Criminology Exam 4
The word obscenity is derived from the Latin caenum, for:
"filth"
Which is accurate about cyberbullying?
All of the above are accurate regarding cyberbullying.
Why do cybercrimes present a compelling challenge for the justice system and law enforcement community?
Cybercrime presents a compelling challenge for all these reasons.
What is the most common form of spam?
Income tax evasion is a type of client fraud. Not paying taxes, is an example of:
passive neglect.
Which of the following involves systematic theft of company property by employees?
pilferage
Some refer to public order crimes as "victimless crimes" because participants are willing and not actually harmed. Others claim there is no such thing as a victimless crime. Who, then, should be considered the victim?
society as a whole
Crips, Bloods, and the MS-13 are now referred to as:
transnational mega-gangs.
According to the social-learning view of drug abuse, parental drug abuse begins to have a damaging effect on children as young as ______ years old.
two
Which involves obtaining sexual pleasure from spying on a stranger while he or she disrobes or engages in sexual behavior with another?
voyeurism
The term prostitution derives from the Latin prostituere, which means:
"to cause to stand in front of."
Theft through the illegal reproduction and distribution of movies, software, games, and music is estimated to cost US industries ___________ worldwide each year.
$20 billion
The United States is estimated to purchase approximately ______% of illegal wildlife and wildlife products on the global market.
20
Penalties for bank fraud include a maximum fine of $1 million and up to how much time in prison?
30 years
What do we know about the link between pornography and violence?
All of these statements are true regarding the link between pornography and violence.
Which Act establishes standards for US water quality and purity?
Clean Water Act
Which is false regarding the sale of illegal drugs?
In terms of weight and availability, illegal drug sales are second to wildlife trafficking in terms of lucrativeness.
Which statement best reflects cybercrime?
Innovation brings change, and, with it, new opportunities to commit crime.
___________ are directed against acts that some people believe threaten the moral fabric of society and are a danger to the public order.
Moral crusades
Edward Snowden's effort to warn the public about the ____________________ is discussed within the context of espionage but could be included as governmental cyberspying.
NSA spying program
Legally defining obscenity is complicated. To clarify how the concept of community standards were to be determined, the Supreme Court articulated the reasonableness doctrine in the case of:
Pope v. Illinois
In 1970, Congress passed the Organized Crime Control Act. Title IX of the act, probably its most effective measure, is the:
Racketeer Influenced and Corrupt Organization (RICO) Act.
Which is not a reason that women become prostitutes?
They like sex.
________________________________ is a form of organized crime operating across national borders.
Transactional organized crime
What is the difference between a Trojan horse and a virus?
Trojan horses do not replicate themselves.
Why do deterrence strategies typically work when combating white-collar crime?
White-collar crime is a rational act.
The type of cyberthreat represented by Titan Rain is:
a cyberespionage threat.
When firms divide a region into territories and each firm agrees not to compete in the territories of others, it is illegal and is called:
a division of markets.
Studies pertaining to the psychological view of the cause of substance abuse have found that many addicts exhibit psychopathic or sociopathic behavior characteristics, forming what is called a(n) _________________ personality.
addiction-prone
As the threat of terrorism and cybercrime grows, so too may tolerance for invasions of privacy to combat these threats. What belief may sway public opinion and justify the use of IT by law enforcement?
all of these beliefs may sway public opinion and justify the use of IT by law enforcement
Terrorists groups have used the Internet to fund their operations. How is such funding accomplished?
all of these methods are used to fund terrorist operations
Compliance strategies are often viewed as "slaps on the wrist." In their place, deterrence strategies have become the normative approach to controlling white-collar offenders. Why is the tide turning from compliance to deterrence?
because of public displeasure and a growing awareness of the damage caused by white-collar criminals
Megan Meier was a victim of what type of cyber act?
catfishing
The two main mediums for cyberbullying are:
cellphones and the Internet.
A white-collar crime in which a stockbroker makes repeated trades with a client's account in order to fraudulently increase his or her commissions is known as:
churning.
Sharing files with friends who did not pay for them is an example of:
copyright infringement.
