, (3) malicious hackers, (4) personal problem solvers, (5) career criminals, (6) extreme advocates, and (7) malcontents, addicts, irrational, and incompetent people. Pranksters are those who leave messages or embed jokes or strange characters into computer systems. They intend no harm. Malicious hackers, on the other hand, do intend harm. The personal problem solvers resort to computer crime to address issues they have been unable to address in other ways--for example, committing cybercrime to pay their bills on a temporary basis. Harm is not their primary goal. Career criminals earn most of their income through cybercrime, for example, using a computer to commit fraud. Extreme advocates include terrorists and political, social, or religious zealots. Their goal is to commit hard, but for a purpose. Finally, people that are malcontent, addicted, irrational, or generally incompetent comprise the last group of cyberdeviants. Their primary motivation is relieving their own unhappiness, and they express that unhappiness in cyberspace, where they can remain anonymous.

Distinguish between the four types of workaholics identified by Robinson.

Robinson identified four types of workaholics: relentless, bulimic, attention deficit, and savoring. The relentless workaholic is characterized by a full-blown charge into any project. This prohibits devising an effective plan for its completion. Work is typically not delegated to others resulting in inefficiency. The bulimic workaholic delves into projects at the last minute and panic when time is running out. These adrenaline rushes are followed by periods of inertia. Unrealistic expectations for performance lead to incessant worry about not meeting them. Attention deficit workaholics move rapidly from one task to another, driven by the need for adrenaline "high." Their inability to focus on the job at hand leads to chaos in the workplace. Finally, savoring workaholics are characterized by an obsession over the details of a project. This focus on minor details repeatedly stalls the completion of work.

Compare and contrast the four types of computer hackers described by Marc Rogers.

Rogers created a typology for categorizing computer hackers. Old school hackers are motivated by personal curiosity and the desire to learn more about the workings of computer systems. Script kiddies are also called cyberpunks: They are typically young, White, and male. Computers are their overriding passion, and they hack into computer systems with the intent to do harm. Professional criminals, also called crackers, earn a living through cybercrime. Finally, coders and virus writers create codes and viruses that are then used by hackers. All four types share an interest in computers and technological skill. The difference between them is primarily in what their interest level and skill set are used to accomplish.

Distinguish between technovandalism and technotrespass.

Technovandalism and technotrespass are two related forms of a category of cybercrime in which the computer is a target of offenses. Both offenses involve unlawful access to a computer. Technovandalism may involve malicious intent but is often motivated by the offender's need to successfully break into a computer system. Technotrespass refers to an unlawful exploration of computer files simply to look at the contents, not to damage, alter, or steal any information.

Compare and contrast the four types of Internet addiction identified by the Center for Online Addiction.

The Center for Online Addiction (www.netaddiction.com) has identified four specific types of Internet addiction: cybersexual addiction, relational addiction, net compulsion, and information overload. They all involve excessive use, often associated with a loss of sense of time or a neglect of basic drives; withdrawal, including feeling anger, tension, and/or depression when the computer is inaccessible; tolerance, including the need for better computer equipment, more software, and more hours of use; and negative repercussions, including arguments, lying, poor achievement, social isolation, and fatigue. Cybersexual addiction refers to the preoccupation with online pornography and involvement in the playing out of sexual fantasies in chat rooms. Relational addiction, sometimes called "cyberaffair," refers to the establishment of excessive virtual relationships via the Internet. Net compulsions encompass gambling, gaming, shopping, or stock trading. Finally, information overload involves an undue fascination with the availability of increasing amounts of information and data from around the world.

Why do Humphrey and Schmalleger include extreme forms of everyday behaviors in the textbook?

They help us understand how everyday behaviors are guided by social norms and supported by cultural values.

What is time-deepening?

Time-deepening is multitasking, doing several things at the same time in order to accomplish more things, quicker.

