{"id":348,"date":"2023-11-16T15:56:45","date_gmt":"2023-11-16T15:56:45","guid":{"rendered":"http:\/\/localhost\/bpscoretextbooks\/?post_type=content&#038;p=348"},"modified":"2025-03-25T09:47:23","modified_gmt":"2025-03-25T09:47:23","slug":"chapter-11-forensic-cyberpsychology","status":"publish","type":"content","link":"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/9780367552299\/chapter-11-forensic-cyberpsychology\/","title":{"rendered":"Chapter 11 &#8211; Forensic Cyberpsychology"},"content":{"rendered":"\n<div class=\"wp-block-group has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"background-color:#eedbd1;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\"><div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u203a<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/9780367552299\/chapter-11-forensic-cyberpsychology\/\" title=\"Chapter 11 \u2013 Forensic Cyberpsychology\">Chapter 11 \u2013 Forensic Cyberpsychology<\/a>\n<\/span><\/div>\n\n<h1 class=\"wp-block-post-title\">Chapter 11 &#8211; Forensic Cyberpsychology<\/h1>\n\n\n<p>Forensic psychology holds huge potential in cybercriminal cases, including in work such as offender rehabilitation, victimology, offender profiling, and crime reduction strategies. It may also be used to help juries and police officers serving in cybercrime cases. This chapter begins with an introduction to the various types of cybercrime and proposed methods of classifying cybercrime. It then provides an overview of forensic psychology and how it can be applied to online crime. Key criminological and forensic psychological theories will be described and their application to cybercrime will be assessed. Finally, the difficulties in completing research in forensic cyberpsychology will be described.<\/p>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Chapter Summary<\/summary>\n<h3 class=\"wp-block-heading\">Cybercrime<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cybercrime is any criminal activity carried out using computers and computer networks.<\/li>\n\n\n\n<li>Examples of cybercrime include malicious hacking, malware development and distribution, cyberterrorism, online sexual predators, creation and distribution of child pornography\/child exploitation materials, online fraud, identity theft, and copyright infringement.<\/li>\n\n\n\n<li>Other activities, such as cyberbullying, cyberstalking, and deviant behaviour in online virtual worlds are not necessarily criminal offences, although aspects of them (such as physical threats or hate speech) may be offences in themselves.<\/li>\n\n\n\n<li>The term \u2018hacking\u2019 has mixed meanings, and attempts have been made to create terminology to more clearly differentiate between positive aspects of hacking and malicious hacking.<\/li>\n\n\n\n<li>Hacktivism is the use of hacking techniques in activism, but is not always a criminal act.<\/li>\n\n\n\n<li>Malware includes all kinds of malicious software, such as viruses, spyware, and worms.<\/li>\n\n\n\n<li>Cyberterrorists use malware and hacking, but the definition of the term \u2018cyberterrorism\u2019 has been debated.<\/li>\n\n\n\n<li>Risks to children online include sexual predators, and the creation and distribution of explicit images of children.<\/li>\n\n\n\n<li>Some financial crimes online include advance fee fraud and identity theft.<\/li>\n\n\n\n<li>Susceptibility to online financial crimes can often be explained by decision-making biases researched in cognitive psychology.<\/li>\n\n\n\n<li>Copyright infringements are conducted by many otherwise law-abiding Internet users. Peer influence and low self-control appear to be related to offending.<\/li>\n\n\n\n<li>Avatars within online virtual worlds have sometimes been attacked and\/or assaulted.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Categorising Cybercrime<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>There are several proposed taxonomies for cybercrime.<\/li>\n\n\n\n<li>David Wall (2001) listed four areas of harmful activity online: cyber-trespass, cyber-deceptions\/thefts, cyber-pornography\/obscenity, and cyber-violence.<\/li>\n\n\n\n<li>He later proposed that cybercrime had three main criminologies: computer integrity crimes, computer-assisted crimes, and computer-content crimes.<\/li>\n\n\n\n<li>Kirwan and Power (2013) differentiate between three types of cybercrime: crimes against the virtual person, Internet-enabled offences, and Internet-specific offences.<\/li>\n\n\n\n<li>The term \u2018old wine in new bottles\u2019 is used to describe how many types of cybercrime have offline equivalents, but are conducted in a new setting.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Forensic Psychology: An Overview<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Films and television often depict the work of forensic psychologists in misleading ways.<\/li>\n\n\n\n<li>Forensic psychology is a broad topic, with many forensic psychologists working in settings such as prisons, probation centres, hospitals and universities.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Research Topics in Forensic Psychology<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Offender profiling is one of many topics within forensic psychology. It has been applied to some areas of cybercrime, including malicious hacking.<\/li>\n\n\n\n<li>Offender profiling is one aspect of investigative psychology, which incorporates other ways in which psychologists can be of assistance to police investigations.<\/li>\n\n\n\n<li>Researchers attempt to determine what the risk factors of criminality are and to develop a greater understanding of specific types of offenders.<\/li>\n\n\n\n<li>Prediction of offending and reoffending, and the determination of the most appropriate methods of assessment and rehabilitation of offenders are commonly conducted by forensic psychologists.<\/li>\n\n\n\n<li>Forensic psychology also attempts to determine the most effective punishments for different types of offenders.<\/li>\n\n\n\n<li>The psychology of the courtroom is also considered by forensic psychologists, including research on the decision-making strategies of jurors and judges.<\/li>\n\n\n\n<li>The role of victims, crime prevention, and fear of crime are also frequently studied in forensic psychology.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Theories of Crime<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Theories of crime try to describe why crime occurs and who is most likely to become an offender.<\/li>\n\n\n\n<li>Single-factor theories attempt to determine differences between offenders and non-offenders on specific traits.<\/li>\n\n\n\n<li>Learning theories are thought to be beneficial in explaining offending, especially social learning theory, which has been applied to digital piracy.<\/li>\n\n\n\n<li>Rational Choice Theory (RCT) attempts to explain crime in terms of criminal decision making given the possibilities of reward and punishment.<\/li>\n\n\n\n<li>Agnew\u2019s General Strain Theory suggests that when people are placed under strain, some will resort to criminal means to achieve their goals.<\/li>\n\n\n\n<li>Neutralisations are methods of rationalising behaviour to reduce guilt and have been associated with digital piracy.<\/li>\n\n\n\n<li>\u2018Cognitive distortions\u2019 are distorted ways of thinking which may be similar to neutralisations, and are evident in many child predators and collectors of explicit materials depicting children.<\/li>\n\n\n\n<li>Labelling theory concerns how individuals label themselves and others, and the behaviours that this may result in.<\/li>\n\n\n\n<li>Routine Activity Theory considers how most criminal acts require the co-presence of a motivated offender, a suitable target, and an absence of guardians.<\/li>\n\n\n\n<li>Crime tends to be socially constructed.<\/li>\n\n\n\n<li>Finally, there are some integrated theories of crime which attempt to provide a more cohesive model of offending than the individual theories alone.