Cybercrime and Society Docx Test Bank 3e Full Test Bank 3e - Complete Test Bank | Cybercrime and Society 3e by Majid Yar. DOCX document preview.
Chapter 1: Cybercrime and the Internet – An Introduction
1. The Advanced Research Projects Agency Network’s (ARPANET) original purpose was to _______________.?
a. improve the transmission of radio waves of technology within the commercial sector
b. ensure secure and resilient communication and coordination of military activities
c. establish a global esoteric network of world leaders
d. provide universities channels through which they could secure future funding for projects
2. The researchers at CERN physics laboratory in Switzerland are credited in developing one of the first _______________.?
a. operating systems
b. microprocessors
c. hard drives
d. web browsers
3. The first commercial web browser was _______________.?
a. America Online
b. Internet Explorer
c. Netscape Navigator
d. Mozilla Firefox
4. William Gibson (1984) introduced ‘cyberspace’ to the popular lexicon through his novel _______________.?
a. Ender’s Game
b. Neuromancer
c. Nineteen Eighty-Four
d. Cryptonomicon
5. What was the name of the computer network developed by the US military during the Cold War, a network that would provide the foundation for the Internet?
a. FidoNet
b. DARPALINK
c. ARPANET
d. DERINET
e. Interweb
6. Which one of the following actions are classified as ‘computer-focused crimes’?
a. Hate speech
b. Money laundering
c. Hacking
d. Identity theft
7. According to Wall (2001a), a legal category of cybercrime which posits individuals virtually crossing boundaries into other people’s property and/or causing damage is known as _______________.?
a. cyber-trespassing
b. cyber-deceptions and thefts
c. cyber-pornography
d. cyber-violence
8. According to Wall (2001a), a legal category of cybercrime where individuals steal things like money and property via the Internet is known as _______________.?
a. cyber-trespassing
b. cyber-deceptions and thefts
c. cyber-pornography
d. cyber-violence
9. What was the name of a famous black marketplace where users could go online and buy illegal drugs which was shut down in 2013?
a. The Silk Road
b. The Underground Railroad
c. The Hidden Network
d. The Encryption Network
10. Electronic mail was developed in which decade?
a. 1940s
b. 1990s
c. 2000s
d. 1970s
11. The World Wide Web was developed by _______________ and his associates at CERN, Geneva.?
a. David Wall
b. Tim Berners-Lee
c. John Perry Barlow
d. Mark Knopfler
12. The prefix “cyber” was originally derived from “cybernetics,” a term coined by _______________ in the 1940s.?
a. Robert Sampson and Elias Groves
b. Todd Clear and Dina Rose
c. Norbert Wiener and Arturo Rosenblueth
d. Peter Venkman and Egon Spengler
13. _______________ refers to the content indexed through search engines as part of the World Wide Web.?
a. deep web
b. surface web
c. catalogued web
d. dim web
14. _______________ refers to content not indexed in search engines and comprises the bulk of what is available on the internet.?
a. deep web
b. surface web
c. catalogued web
d. dim web
Chapter 2: Researching and Theorizing Cybercrime
1. This notion posits that human beings are willing to surrender some of their freedoms to be protected from those whose unfettered exercise of freedom harms others.?
a. Social contract theory
b. Cultural theory
c. Basic social theory
d. Environmental theory
2. Which of the following is not one of Beccaria’s three components of effective punishment?
a. They should be swift in execution
b. The offender should be publicly scrutinized
c. Punishment should be sufficiently severe
d. The offender should be certain that punishment will occur
3. This theory assumes that offenders conduct cost-benefit analyses before conducting criminal behaviour.?
a. Social learning theory
b. Labelling theory
c. Social disorganization theory
d. Rational choice theory
4. This theory credits the propensity to commit crime to intimate peer groups which encourage favourable definitions to crime.?
a. Social disorganization theory
b. Radical criminological theory
c. Differential association theory
d. General strain theory
5. According to Merton (1938), which of the five adaptations of strain describe individuals who accept both the institutionally approved goals and means?
a. Conformists
b. Retreatist
c. Innovators
d. Ritualists
6. According to Merton (1938), which of the five adaptations of strain describe individuals who reject the culturally approved goals while accepting socially approved means to do so?
a. Rebels
b. Ritualists
c. Conformists
d. Innovators
7. Sykes and Matza (1957) state that delinquents will provide justification for their behaviour before engaging in criminal activity in attempts to nullify dominant social controls. What do they call this phenomenon?
a. Techniques of neutralization
b. Neutralization theory
c. Delinquent drift
d. Containment theory
8. Gottfredson and Hirschi’s (1990) general theory of crime states that crimes, simply put, are a product of _______________.?
a. low impulsivity
b. low intelligence
c. low self-control
d. low self-esteem
9. Edwin Lemert (1951) described the process through which a person could be so intensely stigmatized that their future behaviour was driven toward deviance. What did he call this?
a. The “dramatization of evil”
b. Primary deviance
c. Secondary deviance
d. Societal rationalization
10. Which of the following is not an area of life which Steffensmeier and Allan (1996) state inhibit female crime while encouraging male crime?
a. Sexuality
b. Physical strength and aggression
c. Gender norms
d. Media influences
11. Miller (2002) views crime as a result of gendered _______________.?
a. biology
b. performances
c. history
d. psychology
12. What was the ‘GamerGate’ fiasco?
a. A conspiracy theory detailing how video game developers remove content from games in development only to sell it later as ‘downloadable content’
b. An event where hackers claimed to have successfully penetrated a video game company and began to ‘leak’ information of a game that was being released
c. A cyberharassment campaign carried out against a female video game developer
d. A high-profile case where the CEO of a video game company was cyberstalked for months
13. Which of the following is not one of the three components of routine activities theory?
a. A suitable target
b. A detailed plan
c. A motivated offender
d. The absence of a capable guardian
14. Which of the following is not one of Robert Agnew’s three sources of strain?
a. Failure to achieve positively valued stimuli
b. Removal of negating stimuli
c. Removal of positively valued stimuli
d. Presentation of negative stimuli
15. According to Goldsmith and Brewer (2015), the internet is said to present an interactive environment that empowers individuals through anonymity, provides a cornucopia of relatively easy-to-access information, and acts as a ‘facilitator of encounters’ with individuals and opportunities conducive to criminal engagement. This context is conducive to what they call _______________.?
a. Digital drift
b. Restrictive deterrence
c. Techniques of neutralization
d. Differential association
16. _______________ argue that the dominant mode of production--capitalism--shapes motivations and opportunities to engage in crime as well as the processes of criminalization and crime control.?
