Cybercrime And The Future Of Crime Exam Prep Chapter 15 - Exploring Sociology Canadian Perspective Test Bank by Frank E. Hagan. DOCX document preview.
Test Bank
Chapter 15: Cybercrime and the Future of Crime
Multiple Choice
1. ______ refers to crime that is committed using a computer.
a. Trojan horse
b. Bot crime
c. Cybercrime
d. Identity theft
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Knowledge
Answer Location: Introduction
Difficulty Level: Easy
2. Why is botnet crime a type of cybercrime that is difficult to fight?
a. because “bot-herders” are particularly clever in avoiding police
b. Because most computer owners do not know their computers have been infected
c. Because botnets do not leave a trace
d. Because hackers send out many botnets at one time
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Comprehension
Answer Location: Introduction
Difficulty Level: Easy
3. Which of the following countries are continually accused of cyberspuing on the United States?
a. China and North Korea
b. South Korea and Japan
c. Egypt and Turkey
d. France and Russia
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Knowledge
Answer Location: Introduction
Difficulty Level: Easy
4. The internet was originally created in the United States for the ______.
a. Department of Justice
b. Department of Education
c. Department of Defense
d. Department of Homeland Security
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Knowledge
Answer Location: Introduction
Difficulty Level: Easy
5. People who illegally reproduce and use software and subsequently cost manufacturers billions of dollars a year in lost revenue are called ______.
a. cyberpunks
b. cyber zombies
c. neuromancer
d. software pirates
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Knowledge
Answer Location: Types of Cybercrime
Difficulty Level: Easy
6. All of the following are a part of Wall’s (2001) typology of cybercrime except ______.
a. cyberdeceptions
b. cyberhackers
c. cyberpornography
d. cybertrespass
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Application
Answer Location: Types of Cybercrime
Difficulty Level: Medium
7. It is estimated that ______ percent of computer crimes are committed by “insiders” or employees.
a. 20
b. 50
c. 80
d. 95
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Knowledge
Answer Location: Types of Cybercrime
Difficulty Level: Easy
8. The illegal production of computer software is a big business in ______ countries.
a. North American
b. Southeast Asian
c. Western European
d. Middle Eastern
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Knowledge
Answer Location: Types of Cybercrime
Difficulty Level: Easy
9. All of the following are examples of cybercrime except ______.
a. high-tech espionage
b. telecommunications fraud
c. bullying
d. online pedophilia
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Application
Answer Location: Types of Cybercrime
Difficulty Level: Medium
10. Spernow’s (1995) typology of cybercrime includes all of the following except for ______.
a. cyberviolence
b. insider crime
c. high-tech espionage
d. malicious hacking
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Application
Answer Location: Types of Cybercrime
Difficulty Level: Medium
11. According to Wall (2001), which of the following refers to crossing boundaries into other people’s property?
a. cyberdeceptions
b. cyberviolence
c. cyberpornography
d. cybertrespass
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Application
Answer Location: Types of Cybercrime
Difficulty Level: Medium
12. According to Wall (2001), which of the following applies to crimes such as credit card fraud and priacy?
a. cyberdeceptions
b. cyberviolence
c. cyberpornography
d. cybertrespass
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Application
Answer Location: Types of Cybercrime
Difficulty Level: Medium
13. According to Wall (2001), which of the following refers to breaching laws on obscenity and decency?
a. cyberdeceptions
b. cyberviolence
c. cyberpornography
d. cybertrespass
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Application
Answer Location: Types of Cybercrime
Difficulty Level: Medium
14. According to Wall (2001), doing psychological harm to or inciting harm against others is known as ______.
a. cyberdeceptions
b. cyberviolence
c. cyberpornography
d. cybertrespass
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime
REF: Cognitive Domain: Application
Answer Location: Types of Cybercrime
Difficulty Level: Medium
15. What is the term for ill-intentioned hackers who attempt to break into computer systems?
a. crackers
b. insiders
c. pilferers
d. bait-and-switchers
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Knowledge
Answer Location: Types of Attacks on Computer Systems
Difficulty Level: Easy
16. ______ involve programming a computer to continuously send fake authentication messages to a targeted server, keeping it constantly busy and forcing out legitimate users.