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Researching Cybercrime<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cybercrime is fast paced, but this does not negate the need for empirical evidence in forensic cyberpsychology as unfounded speculation can be dangerous.<\/li>\n\n\n\n<li>Research with cybercriminals can be problematic \u2013 for example, in terms of finding participants and ensuring their identity as cybercriminals.<\/li>\n\n\n\n<li>Where necessary, researchers must be careful to consider such limitations when presenting findings and suggestions for policy.<\/li>\n<\/ul>\n<\/details>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-query alignwide is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"wp-block-post-template is-layout-flow wp-block-post-template-is-layout-flow\"><li class=\"wp-block-post post-1283 content type-content status-publish format-standard hentry content-type-content parent-book-40 resource-type-weblinks\">\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\"><h2 class=\"alignwide wp-block-post-title\">Chapter 11 \u2013 Useful Websites<\/h2>\n\n<div class=\"entry-content alignwide wp-block-post-content is-layout-flow wp-block-post-content-is-layout-flow\">\n<p>The United Nations Office on Drugs and Crime offers an online module on cybercrime. Information and module links are available at:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.unodc.org\/e4j\/en\/tertiary\/cybercrime.html\">https:\/\/www.unodc.org\/e4j\/en\/tertiary\/cybercrime.html<\/a><\/li>\n<\/ul>\n\n\n\n<p>The Interpol website includes useful information about online security and cybercrime.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.interpol.int\/Crimes\/Cybercrime\">https:\/\/www.interpol.int\/Crimes\/Cybercrime<\/a><\/li>\n<\/ul>\n\n\n\n<p>Similarly, the \u2018Stop. Think. Connect\u2019 website provides information and advice on maintaining personal security online.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/www.stopthinkconnect.org\">www.stopthinkconnect.org<\/a><\/li>\n<\/ul>\n<\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-1282 content type-content status-publish format-standard hentry content-type-content parent-book-40 resource-type-further-reading\">\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\"><h2 class=\"alignwide wp-block-post-title\">Chapter 11 \u2013 Further Reading<\/h2>\n\n<div class=\"entry-content alignwide wp-block-post-content is-layout-flow wp-block-post-content-is-layout-flow\">\n<p>Bruce Schneier\u2019s website includes a vast history of blog posts, essays, newsletters, and other writings. These examine security generally, but a significant proportion focus on cybercrime.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.schneier.com\/\">https:\/\/www.schneier.com\/<\/a><\/li>\n<\/ul>\n\n\n\n<p>The <em>International Journal of Cyber Criminology<\/em> examines cybercrime from a broader perspective than psychology alone. It includes papers on a wide variety of cybercrimes, from a multitude of academic disciplines.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/www.cybercrimejournal.com\">www.cybercrimejournal.com<\/a><\/li>\n<\/ul>\n\n\n\n<p>The UK National Cyber Security Centre website includes a vast array of articles and blog posts which relate to cybercrime and cybersecurity.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.ncsc.gov.uk\/\">https:\/\/www.ncsc.gov.uk\/<\/a><\/li>\n<\/ul>\n\n\n\n<p>The Open University provides an online course on \u2018The Psychology of Cybercrime\u2019 which provides more detailed information on many of the topics covered in this chapter.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.open.edu\/openlearn\/health-sports-psychology\/psychology\/the-psychology-cybercrime\/content-section-0?active-tab=content-tab\">https:\/\/www.open.edu\/openlearn\/health-sports-psychology\/psychology\/the-psychology-cybercrime\/content-section-0?active-tab=content-tab<\/a><\/li>\n<\/ul>\n<\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-1281 content type-content status-publish format-standard hentry content-type-content parent-book-40 resource-type-audio-and-video-links\">\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\"><h2 class=\"alignwide wp-block-post-title\">Chapter 11 \u2013 Audio and Video links<\/h2>\n\n<div class=\"entry-content alignwide wp-block-post-content is-layout-flow wp-block-post-content-is-layout-flow\">\n<p>The TED website includes a curated list of talks relating to cybercrime.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.ted.com\/playlists\/531\/what_to_know_about_cybercrime\">https:\/\/www.ted.com\/playlists\/531\/what_to_know_about_cybercrime<\/a><\/li>\n<\/ul>\n\n\n\n<p>A lecture by Prof. David Canter which outlines how investigative psychology can help in criminal cases.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=Zu21OyKl6k4\">https:\/\/www.youtube.com\/watch?v=Zu21OyKl6k4<\/a><\/li>\n<\/ul>\n\n\n\n<p>This 2020 lecture by Prof. Maria Bada considers the overlap between psychology and cybercrime.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=rIen3YWt858\">https:\/\/www.youtube.com\/watch?v=rIen3YWt858<\/a><\/li>\n<\/ul>\n<\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-260 content type-content status-publish format-standard hentry category-uncategorized content-type-content parent-book-40 resource-type-essay-questions\">\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\"><h2 class=\"alignwide wp-block-post-title\">Chapter 11 &#8211; Essay questions<\/h2>\n\n<div class=\"entry-content alignwide wp-block-post-content is-layout-flow wp-block-post-content-is-layout-flow\">\n<ol class=\"wp-block-list\" type=\"1\">\n<li>Examine the applicability of theories of crime to cybercriminal cases.<\/li>\n\n\n\n<li>Is offender profiling useful in finding the perpetrators of cybercrimes? Why or why not?<\/li>\n\n\n\n<li>While cybercrime is very dynamic, many aspects of it can be understood and predicted by a thorough understanding of criminology and broader psychological principles. Describe why these are important, with reference to at least one type of cybercrime.<\/li>\n\n\n\n<li>Compare and contrast two typologies of cybercrime in terms of enhancing understanding of online criminal behaviour. Which is most relevant to crime online?<\/li>\n<\/ol>\n<\/div><\/div>\n\n<\/li><\/ul>\n\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading alignwide\">Chapter 11 &#8211; Quiz<\/h2>\n\n\n<script>\n                            if (window.qmn_quiz_data === undefined) {\n                                    window.qmn_quiz_data = new Object();\n                            }\n                    <\/script><script>window.qmn_quiz_data[\"11\"] = {\"quiz_id\":\"11\",\"quiz_name\":\"9780367552299 - Chapter 11\",\"disable_answer\":0,\"ajax_show_correct\":0,\"progress_bar\":0,\"contact_info_location\":0,\"qpages\":{\"1\":{\"id\":\"1\",\"quizID\":\"11\",\"pagekey\":\"ehGg0m9q\",\"hide_prevbtn\":\"0\"}},\"skip_validation_time_expire\":0,\"timer_limit_val\":0,\"disable_scroll_next_previous_click\":0,\"disable_scroll_on_result\":0,\"disable_first_page\":0,\"enable_result_after_timer_end\":0,\"enable_quick_result_mc\":0,\"end_quiz_if_wrong\":0,\"form_disable_autofill\":0,\"disable_mathjax\":0,\"enable_quick_correct_answer_info\":0,\"quick_result_correct_answer_text\":\"Correct! You have selected correct answer.\",\"quick_result_wrong_answer_text\":\"Wrong! You have selected wrong answer.\",\"quiz_processing_message\":\"\",\"quiz_limit_choice\":\"Limit of choice is reached.\",\"not_allow_after_expired_time\":0,\"scheduled_time_end\":false,\"prevent_reload\":0,\"limit_email_based_submission\":0,\"total_user_tries\":0,\"is_logged_in\":false,\"pagination\":{\"amount\":1,\"section_comments\":1,\"total_questions\":10,\"previous_text\":\"Previous\",\"next_text\":\"Next\",\"start_quiz_survey_text\":\"Start Quiz\",\"submit_quiz_text\":\"Submit\"},\"error_messages\":{\"email_error_text\":\"Not a valid e-mail address!