chapter 14

¡Supera tus tareas y exámenes ahora con Quizwiz!

When it comes to white-collar crime, studies show that the cultural norms of one's environment seem to overwhelm university-led ethical training.

True

Prior to the advent of the internet, federal law enforcement believed that ______ was a controllable problem.

child pornography

One of the criteria stipulated to describe ______ crimes was that the offender must belong to the upper-class.

white-collar

The prominent criminologist Edwin Sutherland is famous for coining the term ______.

white-collar crime

Millions of Americans are harmed or killed by corporate crime every year.

True

The potential benefits of white-collar crime greatly reduce the potential deterrent effect of sanctions imposed.

True

Violations of Racketeer Influenced and Corrupt Organizations (RICO) legislation garner a fine and a prison term.

True

White-collar crime causes far more financial damage to society than all other crimes combined.

True

Which Supreme Court decision gave prisoners the right to sue state officials in federal court?

Cooper v. Pate

Which of the following is one of the criteria for Sutherland's definition of white-collar crime?

Crime is work-related.

______ involves obtaining materials that include identity information but are usually disregarded by the true owners of the identity.

Dumpster diving

Which amendment created an opportunity for criminals to increase clout, make profit, and participate in violence?

Eighteenth, which outlawed alcohol

Cybercrime originated during the Industrial Revolution.

False

Cyberstalking is a type of internet fraud.

False

Research has suggested that corporations that get caught and punished are deterred from future violations.

False

Research suggests that deaths caused by corporate crimes are decreasing.

False

Sutherland's original definition argued that white-collar crime was less serious than violent crime.

False

White-collar criminals are more likely than traditional street criminals to be investigated, caught, charged, and convicted.

False

The owner of a large corporation is arrested on charges of intimate partner violence against their spouse. The individual's spouse is also an employee of the corporation. Does this count as white-collar crime?

No, because the violation is not work-related.

Which type of hacker violates computer security out of malice or for personal gain?

black hat

The most common motivation for identity theft is to ______.

commit fraud

Sutherland provided a standardized definition of white-collar crime that experts accept as comprehensive.

false

The terms occupational crime and corporate crime can be used interchangeably.

false

Compared to traditional street criminals, white-collar criminals are ______ likely to be caught, charged, and convicted or sentenced to significant prison time.

far less

In comparison to other types of crime, white-collar crime causes ______ financial damage.

far more

Illegally obtaining someone's personal details in order to carry out transactions in their name is known as ______.

identity theft

A crime enterprise traffics in illegal weapons sales to militias throughout the world. This best exemplifies the activities of ______.

transnational organized crime

Findings on research on white-collar crime suggest that corporate misbehavior is overwhelmingly common.

true

Fines for OSHA violations are usually low relative to the profits being made by the companies.

true

The Electronic Communications Privacy Act regulates the interception of electronic communications by both individuals and the government.

true

White-collar crimes cause more deaths annually than street crime.

true

Organized crime is often defined through a(n) ______.

typology

In Sutherland's criteria for white-collar crime, he requires that crimes be work-related violations committed by what type of offender?

upper-class

When asked why they committed fraud, a white-collar criminal says, "I weighed the pros and cons and realized that there was too much to gain and not much to lose." This statement is most representative of which theoretical perspective on crime?

rational choice

Which criminological theory would explain internet fraud schemes as a method of combating blocked opportunities?

strain

Research has suggested that, of the companies that have been caught engaging in corporate violations, ______ recidivate.

the vast majority

Which of these is an example of a labor violation?

A construction company rotates use of high-vis vests due to shortages.

According to Sutherland's definition, which of the following scenarios represents white-collar crime?

An accountant embezzles company funds.

______ consists of three features: a computer, a victim computer, an intermediary network.

Cybercrime

The organization charged with protecting human health and safeguarding nature is the ______.

Environmental Protection Agency

Which 1950s group was charged with extensively investigating the presence and impact of organized crime?

