SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
White Collar Crime
Start Test
Study First
Subjects
:
law
,
business-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To conceal their own errors [make it look like it was the manager's fault] - To gain time off - For more pay [brake a system so they can charge to fix it] - To express their contempt and anger with their work and employer
Why commit Sabotage
Raj Rajaratnam
Corporate stealing from employees
Pyramid Schemes
2. A type of Employee Crime: the destruction or fraudulent appropriation of another's money which has been entrusted to one's care
Embezzlement
Corporate Tax Evasion
Who commits insider trading
Kevin Mitnick
3. Large corporations taking advantage of political corruption - the absence or paucity of regulatory controls - and the desperation for economic enterprise characteristic of many developing nations
What Martha Stewart was jailed for
Corporate transgressions
Ponzi scheme largest in history to date
Corporate fraud
4. Refers to illegal activity that occurs in the world of finance and financial institutions
Types of Retail Crime
Financial Crime
ImClone Case? Individual involved?
Pyramid Schemes
5. They are the top people in the corporate world - government - and military whom have 'interlocks' - or a complex network of ties - that enable them to advance their interrelated interests and move quite easily between high-level private- and public-s
Strategic bankruptcy
Power elite ...
Insider trading
Enron's Main People
6. Billing for unnecessary tests and services - is the most common form of medical fraud and it is extremely difficult to prove and prosecute
Types of Employee Crime
Overutilization
What Martha Stewart was jailed for
Robber barons
7. Food - transport - medical
Various forms of corporate violence that are directed at the public
Raj Rajaratnam
Health Care Fraud
Pilfering
8. Refers to lawyers engaging in criminal conduct in the course of discharging their professional duties
Legal Crime
Different types of hackers
Chiseling
What Martha Stewart was jailed for
9. Pyramid Scheme (has product) - A variant of a Ponzi Scheme - Involves recruiting other people into the business in other to sustain profit rather them a truly profitable enterprise [MonVie Acai Berry juice
Insider trading
Price gouging and manipulation
Transnational corporations
Pyramid Schemes
10. Hospitals have defraud the government of billions of dollars annually through Medicaid and Medicare. [upcoding - service never performed - kickbacks - and self-referrals]
How Corporate violence differs from conventional interpersonal violence
Love Canal
Health Care Fraud
Corporate Tax Evasion
11. Refers mainly to small - inexpensive - and expendable components and tools such as nails - bolts - scrap metals - pliers - and drill bits.
Health Care Fraud
Difference between a Ponzi Schemes and a Pyramid Scheme
Property of uncertain ownership
Pilfering
12. 'offenses committed by either corporate officials or the corporation itself - which benefit their corporation'
Monopoly
Ponzi scheme largest in history to date
Why commit Sabotage
Corporate crime
13. Crime that is defined as illegal or harmful conduct committed specifically in the context of their religious entity such as a religious leader may generate a bottomless donation basket for gullible believers to offer money which is used for corrupt p
Technocrime Five types
Inventory Shrinkage
Religious Crime
Difference between a Ponzi Schemes and a Pyramid Scheme
14. Manipulation of products - Short weighing - Bait-and-switch - Collection of taxes on nontaxable items [auto shop labor] - Wage theft
Monopoly
Various forms of corporate violence that are directed at the public
Pilfering
Types of Retail Crime
15. The corporate empires of the robber barons (for example: Rockefeller - Carnegie - Vanderbilt - Gould - and Frick) of the second half of the 19th century were involved in every manner of bribery - fraud - stock manipulation - predation against competi
Overutilization
Robber barons
Historical development of the corporation and corporate crime
Technocrime Five types
16. Refers to a type of Employee Crime: known as theft through misrepresentation
Monopoly
Social Engineering
Fraud
Hacking
17. Let the buyer beware - has traditionally regulated the relationship between buyers and sellers
Caveat Emptor
Various forms of corporate violence that are directed at the public
Role of the corporation in modern society
Monopoly
18. Pilfering - Chiseling - Fraud - Embezzlement
Types of Employee Crime
Paper entrepreneurs
Overutilization
Manville case
19. For lying about a stock sale conspiracy - and obstruction of justice.
Economic exploitation of employees
Defense Contract Fraud
What Martha Stewart was jailed for
Kevin Mitnick
20. 1980s dubbed as the 'biggest bank robbery' ever - S&Ls offered unrealistically high interest rates to attract large sums of money - money invested was then lent to developers engaged in highly speculative (risky) projects; which bound to go broke unl
Pilfering
S&L Crisis
Difference between a Ponzi Schemes and a Pyramid Scheme
Financial Crime
21. The Madoff ponzi scheme was surely the largest in history to date [Started in the 1990s and defrauded thousands of investors of recorded $65 Billion]
Ponzi scheme largest in history to date
Enron's Main People
Finance crime
Chiseling
22. Refers to monogrammed clothing - wallets - jewelry - personally modified tools
Caveat Emptor
Types of Retail Crime
Personal Property
Various forms of corporate violence that are directed at the public
23. A producer of asbestos products which was later found linked to an ultimately fatal lung disease resulting from exposure to asbestos. Manville had internal medical reports of asbestosis among its workers; however - based on cost-benefit analysis - it
Manville case
Power elite ...
