criminology final

Within subcultures of violence, it is considered appropriate for an individual who has been offended by a negative outcome in a dispute to seek reparations through violent means. This concept is termed:

disputatiousness

Violent acts designed to improve the financial or social position of the criminal are known as:

instrumental violence

Much of the difference in rates of violent crime between whites and racial minorities can be explained by minorities being forced to live in high crime neighborhoods, which:

increases their risk of exposure to violence

_____ describes the process of how abused kids are turned into aggressive adults.

violentization process

The link between substance abuse and violence occurs in three different formats. Violent behavior that results from user's attempts to fund their drug habits is known as:

economic compulsive behavior

When an attacker does not want to harm his/her victim as much as s/he wants to possess him/her sexually, it is known as:

power rape

During which stage of brutalization does the youth become belligerent and angry?

violent performance stage

The crime that requires offensive touching, such as slapping, hitting, or punching a victim is:

battery

according to the national crime victimization survey, there are almost ____ rapes attempted each year

125,000

rape by someone known to the victim, including family members and friends is knows as:

acquaintance rape

Which of the following is not a factor that predicts spousal abuse?

economic stability

Violent acts directed toward a particular person or members of a group merely because the targets share a discernible racial, ethnic, religious, or gender characteristic are known as:

hate crimes

What is the most common form of hate crime?

intimidation

Which type of murder requires the killer to have malice aforethought but not premeditation or deliberation?

second-degree murder

Which type of murder refers to a killing that occurs when a person's acts are negligent and without regard for the harm they may cause others.

negligent manslaughter

Which is an inaccurate statement pertaining to spousal abuse.

police departments report that 10-20% of evening calls involve domestic disputes

Which type of murder is intent present but malice is not?

non-negligent manslaughter

Who is most likely to engage in workplace violence?

middle-aged white male facing termination

Women are most likely to be stalked by:

an intimate partner

Any physical, emotional, or sexual trauma to a child for which no reasonable explanation, such as an accident, can be found is known as:

child abuse

The "ticking bomb" scenario is used to justify what type of state political crime?

torture

Because the concept of political crime is highly subjective, people who some label as terrorists may be viewed by others as:

freedom fighters

Which of the following involves spying on potential or actual enemies?

espionage

Which goal of political criminals hopes to conceal conventional criminal motivations behind a mask of conviction and altruism?

pseudo-conviction

Affecting vote counts to bring about a desired election outcome, is an example of:

election fraud

If a political criminal plots to overthrow an existing government and replace it with one that holds views he/she finds more acceptable, we would say that this criminal has ____ as a goal.

revolution

Why is treason the only crime mentioned in the United States Constitution?

Because American colonists feared giving their central government the amount of power wielded by the English king.

If a state environmental agency were to fail to enforce laws, resulting in the pollution of public waterways, it would be an example of what type of state political crime?

state-corporate crime

When a politician, judge, or police officer solicits bribes, it undermines public trust in the government and is an example of:

political corruption

Which of the following refers to an act of disloyalty to one's nation or state?

treason

Which of the following is not a specifically assigned mission of the Department of Homeland Security (DHS)?

expanding surveillance of cyber space to identify terrorists

Use of the word terrorism began in:

1795

This type of terrorist group uses violence to frighten those in power with the aim of replacing the existing government with a regime that holds acceptable political or religious views.

revolutionary terrorists

The use of secret prisons to detain terror suspects without trial and the use of illegal interrogations to obtain confessions are examples of what type of state political crime?

human rights violations

How many of the 50,000 cargo containers that enter the country on a daily basis are screened?

less than 5%

The USA Patriot Act, enacted after the terrorist attacks of September 11th:

gave sweeping new powers to domestic law enforcement and international intelligence agencies

Al-Qaeda is a _____ terror organization that believes there is a war of civilizations in which "Jews and Crusaders" want to destroy Islam and must therefore be defeated.

retributive

The Earth Liberation Front (ELF) and the Animal Liberation Front (ALF) are examples of what type of terrorist group?

eco-terrorist

Critics of the USA Patriot Act are concerned that it erodes:

civil rights

According to this motivational view, terrorists are not poor or lacking in education. While terrorists may feel isolated from the rest of society, their tight bonds of family and friendships encouraged them to join terror groups.

socialization/friendship view

Embezzlement is distinguished from fraud on the basis of:

when the criminal intent was formed and that a serious breach of trust has taken place

