Examlex
Computer crime taxonomy: Fill in each blank below with a word or phrase based on Carter's taxonomy of computer crime.
a. Target: This category is comprised of computer crimes where the criminal targets ______. The objective of these crimes is to impact the ______ of data stored on the computer.
b. Instrumentality: Computer as the instrumentality of the crime uses the computer to ______. The computer is used to ______.
c. Incidental: This type of computer crime encompasses crimes where the computer is not ______ but is ______. The use of computer ______ and may make the crime more difficult to ______.
d. Associated: The simple ______ of computers, and notably the growth of the Internet, has generated ______of ______. In these cases, technological growth essentially creates ______ and new ways of ______.
Repressed Memory
A psychological phenomenon where an individual unconsciously blocks out memories of a distressing event.
Sexual Abuse
Unwanted sexual activity, with perpetrators using force, making threats, or taking advantage of victims not able to give consent.
Conscious Awareness
The state of being aware of and able to think about one's own existence, sensations, thoughts, surroundings, and experiences.
Eyewitness Accounts
Testimonies from individuals who have directly observed an event or situation.
Q2: All of the following link accounting information
Q14: Within the context of REAL modeling, which
Q15: Which of the following phrases from the
Q16: Which of the following best describes a
Q29: Working in groups frequently leads to information
Q35: As a form of internal control, fingerprint
Q42: The "controls" column of the risk-control matrix
Q43: Which of the following is a fundamental
Q49: In a well organized acquisition/payment process, the
Q55: Which of the following statements is most