Electoral fraud

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 45 of 50 - About 500 Essays
  • Improved Essays

    Madoff Case

    • 555 Words
    • 3 Pages

    It was also recorded that in 2004 and 2005 that the examinations that were conducted sufficient evidence was found to determine suspicious, however once again there was total disregard. It was suggested in the OI C report that lack of training and experience kept the SEC from pursing an investigation. The relatively inexperienced Enforcement staff failed to appreciate the significance of the analysis in the complaint, and almost immediately expressed skepticism and disbelief. Most of their…

    • 555 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Fraud Under Section 1030

    • 674 Words
    • 3 Pages

    Background According to the United States Code under Section 1030, computer fraud is a serious offense and regarded as an illegal act. The United States Code addresses fraud and any related activities in connection with computers. Hence, computer fraud is defined as a deed of exploiting computers, internet, internet devices, and internet services to defraud people, companies or government agencies. Some of the methods and techniques used are DDoS, phishing, social engineering, and viruses to…

    • 674 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Cora Garcia Mrs. Briscoe Honors English 1 Were You Hacked, Or Nah? It’s more than likely that you have been hacked before. Records say that more than 145 million Americans have been victims to hackers. It can be useful to think of hackers as burglars and malicious software as their burglary tools. Having researched cybercrime and technology use among criminal populations for more than a decade, I know that both types of miscreants want to find ways into secure places – computers and…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    We live in a world where technology is changing at a breakneck pace. Having that in mind, white-collar crime is changing at the same pace. White-collar crime methodologies and goals have changed and are representative of the ever-changing technological advancements of the day. Keeping those changes in mind, the question arises, are we leading to the rise in white-collar crime by embracing those technological advances? Historical and current criminal justice data reflects reported crime data…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Every day, emails are sent to people informing them they have won a lottery, a free prize or come into money. While most people delete them, a few do not, and it can lead to families giving away thousands of dollars to con men in the pursuit of an elusive free gift or big payday. Capt. Doug Hunter talked about a number of scams deputies of the Wayne County Sheriff’s Office have been alerted to and investigated during a Skimmer and Scam Summit Tuesday at Fisher Auditorium. The problem faced by…

    • 628 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The prevalence of technology in modern societies has further connected people over the past decades. Technologies such as cellphones and the internet have been used for communication and transactions between people. However, the use of technology possess inconspicuous risks. The use of electronic surveillances is not acceptable for the intrusion of personal privacy because of the lack of protection it can give to the personal information of a person. An examination of the literature will prove…

    • 474 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Social Engineering Attack

    • 467 Words
    • 2 Pages

    My Topic for the Lesson 8 Presentation The topic I have chosen for my presentation is, “Preventing Social Engineering Attacks.” A social engineering attack is one of the most powerful weapons used to steal people’s passwords, credit cards, and personal data. It takes advantage of the fact that the biggest vulnerability of any security system is the users themselves. Social Engineering uses psychological tricks in order to get users to volunteer their personal information. These attacks can be…

    • 467 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Skeletal Outline • Jefferson County, Alabama o Two major reasons for Jefferson County’s $4 billion debt (largest before Detroit’s case) is due to sewer project and corrupt financial dealing. o Revenue are raised from residents who uses the service. o JPMorgan Chase was able to influence Jefferson County to a bond deal that had complicated terms and the ability to interest-rate swap. o With no increase in revenue as the market interest rate went up due to the swapping interest rate deal, so…

    • 499 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Mega-star music producer Scott Storch filed for bankruptcy yesterday, officially claiming a meager $3,600 in assets and $100 in cash. In 2010 he was worth $70 million. Storch's fortune came from producing blockbuster hits for artists like Beyonce, Christina Aguilera and Justin Timberlake, but he has allegedly blown it all on cars and cocaine. In 2010, Storch counted a total of 13 cars in the garage of his Miami mansion, including a $600,000 Mercedes SLR and a $1.7 million Bugatti Veyron. He…

    • 390 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Year 2000

    • 980 Words
    • 4 Pages

    As the amount technology available continued to spread at an almost exponential rate, the size of computers, which once took up an entire room, and their price were reduced down to more manageable sizes. As a result, computers become a commonplace piece of equipment found in many workplaces and family living rooms. However, as the year 2000 drew near, people began to fear that drastic changes would occur in their lives because of a simple bug called the Year 2000, or simply, Y2K. People’s fears…

    • 980 Words
    • 4 Pages
    Improved Essays
  • Page 1 42 43 44 45 46 47 48 49 50