Chapter 10

THE INFLUENCE OF TECHNOLOGY, MEDIA, & POPULAR CULTURE

ON CRIMINAL BEHAVIOR: COPYCAT CRIME & CYBERCRIME

Multiple Choice Questions

1.Technological advances have impacted criminal behavior in which of the following ways?:

a)Mass Communication Technology has transformed media and popular culture into a powerful influence on offender behavior.

b)Computer Technology has created new avenues and different opportunities for criminal behavior.

c)Investigative Technology has altered methods used by offenders and the types of crimes they engage in.

d)All of the above

e)None of the Above

2.The ______is a view of the world as more hostile and dangerous than it actually is resulting from overexposure to mass media:

a)Hostile Environment Syndrome

b)Mean World Syndrome

c)Danger World-View

d)Media-Danger Condition

e)None of the above

3.Research on the influence of TV violence on aggression has consistently shown that TV violence:

a)Increases aggression and social anxiety

b)Cultivates a “mean view” of the world

c)Negatively impacts real-world behavior

d)Has little to no empirical relationship to aggression in the real-world.

e)a, b, & c

4.A ______is a type of schema referring to a prototype of a series of events that occur across a period of time that share an underlying similarity.

a)Cognitive script

b)Event Schedule

c)White Hat

d)Linked Synapse

e)Timed Event Series

5.______is the application of science to human endeavors?

a)Cosmology

b)Technology

c)Scientology

d)Biology

e)Anatomy

6.______is crime inspired by another crime that has been publicized in the news media or fictionally or artistically represented whereby the offender incorporates aspects of the original offense into a new crime?

a)Cybercrime

b)Copycat crime

c)Flattery crime

d)Techno-crime

e)None of the above

7.What movie has inspired the largest amount of copycat crime to date?

a)The Last Seduction

b)Clockwork Orange

c)Fight Club

d)Silence of the Lambs

e)Natural Born Killers

8.What book inspired Mark David Chapman to kill John Lennon?

a)Catcher in the Rye

b)The Stranger

c)To Kill a Mockingbird

d)Clockwork Orange

e)The Secret Agent

9.______involves activities in which computers and other technological devices are used for illicit purposes?

a)Copycat crime

b)Techno-crime

c)Violent crime

d)White collar crime

e)None of the above

10.Which of the following theories regarding the link between media violence and crime has not (to date) been empirically supported:

a)Social Learning

b)Arousal

c)Catharsis

d)Desensitization

e)Priming

11.Review of research that has specifically focused on the relationship between violent media and criminal aggression (as opposed to aggression in general) suggests that:

a)Study after study supports the link between violent media and both general and criminal aggression and violence.

b)While the link between violent media and general aggression has been empirically established, the link between violent media and criminal aggression has not.

c)Violent media influences criminal aggression in adults.

d)Violent media influences criminal aggression in juveniles.

e)Both a & d.

12.The copycat effect is also sometimes referred to as:

a)The contagion effect

b)Imitation

c)Mimesis

d)Clusters

e)All of the above

13.In 1974 sociologist David Phillips coined the term ______to refer to the copycat phenomenon in reference to the 1774 novel, The Sorrows of Young Werther by Johann Wolfgang von Goethe:

a)Suggesto-imitative assaults

b)Werther Effect

c)Mean World Syndrome

d)Wolfgang von Goethe Mimesis

e)None of the above

14.Which of the following movies was not noted in the chapter as having an inspirational role in a copycat crime?:

a)Natural Born Killers

b)The Matrix

c)Taxi Driver

d)Pulp Fiction

e)Clockwork Orange

15.The copycat is influenced by which of the following factors?:

a)Individual Criminogenic Factors

b)Characteristics of Media Source

c)Cultural Factors

d)Demographic Factors

e)All of the Above

16.Surette’s (2002) study of 68 incarcerated male serious and violent juvenile offenders and found that _____indicated they had committed a crime they had seen or heard about in the media:

a)3%

b)10%

c)26%

d)75%

e)99%

17.Joel Black, author of The Aesthetics of Murder (1990) argues that today we live in a world of:

a)The ethical realm of the real

b)Aestheticized hyperreality

c)Psychologically savvy media consumers

d)Corrupt media moguls

e)Aesthetic catatonia

18.Which type of stalkers usually target celebrities?:

a)Simple obsessionals

b)Love obsessionals

c)Erotomaniacs

d)Both a & b

e)None of the above

19.According to the chapter, in which of the following ways does the celebrity obsession phenomenon help to better understand copycat crime?:

a)Media plays a central role in crimes involving celebrities and copycat crime.

