chapter 14
When it comes to white-collar crime, studies show that the cultural norms of one's environment seem to overwhelm university-led ethical training.
True
Prior to the advent of the internet, federal law enforcement believed that ______ was a controllable problem.
child pornography
One of the criteria stipulated to describe ______ crimes was that the offender must belong to the upper-class.
white-collar
The prominent criminologist Edwin Sutherland is famous for coining the term ______.
white-collar crime
Millions of Americans are harmed or killed by corporate crime every year.
True
The potential benefits of white-collar crime greatly reduce the potential deterrent effect of sanctions imposed.
True
Violations of Racketeer Influenced and Corrupt Organizations (RICO) legislation garner a fine and a prison term.
True
White-collar crime causes far more financial damage to society than all other crimes combined.
True
Which Supreme Court decision gave prisoners the right to sue state officials in federal court?
Cooper v. Pate
Which of the following is one of the criteria for Sutherland's definition of white-collar crime?
Crime is work-related.
______ involves obtaining materials that include identity information but are usually disregarded by the true owners of the identity.
Dumpster diving
Which amendment created an opportunity for criminals to increase clout, make profit, and participate in violence?
Eighteenth, which outlawed alcohol
Cybercrime originated during the Industrial Revolution.
False
Cyberstalking is a type of internet fraud.
False
Research has suggested that corporations that get caught and punished are deterred from future violations.
False
Research suggests that deaths caused by corporate crimes are decreasing.
False
Sutherland's original definition argued that white-collar crime was less serious than violent crime.
False
White-collar criminals are more likely than traditional street criminals to be investigated, caught, charged, and convicted.
False
The owner of a large corporation is arrested on charges of intimate partner violence against their spouse. The individual's spouse is also an employee of the corporation. Does this count as white-collar crime?
No, because the violation is not work-related.
Which type of hacker violates computer security out of malice or for personal gain?
black hat
The most common motivation for identity theft is to ______.
commit fraud
Sutherland provided a standardized definition of white-collar crime that experts accept as comprehensive.
false
The terms occupational crime and corporate crime can be used interchangeably.
false
Compared to traditional street criminals, white-collar criminals are ______ likely to be caught, charged, and convicted or sentenced to significant prison time.
far less
In comparison to other types of crime, white-collar crime causes ______ financial damage.
far more
Illegally obtaining someone's personal details in order to carry out transactions in their name is known as ______.
identity theft
A crime enterprise traffics in illegal weapons sales to militias throughout the world. This best exemplifies the activities of ______.
transnational organized crime
Findings on research on white-collar crime suggest that corporate misbehavior is overwhelmingly common.
true
Fines for OSHA violations are usually low relative to the profits being made by the companies.
true
The Electronic Communications Privacy Act regulates the interception of electronic communications by both individuals and the government.
true
White-collar crimes cause more deaths annually than street crime.
true
Organized crime is often defined through a(n) ______.
typology
In Sutherland's criteria for white-collar crime, he requires that crimes be work-related violations committed by what type of offender?
upper-class
When asked why they committed fraud, a white-collar criminal says, "I weighed the pros and cons and realized that there was too much to gain and not much to lose." This statement is most representative of which theoretical perspective on crime?
rational choice
Which criminological theory would explain internet fraud schemes as a method of combating blocked opportunities?
strain
Research has suggested that, of the companies that have been caught engaging in corporate violations, ______ recidivate.
the vast majority
Which of these is an example of a labor violation?
A construction company rotates use of high-vis vests due to shortages.
According to Sutherland's definition, which of the following scenarios represents white-collar crime?
An accountant embezzles company funds.
______ consists of three features: a computer, a victim computer, an intermediary network.
Cybercrime
The organization charged with protecting human health and safeguarding nature is the ______.
Environmental Protection Agency
Which 1950s group was charged with extensively investigating the presence and impact of organized crime?
Kefauver Committee
Which criminal organization rose to prominence in the mid-1800s and required members to take an oath of loyalty on punishment of death?
Mafia
Which of the following groups, dating back to the 1950s, is considered one of the oldest prison gangs in the United States?
Mexican Mafia
The primary legislation developed to investigate labor violations is the ______ Act.
Occupational Safety and Health
Which criminologist acknowledged the need to examine the concept of white-collar crime?
Sutherland
______ coined the term white-collar crime.
Sutherland
Sutherland's study of corporate crime and violations suggested which of the following?
The vast majority of corporations committed more than one offense.
Which organization, formed in 1929, found that organized criminal activity flourished around bootlegging operations?
Wickersham Commission
A hacktivist attempts to get past the computer network protections in place by a corporation that the hacktivist believes is corrupt. In terms of routine activities theory, this attempt at cybercrime best exemplifies ______.
a motivated offender
An offender hacks the social media accounts of several prominent celebrities asking followers to send them large sums of money, which will then be doubled and then returned to the followers. This is an example of which type of cybercrime?
advance-fee fraud
Stealing a victim's credit information and using it to purchase items is known as ______.
carding
According to Sutherland's definition, which of the following offenders would be able to commit white-collar crime?
chief executive officer
Under a social learning perspective, white-collar criminals learn definitions of doing "good" from which of the following populations?
colleagues
A mining company has exhausted the mineral deposits of one of their mines and is going to evacuate the site. The owner of the company instructs its workers to dump the remaining waste materials into the mine before boarding it up. This is an example of what kind of white-collar crime?
crime against the environment
Which type of white-collar crime drastically worsened during the Industrial Revolution due to increased production of toxins?
crimes against the environment
The fact that white-collar crimes are often committed by celebrities or people who are widely admired has what effect?
damages the fabric of society
Which objective Michael does give for dealing drugs?
economic
Which theoretical explanation used to explain organized crime could you apply to Michael's sale of drugs?
enterprise
The President's Commission on Law Enforcement and the Administration of Justice found that ______ was the largest source of revenue for organized crime.
gambling
Which industry arose in Nevada after the Great Depression and attracted organized crime?
gambling
Individuals who violate computer security are referred to as ______.
hackers
Which of the following is an example of cyberstalking?
hacking a person's email address to send hateful personal messages to their contacts
A corner market employs children to stock the shelves as a way of keeping costs low. This is an example of which type of white-collar crime?
labor violation
Which of the following is an example of a crime against the environment?
leakage of oil from underground pipelines
Compared to other types of identity theft, identify theft in which the offender assumes the life of the victim, as illustrated in this case study, is ______.
less common
The Occupational Safety and Health Act (OSHA) made it a(n) ______ to cause the death of a worker by willfully violating safety laws.
misdemeanor
A corporate manager excuses their practice of reporting better-than-average profits by their department by claiming that their employees have been under an excessive amount of stress that year. This best exemplifies ______.
neutralization
The Hell's Angels, the Bandidos, Vagos, Warlocks, and the Pagans are all examples of ______.
outlaw motorcycles gangs
The activities of Tammany Hall during the 19th century were an example of ______.
political corruption
Regardless of whether a company is based in a communistic or a capitalistic country, the goal is always ______.
profit
Just as drug dealing takes advantage of an illegal good that's widely desired, ______ also created an opportunity for criminals to meet the public demand for something that was illegal.
prohibition