The virtual ubiquity of information technology

Given the virtual ubiquity of information technology (IT) today, it is not surprising that while collar crime using these resources has assumed new importance and relevance (Dervan, 2014). As discussed further below, white collar crimes are by definition nonviolent in nature but the enormous amount of funds that are derived from such unlawful activities are increasingly being diverted to fund violent terrorist organizations that target the interests of the United States at home and abroad (Ndubueze & Igbo, 2016; Priyatno, 2017). The purpose of this paper is to provide an overview of white collar crime in general and how IT has been used to perpetrate these crimes in recent years in particular. In addition, an examination will also be provided concerning the various types of white collar crimes that are committed using IT and how they are facilitated through collaboration between mainstream business practitioners and the criminal underworld preparatory to developing a final study concerning these issues. Finally, a discussion concerning how the current legal framework in the U.S. only encourages white collar crimes by high-level executives and corresponding recommendations will conclude the study.

Review and Discussion

Overview of white collar crime

In a speech delivered at the American Sociological Society in 1939, sociologist Edwin Sutherland coined the term “white-collar crime” to describe “crimes committed by a person of respectability and high social status in the course of his occupation” (as cited in Cliff & Wall-Parker, 2017, p. 1). This popular perception of white collar crimes being typically committed by the more otherwise-respectable members of American society have resulted in a concomitant view that these perpetrators should be treated less harshly than hardened criminals that engage in violent crimes. As previously reported, the definition provided by Black’s Law Dictionary (1990), states that white collar crime is “a term signifying various types of unlawful, nonviolent conduct committed by corporations and individuals including theft or fraud and other violations of trust committed in the course of the offender’s occupation” (p. 1596). This legal definition of white collar crime is not universally accepted, however, and many sociologists cite other salient factors are being characteristic of these types of criminal behaviors, but they all share two common features that make this category of crime appear less “criminal” in nature compared to other categories: (1) their nonviolent nature and (2) their inextricable connection with perpetrators’ occupations.

The prevailing view that white collar criminals should be treated differently from other categories of law offenders serves, at least in part, to explain why some people turn to crime in order to achieve their personal and professional goals even when they were not necessarily forced to do so. Furthermore, there is a growing body of evidence that indicates some managers will commit white collar crimes whether they need to or not depending on the circumstances (Cliff & Wall-Parker, 2017). When managers are confronted with financial pressure, however, the likelihood that they will engage in some type of fraudulent behaviors at work intensifies greatly. In fact, financial pressure is considered one of the three primary causes of white collar crime as shown in Figure 1 below.

Figure 1. The fraud triangle: a framework for identifying white collar crime opportunities

Source: http://www.brumellgroup.com/wp-content/uploads/Fraud_Triangle-680×380.png

As the fraud triangle depicted in Figure 1 above makes clear, many people may succumb to the temptation to commit white collar crimes by virtue of this combination of factors, but it is important to note that all of them (or even two of them) are not necessarily essential. In other words, each of these factors (or another factor altogether) may be sufficiently compelling to induce even the most loyal and honest employees to perpetrate some type of white collar crime. Moreover, it is the rare criminals who are unable to rationalize their actions for whatever reasons. The fact that the prevailing social view of such crimes places them in a lesser category compared to violent crimes only adds additional impetus to the process. It is also important to note that the “opportunity” factor has been amplified greatly in recent years through the proliferation of IT resources at home and in the workplace, and these issues are discussed further below.

White collar crimes and information technology

Criminals of yesteryear could only dream about a technology that allowed them to commit crimes without ever leaving the comfort of their homes and it is little wonder that IT has created an explosion in white collar crimes. Based on the foregoing definition of white collar crime as involving individuals’ occupation and being nonviolent in order to realize an unjust gain of some sort, it is readily apparent that IT can be exploited in a number of ways. While gaining unauthorized access to computer systems is a crime in and of itself, the foregoing definition of white collar crime also requires that the perpetrators unjustly benefit materially (e.g., monetarily) in some fashion as a part of their occupation.

One of the most common strategies for using IT for white collar crimes is to embezzle funds from an employer. According to one law firm, “Embezzlement [can] involve the complex manipulation of computers through what investigators and corporate financial security experts refer to as computer embezzlement” (What is computer embezzlement?, 2018, para. 3). While the types of white collar crimes that can be committed using IT resources are limitless, the five most common types of these types are as follows:

1. Logic bombs: These methods use time-specific computer commands that are invoked at different times in order to illegally transfer funds, delete data or even turn off a computer system at prescheduled intervals;

2. Data diddling: This method disables a computer system’s embezzlement-detection control mechanisms;

3. Trapdoor and “salami” techniques: This method relies on the “slow but sure” approach to embezzling funds by deducting tiny amounts of funds from every financial transaction in the expectation that their loss will go unnoticed and illicitly diverting it them another account to which the employee has access.

