Ch. 14: White-Collar Crime, Organized Crime, & Cybercrime

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following are examples of cyberstalking actions? A.) using the Internet to seek and collect a victim's personal information and whereabouts B.) stealing someone identity for financial gain C.) sending a coworker an email D.) adding an individual on social media

A.) using the Internet to seek and collect a victim's personal information and whereabouts

Which of the following individuals violate computer security essentially out of malice or for personal gain? A.) white hack hackers B.) black hat hackers C.) gray hat hackers D.) script kiddies

B.) black hat hackers

Individuals who violate computer security are referred to as ______. A.) mafiosos B.) hackers C.) terrorists D.) kiddies

B.) hackers

The Occupational Safety and Health Act (OSHA) made it a ______ to cause the death of a worker by willfully violation safety laws. A.) status offense B.) misdemeanor C.) felony D.) it is not a crime

B.) misdemeanor

______ can help explain crimes committed by individuals who develop and spread computer viruses. a.) Differential reinforcement theory b.) Strain theory c.) Feminist theory d.) Social disorganization theory

a.) Differential reinforcement theory

Which of the following criminologists coined the term white-collar crime? a.) Edwin Sutherland b.) Travis Hirschi c.) Cesare Lombroso d.) Jane Addams

a.) Edwin Sutherland

The ______ was charged with protecting human health and safeguarding the natural environment. a.) Environmental Protection Agency b.) Centers for Disease Control and Prevention c.) Department of Agriculture d.) Department of Interior

a.) Environmental Protection Agency

Which of the following criteria constitute white-collar crime, according to Sutherland? A.) The offender is lower class. B.) The committed violations are family-related. C.) The work-related violations of blue-collar workers are excluded. D.) Regular crimes committed by upper-class people are not excluded.

C.) The work-related violations of blue-collar workers are excluded.

Obtaining materials, such as credit card carbons or preapproval credit card forms, is referred to as ______. A.) carding B.) credit card skimming C.) dumpster diving D.) shoulder surfing

C.) dumpster diving

Which of the following is an example of a labor violation? A.) hiring illegal workers B.) keeping unsafe conditions C.) exploiting workers D.) all of these

D.) all of these

Which of the following contributed to unprecedented dumping of deadly chemicals and waste products into bodies of water during the Industrial Revolution? A.) cars B.) homes C.) prisons D.) factories

D.) factories

True/False?: Studies have shown that the more often a company is caught for violations, the less likely it is to engage in such acts in the future.

False

True/False?: Studies have shown that white-collar crime existed at a higher rate in more democratic countries.

False

True/False?: The Kefauver Committee found that organized criminal activity flourished around bootlegging operations.

False

True/False?: According to the text, corporate crimes causes at least 7 times more deaths than do traditional street crimes.

True

True/False?: Experts in the area of white-collar crime consider it one of the most difficult concepts to define.

True

Which of the following factors has been associated with organized crime? a.) Organized crime is hierarchical. b.) Organized crime is governed by free will. c.) Organized crime does not have an exclusive membership. d.) Organized crime does not constitute a subculture.

a.) Organized crime is hierarchical.

Which of the following criminalizes making, distributing, or using tools, such as software, to evade technological protection measures implemented by copyright owners to prevent access to copyrighted material? a.) Electronic Communications Privacy Act b.) Strengthening State and Local Cyber Crime Fighting Act c.) Digital Millennium Copyright Act d.) Child Online Protection Act

c.) Digital Millennium Copyright Act

The real turn for the worst for the environment was the ______. a.) Civil War b.) World War I c.) Industrial Revolution d.) Civil Rights movement

c.) Industrial Revolution

______ are deemed the lowest on the hacker ladder due to their limited technical abilities. a.) White hat hackers b.) Cyber terrorists c.) Hacktivists d.) Script kiddies

d.) Script kiddies


Set pelajaran terkait

RE: Types of Loans, Terms, and Issues

View Set

AIS Technical Quiz #2 Flowcharting and DFD

View Set

BUS LAW Ch. 7-Intellectual Property Rights

View Set

Skills Question (Health Assessment)

View Set

Lecture 1 Intro to Cloud Computing

View Set