Occupational Crime Exam 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which type of fraud occurs when individuals purchase a home they do not plan to live in and then deed the home over to another person who plans to live there?

Straw Buyer Fraud

The Supreme Court's decision in Citizens United v Federal Election Commission paved the way for what?

Stricter laws on contributions to political parties

How do victim characteristics inhibit law enforcement response to computer crimes?

...

If a computer virus is not introduced into a computer by an intruder, what is the intruder's probable goal?

...

Since professors rarely go to jail for their misdeeds, how might colleges and universities provide accountability for their crimes?

...

What is one general characteristic of cybercriminals when they are committing a crime?

...

What role in occupational crime is a computer playing if it is hacked?

...

What percent of articles in the Journal of the American Medical Association had ghost writers?

8%

If an offender remotely accesses the control systems of an infant formula manufacturer and changes the ingredients with a deadly result, what type of crime has been committed?

Cyberterrorism

What is a form of time conflict?

A professor routinely cancels class because of outside work

In the study noted in the reading, how many of the research misconduct cases were said to be caused by the supervisor's lack of training the supervisee?

About 75%

What are antitrust offenses?

Agreements to restrain competition, and efforts to acquire a monopoly.

When a powerful politician has an affair with a low-level staff member, what type of misconduct has occurred?

Apolitical white-collar crime

When appraisers intentionally do not conduct a thorough determination of a home's value, they are committing what type of fraud?

Appraisal fraud

What is usually stolen during theft as a computer crime?

Bank account infromation, online passwords, passport numbers, driver's license numbers, social security numbers, medical records, online subscriptions.

How is Operation: Varsity Blues, the college admissions scandal, an example of white-collar crime in the educational system?

Because parents were using their status and money to gain admission into college for their children

A group of infected computers online, under the control of one cyber offender at the same time, is known as what type of computer crime?

Botnet

Chunking and churning are types of mortgage fraud that involve what type of real estate activity?

Buying several properties (chunking) and selling those properties (churning)

When an offender convinced people to invest in gold that did not actually exist, what type of investment fraud was committed?

Commodities fraud

What are examples of white-collar crimes committed by a student?

Digital piracy

People who register to vote multiple times under different aliases are committing what type of crime?

Election law violations

White-collar cybercrimes are committed at work either by employees or what other actor?

Employer, buisnessperson, public official.

What employee-based strategies do employers use to protect their businesses from computer crime in the workplace?

Encryption, firewalls, employee training, routine audits, and physical surveillance

A survey by the Ponemon Institute found that the cost of cyber offending was highest in which industries?

Energy, financial, and utilities.

Which type of mortgage fraud involves investors convincing financially distressed homeowners to "hire" them to buy the home?

Equity Skimming

What are examples of double billing?

Example: billing medicare and medicaid for a procedure but also charging the person who got the procedure as well

What are warning signs for mortgage fraud?

Exclusively using one appraiser...

What types of fraud do builders commit?

Fault credit enhancements, builder bailout schemes

What type of crimes do pre-arranged trading and bucketing fall under?

Futures trading fund

Who is the 'state" when scholars talk about state-corporate crime?

Government agencies and their employees at the federal, state, and local level

Why do we have election laws?

Guard against fraud in election process

How often do professors who reward students with better grades for sex receive criminal charges?

Hardly ever

If an offender convinces an investor to invest on the promise that funds are backed by the Federal Reserve when in fact there is no backing for these funds, what type of crime has been committed?

High Yield Investment Scheme

What are red flag warnings of a Ponzi scheme?

High returns with little to no risk "Guaranteed returns"

In what ways is the concept of state-corporate crime useful?

Highlights the power of formal institutions to harm members of society

If a group of citizens were charged a fee by a political party's campaign workers to register them to vote, this would be __________.

Illegal and an election law violation that could be prosecuted

What separates illegal flipping and legitimate fixing and reselling of houses?