4. Skimming: Popularly referred to as identity theft, this method involves stealing consumers’ computer-based account information from an organizational database and using it to illegally acquire goods and services.

5. Trojan horses: Finally, this method involves planting hidden commands that invoke unauthorized functions in existing computer systems, typically to divert funds to another account to which the perpetrator has access (What is computer embezzlement?, 2018)

Although the five types of computer-assisted white collar crimes listed above are the most common, it is reasonable to posit that this list is certainly not exhaustive. Indeed, a trusted insider armed with nothing more than a company laptop and ill intentions can manipulate accounts payable and receivable as well as supply chain and inventory data to the point where the ill-gotten gains are so well concealed that it requires a full-blown audit to discover the crimes. For example, in the case of skimming techniques, an employer may remain unaware of these types of illegal activities unless and until the perpetrator is caught outside of the workplace setting. Similarly, payroll executives may be able to exploit weaknesses in their payroll systems to divert funds or pay fictitious employees with money that is diverted to an account to which they have access.

Likewise, insiders using the trapdoor/salami techniques may rake in thousands of dollars from the fractions of pennies left over from millions of financial transactions processed by their employers each week, reassured that few people will notice a missing fraction of a cent here or there. Even though larger organizations have more resources available and more avenues by which IT can be used to embezzle funds, small businesses in particular lack the same in-house resources and expertise enjoyed by the larger counterparts that are needed to monitor and detect these types of white collar crimes (van Wyk, 2017). Given that the majority of small businesses fail within the first year of operation, it is also reasonable to suggest that these types of white collar crimes are the cause in many cases. In fact, in some scenarios, these types of white collar crimes may go on for years before being discovered, if they ever are, and perpetrators are reassured that even if they are caught, they will likely be treated far less harshly than violent criminals as discussed further below.

Current legal framework for white collar crime in the U.S.

It is one of the perplexing aspects of the American criminal justice system that criminals that use a $50 “Saturday night special” to rob people of a few dollars are treated far more harshly, including lengthy prison sentences, than white collar criminals that may be guilty of extorting tens or even hundreds of thousands of dollars. One of the recurrent themes that quickly emerges from the scholarship concerning the use of IT resources and white collar crime is the laxity of punishment meted out to high-placed executives who intentionally bilk shareholders out of millions of dollars, only to receive a legal slap on the wrist as a result.

If criminal charges are brought at all, white collar criminals can expect to receive a monetary sanction of some sort (invariably far less than their illicitly gotten gains) or perhaps lose their jobs (Arya & Sun, 2011). In truly extreme cases, if white collar criminals are actually sentenced to serve prison time, they can expect to serve their time in cozy minimum-security federal prisons if their crimes involved the interstate transfer of funds where they enjoy comparatively comfortable accommodations. This does not mean, of course, that the penalties for violent crimes should be lowered to match the punishments given to white collar criminals, but it does mean that the problem is currently severe and most authorities agree that the proliferation of IT resources throughout all organizational settings will only make things worse in the future.

The current legal framework also fails to take into account the potential for the funds obtained through white collar crimes to be diverted to criminal organizations, including most especially international terrorist organizations that use this money to fund their violent operations, including those directed against the United States. Clearly, the percentage of white collar crimes being used for this purpose is currently most likely small, but the widespread deployment and increasing sophistication of IT mean that this percentage will probably grow well into the foreseeable future unless steps are taken to address the problem of white collar crime head on.

The optimal approach to reducing white collar crime in the United States is to remove the opportunities to commit these crimes. Far too many businesses, especially smaller enterprises, place an enormous amount of trust in their employees and fail to implement the security protocols that are needed to protect IT systems and sensitive data. As the fraud triangle depicted in Figure 1 above made clear, the opportunity to commit a white collar crime is one of the overarching reasons people succumb to the temptation, and removing this pillar of the triad represents the first important step in the right direction.

Conclusion

By definition, white collar crimes are nonviolent, and are committed as part of individuals’ occupation which provide them with some type of unjust monetary gain. This definition means that the cashier who takes some office supplies home or slips a few bucks into his pocket instead of the cash register is guilty of a white collar crime. The popular view of white collar criminals, though, is that of a fat-cat executive who embezzles large sums of money and only receives a modest punishment if caught. The research was consistent in showing that this prevailing view and the legal framework used to combat it needs to be changed to reflect the reality of white collar crime and its facilitation through information technologies.

