• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/58

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

58 Cards in this Set

  • Front
  • Back

logic Bomb:

A program that is secretly attached to a computer system that waits for a specific condition to be met before corrupting/printing/ruining files

computer worm:

programs that attack computer networks by self-replicating and sending themselves to other computers without the aid of an operator

corporate espionage:

trade secrets are stolen by companys competitors in order to give them an advantage

salami-slice fraud:

perpretrator carefully skims small sums from the balances of a large number of accounts to bypass internal controls and escape detection

Robbery:

theft from someobody with the threat of violence or actual violence used

boosters:

professional shoplifters

operations that are legal and illegal

sting: legal


exploitation: illegal


swindle" illegal



Albert Neimann:

From Germany, isolated cocaine in 1860

Illegal touting:

taxi cabs attracting customers in an illegal fashion, like singling out travelers and grabbing their stuff and loading them into the taxi

Cyberstalker who targeted a tennis player:

william lepeska

Corporate/organized/interprise crime

all are handled by large businesses

nepotism:

the tendancy for people in power or authority to favor friends and family and give them jobs

professional v occasional/oppurtunist crime

a professional criminal plans out their crime in advance, choosing the time and place of the crime while an oppurtunist criminal might commit a crime because someones car window is down with valuables in easy reach

obscenity:

extremely offensive

child prostitution:

a child is used for sexual favors in exchange for goods and services

statutory rape:

can be known as "consensual rape" because an underage person could give consent to have sex with someone older than 18, but in the eyes of the law, that is considered rape because the young person is not considered capable of giving consent

insider trading:

manipulation of stocks or property of a company by insiders in the company based on data they have access to that the general public does not

skeezers:

a prostitute who trades sex for drugs, typically crack

pedophiles:

are normally more male than female, and they prey on people of their own sex

Robinson v california

california court decided that being addicted to narcotics was a disease and not a crime

miller v california

was a landmark decision by the United States Supreme Court wherein the court redefined its definition of obscenity from that of “utterly without socially redeeming value” to that which lacks "serious literary, artistic, political, or scientific value." It is now referred to as the Three-prong standard or the Miller test.

roe v wayde

landmark us case regarding abortion had them regulate abortion as illegal after the 3rd trimester

commercial sex transaction:

trading sexual favors for anything

Aristocrats of prostitution are called:

call girls

Whichof the following is NOT a type of Paraphilia sex group

hemophilia

strategies involve lockinggoods in place or having them monitored by electronic systems.

target hardening

identity theft is

fraud

Thistype of white-collar crime includes antitrust violations, price fixing, andfalse-advertising.

corporate crime

Thisis a drug that was first isolated in 1860 by Albert Niemann of Gottingen,Germany. When originally discovered, it was considered a medical breakthroughthat could relieve fatigue.


crack

Accordingto the Institute of Social Research, which of the following is the most widelyused illicit drug?


marijuana

Whichof the following is NOT considered a major type of internet securities fraudtoday?

automatic name phising

Whatis the name of the business consultant who in 2005 was convicted of bribingcorrupt officials with cash, super bowl tickets, massages, and limousines?

nate gray

TheNew York electronic task force is in partnership with:

The secret service

Thisterm has been coined to describe violent acts directed at people because oftheir sexual preference.

gay bashing

Whichof the following statements best describe homophobia?

extreme overreaction to homosexuals

Cyberstalking is

use of the internet or electronic communications devices to stalk another person

Crimesinvolving sexuality and morality are often referred to as

moral offenses or mala en se

Whatis the name of the Act in 1914 that restricted importation, manufacture, saleand dispensing of narcotics?

Harrison narcotics act

Whichof the following is NOT illegal under the Sherman Antitrust Act


free enterprise

includes antitrust violations, price fixing,and false advertising.

corporate crime

Fakereligious organizations deceive people out of each year.

millions of dollars

Thisterm derives from the Greek porn, meaning “prostitute”, and graphien, meaning“to write”.

pornography

Thisword derives for the Greek homos, meaning the “same” and refers to eroticinterest in members of one’s own sex.

homosexuality or lesbian

SteveKaplan, who was involved with overcharging customers, and is also in “cahoots”with the Gambinoorganized crime family, was charged with what type of crime? i

Stinger swindle

Asa group, can be defined as acts in which violation ofcriminal law is designed to bring financial reward to an offender

economic crime

Defineobscenity.

extremely offensive behavior

Whichis NOT an example of computer fraud?


Globalization


Automatedmethods or recognizing a person based on a physiological or behavioralcharacteristic is known as: New Roman",seq{4

biometrics

Whichof the following is NOT a form of fraud?

Bluecollar fraud or Member fraud

Whichof the following is NOT an internet destructive program?


snakes

Childprostitution is not a recent development. Child prostitution has been linked to:

sexual trauama experienced at an early age

Obtainingsexual pleasure by spying on a stranger while he or she disrobes or engages insexual acts is called:

voyeruism

TheEPA Criminal Investigation Division investigates allegations of criminalwrongdoing prohibited by various environmental statues. Such investigations include all of thefollowing EXCEPT: Mail fraud Wire fraud Group boycott The illegal disposal ofhazardous waste

group boycott

Thisis a characteristic specific to Russian organized crime.

Able to directly influence the state’sforeign and domestic policies

Thisoccurs when the use of computer networks are used for criminal profit.

cyber theft

Thisis considered to be deviant intercourse with another

someone who gains sexual pleasure from something unusual. It is defined as when one persons genitalia enter the mouth or anus of another

Whatis the name of the case that ruled people could not be legally prosecutedbecause of their status such as being homosexual or being a drug addict?

robinson v california

Whichof the following is NOT present in a commercial sexual transaction?

pedophila activities