Ji-young is obsessed with seeking knowledge on the Internet. Every spare moment is spent searching the web for obscure facts and data. She does not leave her room for days at a time, completely lost in her research. What type of Internet addiction is this?

information overload

When sexual assault occurs during a date, it can typically involve ______. A. mixed signals B. consent C. provocative clothing D. verbal or physical coercion

D. verbal or physical coercion

Jerome borrows money from the employee retirement fund. He decides he is only borrowing a little bit, so no one will actually be hurt by his actions. What is Jerome engaged in? A. condemnation of the condemners B. denial of injury C. denial of responsibility D. appeal to higher loyalties

B. denial of injury

Criminal subcultures are a key component of the ______ approach to white-collar crime. A. techniques of neutralization B. power control C. opportunity structures D. seductions of crime

C. opportunity structures

If Dr. Morooka decides that white-collar crime occurs when the offenders believe the money that they can earn outweighs the risk of being caught and arrested, he is using ______ to understand white-collar crime. A. rational choice theory B. culture conflict theory C. techniques of neutralization D. differential association

A. rational choice theory

Outline the steps in a Ponzi scheme.

A Ponzi scheme is a lucrative kind of white-collar crime, organized like a pyramid. Only the people at the very top of the pyramid see financial returns. The scheme begins with an organizer. The organizer convinces an investor that in a short time their investment will result in a big payoff. The investor gives the organizer funds, which are never invested. As the organizer convinces more people to invest, part of this money is given to earlier investors to demonstrate the profit potential of the venture. The initial appearance of profitability draws in more victims for the organizer to exploit. Large dividends are a sure thing. The Ponzi scheme crashes when there are not enough "new" investors to generate the funds needed to keep the scheme going or when the organizer of the Ponzi leaves with all the funds.

What is a key difference between the way Sutherland defined white-collar crime and the way former U.S. Department of Justice Herbert Edelhertz defined white-collar crime? A. Edelhertz's definition does not specify high social status. B. Sutherland did not recognize crime committed by government employees as white-collar crime. C. Sutherland's definition does not specify high social status. D. Edelhertz called white-collar crime "elite crime."

A. Edelhertz's definition does not specify high social status.

In online sexual solicitation between a child and a predator, what role does physical contact play? A. Physical contact does not have to occur for a crime to occur. B. To arrest a predator, there must be evidence of physical contact. C. To convict a predator, there must be evidence of unwanted physical contact. D. For a crime to have occurred, sexual contact must have occurred.

A. Physical contact does not have to occur for a crime to occur.

Which country has the highest number of reported rapes? A. Sweden B. Colombia C. the United States of America D. Russia

A. Sweden

According to Edelhertz's typology, a lawyer embezzling money from a client exemplifies ______. A. abuse of trust B. con games C. business crime D. personal crime

A. abuse of trust

Who is the typical offender in white-collar crime? A. college-educated White men B. middle-aged men with MBAs C. men with advanced degrees D. Americans with degrees in STEM fields

A. college-educated White men

Jerome borrows money from the employee retirement fund. He decides he is only borrowing a little bit, so no one will actually be hurt by his actions. What is Jerome engaged in? A. denial of injury B. condemnation of the condemners C. denial of responsibility D. appeal to higher loyalties

A. denial of injury

The three main forms of fraud and abuse are asset misappropriation, corruption, and ______. A. fraudulent statements B. blackmail C. insider trading D. embezzlement

A. fraudulent statements

Which two terms are important components of Sutherland's definition of white-collar crime? A. high social status; respectability B. men; authority C. defrauded lower class; corporate D. intent to conceal; government

A. high social status; respectability

Which of the following accounts for a significant amount of organized criminal activity? A. illicit drug trafficking B. social media C. fraud D. globalization

A. illicit drug trafficking

What is the focus of micro-level theories that account for white-collar crime? A. why people engage in white-collar crime B. how social forces influence white-collar crime C. variations in the rate of white-collar crime D. how the government can reduce white-collar crime rates

A. why people engage in white-collar crime

Which of the following is true about the sexual victimization of children? A.Children are sexually victimized most frequently by people they know. B.Children are sexually victimized most frequently at school. C.Children are sexually victimized most frequently by older women. D.Children are sexually victimized most frequently by other children.

A.Children are sexually victimized most frequently by people they know.

In online sexual solicitation between a child and a predator, what role does physical contact play? A.Physical contact does not have to occur for a crime to occur. B.To arrest a predator, there must be evidence of physical contact. C.For a crime to have occurred, sexual contact must have occurred. D.To convict a predator, there must be evidence of unwanted physical contact.

A.Physical contact does not have to occur for a crime to occur.