b)Technology gives potential copycats wide access to information that validates and can be used to mimic the behavior of notorious offenders and well publicized cases, in particular those involving celebrities.

c)Since 90% of copycat criminals are obsessed with celebrities, understanding this phenomenon provides insight into the individual-level dynamics of copycat crime.

d)All of the above

e)Both a & b

20.Which of the following factors were mentioned as a possible reason as to why the film Natural Born Killers inspired so many copycat murders?:

a)Media loops

b)Appealing characters who made murder look “fun”

c)Depiction of female violence in a contradictory and confusing manner

d)Blurring of boundaries between fantasy and reality

e)All of the above

21.Which of the following is not one of the four major elements of cybercrime noted by Speer (2000)?:

a)Location

b)Victim

c)Offender

d)Action taken to eliminate threat

e)Crime scene characteristics

22.Which of the following is an example of a cybercrime?:

a)Nigerian Fraud schemes

b)Computer Hacking

c)Online shopping scams

d)Spam

e)All of the above

23.Which of the following are the two essential features of cybercrime?:

a)Computer technology as modus operandi and intangibility of the environment

b)Offender computer skills and victim ignorance of computer technology

c)Hardware and Software

d)Hackers and Crackers

e)Internet access and wired transfer capabilities

24.______involves telecommunications fraud through the illegal manipulation of PBXs, access codes, access tones, or switches:

a)Hacking

b)Phishing

c)Phreaking

d)Cracking

e)Switching

25.The term ______refers to a bad or criminal hacker:

a)Black Hat

b)White Hat

c)Cracker

d)Slacker

e)Both a & c

26.______target Internet sites for political purposes to disrupt but not destroy normal operations engaging in a range of activities including web sit-ins, virtual blockades, automated e-mail bombs, and URL redirection to computer break-ins, computer viruses and worms, and web defacement.

a)Phreakers

b)Phishers

c)Cyberterrorists

d)Destructive Hacktivists

e)Cyberstalkers

27.Individuals/groupswho engage in unlawful attacks and/or threats of attack against computer networks and the information contained within them to intimidate or coerce a government or its people to further a political objective with threat of violence or psychological harm are called______:

a)Phreakers

b)Phishers

c)Cyberterrorists

d)Destructive Hacktivists

e)Cyberstalkers

28.The M.O. of most hackers involves which activity in order to gain access to information (e.g. passwords)?:

a)Confidence scams

b)Gathering personal information from employees

c)Breaking into the boss’s desk drawer

d)Special software designed to decode passwords

e)Both a & b

29.Which of the following is an example of a public order cybercrime?:

a)Cyberstalking

b)Cyberluring

c)Internet Gambling

d)Phishing

e)Cyberterrorism

30.Which of the following is an example of a violent cybercrime?:

a)Cyberstalking

b)Cyberluring

c)Internet Gambling

d)Phishing

e)Internet Prostitution

31.Which of the following is an example of a sex cybercrime?:

a)Cyberstalking

b)Internet Sex Trafficking

c)Internet Gambling

d)Phishing

e)Internet Prostitution

32.Which of the following is an example of a political cybercrime?:

a)Cyberstalking

b)Cyberluring

c)Internet Gambling

d)Phishing

e)Cyberterrorism

33.Which of the following is an example of a economic cybercrime?:

a)Cyberstalking

b)Cyberluring

c)Phishing

d)Cyberterrorism

e)All of the above

34.Which of the following suggestions were offered by Lloyd (2002) to guide future research regarding the criminogenic influence of mass media technology

a)Psychometrically sound instruments that quantify media influences

b)Identification of individual and ecological variables predictive of consumption patterns and differential views of media.

c)Increased precision in conceptualizing media influences on specific developmental tasks

d)Examination of individuals who identify with prosocial media messages to understand the range of positive and negative outcomes.

e)All of the above.

35.Which of the following research questions has been definitively answered regarding the effects of media violence:

a)Is there an empirical link between media violence and aggression?

b)Is there an empirical link between media violence and crime?

c)Are children who are born and grow up with mass media technology in the 21st century more or less likely to be negatively-criminogenically influenced by it?

d)As computer technology becomes more sophisticated and video and other virtual reality games more realistic, is there more/less potential for cathartic versus criminogenic effects of virtual violence?

e)Is there an empirically identifiable cluster of factors that constitute an individual, culture, or context at high risk for copycat or cybercrime?