Kefauver Committee

Which criminal organization rose to prominence in the mid-1800s and required members to take an oath of loyalty on punishment of death?

Mafia

Which of the following groups, dating back to the 1950s, is considered one of the oldest prison gangs in the United States?

Mexican Mafia

The primary legislation developed to investigate labor violations is the ______ Act.

Occupational Safety and Health

Which criminologist acknowledged the need to examine the concept of white-collar crime?

Sutherland

______ coined the term white-collar crime.

Sutherland

Sutherland's study of corporate crime and violations suggested which of the following?

The vast majority of corporations committed more than one offense.

Which organization, formed in 1929, found that organized criminal activity flourished around bootlegging operations?

Wickersham Commission

A hacktivist attempts to get past the computer network protections in place by a corporation that the hacktivist believes is corrupt. In terms of routine activities theory, this attempt at cybercrime best exemplifies ______.

a motivated offender

An offender hacks the social media accounts of several prominent celebrities asking followers to send them large sums of money, which will then be doubled and then returned to the followers. This is an example of which type of cybercrime?

advance-fee fraud

Stealing a victim's credit information and using it to purchase items is known as ______.

carding

According to Sutherland's definition, which of the following offenders would be able to commit white-collar crime?

chief executive officer

Under a social learning perspective, white-collar criminals learn definitions of doing "good" from which of the following populations?

colleagues

A mining company has exhausted the mineral deposits of one of their mines and is going to evacuate the site. The owner of the company instructs its workers to dump the remaining waste materials into the mine before boarding it up. This is an example of what kind of white-collar crime?

crime against the environment

Which type of white-collar crime drastically worsened during the Industrial Revolution due to increased production of toxins?

crimes against the environment

The fact that white-collar crimes are often committed by celebrities or people who are widely admired has what effect?

damages the fabric of society

Which objective Michael does give for dealing drugs?

economic

Which theoretical explanation used to explain organized crime could you apply to Michael's sale of drugs?

enterprise

The President's Commission on Law Enforcement and the Administration of Justice found that ______ was the largest source of revenue for organized crime.

gambling

Which industry arose in Nevada after the Great Depression and attracted organized crime?

gambling

Individuals who violate computer security are referred to as ______.

hackers

Which of the following is an example of cyberstalking?

hacking a person's email address to send hateful personal messages to their contacts

A corner market employs children to stock the shelves as a way of keeping costs low. This is an example of which type of white-collar crime?

labor violation

Which of the following is an example of a crime against the environment?

leakage of oil from underground pipelines

Compared to other types of identity theft, identify theft in which the offender assumes the life of the victim, as illustrated in this case study, is ______.

less common

The Occupational Safety and Health Act (OSHA) made it a(n) ______ to cause the death of a worker by willfully violating safety laws.

misdemeanor

A corporate manager excuses their practice of reporting better-than-average profits by their department by claiming that their employees have been under an excessive amount of stress that year. This best exemplifies ______.

neutralization

The Hell's Angels, the Bandidos, Vagos, Warlocks, and the Pagans are all examples of ______.

outlaw motorcycles gangs

The activities of Tammany Hall during the 19th century were an example of ______.

political corruption

Regardless of whether a company is based in a communistic or a capitalistic country, the goal is always ______.

profit

Just as drug dealing takes advantage of an illegal good that's widely desired, ______ also created an opportunity for criminals to meet the public demand for something that was illegal.

prohibition


Conjuntos de estudio relacionados

Avoiding mortgage and real estate fraud

View Set

TeXes English 7-12 Final Study Set

View Set

Most Common Phrasal Verbs -English Definition

View Set

Microeconomics: Chapter 11 - Perfect Competition

View Set

THE FLOW OF GENETIC INFORMATION FROM DNA TO RNA TO PROTEIN

View Set

Study Island: Experimental Design

View Set