\",\"number_error_text\":\"This field must be a number!\",\"incorrect_error_text\":\"The entered text is not correct!\",\"empty_error_text\":\"Please complete all required fields!\",\"contact_field_required_error_text\":\"Please complete all required fields!\",\"url_error_text\":\"The entered URL is not valid!\",\"minlength_error_text\":\"Required atleast %minlength% characters.\",\"maxlength_error_text\":\"Maximum %maxlength% characters allowed.\",\"recaptcha_error_text\":\"ReCaptcha is missing\",\"phone_error_text\":\"Phone number is invalid\"},\"question_list\":{\"122\":{\"question_id\":\"122\",\"quiz_id\":\"11\",\"question_name\":\"Which of the following is an example of an Internet-specific crime?\",\"answer_array\":\"a:4:{i:0;a:5:{i:0;s:20:\\\"Malware distribution\\\";i:1;s:0:\\\"\\\";i:2;s:1:\\\"1\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:1;a:5:{i:0;s:14:\\\"Identity theft\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:2;a:5:{i:0;s:5:\\\"Fraud\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:3;a:5:{i:0;s:22:\\\"Copyright infringement\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}}\",\"answer_one\":\"\",\"answer_one_points\":\"0\",\"answer_two\":\"\",\"answer_two_points\":\"0\",\"answer_three\":\"\",\"answer_three_points\":\"0\",\"answer_four\":\"\",\"answer_four_points\":\"0\",\"answer_five\":\"\",\"answer_five_points\":\"0\",\"answer_six\":\"\",\"answer_six_points\":\"0\",\"correct_answer\":\"0\",\"question_answer_info\":\"\",\"comments\":\"1\",\"hints\":\"\",\"question_order\":\"0\",\"question_type\":\"0\",\"question_type_new\":\"0\",\"question_settings\":\"a:13:{s:14:\\\"question_title\\\";s:10:\\\"Question 1\\\";s:8:\\\"required\\\";i:0;s:12:\\\"answerEditor\\\";s:4:\\\"text\\\";s:15:\\\"featureImageSrc\\\";s:0:\\\"\\\";s:11:\\\"matchAnswer\\\";s:6:\\\"random\\\";s:14:\\\"case_sensitive\\\";s:0:\\\"\\\";s:14:\\\"answer_columns\\\";s:0:\\\"\\\";s:16:\\\"image_size-width\\\";s:0:\\\"\\\";s:17:\\\"image_size-height\\\";s:0:\\\"\\\";s:8:\\\"autofill\\\";s:0:\\\"\\\";s:23:\\\"limit_multiple_response\\\";s:0:\\\"\\\";s:17:\\\"file_upload_limit\\\";s:0:\\\"\\\";s:16:\\\"file_upload_type\\\";s:0:\\\"\\\";}\",\"category\":\"\",\"linked_question\":\"\",\"deleted\":\"0\",\"deleted_question_bank\":\"0\",\"answers\":[{\"0\":\"Malware distribution\",\"1\":\"\",\"2\":\"1\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Identity theft\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Fraud\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Copyright infringement\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"}]},\"123\":{\"question_id\":\"123\",\"quiz_id\":\"11\",\"question_name\":\"Many researchers and authors feel that the term \\u2018child pornography\\u2019 implies consent, and instead use which of the following terms?\",\"answer_array\":\"a:4:{i:0;a:5:{i:0;s:23:\\\"Child explicit material\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:1;a:5:{i:0;s:25:\\\"Child exhibition material\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:2;a:5:{i:0;s:23:\\\"Child exposure material\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:3;a:5:{i:0;s:27:\\\"Child exploitation material\\\";i:1;s:0:\\\"\\\";i:2;s:1:\\\"1\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}}\",\"answer_one\":\"\",\"answer_one_points\":\"0\",\"answer_two\":\"\",\"answer_two_points\":\"0\",\"answer_three\":\"\",\"answer_three_points\":\"0\",\"answer_four\":\"\",\"answer_four_points\":\"0\",\"answer_five\":\"\",\"answer_five_points\":\"0\",\"answer_six\":\"\",\"answer_six_points\":\"0\",\"correct_answer\":\"0\",\"question_answer_info\":\"\",\"comments\":\"1\",\"hints\":\"\",\"question_order\":\"0\",\"question_type\":\"0\",\"question_type_new\":\"0\",\"question_settings\":\"a:13:{s:14:\\\"question_title\\\";s:10:\\\"Question 2\\\";s:8:\\\"required\\\";i:0;s:12:\\\"answerEditor\\\";s:4:\\\"text\\\";s:15:\\\"featureImageSrc\\\";s:0:\\\"\\\";s:11:\\\"matchAnswer\\\";s:6:\\\"random\\\";s:14:\\\"case_sensitive\\\";s:0:\\\"\\\";s:14:\\\"answer_columns\\\";s:0:\\\"\\\";s:16:\\\"image_size-width\\\";s:0:\\\"\\\";s:17:\\\"image_size-height\\\";s:0:\\\"\\\";s:8:\\\"autofill\\\";s:0:\\\"\\\";s:23:\\\"limit_multiple_response\\\";s:0:\\\"\\\";s:17:\\\"file_upload_limit\\\";s:0:\\\"\\\";s:16:\\\"file_upload_type\\\";s:0:\\\"\\\";}\",\"category\":\"\",\"linked_question\":\"\",\"deleted\":\"0\",\"deleted_question_bank\":\"0\",\"answers\":[{\"0\":\"Child explicit material\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Child exhibition material\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Child exposure material\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Child exploitation material\",\"1\":\"\",\"2\":\"1\",\"3\":\"\",\"label\":\"\"}]},\"124\":{\"question_id\":\"124\",\"quiz_id\":\"11\",\"question_name\":\"Which of the following was not a typology of crime suggested by David Wall?\",\"answer_array\":\"a:4:{i:0;a:5:{i:0;s:23:\\\"Cyber-deceptions\\\/thefts\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:1;a:5:{i:0;s:25:\\\"Computer integrity crimes\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:2;a:5:{i:0;s:23:\\\"Computer content crimes\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:3;a:5:{i:0;s:25:\\\"Internet enabled offences\\\";i:1;s:0:\\\"\\\";i:2;s:1:\\\"1\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}}\",\"answer_one\":\"\",\"answer_one_points\":\"0\",\"answer_two\":\"\",\"answer_two_points\":\"0\",\"answer_three\":\"\",\"answer_three_points\":\"0\",\"answer_four\":\"\",\"answer_four_points\":\"0\",\"answer_five\":\"\",\"answer_five_points\":\"0\",\"answer_six\":\"\",\"answer_six_points\":\"0\",\"correct_answer\":\"0\",\"question_answer_info\":\"\",\"comments\":\"1\",\"hints\":\"\",\"question_order\":\"0\",\"question_type\":\"0\",\"question_type_new\":\"0\",\"question_settings\":\"a:13:{s:14:\\\"question_title\\\";s:10:\\\"Question 3\\\";s:8:\\\"required\\\";i:0;s:12:\\\"answerEditor\\\";s:4:\\\"text\\\";s:15:\\\"featureImageSrc\\\";s:0:\\\"\\\";s:11:\\\"matchAnswer\\\";s:6:\\\"random\\\";s:14:\\\"case_sensitive\\\";s:0:\\\"\\\";s:14:\\\"answer_columns\\\";s:0:\\\"\\\";s:16:\\\"image_size-width\\\";s:0:\\\"\\\";s:17:\\\"image_size-height\\\";s:0:\\\"\\\";s:8:\\\"autofill\\\";s:0:\\\"\\\";s:23:\\\"limit_multiple_response\\\";s:0:\\\"\\\";s:17:\\\"file_upload_limit\\\";s:0:\\\"\\\";s:16:\\\"file_upload_type\\\";s:0:\\\"\\\";}\",\"category\":\"\",\"linked_question\":\"\",\"deleted\":\"0\",\"deleted_question_bank\":\"0\",\"answers\":[{\"0\":\"Cyber-deceptions\\\/thefts\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Computer integrity crimes\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Computer content crimes\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Internet enabled offences\",\"1\":\"\",\"2\":\"1\",\"3\":\"\",\"label\":\"\"}]},\"125\":{\"question_id\":\"125\",\"quiz_id\":\"11\",\"question_name\":\"Which of David Wall\\u2019s typologies includes the offence of hate speech?