Faith is well-paid. She operates without police scrutiny, arranging "dates" via the Internet, which are actually encounters where she is paid for sex. Her clients are typically quite wealthy. What type of prostitute is Faith? A.call girl B.window worker C.streetwalker D.bar girl

A.call girl

Hanna and Jerome are dating. Jerome convinces Hanna to provide him with naked picture. When she tries to break up with him, he threatens to post the nude pictures on various social media websites. What is this called? A.sextortion B.pornography C.aggressive sexual solicitation D.pedophilia

A.sextortion

Summarize the three motives for government crime described by Alex Thio.

Alex Thio describes three motives for governmental criminal activity. The first is monetary gain, the second is acquisition of power, and the third involves the condescending attitudes of government officials toward the public.

______ refers to a serious offence committed by a group of three of more people with the aim of making money. A. White-collar crime B. Organized crime C. Conspiracy D. Fraud

B. Organized crime

Which of the following summarizes what all organized crime groups have in common? A. They all involve multiple generations of one or two families. B. They are all adaptable. C. They are all dominated by men. D. They all have a code of conduct against killing civilians.

B. They are all adaptable.

What has reduced participation in the yakuza throughout Japan? A. war between rival yakuza groups B. laws that prohibit membership C. the yakuza has migrated to the United States D. the legalization of prostitution

B. laws that prohibit membership

Organized criminal groups and ______ collaborate on the marketing and transportation of munitions. A. the United Nations B. terrorist organizations C. theocratic governments D. Russia

B. terrorist organizations

Gary gets his date, Michelle, drunk and she passes out. He has sex with her. Why is this considered rape? A.Gary is a date rapist. B.Michelle was unable to give consent. C.Michelle said she did not want to have sex. D.Michelle and Gary were on a date.

B.Michelle was unable to give consent.

Mina is 13. She meets a friend online and believes she is in love. Soon, he begins demanding that she travel to a nearby town so they can meet. What kind of online sexual solicitation is this? A.catfishing B.aggressive C.passive D.sextortion

B.aggressive

According to Sutherland, which of the following is not an example of white-collar crime? A.a bank officer accepting a bribe to approve a loan B.an executive murdering a whistleblower C.a small business owner falsifying invoices to create the appearance of higher profits D.a chief financial officer embezzling company money

B.an executive murdering a whistleblower

Vivian provides sex in exchange for relatively little money. She finds her clients at various intersections in a large urban area. She has a long arrest record. What type of prostitute is Vivian? A.bar girl B.streetwalker C.window worker D.call girl

B.streetwalker

How is the per country rape rate calculated? A.the number of rapes per 1,000,000 people in the world B.the number of reported rapes per 100,000 people in the country C.the number of reported rapes divided by the total country population D.the total number of rapes per year divided by the total world population

B.the number of reported rapes per 100,000 people in the country

Compare and contrast how Merton's approach would explain prostitution with how Sellin's approach would explain prostitution.

Both Merton's approach and Sellin's approach are societal-level explanations of sexual offender. Merton suggests that when available means are mismatched with cultural goals, deviance results. In the case of prostitution, an individual might become frustrated by inability or unwillingness to use socially approach means to achieve socially approved goals. At that point, they may turn to prostitution as "innovators" creating a new way of achieving a culturally approved goal (making money) or as a form of rebellion, replacing both institutionalized means and goals with new, more sexually focused, means and goals. Sellin's approach emphasizes how cultural norms in one society may encourage deviant behavior when followed in another society with different cultural norms. His approach to explaining prostitution would emphasize that in some cultures, sexual promiscuity is more acceptable, lessening the need for prostitutes to fulfil sexual desires. When someone from a culture in which sexual promiscuity is more acceptable joins a culture in which sexual promiscuity is actively discouraged, they may be more motivated to seek out prostitutes, increasing the amount of demand for prostitution. Generally speaking, Sellin identified prostitution as a secondary conflict, meaning a conflict between the subculture and the larger culture. He suggested that prostitution is viewed by some subcultures as an acceptable way of life. Middle-class values, however, form the basis for most criminal laws. Because the act of prostitution is opposed to middle-class standards, it is defined as criminal.

Distinguish between corporate crime and occupational crime.

