Cybercrime And The Future Of Crime Exam Prep Chapter 15 - Exploring Sociology Canadian Perspective Test Bank by Frank E. Hagan. DOCX document preview.

Cybercrime And The Future Of Crime Exam Prep Chapter 15

Test Bank

Chapter 15: Cybercrime and the Future of Crime

Multiple Choice

1. ______ refers to crime that is committed using a computer.

a. Trojan horse

b. Bot crime

c. Cybercrime

d. Identity theft

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Knowledge

Answer Location: Introduction

Difficulty Level: Easy

2. Why is botnet crime a type of cybercrime that is difficult to fight?

a. because “bot-herders” are particularly clever in avoiding police

b. Because most computer owners do not know their computers have been infected

c. Because botnets do not leave a trace

d. Because hackers send out many botnets at one time

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Comprehension

Answer Location: Introduction

Difficulty Level: Easy

3. Which of the following countries are continually accused of cyberspuing on the United States?

a. China and North Korea

b. South Korea and Japan

c. Egypt and Turkey

d. France and Russia

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Knowledge

Answer Location: Introduction

Difficulty Level: Easy

4. The internet was originally created in the United States for the ______.

a. Department of Justice

b. Department of Education

c. Department of Defense

d. Department of Homeland Security

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Knowledge

Answer Location: Introduction

Difficulty Level: Easy

5. People who illegally reproduce and use software and subsequently cost manufacturers billions of dollars a year in lost revenue are called ______.

a. cyberpunks

b. cyber zombies

c. neuromancer

d. software pirates

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Knowledge

Answer Location: Types of Cybercrime

Difficulty Level: Easy

6. All of the following are a part of Wall’s (2001) typology of cybercrime except ______.

a. cyberdeceptions

b. cyberhackers

c. cyberpornography

d. cybertrespass

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Application

Answer Location: Types of Cybercrime

Difficulty Level: Medium

7. It is estimated that ______ percent of computer crimes are committed by “insiders” or employees.

a. 20

b. 50

c. 80

d. 95

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Knowledge

Answer Location: Types of Cybercrime

Difficulty Level: Easy

8. The illegal production of computer software is a big business in ______ countries.

a. North American

b. Southeast Asian

c. Western European

d. Middle Eastern

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Knowledge

Answer Location: Types of Cybercrime

Difficulty Level: Easy

9. All of the following are examples of cybercrime except ______.

a. high-tech espionage

b. telecommunications fraud

c. bullying

d. online pedophilia

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Application

Answer Location: Types of Cybercrime

Difficulty Level: Medium

10. Spernow’s (1995) typology of cybercrime includes all of the following except for ______.

a. cyberviolence

b. insider crime

c. high-tech espionage

d. malicious hacking

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Application

Answer Location: Types of Cybercrime

Difficulty Level: Medium

11. According to Wall (2001), which of the following refers to crossing boundaries into other people’s property?

a. cyberdeceptions

b. cyberviolence

c. cyberpornography

d. cybertrespass

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Application

Answer Location: Types of Cybercrime

Difficulty Level: Medium

12. According to Wall (2001), which of the following applies to crimes such as credit card fraud and priacy?

a. cyberdeceptions

b. cyberviolence

c. cyberpornography

d. cybertrespass

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Application

Answer Location: Types of Cybercrime

Difficulty Level: Medium

13. According to Wall (2001), which of the following refers to breaching laws on obscenity and decency?

a. cyberdeceptions

b. cyberviolence

c. cyberpornography

d. cybertrespass

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Application

Answer Location: Types of Cybercrime

Difficulty Level: Medium

14. According to Wall (2001), doing psychological harm to or inciting harm against others is known as ______.

a. cyberdeceptions

b. cyberviolence

c. cyberpornography

d. cybertrespass

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime

REF: Cognitive Domain: Application

Answer Location: Types of Cybercrime

Difficulty Level: Medium

15. What is the term for ill-intentioned hackers who attempt to break into computer systems?

a. crackers

b. insiders

c. pilferers

d. bait-and-switchers

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Knowledge

Answer Location: Types of Attacks on Computer Systems

Difficulty Level: Easy

16. ______ involve programming a computer to continuously send fake authentication messages to a targeted server, keeping it constantly busy and forcing out legitimate users.

