White collar crime final

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

the phrase "cartel-type frauds" used in connection with health care refers to frauds perpetrated by

criminal organizations

federal district judge alcee hastings was impeached and removed from office after

he was acquitted of conspiracy to commit bribery

Boiler rooms with slick telemarketers offered full physicals for little or no fee. This free diagnostic service turned out to be very costly because

information was used to file claims against insurance companies and government insurance

in some instances the equipment is not only nonessential, it is also

overpriced

the worst scandal in a scandal-ridden city occurred in the ___________ of new york city

parking violation bureau

physicians are not the only ones involved in Medicare fraud. Investigators have recently been looking into services offered by

pediatric dentists

one of the five common techniques to annul guilt is denial of the victim where

perpetrators claim that those injured deserved what happened to them

one of the five common techniques to annul guilt is condeming the condemners where

perpetrators claim to be victims

computer crime investigations are dynamic in nature. Therefore, their detection and investigation differ in several respects from that of other more traditional crimes. Choose the statement below that identifies a difference between the two types of crimes

physical evidence in computer crimes is different from that in traditional crimes

officer dale is conducting a computer crime investigation. which action might cause him to lose his computer evidence?

place magnetic tape and disks near stereo speakers and printers

PAC stands for

political action committee

Melvyn Paisley was an assistant secretary of the Navy for six years and was in charge of

procurement

certain industries are distinguished by means and opportunities that are conducive to crime. these factors include all of the following except

public attention on business activities of industry

which of the following government agencies does NOT investigate money laundering schemes

USPS

of the following, the best example of a corporate crime would be

savings and loan fraud

Upcoding is

services designated to that maximum fees can be charged

corporate criminals also cast themselves in characters in the folklore of capitalism. In this myth they are

simply ahead of their time and misunderstood

doctors at a clinic at the University of California-Irvine abused fertility patients in all of the following ways except

terminating pregnancies without patient consent.

Jose uses this money to pay off various lower dealers and suppliers. Jose needs to legitimize his cash proceeds in a fashion that permits him to spend it wherever and whenever he desires without attracting suspicion. What prevents Jose from depositing 20,000 in cash in a bank?

the federal ctr requirement

the nigerian scam involved

a ploy using deceptive emails and stories of sequestered funds

which of the following activities could constitute research fraud

adjusting findings to support grant applications

back door programs

allow entry at will

toll fraud is

avoiding phone charges

Home care is a burgeoning business for scam artists. A company called Professional Care was paid for all of the following except

care for nonexistent patients

What does a currency transactions report require banks to record

cash transactions of 10,000 or more

when some individuals engage in white collar crime, though they are breakign the law, they often ___________ cultural values

conforming to

malicious hacking, affecting national security, has affected all of the following except

congressional committee files

WAREZ sites encourage with of the following activities

copying of copyrighted programs

diffusion accountability is a common byproduct of fiscal irresponsibility. this results in higher interest rates and higher prices for goods and services- consumers pay more. the burden falls disproportionately on

the middle class

Julie goes to the store to buy a new backpack for school and intends to use a credit card to pay for it. what is the only common security measure used on all credit cards?

the signature panel

James Olis, a former director of Dynegy, turned down a plea bargain. Because of the new sentencing guidelines for white-collar criminals the end result of his criminal case was that

the validity of the guidelines was questioned

a gift becomes a bribe when

there is a quid pro quo

an authorized program planted on a computer is known as a

trojan horse

which of the following computer crimes involves the secret placement or alteration of computer instructions so that one computer tells another how to perform illegal functions

trojan horses

Hiring an unskilled relative as a policy analyst would be an example of public corruption

true

Melvyn Paisley was an Assistant Secretary of the navy who was in charge of procurement

true

Michael Bloomberg was the subject of a computer crime. He was asked to pay a sum of money in return for beign advised as to the perpetrator's methods that were used to invade his system. In street crime terms this would be extortion

true

according to robert merton's formulation the standard of material success is not an objective one but exists on a sliding scale

true

coasting along looking for doors to open is a quality of cookbook hackers

true

computer crime offenders can commit computer crimes and destroy evidence with ease

true

computer crime requires a greater amount of technical expertise by investigators and prosecurots and its investigation is likely ot require a considerable investment of time

true

contracts that exceed medicare limits are called overcharging

true

conventional theories of crime have a tautological quality to them. criminality is defined using the same terms as are used for causal factors. the term circular may be substituted for tautological

true

corporate crime is a form of white-collar crime whereby trusted executives working within a company mishandle funds or otherwise betray the trust of customers or other consumers

true

diffusion of accountability is a common byproduct of fiscal irresponsibility

true

double invoicing is an example of computer crime

true

early hackers began by using school computers to alter grades. now this activity is used to complete large-scale theft

true

embezzlement would be an example of a corporate crime

true

giving money to an elected official is bribery when in return you receive a favorable vote on a piece of legislation

true

gulf oil corporation maintained a multimillion dollar secret fund used to make illegal campaign contributions. it appeared the Gulf through the United States Senate was for sale.

true

like ponzi schemes, the money collected from newer victims is paid to the earlier victims, but in a pyramid scheme, the victims themselves are induced to recruit further victims through the payment of recruitment commissions.