Both corporate crime and occupational crime are forms of white-collar crime. The primary distinction between corporate crime and occupational crime is that corporate crime benefits an organization, while occupational crime benefits an individual.

Distinguish between the differential association and differential identification approach to explaining sexual offending.

Both differential association and differential identification are considered individual-level explanations of sexual offending. Sutherland's differential association approach to understanding sexual offending suggests that sexual offenders engage in a learning process. The more an individual is exposed to favorable definitions of sexual offending, the more likely they will engage in sexually offending. They can learn techniques to accomplish sexual offenses, motivations to justify sexual offending, and rationalizations for why sexual offending is acceptable. While differential association theory might suggest that victims of childhood sexual abuse may later imitate this behavior and victimize others, Glaser's theory of differential identification explains the specific circumstances under which a victim of a sexual offense might go on to become a sexual offender. If the victim identifies with another person who views such behavior as acceptable, they are more likely to sexually offend. If a person who has been a victim of sexual abuse does not identify with his or her assailant, then they are less likely to become a sexual offender.

Which of the following is true about the sexual victimization of children? A. Children are sexually victimized most frequently at school. B. Children are sexually victimized most frequently by older women. C. Children are sexually victimized most frequently by people they know. D. Children are sexually victimized most frequently by other children.

C. Children are sexually victimized most frequently by people they know.

Which city has the highest rate of reported rape? A. Madrid B. New York C. Maputo D. Istanbul

C. Maputo

Which of the following summarizes what all organized crime groups have in common? A. They all have a code of conduct against killing civilians. B. They are all dominated by men. C. They are all adaptable. D. They all involve multiple generations of one or two families.

C. They are all adaptable.

According to James William Coleman, why is it difficult to measure white-collar crime? A. Most white-collar crime is committed by government officials. B. White-collar criminals have enough money to bribe authorities. C. Victims do not realize they have been victimized. D. White-collar crime often does not violate any existing law.

C. Victims do not realize they have been victimized.

According to Sutherland, which of the following is an example of white-collar crime? A. a stockbroker refusing to work on the stock market floor B. a loan officer having an affair with her much younger secretary C. a store manager borrowing money from a company safe D. an advertising executive drinking alcohol during work hours

C. a store manager borrowing money from a company safe

In occupational crimes, the criminal activity of ______ causes more financial loss than the criminal activity of ______. A. irregular migrants; citizens B. women; men C. managers; employees D. governments; corporations

C. managers; employees

Criminal subcultures are a key component of the ______ approach to white-collar crime. A. power control B. seductions of crime C. opportunity structures D. techniques of neutralization

C. opportunity structures

What is the primary difference between corporate crime and occupational crime? A. the kind of person victimized B. the punishment is greater for occupational crime C. the beneficiary of the crime D. the target of the crime

C. the beneficiary of the crime

According to culture conflict theory, why does rape and sexual assault occur? A.It occurs because patriarchal culture encourages sexual assault. B.It occurs because men are socialized to maintain power, control, and dominance over women. C.It occurs because conduct norms regarding appropriate sexual behavior differ between societies. D.It occurs because violent subcultures normalize sexual assault.

C.It occurs because conduct norms regarding appropriate sexual behavior differ between societies.

_____ refers to a serious offence committed by a group of three of more people with the aim of making money. A.Conspiracy B.Fraud C.Organized crime D.White-collar crime

C.Organized crime

Which of the following is true about rape victims? A.Females commit more rapes than males. B.White women have the highest rate of rape victimization. C.There are more female victims of rape than male victims. D.There are more male victims of rape than female victims.

C.There are more female victims of rape than male victims.

Jack travels to Thailand once a year to pay prostitutes to have sex with him. What is Jack? A.a pedophile B.a sex trafficker C.a sex tourist D.a pimp

C.a sex tourist

According to Groth's typology of rapists, rapists are motivated by power, anger, or ______. A.mental illness B.the need to control C.sadism D.sexual desire

C.sadism

Summarize the short- and long-term effects of childhood sexual victimization.

