White collar crime final
the phrase "cartel-type frauds" used in connection with health care refers to frauds perpetrated by
criminal organizations
federal district judge alcee hastings was impeached and removed from office after
he was acquitted of conspiracy to commit bribery
Boiler rooms with slick telemarketers offered full physicals for little or no fee. This free diagnostic service turned out to be very costly because
information was used to file claims against insurance companies and government insurance
in some instances the equipment is not only nonessential, it is also
overpriced
the worst scandal in a scandal-ridden city occurred in the ___________ of new york city
parking violation bureau
physicians are not the only ones involved in Medicare fraud. Investigators have recently been looking into services offered by
pediatric dentists
one of the five common techniques to annul guilt is denial of the victim where
perpetrators claim that those injured deserved what happened to them
one of the five common techniques to annul guilt is condeming the condemners where
perpetrators claim to be victims
computer crime investigations are dynamic in nature. Therefore, their detection and investigation differ in several respects from that of other more traditional crimes. Choose the statement below that identifies a difference between the two types of crimes
physical evidence in computer crimes is different from that in traditional crimes
officer dale is conducting a computer crime investigation. which action might cause him to lose his computer evidence?
place magnetic tape and disks near stereo speakers and printers
PAC stands for
political action committee
Melvyn Paisley was an assistant secretary of the Navy for six years and was in charge of
procurement
certain industries are distinguished by means and opportunities that are conducive to crime. these factors include all of the following except
public attention on business activities of industry
which of the following government agencies does NOT investigate money laundering schemes
USPS
of the following, the best example of a corporate crime would be
savings and loan fraud
Upcoding is
services designated to that maximum fees can be charged
corporate criminals also cast themselves in characters in the folklore of capitalism. In this myth they are
simply ahead of their time and misunderstood
doctors at a clinic at the University of California-Irvine abused fertility patients in all of the following ways except
terminating pregnancies without patient consent.
Jose uses this money to pay off various lower dealers and suppliers. Jose needs to legitimize his cash proceeds in a fashion that permits him to spend it wherever and whenever he desires without attracting suspicion. What prevents Jose from depositing 20,000 in cash in a bank?
the federal ctr requirement
the nigerian scam involved
a ploy using deceptive emails and stories of sequestered funds
which of the following activities could constitute research fraud
adjusting findings to support grant applications
back door programs
allow entry at will
toll fraud is
avoiding phone charges
Home care is a burgeoning business for scam artists. A company called Professional Care was paid for all of the following except
care for nonexistent patients
What does a currency transactions report require banks to record
cash transactions of 10,000 or more
when some individuals engage in white collar crime, though they are breakign the law, they often ___________ cultural values
conforming to
malicious hacking, affecting national security, has affected all of the following except
congressional committee files
WAREZ sites encourage with of the following activities
copying of copyrighted programs
diffusion accountability is a common byproduct of fiscal irresponsibility. this results in higher interest rates and higher prices for goods and services- consumers pay more. the burden falls disproportionately on
the middle class
Julie goes to the store to buy a new backpack for school and intends to use a credit card to pay for it. what is the only common security measure used on all credit cards?
the signature panel
James Olis, a former director of Dynegy, turned down a plea bargain. Because of the new sentencing guidelines for white-collar criminals the end result of his criminal case was that
the validity of the guidelines was questioned
a gift becomes a bribe when
there is a quid pro quo
an authorized program planted on a computer is known as a
trojan horse
which of the following computer crimes involves the secret placement or alteration of computer instructions so that one computer tells another how to perform illegal functions
trojan horses
Hiring an unskilled relative as a policy analyst would be an example of public corruption
true
Melvyn Paisley was an Assistant Secretary of the navy who was in charge of procurement
true
Michael Bloomberg was the subject of a computer crime. He was asked to pay a sum of money in return for beign advised as to the perpetrator's methods that were used to invade his system. In street crime terms this would be extortion
true
according to robert merton's formulation the standard of material success is not an objective one but exists on a sliding scale
true
coasting along looking for doors to open is a quality of cookbook hackers
true
computer crime offenders can commit computer crimes and destroy evidence with ease
true
computer crime requires a greater amount of technical expertise by investigators and prosecurots and its investigation is likely ot require a considerable investment of time
true
contracts that exceed medicare limits are called overcharging
true
conventional theories of crime have a tautological quality to them. criminality is defined using the same terms as are used for causal factors. the term circular may be substituted for tautological
true
corporate crime is a form of white-collar crime whereby trusted executives working within a company mishandle funds or otherwise betray the trust of customers or other consumers
true
diffusion of accountability is a common byproduct of fiscal irresponsibility
true
double invoicing is an example of computer crime
true
early hackers began by using school computers to alter grades. now this activity is used to complete large-scale theft
true
embezzlement would be an example of a corporate crime
true
giving money to an elected official is bribery when in return you receive a favorable vote on a piece of legislation
true
gulf oil corporation maintained a multimillion dollar secret fund used to make illegal campaign contributions. it appeared the Gulf through the United States Senate was for sale.
