Criminology Final Flashcards

1
Q

Critical criminologists

A

Researchers who view crime as a function of the capitalist mode of production and not the social conflict that might occur in any society regardless of its economic system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Critical criminology

A

The view that capitalism produces haves and have-nots, each engaging in a particular branch of criminality. The mode of production shapes social life. Because economic competiveness is the essence of capitalism, conflict increases and eventually destabilized social institutions and the individuals within them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Communist Manifesto

A

In this document, Marx focused his attention of the economic conditions perpetuated by the capitalist system. He stated that its development had turned workers into a dehumanized mass who lived an existence that was at the mercy of their capitalist employers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Productive forces

A

Technology, energy sources, and material resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Productive relations

A

the relationship that exist among the people producing goods and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Capitalist bourgeoisie

A

The owners of the means of production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Proletariat

A

A term used by Marx to refer to the working class members of society who produce goods and services but who do not own the means of production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lumpen proletariat

A

The fringe members at the bottom of society who produce nothing and live, parasitically, off the work of others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

dialect method

A

For every idea, or thesis, there exists an opposing argument, or antithesis. Because neither position can ever be truly accepted, the results is a merger of the two ideas, a synthesis. Marx adapted this analytic method for his study of class struggle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Thesis

A

In the philosophy of Hegel, an original idea or though.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

antithesis

A

an opposing argument

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

synthesis

A

a merger of two opposing ideas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

supranational criminology

A

The study of war crimes, crimes against humanity, and the supranational penal system in which such crimes are prosecuted and tried.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Surplus value

A

The Marxist view that the laboring classes produce wealth that fa exceeds their wages and goes to the capitalist class as profits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Marginalization

A

Displacement of workers, pushing them outside the economic and social mainstream.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dropout factories

A

High schools in which the completion rate is consistently 40 percent or less

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

globalization

A

The process of creating transnational markets, politics, and legal systems in an effort to form and sustain a global economy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

state-organized crime

A

Acts defined by law as criminal and committed by state officials, either elected or appointed, in pursuit of their jobs as government representatives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Instrumental theory

A

The view that criminal law and the criminal justice system are capitalist instruments for controlling the lower class.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Structural theory

A

The view that criminal law and the criminal justice system are means of defending and preserving the capitalist system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

demystify

A

To unmask the true purpose of law, justice, or other social institutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

left realism

A

A approach that views crime as a function of relative deprivation under capitalism and that favors pragmatic, community-based crime prevention and control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Preemptive deterrence

A

Efforts to prevent crime through community organization and youth involvement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

critical feminism

A

An area of scholarship whose focus is on the effects of gender inequality and the unequal power of men and women in a capitalist society

