EDUC 44608

subject Type Homework Help
subject Pages 14
subject Words 1764
subject Authors Larry J. Siegel

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
The creation of false emails or websites that look legitimate but are designed to gain
illegal access to a victim's personal information
a. phishing
b. warez
c. dumpster diving
d. spearing
The illegal sale of counterfeit goods and illegal use of intellectual property to commit
crime, such as stock manipulation, have been used to support terrorist activities.
a. True
b. False
Emergency counseling for crime victims is often referred to as crisis intervention.
a. True
b. False
page-pf2
People who believe that they will be caught if they commit crime are the ones most
likely to be deterred from committing criminal acts. What element of deterrence does
this reflect?
a. Perception of punishment
b. Severity of punishment
c. Speed of punishment
d. Certainty of punishment
A loophole that many green-collar criminals have found with the Endangered Species
Act of 1973 is that it only protects the animals and not the species' habitat.
a. True
b. False
page-pf3
Government official charged with coordinating data from the nations' primary
intelligence gathering agencies
a. Director of National Intelligence
b. Director of Joint Agency Alignment
c. Supervisor of Internal Affairs
d. Administrator of Terrorism Taskforce
Cognitive frameworks that help people quickly process and sort through information
are called ______.
a. schemas
b. latent traits
c. criminogenic structure
d. impulsive controls
Most restorative justice programs are located within the juvenile justice system.
a. True
b. False
page-pf4
A competency hearing in which a person is declared "mentally ill," or a trial where
someone in found to be a "rapist" are forms of __________, according to Harold
Garfinkle.
a. successful demonizing rituals
b. successful shame rituals
c. successful stigmatizing ceremonies
d. successful degradation ceremonies
The view that criminality is a function of people's interactions with various
organizations, institutions, and processes in society is known as ______.
a. social process theory
b. techniques of neutralization
c. social conflict theory
d. social structure theory
page-pf5
According to the text, recent research in the subarea of criminology involving terrorism
found that mental illness is the primary cause in explaining why young people become
terrorists.
a. True
b. False
It is illegal for the police to monitor people in public places with cameras and secretly
record their activities.
a. True
b. False
Strain theory holds that crime is a function of ______.
a. unequal distribution of wealth
b. loss of informal institutions of social control
page-pf6
c. conflict between people's goals and means
d. available methods of achievement
Murder of a very young child.
a. Filicide
b. Infanticide
c. Eldercide
d. Pesticide
What happens when criminals try new offenses they had previously avoided because
situational crime prevention programs neutralized their crime of choice?
a. Discouragement
b. Extinction
c. Replacement
d. Specific deterrence
page-pf7
Tom has been repeatedly victimized while wearing the home team's football jersey
while sitting on the visiting team's side of the football field. The _____ aspect of repeat
victimization accounts for Tom's troubles.
a. target vulnerability
b. target gratifiability
c. target hostility
d. target antagonism
If more criminals are sent to prison, the crime rate should go down. This is referred to
as the _____ effect.
a. incarceration
b. prison
c. incapacitation
d. recidivism
page-pf8
The Emergency Planning and Community Right-to-Know Act of 1986 required
companies to disclose all information about child sexual predator who were volunteers
or paid employees.
a. True
b. False
Which of the following is not one of the steps required to defeat jihadist groups
according to the Rand Corporation?
a. Create a political infrastructure capable of quick-strike retaliation of terrorism.
b. Attack the ideological underpinnings of global jihadism.
c. Sever ideological and other links between terrorist groups.
d. Strengthen the capabilities of front-line states.