Childhood sexual victimization is associated with both short- and long-term effects. Consequences of victimization include both immediate and long-term behavioral and psychological problems. Research suggests that the greatest impact of childhood sexual abuse is an increased risk of mental health issues, such as depression and anxiety. Childhood sexual abuse is associated with higher rates of aggressive behavior toward other people. When polyvictimization, the experience of more than one form of child victimization by a single person, has occurred, traumatic symptoms were more severe. Victims of childhood sexual assault are at greater risk for both physical and sexual victimization later in life and more likely to experience intimate partner violence than individuals who have not experienced prior sexual assaults. Victims of child sexual abuse are more likely to attempt suicide and abuse illicit drugs and alcohol.

Which of the following accurately describes who can commit a white-collar crime according to Sutherland? A. Only government officials can commit a white-collar crime. B. Anyone with a job can commit a white-collar crime. C. White-collar crime can only be committed by someone of respectability. D. White-collar crime cannot be committed by someone of higher social status.

D. White-collar crime cannot be committed by someone of higher social status.

The term "white-collar crime" considered controversial when Sutherland first introduced it because ______. A. the Federal Bureau of Investigations did not approve of the term B. Sutherland was accused of plagiarizing the term C. sociologists were not authorities on criminal behavior D. crime was largely seen as a phenomenon of the lower classes

D. crime was largely seen as a phenomenon of the lower classes

Which demographic category experiences the highest rate of rape victimization? A.Asians B.White women C.Native Hawaiians D.Black women

D.Black women

Which of the following is true about rape victims? A.White women have the highest rate of rape victimization. B.Females commit more rapes than males. C.There are more male victims of rape than female victims. D.There are more female victims of rape than male victims.

D.There are more female victims of rape than male victims.

What are the primary characteristics of elite deviance, according to David Simon?

David Simon provided several characteristics that all forms of elite deviance have in common. Elite deviance is not necessarily criminal, since not all acts widely viewed as immoral or unethical are criminal. The acts are generally considered low risk. Often, elites committing these acts successfully concealed them for lengthy periods before being discovered. The acts are all committed by people living in the upper and upper-middle classes. Some of the actions are committed by elites themselves for personal gain, or they were committed for purposes of enhancing the power, profitability, or influences of the organizations the offenders are involved with. When and if the elites are apprehended, the punishments inflicted were in general quite lenient, compared with those given to common criminals. Acts of elite deviance can pose great danger to the public's safety, health, and financial well-being.

True or False In occupational crime, the criminal activity of employees costs more money than the criminal activity of managers.

False

True or False Men are more likely to be arrested for prostitution than women.

False

True or False Organized crime does not usually involve violence.

False

True or False Organized crime is primarily a phenomenon of postindustrial nations.

False

Summarize the typical offender characteristics of rapists.

Men commit the vast majority of forcible rapes. Most rape and sexual assault offenders are aged 18 and over, and almost 50% of offenders are over age 30. A quarter of the incidents reported to law enforcement agency involve offenders under age 21.

Outline how organized crime families conduct their operations.

Organized crime consists of carefully planned criminal activities with the aim of profit. The head of each family is responsible for making all the decisions. In a hierarchy, assisting the boss is an underboss and an advisor to the boss. Next are the capo-regimes who oversee established members, soldiers, and associate members. While these groups have their own specialities, often divided along racial/ethnic lines, all these groups conduct their operations in essentially the same manner. First, there is a continuing enterprise based on a preexisting relationship, or around a specific illicit product or opportunity. Second, intimidation, threats, and violence are used to obtain access to the illicit opportunity and to prevent competing criminal groups from claiming any part of the illicit business. Third, bribery and extortion are commonly used to avoid interference from local, state, and federal authorities. Finally, organized crime groups are flexible, quickly adapting to changes in supply, demand, law enforcement, and competition

Summarize the differential association theory approach to understanding white-collar crime.

Sutherland's theory of differential association focuses on the motivations, rationalizations, and techniques for engaging deviant behavior. When used to explain white-collar, he would suggest the techniques, justification, and motivations for engaging in white-collar crime are learned by interacting with other persons already involved in white-collar crime.

Distinguish between rape and sexual assault.

The Federal Bureau of Investigation's Uniform Crime Report and the Bureau of Justice Statistics have slightly different definitions for what constitutes rape. The key components of both definitions are (1) consent was not given and (2) penetration of the victim's body. Rape is defined differently from sexual assault, primarily because sexual assault includes unwanted sexual contact without penetration.