a. Feminist criminologists
b. Social disorganization theorists
c. Radical criminologists
d. Constitutive criminologists
17. According to Yar, _______________ refers to the domination of field by businesses regarding the provision of information security services and solutions.?
a. computer crime control industry
b. cybercrime prevention nexus
c. cybercrime-commercial complex
d. computer crime prevention coalition
18. _______________ is the idea that instead of avoiding committing a crime entirely, a criminal may change the way they engage in a crime when confronted with threat of punishment.?
a. Perceptual deterrence
b. General deterrence
c. Specific deterrence
d. Restrictive deterrence
19. Which of the following is NOT one of the methodological approaches used by criminologists to study cybercrime discussed in Chapter 2?
a. Self-report surveys
b. Interviews
c. Experimental/quasi-experimental designs
d. Autoethnography
Chapter 3: Hackers, Crackers, and Viral Coders
1. In the 1960s, hacking was generally viewed as _______________.?
a. a means of global domination
b. a neutral term for software developers
c. the act of coughing after clearing dust from computer parts.
d. an innovative, free use of technology
2. Constructing and viewing the hacker as an “archetypal ‘cybercriminal’” is an example of what Becker (1963) would identify as the _______________.?
a. labelling process
b. learning process
c. socialization process
d. cultural process
3. In attempts to estimate interest in hacking, what is the example the book provides as an indicator?
a. Dark web activity
b. Reddit posts
c. DEF CON attendance
d. Amount of 4chan users
4. Within the literature, hacker criminality has been linked to all of these psychological factors except _______________.?
a. drug addiction
b. dementia
c. Asperger’s syndrome
d. autism
5. Studies in hacking reveal it to be an overwhelmingly _______________.?
a. male activity
b. female activity
c. African-American activity
d. elderly activity
6. Within the US, this act made it a crime to knowingly access computers without authorization, obtain unauthorized information with intent to defraud, or cause damage to protected computers.?
a. The Law Commission
b. The Serious Crime Act
c. Computer Fraud and Abuse Act
d. Computer Misuse Act
7. In 1988, Gold and Schifreen hacked into Prince Philip’s _______________.?
a. computer
b. mailbox
c. phone
d. servers
8. Many scholars agree that the social base of the hacker movement is heavily skewed towards _______________.?
a. upper-class, older Asian males living in suburban areas
b. middle-class, Black males most likely attending college
c. lower-class, white females living close to institutions with technology
d. middle-class, white males who are most likely in high school
9. This type of computer intrusion is the stealing or copying of information, such as theft of software, business secrets, and personal information.?
a. Theft of proprietary/confidential information
b. Theft of computer resources
c. Systems sabotage
d. Denial of service attacks
10. This type of computer intrusion is the altering of contents of a website or creating a ‘fake’ website.?
a. Distribution of ‘malicious software’
b. Systems alteration and destruction
c. Website defacement and ‘spoofing’
d. Theft of computer resources
11. This type of computer intrusion prevents a user or owner the access to services available on their system.?
a. Theft of proprietary/confidential information
b. Denial of service attacks
c. Theft of computer resources
d. Website defacement and ‘spoofing’
12. The first major motion picture to feature hackers, released in 1983, was entitled _______________.?
a. Hackers
b. Technophiles
c. War Games
d. Swordfish
13. An early medical/pathological explanation for hacker behaviors was called _______________.?
a. Computer Obsession Complex
b. Internet Addiction Disorder
c. Hacker Drive Syndrome
d. Computer Addiction Disorder
14. _______________ coined the term “the hacker ethic” in his book Hackers: Heroes of the Computer Revolution.?
a. Steven Levy
b. Steve Wozniak
c. Richard Stallman
d. Linus Torvalds
15. Which of the following is NOT an explanation for gender disparities in hacker culture given by Taylor?
a. Societal Factors
b. Masculine Environment
c. Masculine Language
d. Biological factors
16. _______________ is a program which helps identify vulnerabilities in systems and allows users to craft “payloads” to exploit these vulnerabilities.?
a. Nmap
b. Metasploit
c. Wireshark
d. Bleem
17. _______________ is the author of the 1986 work “The Conscience of a Hacker” also known as “The Hacker’s Manifesto.”?
a. The Mentor
b. Commander X
c. Crash Override
d. Acid Burn
18. According to Reagle, hacker culture is characterized by a _______________ which makes hackers and related technologists blind to the barriers facing women in entering and navigating hacking and other tech-related cultures.?
a. Hegemonic masculinity
b. Boy culture
c. Misogynistic discernment
d. Naïve meritocracy
Chapter 4: Political Hacking
1. A term commonly used to describe hacking for the purposes of political activism and protest is _______________.?
a. cyberterrorism
b. cultural hacking
c. hacktivism
d. cyberwarfare
2. This form of hacktivism is the cyber-equivalent to the traditional protest method by which a particular site, associated with opposing or oppressive political interests, is physically occupied by activists.?
a. Doxxing and leaking
b. Website defacements
c. Email bombs
d. Virtual sit-ins and blockades
3. This form of hacktivism attempts to ruin and alter online sites as a form of protest.?
a. Website defacement
b. Development of privacy and resistance tools
c. Doxxing and leaking
d. Virtual sit-ins and blockades
4. This form of hacktivism involves exposing collections of private information on an individual, often with the goal of shaming, silencing, or coercing the person.?
a. Email bombs
b. Doxxing and leaking
c. Virtual sit-ins and blockades
d. Development of privacy and resistance tools
5. All of these components are involved in the definition of cyberterrorism except that _________________.?
a. the act costs the government at least $10,000 in damages
b. the act is against governmental entities
c. the act is a part of a person or group’s political agenda
d. the act involves unlawful attacks or threats against ICTs
6. This act considerably strengthened penalties under the Computer Fraud and Abuse Act of 1986, including the provision for the life imprisonment of convicted ‘cyberterrorists’.?
a. The Terrorism Act of 2000
b. The Cybercrime Prevention Act of 2012
c. The US PATRIOT Act of 2001
d. The Cyber Security Enhancement Act of 2002
7. Which one of the following is not classified as part of a nation’s critical information infrastructure?
a. Telecommunications
b. The Internet
c. Hardware and software
d. Water systems
8. In the wake of 9/11, the Bush administration created this federal agency to bolster the protection of critical information infrastructure.?