References

Arya, A. & Sun, H. L. (2011, January 1). Stock option backdating at Comverse Technology: Ethical, regulatory, and governance issues. Journal of the International Academy for Case Studies, 17(1), 55-62.

Asner, M. A. (2015, February 3). White-collar crime, banks are more often prey than predator. American Banker, 1(17), 13.

Black’s law dictionary. (1990). St. Paul, MN: West Publishing Company.

Ball, T. (2015, January 1). International tax compliance agreements and Swiss bank privacy law: A model protecting a principled history. The George Washington International Law Review, 48(1), 233-240.

Cliff, G. & Wall-Parker, A. (2017, April). Statistical analysis of white collar crime. Criminology and Criminal Justice. Retrieved from http://criminology.oxfordre.com/view/10.1093/ acrefore/9780190264079.001.0001/acrefore-9780190264079-e-267.

Dervan, L. E. (2011, December). International white collar crime and the globalization of internal investigations. Fordham Urban Law Journal, 39(2), 361-365.

Dervan, L. E. (2011, December). International white collar crime and the globalization of internal investigations. Fordham Urban Law Journal, 39(2), 361-365.

Eichenwald, K. (2015, May 8). The ‘flash crash’ case doesn’t add up; the government’s case against “Mr. Flash Crash” is a misguided sham. Newsweek, 164(18), 37.

Goldfarb, R. (2018, Winter). No big-game hunting at Justice: How federal prosecutors let major white-collar criminals off the hook and stick shareholders with the costs of corporate crime. The American Prospect, 29(1), 110-114.

Ndubueze, P. N. & Igo, E. U. (2016, July-December). Cyber crime victimization among Internet active Nigerians: An analysis of socio-demographic correlates. International Journal of Criminal Justice Sciences, 8(2), 225-234.

Priyatno, D. (2017, Januray). The alternative model of corporate criminal sanction management in Indonesia. Journal of Legal, Ethical and Regulatory Issues, 20(1), 37-41.

van Wyk, B. (2017, June). How technology can help combat payroll fraud in Africa. African Business, 442, 40-43.

What is computer embezzlement? (2018). Geigle Law Firm. Retrieved from https://www.pga legal.net/blog/2017/10/what-is-computer-embezzlement.shtml.

 

.

 


Get Professional Assignment Help Cheaply

Buy Custom Essay

Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?

Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.

Why Choose Our Academic Writing Service?

  • Plagiarism free papers
  • Timely delivery
  • Any deadline
  • Skilled, Experienced Native English Writers
  • Subject-relevant academic writer
  • Adherence to paper instructions
  • Ability to tackle bulk assignments
  • Reasonable prices
  • 24/7 Customer Support
  • Get superb grades consistently
 

Online Academic Help With Different Subjects

Literature

Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.

Finance

Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.

Computer science

Computer science is a tough subject. Fortunately, our computer science experts are up to the match. No need to stress and have sleepless nights. Our academic writers will tackle all your computer science assignments and deliver them on time. Let us handle all your python, java, ruby, JavaScript, php , C+ assignments!

Psychology

While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.

Engineering

Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.

Nursing

In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.

Sociology

Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.

Business

We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!

Statistics

We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.

Law

Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.

What discipline/subjects do you deal in?

We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.

Are your writers competent enough to handle my paper?

Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.

What if I don’t like the paper?

There is a very low likelihood that you won’t like the paper.

Reasons being:

  • When assigning your order, we match the paper’s discipline with the writer’s field/specialization. Since all our writers are graduates, we match the paper’s subject with the field the writer studied. For instance, if it’s a nursing paper, only a nursing graduate and writer will handle it. Furthermore, all our writers have academic writing experience and top-notch research skills.
  • We have a quality assurance that reviews the paper before it gets to you. As such, we ensure that you get a paper that meets the required standard and will most definitely make the grade.

In the event that you don’t like your paper:

  • The writer will revise the paper up to your pleasing. You have unlimited revisions. You simply need to highlight what specifically you don’t like about the paper, and the writer will make the amendments. The paper will be revised until you are satisfied. Revisions are free of charge
  • We will have a different writer write the paper from scratch.
  • Last resort, if the above does not work, we will refund your money.

Will the professor find out I didn’t write the paper myself?

Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.

What if the paper is plagiarized?

We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.

When will I get my paper?

You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.

Will anyone find out that I used your services?

We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.

How our Assignment  Help Service Works

1.      Place an order

You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.

2.      Pay for the order

Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.

3.      Track the progress

You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.

4.      Download the paper

The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.

smile and order essaysmile and order essay PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A PERFECT SCORE!!!

order custom essay paper