Deck 12: Enterprise Crime: White-Collar Crime, Cyber Crime, and Organized Crime
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/55
Play
Full screen (f)
Deck 12: Enterprise Crime: White-Collar Crime, Cyber Crime, and Organized Crime
1
"Ping-ponging, "gang visits," and "steering" are forms of which type of white-collar crime?
A)blue-collar fraud
B)management fraud
C)securities fraud
D)health care fraud
A)blue-collar fraud
B)management fraud
C)securities fraud
D)health care fraud
D
2
Which is NOT a reason why cyber crime is particularly challenging?
A)Because cyber crime is difficult to detect through law enforcement channels.
B)Because cyber crime is rapidly evolving.
C)Because cyber crime limits the geographic location of victims.
D)Because cyber crime allows criminals to operate more efficiently and effectively.
A)Because cyber crime is difficult to detect through law enforcement channels.
B)Because cyber crime is rapidly evolving.
C)Because cyber crime limits the geographic location of victims.
D)Because cyber crime allows criminals to operate more efficiently and effectively.
C
3
According to the _______view, some business organizations promote white-collar criminality in the same way that lower-class culture encourages the development of juvenile gangs and street crimes.
A)corporate greed
B)rationalization/neutralization
C)corporate culture
D)self-control
A)corporate greed
B)rationalization/neutralization
C)corporate culture
D)self-control
C
4
What percentage of websites offering drugs for sale require no prescription from a patient's physician?
A)20%
B)40%
C)60%
D)80%
A)20%
B)40%
C)60%
D)80%
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
5
A pyramid scheme is one type of ______ whereby people use their institutional or business position to trick others out of their money.
A)corporate crime
B)white-collar fraud
C)financial chiseling
D)employee fraud
A)corporate crime
B)white-collar fraud
C)financial chiseling
D)employee fraud
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
6
__________ involves illegal activities of people and institutions whose acknowledged purpose is profit through legitimate business transactions.
A)Organized crime
B)Enterprise crime
C)White-collar crime
D)Cyber crime
A)Organized crime
B)Enterprise crime
C)White-collar crime
D)Cyber crime
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
7
One form of _____ involves "payola"- record companies paying radio stations to play songs without making listeners aware of the bribes.
A)pilferage
B)management fraud
C)influence peddling
D)tying arrangement
A)pilferage
B)management fraud
C)influence peddling
D)tying arrangement
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
8
What is the minimum dollar amount necessary before fraud exists in the crime of tax evasion?
A)$100
B)$1,000
C)$10,000
D)There is no minimum dollar amount.
A)$100
B)$1,000
C)$10,000
D)There is no minimum dollar amount.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
9
Your friend committed a _________ when he flooded an internet site with emails and made the website "crash" because the company refused to pay him a bribe.
A)denial-of-service attack
B)manipulation-of-service attack
C)"one-off-kamikaze" attack
D)phishing attack
A)denial-of-service attack
B)manipulation-of-service attack
C)"one-off-kamikaze" attack
D)phishing attack
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
10
The IT revolution has revitalized the porn industry. What do we know about adult entertainment on the web?
A)It is difficult to estimate the number of web sites featuring sexual content.
B)The number of pornography web pages has soared during the past six years.
C)The number of visits to porn sites surpasses those made to Internet search engines.
D)All of these things are known about adult entertainment on the web.
A)It is difficult to estimate the number of web sites featuring sexual content.
B)The number of pornography web pages has soared during the past six years.
C)The number of visits to porn sites surpasses those made to Internet search engines.
D)All of these things are known about adult entertainment on the web.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
11
Your friend has listed an item for sale online that he does not possess. He "sells" the item and keeps the money. What cyber crime has your friend committed?
A)phishing
B)"cracking"
C)warez fraud
D)etailing fraud.
A)phishing
B)"cracking"
C)warez fraud
D)etailing fraud.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
12
Bernard Madoff has been referred to as the greatest ____ of all time.
A)influence peddler
B)pilferer
C)exploiter
D)financial chiseler
A)influence peddler
B)pilferer
C)exploiter
D)financial chiseler
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
13
Travis Hirschi and Michael Gottfredson claim white-collar crime is relatively rare because, as a matter of course, business executives tend to hire people with:
A)business experience.