Distinguish between the six most common types of prostitute.

The typology of prostitution includes independent call girl, escort agency employee, brothel employee, window worker, bar worker, and streetwalker. These types are differentiated based on their methods of operation, their degree of privacy, and their income. The independent call girl commands the highest income, works away from public scrutiny, and their clients are primarily referrals from preexisting wealthy clients. They make contact with their clients primarily online. Escort agency employees are also relatively well-paid. Their employer provides oversight and sets the pay schedule as well coordinating their activity. The third type of prostitute is the brothel employee. They work in specific houses that may provide messages, saunas, or other services to the clients. Brothel sex workers are paid less than independent call girls or escort agency employees, but are generally better compensated than window workers, bar workers, or streetwalkers. Window workers operate publically, waiting in windows for clients to pass by. They receive relatively lower pay than more prestigious types of prostitutes. Casino workers, sometimes called "bar girls," solicit clients in public bars, either working alone, in groups, or with pimps. They receive relatively low pay and may appear as regular patrons of an establishment, retiring to a temporary or rented room with their client to exchange sex for money. The final type of prostitute is the streetwalker, on the opposite end of the privacy/oversight/compensation spectrum than an independent call girl. Clients are solicited in relatively public spaces, and streetwalkers are the most exploited and have the greatest risk of physical assault, though they are not well compensated.

Compare and contrast the two broad dimensions of white-collar crime: the offender-based perspective and the opportunity perspective.

There are two general ways of understanding white-collar crime. The offender-based perspective considers the status, power, and respectability of the perpetrator, while the opportunity perspective focuses on the way in which offenders are in powerful position and have the resources needed to commit their offenses.

True or False According to Sellin, because prostitution does not conform to middle-class values, it is defined as sexual deviance.

True

True or False According to the Federal Bureau of Investigation's Uniform Crime Report, if penetration does not occur, rape has not occurred.

True

True or False Call girls are high-status sex workers.

True

True or False Embezzlement is a form of white-collar crime.

True

Provide examples for each of Green's occupational crime categories.

Varies. In developing the concept of occupational crime, Green identified four categories. Organizational occupational crime consists of crimes committed for the benefit of an employing organization. For example, falsifying profit reports to temporarily inflate stock prices. State authority occupational crime consists of crimes that can only be committed by officials exercising their state-based authority, or by those working for them; for example, National Guardsmen firing weapons into a crowd of unarmed protesters. Professional occupational crime consists of crimes by professionals committed during the course of conducting their day-to-day career work; for example, a doctor providing prescriptions for narcotic medicines on demand. Finally, individual occupational crime consists of crimes by individuals as individuals. This is a kind of catchall category that includes occupational crime not captured in the other categories, like employee theft.

Identify the criminal enterprises of organized crime groups frequently associated with the following ethnic groups: Italian and Russian.

Varies. The Italian Mafia is primarily known for gambling, racketeering, and extortion. The Russian Mafia is primarily involved in various types of fraud--bank, health insurance, credit card, and telecommunications--as well as extortion, and illegal trafficking.

Distinguish between voyeurs and exhibitionists.

Voyeurs achieve sexual gratification by watching other people, while exhibitionists achieve sexual gratification by exposing their genitals to unwitting bystanders. Both are considered nonviolent sex offenses and typically do not result in physical harm.

Ted experiences a severe disruption in his personal life. He is reprimanded at his job, he is in debt, and his wife has threatened to leave him. Ted commits a rape, which Rada would classify as a ______. A.psychotic personality rape B.sadistic tendency rape C.masculine identity conflict rape D.situation stress rape

situation stress rape


Kaugnay na mga set ng pag-aaral

Chapter 9: Regional Economic Integration

View Set

Number Systems (binary, hexadecimal, octal and ASCII)

View Set

Most Beautiful Roof in the World Test

View Set

Unité 10 A (Le Québec--exercice 2, p. 518)

View Set

Political/religious structure of jesus's time

View Set

Chapter 10 Nutrition Strategies for Maximizing Performance

View Set

Ch 7: Characters, Strings, and the StringBuilder

View Set

Fin 7, FIN C5, C1 - Nature of Law, C1 - Nature of Law

View Set