Ponzi Schemes (no product
Company Property
24. Internal computer crimes (sabotaging programs) - Telecommunications crimes (hacking) - Computer manipulation crimes (embezzlements and fraud) - Computers in support of criminal enterprises - Hardware / software thefts (corporate level mainly)
Technocrime Five types
S&L Crisis
Defense Contract Fraud
Chiseling
25. Corporations used to annihilate their competitors by undercutting their price and by pressuring dealers - sales agents - unions - and other parties not to work with their competitors
Ford Pinto
Predatory pricing
Pilfering
Why commit Sabotage
26. Activities deviating from norms of employers - professional associations - or coworkers within an occupational setting - such as malingering or sexual harassment
Ping-ponging
Occupational Deviance
Financial Crime
Pilfering
27. High returns are promised - Some early investors may receive payoffs - but most of the invested money is spent by the perpetrators
Kevin Mitnick
Ponzi Schemes (no product
S&L Crisis
Corporate Tax Evasion
28. Gaining unauthorized access to computer system - file or network by using their specialized knowledge of computers
Difference between a Ponzi Schemes and a Pyramid Scheme
Types of Retail Crime
Hacking
Monopoly
29. Ponzi Schemes has (no a product) - While a Pyramid Scheme (has a product
Property of uncertain ownership
Difference between a Ponzi Schemes and a Pyramid Scheme
Raj Rajaratnam
Enron's Main People
30. A case in which the Ford company placed the gas tank in the rear of the car to save money on engineering costs. When the car was involved in rear-end collisions the gas tank exploded - burning some people to death
Ponzi scheme largest in history to date
Ford Pinto
Insider trading
Steering
31. Send you to a different place when they could have diagnosed it themselves
Ping-ponging
Holtfreter - Van Slyke and Blomberg - 2006
Kevin Mitnick
How Corporate violence differs from conventional interpersonal violence
32. Its when a corporation commits criminal offences that are non-violence but have vast political and economic consequences. Sutherland
Parallel pricing
Corporate fraud
Hacking
Academic Crime
33. Galleon Hedge Fund Case was one of the largest hedge funds in the world managing over $7 Billion. - Believed to have obtained inside information from a number of companies - Advanced Micro Devices Inc. - Goldman Sachs Group - Intel Corporation - Raj
Predatory pricing
Technocrime Five types
Steering
Raj Rajaratnam
34. Is the act of manipulating people into performing actions or divulging confidential information - rather than by breaking in or using technical cracking techniques
Social Engineering
Ponzi scheme largest in history to date
The Dalkon Shield
Medical Crime
35. A Corporation that ruthlessly undercut virtually all competitors in order to obtain control 95% of the market.
Fraud
Manville case
Love Canal
Monopoly
36. Corporate Officials - Directors and Mangers - Outsiders who are 'tipped' [CEO tips family members - 'it going to be a bad month'] - Bankers - accountants and lawyers who provide services with confidential information about securities being traded - [
Conflict of Interest
Who commits insider trading
Family ganging
Standard Oil Corporation - presided over by John D. Rockefeller
37. White hats are good. Black hats are bad
Academic Crime
Company Property
ImClone Case? Individual involved?
Different types of hackers
38. Corporations operating in third-world countries include highly hazardous and dangerous working conditions at industrial facilities; exportation of unsafe products
Social Engineering
Family ganging
Transnational corporations
Corporate Tax Evasion
39. Corporations are increasingly controlled by paper entrepreneurs - or investors who are principally concerned with short-term profit. These investors are far less likely to be strongly committed to product development of to the local communities in wh
Manville case
Paper entrepreneurs
Health Care Fraud
Legal Crime
40. At one point the most-wanted computer criminal in the U.S. and was convicted of various computer and communications related crimes
Economic exploitation of employees
Kevin Mitnick
Different types of hackers
Corporate Tax Evasion
41. Major corporations cost US taxpayers huge amounts by evading their fair share of the tax burden
Predatory pricing
Embezzlement
Corporate Tax Evasion
Fraud
42. The Hooker Chemical Corporation bought the canal; drained it - and began dumping metal drums filled with highly toxic chemical wastes. Eventually the property was acquired by a local school board - and both a school and residential neighborhood were
Corporate Tax Evasion
Love Canal
Chiseling
Robber barons
43. Kenneth Lay - Jeffery Skilling - Andy Fastile - Luis Barget
44. Goods and supplies that are delivered and paid for but cannot be accounted for by sales or stockroom surveys [because the items disappeared]
Academic Crime
Inventory Shrinkage
The Dalkon Shield
Property of uncertain ownership
45. Refers to buying or selling a security - in breach of a fiduciary duty or other relationships of trust and confidence - while in possession of nonpublic information about the security
Insider trading
Inventory Shrinkage
Academic Crime
Standard Oil Corporation - presided over by John D. Rockefeller
46. Refers to a type of Employee Crime: known as petty theft
Pilfering
Legal Crime
Who commits insider trading
Robber barons
47. Corporations with contracts to provide goods and services to the government. [Halliburton no-bid contracts]
Manville case
Health Care Fraud
Overutilization
Defense Contract Fraud
48. An intrauterine birth control device in the 1960's in which it was discovered that bacteria was traveling up the wick of the device into the womb.
Raj Rajaratnam
Ponzi scheme largest in history to date
The Dalkon Shield
Robber barons
49. Bankruptcy method used to avoid meeting certain burdensome finical obligations - including obligations to creditors
Strategic bankruptcy
Technocrime Five types
Corporate crime
Holtfreter - Van Slyke and Blomberg - 2006
50. Refers to plagiarism - embezzlement of university discretionary funds - forgery - claims about credentials
Corporate fraud
Robber barons
Hacking
Academic Crime