a. Password phishing

b. Web spoofing

c. Denial of service attacks

d. Sniffers

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Knowledge

Answer Location: Types of Attacks on Computer Systems

Difficulty Level: Easy

17. Software programs such as Cracker are used to assist in which of the following types of attacks?

a. denial of service attacks

b. e-mail bombs

c. dictionary attacks

d. worms

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Knowledge

Answer Location: Types of Attacks on Computer Systems

Difficulty Level: Easy

18. ______ creates a false (shadow) version of a website that is controlled by the attacker.

a. Web spoofing

b. Worms

c. Password phishing

d. Sniffers

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Knowledge

Answer Location: Types of Attacks on Computer Systems

Difficulty Level: Easy

19. Which of the following refers to a subprogram that contains a virus, bomb, or other harmful feature?

a. web spoofing

b. worms

c. password phishing

d. Trojan horse

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Application

Answer Location: Types of Attacks on Computer Systems

Difficulty Level: Medium

20. ______ entails a cracker stealing password, account, or credit card education.

a. Phishing

b. Worms

c. Trojan horse

d. Key loggers

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Comprehension

Answer Location: Types of Attacks on Computer Systems

Difficulty Level: Easy

21. Which of the following are similar to viruses that reproduce themselves and subvert computer systems?

a. phishing

b. worms

c. Trojan horse

d. key loggers

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Comprehension

Answer Location: Types of Attacks on Computer Systems

Difficulty Level: Easy

22. ______ are used to gain passwords to access accounts.

a. Phishing

b. Sniffer programs

c. Trojan horse

d. Key loggers

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Comprehension

Answer Location: Types of Attacks on Computer Systems

Difficulty Level: Easy

23. What are vaccines?

a. computer hackers who develop harmful programs

b. computer programs that perform a task, such as printing a message or destroying data, on a certain date

c. rogue programs that copy themselves onto other programs

d. computer programs that seek out and destroy viruses

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems

REF: Cognitive Domain: Comprehension

Answer Location: Argot of Cybercrime

Difficulty Level: Easy

24. Which of the following best describes computer hackers who develop harmful programs?

a. time bombs

b. viruses

c. vaccines

d. cyberpunks

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Application

Answer Location: Argot of Cybercrime

Difficulty Level: Medium

25. Which of the following best describes rogue programs that copy themselves into other programs or disks?

a. time bombs

b. viruses

c. vaccines

d. cyberpunks

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Application

Answer Location: Argot of Cybercrime

Difficulty Level: Medium

26. ______ are computer programs that perform a task, such as printing a message or destroying data, on a certain date.

a. Time bombs

b. Viruses

c. Vaccines

d. Cyberpunks

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Comprehension

Answer Location: Argot of Cybercrime

Difficulty Level: Easy

27. A majority of children who are victims of online predator are ______.

a. younger than 9 years old

b. 9 to 13 years old

c. 14 to 17 years old

d. older than 17 years old

KEY: Learning Objective: 15.3: Discuss some operations of online predators.

REF: Cognitive Domain: Knowledge

Answer Location: Online Predators

Difficulty Level: Easy

28. ______ are the unanticipated, unintended, hidden functions of social change.

a. Manifest functions

b. Latent functions

c. Cultural lag

d. Hacker’s ethics

KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.

REF: Cognitive Domain: Knowledge

Answer Location: Societal Reaction

Difficulty Level: Easy

29. The idea that change takes place unevenly is referred to as ______.

a. manifest functions

b. latent functions

c. cultural lag

d. hacker’s ethics

KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.