a. The Department of Defence
b. The Department of Homeland Security
c. The Department of the Interior
d. The Department of Energy
9. Some argue that the media and political figures attempt to generate public concern about cybercrime in order to secure sectional interests. Becker (1963) would label this behaviour as _______________.?
a. moral entrepreneurship
b. dramatization
c. secondary deviance
d. moral panic
10. This process allows communications to be encoded prior to transmission so that they will be unreadable if intercepted.?
a. Formatting
b. Bootstrapping
c. Encryption
d. Compression
11. _______________ is an “infrastructure or asset the incapacitation or destruction of which would have a debilitating impact on the national security or economic or social welfare of a nation.”?
a. Critical infrastructure
b. Sensitive infrastructure
c. Vital Infrastructure
d. Necessary infrastructure
12. Which hacker most likely coined the term “hacktivism”?
a. Kevin Mitnick
b. Omega
c. TheJester
d. Crash Override
13. In 2010, Anonymous launched a DDoS campaign against various credit card and payment processing companies like Visa, PayPal, and Mastercard. This campaign was launched in retaliation for these companies cutting off donations to which organization?
a. WikiLeaks
b. Cult of the Dead Cow
c. Anonymous
d. Zapatistas
14. Which individual leaked the video now titled “Collateral Murder” that showed a US Apache helicopter gunning down Iraqi civilians and two Reuters journalists?
a. Warren Ellis
b. Frank Derringer
c. Warren Zevon
d. Chelsea Manning
15. _______________ is something that can ‘increase the striking potential of a unit without increasing its personnel.’?
a. force amplifier
b. force multiplier
c. tactical manuever
d. kinetic amplifier
16. _______________ was a hacker from Kosovo who compromised a retail company’s system and obtained the names, passwords, email address, and other data of hundreds of thousands of people. He then combed through that data and leaked the information associated with over a thousand military and government employees to the Islamic State.?
a. Ardit Ferizi
b. John Stockton
c. Abu Sayyaf
d. Robert Mueller
17. _______________ works by hiding data within the digital code used to construct images.?
a. Photo-masking
b. Imprintography
c. Stelliography
d. Steganography
18. Terrorist groups make use of the internet in support of their conventional, terrestrially based activities. Which of the following is one of the ways the textbook describes the internet being used to facilitate terrorist activities?
a. Communication and coordination
b. Propaganda, publicity and recruitment
c. Information gathering
d. All of the above
e. None of the above
19. _______________ was a “digital weapon” deployed to sabotage Iranian nuclear enrichment efforts.?
a. Mirai
b. Stuxnet
c. Lovebug
d. AcidBurn
20. According to Rid, the term “cyberwarfare” should may actually reduce the violence involved in other forms of warfare because it involves significant changes and advances in _______________.?
a. sabotage
b. espionage
c. subversion
d. All of the above
e. None of the above
Chapter 5: Virtual ‘Pirates’
1. Copyrights, patents, trade secrets, and trademarks are best classified as forms of _______________.?
a. physical property
b. intellectual property
c. personal property
d. governmental property
2. In terms of scope and scale, this commercial sector reports the largest financial losses to piracy at $52.24 billion according to 2016 data.?
a. Music industry
b. Book publishing
c. Motion pictures
d. Computer software
3. This website generated controversy by hosting a free-to-access repository of scholarly publications.?
a. Research Now
b. Sci-Hub
c. CyberScholar
d. Elsevier
4. What is a major reason peer-to-peer file-sharing remains extraordinarily resilient to shutdown attempts?
a. Laws pertaining to copyright infringement are disproportionately applied to digital piracy
b. Software developers are unconcerned with peer-to-peer file-sharing
c. The decentralized and fragmented nature of the Internet make it difficult
d. Federal agencies are largely unaware of the phenomena of file-sharing
5. What is the BSA’s “No Piracy” program?
a. A program where persons can get paid to turn over co-workers using unauthorized copies of software
b. A program where anti-piracy speakers give educational seminars to primary and secondary schools
c. A program where netizens can subscribe to weekly news of piracy lawsuits across the globe
d. A program were users can offer and gift software programs to those who may not be able to afford it
6. This privacy-enhancing measure allows users to hide their IP addresses by rerouting network traffic, thereby bypassing attempts by regulatory bodies to block access to websites hosting or indexing pirated content.?
a. Bootstrapping
b. Virtual private networks
c. Jailbreaking
d. Subnet masking
7. In the early 2000s, the UK released a series of anti-piracy ads featuring a singing troubadour slandering a man for engaging in activities like buying counterfeit goods and downloading pirated movies, dubbing the man _______________.?
a. ‘Pirate Pete’
b. ‘Illicit Irvine’
c. ‘The Copyright Crusader’
d. ‘Knock-Off Nigel’
8. The UK introduced _______________ that required ISPs to send warning letters to customers who had been identified of breaching copyright.?
a. The Stop Online Piracy Act
b. The Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property
c. The Digital Economy Act
d. The Online Protection and Enforcement of Digital Trade Act
9. The following are all factors that have possibly contributed toward the low prosecutions of piracy except for _______________.?
a. the absolute rarity of piracy (less than 1% of all cybercrimes)
b. the lack of public concern and political emphasis on harm
c. the difficulties in policing and intelligence gathering
d. the reluctance of public prosecutors to act
10. All of the following pieces of legislation deals, in some capacity, with piracy except for _______________.?
a. CPPA
b. DMCA
c. TRIPS
d. ACTA
11. Created in the late 1990s, the _______________ was crafted to address copyright issues in the age of the Internet by providing legal protections for copy-protection mechanisms.?
a. Copyright Act
b. Digital Millennium Copyright Act
c. Technological Protection Act
d. Computer Fraud and Abuse Act
12. True or False: According to recent estimates, 80 per cent of all music downloaders consumer music legally.?
a. True
b. False
13. _______________ was arrested for illegally downloading troves of academic journal articles from JSTOR at MIT. He was charged with multiple crimes resulting in the potential for millions in fines and 35 years in prison. He subsequently committed suicide.?
a. Mark Knopfler
b. Warren Ellis
c. Chelsea Manning
d. Aaron Swartz
13. Which organization was implicated in one of the earliest cases of software piracy?
a. Masters of Deception
b. Homebrew Computer Club
c. Cult of the Dead Cow
d. The Pirate Bay
14. Shawn Fanning developed this peer-to-peer service in 1999 which lead to a massive increase in illegal music downloads.?
a. eMule
b. BitTorrent
c. Napster
d. Bearshare
15. In 2001, Bram Cohen released this decentralized protocol for peer-to-peer filesharing that was extraordinarily resilient to shutdown attempts.?
