Chapter 14 - Today's Challenges in Criminal Justice Flashcards
gun control
efforts by a government to regulate or control the sale of firearms
background checks
an investigation of a person’s history to determine whether that person should be allowed a certain privilege, such as the ability to possess a firearm
nonstate actor
an entity that plays a role in international affairs but does not represent any established state or nation
weapons of mass destruction
a weapon that has the capacity to cause large number of casualties or significant property damage
enemy combatant
an individual who has supported foreign terrorist organizations such as al Qaeda that are engaged in hostilities against the military operations of the United States
military tribunal
a court that is operated by the military rather than the criminal justice system and is presided over by military officers rather than judges
cyberattack
an attempt to damage or disrupt computer systems or electronic networks operated by computers
cyber crime
a crime that occurs online, in the virtual community of the internet, as opposed to in the physical world
cyber fraud
any misrepresentation knowingly made over the Internet with the intention of deceiving another and on which a reasonable person would and does rely to his or her detriment
identity theft
the theft of person information, such as a person’s name, driver’s license number, or Social Security number
Phishing
sending an unsolicited e-mail that falsely claims to be from a legitimate organization in an attempt to acquire sensitive information from the recipient
cyberstalking
the crime of stalking, committed in cyberspace through the use of e-mail, text messages, or another form of electronic communication
hacker
a person who uses one computer to break into another
botnet
a network of computers that have been appropriated without the knowledge of their owners and used to spread harmful programs via the Internet; short for robot network
worm
a computer program that can automatically replicate itself and interfere with the normal use of a computer. A worm does not need to be attached to an existing file to move from one network to another
virus
a computer program that can replicate itself and interfere with the normal use of a computer. A virus cannot exist as a separate entity and must attach itself to another program to move through the network
spam
bulk e-mails, particularly of commercial advertising, sent in large quantities without the consent of the recipient
intellectual property
property resulting from intellectual, creative processes
corporate violence
physical harm to individuals or the environment that occurs as the result of corporate policies or decision making
regulation
governmental control of society through rules and laws that is generally carried out by administrative agencies
compliance
the state of operating in accordance with governmental standards
racketeering
the criminal action of being involved in an organized effort to engage in illegal business transactions