Cyber Criminology Chapter 1
True
"Cyber" refers to almost anything "real" or "virtual" attached to a computer or network.
True
A great deal of effort is dedicated to computer security.
cybercrime.
According to the authors of the text, another term for digital crime is:
False
Case studies offer generalizations about trends in cybercriminality or patterns of offending.
Computer as incidental to crime
Child pornography is an example of which type of computer crime?
False
Computer crime is not an international problem.
False
Computerized theft never deprives a legitimate owner of a tangible asset.
True
Computers may be used as both criminal instruments and instruments of warfare.
Behavioral approaches of cybercriminals
Crimes associated with the prevalence of computers
virtually nonexistent; there is no centralized source.
Criminal statistics/data on computer crime are
True
Cybercrime has significantly increased since the 1990s.
True
Data alteration and denial directly targets the computer by attacking the useful information stored or processed by the computer.
Computer as a target
Data alteration, denial of service, network intrusions, thefts of information, and computer vandalism are examples of which type of computer crime?
False
Estimates on the cost of cybercrime are largely derived from criminal reports.
True
In general, the threat of computer crime victimization increases with industrialization
True
It can take months or even years to identify an actual monetary value for the loss of intellectual property.
False
It is relatively easy to place a monetary value on the loss of intellectual property.
True
Practitioners in both the criminal justice field and the computer science field typically have limited knowledge of each other's occupations.
True
Rapid growth in the computer security industry has largely occurred without adequate research on the nature of cybercrimes and criminals.
False
Research has shown that most dangers of economic computer crimes come from outsiders.
False
The Department of Justice systematically collects computer crime data.
True
The expanded use of Social Security numbers is the primary reason for the ease of identity theft.
True
The full extent of computer theft is unknown because many thefts go unreported.
intent of the intruder.
The primary difference between data alteration and network intrusion is the
True
The processes and dynamics involved in the production of digital crime and digital terrorism are virtually the same.
Computer as an instrument of a crime
The salami slice technique, pyramid schemes, and bunko schemes are examples of which type of computer crime?
True
The text seeks to merge knowledge of criminal justice and knowledge of computer science.
The ease with which criminals could misuse information. The observation that researchers felt that computer crime was not worthy of specific explicit research. The observation that losses increase substantially with intentional acts involving computers.
Which of the following is an example of Donn Parker's work as an early commentator on problems associated with computer crime?
Crimes that facilitate other crimes through the proper use of computers
Which of the following is not a characteristic noted by Anderson and colleagues in 2012?
Reputational damage Anti-virus software Loss of revenue
Which of the following is not considered in the calculation of costs associated with each type of computer crime?
Trans Credit
Which of the following is not one of the three major credit reporting bureaus that control the information on all persons applying for credit in the United States?
Computer as an instrument of a crime
Which type of computer crime describes actions in which the computer is used only to further a criminal end? In other words, the computer or data contained therein is not the object of the crime.
Crimes associated with the prevalence of computers
identity theft are examples of which type of computer crime?