\",\"answer_array\":\"a:4:{i:0;a:5:{i:0;s:14:\\\"Cyber-violence\\\";i:1;s:0:\\\"\\\";i:2;s:1:\\\"1\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:1;a:5:{i:0;s:14:\\\"Cyber-trespass\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:2;a:5:{i:0;s:23:\\\"Cyber-deceptions\\\/thefts\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:3;a:5:{i:0;s:27:\\\"Cyber-pornography\\\/obscenity\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}}\",\"answer_one\":\"\",\"answer_one_points\":\"0\",\"answer_two\":\"\",\"answer_two_points\":\"0\",\"answer_three\":\"\",\"answer_three_points\":\"0\",\"answer_four\":\"\",\"answer_four_points\":\"0\",\"answer_five\":\"\",\"answer_five_points\":\"0\",\"answer_six\":\"\",\"answer_six_points\":\"0\",\"correct_answer\":\"0\",\"question_answer_info\":\"\",\"comments\":\"1\",\"hints\":\"\",\"question_order\":\"0\",\"question_type\":\"0\",\"question_type_new\":\"0\",\"question_settings\":\"a:13:{s:14:\\\"question_title\\\";s:10:\\\"Question 4\\\";s:8:\\\"required\\\";i:0;s:12:\\\"answerEditor\\\";s:4:\\\"text\\\";s:15:\\\"featureImageSrc\\\";s:0:\\\"\\\";s:11:\\\"matchAnswer\\\";s:6:\\\"random\\\";s:14:\\\"case_sensitive\\\";s:0:\\\"\\\";s:14:\\\"answer_columns\\\";s:0:\\\"\\\";s:16:\\\"image_size-width\\\";s:0:\\\"\\\";s:17:\\\"image_size-height\\\";s:0:\\\"\\\";s:8:\\\"autofill\\\";s:0:\\\"\\\";s:23:\\\"limit_multiple_response\\\";s:0:\\\"\\\";s:17:\\\"file_upload_limit\\\";s:0:\\\"\\\";s:16:\\\"file_upload_type\\\";s:0:\\\"\\\";}\",\"category\":\"\",\"linked_question\":\"\",\"deleted\":\"0\",\"deleted_question_bank\":\"0\",\"answers\":[{\"0\":\"Cyber-violence\",\"1\":\"\",\"2\":\"1\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Cyber-trespass\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Cyber-deceptions\\\/thefts\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Cyber-pornography\\\/obscenity\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"}]},\"126\":{\"question_id\":\"126\",\"quiz_id\":\"11\",\"question_name\":\"Which theory of crime attempts to explain crime in terms of criminal decision making given the possibilities of reward and punishment?\",\"answer_array\":\"a:4:{i:0;a:5:{i:0;s:23:\\\"Routine Activity Theory\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:1;a:5:{i:0;s:21:\\\"General Strain Theory\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:2;a:5:{i:0;s:22:\\\"Rational Choice Theory\\\";i:1;s:0:\\\"\\\";i:2;s:1:\\\"1\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:3;a:5:{i:0;s:21:\\\"Neutralisation Theory\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}}\",\"answer_one\":\"\",\"answer_one_points\":\"0\",\"answer_two\":\"\",\"answer_two_points\":\"0\",\"answer_three\":\"\",\"answer_three_points\":\"0\",\"answer_four\":\"\",\"answer_four_points\":\"0\",\"answer_five\":\"\",\"answer_five_points\":\"0\",\"answer_six\":\"\",\"answer_six_points\":\"0\",\"correct_answer\":\"0\",\"question_answer_info\":\"\",\"comments\":\"1\",\"hints\":\"\",\"question_order\":\"0\",\"question_type\":\"0\",\"question_type_new\":\"0\",\"question_settings\":\"a:13:{s:14:\\\"question_title\\\";s:10:\\\"Question 5\\\";s:8:\\\"required\\\";i:0;s:12:\\\"answerEditor\\\";s:4:\\\"text\\\";s:15:\\\"featureImageSrc\\\";s:0:\\\"\\\";s:11:\\\"matchAnswer\\\";s:6:\\\"random\\\";s:14:\\\"case_sensitive\\\";s:0:\\\"\\\";s:14:\\\"answer_columns\\\";s:0:\\\"\\\";s:16:\\\"image_size-width\\\";s:0:\\\"\\\";s:17:\\\"image_size-height\\\";s:0:\\\"\\\";s:8:\\\"autofill\\\";s:0:\\\"\\\";s:23:\\\"limit_multiple_response\\\";s:0:\\\"\\\";s:17:\\\"file_upload_limit\\\";s:0:\\\"\\\";s:16:\\\"file_upload_type\\\";s:0:\\\"\\\";}\",\"category\":\"\",\"linked_question\":\"\",\"deleted\":\"0\",\"deleted_question_bank\":\"0\",\"answers\":[{\"0\":\"Routine Activity Theory\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"General Strain Theory\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Rational Choice Theory\",\"1\":\"\",\"2\":\"1\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Neutralisation Theory\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"}]},\"127\":{\"question_id\":\"127\",\"quiz_id\":\"11\",\"question_name\":\"If an individual justifies digital piracy by indicating that they are not actually harming the victim, they are demonstrating the occurrence of:\",\"answer_array\":\"a:4:{i:0;a:5:{i:0;s:16:\\\"A neutralisation\\\";i:1;s:0:\\\"\\\";i:2;s:1:\\\"1\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:1;a:5:{i:0;s:22:\\\"Rational Choice Theory\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:2;a:5:{i:0;s:23:\\\"Routine Activity Theory\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:3;a:5:{i:0;s:14:\\\"Peer influence\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}}\",\"answer_one\":\"\",\"answer_one_points\":\"0\",\"answer_two\":\"\",\"answer_two_points\":\"0\",\"answer_three\":\"\",\"answer_three_points\":\"0\",\"answer_four\":\"\",\"answer_four_points\":\"0\",\"answer_five\":\"\",\"answer_five_points\":\"0\",\"answer_six\":\"\",\"answer_six_points\":\"0\",\"correct_answer\":\"0\",\"question_answer_info\":\"\",\"comments\":\"1\",\"hints\":\"\",\"question_order\":\"0\",\"question_type\":\"0\",\"question_type_new\":\"0\",\"question_settings\":\"a:13:{s:14:\\\"question_title\\\";s:10:\\\"Question 6\\\";s:8:\\\"required\\\";i:0;s:12:\\\"answerEditor\\\";s:4:\\\"text\\\";s:15:\\\"featureImageSrc\\\";s:0:\\\"\\\";s:11:\\\"matchAnswer\\\";s:6:\\\"random\\\";s:14:\\\"case_sensitive\\\";s:0:\\\"\\\";s:14:\\\"answer_columns\\\";s:0:\\\"\\\";s:16:\\\"image_size-width\\\";s:0:\\\"\\\";s:17:\\\"image_size-height\\\";s:0:\\\"\\\";s:8:\\\"autofill\\\";s:0:\\\"\\\";s:23:\\\"limit_multiple_response\\\";s:0:\\\"\\\";s:17:\\\"file_upload_limit\\\";s:0:\\\"\\\";s:16:\\\"file_upload_type\\\";s:0:\\\"\\\";}\",\"category\":\"\",\"linked_question\":\"\",\"deleted\":\"0\",\"deleted_question_bank\":\"0\",\"answers\":[{\"0\":\"A neutralisation\",\"1\":\"\",\"2\":\"1\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Rational Choice Theory\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Routine Activity Theory\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Peer influence\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"}]},\"128\":{\"question_id\":\"128\",\"quiz_id\":\"11\",\"question_name\":\"Which of the following is not identified in Routine Activity Theory as an element which is required to be present for crime to occur?\",\"answer_array\":\"a:4:{i:0;a:5:{i:0;s:14:\\\"Peer influence\\\";i:1;s:0:\\\"\\\";i:2;s:1:\\\"1\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:1;a:5:{i:0;s:18:\\\"Motivated offender\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:2;a:5:{i:0;s:15:\\\"Suitable target\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:3;a:5:{i:0;s:20:\\\"Absence of guardians\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}}\",\"answer_one\":\"\",\"answer_one_points\":\"0\",\"answer_two\":\"\",\"answer_two_points\":\"0\",\"answer_three\":\"\",\"answer_three_points\":\"0\",\"answer_four\":\"\",\"answer_four_points\":\"0\",\"answer_five\":\"\",\"answer_five_points\":\"0\",\"answer_six\":\"\",\"answer_six_points\":\"0\",\"correct_answer\":\"0\",\"question_answer_info\":\"\",\"comments\":\"1\",\"hints\":\"\",\"question_order\":\"0\",\"question_type\":\"0\",\"question_type_new\":\"0\",\"question_settings\":\"a:13:{s:14:\\\"question_title\\\";s:10:\\\"Question 7\\\";s:8:\\\"required\\\";i:0;s:12:\\\"answerEditor\\\";s:4:\\\"text\\\";s:15:\\\"featureImageSrc\\\";s:0:\\\"\\\";s:11:\\\"matchAnswer\\\";s:6:\\\"random\\\";s:14:\\\"case_sensitive\\\";s:0:\\\"\\\";s:14:\\\"answer_columns\\\";s:0:\\\"\\\";s:16:\\\"image_size-width\\\";s:0:\\\"\\\";s:17:\\\"image_size-height\\\";s:0:\\\"\\\";s:8:\\\"autofill\\\";s:0:\\\"\\\";s:23:\\\"limit_multiple_response\\\";s:0:\\\"\\\";s:17:\\\"file_upload_limit\\\";s:0:\\\"\\\";s:16:\\\"file_upload_type\\\";s:0:\\\"\\\";}\",\"category\":\"\",\"linked_question\":\"\",\"deleted\":\"0\",\"deleted_question_bank\":\"0\",\"answers\":[{\"0\":\"Peer influence\",\"1\":\"\",\"2\":\"1\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Motivated offender\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Suitable target\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Absence of guardians\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"}]},\"129\":{\"question_id\":\"129\",\"quiz_id\":\"11\",\"question_name\":\"A phenomenon similar to neutralisations which is often demonstrated by child predators and collectors\\\/distributors of explicit images containing children is called:\",\"answer_array\":\"a:4:{i:0;a:5:{i:0;s:20:\\\"Cognitive sympathies\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:1;a:5:{i:0;s:21:\\\"Cognitive distortions\\\";i:1;s:0:\\\"\\\";i:2;s:1:\\\"1\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:2;a:5:{i:0;s:22:\\\"Cognitive