a. eMule
b. BitTorrent
c. Napster
d. Bearshare
16. _______________ is a type of technology used to prevent illegal copying of digital files.?
a. Digital rights management
b. Copy-stop protection
c. Bittorrent
d. Digital rights security
17. In 2013, Electronic Arts caused controversy after their “always-on” copy-protection mechanisms locked legitimate users out of this game.?
a. Gears of War
b. Battlefield 4
c. Railroad Tycoon
d. SimCity
18. _______________ is the process of converting streaming data into files which can be stored locally and is an increasingly popular strategy for piracy.?
a. BitTorrent
b. Stream ripping
c. Stream siphoning
d. Stream saving
19. Which of the following is NOT a motivation for piracy as described in the textbook.?
a. Sampling
b. Sharing is caring
c. Desire to avoid going to “brick-and-mortar" stores and being in public
d. Rebellion/resistance
20. True or False: Despite issues surrounding the measurement of cybercrime generally, piracy statistics are surprisingly accurate and trustworthy.?
a. True
b. False
Chapter 6: Cyber-Frauds, Scams and Cons
1. This is one of the oldest and best-known frauds or “cons” about a trickster who solicits help from an Englishman to help him arrange for his sister’s escape from her captors.?
a. The ‘Italian performer’
b. The ‘French guard’
c. The ‘German captain’
d. The ‘Spanish prisoner’
2. This type of online fraud exploits the victims’ emotional investment in a perceived relationship or potential relationship for monies and gifts.?
a. Advanced fee frauds
b. Phishing and spoofing
c. Romance scams
d. Investment fraud
3. This type of online fraud focuses on tricking people into handing over sensitive information like login credentials, social security numbers, and any other details that could compromise a person’s security. Sometimes described as “human hacking”.?
a. Social engineering
b. Hacking
c. Advanced fee frauds
d. Identity theft
4. This type of online fraud takes the form of the mass distribution of emails disguised as institutions such as banks, credit card companies, and e-sellers.?
a. Phishing and spoofing
b. Investment fraud
c. Internet auction frauds
d. Advanced fee frauds
5. This type of phishing are more custom-tailored attacks, such as pretending to be someone close to the victim.?
a. ‘Spear-phishing’
b. ‘Whaling’
c. ‘Smishing’
d. ‘Vishing’
6. This type of phishing takes the form of the mass distribution of fraudulent messages through cellular text messages.?
a. ‘Spear-phishing’
b. ‘Whaling’
c. ‘Smishing’
d. ‘Vishing’
7. Out of the online frauds discussed in the book, this category entailed the highest mean dollar losses to victims (over $30,000 per victim).?
a. Investment fraud
b. Romance scams
c. Phishing and spoofing
d. Internet auction fraud
8. This type of investment fraud occurs when a perpetrator coerces a victim to buy a portion of a company’s stock wherein the perpetrator suddenly sells his/her own stock to cash in on the temporary rise.?
a. The ‘up-and-down’
b. The ‘in-and-out’
c. The ‘pump-and-dump’
d. The ‘one-and-done’
9. Who were ‘phone phreaks’?
a. Trickers who would dial a random number and hang up
b. Hackers that focused on exploring and manipulating telephone systems
c. Businessmen who dabbled in the ‘black market’ of smartphones
d. Artists commissioned to customize old landline phones
10. Within the context of social engineering, there is a saying that _______________ is/are the weakest link in security.?
a. computers
b. code
c. passwords
d. humans
11. In the US, the major fraud reporting agency is _______________.?
a. The Internet Crime Complaint Center
b. Action Fraud
c. ACORN
d. Office for National Statistics
12. In Australia, one of the major fraud reporting agencies is _______________.?
a. The Internet Crime Complaint Center
b. Action Fraud
c. ACORN
d. Office for National Statistics
13. In the UK, frauds can be reported to _______________.?
a. The Internet Crime Complaint Center
b. Action Fraud
c. ACORN
d. ACCC
14. The internet provides users with new opportunities to sell stolen goods. The buying and selling of stolen goods is a practice commonly known as ______________.?
a. Tossing
b. Pitching
c. Fencing
d. Slashing
15. _______________ is the act of bidding on your own items in order to encourage a higher end price.?
a. Snipping
b. Ruse bidding
c. Pretexting
d. Shill bidding
16. The 419 scam gets its name from _______________.?
a. the relevant section of the Nigerian penal code prohibiting that kind of fraudulent activity.
b. the Nigerian area code where most of these scammers were known to operate from in the early 2000s.
c. the police data record locator number used to catalog these offenses in the Uniform Crime Report.
d. the number of scammers arrested in a bust of one of the largest organized crime groups ever, once which focused on this kind of scam.
17. In Canada, the major fraud reporting agency is _______________.?
a. ACORN
b. CAFC
c. Scamwatch
d. Action Fraud
18. Which of the following is NOT a reason why victims fail to report fraud as described in the textbook?
a. The may decide that the relatively small amounts of money involved do not make pursuing the matter worthwhile.
b. They may feel embarrassed about having been taken in by a fraudster.
c. They do not trust authorities to protect their confidentiality upon reporting.
d. They may judge that there is little likelihood of a successful outcome.
e. None of the above
19. This hacker became infamous in the 1980s and 1990s for his various crimes involving phone phreaking, network intrusions, data exfiltration, and fleeing from authorities. He is perhaps best known for his social engineering exploits.?
a. Chris Hadnagy
b. Kevin Mitnick
c. Oxblood Ruffin
d. Aaron Swartz
Chapter 7: Illegal, Harmful and Offensive Content Online: From Hate Speech to ‘the Dangers’ of Pornography
1. Hate speech can be difficult to define. The United States, for example, qualifies hate speech as _______________.?
a. speech that surmounts to an individual or group merely ‘trolling’ the general populous
b. speech which is derogatory in nature but does not promote violence nor creates a hostile environment
c. speech that incites or produces ‘imminent lawless action,’ such as direct threats of violence
d. speech within online message boards that is seen as offensive
2. In the UK, all of the following legal provisions work to prohibit hate speech except for_______________.?
a. the Anti-Discrimination Act
b. the Race Relations Act
c. the Public Order Act
d. the Serious Organised Crime and Police Act
3. Who are the ‘Alt-Right’ in the US?
a. A collection of socialists and communists who advocate for the destruction of capitalism and the implementation of anarchy
b. A strain of extreme political conservatism characterised by implicitly or explicitly racist and white supremacist ideology
c. An extremist political group who are vehemently against those who identify as fascist or racist
d. A political philosophy that advocates for political freedom, autonomy, and a free-market for society
4. What was the website founded in 1996 by a former Ku Klux Klan leader, Don Black, which espoused white nationalist and white supremacist ideologies?