a. Password phishing
b. Web spoofing
c. Denial of service attacks
d. Sniffers
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Knowledge
Answer Location: Types of Attacks on Computer Systems
Difficulty Level: Easy
17. Software programs such as Cracker are used to assist in which of the following types of attacks?
a. denial of service attacks
b. e-mail bombs
c. dictionary attacks
d. worms
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Knowledge
Answer Location: Types of Attacks on Computer Systems
Difficulty Level: Easy
18. ______ creates a false (shadow) version of a website that is controlled by the attacker.
a. Web spoofing
b. Worms
c. Password phishing
d. Sniffers
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Knowledge
Answer Location: Types of Attacks on Computer Systems
Difficulty Level: Easy
19. Which of the following refers to a subprogram that contains a virus, bomb, or other harmful feature?
a. web spoofing
b. worms
c. password phishing
d. Trojan horse
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Application
Answer Location: Types of Attacks on Computer Systems
Difficulty Level: Medium
20. ______ entails a cracker stealing password, account, or credit card education.
a. Phishing
b. Worms
c. Trojan horse
d. Key loggers
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Comprehension
Answer Location: Types of Attacks on Computer Systems
Difficulty Level: Easy
21. Which of the following are similar to viruses that reproduce themselves and subvert computer systems?
a. phishing
b. worms
c. Trojan horse
d. key loggers
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Comprehension
Answer Location: Types of Attacks on Computer Systems
Difficulty Level: Easy
22. ______ are used to gain passwords to access accounts.
a. Phishing
b. Sniffer programs
c. Trojan horse
d. Key loggers
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Comprehension
Answer Location: Types of Attacks on Computer Systems
Difficulty Level: Easy
23. What are vaccines?
a. computer hackers who develop harmful programs
b. computer programs that perform a task, such as printing a message or destroying data, on a certain date
c. rogue programs that copy themselves onto other programs
d. computer programs that seek out and destroy viruses
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems
REF: Cognitive Domain: Comprehension
Answer Location: Argot of Cybercrime
Difficulty Level: Easy
24. Which of the following best describes computer hackers who develop harmful programs?
a. time bombs
b. viruses
c. vaccines
d. cyberpunks
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Application
Answer Location: Argot of Cybercrime
Difficulty Level: Medium
25. Which of the following best describes rogue programs that copy themselves into other programs or disks?
a. time bombs
b. viruses
c. vaccines
d. cyberpunks
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Application
Answer Location: Argot of Cybercrime
Difficulty Level: Medium
26. ______ are computer programs that perform a task, such as printing a message or destroying data, on a certain date.
a. Time bombs
b. Viruses
c. Vaccines
d. Cyberpunks
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Comprehension
Answer Location: Argot of Cybercrime
Difficulty Level: Easy
27. A majority of children who are victims of online predator are ______.
a. younger than 9 years old
b. 9 to 13 years old
c. 14 to 17 years old
d. older than 17 years old
KEY: Learning Objective: 15.3: Discuss some operations of online predators.
REF: Cognitive Domain: Knowledge
Answer Location: Online Predators
Difficulty Level: Easy
28. ______ are the unanticipated, unintended, hidden functions of social change.
a. Manifest functions
b. Latent functions
c. Cultural lag
d. Hacker’s ethics
KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.
REF: Cognitive Domain: Knowledge
Answer Location: Societal Reaction
Difficulty Level: Easy
29. The idea that change takes place unevenly is referred to as ______.
a. manifest functions
b. latent functions
c. cultural lag
d. hacker’s ethics
KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.
