SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
White Collar Crime Vocab
Start Test
Study First
Subjects
:
law
,
business-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Legally exploits security to test systems
Bad Apples
Till Skimming
White Hat Hacker
Environmental protection agency
2. Writing worthless checks and using finical institutions to conceal their true value
Computer Fraud and Abuse Act (1986)
anti trust law
Insider Trading
Check kiting
3. Manipulating - destroying or removing labels
National Stolen property act
Rockefeller
Misbranding
Bad Apples
4. Adding or removing a substance
Float
False advertising
Adulteration
Federal trade commission
5. (economics) a market in which there are many buyers but only one seller
monopoly
Till Skimming
Deterrence Theory
Bad Barrels
6. United States industrialist who made a fortune in the oil business and gave half of it away (1839-1937)
Rockefeller
Psychopathy
Adam Smith
Mail Fraud
7. Individuals have criminal tendencies that they import to the organizational context to commit both occupational and organizational crimes
White Collar Crimes
monopoly
Bad Barrels
Bad Apples
8. Said the free market - not the legal system is the best way to deal with business which harm people... govern themselves
Insider Trading
Bad Barrels
Misbranding
Adam Smith
9. Excessive trade transaction to raise commission
Churning
Securities Exchange Commission
Black Hat Hacker
Adulteration
10. United States industrialist who made a fortune in the oil business and gave half of it away (1839-1937)
Rational Choice
Bad Apples
Rockefeller
Till Skimming
11. Taking cash from a register - over charging customers or under ringing sales
Check kiting
Misbranding
Bad Apples
Till Skimming
12. Deceiving consumers with inaccurate claims
False advertising
White Hat Hacker
Deterrence Theory
Computer Fraud and Abuse Act (1986)
13. Something about the organizational context induces otherwise good people to commit crimes or unethical acts
abscam
Securities
Psychopathy
Bad Barrels
14. Jurisdictions over false advertising
Pinto Papers
Securities
Federal trade commission
Computer Fraud and Abuse Act (1986)
15. Time between check issuance and presentation
Float
abscam
Rockefeller
Grey Hat Hacker
16. One person represents himself as another to monetary gain
Deterrence Theory
Wire Fraud
Bernie Madoff
dentity Theft
17. Individuals have criminal tendencies that they import to the organizational context to commit both occupational and organizational crimes
Grey Hat Hacker
Adulteration
Culture of competition
Bad Apples
18. Crimes Committed by legitimate businesses
Bad Barrels
White Collar Crimes
Psychological Theory
Float
19. Crimes committed by company
Psychological Theory
Check kiting
anti trust law
Corporate crime
20. Arab Scam or Abdul Scam - an FBI sting operation in which agents posed as rich oil sheiks and bribed members of Congress
Grey Hat Hacker
Till Skimming
Culture of competition
abscam
21. Deceptive activities that affect the welfare of securities
Grey Hat Hacker
Adam Smith
incerity Fraud
meat packers
22. Paper where Ford admitted safety problems in a design but rationalized it was cheaper to pay a law suit
incerity Fraud
Pinto Papers
Wire Fraud
monopoly
23. Writing worthless checks and using finical institutions to conceal their true value
Float
White Collar Crimes
Check kiting
Float
24. Certainty - severity - and celerity - How likely it is to be punished - How harsh that punishment will be - How quickly the punishment will be applied
dentity Theft
Bonds and Employment
Deterrence Theory
Bernie Madoff
25. Individuals choose to commit crimes as a result of some calculus - Bounded rationality
National Stolen property act
Misbranding
Wire Fraud
Rational Choice
26. Big companies may benifit from regulatory laws but little companies don't make enough money to meet regulatory laws
meat packers
Adulteration
Pinto Papers
Computer Fraud and Abuse Act (1986)
27. Something about the organizational context induces otherwise good people to commit crimes or unethical acts
Environmental protection agency
Bad Apples
Bad Barrels
False advertising
28. Using the mails to complete criminal activity
Mail Fraud
anti trust law
Pozi Scheme 1920
Securities Exchange Commission
29. Federal agency that protects the environment
Adam Smith
abscam
Environmental protection agency
Till Skimming
30. Deceptive activities that affect the welfare of securities
Bernie Madoff
Pinto Papers
Misbranding
incerity Fraud
31. One person represents himself as another to monetary gain
Computer Fraud and Abuse Act (1986)
dentity Theft
Securities
National Stolen property act
32. Big companies may benifit from regulatory laws but little companies don't make enough money to meet regulatory laws
meat packers
White Hat Hacker
Adulteration
Bad Barrels
33. Famously - Sutherland claimed that WC criminals do not suffer from psychological disorders
Psychological Theory
Insider Trading
dentity Theft
Securities Exchange Commission
34. Trading securities based on information that is not public knowledge
meat packers
Insider Trading
Rational Choice
Wire Fraud
35. Deceiving consumers with inaccurate claims
incerity Fraud
False advertising
Grey Hat Hacker
Float
36. Taking cash from a register - over charging customers or under ringing sales
Pinto Papers
Rational Choice
Till Skimming
Adam Smith
37. Arab Scam or Abdul Scam - an FBI sting operation in which agents posed as rich oil sheiks and bribed members of Congress
Adam Smith
Pozi Scheme 1920
dentity Theft
abscam
38. Legally exploits security to test systems
Federal trade commission
Insider Trading
White Hat Hacker
Churning
39. Commitment to one's job should constrain crime - Hollinger and Clark (1983) found deviant workplace behavior increased when employees intended to leave their current job
Culture of competition
monopoly
Bernie Madoff
Bonds and Employment
40. Jurisdictions over false advertising
Float
Federal trade commission
Securities Exchange Commission
Corporate crime
41. As new clients are made - their money is used to pay original investors
White Hat Hacker
Pozi Scheme 1920
Psychopathy
Computer Fraud and Abuse Act (1986)
42. Time between check issuance and presentation
Adulteration
Securities Exchange Commission
Pinto Papers
Float
43. As new clients are made - their money is used to pay original investors
False advertising
Bad Apples
Corporate crime
Pozi Scheme 1920
44. Individuals choose to commit crimes as a result of some calculus - Bounded rationality
Adam Smith
Rockefeller
Bernie Madoff
Rational Choice
45. Low or absent affect - Lack of empathy - Inability to form attachment - Able to appear outwardly normal
Churning
National Stolen property act
Psychopathy
Grey Hat Hacker
46. Illegal activity using phone - Television - cable - or rodeo lines
Bad Apples
Wire Fraud
Environmental protection agency
Bad Barrels
47. Commitment to one's job should constrain crime - Hollinger and Clark (1983) found deviant workplace behavior increased when employees intended to leave their current job
incerity Fraud
Bonds and Employment
Grey Hat Hacker
dentity Theft
48. Crimes that benefit oneself - Crimes against their employee
Black Hat Hacker
Wire Fraud
Psychological Theory
Occupational Crime
49. Transactions involving $5000 or more in federal offenses
National Stolen property act
Deterrence Theory
Pozi Scheme 1920
Securities Exchange Commission
50. Created 3 new crimes - Unauthorized access with intent to defraud - Malicious damages via unauthorized access - Trafficking in passwords with intent to defraud
Occupational Crime
Check kiting
Federal trade commission
Computer Fraud and Abuse Act (1986)