Illegal flipping is when scammers buy and resell properties with inflated prices, real flipping is buying a house, fixing them up, then sell it for a profit

What is a pattern that distinguishes research misconduct from many other white-collar crimes?

In most cases the offender of research misconduct acts alone.

Imagine you are taking a test in a class where one classmate was able to access the test questions ahead of time through a friend. To what type of crime in the economic system is this analogy most similar?

Insider trading

What computer crime can result from responding to phishing emails?

Installation of malware, sabotage systems, or steal intellectual property or money.

Why do scholars see international law as a "foundation" for defining state-corporate crime?

International law includes human rights and social and economic rights harms as well as crimes that can be prosecuted

If someone failed to pay for an item bought on eBay, what type of crime would they be committing?

Internet crime

What are crimes in the economic system usually classified as?

Investment fraud

How does banking fraud differ from investment fraud?

Investment fraud centers around investing strategies with economic system whereas banking frauds engage in ways to take money from a bank

In 2014 the U.S. Department of Education offered what conclusion about student loan fraud between 2009 and 2012?

It has increased by 82%

What do experts believe about voter fraud?

It's extremely rare

Prosecutions of political crimes by federal rather than state and local agencies offer what advantage for the offender?

Jurors are selected from a broader cross-section of the public and will likely not know or have an opinion of the official

The Computer Fraud and Abuse Act of 1984, broadened in 1996 to make various aspects of computer offending a federal crime, is what strategy for responding to cybercrime?

Legislative

What are incentives to carry out research misconduct?

Make people believe they came up with the research themselves Make more money than normal by stealing funds Sway a certain group of people from the research

When officials pump up the prices of stocks by sharing false information online and then subsequently sell their own stocks at a higher price, what crime have they committed?

Market manipulation

Which type of crime is believed to be pervasive in the natural energy industry?

Market manipulation

What consequence might research misconduct have for society?

Medical breakthroughs or policies based on flawed research puts people at risk

What are characteristics of apolitical white-collar crime?

Most commonly lying about whereabouts which involve politics to indulge in an affair all whilst using government funds to do so

Students who are sexually harassed by their professors usually report it to whom?

No one

What is a common pattern shared by mortgage and investment offenders?

Offender being involved with a network of participants to commit fraud.

What issues arise regarding preventing computer crimes?

Offenses occur very quickly, offenders have high levels of education

When does a short sale of a foreclosed home become mortgage fraud?

Once the sale is done and the former owner purchases the house at a price that is lower than the previous mortgage loan. Not disclosing this strategy is what makes it illegal.

Which explanation for computer crime focuses on the degree of knowledge offenders typically have about computers?

Opportunity explanations

Hospitals are particularly vulnerable to what type of cyberattack?

Phishing

What type of crime do hackers or crackers usually commit?

Phishing or identity theft, steal corporate data, take money from peoples account.

Which type of scam or fraud involves paying investors from future investors' payments?

Ponzi scheme

Business activities that are covered by antitrust laws include what?

Pricing distribution, mergers, joint ventures, and intellectual property

What are consequences of political corruption?

Public trust in law and rule of law decreases

Fraudulent home improvement scams fall under what category of fraud?

Real estate agent fraud

Operation Bid Rig is a political corruption investigation being conducted by the FBI in regard to what type of political corruption?

Receiving a public bribe

What are forms of political corruption?

Receiving a public bribe Soliciting a bribe Extortion Contract fraud Embezzlement Official misconduct Obstruction of justice Violation of regulatory laws

What type of computer crime is most prevalent on college campuses?

Release of information to unknown or unauthorized individuals, specifically from university it, with hacker-related offenses declining in the last several years.

Why might it be more difficult to estimate how often research misconduct occurs than other white-collar crimes?

Research has not been been empirically assessed so the standard is difficult to determine

Which type of conflict arises with unapproved outside work?

Reserch based conflicts of interest

What form of discipline might be taken against professors who were found to have committed research misconduct?