REF: Cognitive Domain: Knowledge
Answer Location: Societal Reaction
Difficulty Level: Easy
30. ______ are the anticipated or intended consequences of, for instance, new technology.
a. Manifest functions
b. Latent functions
c. Cultural lag
d. Hacker’s ethics
KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.
REF: Cognitive Domain: Knowledge
Answer Location: Societal Reaction
Difficulty Level: Easy
31. ______ attempts to identify future developments (trends or events that might influence crime).
a. Environment scanning
b. Focus groups
c. Qualitative methodology
d. Triangulation
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Knowledge
Answer Location: Exploring the Future of Crime: Methods
Difficulty Level: Easy
32. ______ are procedures that ask a panel of experts to predict the future.
a. Boosters
b. Delphi techniques
c. Hot products
d. Police Futurists International
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Knowledge
Answer Location: Exploring the Future of Crime: Methods
Difficulty Level: Easy
33. ______ attempts to describe how present developments might appear in the future.
a. Boosters
b. Delphi techniques
c. Hot products
d. Scenario writing
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Knowledge
Answer Location: Exploring the Future of Crime: Methods
Difficulty Level: Easy
34. What is the purpose of Police Futurists International?
a. It is an organization that exists for the purpose of predicting the future of policing.
b. It is an organization that follows the trends of governmental policies.
c. It is an organization that follows the trends of street crime versus white collar crime.
d. It is an organization that responds to the increasing needs of the FBI.
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Comprehension
Answer Location: Exploring the Future of Crime: Methods
Difficulty Level: Easy
35. What does the term “biometric spoofing” mean?
a. Criminals in the future may be able to use the same technology as crime fighters to commit crimes.
b. There will be an increase in scams related to virtual worlds, such as Second Life.
c. Robotics and cloning will lead the way in crime.
d. Mathematical models and quantitative data can predict computer crimes.
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Comprehension
Answer Location: Other Crime Predictions
Difficulty Level: Easy
36. Bennett (1987) in Crimewarps, made all of the following predictions except for ______.
a. the computer will be the biggest generator of crime in the future
b. the concentraiton of crime in the U.S. will shift to the South
c. low birth rates and high work rates will leave homes ungaurded during the day
d. industries with older workers will experience less theft
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Application
Answer Location: Crimewarps
Difficulty Level: Medium
37. All of the following were identified as predictions in Digital Crime and Digital Terrorism (2006) except that ______.
a. organized crime groups will increasingly use the computer as a criminal instrument
b. espionage will continue to evolve
c. cyber terrorism will be the largest computer problem
d. some hacker groups will evolve into networked criminal enterprises
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Application
Answer Location: The Future of Digital Crime
Difficulty Level: Medium
38. British Home Office predictions include all of the following except for ______.
a. virtual-reality addition may increase
b. drugs will no longer pose challenges for crime control
c. alcopops and designer alcoholic drinks will continue to increase in popularity in underage drinkers
d. decreases in the use of cash will continue to result in greater theft involving credi cards and checks
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Application
Answer Location: British Home Office Predictions
Difficulty Level: Medium
39. ______ are items that are in high demand to be stolen.
a. Hot products
b. Crackers
c. Spoofs
d. Alcopops
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Knowledge
Answer Location: British Home Office Predictions
Difficulty Level: Easy
40. Which of the following theories provies some explanation of cybercrime?
a. social disorganiztion
b. strain
c. differential association
d. cultural lag
KEY: Learning Objective: 15.7: Assess how criminological theories apply to cybercrime.
REF: Cognitive Domain: Application
Answer Location: Theory and Crime
Difficulty Level: Medium
True / False
1. Whole units of the Chinese military spend their entire time stealing secrets of government and private corporation computers.
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Knowledge
Answer Location: Introduction
Difficulty Level: Easy
2. The computer is a tool that can be used in the commission of a variety of crimes.
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Knowledge
Answer Location: Introduction
Difficulty Level: Easy
3. Software pirates, those who illegally reproduce and use software, cost manufacturers billions of dollars a year in lost revenue.