Car theft usually motivated by a teenager's desire to acquire the power, prestige, sexual potency, and recognition associated with an automobile is known as:

joyriding

The fact that some arsonists are motivated by severe emotional turmoil, antisocial behavior, and psychopathology, supports the claim that arson should be viewed as:

a mental health problem

When caught, shoplifters try to rationalize their behavior. Cromwell and Thurman found widespread use of which social process theory?

neutralization theory

Most na�ve check forgers come from ____ backgrounds and have little identification with a criminal subculture.

middle-class

Which of the following is a prevention strategy to reduce or eliminate shoplifting?

all of these

Which of the following earns his or her living solely by buying and reselling stolen merchandise?

fence

Occasional property crimes occur when there is an opportunity or:

situational inducement

What fact indicates that car thieves use rational choice when stealing vehicles?

they steal vehicles because of the high profit potential

In contrast to occasional thieves, criminals who make a significant portion of their income from crime are known as:

professional criminals

Corporations can circumvent economic sanctions by:

moving their rule-violating activities overseas

White collar crime involves illegal activities of people and institutions whose acknowledged purpose is ___ profit through ___ business transactions.

illegal; legitimate

A survey conducted by the National White Collar Crime Center found that victims of white collar crimes are typically:

White males with high incomes

In the 1930s, Sutherland first used the phrase "white-collar crime" to describe the criminal activities of:

the rich and powerful

churning, front running and bucketing are types of

securities fraud

income tax evasion is a type of client fraud. not paying taxes, is an example of

passive neglect

Systematic theft of company property by employees is common and is called:

pilferage

One example of health care fraud involves billing for more expensive services or procedures than were actually provided or performed. This practice is termed ______ and requires "inflation" of the patient's diagnosis code to a more serious condition consi

upcoding

A white-collar crime in which a stockbroker makes repeated trades with a client's account in order to fraudulently increase his or her commissions is known as:

churning

Using illegal tactics to make profits in the marketplace is known as:

enterprise crime

Cyber bullying is one of the newest forms of cyber crimes. While traditional bullying involves a physical or social power differential between the victim and offender, cyber bullying involves a/an:

pg. 527

Why do women become prostitutes?

for all these reasons

Acts that are considered illegal because they threaten the general well-being of society and challenge its accepted moral principles are known as:

public order crimes

________ is designed toharass or extort money from legitimate users of an Internet service by threatening to prevent the user having access to the service.

denial-of-service attacks

Some refer to public order crimes as "victimless crimes" because participants are willing and not actually harmed. Others claim there is no such thing as a victimless crime. Who, then, should be considered the victim?

society as a whole

Which of the following is a public-order crime?

prostitution

Which of the following topics would not be of interest to a moral crusader?

moral crusaders would be concerned with all these topics

Not all instances of computer theft and computer fraud fall under existing statues because the property stolen:

intangible

When pornography websites send consumers to other sites involuntarily, it is known in the industry as:

mousetrapping

Why do cyber crimes present a compelling challenge for the justice system and law enforcement community?

Cyber crime presents a compelling challenge for all these reasons.

________ is violence that is designed not for profit or gain but to vent rage, anger, or frustration

expressive violence

the link between substance abuse and violence appears in three different formats. the format or concept of ______ ____ reflects the violent behavior that results from gang conflict inherent in the drug trade

systemic link

in the ______ ____ _______ a potent theme of violence influences lifestyles, the socialization process and interpersonal relationships

subculture of violence

during the ___ stage of the violentization process, a young victim develops a belligerent, angry demeanor as a result of being mistreated by abusive parents and caretakers

brutalization

rape involving people in some form of romantic relationship is known as _____ _____

date rape

_____ ______ occurs when there are sexual relations between an underage (minor) victim

statutory rape

______ _____ protects women from being questioned about their sexual history unless it directly bears on the case

shield laws

_____ ______ is a killing that accompanies a felony, such as robbery or rape

felony murder

____ ______ involves the killing of three or more persons in three or more separate events. in between the murders, the killer reverts to his/her normal lifestyle

serial murder

when referring to spousal relations and murder, it is possible that men kill their spouses/partners because they fear losing _____ and ______

control and power

the term _____ _______ is used to signify illegal acts that are designed to undermine an existing government and threaten its survival

political crime

the motivations behind political crimes may stem from _____ or _____ sources

religious or idealogical

_______ political criminals plot to overthrow the existing government and replace it with one that holds views they find more acceptable