REF: Cognitive Domain: Knowledge

Answer Location: Societal Reaction

Difficulty Level: Easy

30. ______ are the anticipated or intended consequences of, for instance, new technology.

a. Manifest functions

b. Latent functions

c. Cultural lag

d. Hacker’s ethics

KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.

REF: Cognitive Domain: Knowledge

Answer Location: Societal Reaction

Difficulty Level: Easy

31. ______ attempts to identify future developments (trends or events that might influence crime).

a. Environment scanning

b. Focus groups

c. Qualitative methodology

d. Triangulation

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Knowledge

Answer Location: Exploring the Future of Crime: Methods

Difficulty Level: Easy

32. ______ are procedures that ask a panel of experts to predict the future.

a. Boosters

b. Delphi techniques

c. Hot products

d. Police Futurists International

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Knowledge

Answer Location: Exploring the Future of Crime: Methods

Difficulty Level: Easy

33. ______ attempts to describe how present developments might appear in the future.

a. Boosters

b. Delphi techniques

c. Hot products

d. Scenario writing

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Knowledge

Answer Location: Exploring the Future of Crime: Methods

Difficulty Level: Easy

34. What is the purpose of Police Futurists International?

a. It is an organization that exists for the purpose of predicting the future of policing.

b. It is an organization that follows the trends of governmental policies.

c. It is an organization that follows the trends of street crime versus white collar crime.

d. It is an organization that responds to the increasing needs of the FBI.

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Comprehension

Answer Location: Exploring the Future of Crime: Methods

Difficulty Level: Easy

35. What does the term “biometric spoofing” mean?

a. Criminals in the future may be able to use the same technology as crime fighters to commit crimes.

b. There will be an increase in scams related to virtual worlds, such as Second Life.

c. Robotics and cloning will lead the way in crime.

d. Mathematical models and quantitative data can predict computer crimes.

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Comprehension

Answer Location: Other Crime Predictions

Difficulty Level: Easy

36. Bennett (1987) in Crimewarps, made all of the following predictions except for ______.

a. the computer will be the biggest generator of crime in the future

b. the concentraiton of crime in the U.S. will shift to the South

c. low birth rates and high work rates will leave homes ungaurded during the day

d. industries with older workers will experience less theft

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Application

Answer Location: Crimewarps

Difficulty Level: Medium

37. All of the following were identified as predictions in Digital Crime and Digital Terrorism (2006) except that ______.

a. organized crime groups will increasingly use the computer as a criminal instrument

b. espionage will continue to evolve

c. cyber terrorism will be the largest computer problem

d. some hacker groups will evolve into networked criminal enterprises

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Application

Answer Location: The Future of Digital Crime

Difficulty Level: Medium

38. British Home Office predictions include all of the following except for ______.

a. virtual-reality addition may increase

b. drugs will no longer pose challenges for crime control

c. alcopops and designer alcoholic drinks will continue to increase in popularity in underage drinkers

d. decreases in the use of cash will continue to result in greater theft involving credi cards and checks

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Application

Answer Location: British Home Office Predictions

Difficulty Level: Medium

39. ______ are items that are in high demand to be stolen.

a. Hot products

b. Crackers

c. Spoofs

d. Alcopops

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Knowledge

Answer Location: British Home Office Predictions

Difficulty Level: Easy

40. Which of the following theories provies some explanation of cybercrime?

a. social disorganiztion

b. strain

c. differential association

d. cultural lag

KEY: Learning Objective: 15.7: Assess how criminological theories apply to cybercrime.

REF: Cognitive Domain: Application

Answer Location: Theory and Crime

Difficulty Level: Medium

True / False

1. Whole units of the Chinese military spend their entire time stealing secrets of government and private corporation computers.