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Knowledge
Answer Location: Types of Cybercrime
Difficulty Level: Easy
4. Most cybercrimes are reported to the police.
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Knowledge
Answer Location: Types of Cybercrime
Difficulty Level: Easy
5. Online pedophiles tend target young “wannabe” hackers and participants in chat rooms.
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Comprehension
Answer Location: Types of Cybercrime
Difficulty Level: Easy
6. Individuals involved in high-tech espionage are often industrial spies who sell their knowledge to rivals or foreign bidders.
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Comprehension
Answer Location: Types of Cybercrime
Difficulty Level: Easy
7. Key loggers are secret programs that record a user’s keystrokes.
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Knowledge
Answer Location: Types of Attacks on Computer Systems
Difficulty Level: Easy
8. Both viruses and works can spread with no assistance.
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Knowledge
Answer Location: Types of Attacks on Computer Systems
Difficulty Level: Easy
9. Network scanning programs are used to find vulnerable networked computers.
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Comprehension
Answer Location: Types of Attacks on Computer Systems
Difficulty Level: Easy
10. “Phone-phreaking” refers to automatic speed dialers used by computer hackers.
Learning Objetive: 15.2: List some examples of attacks on computer systems
REF: Cognitive Domain: Comprehension
Answer Location: Argot of Cybercrime
Difficulty Level: Easy
11. Experts suggest that parents should play a more proactive role in monitoring their child’s use of the internet.
KEY: Learning Objective: 15.3: Discuss some operations of online predators.
REF: Cognitive Domain: Comprehension
Answer Location: Online Predators
Difficulty Level: Easy
12. Stalking online is usually of adolescents and not young children.
KEY: Learning Objective: 15.3: Discuss some operations of online predators.
REF: Cognitive Domain: Comprehension
Answer Location: Online Predators
Difficulty Level: Easy
13. Many predators use romance and seduction to corner their victims, and a surprising number are not known to the youth in person.
KEY: Learning Objective: 15.3: Discuss some operations of online predators.
REF: Cognitive Domain: Comprehension
Answer Location: Online Predators
Difficulty Level: Easy
14. Virus attacks can cripple internet operations.
KEY: Learning Objective: 15.4: Identify some examples of cyberterrorism.
REF: Cognitive Domain: Comprehension
Answer Location: Cyberterrorism
Difficulty Level: Easy
15. Trojan horses, worms, logic bombs, and eavesdropping sniffers can all be used to compromise the integrity of or deny access to data.
KEY: Learning Objective: 15.4: Identify some examples of cyberterrorism.
REF: Cognitive Domain: Comprehension
Answer Location: Cyberterrorism
Difficulty Level: Easy
16. Cybercrime is not a separate type of crime.
KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.
Cogntive Domain: Comprehension
Answer Location: Societal Reaction
Difficulty Level: Easy
17. The latent functions of social change are the anticipated or intended consequences of new technology.
KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.
REF: Cognitive Domain: Comprehension
Answer Location: Societal Reaction
Difficulty Level: Easy
18. Latent functions are the anticipated or intended consequences of, for instance, new technology.
KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.
REF: Cognitive Domain: Comprehension
Answer Location: Societal Reaction
Difficulty Level: Easy
19. Manifest functions are the unanticipated, unintended, hidden functions of this same change.
KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.
REF: Cognitive Domain: Comprehension
Answer Location: Societal Reaction
Difficulty Level: Easy
20. The replacement of human mental processes by machines is referred to as cybernetics.
KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.
