Steve is a computer whiz and uses his computer to access other computers around the world with the intent to steal the identity information of each computer owner. What crime may be charged against Steve?
a. Identity theft
b. Embezzlement
c. Personality theft
d. None of the above
a
You might also like to view...
Fire inspections must be contemporaneous, not several days or weeks after the fire
Indicate whether the statement is true or false
Courts of limited jurisdiction are "limited" in the sense that they cannot try criminal cases
a. True b. False
What most accurately describes the role of genes on victimization?
A. They often interact with the environment to increase exposure to victimization. B. They have no effect on the risk of victimization. C. They have strong, direct effects on victimization. D. They explain the bulk of victimization and work outside the environment.
Which of the following statements regarding the restructuring of the sentencing process in the 1970s is FALSE?
A) Determinate sentencing began to replace indeterminate sentencing. B) Research identified significant sentencing disparity. C) The ideology and practice of rehabilitation was challenged. D) Prisoners began to express their discontent through increased uprisings.