Lecture 8: Crime and Deviance on the Internet Flashcards

1
Q

How have technologies changed the landscape of criminality?

A

We need to look beyond traditional approaches to understanding offenders and their decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cyberactivities

A

Computing activities that rely on internet connectivity (e-mail, online research, streaming media, gaming).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is internet connectivity required for cyberactivities?

A

No.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is a computer required for cyberactivities?

A

Yes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Problem with the elements of crime in cyber activities.

A

Cannot prove actus reus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cybercrime includes…

A
  • Phishing.
  • Ripping.
  • Hacking.
  • Luring
  • Stalking.
  • Spamming.
  • Skimming.
  • Trafficking.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Phishing

A

E-mails asking you to click.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ripping

A

Taking CD’s or software and passing them around.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hacking

A

Distributed denial-of-service attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Luring

A

Luring people to certain sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Stalking

A

Keeps watching for activity. Tries to get you engaged in conversation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spamming

A

Sending mass emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Skimming

A

Trying to lure targets to give up information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trafficking

A

Through the Deep Web. Covert web system. Only small number of people use it. Very limited chance you will be found. Prostitution, human trafficking, drug trafficking, assassinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cybercrime

A

Any criminal offence or series of offences committed through the use of a computer and a computer network or internet connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cyberterrorism

A

Using a computer to orchestrate large-scale “Attacks on information,” including government or critical infrastructure servers or any database of interest to national security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Difference between cybercrime and e-Crime.

A

Cybercrime is analogous to real-life, offline crimes. Usually directed at individuals, rather than at systems. e-crimes are computer offences committed against financial institutions or the state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of crime includes cyberespionage, cyberterrorosim, and target institutional targets rather than human ones?

A

e-Crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

___ ___ email was hacked in October 2015 by a teenager.

A

CIA Directors’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Governmental agencies have had to become more ___ as a result of cybercrime.

A

Flexible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Recent cases reflect the vulnerability in the ___ ___.

A

Digital age.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cyberterrorism has the potential to permanently disrupt…

A

The economic or environmental stability of entire nations or regions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Network attacks against critical infrastructure sites are evident in…

A

Conductor-less trains.

24
Q

The ___ malware was developed by the NSA and Israeli intelligence to destroy Iranian nuclear facilities.

A

Stuxnet.

25
Q

Israeli agents forging passports was an example of how…

A

An incident can involve both online and offline “crime.”

26
Q

How does social media become antisocial?

A

Becomes avenue for antisocial activities.

27
Q

___ model of crime can be applied to cybercriminology.

A

Consensus.

28
Q

How does the consensus model of crime apply to cybercirminology?

A

Determines where the line between crime and deviance is drawn in online communities.

29
Q

Technological Determinism

A

Helps us understand how specific technologies drive cultural changes.

30
Q

Determinism

A

Cause and effect factor. Usually a criticism saying you are jumping to a conclusion.

31
Q

Paraphilia

A

Sexual offences.

32
Q

Deviant Cybercommunities

A

Subcultures or counter-cultures who may never have met, who seek to circumvent the customary user experience of websites or social media,

33
Q

Deviant cybercommunties seek to exploit weaknesses and vulnerabilities, known as…

A

“Soft targets.”

34
Q

What is the paradox of deviant cybercommunities?

A

Cybercommunities serve a “social” purpose but also intensify deviant and antisocial impulses among some.

35
Q

Cyberdeviant paraphilias include:

A
  1. Erotomania.
  2. Exhibitionism.
  3. Scopophilia (voyeurism).
  4. Scatologia.
36
Q

Erotomania

A

Physical stalking of a person (offline) vs. cyberstalking (online).

37
Q

Exhibitionism

A

Flashing (offline) vs. sexting (online).

38
Q

Scopophilia (voyeurism)

A

Secretly watching others (offline) vs. use of a smartphone to secretly record or photograph people (online).

39
Q

Scatologia

A

Obscene phone calls (offline) vs. cyberbullying, cybermobbing, and internet trolling (online).

40
Q

Internet Trolling

A

People that get a kick from twisting from the purpose of the message to anger people.

41
Q

Is criminology properly equipped to handle online offenders?

A

No.

42
Q

Electronic manifestations of identified paraphilias have no clear offline reference. Therefore, they are more difficult to…

A

Define and legislate.

43
Q

Routine activities theory explains that…

A

The amount of time you spend online and the nature of those virtual environments determines your risk of being victimized.

44
Q

Risk increases on Whyte Avenue when you…

A

Step into a pub/club rather than just walking.

45
Q

Research on cyberbullying and cybervictimology must include the assessment of ___.

A

Risk.

46
Q

Routine activities theory says that those who spend ___ time online are at a higher risk of being victimized.

A

More.

47
Q

Problem with online activity is how…

A

They become dependent on their online life for self-esteem or self-worth.

48
Q

Digital media offer cyberbullies access to users who would…

A

Normally not have face-to-face contact with them.

49
Q

Traditional barriers between ___ ___ are obscured, which leads to generational and demographic confusion.

A

Life stages.

50
Q

Cybercrime brings about unforeseen online collisions between groups of people with different values. True or false?

A

True.

51
Q

Bill C-30

A

Expand police powers to conduct online surveillance.

52
Q

Bill C-13

A

Protecting Canadians from Online Crime Act.

53
Q

Why was Bill C-30 withdrawn?

A

Expanding police powers clashed with privacy issues.

54
Q

Under Bill C-13, police only require ___ ___ ___ ___ to get a warrant to obtain information about an internet user.

A

Reasonable grounds for suspicion.

55
Q

Is the future of guardianship on the internet determined?

A

No.

56
Q

When faced with an option of whether or not to grant a warrant, judges are more likely to…

A

Grant the warrant.