REF: Cognitive Domain: Comprehension
Answer Location: Societal Reaction
Difficulty Level: Easy
21. Mathematical models use qualitative case studies to forecast crime trends.
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Comprehension
Answer Location: Exploring the Future of Crime: Methods
Difficulty Level: Easy
22. Delphi techniques are procedures that ask a panel of experts to predict the future.
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Comprehension
Answer Location: Exploring the Future of Crime: Methods
Difficulty Level: Easy
23. Scenario writing attempts to describe how present developments might appear in the future.
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Comprehension
Answer Location: Exploring the Future of Crime: Methods
Difficulty Level: Easy
24. According to crime predictions, urban robbery rates will most likely decline.
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Comprehension
Answer Location: Exploring the Future of Crime: Methods
Difficulty Level: Easy
25. Electronic tagging, DNA analysis, and recognition systems based on retinas or fingerprints could all be used to tackle crime in the twenty-first century.
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Comprehension
Answer Location: Other Crime Predictions
Difficulty Level: Easy
26. Crimewarps predicts that a reduction in rates of AIDS will increase demand for streetwalkers.
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Knowledge
Answer Location: Crimewarps
Difficulty Level: Easy
27. Crimewarps predicts that the growth in the elderly population will increase medical quackery and insurance fraud.
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Knowledge
Answer Location: Crimewarps
Difficulty Level: Easy
28. Financial crime by employees will be the largest computer problem in the future.
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Comprehension
Answer Location: The Future of Digital Crime
Difficulty Level: Easy
29. More women in the work-force and increased leisure activity outside the home will create new opportunities for criminals.
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Comprehension
Answer Location: British Home Office Predictions
Difficulty Level: Easy
30. According to the British Home Office predictions, virtual-reality addiction may decrease.
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Comprehension
Answer Location: British Home Office Predictions
Difficulty Level: Easy
31. TVs, tablets, and smartphones are examples of hot products.
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Comprehension
Answer Location: British Home Office Predictions
Difficulty Level: Easy
32. Most traditional theories do not specifically address computer crimes.
KEY: Learning Objective: 15.7: Assess how criminological theories apply to cybercrime.
REF: Cognitive Domain: Comprehension
Answer Location: Theory and Crime
Difficulty Level: Medium
33. According to Ogburn (1922), computers can change communications, commerce, and even dating behavior far more quickly than the capability of societal values and norms to keep pace.
KEY: Learning Objective: 15.7: Assess how criminological theories apply to cybercrime.
REF: Cognitive Domain: Comprehension
Answer Location: Theory and Crime
Difficulty Level: Medium
34. Cybercrime is considered a separate type of crime.
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Comprehension
Answer Location: Summary
Difficulty Level: Medium
35. Malicious hackers seek forbidden knowledge and support the hacker’s ethic.
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Comprehension
Answer Location: Summary
Difficulty Level: Medium
36. Types of attacks on computers have generated their own argot.
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Comprehension
Answer Location: Summary
Difficulty Level: Medium
37. Environmental scanning and surveys are used to predict the future of crime.
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Comprehension
Answer Location: Summary
Difficulty Level: Medium
Short Answer
1. Define cybercrime.
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Knowledge
Answer Location: Introduction
Difficulty Level: Easy
2. What is cyberviolence?
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Knowledge
Answer Location: Types of Cybercrime
Difficulty Level: Easy
3. Identify Wall’s (2007) three types of online offending.
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Comprehension
Answer Location: Types of Cybercrime
Difficulty Level: Medium
4. List and describe Wall’s (2001) typology of cybercrime.
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Comprehension
Answer Location: Types of Cybercrime
Difficulty Level: Medium
5. What are software pirates?
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Knowledge
Answer Location: Types of Cybercrime
Difficulty Level: Easy
6. What is the hacker’s ethic?
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Comprehension
Answer Location: Types of Cybercrime
Difficulty Level: Easy
7. What is the difference between a white hat hacker and a black hat hacker?
KEY: Learning Objective: 15.1: Discuss the various types of cybercrime.