true
like ponzi schemes, the money collected from newer victims is paid to the earlier victims, but in a pyramid scheme, the victims themselves are induced to recruit further victims through the payment of recruitment commissions.
true
many of america's corporate elite believe that they are entitled to all of the benefits of the free market, with none of the risk
true
medicare can be an easy mark for fraudulent equipment sales because it often fails to account for the legitimacy of suppliers
true
money orders ahve been used in crimes including narcotics trafficking, firearms trafficking, and depositing illicit proceeds from alien smuggling and corporate fraud
true
more often than not, running afoul of the internal revenue service puts elected officials on the fast track for prosecution
true
playpen-mentality hackers have the goal of breaking in
true
services that are designted so that the maximum fees can be charged is called upcoding
true
some argue that nursing home abuse occurs because of the vulernability of its patients, the fact that the institutions are run fro profit, and low pay for workers
true
techniques that nursing homes use to keep patients cooperative include psychotropic substances
true
the average computer crime nets 500,000
true
the broad but somewhat more specific definition of computer crime can be described as destruction, theft, unauthorized or illegal use, modification or copying of information, programs, services, equipment, or communication networks
true
the general accounting office has estimated that nearly 10% of the $1 trillion spent by Americans on health care is lost to fraud and abuse
true
the money order industry is small and easier to access for criminals
true
the phase "cartel-type frauds" used in connection with health care are frauds perpetrated by criminal organizations
true
trap doors or sleepers allow a technique knowns as salami slicing to loot accounts. this is taking small amounts from a lot of people
true
soft money is
unrestricted
which of the following is an example of public corruption
unskilled relative hired as a policy analyst
the dictionary of criminal justice data terminology offers the following defitinition: "Non-violent crime for financial gain committed by means of deception by persons whose occupational status is entrepreneurial, professional or semi-professional and utilizing their special occupational skills and opportunities." what crime is this defining
white collar crime
the general accounting office has estimated that neraly _______% of the $1 trillion spent by americans on health care is lost to fraud and abuse
10
according to the text, the broad but somewhat more specific definition of computer crime can be described as
destruction, theft, unauthorized or illegal use, modification or copying of information, programs, services, equipment or communication networks
the term "self-referral" stands for the practice of
doctor selection of specialists and services based on financial connections
the acronym EFT stands for
electronic funds transfer
inspectors int he department of agriculture have done all of the following except
failed to condemn beef infected with e. Coli bacteria
"Little corruption" in the highest level of federal executive office has been persistent.
false
HMO selection of specialists and services based on providers in a network is referred to as "self-referral"
false
Mafiaboy got caught because he was traced through emails
false
a reason for the Nigerian scam is that it has a well-educated populace
false
abuses in medicaid may be worse than those in medicare because it covers more services
false
aggressive corruption would be associated with grass-eaters
false
check and credit card fraud have no connection with drug trafficking and organized crime
false
corruption has been attributed to under-representation of the disadvantaged
false
county hunters in themedical fraud area are doctors who receive a fee for a particular diagnosis
false
governor Fife Symington was the chief executive of the state of Texas, before he was indicted for defrauding creditors
false
gresham sykes and david matza call "techniques of substantiation" mechanisms that allow offenders to annul any potential guilt or internal conflict stemming from conduct on their part that breaks the law
false
in recent years, the earnings gap between CEOs and employees has diminished
false
logic bombs hide from virus protection programs
false
one of the five common techniques to annul guilt is denial of injury where perpetrators claim to be trying to achieve a more important purpose
false
so-called first generation phone "phreaks" used their talents to steal from checking accounts
false
the definition of computer crime is clear and concise
false
there is little corporate leniency extended to white collar criminals
false
using animals to test harmful drugs would be an activity that could constitute research fraud
false
william jennings bryan was a famous orator who threatened to withdraw his legislative services if the bank did not refresh his retainer
false
reasons for the nigerian scam include all of the following except
it has an oil-rich country with a healthy economy
the ABSCAM operation was criticized because
it was not targeted at wrongdoing that was already occuring
research shows that organizations are more vulnerable to people with certain characteristics. which statement below reflects a typical cyber-criminal?
john is young, college educated, and is somewhat "overqualified" for his current position
bill is being investigated for a computer crime. evidence has been gathered and others have already been interviewed. Now the lead investigator wants to interview the suspect. which statement below is true regarding the willingness of the suspect to voluntarily agree to be interviewed?
many suspects voluntarily talk with investigators because they may believe that their actions might be unethical or immoral but not criminal in nature.
American Airlines CEO Carty lost his bonus and was forced to resign with _____________ disclosed a proposal to raise salaries and pay enormous bonuses to select executives at a time when the company has lost billions and employees were asked to take pay cuts
media
equipment sales frauds work all of the following reasons except
medicare does not review doctors' credentials
in washington DC, what now rivals or exceeds power as the preeminent goal?
money
viruses
multiply