enhancements\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:3;a:5:{i:0;s:19:\\\"Cognitive relations\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}}\",\"answer_one\":\"\",\"answer_one_points\":\"0\",\"answer_two\":\"\",\"answer_two_points\":\"0\",\"answer_three\":\"\",\"answer_three_points\":\"0\",\"answer_four\":\"\",\"answer_four_points\":\"0\",\"answer_five\":\"\",\"answer_five_points\":\"0\",\"answer_six\":\"\",\"answer_six_points\":\"0\",\"correct_answer\":\"0\",\"question_answer_info\":\"\",\"comments\":\"1\",\"hints\":\"\",\"question_order\":\"0\",\"question_type\":\"0\",\"question_type_new\":\"0\",\"question_settings\":\"a:13:{s:14:\\\"question_title\\\";s:10:\\\"Question 8\\\";s:8:\\\"required\\\";i:0;s:12:\\\"answerEditor\\\";s:4:\\\"text\\\";s:15:\\\"featureImageSrc\\\";s:0:\\\"\\\";s:11:\\\"matchAnswer\\\";s:6:\\\"random\\\";s:14:\\\"case_sensitive\\\";s:0:\\\"\\\";s:14:\\\"answer_columns\\\";s:0:\\\"\\\";s:16:\\\"image_size-width\\\";s:0:\\\"\\\";s:17:\\\"image_size-height\\\";s:0:\\\"\\\";s:8:\\\"autofill\\\";s:0:\\\"\\\";s:23:\\\"limit_multiple_response\\\";s:0:\\\"\\\";s:17:\\\"file_upload_limit\\\";s:0:\\\"\\\";s:16:\\\"file_upload_type\\\";s:0:\\\"\\\";}\",\"category\":\"\",\"linked_question\":\"\",\"deleted\":\"0\",\"deleted_question_bank\":\"0\",\"answers\":[{\"0\":\"Cognitive sympathies\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Cognitive distortions\",\"1\":\"\",\"2\":\"1\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Cognitive enhancements\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Cognitive relations\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"}]},\"130\":{\"question_id\":\"130\",\"quiz_id\":\"11\",\"question_name\":\"A type of malware which disables access to files and makes a request for money in order to access them again is called:\",\"answer_array\":\"a:4:{i:0;a:5:{i:0;s:6:\\\"Botnet\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:1;a:5:{i:0;s:7:\\\"Spyware\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:2;a:5:{i:0;s:10:\\\"Ransomware\\\";i:1;s:0:\\\"\\\";i:2;s:1:\\\"1\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:3;a:5:{i:0;s:8:\\\"Phishing\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}}\",\"answer_one\":\"\",\"answer_one_points\":\"0\",\"answer_two\":\"\",\"answer_two_points\":\"0\",\"answer_three\":\"\",\"answer_three_points\":\"0\",\"answer_four\":\"\",\"answer_four_points\":\"0\",\"answer_five\":\"\",\"answer_five_points\":\"0\",\"answer_six\":\"\",\"answer_six_points\":\"0\",\"correct_answer\":\"0\",\"question_answer_info\":\"\",\"comments\":\"1\",\"hints\":\"\",\"question_order\":\"0\",\"question_type\":\"0\",\"question_type_new\":\"0\",\"question_settings\":\"a:13:{s:14:\\\"question_title\\\";s:10:\\\"Question 9\\\";s:8:\\\"required\\\";i:0;s:12:\\\"answerEditor\\\";s:4:\\\"text\\\";s:15:\\\"featureImageSrc\\\";s:0:\\\"\\\";s:11:\\\"matchAnswer\\\";s:6:\\\"random\\\";s:14:\\\"case_sensitive\\\";s:0:\\\"\\\";s:14:\\\"answer_columns\\\";s:0:\\\"\\\";s:16:\\\"image_size-width\\\";s:0:\\\"\\\";s:17:\\\"image_size-height\\\";s:0:\\\"\\\";s:8:\\\"autofill\\\";s:0:\\\"\\\";s:23:\\\"limit_multiple_response\\\";s:0:\\\"\\\";s:17:\\\"file_upload_limit\\\";s:0:\\\"\\\";s:16:\\\"file_upload_type\\\";s:0:\\\"\\\";}\",\"category\":\"\",\"linked_question\":\"\",\"deleted\":\"0\",\"deleted_question_bank\":\"0\",\"answers\":[{\"0\":\"Botnet\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Spyware\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Ransomware\",\"1\":\"\",\"2\":\"1\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Phishing\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"}]},\"131\":{\"question_id\":\"131\",\"quiz_id\":\"11\",\"question_name\":\"General Strain Theory\\\\' was developed by:\",\"answer_array\":\"a:4:{i:0;a:5:{i:0;s:6:\\\"Canter\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:1;a:5:{i:0;s:5:\\\"Agnew\\\";i:1;s:0:\\\"\\\";i:2;s:1:\\\"1\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:2;a:5:{i:0;s:16:\\\"Cohen and Felson\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}i:3;a:5:{i:0;s:7:\\\"Eysenck\\\";i:1;s:0:\\\"\\\";i:2;s:0:\\\"\\\";i:3;s:0:\\\"\\\";s:5:\\\"label\\\";s:0:\\\"\\\";}}\",\"answer_one\":\"\",\"answer_one_points\":\"0\",\"answer_two\":\"\",\"answer_two_points\":\"0\",\"answer_three\":\"\",\"answer_three_points\":\"0\",\"answer_four\":\"\",\"answer_four_points\":\"0\",\"answer_five\":\"\",\"answer_five_points\":\"0\",\"answer_six\":\"\",\"answer_six_points\":\"0\",\"correct_answer\":\"0\",\"question_answer_info\":\"\",\"comments\":\"1\",\"hints\":\"\",\"question_order\":\"0\",\"question_type\":\"0\",\"question_type_new\":\"0\",\"question_settings\":\"a:13:{s:14:\\\"question_title\\\";s:11:\\\"Question 10\\\";s:8:\\\"required\\\";i:0;s:12:\\\"answerEditor\\\";s:4:\\\"text\\\";s:15:\\\"featureImageSrc\\\";s:0:\\\"\\\";s:11:\\\"matchAnswer\\\";s:6:\\\"random\\\";s:14:\\\"case_sensitive\\\";s:0:\\\"\\\";s:14:\\\"answer_columns\\\";s:0:\\\"\\\";s:16:\\\"image_size-width\\\";s:0:\\\"\\\";s:17:\\\"image_size-height\\\";s:0:\\\"\\\";s:8:\\\"autofill\\\";s:0:\\\"\\\";s:23:\\\"limit_multiple_response\\\";s:0:\\\"\\\";s:17:\\\"file_upload_limit\\\";s:0:\\\"\\\";s:16:\\\"file_upload_type\\\";s:0:\\\"\\\";}\",\"category\":\"\",\"linked_question\":\"\",\"deleted\":\"0\",\"deleted_question_bank\":\"0\",\"answers\":[{\"0\":\"Canter\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Agnew\",\"1\":\"\",\"2\":\"1\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Cohen and Felson\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"},{\"0\":\"Eysenck\",\"1\":\"\",\"2\":\"\",\"3\":\"\",\"label\":\"\"}]}},\"first_page\":false,\"questions_settings\":[]}\n                    <\/script>\t\t<div class='qsm-quiz-container qsm-quiz-container-11 qmn_quiz_container mlw_qmn_quiz qsm_auto_pagination_enabled quiz_theme_default  '>\n\t\t\t\t\t\t\t\t<form name=\"quizForm11\" id=\"quizForm11\" action=\"\/bpscoretextbooks\/wp-json\/wp\/v2\/content\/348\" method=\"POST\" class=\"qsm-quiz-form qmn_quiz_form mlw_quiz_form\" novalidate enctype=\"multipart\/form-data\">\n\t\t\t\t<input type=\"hidden\" name=\"qsm_hidden_questions\" id=\"qsm_hidden_questions\" value=\"\">\n\t\t\t\t<input type=\"hidden\" name=\"qsm_nonce\" id=\"qsm_nonce_11\" value=\"e688678a69\">\n\t\t\t\t<input type=\"hidden\" name=\"qsm_unique_key\" id=\"qsm_unique_key_11\" value=\"69fc9ea7a24fd\">\n\t\t\t\t<div id=\"mlw_error_message\" class=\"qsm-error-message qmn_error_message_section\"><\/div>\n\t\t\t\t<span id=\"mlw_top_of_quiz\"><\/span>\n\t\t\t\t\t\t\t\t\t<div class=\"qsm-auto-page-row qsm-question-page qsm-apc-1\" data-apid=\"1\" data-qpid=\"1\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t<div class=\"quiz_section qsm-question-wrapper question-type-0  question-section-id-122 slide0 \">\n\t\t\t\t\t\t<div class='mlw_qmn_new_question'>Question 1 <\/div>\n\t\t\t<div class='mlw_qmn_question  qsm_remove_bold' >\n\t\t<p>Which of the following is an example of an Internet-specific crime?<\/p>\n\t<\/div>\n\t\t<fieldset>\n\t\t<legend><\/legend>\n\t<div class='qmn_radio_answers mlwRequiredRadio'>\n\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question122-1 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question122\" id=\"question122_1\" value=\"0\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question122_1\">\n\t\t\t\t\tMalware distribution\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question122-2 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question122\" id=\"question122_2\" value=\"1\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question122_2\">\n\t\t\t\t\tIdentity theft\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question122-3 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question122\" id=\"question122_3\" value=\"2\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question122_3\">\n\t\t\t\t\tFraud\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question122-4 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question122\" id=\"question122_4\" value=\"3\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question122_4\">\n\t\t\t\t\tCopyright infringement\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t \t\t\t<label style=\"display: none !important;\" for=\"question122_none\">None<\/label>\n\t\t\t<input type=\"radio\" style=\"display: none;\" name=\"question122\" id=\"question122_none\" checked=\"checked\" value=\"\" \/>\n\t\t\t\t<\/div>\n\t<\/fieldset>\n\t<input type=\"hidden\" name=\"answer_limit_keys_122\" value=\"\" \/>\n\t\t\t\t<\/div><!