Answer:
suggestibility
Explanation:
Based on the scenario being described within the question it can be said that this is an example of the term known as suggestibility. This term refers to the quality of an individual describing their inclination to accept and act on the suggestions or opinions of those around them. Such as in this case since the police officers mentioned that the girl had a blue shirt , is gave Alex the inclination to believe the girl was actually wearing a blue shirt when testifying.
The crime category is called crimes of omission.
Crimes of omission is an offence that is categorized by<em> a person's failing to perform an act that is required or is seen as that person's legal duty. </em>
Some examples of crimes of omissions are child neglect, manslaughter by gross negligence and failure to disclosure terrorists acts.
Another example: a person who is aware of a dangerous situation such as a house on fire in progress, can face criminal charges for not notifying authorities.
The actions that Susan made are clearly an irruption to someone’s privacy. With that said, basically, Susan is a person whose abilities allow her to meddle into someone’s business without their permission. This is what people usually call as “privacy violation” since the person who is stealing someone’s information is doing it without them to know.
Hacking is a very common activity nowadays. There are some apps and tools that facilitate this kind of task,s for hackers. Sometimes they have their own hacking software but it is pretty common to do it throughout programming.
The problem with this kind of activities is that it is a moral dilemma since it is a cybernetic felony that send people to jail and sometimes they also have to pay a bail in order to not to go to prison if they are discovered and caught. In the worst scenery, people that commit this type of crimes, are both convicted and forced to pay the bail.
Most of the time, people or enterprises are hacked because their system is very vulnerable so that makes it really easy to hack. This is one of the reasons for the new type of security that is being implemented in people’s computers in order to avoid this type of misfortunes that currently affect many people around the world.
To summarize, Susan’s occupation can be described as a chain of risky activities that she has to do in order to avoid being discovered by the person she attacked; so that, she always must be very careful to not let any trace behind her actions.
With his parents, Joel was employing the door-in-the-face compliance technique.
A compliance tactic that is frequently researched in social psychology is the door-in-the-face approach. The persuader makes a sizable request that the respondent will probably reject in an effort to get them to agree, kind of like metaphorically slamming a door in the persuader's face.
In the door-in-the-face method, compliance is improved by making an incredibly difficult request first, followed by a target request that is genuinely wanted.
An illustration of this would be if you refused a friend's request to borrow an excessive amount of money, only for them to later ask for a lower amount and receive your approval. The door-in-the-face tactic is frequently employed to get individuals to make a financial contribution.
To learn more about door-in-the-face technique
brainly.com/question/29380131
#SPJ4