Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
32 Cards in this Set
- Front
- Back
What was white-collar crime defined as in the 1930s? |
A crime committed by a person of respectability and high social status in the course of his/her occupation |
|
What are the victims of white-collar crime usually more concerned with? |
Recovering losses as opposed to punishment |
|
How are white-collar crimes usually handled? |
In civil courts |
|
What is the goal of white-collar crime? |
Aimed at/committed for improving the financial standing of the individual |
|
According to Mark Moore's typology, what are the 7 types of white-collar crime |
1. Stings and swindles 2. Professional chiseling 3. Individual exploitation of institutions 4. Influence peddling and bribery 5. Theft and employee fraud 6. Client fraud 7. Corporate crime |
|
What is influence peddling and bribery? |
Important people selling power, influence, information to outsiders who: - have no legitimate interest in organization; or - want to obtain a favourable position by influencing activities of institution |
|
What is theft and employee fraud? |
Use of position to steal company funds or obtain property for themselves |
|
Who is the victim in theft and employee fraud? |
The company itself |
|
What is pilferage? |
Employee theft of company property |
|
What is client fraud? |
Theft from an organization that advances credits to clients or reimburses for services |
|
What are the 3 types of client fraud? |
1. Health care fraud 2. Bank fraud 3. Tax evasion |
|
What is corporate crime? |
Powerful institutions willfully violate laws that restrain institutions from doing social harm or that require them to do social good |
|
What are the usual three corporate crime targets? |
General public, environment, company workers |
|
What is corporate violence? |
The production of unsafe products and the failure of corporations to provide a safe working environment for their employees Intentional violations of health, safety, and environmental regulations |
|
What is a real-life example of corporate murder? |
The GM Recall |
|
What is cybercrime? |
Any crime that involves the use of computer technology or the internet |
|
What are the two categories of high-tech crimes? |
1. Traditional crimes 2. Technically advanced crimes |
|
In cybercrime, what is a traditional crime? |
Committed with aid of a computer (e.g. fraud, identity theft, cyberbullying, pornography) |
|
In cybercrime, what are technically advanced crimes? |
Exploit vulnerabilities found in digital technologies (e.g. hacking, spreading virus) |
|
In 2014, the RCMP concluded what three observations regarding cybercrime? |
1. Internet and related tech have reshaped Canada's society and economy 2. Cybercrime is expanding beyond the domain of criminals to 'criminals with specialized skills' 3. Cybercrime requires new ways of policing |
|
What are the four categories of hackers? |
1. Black hats 2. White hats 3. Grey hats 4. Suicide hackers |
|
What are black hat hackers? |
Hackers with a desire to cause harm, whether for profit, revenge, or sport |
|
What are white hat hackers? |
Hackers with good intentions, such as the desire to expose vulnerabilities in secure networks so that they can be patched; for this reason, white hats are sometimes hired as security analysis |
|
What are grey hat hackers? |
Perform both defensive and offensive activities |
|
What are suicide hackers? |
Intent on causing harm without any concern about being caught |
|
What are zero days? |
Flaws in software |
|
What is human trafficking? |
The recruitment, harbouring, and/or control of the movement of persons for the purpose of exploitation |
|
What are 6 common attributes of human trafficking victims? |
1. Innocent 2. Ashamed/embarrassed 3. Drug addicted 4. Abused 5. Helpless 6. Scared |
|
In human trafficking, what are 3 phases of "The Game"? |
Phase 1: Recruitment and luring Phase 2: Isolation Phase 3: Control and exploitation |
|
What is "the Walmart of child sex trafficking"? |
Craigslist |
|
What are the 3 main websites used for internet advertising of human trafficking? |
Facebook, Craigslist, and Backpage |
|
What are 7 ways in which pimps control their girls? |
1. Instilling fear through violence 2. Controlling basic needs 3. Confiscating ID 4. Threaten to harm family 5. Social isolation 6. Rewards for following rules or recruiting other girls 7. Debt bondage |