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Knowledge

Answer Location: Introduction

Difficulty Level: Easy

2. The computer is a tool that can be used in the commission of a variety of crimes.

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Knowledge

Answer Location: Introduction

Difficulty Level: Easy

3. Software pirates, those who illegally reproduce and use software, cost manufacturers billions of dollars a year in lost revenue.

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Knowledge

Answer Location: Types of Cybercrime

Difficulty Level: Easy

4. Most cybercrimes are reported to the police.

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Knowledge

Answer Location: Types of Cybercrime

Difficulty Level: Easy

5. Online pedophiles tend target young “wannabe” hackers and participants in chat rooms.

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Comprehension

Answer Location: Types of Cybercrime

Difficulty Level: Easy

6. Individuals involved in high-tech espionage are often industrial spies who sell their knowledge to rivals or foreign bidders.

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Comprehension

Answer Location: Types of Cybercrime

Difficulty Level: Easy

7. Key loggers are secret programs that record a user’s keystrokes.

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Knowledge

Answer Location: Types of Attacks on Computer Systems

Difficulty Level: Easy

8. Both viruses and works can spread with no assistance.

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Knowledge

Answer Location: Types of Attacks on Computer Systems

Difficulty Level: Easy

9. Network scanning programs are used to find vulnerable networked computers.

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Comprehension

Answer Location: Types of Attacks on Computer Systems

Difficulty Level: Easy

10. “Phone-phreaking” refers to automatic speed dialers used by computer hackers.

Learning Objetive: 15.2: List some examples of attacks on computer systems

REF: Cognitive Domain: Comprehension

Answer Location: Argot of Cybercrime

Difficulty Level: Easy

11. Experts suggest that parents should play a more proactive role in monitoring their child’s use of the internet.

KEY: Learning Objective: 15.3: Discuss some operations of online predators.

REF: Cognitive Domain: Comprehension

Answer Location: Online Predators

Difficulty Level: Easy

12. Stalking online is usually of adolescents and not young children.

KEY: Learning Objective: 15.3: Discuss some operations of online predators.

REF: Cognitive Domain: Comprehension

Answer Location: Online Predators

Difficulty Level: Easy

13. Many predators use romance and seduction to corner their victims, and a surprising number are not known to the youth in person.

KEY: Learning Objective: 15.3: Discuss some operations of online predators.

REF: Cognitive Domain: Comprehension

Answer Location: Online Predators

Difficulty Level: Easy

14. Virus attacks can cripple internet operations.

KEY: Learning Objective: 15.4: Identify some examples of cyberterrorism.

REF: Cognitive Domain: Comprehension

Answer Location: Cyberterrorism

Difficulty Level: Easy

15. Trojan horses, worms, logic bombs, and eavesdropping sniffers can all be used to compromise the integrity of or deny access to data.

KEY: Learning Objective: 15.4: Identify some examples of cyberterrorism.

REF: Cognitive Domain: Comprehension

Answer Location: Cyberterrorism

Difficulty Level: Easy

16. Cybercrime is not a separate type of crime.

KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.

Cogntive Domain: Comprehension

Answer Location: Societal Reaction

Difficulty Level: Easy

17. The latent functions of social change are the anticipated or intended consequences of new technology.

KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.

REF: Cognitive Domain: Comprehension

Answer Location: Societal Reaction

Difficulty Level: Easy

18. Latent functions are the anticipated or intended consequences of, for instance, new technology.

KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.

REF: Cognitive Domain: Comprehension

Answer Location: Societal Reaction

Difficulty Level: Easy

19. Manifest functions are the unanticipated, unintended, hidden functions of this same change.

KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.

REF: Cognitive Domain: Comprehension

Answer Location: Societal Reaction

Difficulty Level: Easy

20. The replacement of human mental processes by machines is referred to as cybernetics.

KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.