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Patriarchy
A society in which men dominate public, social, economic, and political affairs
26
Paternalistic families
Traditional family model in which fathers assume the role of breadwinners, while mothers tend to have menial jobs or remain at home to supervise domestic matters.
27
Role exit behaviors
In order to escape from a stifling life in male dominated families, girls may try to break away by running away or even attempting suicide
28
egalitarian families
Families in which spouses share similar positions of power at home and in the workplace
29
power-control theory
The view that gender differences in crime are a function of economic power (class position, one-earner versus two-earner families) and parental control (egalitarian families)
30
Peacemaking
An approach that considers punitive crime control strategies to be counterproductive and favors the use of humanistic conflict resolution to prevent and control crime
31
Restorative justice
Using humanistic, nonpunitive strategies to right wrongs and restore social harmony
32
shame
the feeling we get when we don't meet the standards we have set for ourselves or that significant others have set for us.
33
reintegrative shaming
A method of correction that encourages offenders to confront their misdeeds, experience shame because of the harm they caused, and then be reincluded in society.
34
sentencing circle
A peacemaking technique in which offenders, victims, and other community members are brought together in an effort formulate a sanction that addresses the needs of all.
35
developmental criminology
A view of criminal behavior that places emphasis on the changes people go through over the life course. It presents a criminal career as a dynamic process involving onset, continuity, persistence, acceleration, and eventual desistance from criminal behavior, controlled by individual level traits and conditions
36
Life course theories
Theoretical views studying changes in criminal offending patterns over a person's entire life.
37
Latent trait theories
Theoretical views that criminal behavior is controlled by a master trait, present at birth or soon after, that remains stable and unchanging throughout a person's lifetime
38
Trajectory theory
A view of criminal career formation that holds there are multiple paths to crime
39
Population heterogeneity
The view that the propensity of an individual to participate in antisocial behavior is relatively stable trait, unchanging over their life course.
40
State dependent
The propensity to commit crime profoundly and permanently disrupts normal socialization. Early rule breaking strengthens criminal motivation and increases the probability of future rule breaking.
41
Problem behavior syndrome (PBS)
A cluster of antisocial behaviors that may include family dysfunction, substance abuse, smoking, precocious sexuality and early pregnancy, educational underachieving, suicide attempts, sensation seeking, and unemployment, as well as crime.
42
Integrated theories
Models of crime causation that weave social and individual variables into a complex explanatiory chain.
43
Age-graded theory
A developmental theory that posits that traits and experiences matter to criminal disposition.
44
Turning points
According to Laub and Sampson, the life events that alter the development of a criminal career.
45
Cumulative disadvantage
A condition in which repeated negative experiences in adolescence undermine life chances and reduce employability and social relations. People who increase their cumulative disadvantage risk continued offending
46
Social Capital
Positive relations with individuals and institutions that are life sustaining
47
Social schemas
Cognitive frameworks that help people quickly process and sort through information
48
Criminogenic knowledge structure (CKS)
The view that negative life events are connected and produce a hostile view of people and relationships, preference for immediate rewards, and a cynical view of conventional norms.
49
Propensity
An inclination or tendency to behave in a particular way
50
latent trait
A stable feature, characteristic, property, or condition, present at birth or soon after, that makes some people crime prone over the life course
51
General Theory of Crime (GTC)
According to Gottfredson and Hirschi, a developmental theory that modifies social control theory by integrating concepts from biosocial, psychological, routine activities, and rational choice theories.
52
Self-control
A strong moral sense that renders a person incapable of hurting others or violating social norms
53
Self-control theory
According to Gottfredson and Hirschi, the view that the cause of delinquent behavior is an impulsive personality. Kids who are impulsive may find that their bond to society is weak.
54
Authority conflict pathway
The path to a criminal career that begins with early stubborn behavior and defiance of parents.
55
Covert pathway
A path to a criminal career that begins with minor underhanded behavior and progresses to fire starting and theft
56
Overt pathway
Pathway to a criminal career that begins with minor aggression, leads to physical fighting, and eventually escalates to violent crime.
57
Adolescent-limited offender
Offender who follows the most common criminal trajectory, in which antisocial behavior peaks in adolescence and then diminishes.
58
Life course persister
One of the small group of offenders whose criminal career continues well into adulthood
59
Instrumental violence
Violence used in an attempt to improve the financial or social position
60
Expressive violence
Violence that is designed not for profit or gain but to vent rage, anger, or frustrations