-- .quiz_section -->\n\t\t\t\t\t\t\t\t<\/div><!-- .qsm-auto-page-row -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"qsm-auto-page-row qsm-question-page qsm-apc-2\" data-apid=\"2\" data-qpid=\"2\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t<div class=\"quiz_section qsm-question-wrapper question-type-0  question-section-id-123 slide1 \">\n\t\t\t\t\t\t<div class='mlw_qmn_new_question'>Question 2 <\/div>\n\t\t\t<div class='mlw_qmn_question  qsm_remove_bold' >\n\t\t<p>Many researchers and authors feel that the term \u2018child pornography\u2019 implies consent, and instead use which of the following terms?<\/p>\n\t<\/div>\n\t\t<fieldset>\n\t\t<legend><\/legend>\n\t<div class='qmn_radio_answers mlwRequiredRadio'>\n\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question123-1 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question123\" id=\"question123_1\" value=\"0\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question123_1\">\n\t\t\t\t\tChild explicit material\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question123-2 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question123\" id=\"question123_2\" value=\"1\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question123_2\">\n\t\t\t\t\tChild exhibition material\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question123-3 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question123\" id=\"question123_3\" value=\"2\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question123_3\">\n\t\t\t\t\tChild exposure material\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question123-4 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question123\" id=\"question123_4\" value=\"3\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question123_4\">\n\t\t\t\t\tChild exploitation material\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t \t\t\t<label style=\"display: none !important;\" for=\"question123_none\">None<\/label>\n\t\t\t<input type=\"radio\" style=\"display: none;\" name=\"question123\" id=\"question123_none\" checked=\"checked\" value=\"\" \/>\n\t\t\t\t<\/div>\n\t<\/fieldset>\n\t<input type=\"hidden\" name=\"answer_limit_keys_123\" value=\"\" \/>\n\t\t\t\t<\/div><!-- .quiz_section -->\n\t\t\t\t\t\t\t\t<\/div><!-- .qsm-auto-page-row -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"qsm-auto-page-row qsm-question-page qsm-apc-3\" data-apid=\"3\" data-qpid=\"3\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t<div class=\"quiz_section qsm-question-wrapper question-type-0  question-section-id-124 slide2 \">\n\t\t\t\t\t\t<div class='mlw_qmn_new_question'>Question 3 <\/div>\n\t\t\t<div class='mlw_qmn_question  qsm_remove_bold' >\n\t\t<p>Which of the following was not a typology of crime suggested by David Wall?<\/p>\n\t<\/div>\n\t\t<fieldset>\n\t\t<legend><\/legend>\n\t<div class='qmn_radio_answers mlwRequiredRadio'>\n\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question124-1 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question124\" id=\"question124_1\" value=\"0\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question124_1\">\n\t\t\t\t\tCyber-deceptions\/thefts\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question124-2 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question124\" id=\"question124_2\" value=\"1\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question124_2\">\n\t\t\t\t\tComputer integrity crimes\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question124-3 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question124\" id=\"question124_3\" value=\"2\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question124_3\">\n\t\t\t\t\tComputer content crimes\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question124-4 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question124\" id=\"question124_4\" value=\"3\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question124_4\">\n\t\t\t\t\tInternet enabled offences\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t \t\t\t<label style=\"display: none !important;\" for=\"question124_none\">None<\/label>\n\t\t\t<input type=\"radio\" style=\"display: none;\" name=\"question124\" id=\"question124_none\" checked=\"checked\" value=\"\" \/>\n\t\t\t\t<\/div>\n\t<\/fieldset>\n\t<input type=\"hidden\" name=\"answer_limit_keys_124\" value=\"\" \/>\n\t\t\t\t<\/div><!-- .quiz_section -->\n\t\t\t\t\t\t\t\t<\/div><!-- .qsm-auto-page-row -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"qsm-auto-page-row qsm-question-page qsm-apc-4\" data-apid=\"4\" data-qpid=\"4\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t<div class=\"quiz_section qsm-question-wrapper question-type-0  question-section-id-125 slide3 \">\n\t\t\t\t\t\t<div class='mlw_qmn_new_question'>Question 4 <\/div>\n\t\t\t<div class='mlw_qmn_question  qsm_remove_bold' >\n\t\t<p>Which of David Wall\u2019s typologies includes the offence of hate speech?<\/p>\n\t<\/div>\n\t\t<fieldset>\n\t\t<legend><\/legend>\n\t<div class='qmn_radio_answers mlwRequiredRadio'>\n\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question125-1 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question125\" id=\"question125_1\" value=\"0\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question125_1\">\n\t\t\t\t\tCyber-violence\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question125-2 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question125\" id=\"question125_2\" value=\"1\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question125_2\">\n\t\t\t\t\tCyber-trespass\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question125-3 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question125\" id=\"question125_3\" value=\"2\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question125_3\">\n\t\t\t\t\tCyber-deceptions\/thefts\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question125-4 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question125\" id=\"question125_4\" value=\"3\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question125_4\">\n\t\t\t\t\tCyber-pornography\/obscenity\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t \t\t\t<label style=\"display: none !important;\" for=\"question125_none\">None<\/label>\n\t\t\t<input type=\"radio\" style=\"display: none;\" name=\"question125\" id=\"question125_none\" checked=\"checked\" value=\"\" \/>\n\t\t\t\t<\/div>\n\t<\/fieldset>\n\t<input type=\"hidden\" name=\"answer_limit_keys_125\" value=\"\" \/>\n\t\t\t\t<\/div><!-- .quiz_section -->\n\t\t\t\t\t\t\t\t<\/div><!-- .qsm-auto-page-row -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"qsm-auto-page-row qsm-question-page qsm-apc-5\" data-apid=\"5\" data-qpid=\"5\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t<div class=\"quiz_section qsm-question-wrapper question-type-0  question-section-id-126 slide4 \">\n\t\t\t\t\t\t<div class='mlw_qmn_new_question'>Question 5 <\/div>\n\t\t\t<div class='mlw_qmn_question  qsm_remove_bold' >\n\t\t<p>Which theory of crime attempts to explain crime in terms of criminal decision making given the possibilities of reward and punishment?