What casual explanation of white-collar crime states that some organizations promote criminal enterprise in the same way that lower-class culture encourages the development of juvenile gangs and street crime?
cultural view
Cybercriminals who aim their malicious attacks at disrupting, defacing, and destroying technology that they find offensive are known as __________________________.
cybervandals
Which type of cybercrime consists of acts aimed at undermining the social, economic, and political system of an enemy nation?
cyberwar
A _____________________ is designed to harass or extort money from legitimate users of an Internet service by threatening to prevent user access to the service.
denial-of-service attack
Shoplifting is a type of ____________ fraud that involves purchasing or finding legitimate retail receipts, stealing the products listed on the receipts, returning the items to the retailer for store credit or a gift card, and then selling the gift card on the Internet at a discount for quick cash.
e-tailing
Using illegal tactics to make profits in the marketplace is known as:
enterprise crime.
If a store advertises sweaters at a bargain price but does not actually have any sweaters for sale for that price, they are guilty of which offense?
false advertising
It is difficult to prosecute and control Internet pornography because:
federal legislation has been successfully challenged in the courts under the First Amendment.
What are "cybersmears" and "pump and dumps?"
forms of market manipulation
An explanation of drug abuse that posits that users begin with a more benign drug (alcohol or marijuana) and progress to more potent drugs is known as the ___________ model.
gateway
Which topic would not be of particular interest to a moral crusader?
homicide
Which crime occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions?
illegal touting
White-collar crime involves illegal activities of people and institutions whose acknowledged purpose is ____________ profit through ______________ business transactions.
illegal; legitimate
Most businesses in Russia, whether legal, quasilegal, or illegal, must operate with the protection of a:
krysha
The factor that distinguishes corporate crime from individual-level white-collar crime is that with corporate crime, the perpetrator is a(n) _____________ and not a(n) _____________.
legal fiction, individual
Recent research on D.A.R.E. has found:
little to no effect and needed changes.
There are many different views on the causes of drug use. The subcultural view of substance abuse concentrates on ______________ addiction.
lower-class
The most commonly used illegal substance among those ages 12 and older is:
marijuana.
Howard Becker calls individuals who seek to shape the law toward their own way of thinking:
moral entrepreneurs.
In debating the issue of legislating morality, Joseph Gusfield argues that the purpose of outlawing immoral acts is to show the ____________ of those who condemn the acts over those who partake in them.
moral superiority
Corporations can circumvent economic sanctions by:
moving their rule-violating activities overseas.
The problem with controlling pornography centers on the definition of:
obscenity.
When powerful institutions willfully violate the laws that restrain them from doing social harm, or that require them to do social good, it is called corporate crime or:
organizational crime.
Which of the following is the routine practice of paying radio stations to play particular songs?
payola
When an identity thief creates false e-mails and/or websites that look legitimate but are designed to gain illegal access to a victim's personal information, it is called:
phishing.
Systematic theft of company property by employees is common and is called:
pilferage.
Which is a public order crime?
prostitution
Acts that are considered illegal because they threaten the general well-being of society and challenge its accepted moral principles are known as:
public order crimes.
What white-collar crime involves a contract or conspiracy designed to stifle competition, create a monopoly, artificially maintain prices, or otherwise interfere with free market competition?
restraint of trade
Which type of offense involves the perpetrator carefully skimming small sums from the balances of a large number of accounts in order to bypass internal controls and escape detection?
salami fraud
Computer worms are similar to viruses except that they use computer networks or the Internet to:
self-replicate.
Which prostitutes are considered the least attractive, lowest paid, most vulnerable men and women in their profession?
streetwalkers
The new phenomenon or form of cyber "entertainment" called ___________ involves the use of spoofing technology to call 911 in order to fake a critical emergency, such as a hostage situation, that draws a real-life response from law enforcement.
swatting
An effort to prohibit the sale of liquor in the United States that resulted in the passage of the Eighteenth Amendment to the Constitution in 1919 was known as the:
temperance movement.
Drug use has existed for centuries. Ancient writings indicate that __________, or the "plant of joy," was used 5,000 years ago.
the opium poppy
While politically appealing, controlling sex for profit is difficult because:
the public desires to purchase sexually related material and services.
In the 1930s, Sutherland first used the phrase "white-collar crime" to describe the criminal activities of:
the rich and powerful.
Cyberterrorism is more efficient and less dangerous than more traditional forms of terrorist activity because:
there is no need to infiltrate enemy territory.
One example of health care fraud involves billing for more expensive services or procedures than were actually provided or performed. This practice is termed _______________ and requires "inflation" of the patient's diagnosis code to a more serious condition consistent with the false procedure code.
upcoding