61
Cycle of violence
A hypothesis that suggests that a childhood history of physical abuse predisposes survivors to becoming violent themselves in later years.
62
Violentization process
According to Lonnie Athens, the process by which abused children are turned into aggressive adults. This process takes violent youths full circle from being the victims of aggression to being its initiators; they are now the same person they grew up despising, ready to begin the process with their own children.
63
crusted over
Children who have been victims of r witnesses to violence ad do not let people inside, nor do they express their feelings. They exploit others and in turn and exploited by those older and stronger; as a result, they develop a sense of hopelessness
64
Subculture of violence
Norms and customs that, in contrast o society's dominant values system, legitimize and expect the use of violence to resolve social conflicts.
65
Disputatiousness
Behavior within culturally defined conflict situations in which an individual who has been offended by a negative outcome in a dispute seeks reparations through violent means.
66
Gang rape
Forcible sex involving multiple attackers
67
Serial rape
Multiple rapes committed by one person over time
68
Acquaintance rape
Forcible sex which offender and victim are acquainted with each other
69
Date rape
Forcible sex during a courting relationship
70
statutory rape
Sexual relations between an underage individual and an adult; though not coerced an underage partner is considered incapable of giving informed consent
71
Marital rape
Forcible sex between people who are legally married to each other
72
Marital exemption
The practice of prohibiting the prosecution of husbands for the rape of their wives.
73
Consent
In prosecuting rape cases, it is essential to prove that the attack was forced and that the victim did not give voluntary consent to her attacker. In a sense, the burden of proof is on the Vitim to show that her character is beyond question and that she in no way encouraged, enticed, or misled the accused rapist. Proving victim dissent is not a requirement in any other violent crime.
74
Aggravated rape
Rape involving multiple offenders, weapons, and victim injuries
75
Shield law
Laws designed to protect rape victims by prohibiting the defense attorney from inquiring about their previous sexual relationships
76
Murder
The unlawful killing of a human being (homicide) with malicious intent
77
Infanticide
The murder of a newborn or very young baby
78
fillicide
The murder of one's own child
79
eldercide
The murder of a senior citizen
80
Mass murder
The killing of a large number of people in a single incident by an offender who typically does not seek concealment or escape
81
Active shooter incident
A term used by law enforcement to describe a situation in which a mass shooting is in progress when police and law enforcement agents arrive at the scene.
82
Child abuse
Any physical, emotional, or sexual trauma to a child for which no reasonable explanation, such as an accident, can be fund. Child abuse can also be a function of neglecting to give proper are and attention to a young child
83
Neglect
Not providing a child with the care and shelter to which he or she is entitled
84
Sexual abuse
Exploitation of a child through rape, incest, or molestation by a parent or other adult
85
Relational aggression
Psychological and emotional abuse that involves the spreading of smears, rumors, and private information in order to harm a person's partner
86
Acquaintance robbery
Robber who focus their thefts on people they know
87
Hate crime
Acts of violence or intimidation designed to terrorize or frighten people considered undesirable because of their race, religion, ethnic origin, or sexual orientation
88
Thrill-seeking hate crimes
Acts by hatemongers who join forces to have fun by bashing minorities or destroying property; inflicting pain on others give them a sadistic thrill
89
Reactive (defensive) hate crimes
Perpetrators believe they are taking a defensive stand against outsiders whom they believe threaten their community or way of life .
90
Mission hate crimes
Violent crimes committed by distributed individuals who see it as their duty to rid the world of evil.
91
Retaliatory hate crimes
A hate crime motivated by revenge for another hate crime, either real or imaginary, which may spark further retaliation.
92
Workplace violence
Irate employees or former employees attack coworkers or sabotage machinery and production lines; now considered the third leading cause of occupational injury or death
93
Sufferance
The aggrieved party does nothing to rectify a conflict situation; over time, the unresolved conflict may be compounded by other events that cause an eventual eruption.
94
Stalking
A pattern of behavior directed at a specific person that includes repeated physical or visual proximity, unwanted communications, and/or threats sufficient to cause fear in a reasonable person
95
Economic crime
An act in violation of the criminal law that is designed to bring financial gain to the offender
96
Fence
A buyer and seller of stolen merchandise
97
Skilled thieves
Thieves who typically work in the larger cities, such as London and Paris. This group includes pickpockets, forgers, and counterfeiters who operate freely
98
Flash houses
Public meeting places in England, often taverns, that served as headquarters for gangs.
99
Smugglers
Thieves who move freely in sparsely populated areas and transport goods, such as spirits, gems, gold, and spices, without bothering to pay tax or duty
100
Poachers
Early English thieves who typically lived in the country and supplemented their diet and income with game that belonged to a landlord