<\/p>\n\t<\/div>\n\t\t<fieldset>\n\t\t<legend><\/legend>\n\t<div class='qmn_radio_answers mlwRequiredRadio'>\n\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question126-1 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question126\" id=\"question126_1\" value=\"0\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question126_1\">\n\t\t\t\t\tRoutine Activity Theory\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question126-2 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question126\" id=\"question126_2\" value=\"1\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question126_2\">\n\t\t\t\t\tGeneral Strain Theory\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question126-3 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question126\" id=\"question126_3\" value=\"2\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question126_3\">\n\t\t\t\t\tRational Choice Theory\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question126-4 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question126\" id=\"question126_4\" value=\"3\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question126_4\">\n\t\t\t\t\tNeutralisation Theory\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t \t\t\t<label style=\"display: none !important;\" for=\"question126_none\">None<\/label>\n\t\t\t<input type=\"radio\" style=\"display: none;\" name=\"question126\" id=\"question126_none\" checked=\"checked\" value=\"\" \/>\n\t\t\t\t<\/div>\n\t<\/fieldset>\n\t<input type=\"hidden\" name=\"answer_limit_keys_126\" value=\"\" \/>\n\t\t\t\t<\/div><!-- .quiz_section -->\n\t\t\t\t\t\t\t\t<\/div><!-- .qsm-auto-page-row -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"qsm-auto-page-row qsm-question-page qsm-apc-6\" data-apid=\"6\" data-qpid=\"6\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t<div class=\"quiz_section qsm-question-wrapper question-type-0  question-section-id-127 slide5 \">\n\t\t\t\t\t\t<div class='mlw_qmn_new_question'>Question 6 <\/div>\n\t\t\t<div class='mlw_qmn_question  qsm_remove_bold' >\n\t\t<p>If an individual justifies digital piracy by indicating that they are not actually harming the victim, they are demonstrating the occurrence of:<\/p>\n\t<\/div>\n\t\t<fieldset>\n\t\t<legend><\/legend>\n\t<div class='qmn_radio_answers mlwRequiredRadio'>\n\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question127-1 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question127\" id=\"question127_1\" value=\"0\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question127_1\">\n\t\t\t\t\tA neutralisation\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question127-2 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question127\" id=\"question127_2\" value=\"1\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question127_2\">\n\t\t\t\t\tRational Choice Theory\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question127-3 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question127\" id=\"question127_3\" value=\"2\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question127_3\">\n\t\t\t\t\tRoutine Activity Theory\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question127-4 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question127\" id=\"question127_4\" value=\"3\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question127_4\">\n\t\t\t\t\tPeer influence\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t \t\t\t<label style=\"display: none !important;\" for=\"question127_none\">None<\/label>\n\t\t\t<input type=\"radio\" style=\"display: none;\" name=\"question127\" id=\"question127_none\" checked=\"checked\" value=\"\" \/>\n\t\t\t\t<\/div>\n\t<\/fieldset>\n\t<input type=\"hidden\" name=\"answer_limit_keys_127\" value=\"\" \/>\n\t\t\t\t<\/div><!-- .quiz_section -->\n\t\t\t\t\t\t\t\t<\/div><!-- .qsm-auto-page-row -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"qsm-auto-page-row qsm-question-page qsm-apc-7\" data-apid=\"7\" data-qpid=\"7\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t<div class=\"quiz_section qsm-question-wrapper question-type-0  question-section-id-128 slide6 \">\n\t\t\t\t\t\t<div class='mlw_qmn_new_question'>Question 7 <\/div>\n\t\t\t<div class='mlw_qmn_question  qsm_remove_bold' >\n\t\t<p>Which of the following is not identified in Routine Activity Theory as an element which is required to be present for crime to occur?<\/p>\n\t<\/div>\n\t\t<fieldset>\n\t\t<legend><\/legend>\n\t<div class='qmn_radio_answers mlwRequiredRadio'>\n\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question128-1 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question128\" id=\"question128_1\" value=\"0\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question128_1\">\n\t\t\t\t\tPeer influence\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question128-2 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question128\" id=\"question128_2\" value=\"1\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question128_2\">\n\t\t\t\t\tMotivated offender\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question128-3 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question128\" id=\"question128_3\" value=\"2\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question128_3\">\n\t\t\t\t\tSuitable target\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question128-4 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question128\" id=\"question128_4\" value=\"3\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question128_4\">\n\t\t\t\t\tAbsence of guardians\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t \t\t\t<label style=\"display: none !important;\" for=\"question128_none\">None<\/label>\n\t\t\t<input type=\"radio\" style=\"display: none;\" name=\"question128\" id=\"question128_none\" checked=\"checked\" value=\"\" \/>\n\t\t\t\t<\/div>\n\t<\/fieldset>\n\t<input type=\"hidden\" name=\"answer_limit_keys_128\" value=\"\" \/>\n\t\t\t\t<\/div><!-- .quiz_section -->\n\t\t\t\t\t\t\t\t<\/div><!-- .qsm-auto-page-row -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"qsm-auto-page-row qsm-question-page qsm-apc-8\" data-apid=\"8\" data-qpid=\"8\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t<div class=\"quiz_section qsm-question-wrapper question-type-0  question-section-id-129 slide7 \">\n\t\t\t\t\t\t<div class='mlw_qmn_new_question'>Question 8 <\/div>\n\t\t\t<div class='mlw_qmn_question  qsm_remove_bold' >\n\t\t<p>A phenomenon similar to neutralisations which is often demonstrated by child predators and collectors\/distributors of explicit images containing children is called:<\/p>\n\t<\/div>\n\t\t<fieldset>\n\t\t<legend><\/legend>\n\t<div class='qmn_radio_answers mlwRequiredRadio'>\n\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question129-1 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question129\" id=\"question129_1\" value=\"0\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question129_1\">\n\t\t\t\t\tCognitive sympathies\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question129-2 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question129\" id=\"question129_2\" value=\"1\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question129_2\">\n\t\t\t\t\tCognitive distortions\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question129-3 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question129\" id=\"question129_3\" value=\"2\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question129_3\">\n\t\t\t\t\tCognitive enhancements\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question129-4 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question129\" id=\"question129_4\" value=\"3\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question129_4\">\n\t\t\t\t\tCognitive relations\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t \t\t\t<label style=\"display: none !important;\" for=\"question129_none\">None<\/label>\n\t\t\t<input type=\"radio\" style=\"display: none;\" name=\"question129\" id=\"question129_none\" checked=\"checked\" value=\"\" \/>\n\t\t\t\t<\/div>\n\t<\/fieldset>\n\t<input type=\"hidden\" name=\"answer_limit_keys_129\" value=\"\" \/>\n\t\t\t\t<\/div><!