Questions:
1. Five forms of white collar crimes committed through the use of information technology?
2. Analysis on techniques used to commit crimes has changed with the advancing of information technology?
3. Example of each form of white collar crime?
According to Arnulf & Gottschalk (2012), White collar crime is a non-violent crime, involves the crime that is to be committed through deceit as well as motivated by the financial gain. The types of white collar crimes are internet fraud, tax evasion, money laundering as well as embezzlement. The most common crime that falls under white collar crimes is insurance fraud as well as tax evasion (Dobovšek & Slak, 2015). Many scams as well as frauds fall into the white collar crime. This crime is committed by the people in the business world to gain access to large amount of fund.
Computer and Internet fraud: The computer hackers steal the information that is contained on the computer hard disks which includes bank related details, details of credit card, proprietary information. The victim uses the technological tools to access a secure internet location (Krismann, 2014). The criminal can intercept the private information of the victim such as the id, password, and information of credit card. This is referred to as identity theft.
Computer hacking: It occurs when an unknown gains some illegal access to protect their computer by exploiting their vulnerabilities of the system. The hackers use the experts of the software to break the security codes to access the information stored in the computer (Gold, 2012). Web Application Security expertise tracks the hacking incident that are reported in medium and this result into the vulnerabilities in the web application security (Bhat & Abulaish, 2014).
Phishing: It is a virtual trap that is set by the offender to use the official e-mails to attract the victim; take them to a fake websites to take the personal information of the victim. The criminal requires the internal information of an organization by hacking the computer network of that organization (Heinonen, Spink & Wilson, 2014). They send e-mails to the targeted victims to click on an e-mail to provide their password, user id as well as access codes etc.
Copyright infringement: It is the activity that includes both physical harm and violence. The criminal uses the unauthorized use of the copyrighted materials. The use of internet is increasing for infringement activities that make the criminal sanction better prevention, thus the internet copyright infringement becomes a white collar crime. It causes many security risks to an organization that includes the infiltration of malware as well as viruses that threaten the security of the system and slow down the IT networks (Eivazi, 2012).
Money laundering: It is the associated with the crimes that provide financial gain to the criminal (Zabyelina, 2015). The criminal is using electronic technology to execute the crime of money laundering (Stack, 2015). The use of new technology provides more avenues to the criminal to launder fund. Therefore, the criminals are being benefited from the technology (Behrens, 2015).
A wide range of new technology has been developed that is used as a crime prevention tools. These innovation techniques are appearance of threat assessment protocols, new software programs is developed to prevent the identity theft, a new assessment tools is developed to identify the individuals those are likely offender within the specified frame of time (Furnell & Moore, 2014). A program referred to as GIS mapping is used to examine the location of the offender (Wright, 2012). The other area in which the information technology is used to prevent the crime is the use of newly developed software as well as creation of new devices to monitor the transaction over the internet on web bases social networking sites (Perri, 2011). It has changed the way of investigating the financial crime, internet related crime (Braithwaite, 2010).
Data encryption is the procedure that is used to prevent the cyber crime; it is used in cryptography to convert the plaintext into cipher text. Mainly, it is used to prevent the criminal to read the message of any recipient. In this procedure, each individual has a pair of keys, i.e. public as well as private key (Jo, Lee & Choi, 2015). Public key of each individual is published but the private key is kept back secret from others. The messages are being encrypted using the public key and it is decrypted using private key. Digital signature is the technique that is used to validate both the authenticity as well as integrity of the software as well as message or any digital document (Cui & Jiang, 2012). It solves the problem of tampering in digital communications (Zhu & Yang, 2015). It also provides the assurance of confirmation to identity as well as the importance of an electronic document (Savu, 2012). Therefore, digital signature makes complicated for the signer to deny have signed something as it is unique to both the document as well as signer. It is also used to provide safe transaction over the internet. In many countries, digital signature has the legal significance of signed documents (M E & K C, 2015).
Online fraud: Western union is used for doing online fraud; most of the scams encouraged the clients to use western union for transferring of funds (Sajid Bashir, 2011). As western union does not offer escrow services, thus the clients cannot get any return for non-receipt of goods as well as services (Gottschalk, 2011). It is not an appropriate way to transfer the funds for any business purposes.
Online hacking: The state of Montana’s department of health exposed that an information breach affected their business. It is being seen that the personal information of current as well as former residents, the families of the dead have been accessed in the attack. (Michael, 2012). It is not clear if the hackers are using the information or selling on black market (Lakoff, 2012). The hacker’s information gained some access to personal information like records of medical, records of insurance, address and certificates of date of birth (Gottschalk & Glasø, 2013).
Phishing: In the year 2003, the users received emails from eBay claim that the account of the users was about to hanging the information of the credit card that the genuine eBay already had (Gupta & Pieprzyk, 2011). It is easy to make website that is look like the organization’s site; the scam on the people being tricked by thinking them that it was being contacted by eBay and they were updating their account information in the eBay’s sites (Li, Zhao & Jiao, 2011).
Copyright infringement: Pharmaceutical companies make fake claims about drugs as well as factories are unlawfully dump toxic wastes. Hooker Chemical Company dumped toxic waste into canal in Nigeria falls and sold the land without disclose the dumping (Larsson, 2013). The land was sold to private housing developer and the resident’s faces major health problems such as birth defects etc (Miller, 2012).
