Ch 11 Property Victimization, Identity Theft Victimization, And Cyber Victimization Flashcards

1
Q

account hijacking

A

Taking over someone else’s existing account without consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Anti-Car Theft Act (1992)

A

Made carjacking a federal offense and provided funding to link motor vehicle databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anti-Car Theft Improvements Act of 1996

A

Upgraded state motor vehicle departments’ databases to help identify stolen cars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

burglary

A

Entering a structure unlawfully to commit a felony or theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CAN-SPAM Act of 2003:

A

Made sending spam e-mail a crime in certain circumstances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

carjacking

A

The taking of an occupied vehicle by an armed offender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

direct costs:

A

Monies and the value of goods and services taken as a result of identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dumpster dive

A

Going through trash to find papers with personal identifying information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

electronic dating violence:

A

Dating violence that involves the use of digital media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

home invasion

A

Burglary of a residence in which the offender uses force against the residents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

identity theft

A

Using another’s personal identity information to commit fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identity Theft and Assumption Deterrence Act (1998)

A

Made identity theft a federal offense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Identity Theft Penalty Enhancement Act (2004)

A

Created the crime of aggravated identity theft for identity theft associated with certain felonies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identity Theft Supplement (ITS)

A

Supplement to the National Crime Victimization Survey in which data on extent of account hijacking and use and misuse of personal information was collected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

indirect costs

A

Legal bills, bounced checks, and other costs associated with identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

motor vehicle theft:

A

The unlawful taking of another’s vehicle

17
Q

Motor Vehicle Theft Law Enforcement Act (1984)

A

Required manufacturers to put identification numbers on car parts to make them easier to trace when stolen

18
Q

Motor Vehicle Theft Prevention Act of 1994

A

Developed a voluntary, national motor vehicle theft prevention program

19
Q

New Fair and Accurate Credit Transactions Act of 2003

A

Enacted provisions to prevent identity theft and help victims

20
Q

phishing

A

Use of fake websites and e-mails to trick people into providing personal information

21
Q

revenge porn

A

A form of nonconsensual pornography where sexually graphic images are distributed without a person’s consent

22
Q

shoulder surfing

A

When offenders get information such as credit card numbers by watching or listening to someone enter them

23
Q

skimming

A

Using devices to extract personal information from automated teller machines (ATMs)

24
Q

smishing

A

form of phishing that occurs through SMS (text) alerts

25
Q

spear phishing

A

A type of fraud in which a target is communicated with using personalized information

26
Q

spyware

A

Software that surreptitiously collects information from unsuspecting people’s computers

27
Q

target hardening

A

Making it more difficult for an offender to attack a certain target

28
Q

technology-based coercive control

A

form of intimate partner violence in which offenders use methods of intimidation and isolation to control their victims, in this case via technology

29
Q

technology-facilitated sexual violence

A

Sexual violence perpetrated with the use of technology

30
Q

theft

A

The taking of another person’s property

31
Q

vishing

A

A type of phishing that takes place over the phone

32
Q

whaling

A

A type of phishing in which senior-level employees are targeted