B)self-control.
C)strong morals.
D)cultural values.
A)business experience.
B)self-control.
C)strong morals.
D)cultural values.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
14
In the late 1930s, the distinguished criminologist __________ first used the phrase "white-collar crime" to describe the criminal activities of the rich and powerful.
A)Cesare Lombroso
B)Emile Durkheim
C)Edwin Lemert
D)Edwin Sutherland
A)Cesare Lombroso
B)Emile Durkheim
C)Edwin Lemert
D)Edwin Sutherland
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
15
While power in traditional bullying is the result of physical (stature) or social
(competency or popularity) factors, power in cyber bullying stems from:
A)physical distance
B)fear
C)net proficiency
D)manipulation
(competency or popularity) factors, power in cyber bullying stems from:
A)physical distance
B)fear
C)net proficiency
D)manipulation
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
16
Pharmacists have been known to alter prescriptions or substitute low-cost generic drugs for more expensive name brands. This is an example of which category of white-collar crime?
A)professional chiseling
B)churning
C)employee fraud
D)influence peddling
A)professional chiseling
B)churning
C)employee fraud
D)influence peddling
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
17
White-collar crime, cyber crime, and organized crime are linked because they
Involve:
A)twisting the legal rules of commercial enterprise for criminal purposes.
B)traditional racketeering practices.
C)investigation and control by federal enforcement agencies.
D)recruiting new members via legitimate employment agencies.
Involve:
A)twisting the legal rules of commercial enterprise for criminal purposes.
B)traditional racketeering practices.
C)investigation and control by federal enforcement agencies.
D)recruiting new members via legitimate employment agencies.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
18
Crimes of the marketplace are referred to as _____ crime and include white-collar crime, cyber crime and organized crime.
A)venture
B)enterprise
C)business
D)industry
A)venture
B)enterprise
C)business
D)industry
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
19
In 1907, sociologist E. A. Ross described the "criminaloid:" a business leader who, while enjoying immunity from the law, victimized an unsuspecting public. Today, Ross's criminaloid refers to one who commits
A)influence peddling.
B)securities fraud.
C)corporate crime.
D)tax evasion.
A)influence peddling.
B)securities fraud.
C)corporate crime.
D)tax evasion.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
20
In his research on fraud, Cressey found that the ________ view allowed professionals to excuse their criminal behavior since, "All people steal when they get in a tight spot."
A)corporate greed
B)rationalization/neutralization
C)corporate culture
D)self-control
A)corporate greed
B)rationalization/neutralization
C)corporate culture
D)self-control
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
21
Which is NOT a general characteristic of organized crime?
A)Organized crime is conspiratorial activity.
B)Organized crime has economic gain as its primary goal.
C)Organized crime is synonymous with the Mafia.
D)Organized crime does not include terrorists dedicated to political change.
A)Organized crime is conspiratorial activity.
B)Organized crime has economic gain as its primary goal.
C)Organized crime is synonymous with the Mafia.
D)Organized crime does not include terrorists dedicated to political change.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
22
The evolution of organized crime has led to the _____, a FBI investigation tool that focuses on criminal enterprise and investigates the structure of criminal
Enterprise groups.
A)RICO theory of investigation
B)formation theory of investigation
C)enterprise theory of investigation
D)Mafia theory of investigation
Enterprise groups.
A)RICO theory of investigation
B)formation theory of investigation
C)enterprise theory of investigation
D)Mafia theory of investigation
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
23
Cyber crime presents a compelling challenge because it is difficult to detect through traditional law enforcement channels.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
24
While the number of pornography web pages has soared in the past six years, the number of "hits" or visits to search engines still surpasses the number of visits to pornographic websites.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
25
Cyber criminals who engage in cyber vandalism are often motivated by:
A)revenge.
B)greed.
C)profit.
D)Cyber vandals are not motivated by any of these factors.
A)revenge.
B)greed.
C)profit.