a. Breitbart
b. Daily Stormer
c. Stormfront
d. Infowars
5. The Simon Wiesenthal Centre in Los Angeles had documented the existence of 600 ‘hate sites’ on the Internet. That number had risen to _______________ by 2010.?
a. 2,010
b. 7,560
c. 11,500
d. 17,980
6. In their appeal to the younger generation, the ‘Alt-Right’ have begun to use memes, such as _______________, created by Matt Furie, in attempts to lure individuals into their movement.?
a. Grumpy Cat
b. Doge
c. Good Guy Greg
d. Pepe the Frog
7. This individual was a student at the University of California, Irvine where he emailed 59 mainly Asian students asserting that he would kill them all.?
a. Adam Lanza
b. Richard Machado
c. James Holmes
d. Omar Mateen
8. Before this individual killed six people in a mass murder in Isla Vista in 2014, he posted a YouTube video filled with self-righteous anger stemming from a misogynistic view that women had ‘forced’ him to be celibate by refusing to have sex with him.?
a. Stephen Paddock
b. Syed Farook
c. Eric Harris
d. Elliot Rodger
9. This U.S. court case provided a litmus test for obscene material: if the ‘average’ person finds that the work appeals to lustful interests in sex, or depicts sexual conduct as defined by state law, and lacks artistic value, then the state may consider the material ‘obscene’.?
a. Miller v. California
b. Ohio v. Clark
c. United States v. Solon
d. United States v. Williams
10. This is one of the earliest depictions of the human form which dates back between 24,000 and 22,000 BC. It is a statue of a women with large breasts and other exaggerated feminine features.?
a. ‘The Veiled Virgin’
b. ‘Venus of Willendorf’
c. ‘Venus de Milo’
d. ‘The Virgin of Montserrat’
11. _______________ is to make deliberately offensive or provocative statements or postings online specifically to upset or anger someone. Or, in other words, it is done for the “lulz.”?
a. Burning
b. Trolling
c. Culling
d. Nulling
12. _______________ are responsible for the bulk of hate speech online.?
a. Islamic extremists
b. Black pride groups
c. Leftist radicals
d. White supremacists
13. _______________ is a term used to describe a group of men who believe they have been wrongfully deprived of sex by women and that they are the victims of an unfair distribution of sexual partners in society. Additionally, their language and beliefs take on heavy misogynistic overtones.?
a. Incels
b. The Deprived
c. Cocelibates
d. The Denied
14. _______________ argued that the “answer to bad speech is more speech.”?
a. David Attenborough
b. Richard Stallman
c. Cory Doctorow
d. Stewart Brand
15. In the US, the only legal prohibitions against hate speech concern speech that _______________.?
a. contains a serious and imminent threat of violence against identifiable persons or directly incites others commit specific criminal acts against those person
b. creates a general atmosphere which encourages extremists to commit acts of violence against marginalized populations
c. which targets racial populations protected under the Fourteenth Amendment of the Constitution.
d. trick question: there are no limits on hate speech in the US due to the protections provided by the First Amendment.
16. _______________, also known as “weev” is perhaps one of the most notorious “trolls” to date. He is the founder of the GNAA and Goatse Security.?
a. Chelsea Manning
b. Cory Doctorow
c. Andrew Auernheimer
d. Sabu
17. Which of the following types of content are NOT protected under the First Amendment of the US Constitution.?
a. Indecent
b. Offensive
c. Obscene
d. All of the above
e. None of the above
18. In the US, laws which have attempted to curtail children’s exposure to pornographic material have generally been struck down under this Constitutional Amendment.?
a. First Amendment
b. Fourth Amendment
c. Fourteenth Amendment
d. Sixteenth Amendment
Chapter 8: Child Pornography and Child Sex Abuse Imagery
1. This individual was a former USA Gymnastics national team doctor and professor at Michigan State University who was arrested and prosecuted for child pornography.?
a. Jared Fogle
b. Larry Nassar
c. Gary Glitter
d. Pete Townsend
2. Post-2016 data indicate that _______________ are hosting the majority of online child pornography.?
a. European countries
b. Asian countries
c. African countries
d. South American countries
3. Recent estimates find that _______________ are the most likely to be the victims of child pornography.?
a. Caucasian girls
b. Black girls
c. Asian males
d. Caucasian males
4. This extreme variant of pornography depicts brutal acts like torture, sexual assault, rape, and even murder inflicted upon people including children.?
a. Softcore pornography
b. Erotica pornography
c. Hurtcore pornography
d. Bondage pornography
5. A clear pattern apparent from studies is that the vast majority of offenders are _______________.?
a. Caucasian males
b. Black males
c. Asian males
d. Hispanic males
6. Children may conduct themselves in a manner that leads to what Bryce (2010) calls _______________ behaviours, in which minors voluntarily engage in sexually-oriented electronic communication.?
a. self-harm
b. self-indulgent
c. self-projecting
d. self-victimization
7. This act in the UK makes it a criminal offense ‘to take, distribute, exhibit, or possess even one ‘indecent’ photograph of a child.?
a. The Protection of Children Act
b. The Communications Decency Act
c. The Child Pornography Prevention Act
d. The Protection of Children Against Sexual Exploitation Act
8. This slang term refers to images of minors viewed by some consumers as physically mature and sexually desirable but usually do not involve direct sexual abuse or exploitation of minors. These images, while perhaps morally and culturally frowned upon, are not typically illegal but can lead to other illegal behaviors, such as harassment of depicted minors.?
a. ‘Barely legal’ images
b. ‘Jailbait’ images
c. ‘DTF’ images
d. ‘Quickie’ images
9. _______________ is/are one or more non-obscene images of children that have been digitally manipulated to produce a pornographic representation involving a minor.?
a. Semi-pornography
b. Quasi-photographs
c. Pseudo-photographs
d. Virtual pornography
10. Which of the following is not a challenge in combating child pornography?
a. There remain many countries without adequate child pornography provisions
b. A majority of countries, like the US and Europe, do not prioritize child pornography cases
c. Legal punishment remains diverse among countries in relation to child pornography
d. Some areas lack training, expertise, and police resources and responses to child pornography
11. Many experts and commentators prefer to use the term _______________ rather than child pornography.?
a. Child molestation imagery
b. Child pedophilic images
c. Child sexual abuse images
d. Sexual abuse of minors imagery
12. _______________ are images that “simulate” child pornography, often involving the depiction of minors in pornographic situations through cartoons, drawings, animation, etc.?