revolutionary

some political criminals are motivated by altruism or _______. they truly believe their crimes will benefit society and are willing to violate the law and risk punishment in order to achieve what they view as social improvement

conviction

____ ______ is illegal interference with the process of an election

electoral fraud

as the only crime contained therein, the united states constitution defines ______ as levying war against the US or giving enemies aid or comfort

treason

if one engages in the crime of _____, that person obtains information about a government, organization or society that is considered secret or confidential and does so without the permission of the holder of the information

espionage

when spying involves corporations and the bribing of employees to reveal trade secrets, the crime is referred to as ________ ________.

industrial espionage

_____ ______ _______ are perpetrated by state authorities against the people they are supposed to serve

state political crimes

the _____ _______ ______ is sometimes used to justify torture

ticking bomb scenario

as a group, _____ move freely in sparsely populated areas and transported goods such as spirits, gems and gold

smugglers

_______ _______ were public meeting places that served as headquarters for gangs in the 18th century

flash houses

in contrast to occasional thieves, _____ _____ are criminals who make a significant portion of their income from crime

professional criminal

______ ________ are not professional criminals. they are amateur criminals whose decision to steal is spontaneous and whose acts are unskilled, unplanned and haphazard

occasional criminal

______ _______ is the concept that describes occasional property crimes occurring when an opportunity is available

situational inducement

_______ is type of car theft that occurs when a gunman forces the car's owner to give up the keys

carjacking

_______ _________ _______ are the majority of check forgers who do not believe their actions will hurt anyone

naive check forgers

the critical role of a "merchant" in criminal transactions has been recognized since the 18th century. a _______ is a buyer and seller of stolen merchandise.

fence

______ are usually respectable persons who do not conceive of themselves as thieves, but are systemic shoplifters who steal merchandise for their own use

snitches

______ is a white-collar enforcement strategy that encourages law-abiding behavior through both the threat of economic sanctions and the promise of rewards for conformity

compliance

acts that are considered illegal because they threaten the general well-being of society and challenge its social norms, customs, and values are termed _______ _______ _________

public order crimes

a ________ _________ against gay marriage led to the passage of the defense of marriage act in 1996, which defined marriage as a union of one man and one woman and prevented the federal government from recognizing same-sex marriages

moral crusade

a type of moral crusader that existed in the early West was ______ who held strict standards of morality that held strict standards of morality that, when they caught their prey, resulted in sure and swift justice

vigilantes

in the early west, __________ were set up to pursue cattle rustlers and stagecoach robbers

vigilante

_________ __________ is a booming business whereby men from wealthy nations engage in sexual activities with trafficked individuals by traveling to destinations where women and young children are prostituted

sex tourism/sex trafficking

_______ is material that is used to provide sexual titillation and excitement, most often for paying customers

pornography

drug use is not a new concept. smoking the extract form seeds of the _________ ____ known as "the plant of joy" was practiced 5,000 years ago

opium poppy

about _____ percent of sexually exploited children are involved in prostitution rings that work cross state lines

20%

________ _______ is a new breed of offenses typically involving the theft and/or destruction of information, resources, or funds utilizing computers, computer networks, or the Internet

cyber crime

______ _______ is responsible for the globalization phenomenon or the process of creating transnational markets, politics, and legal systems - in other words, creating a global economy

information technology

the ______ phenomenon is the process of creating transitional markets, politics and legal systems

globalization

because criminal operations can now extend their operations from coast to coast and across international borders, they can commit ______ _______ _______

transnational organized crime

there are three major types of Internet securities fraud: market manipulation, fraudulent offerings of securities and _________ ________

Illegal touting (make securities recommendations and fail to disclose that they are being paid to disseminate their favorable positions

_______ refers to cyber offenders who illegally obtain software and then "rip" or "crack" its copyright protection before posting it on the Internet for members of the group to use

warez

the nigerian 419 scam, free credit reports and account verifications scams are common types of ______ scams

phishing

________ _______ schemes range from illegally copying material under copyright protection to using technology to commit traditional theft-based offenses such as larceny and fraud

cyber theft

using the Internet to gather information that is considered private and confidential, whether by an estranged spouse of a foreign business competitor, is termed ______ _______

cyber spying

some experts question the existence of _____ ______ and claim that hackers are regularly mistaken for terrorists

...