D)Cyber vandals are not motivated by any of these factors.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
26
______ organized crime groups are believed to be the main purveyors of credit card fraud in the United States.
A)Russian
B)Japanese
C)Chinese
D)Vietnamese
A)Russian
B)Japanese
C)Chinese
D)Vietnamese
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
27
Enterprise crimes taint and corrupt the free market system.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
28
Pilferage refers to efforts of organized groups to download and sell copyrighted software in violation of the software's licensing.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
29
Payola is a form of influence peddling in business.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
30
Some identity theft thieves create emails that look legitimate but are designed to gain access to a victim's personal information. This is a/an _________ scheme.
A)etailing
B)phishing
C)slamming
D)hooking
A)etailing
B)phishing
C)slamming
D)hooking
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
31
Which factor has NOT contributed to the alleged erosion of Mafia power in the United States?
A)the skilled younger generation of mob leaders
B)the aging of reigning mob leaders
C)government enforcement policies
D)changing values in U.S. society
A)the skilled younger generation of mob leaders
B)the aging of reigning mob leaders
C)government enforcement policies
D)changing values in U.S. society
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
32
The rationalization/neutralization view can be used to explain the collapse of Enron.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
33
Losses from enterprise crime far outstrip those of any other type of crime.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
34
The _________ is the view that organized crime is a direct offshoot of a criminal society - the Mafia - that first originated in Italy and Sicily.
A)European conspiracy theory
B)ethnic conspiracy theory
C)Mafia conspiracy theory
D)alien conspiracy theory
A)European conspiracy theory
B)ethnic conspiracy theory
C)Mafia conspiracy theory
D)alien conspiracy theory
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
35
Exploiters force victims to pay for services to which victims have no clear right.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
36
What is the difference between a computer worm and a Trojan horse?
A)Trojan horses self-replicate, computer worms do not.
B)Computer worms self-replicate, Trojan horses do not.
C)Trojan horses deface websites, computer worms do not.
D)Computer worms deface websites, Trojan horses do not.
A)Trojan horses self-replicate, computer worms do not.
B)Computer worms self-replicate, Trojan horses do not.
C)Trojan horses deface websites, computer worms do not.
D)Computer worms deface websites, Trojan horses do not.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
37
When someone illegally obtains software and then "cracks" or "rips" it and posts it on the Internet for others to use, the resulting pirated software is called
A)"split."
B)"warez."
C)"slash."
D)"ripez."
A)"split."
B)"warez."
C)"slash."
D)"ripez."
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
38
One important contemporary change in organized crime is
A)the degree of violence being used.
B)the use of the Internet to support criminal activities.
C)the declining involvement in drug trafficking.
D)the interweaving of ethnic groups into the traditional structure.
A)the degree of violence being used.
B)the use of the Internet to support criminal activities.
C)the declining involvement in drug trafficking.
D)the interweaving of ethnic groups into the traditional structure.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
39
Organizational or corporate crime involves illegal business practices such as price fixing, restraint of trade, and false advertising.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
40
Hirschi and Gottfredson have collected data showing that the demographic distribution of white-collar crime is similar to other crimes.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
41
Phishing emails and websites have become greater problems because cyber criminals can easily copy brand names and corporate insignia into their emails and websites.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
42
Why is cyber crime a compelling challenge to criminologists and law enforcement entities?
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
43
Discuss how identity theft occurs and the mechanisms used to steal one's identity.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
44
Identify and describe the various forms of cyber vandalism.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
45
Some criminologists view the alien conspiracy theory as a figment of the media's imagination.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the three causal theories of white-collar crime best explains the Enron scandal and why?
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
47
What has been the Internet's impact on the pornography industry and why?
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
48
Using examples of both types of cyber crimes, discuss and compare the motivations of criminals engaged in acts of cyber theft and cyber vandalism.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
49
Organized crime has become multi-ethnic and now includes Asian, Latin, and European groups.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
50
Power in cyber bullying is achieved through social competency and popularity.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
51
Describe the process of Internet-based copyright infringement.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
52
Identify and discuss the three major areas of enterprise crime.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
53
Organized crime has evolved since the "traditional days" of the Mafia. Discuss how and why organized crime has changed. What does contemporary organized crime "look like?"
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
54
Discuss and provide examples of employee fraud, management fraud, and client fraud.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck
55
Computer voyeurism involves cyber vandals bent on destroying computer security systems because they believe in a philosophy of open access to systems and programs.
Unlock Deck
Unlock for access to all 55 flashcards in this deck.
Unlock Deck
k this deck