a. Semi-pornography
b. Quasi-photographs
c. Pseudo-photographs
d. Virtual pornography
13. _______________ was the rock’n’roll band who was the center of controversy when the Internet Watch Foundation took down one of their Wikipedia pages because one of their album covers contained a picture of a naked child.?
a. Manfred Mann and the Earth Band
b. Van Halen
c. The Scorpions
d. Electric Light Orchestra
14. True or False: Recent research indicates that child pornography is getting less extreme and violence, consistent with overall declines in violent crime more generally.?
a. True
b. False
15. The persons most likely to abuse children are _______________.?
a. Family or acquaintances
b. School officials
c. Clergy
d. Peers
16. Which of the following is NOT an additional harm victims of child pornography may experience as described in the research?
a. Guilt or shame out of a fear of who might see the images and that they may be thought a willing participant in their exploitation
b. Knowledge that these images cannot be used in court against their abuser
c. Remorse or shame because abusers made them feel special or they did not fully understand the acts in which they were participating
d. Continuing victimization as the images remain in circulation
17. _______________ describes a form of self-victimization where underaged victims may voluntarily engage in sexually oriented electronic communication.?
a. Cybersex
b. Text-mexting
c. Peep shows
d. Sexting
18. True or False: Child pornography is one of the few cybercrimes which is consistently condemned worldwide.?
a. True
b. False
19. One of the United Nations regulations safeguarding against child pornography is _______________.?
a. Child Protection and Obscenity Enforcement Act
b. Child Pornography Prevention Act
c. Convention on the Rights of the Child
d. Protection of Children Against Sexual Exploitation Act
20. _______________ was an international child pornography sting operation that generated significant controversy because the FBI seized and operated a child pornography website (“Playpen”) for two weeks, infecting visiting computers with malware to identify users of the site.?
a. Operation Pacifier
b. Operation Starburst
c. Operation Rattle
d. Operation Spade
21. _______________ was the stage name of a pornographic actress who began performing in pornographic videos while she was under the age of 18 in the 1980s.?
a. Susan Oprah
b. Traci Lords
c. Malory Sweets
d. Eva Lang
22. _______________ is a form of Japanese animation that features childlike females depicted in erotic and sexually explicit scenarios.?
a. Hentai
b. Funtabi
c. Gaijin
d. Lolicon
Chapter 9: The Victimization of Individuals Online: Cyberstalking and Paedophilia
1. This act is the persistent and targeted harassment of an individual via electronic communication such as email.?
a. Stalking
b. Cyberstalking
c. Hate speech
d. Surveillance
2. Common stalking characteristics, such as making phone calls to victims, sending victims offensive material, following and watching the victim, and trespassing on the victim’s property are all examples of _______________.?
a. one-time behaviours
b. light behaviours
c. hard behaviours
d. repeated behaviours
3. Globally, _______________ are most likely to be victims of stalking.?
a. men
b. women
c. minorities
d. children
4. Early reports of stalking during 1989 and 1990 found that media coverage mostly focused on _______________.?
a. celebrities
b. politicians
c. children
d. world leaders
5. The majority of cases involving stalkers indicate that perpetrators are usually _______________.?
a. strangers whom the victims have never met
b. estranged or former partners of the victim
c. the current romantic partner of the victim
d. the victim’s immediate and extended family members
6. This type of stalking involves less invasive but nonetheless significant harassment of the victim.?
a. ‘Acquaintance stalking’
b. ‘Persistent stalking’
c. ‘Normal stalking’
d. ‘Nuisance stalking’
7. Criticisms of the reliance on the use of restraining orders involving all of the following except _______________.?
a. that the purpose of restraining orders may be undermined by sporadic enforcement
b. that they may be ineffective in deterring the stalker
c. that applying for restraining orders are more difficult for men than women
d. that the prohibition of ‘repeated harassing behaviour’ may be over-broad
8. Furedi (2005) views the public response to online paedophilia as symptomatic of what he calls our contemporary _______________, one which is beset by ‘obsessive preoccupations about safety’.?
a. culture of fear
b. rationality
c. call-and-response
d. moral decay
9. In the context of paedophilia, what is ‘grooming’?
a. The preparatory method paedophiles use for later physical contact and abuse
b. The specific medium paedophiles use to contact their victims (e.g. chatroom)
c. The act of coercing a child into meeting, then not showing up
d. The methods police use to entice children online only to later report their behaviour to their parents
10. A form of cyberstalking and online harassment where offenders coalesce into an online mob and ‘dogpile’ onto the victim, en-masse, in a concentrated harassment campaign is called.?
a. ‘digital trolling’
b. ‘Rickrolling’
c. ‘virtual mob’
d. ‘techno-fake-out’
11. What is ‘revenge porn’?
a. A fetish among pornography viewers where iconic supervillains commit sexual acts against their superhero counterpart
b. The online, non-consensual distribution of nude photographs or videos for retribution by a former intimate partner
c. A type of BDSM porn which portray ex-lovers and their sexual ‘revenge’ against one another
d. A type of pornography where real-life couples act out ‘cheating’ scenarios to get back at one another
12. In the 1980s, most people associated stalking with the stalking of celebrities, which was thought to be driven by a condition called _______________.?
a. Celebrity sexual fixation
b. Erotomania
c. Celebmania
d. Erotophilia
13. The US Center for Disease Control is responsible for conducting this major study which provides insights into stalking victimization.?
a. National Crime Victimization Survey
b. The National Longitudinal Study of Adolescent to Adult Health
c. National Intimate Partner and Sexual Violence Survey
d. National Sexual Violence Study
14. Which of the following is not one of the tactics victims deploy to cope with cyberstalking described by Tokunaga and Aune (2017).?
a. Ignore or avoid
b. Help seeking
c. Online presence management
d. All of the above
e. None of the above
15. _______________ was a website operated by Hunter Moore which allowed offenders to not only post sexual photos of people but also disclose their identifying information. The website was shut down.?
a. IsAnybodyUp.com
b. GetBackAtHer.com
c. RevengePorn.com
d. HatefulThings.com
16. _______________ is a slang term used to describe people who take revealing, close-up images of women without their consent.?
a. Voyeurists
b. Shooters
c. Snipers
d. Captchas
17. _______________ is another word for upskirt photographs or revealing, close-up images of women taken without their consent, often in public.?