REF: Cognitive Domain: Comprehension
Answer Location: Types of Cybercrime
Difficulty Level: Medium
8. In regard to computer crime, what are Trojan horses?
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Knowledge
Answer Location: Types of Attacks on Computer Systems
Difficulty Level: Easy
9. List and describe three types of attacks on computers.
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Comprehension
Answer Location: Types of Attacks on Computer Systems
Difficulty Level: Medium
10. The world of computer offenses has produced its own argot which is a specialized vocabulary peculiar to a group of people. Identify and describe three of the terms that relate to cybercrime.
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Comprehension
Answer Location: Argot of Cybercrime
Difficulty Level: Medium
11. What is the difference between a time bomb and a virus?
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Comprehension
Answer Location: Argot of Cybercrime
Difficulty Level: Medium
12. What are cyberpunks?
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Knowledge
Answer Location: Argot of Cybercrime
Difficulty Level: Medium
13. What is a salami technique?
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Comprehension
Answer Location: Argot of Cybercrime
Difficulty Level: Easy
14. Who/what are demon dialers?
KEY: Learning Objective: 15.2: List some examples of attacks on computer systems.
REF: Cognitive Domain: Knowledge
Answer Location: Argot of Cybercrime
Difficulty Level: Easy
15. What is the National Sex Offender Registry?
KEY: Learning Objective: 15.3: Discuss some operations of online predators.
REF: Cognitive Domain: Knowledge
Answer Location: Online Predators
Difficulty Level: Easy
16. What does Ogburn (1922) mean by “cultural lag”?
KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.
REF: Cognitive Domain: Comprehension
Answer Location: Societal Reaction
Difficulty Level: Easy
17. What is the difference between manifest functions and latent functions?
KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.
REF: Cognitive Domain: Comprehension
Answer Location: Societal Reaction
Difficulty Level: Medium
18. What is cybernetics?
Ans. According to the text, cybernetics is the replacement of human mental proceees by machines.
KEY: Learning Objective: 15.5: Summarize the implications technology has for social change.
REF: Cognitive Domain: Knowledge
Answer Location: Societal Reaction
Difficulty Level: Easy
19. What are Delphi techniques?
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Comprehension
Answer Location: Exploring the Future of Crime: Methods
Difficulty Level: Medium
20. What is scenario writing?
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Comprehension
Answer Location: Exploring the Future of Crime: Methods
Difficulty Level: Easy
21. Identify the three goals of future researchers.
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Comprehension
Answer Location: Exploring the Future of Crime: Methods
Difficulty Level: Easy
Essay
1. Describes the two methods used to explain how demographic shifts will influence the future of crime.
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Comprehension
Answer Location: Exploring the Future of Crime: Methods
Difficulty Level: Hard
2. In Crimewarps (Bennett, 1987), there were a number of interesting predictions regarding the future of crime. Describe four of those predictions.
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Comprehension
Answer Location: Crimewarps
Difficulty Level: Hard
3. Identify the eight forecasts for the future of digital crime according to Taylor, Caeti, Loper, Fritsch, and Liederbach in Digital Crime and Digital Terrorism (2006).
1) Crimes involving computers will increase substantially, requiring major changes in resource allocation and training and the creation of new police specialties.
2) Internet fraud, including identity theft, will be the largest computer problem.
3) Virtual crimes against persons will increase at a faster pace, requiring new laws and new types of crime investigation and prevention.
4) Some hacker groups will evolve into networked criminal enterprises.
5) Organized crime groups will increasingly use the computer as a criminal instrument.
6) Terrorist groups will increasingly use the internet for communications as well as for cyberterrorism.
7) Espionage will continue to evolve into information warfare, economic espionage, and intellectual property theft.
8) Criminals, terrorists, and anarchists will accelerate the use of technology to steal data, destroy communications, and in other ways do harm.
KEY: Learning Objective: 15.6: Describe the methods criminologists use to explore the future of crime.
REF: Cognitive Domain: Comprehension
Answer Location: The Future of Digital Crime
Difficulty Level: Hard
Document Information
Connected Book
Exploring Sociology Canadian Perspective Test Bank
By Frank E. Hagan