REF: Cognitive Domain: Comprehension

Answer Location: Societal Reaction

Difficulty Level: Easy

21. Mathematical models use qualitative case studies to forecast crime trends.

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Comprehension

Answer Location: Exploring the Future of Crime: Methods

Difficulty Level: Easy

22. Delphi techniques are procedures that ask a panel of experts to predict the future.

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Comprehension

Answer Location: Exploring the Future of Crime: Methods

Difficulty Level: Easy

23. Scenario writing attempts to describe how present developments might appear in the future.

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Comprehension

Answer Location: Exploring the Future of Crime: Methods

Difficulty Level: Easy

24. According to crime predictions, urban robbery rates will most likely decline.

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Comprehension

Answer Location: Exploring the Future of Crime: Methods

Difficulty Level: Easy

25. Electronic tagging, DNA analysis, and recognition systems based on retinas or fingerprints could all be used to tackle crime in the twenty-first century.

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Comprehension

Answer Location: Other Crime Predictions

Difficulty Level: Easy

26. Crimewarps predicts that a reduction in rates of AIDS will increase demand for streetwalkers.

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Knowledge

Answer Location: Crimewarps

Difficulty Level: Easy

27. Crimewarps predicts that the growth in the elderly population will increase medical quackery and insurance fraud.

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Knowledge

Answer Location: Crimewarps

Difficulty Level: Easy

28. Financial crime by employees will be the largest computer problem in the future.

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Comprehension

Answer Location: The Future of Digital Crime

Difficulty Level: Easy

29. More women in the work-force and increased leisure activity outside the home will create new opportunities for criminals.

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Comprehension

Answer Location: British Home Office Predictions

Difficulty Level: Easy

30. According to the British Home Office predictions, virtual-reality addiction may decrease.

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Comprehension

Answer Location: British Home Office Predictions

Difficulty Level: Easy

31. TVs, tablets, and smartphones are examples of hot products.

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Comprehension

Answer Location: British Home Office Predictions

Difficulty Level: Easy

32. Most traditional theories do not specifically address computer crimes.

KEY: Learning Objective: 15.7: Assess how criminological theories apply to cybercrime.

REF: Cognitive Domain: Comprehension

Answer Location: Theory and Crime

Difficulty Level: Medium

33. According to Ogburn (1922), computers can change communications, commerce, and even dating behavior far more quickly than the capability of societal values and norms to keep pace.

KEY: Learning Objective: 15.7: Assess how criminological theories apply to cybercrime.

REF: Cognitive Domain: Comprehension

Answer Location: Theory and Crime

Difficulty Level: Medium

34. Cybercrime is considered a separate type of crime.

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Comprehension

Answer Location: Summary

Difficulty Level: Medium

35. Malicious hackers seek forbidden knowledge and support the hacker’s ethic.

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Comprehension

Answer Location: Summary

Difficulty Level: Medium

36. Types of attacks on computers have generated their own argot.

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Comprehension

Answer Location: Summary

Difficulty Level: Medium

37. Environmental scanning and surveys are used to predict the future of crime.

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Comprehension

Answer Location: Summary

Difficulty Level: Medium

Short Answer

1. Define cybercrime.

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Knowledge

Answer Location: Introduction

Difficulty Level: Easy

2. What is cyberviolence?

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Knowledge

Answer Location: Types of Cybercrime

Difficulty Level: Easy

3. Identify Wall’s (2007) three types of online offending.

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Comprehension

Answer Location: Types of Cybercrime

Difficulty Level: Medium

4. List and describe Wall’s (2001) typology of cybercrime.

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Comprehension

Answer Location: Types of Cybercrime

Difficulty Level: Medium

5. What are software pirates?

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Knowledge

Answer Location: Types of Cybercrime

Difficulty Level: Easy

6. What is the hacker’s ethic?

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Comprehension

Answer Location: Types of Cybercrime

Difficulty Level: Easy

7. What is the difference between a white hat hacker and a black hat hacker?

KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.