Money laundering: A French bank fled guilty for falsifying business record after it was discovered that the institution violated US sanctions against Cuba, Sudan and Iran (Mugarura, 2015). As a result, the bank was to pay the amount of $8.9 billion which is the largest fine for violating those sanctions (Markovska & Adams, 2015).
Conclusion
Internet is a new access to white collar crimes. It has a bigger effect on the economy. It is a non-violent act that is committed by business person as well as public official. Most of the white collar crimes involved significant use or misuse of a computer. Social as well as technological changes give rise to white collar crime. The hackers access information that is contained on the computer hard disks which includes bank related details, details of credit card etc. Phishing is a virtual trap that is set by the cyber criminals to use the official e-mails to attract the victim and take them to a fake websites and then by tricking the victim and take their personal information. Data encryption is used to prevent the criminal to read the message of any recipient. Therefore, digital signature makes complicated for the signer to deny have signed something as it is unique to both the document as well as signer.
References List
Arnulf, J., & Gottschalk, P. (2012). Heroic Leaders as White-Collar Criminals: An Empirical Study. Journal Of Investigative Psychology And Offender Profiling, 10(1), 96-113.
Behrens, T. (2015). Lift-off for Mexico? Crime and finance in money laundering governance structures. J Of Money Laundering Control, 18(1), 17-33.
Bhat, S., & Abulaish, M. (2014). Using communities against deception in online social networks. Computer Fraud & Security, 2014(2), 8-16.
Braithwaite, J. (2010). Diagnostics of white-collar crime prevention. Criminology & Public Policy, 9(3), 621-626.
Cui, X., & Jiang, L. (2012). Design and Realization of Digital Signature System. AMR, 562-564, 872-875.
Dobovšek, B., & Slak, B. (2015). Old horizons of organised-white collar crime. Journal Of Financial Crime, 22(3), 305-317.
Eivazi, K. (2012). Is termination of internet users’ accounts by an ISP a proportionate response to copyright infringement?. Computer Law & Security Review, 28(4), 458-467.
Furnell, S., & Moore, L. (2014). Security literacy: the missing link in today’s online society?. Computer Fraud & Security, 2014(5), 12-18.
Gold, S. (2012). Hacking on the hoof. Engineering & Technology, 7(3), 80-83.
Gottschalk, P. (2011). White-Collar Crime and Police Crime: Rotten Apples or Rotten Barrels?. Critical Criminology, 20(2), 169-182.
Gottschalk, P., & Glasø, L. (2013). Gender in White-Collar Crime: An Empirical Study of Pink-Collar Criminals. International Letters Of Social And Humanistic Sciences, 4, 22-34.
Gupta, G., & Pieprzyk, J. (2011). Socio-technological phishing prevention. Information Security Technical Report, 16(2), 67-73. Heinonen, J., Spink, J., & Wilson, J. (2014). When crime events defy classification: The case of product counterfeiting as white-collar crime. Security Journal.
Jo, S., Lee, S., & Choi, D. (2015). Data Preprocessor for Order Preserving Encryption. AMM, 752-753, 1356-1359.
Krismann, C. (2014). Sources: Encyclopedia of White-Collar and Corporate Crime. Reference & User Services Quarterly, 53(3), 278-278.
Lakoff, A. (2012). Ian Hacking. Public Culture, 24(1 66), 217-232.
Larsson, D. (2013). The Reaction Towards White Collar Crime: When White Collar Crime Matters. TOCRIJ, 6(1), 1-9.
Li, Y., Zhao, L., & Jiao, R. (2011). Phishing web image segmentation based on improving spectral clustering. J. Electron.(China), 28(1), 101-107.
M E, R., & K C, R. (2015). Application of Classical Encryption Techniques for Securing Data- A Threaded Approach. IJCI, 4(2), 125-132.
Markovska, A., & Adams, N. (2015). Political corruption and money laundering: lessons from Nigeria. J Of Money Laundering Control, 18(2), 169-181.
Michael, K. (2012). Hacking: The Next Generation. Computers & Security, 31(6), 799.
Miller, A. (2012). White coats and white-collar crime. Canadian Medical Association Journal, 185(1), E19-E20.
Mugarura, N. (2015). The jeopardy of the bank in enforcement of normative anti-money laundering and countering financing of terrorism regimes. J Of Money Laundering Control, 18(3), 352-370.
Perri, F. (2011). White-Collar Criminals: The ‘Kinder, Gentler’ Offender?. Journal Of Investigative Psychology And Offender Profiling, 8(3), 217-241.
Sajid Bashir,. (2011). Antecedents of white collar crime in organizations: A literature review. AFRICAN JOURNAL OF BUSINESS MANAGEMENT, 5(35).
Savu, L. (2012). Combining Public Key Encryption with Schnorr Digital Signature. JSEA, 05(02), 102-108.
Stack, G. (2015). Baltic shells: on the mechanics of trade-based money-laundering in the former Soviet space. J Of Money Laundering Control, 18(1), 81-98.
Wright, R. (2012). Prosecution white collar crime – what’s going on?. Ac, 1998(12).
Zabyelina, Y. (2015). Reverse money laundering in Russia: clean cash for dirty ends. J Of Money Laundering Control, 18(2), 202-219.
Zhu, S., & Yang, X. (2015). Protecting data in cloud environment with attribute-based encryption. International Journal Of Grid And Utility Computing, 6(2), 91.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download