a. Candids
b. Publicshots
c. Creepshots
d. Filthshots
18. _______________ involves a persistent and intensely misogynistic form of harassment described by Mantilla (2015).?
a. Gendertrolling
b. Femhate
c. Genderflaming
d. Girl-grilling
e. Herassment
19. _______________ is the name of a “how-to” guide passed around among child contact abusers, as well as online forums and chat rooms.?
a. Pederasts Guide
b. The Manual of the Child
c. Pederasts Handbook
d. Pedophile’s Handbook
Chapter 10: Policing the Internet
1. Many scholars argue that policing cybercrime has become more ‘pluralized,’ meaning that _______________.?
a. the recruitment of policemen and women has increased substantially
b. law enforcement agencies are involving other actors in policing activity
c. law enforcement agencies have been expanding their inventory of policing tools and technology
d. the police are focused more towards computer-mediated crime rather than street crime
2. Wall (2007) states that cybercrimes may fall into ‘the de minimis trap.’ In other words, _______________.?
a. law enforcement agencies become solely fixated on cybercrime issues that they tend to ignore proximate issues, such as street crimes within neighbourhoods
b. a high-profile cybercrime case will eventually cause a ‘moral panic’ among the populous
c. cybercrimes tend to fall below the threshold of seriousness since they are perceived as low-impact in nature
d. state and local governments will use cybercrimes to advance their own agendas
3. The _______________ in the UK absorbed both the Serious and Organised Crime Agency (SOCA) and the Police Central e-crime Unit (PCeU), which handles cybercrime cases.?
a. National Cybercrime Unit
b. State Cybercrime Police Force
c. National Cybercrime Task Force
d. National Digital Forensics Unit
4. In terms of cybercrime units, Willits and Nowacki (2016) state that _______________.?
a. smaller agencies are more likely to have a cybercrime unit than larger agencies
b. agencies with a higher crime rate are more likely to have a cybercrime unit than areas with low rates of crime
c. agencies with higher levels of recruitment are more likely to have cybercrime units than those whose agencies are stagnant
d. larger agencies with more resources are more likely to have cybercrime units than smaller agencies
5. Which of the following is not a challenge law enforcement face in combating and policing cybercrime?
a. Cybercrime is increasingly becoming a transnational issue
b. Police officers lack understanding and knowledge of cybercrime issues
c. Law enforcement agencies are hyper-focused on cybercrimes, thereby neglecting the resolutions of other types of crime
d. The established culture and ethos of policing within law enforcement agencies are resistant to prioritize cybercrime
6. What is the ‘digital divide’?
a. Social exclusion from new ICTs serve to exacerbate existing patterns of social inequality
b. Transnational divisions where pockets of the Internet remain closed off from particular regions of the world
c. Generational differences where older individuals unfamiliar with technology are less likely to use them (e.g. smartphones)
d. A phenomenon reflective of gender hierarchies where males are more likely to become involved in computer science than women
7. This is a form of governance wherein the government is not the central authority within a cooperative, but just one of the actors involved.?
a. Single-actor governance
b. Coincidental governance
c. Spacious governance
d. Nodal governance
8. From an individual consumer perspective, the greatest investment in Internet policing technologies falls in the areas of _______________.?
a. computer science education
b. self-help books about technology
c. preventative software
d. police-community programs
9. Which of the following is typically not an IT security service offered by ‘for-profit,’ or private sector entities?
a. Training for organizations and employees
b. Software that aids in the detection of user authentication
c. Programs that detect and combat ‘malicious’ software
d. Legal consultation for the protection and handling of digital evidence
10. This term refers to non-state actors who work to punish or bring others to account in response to a perceived or actual dearth of institutional remedies.?
a. Piracy
b. Digilantism
c. Trolling
d. Phishing
11. This organisation was founded in 1996 in the UK with an initial intent to combat child pornography, then later expanded to cover both criminally obscene (but non-child-oriented) content and instances of hate speech on the Internet.?
a. Perverted Justice
b. Computer Fraud and Abuse Act
c. The Internet Watch Foundation
d. The Internet Corporation for Assigned Names and Numbers
12. This organisation was founded by lawyers, policy analysts, activists, and technologists in 1990 to preserve and defend free speech online and to combat attempts at censorship via litigation against the US government and large corporations.?
a. The Entertainment Software Rating Board
b. The Electronic Frontier Foundation
c. The Simon Wiesenthal Centre
d. The National White Collar Crime Centre
13. _______________ is the principle that holds that freedom from criminal predation, and protection from it, is the right of all citizens. This is a principle said to be compromised by the privatization of information security.?
a. Liberty
b. Jurisdiction
c. Equity
d. Parens patriae
14. What is the purpose of a Faraday bag?
a. To hold law enforcement field devices until they are ready to be used. Failure to properly secure such forensic devices may result in compromised evidence gathering capabilities
b. The long-term storage of ready-access memory to facilitate long term storage of digital evidence
c. To scrub a hard disc drive of sensitive information before being disposed of after an investigation
d. To prevent an electronic device from being accessed and augmented remotely
15. _______________ involves the collecting analysing and reporting on digital data in a way that is legally admissible.?
a. Digital forensics
b. Cyber forensics
c. Virtual forensics
d. Electronic forensics
16. In 1998, the Clinton Administration created this organization which was tasked with the management of internet domain names and IP addresses as well as promoting the operational stability of the internet.?
a. IWF
b. EFF
c. ACORN
d. ICANN
e. JTIC
17. The Association of Sites Advocating Child Protection is an alliance of _______________.?
a. Pornographic content providers
b. Religious organizations
c. Victims-rights advocates
d. Internet service providers
e. Online civil liberties organizations
Chapter 11: Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control
1. What is the basic premise of Michel Foucault’s (1977) ‘panopticism’?
a. As societies become increasingly more modern, the use of surveillance technology will decrease as societies develop a more neo-liberal approach to governance
b. Surveillance is a key instrument with which modern societies discipline and control populations
c. Technology would eventually act as a catalyst anarchy where the idea of ‘surveillance’ would eventually collapse
d. Surveillance technology is becoming so ubiquitous that human beings will start to physically integrate monitoring devices onto their person
2. What is Castells (1996) idea of the ‘space of flows’?
a. Virtual terrains created by webs of electronic communication which do not exist in any particular place
b. Physical spaces where manufacturers could easily access users’ personal information
c. Quasi-virtual realms where artificial intelligence would control and alter materials in the real world
d. Spaces where human beings and technology would be virtually indistinguishable from each other
3. Individuals leave behind data generated as a by-product of people’s online activities in what Zuboff (2015) calls _______________.?