101
Occasional criminals
Offenders who do not define themselves y a criminal role or view themselves as committed career criminals
102
Professional criminals
Offenders who make a significant portion of their income from crime
103
Situational inducement
Short-time influence on a person's behavior, such as financial problems or peer pressure, that increases risk taking
104
Constructive possession
In the crime of larceny, willingly giving up temporary physical possession of property but retaining legal ownership
105
Petit (petty) larceny
Theft of a small amount of money or property, punished as a misdemeanor
106
Grand larceny
Theft of money or property of substantial value, punished as a felony
107
Shoplifting
The taking of goods from retail stores
108
Snitches
Amateur shoplifters who do not self-identify as thieves but who systematically steal merchandise for personal use
109
Booster box
Device with a false bottom that can be opened and closed by a professional shoplifter, lined with metal or some other substance to prevent security tags from setting off alarms, placed over merchandise
110
Booster box
Device with a false bottom that can be opened and closed by a professional shoplifter, lined with metal or some other substance to prevent security tags from setting off alarms, placed over merchandise
111
Target removal strategies
Displaying dummy or disabled dummy or disabled goods as a means of preventing shoplifting.
112
Target handling strategies
Making one's home or business crime proof through the use of locks, bars, alarms, and other devices.
113
Naive check forgers
Amateurs who cash bad checks because of some financial crisis but have little identifications with a criminal subculture
114
Closure
A term used by Lement to describe a condition in which people from a middle-class background who have little identification with a criminal subculture cash bad checks because of a financial crisis that demands an immediate resolution
115
Systematic forgers
Professionals who make a living by passing bad checks
116
Carjacking
Theft of a car by force or threat of force
117
False pretenses (fraud)
Misrepresenting a fact in a way that causes a deceived victim to give money or property to the offender.
118
Mark
The target of a con man or woman
119
Confidence (con) game
A swindle, usually involving a get-rich-quick scheme, often with illegal overtones, so that the victims will be afraid or embarrassed to call the police
120
Pigeon drop
A con game in which a package or wallet containing money is found by a con man or woman, and the victims are bilked out of money they are asked to put up as collateral
121
Embezzlement
A type of larceny that involves taking the possessions of anther that have been placed in the thief's lawful possession for safekeeping, such as a bank teller misappropriating deposits or a stockbroker making off with a customer's account
122
Good burglar
Professional burglars use this title to characterize colleagues who have distinguished themselves as burglars. Characteristic of the good burglar include technical competence, maintenance of personal integrity, specialization in burglar, financial success, and the ability to avoid prison sentences
123
Arson for profit
People looking to collect insurance money but who are afraid or unable to set the fire themselves, hire professional arsonists. These professionals have acquired the skills to set fires and make the cause seem accidental
124
Arson fraud
A business owner burns his or her property, or hires someone to do it, to escape financial problems
125
Public order crimes
Acts that are considered illegal because they threaten the general well-being of society and challenge its accepted moral principles. Prostitution, drug use, and the sale of pornography are considered public order crime.
126
Victimless crime
Violations of the criminal law without any identifiable evidence of an individual victim who has suffered damage from the crime
127
Social harm
A view that behaviors harmful to other people and society in general must be controlled. These acts are usually outlawed, but some acts that cause enormous amounts of social harm are perfectly legal, such as the consumption of tobacco and alcohol.
128
Vigilantes
Individuals who go on moral crusades without any authorization from legal authorities. The assumption is that it is okay to take matters into your own hands, if the cause is right and the target is immortal.
129
Moral crusaders
People who strive to stamp out behavior they find objectionable. Typically, moral crusaders are directed at public order crimes, such as drug abuse pornography.
130
Moral entrepreneurs
Interest groups that attempt to control social life and the legal order in such a way as to promote their own personal set of moral values. People who use their influence to shape the legal process in ways they see fit.
131
Paraphilias
Bizarre or abnormal sexual practices that may involve recurrent sexual urges focused on objects, humiliation or children.
132
Pedophilia
A psychosexual disorder in which a adult has sexual fantasies about or engages in sexual acts with an underage minor children
133
Prostitution
The granting of nonmarital sexual access for remuneration
134
Brothel
A house of prostitution, typically run by a madam who sets prices and handles business arrangements
135
Madam
Women who employs prostitutes, supervises their behavior, and receives a fee for her services.
136
Call girls
Prostitutes who make dates via the phone and then service customers in hotel rooms or apartments. Call girls typically have a steady clientele who are repeat customers.
137
Skeezers