Retraction of articles

Efforts to punish cybercriminals to prevent them from committing crimes is what type of strategy?

Retributive strategies

An agent who fails to pay off a homeowner's original mortgage at closing by keeping the money instead of sending the funds to the lending institution is committing what type of fraud?

Reverse mortgage fraud

What are reasons why students have chosen not to report sexual harassment?

Said they did not have proof that the incident occurred, Were afraid of retaliation by the perpetrator, Were scared of hostile treatment by the authorities, Were uncertain the authorities would consider the incident serious enough, Wanted to prevent family and others from learning about it, Didn't know how to report the incident

If the head of an agency who has committed a serious offense blames it on the assistant who discovered the crime, what response is the offender using?

Scape-goating

What did a 2017 study observe from its review of research misconduct cases that were reported to federal agencies by the scientific community?

Scientific community was concerned that detecting too much misconduct would call the accuracy of their overall research to question

When cyber offenders steal information for profit, what are ways they sell stolen information?

Selling to other criminals on the dark web.

What form of sexual harassment occurs if a professor stares intently at the same student while giving a lecture?

Sexualized behavior

Accusations of research misconduct generally begin from where?

Someone involved with the research

The theft of intellectual property is what type of stolen information?

Steals an idea, creative expression, or invention. Stealing patents, copyrights, trademarks, or trade secrets.

What are the four views that define the concept of a corporation?

Suggest that a corporation is a business, the physical or structural location of business, business becomes incorporated (legally recognized status), seen as a collection of employees who work for an employer

Market manipulation by energy companies is restricted under which statute?

The Commodity Exchange Act, Energy Policy Act of 2005, and the Energy Independence and Security Act of 2007

What group or institution focuses their efforts on controlling state crime?

The National Institute of Justice

What are reasons given for why the federal government has become so involved in research misconduct?

The federal government is investing more money in scientific endeavors.

What do pyramid and Ponzi schemes have in common?

The source of payments to existing participants comes from new participants/ investors

What are examples of software crime?

Theft of software, counterfeiting software, copyright violations of computer software, and piracy

In a study on academic dishonesty, what did R. L. Sims find about respondents who engaged in dishonest behavior in college?

They were severely dishonest at work as they were in college

What are the policies on sexual contact with students?

Title IX (nine) is the most predominant, but some schools lack policies at all and most state that as long as it is consensual it is fine

Why do cybercriminals form cybergangs?

To help each other commit cybercrimes. To learn different ways of committing cybercrime from specialist.

Why are colleges and universities a possible target for cyber criminals?

Universities have big data stores, these house information including personal for students, staff, providers and vendors like addresses, telephone numbers and even sensitive data like medical records.

When is plagiarism most often discovered?

When computer- based text searching tools are used to search for it.

Ghost writing occurs under what circumstances?

When someone publishes a writing of some sort without giving proper credentials to who really wrote it

Textbook fraud occurs under what circumstances?

When someone receives complimentary textbooks as a gift, then sells them to make profit off of them

The term "state crime" is used by scholars to describe which type of situation?

Where governments or their representatives commit crime on behalf of the government

An offender working with a network of conspirators to commit crimes is an example of what pattern typical in investment fraud?

White-collar gangs

Over one-third of companies surveyed in a study on cybercrime attributed some of their cyberattacks to whom?

a malicious insider

What would scholars identify as a state crime perpetuated by a government?

any action that violates international public law and/or a state's own domestic law when these actions are committed by individual actors acting on behalf of, or in the name of the state, even when such acts are motivated by their own personal, economical, political, and ideological interests.


संबंधित स्टडी सेट्स

ch 10 Functional Dependencies and Normalization for Relational Databases

View Set

Chapter 25: Immunization and Vaccines

View Set

L1 Practice Exam (Computerized Powertrain Controls Diagnosis)

View Set

Earhart Leadership Exam Study Guide

View Set

Chapter 16 - Organizational Design and Structure

View Set