a. ‘data clumps’
b. ‘digital leftovers’
c. ‘digital exhaust’
d. ‘data piles’
4. _______________ are small files created every time a user visits a website.?
a. Brownies
b. Cupcakes
c. Candies
d. Cookies
5. _______________ are those who specialize in creating datasets of information about individuals which can then be sold.?
a. Data miners
b. Data brokers
c. Data collectors
d. Data analysers
6. How do most current social media platforms generate revenue?
a. A majority of social media platforms employ a subscription-based business model where users must purchase a monthly subscription to use the service
b. Social media sites run purely on donations from sizable third party organizations to sustain their operations
c. To use social media platforms, users must purchase a one-time entry fee to use the service, but then may upgrade their service at a later time
d. Many accrue revenue from collecting personal information from their users’ online activities then selling that information to marketing and advertising companies
7. What is the ‘Going Dark’ phenomenon?
a. A catastrophic event where an entire city’s power grid is shutdown by hackers
b. A sociological phenomenon where individuals are mentally exhausted from using social media, resulting in the individual closing all of their accounts
c. The inability to overcome a criminal’s use of technology to avoid surveillance and apprehension
d. A situation where a company’s infrastructure is compromised by hackers who shutdown all operations until a payment is made
8. This is a method where data is reordered according to a pattern specified by a key where, without access to this key, one does not know how to rearrange and view the content.?
a. Encryption
b. Compression
c. Extension
d. Defragmentation
9. Government actors have tried to introduce a so-called ‘key deposit’ or ‘key-escrow’ system, where _______________.?
a. digital ‘keys,’ or activation codes, would be publicly available to those who are not able to afford anti-virus software
b. manufacturers of encryption software would have to provide the police with a key to the data being accessed
c. similar to a ‘Cloud’ system, law enforcement agents could go to a secure website and download declassified state documents from other agencies
d. world leaders would be able to establish a secure connection (or ‘key’) with other leaders
10. This individual used to be an employee for the US National Security Agency (NSA) where he leaked to journalists the details of a massive surveillance apparatus operated by the US government.?
a. Edward Snowden
b. Kevin Mitnick
c. Julian Assange
d. Kevin Steinmetz
11. This was the name of the program that allowed the NSA to access the servers of companies and services like Yahoo!, Google, Facebook, and YouTube for user data.?
a. PRISM
b. ‘The Cloud’
c. The ‘ECHELON’ project
d. ‘XKeyscore’
12. This was an esoteric initiative where a network of satellite interception stations, microwave ground stations, spy satellites, radio listening posts, and secret facilities could examine almost any telephone call, fax transmission, and email around the world, daily.?
a. The ‘Total Information Awareness’ project
b. The ‘MATRIX’ project
c. The ‘ECHELON’ project
d. The ‘Alan Parsons’ project
13. What was the purpose in the creation of the European Union’s General Data Protection Regulation (GDPR)?
a. This extended the surveillance capabilities of the government across multiple countries
b. This was an attempt to regulate the use of personal information for commercial activities
c. This allowed encryption software companies to sell personal information to third parties
d. This removed an individual’s ability to destroy personal data that a company already owned
14. The first internet surveillance technology was _______________.?
a. PASTRIE
b. PRISM
c. The cookie
d. The sniffer
15. A _______________ is a person or organization that collects massive amounts of personal data and sells them to companies.?
a. data retailer
b. data broker
c. data bookie
d. data runner
16. This organization gained and retained data on up to 87 million Facebook users without their permission and are accused of having used that data to engage in “psychographic targeting” advertisements, including during the 2016 Trump presidential campaign.?
a. WikiLeaks
b. Cambridge Analytica
c. Palantir
d. Nielsen Metrics
17. The USA PATRIOT Act expended the powers provided by this law to conduct electronic searches without probably cause when gathering foreign intelligence.?
a. Foreign Intelligence Surveillance Act
b. Foreign Powers Obstruction Act
c. International Surveillance Act
d. National Security from Foreign Interest Act
18. A _______________ attack attempts to break cryptographic protections by using a computer to run through all possible combinations of a key to break a cipher.?
a. Iterative recombination
b. Shock and awe
c. Overwhelming might
d. Brute force
Chapter 12: Looking Toward the Future of Cybercrime
1. What is the basic premise of the ‘Internet of Things’?
a. Many devices, such as thermostats, refrigerators, cameras, smartphones, and security systems are all increasingly becoming interconnected within networks and the Internet
b. This concept explains how video games are being designed more toward multi-player gameplay rather than single-player
c. There is currently a shift in the commercial sector where companies are producing less physical products and producing more virtual products
d. This is a phenomenon where more products are being sold online through social media sites such as Facebook, Twitter, and Instagram
2. What is meant when individuals refer to ‘The Cloud’?
a. It is the name of the company who current has the monopoly on Internet-based storing services
b. It is a phenomenon where individuals can go online and chat with other netizens from around the world
c. It is a method where data can be stored on an external server and accessed from other locations through the Internet
d. It is a common colloquialism where someone’s attention is diverted from situations and events happening around them
3. In relation to cybercrime, what was the controversy that surrounded the 2016 US Presidential campaign?
a. Chinese hackers attempted to gain access to polling systems within several states
b. Turkish spies in several cities were caught tampering with voters’ identification
c. Russian actors used the Internet to interrupt and sow discord during the election
d. Members of the Islamic State attempted to interrupt broadcasts of the presidential inauguration
4. What was the name of the rally in Charlottesville, VA where white supremacists gathered to protest the removal of Confederate monuments?
a. ‘White is Right’
b. ‘Unite the Right’
c. ‘Rise Above’ Movement
d. ‘Rise Again’ Movement
5. While many people express favourable attitudes toward strong privacy protections, many regularly share their information freely in what Kokolakis (2017) calls _______________.?
a. a ‘digital catch-22’
b. the ‘privacy irony’
c. the ‘privacy paradox’
d. a ‘techno-dox’
6. _______________ was a hacker who found a vulnerability in certain pacemakers that would allow him to wirelessly connect to nearby devices and shut them off or force them to set off a high-voltage charge. He also uncovered a way to hack nearby insulin pumps to deliver fatal doses.?
a. Chelsea Manning
b. Julian Assange
c. Edward Snowden
d. Barnaby Jack
Document Information
Connected Book
Explore recommendations drawn directly from what you're reading
Cybercrime and Society Docx Test Bank 3e
DOCX Ch. All in one Current
All chapters in this product are shown above