West Virginia became the first state to enact legislation requiring consent before a
sexual encounter can take place.
a. True
b. False
page-pf9
Which of the following is an Asian transnational group involved in manufacturing and
trafficking methamphetamine who originated in Thailand?
a. Red Wa
b. Jao Pho
c. Triads
d. Fuk Ching
The concept of population heterogeneity assumes that the propensity of an individual to
participate in antisocial and/or criminal behaviors is an ever-evolving trait, changing
frequently and increasing in severity.
a. True
b. False
page-pfa
Hirschi and Gottfredson have collected data showing that the demographic distribution
of white-collar crime is similar to other crimes.
a. True
b. False
When a government or political authority makes use of death squads to kill political
opponents, dissenters, or other undesirables, what type of crime has been committed?
a. Political corruption
b. Torture
c. State violence
d. Illegal domestic surveillance
Some social structure theorists argue that destructive forces in poverty-stricken areas
are responsible for high crime rates.
a. True
b. False
page-pfb
Girls growing up in ______ are socialized to fear legal sanctions more than males;
consequently, boys in these families exhibit more delinquent behavior than their sisters.
a. paternalistic families
b. matriarchal families
c. egalitarian families
d. capitalist families
When Diane Whipple died after being attacked by two large dogs in the hallway of her
apartment building, one of the dogs' owners was convicted of manslaughter based on
the legal principle of ______.
a. deliberate awareness
b. deliberate premeditation
c. deliberate indifference
d. deliberate malice
page-pfc
______________ consists of unsolicited advertisements or promotional material,
typically in unwanted emails, but can also be sent via instant messaging, text
messaging, and other forms of media.
Religious participation seems to be a more significant inhibitor of crime than merely
having religious beliefs and values.
a. True
b. False
Strain is limited in affluent areas because educational and vocational opportunities are
available.
a. True
b. False
page-pfd
Bernard Madoff is an example of one of the most famous Ponzi scheme violators.
a. True
b. False
Cultural deviance theory combines elements of _____ and social disorganization
theories.
a. strain
b. poverty
c. socialization
d. transmission
An act of disloyalty to one's nation.
a. Treason
page-pfe
b. Subversion
c. Sedition
d. Duplicity
The "Twinkie defense" brought national attention to the view that biochemical
conditions can influence antisocial behavior.
a. True
b. False
A drug that produces sleep and relieves pain, such as heroin, morphine, and opium, and
may become addictive is referred to as a ____________________.
page-pff
How is age of onset related to crime and criminality?
Answer:Answers will vary
Compare and contrast the motivating factors of terrorism.
Answer:Answers will vary.
Define the term political crime and list describe the goals associated with political
crime.
Answer:Answers will vary.
_______________ terrorism promotes the interests of a minority ethnic or religious
group that believes it has been persecuted under majority rule.
Because of differential opportunities presented to youth, disadvantaged young people
page-pf10
are likely to join one of three types of gangs; the gangs which develop because youth
are double failures, both unable to gain legitimate means and unwilling to do so through
illegal means, are called _____________ gangs.
A computer program that looks like a benign application but contains illicit codes that
can damage the system operations is called a ______________________
Positive, life-sustaining relations with individuals and institutions are known as
_______________.
According to Sampson and Laub, _________________ refer to the life-changing events
that alter the development of a criminal career.
page-pf11
The government official charged with coordinating data from the nation's primary
intelligence-gathering agencies is called the __________________.
The _____ effect is the idea that keeping offenders in confinement will eliminate the
risk of their committing further offenses.
The U.S. Supreme Court ruled in _______________ that state-level bans on same-sex
marriage are unconstitutional.
page-pf12
___________________ refers to short-term influence on a person's behavior, such as
financial problems or peer pressure, which increases risk taking.
List and describe the primary ways that criminals use phishing and identity theft
techniques for monetary gain.
Answer:Answers will vary
In 2014, five Chinese men were indicted for stealing thousands of sensitive internal
communications between U.S. Steel Corporations in a crime referred to as
___________________ espionage.
The view that negative life events are connected and produce a hostile view of people
and relationships, preference for immediate rewards, and a cynical view of conventional
norms is known as ___________________.
page-pf13
According to Techniques of Neutralization theory, ______________ views the word as
a corrupt place with a dog-eat-dog code because everybody involved is on the take.
____________________ theory holds that everyone has the potential to become
criminal, but most people are controlled by their bonds to society.
Discuss how social process theories have influenced public policy. Provide examples of
policies and programs based on social process theories.
Answer:Answers will vary
The ______ is the foundation of Judeo-Christian moral teachings and a basis for the
page-pf14
U.S. legal system.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.