true

many of america's corporate elite believe that they are entitled to all of the benefits of the free market, with none of the risk

true

medicare can be an easy mark for fraudulent equipment sales because it often fails to account for the legitimacy of suppliers

true

money orders ahve been used in crimes including narcotics trafficking, firearms trafficking, and depositing illicit proceeds from alien smuggling and corporate fraud

true

more often than not, running afoul of the internal revenue service puts elected officials on the fast track for prosecution

true

playpen-mentality hackers have the goal of breaking in

true

services that are designted so that the maximum fees can be charged is called upcoding

true

some argue that nursing home abuse occurs because of the vulernability of its patients, the fact that the institutions are run fro profit, and low pay for workers

true

techniques that nursing homes use to keep patients cooperative include psychotropic substances

true

the average computer crime nets 500,000

true

the broad but somewhat more specific definition of computer crime can be described as destruction, theft, unauthorized or illegal use, modification or copying of information, programs, services, equipment, or communication networks

true

the general accounting office has estimated that nearly 10% of the $1 trillion spent by Americans on health care is lost to fraud and abuse

true

the money order industry is small and easier to access for criminals

true

the phase "cartel-type frauds" used in connection with health care are frauds perpetrated by criminal organizations

true

trap doors or sleepers allow a technique knowns as salami slicing to loot accounts. this is taking small amounts from a lot of people

true

soft money is

unrestricted

which of the following is an example of public corruption

unskilled relative hired as a policy analyst

the dictionary of criminal justice data terminology offers the following defitinition: "Non-violent crime for financial gain committed by means of deception by persons whose occupational status is entrepreneurial, professional or semi-professional and utilizing their special occupational skills and opportunities." what crime is this defining

white collar crime

the general accounting office has estimated that neraly _______% of the $1 trillion spent by americans on health care is lost to fraud and abuse

10

according to the text, the broad but somewhat more specific definition of computer crime can be described as

destruction, theft, unauthorized or illegal use, modification or copying of information, programs, services, equipment or communication networks

the term "self-referral" stands for the practice of

doctor selection of specialists and services based on financial connections

the acronym EFT stands for

electronic funds transfer

inspectors int he department of agriculture have done all of the following except

failed to condemn beef infected with e. Coli bacteria

"Little corruption" in the highest level of federal executive office has been persistent.

false

HMO selection of specialists and services based on providers in a network is referred to as "self-referral"

false

Mafiaboy got caught because he was traced through emails

false

a reason for the Nigerian scam is that it has a well-educated populace

false

abuses in medicaid may be worse than those in medicare because it covers more services

false

aggressive corruption would be associated with grass-eaters

false

check and credit card fraud have no connection with drug trafficking and organized crime

false

corruption has been attributed to under-representation of the disadvantaged

false

county hunters in themedical fraud area are doctors who receive a fee for a particular diagnosis

false

governor Fife Symington was the chief executive of the state of Texas, before he was indicted for defrauding creditors

false

gresham sykes and david matza call "techniques of substantiation" mechanisms that allow offenders to annul any potential guilt or internal conflict stemming from conduct on their part that breaks the law

false

in recent years, the earnings gap between CEOs and employees has diminished

false

logic bombs hide from virus protection programs

false

one of the five common techniques to annul guilt is denial of injury where perpetrators claim to be trying to achieve a more important purpose

false

so-called first generation phone "phreaks" used their talents to steal from checking accounts

false

the definition of computer crime is clear and concise

false

there is little corporate leniency extended to white collar criminals

false

using animals to test harmful drugs would be an activity that could constitute research fraud

false

william jennings bryan was a famous orator who threatened to withdraw his legislative services if the bank did not refresh his retainer

false

reasons for the nigerian scam include all of the following except

it has an oil-rich country with a healthy economy

the ABSCAM operation was criticized because

it was not targeted at wrongdoing that was already occuring

research shows that organizations are more vulnerable to people with certain characteristics. which statement below reflects a typical cyber-criminal?

john is young, college educated, and is somewhat "overqualified" for his current position

bill is being investigated for a computer crime. evidence has been gathered and others have already been interviewed. Now the lead investigator wants to interview the suspect. which statement below is true regarding the willingness of the suspect to voluntarily agree to be interviewed?

many suspects voluntarily talk with investigators because they may believe that their actions might be unethical or immoral but not criminal in nature.

American Airlines CEO Carty lost his bonus and was forced to resign with _____________ disclosed a proposal to raise salaries and pay enormous bonuses to select executives at a time when the company has lost billions and employees were asked to take pay cuts

media

equipment sales frauds work all of the following reasons except

medicare does not review doctors' credentials

in washington DC, what now rivals or exceeds power as the preeminent goal?

money

viruses

multiply


Kaugnay na mga set ng pag-aaral

Social Psychology Final: Chapter 14 (Altruism)

View Set

gender, sex, and sexuality sociology chapter 12

View Set

FINAL EXAM MEDSURGE QUESTIONS FROM POWERPOINTS

View Set

Addies Adaptive Quiz 25 Questions

View Set

Chap 20: Nursing Management of the Pregnancy at Risk: Selected Health Conditions and Vulnerable Populations

View Set

Entrepreneurship Chapter 4 Identify and Meet a Market Need

View Set

Summer CS 430 Practice Quiz: Chapter 10 & 11

View Set

WWII Pacific final Terms (James)

View Set