REF: Cognitive Domain: Comprehension

Answer Location: Types of Cybercrime

Difficulty Level: Medium

8. In regard to computer crime, what are Trojan horses?

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Knowledge

Answer Location: Types of Attacks on Computer Systems

Difficulty Level: Easy

9. List and describe three types of attacks on computers.

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Comprehension

Answer Location: Types of Attacks on Computer Systems

Difficulty Level: Medium

10. The world of computer offenses has produced its own argot which is a specialized vocabulary peculiar to a group of people. Identify and describe three of the terms that relate to cybercrime.

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Comprehension

Answer Location: Argot of Cybercrime

Difficulty Level: Medium

11. What is the difference between a time bomb and a virus?

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Comprehension

Answer Location: Argot of Cybercrime

Difficulty Level: Medium

12. What are cyberpunks?

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Knowledge

Answer Location: Argot of Cybercrime

Difficulty Level: Medium

13. What is a salami technique?

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Comprehension

Answer Location: Argot of Cybercrime

Difficulty Level: Easy

14. Who/what are demon dialers?

KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.

REF: Cognitive Domain: Knowledge

Answer Location: Argot of Cybercrime

Difficulty Level: Easy

15. What is the National Sex Offender Registry?

KEY: Learning Objective: 15.3: Discuss some operations of online predators.

REF: Cognitive Domain: Knowledge

Answer Location: Online Predators

Difficulty Level: Easy

16. What does Ogburn (1922) mean by “cultural lag”?

KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.

REF: Cognitive Domain: Comprehension

Answer Location: Societal Reaction

Difficulty Level: Easy

17. What is the difference between manifest functions and latent functions?

KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.

REF: Cognitive Domain: Comprehension

Answer Location: Societal Reaction

Difficulty Level: Medium

18. What is cybernetics?

Ans. According to the text, cybernetics is the replacement of human mental proceees by machines.

KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.

REF: Cognitive Domain: Knowledge

Answer Location: Societal Reaction

Difficulty Level: Easy

19. What are Delphi techniques?

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Comprehension

Answer Location: Exploring the Future of Crime: Methods

Difficulty Level: Medium

20. What is scenario writing?

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Comprehension

Answer Location: Exploring the Future of Crime: Methods

Difficulty Level: Easy

21. Identify the three goals of future researchers.

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Comprehension

Answer Location: Exploring the Future of Crime: Methods

Difficulty Level: Easy

Essay

1. Describes the two methods used to explain how demographic shifts will influence the future of crime.

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Comprehension

Answer Location: Exploring the Future of Crime: Methods

Difficulty Level: Hard

2. In Crimewarps (Bennett, 1987), there were a number of interesting predictions regarding the future of crime. Describe four of those predictions.

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Comprehension

Answer Location: Crimewarps

Difficulty Level: Hard

3. Identify the eight forecasts for the future of digital crime according to Taylor, Caeti, Loper, Fritsch, and Liederbach in Digital Crime and Digital Terrorism (2006).

1) Crimes involving computers will increase substantially, requiring major changes in resource allocation and training and the creation of new police specialties.

2) Internet fraud, including identity theft, will be the largest computer problem.

3) Virtual crimes against persons will increase at a faster pace, requiring new laws and new types of crime investigation and prevention.

4) Some hacker groups will evolve into networked criminal enterprises.

5) Organized crime groups will increasingly use the computer as a criminal instrument.

6) Terrorist groups will increasingly use the internet for communications as well as for cyberterrorism.

7) Espionage will continue to evolve into information warfare, economic espionage, and intellectual property theft.

8) Criminals, terrorists, and anarchists will accelerate the use of technology to steal data, destroy communications, and in other ways do harm.

KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.

REF: Cognitive Domain: Comprehension

Answer Location: The Future of Digital Crime

Difficulty Level: Hard

Document Information

Document Type:
DOCX
Chapter Number:
15
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 15 Cybercrime And The Future Of Crime
Author:
Frank E. Hagan

Connected Book

Exploring Sociology Canadian Perspective Test Bank

By Frank E. Hagan

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party