-- .quiz_section -->\n\t\t\t\t\t\t\t\t<\/div><!-- .qsm-auto-page-row -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"qsm-auto-page-row qsm-question-page qsm-apc-9\" data-apid=\"9\" data-qpid=\"9\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t<div class=\"quiz_section qsm-question-wrapper question-type-0  question-section-id-130 slide8 \">\n\t\t\t\t\t\t<div class='mlw_qmn_new_question'>Question 9 <\/div>\n\t\t\t<div class='mlw_qmn_question  qsm_remove_bold' >\n\t\t<p>A type of malware which disables access to files and makes a request for money in order to access them again is called:<\/p>\n\t<\/div>\n\t\t<fieldset>\n\t\t<legend><\/legend>\n\t<div class='qmn_radio_answers mlwRequiredRadio'>\n\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question130-1 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question130\" id=\"question130_1\" value=\"0\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question130_1\">\n\t\t\t\t\tBotnet\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question130-2 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question130\" id=\"question130_2\" value=\"1\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question130_2\">\n\t\t\t\t\tSpyware\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question130-3 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question130\" id=\"question130_3\" value=\"2\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question130_3\">\n\t\t\t\t\tRansomware\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question130-4 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question130\" id=\"question130_4\" value=\"3\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question130_4\">\n\t\t\t\t\tPhishing\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t \t\t\t<label style=\"display: none !important;\" for=\"question130_none\">None<\/label>\n\t\t\t<input type=\"radio\" style=\"display: none;\" name=\"question130\" id=\"question130_none\" checked=\"checked\" value=\"\" \/>\n\t\t\t\t<\/div>\n\t<\/fieldset>\n\t<input type=\"hidden\" name=\"answer_limit_keys_130\" value=\"\" \/>\n\t\t\t\t<\/div><!-- .quiz_section -->\n\t\t\t\t\t\t\t\t<\/div><!-- .qsm-auto-page-row -->\n\t\t\t\t\t\t\t\t\t\t<div class=\"qsm-auto-page-row qsm-question-page qsm-apc-10\" data-apid=\"10\" data-qpid=\"10\" style=\"display: none;\">\n\t\t\t\t\t\t\t\t<div class=\"quiz_section qsm-question-wrapper question-type-0  question-section-id-131 slide9 \">\n\t\t\t\t\t\t<div class='mlw_qmn_new_question'>Question 10 <\/div>\n\t\t\t<div class='mlw_qmn_question  qsm_remove_bold' >\n\t\t<p>General Strain Theory\\' was developed by:<\/p>\n\t<\/div>\n\t\t<fieldset>\n\t\t<legend><\/legend>\n\t<div class='qmn_radio_answers mlwRequiredRadio'>\n\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question131-1 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question131\" id=\"question131_1\" value=\"0\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question131_1\">\n\t\t\t\t\tCanter\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question131-2 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question131\" id=\"question131_2\" value=\"1\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question131_2\">\n\t\t\t\t\tAgnew\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question131-3 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question131\" id=\"question131_3\" value=\"2\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question131_3\">\n\t\t\t\t\tCohen and Felson\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"qmn_mc_answer_wrap  mrq_checkbox_class\" id=\"question131-4 \">\n\t\t\t\t\t\t\t\t\t\t\t<input type='radio' class='qmn_quiz_radio qmn-multiple-choice-input ' name=\"question131\" id=\"question131_4\" value=\"3\" \/>\n\t\t\t\t\t<label class=\"qsm-input-label\" for=\"question131_4\">\n\t\t\t\t\tEysenck\t\t\t\t\t<\/label>\n\t\t\t\t\t \t\t\t\t<\/div>\n\t\t\t\t\t \t\t\t<label style=\"display: none !important;\" for=\"question131_none\">None<\/label>\n\t\t\t<input type=\"radio\" style=\"display: none;\" name=\"question131\" id=\"question131_none\" checked=\"checked\" value=\"\" \/>\n\t\t\t\t<\/div>\n\t<\/fieldset>\n\t<input type=\"hidden\" name=\"answer_limit_keys_131\" value=\"\" \/>\n\t\t\t\t<\/div><!-- .quiz_section -->\n\t\t\t\t\t\t\t\t<\/div><!-- .qsm-auto-page-row -->\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"qmn_question_list\" value=\"122Q123Q124Q125Q126Q127Q128Q129Q130Q131Q\" \/>\n\t\t\t\t\t<div class=\"qsm-auto-page-row quiz_section quiz_end empty_quiz_end qsm-d-none\" >\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div id=\"mlw_error_message_bottom\" class=\"qsm-error-message qmn_error_message_section\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"qmn_all_questions_count\" id=\"qmn_all_questions_count\" value=\"10\" \/>\n\t\t\t\t\t<input type=\"hidden\" name=\"total_questions\" id=\"total_questions\" value=\"10\" \/>\n\t\t\t\t\t<input type=\"hidden\" name=\"timer\" id=\"timer\" value=\"0\" \/>\n\t\t\t\t\t<input type=\"hidden\" name=\"timer_ms\" id=\"timer_ms\" value=\"0\"\/>\n\t\t\t\t\t<input type=\"hidden\" class=\"qmn_quiz_id\" name=\"qmn_quiz_id\" id=\"qmn_quiz_id\" value=\"11\" \/>\n\t\t\t\t\t<input type='hidden' name='complete_quiz' value='confirmation' \/>\n\t\t\t\t\t\t\t\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t<div style=\"display: none;\" class=\"qsm-popup qsm-popup-slide\" id=\"modal-4\" aria-hidden=\"false\"><div class=\"qsm-popup__overlay\" tabindex=\"-1\" data-micromodal-close=\"\"><div class=\"qsm-popup__container qmn_quiz_container\" role=\"dialog\" aria-modal=\"true\"><div class=\"qsm-popup__content\"><img decoding=\"async\" src=\"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/wp-content\/plugins\/quiz-master-next\/assets\/clock.png\" alt=\"clock.png\"\/><p class=\"qsm-time-up-text\"> Time's up<\/p><\/div><footer class=\"qsm-popup__footer\"><button class=\"qsm-popup-secondary-button qmn_btn\" data-micromodal-close=\"\" aria-label=\"Close this dialog window\" onclick=\"location.reload();\">Cancel<\/button><\/footer><\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Forensic psychology holds huge potential in cybercriminal cases, including in work such as offender rehabilitation, victimology, offender profiling, and crime reduction strategies. It may also be used to help juries and police officers serving in cybercrime cases. This chapter begins with an introduction to the various types of cybercrime and proposed methods of classifying cybercrime. [&hellip;]<\/p>\n","protected":false},"featured_media":0,"parent":0,"menu_order":0,"template":"single-chapter","format":"standard","meta":{"_acf_changed":false},"categories":[1],"content-type":[34],"parent-book":[40],"resource-type":[32],"class_list":["post-348","content","type-content","status-publish","format-standard","hentry","category-uncategorized","content-type-chapter","parent-book-40","resource-type-chapter"],"acf":{"linked_book":""},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/wp-json\/wp\/v2\/content\/348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/wp-json\/wp\/v2\/content"}],"about":[{"href":"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/wp-json\/wp\/v2\/types\/content"}],"wp:attachment":[{"href":"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/wp-json\/wp\/v2\/media?parent=348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/wp-json\/wp\/v2\/categories?post=348"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/wp-json\/wp\/v2\/content-type?post=348"},{"taxonomy":"parent-book","embeddable":true,"href":"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/wp-json\/wp\/v2\/parent-book?post=348"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/staging.routledgelearning.com\/bpscoretextbooks\/wp-json\/wp\/v2\/resource-type?post=348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}