Prostitutes who trade sex for drugs, usually crack.
138
Pornography
Sexually explicit books, magazine, films, or other media intended to provide sexual titillation and excitement for paying customers.
139
Obscenity
According to current legal theory, sexually explicit material hat lacks a serious purpose and appeals solely to the prurient interest of the viewer. While nudity per se is not usually considered obscene, open sexual behavior, masturbation, and exhibition of the genitals is banned in most communities.
140
Temperance movement
An effort to prohibit the sale of liquor in the United States that resulted in the passage of the Eighteenth Amendment to the Constitution in 1919, which prohibited the sale of alcoholic beverages.
141
Binge drinking
Having five or more drinks on the same occasion (that is, at the same time or within a couple of hours each other) on at least 1 day in the past 30 days.
142
Gateway model
An explanation of drug abuse that posits that users begin with a more benign drug (alcohol or marijuana) and progress to more potent drugs.
143
Cybercrime
The use of modern technology for criminals purpose
144
Information technology (IT)
All forms of technology used to create, store, retrieve, and exchange data in all its various forms, including electronic, voice, and still image.
145
Globalization
The process of creating transnational markets, politics, and legal systems in an effort to form and sustain a global economy
146
Cyber theft
Use of computer networks for criminal profits, illegal copyright infringement, identity theft, and internet security is fraud are examples of cybertheft.
147
Cyberdeviance
The sale and distribution of morally tainted material and product over the Net
148
Cybervandalism
Malicious attacks aimed at disrupting, defacing, and destroying technology
149
Cyberwar
Using cyberspace for acts of war, including spying and disrupting an enemy's computer network
150
Cyberterrorism
Internet attacks against an enemy nation's technological infrastructure.
151
ATM skimming
Using al electronic device on an ATM that copies information from a bank card's magnetic strip whenever a customer uses the machine
152
Rasomware
Malicious software, usually attached to an email, designed to block access to a computer system until a sum of money is paid.
153
Warez
A term computer hackers and software pirates use to describe a game, media, or application that is made available for use on the internet in violation of its copyright protection
154
Identity theft
Using the internet to steal someone's identity and/or impersonate the victim in order to conduct illicit transactions such as committing fraud using the victims name and identity
155
Phishing
Sometimes called carding or spoofing, phishing is a scam where the perpetrator send out emails appearing to come from legitimate web enterprises such as eBay, Amazon, and PayPal in an effort to get the recipient to reveal personal and financial information
156
Spear-phishing
targeting specific victims, sending them emails that contain accurate information about their lives obtained from social networking sites, and asking them to open an email attachment where malware harvests details such as the victims' usernames and passwords, bank account details, credit card numbers, and other personal information.
157
Money mule
Someone who collects and transfers money or goods acquired illegally and then transfers them to a third party
158
Etailing fraud
Illegally buying and/or selling merchandise on the internet
159
Darknet
Computer network that can only be accessed using nonstandard communications protocols nd ports, with restricted access that can only be opened with specific software configurations
160
ehooking
Using the internet to advertise sexual services and make contact with clients
161
Malware
A malicious software program
162
Computer worms
Programs that attack computer networks by self-replicating ad sending themselves to other users, generally via email, without the aid of the operator
163
Trojan horse
A computer program that looks like a benign application but contains illicit codes that can damage the system operations. Though Trojan horses to don't replicate themselves like viruses, they can be just as destructive
164
Logic bomb
A program that is secretly attached to a computer system, monitors the network's work output, and waits for a particular signal such as a date to appear. Also called a slag code, it is a type of delayed-action virus that may e set off when a program user makes certain input that sets it in motion. A logic bomb may cause a variety of problems ranging from displaying or printing a spurious message to deleting or corrupting data.
165
Website deffacement
A type of cybervandalism that occurs when a computer hacker intrudes on another person's website by inserting or substituting codes that expose visitors to the site to misleading or provocative information . Defacement can range from installing humorous graffiti to sabotaging or corrupting the sight.
166
Cyberstalking
Use of internet, email, or other electronic communications devices to stalk another person. Some cyberstalkers pursue minors through online chat rooms; others harass their victims electronically.
167
Distributed denial-of-service attack (DDoS)
A type of DoS attack where multiple compromised systems, which are often infected with a virus, are used o target a single system, causing a denial-of-service (DoS) attack
168
Cyberspying
Illegally using the Internet to gather information that is considered private and confidential
169
Cyberspionage
Efforts by intelligence agencies to penetrate computer networks of a enemy nation in order to steal important data