Information Technology And White-Collar Crime Research Paper

PAGES
7
WORDS
2216
Cite

Given the virtual ubiquity of information technology (IT) today, it is not surprising that while collar crime using these resources has assumed new importance and relevance (Dervan, 2014). As discussed further below, white collar crimes are by definition nonviolent in nature but the enormous amount of funds that are derived from such unlawful activities are increasingly being diverted to fund violent terrorist organizations that target the interests of the United States at home and abroad (Ndubueze & Igbo, 2016; Priyatno, 2017). The purpose of this paper is to provide an overview of white collar crime in general and how IT has been used to perpetrate these crimes in recent years in particular. In addition, an examination will also be provided concerning the various types of white collar crimes that are committed using IT and how they are facilitated through collaboration between mainstream business practitioners and the criminal underworld preparatory to developing a final study concerning these issues. Finally, a discussion concerning how the current legal framework in the U.S. only encourages white collar crimes by high-level executives and corresponding recommendations will conclude the study. Review and Discussion

Overview of white collar crime

In a speech delivered at the American Sociological Society in 1939, sociologist Edwin Sutherland coined the term “white-collar crime” to describe “crimes committed by a person of respectability and high social status in the course of his occupation” (as cited in Cliff & Wall-Parker, 2017, p. 1). This popular perception of white collar crimes being typically committed by the more otherwise-respectable members of American society have resulted in a concomitant view that these perpetrators should be treated less harshly than hardened criminals that engage in violent crimes. As previously reported, the definition provided by Black’s Law Dictionary (1990), states that white collar crime is “a term signifying various types of unlawful, nonviolent conduct committed by corporations and individuals including theft or fraud and other violations of trust committed in the course of the offender’s occupation” (p. 1596). This legal definition of white collar crime is not universally accepted, however, and many sociologists cite other salient factors are being characteristic of these types of criminal behaviors, but they all share two common features that make this category of crime appear less “criminal” in nature compared to other categories: (1) their nonviolent nature and (2) their inextricable connection with perpetrators’ occupations.

The prevailing view that white collar criminals should be treated differently from other categories of law offenders serves, at least in part, to explain why some people turn to crime in order to achieve their personal and professional goals even when they were not necessarily forced to do so. Furthermore, there is a growing body of evidence that indicates some managers will commit white collar crimes whether they need to or not depending on the circumstances (Cliff & Wall-Parker, 2017). When managers are confronted with financial pressure, however, the likelihood that they will engage in some type of fraudulent behaviors at work intensifies greatly. In fact, financial pressure is considered one of the three primary causes of white collar crime as shown in Figure 1 below.

Figure 1. The fraud triangle: a framework for identifying white collar crime opportunities

Source: http://www.brumellgroup.com/wp-content/uploads/Fraud_Triangle-680x380.png

As the fraud triangle depicted...

...

In other words, each of these factors (or another factor altogether) may be sufficiently compelling to induce even the most loyal and honest employees to perpetrate some type of white collar crime. Moreover, it is the rare criminals who are unable to rationalize their actions for whatever reasons. The fact that the prevailing social view of such crimes places them in a lesser category compared to violent crimes only adds additional impetus to the process. It is also important to note that the “opportunity” factor has been amplified greatly in recent years through the proliferation of IT resources at home and in the workplace, and these issues are discussed further below.
White collar crimes and information technology

Criminals of yesteryear could only dream about a technology that allowed them to commit crimes without ever leaving the comfort of their homes and it is little wonder that IT has created an explosion in white collar crimes. Based on the foregoing definition of white collar crime as involving individuals’ occupation and being nonviolent in order to realize an unjust gain of some sort, it is readily apparent that IT can be exploited in a number of ways. While gaining unauthorized access to computer systems is a crime in and of itself, the foregoing definition of white collar crime also requires that the perpetrators unjustly benefit materially (e.g., monetarily) in some fashion as a part of their occupation.

One of the most common strategies for using IT for white collar crimes is to embezzle funds from an employer. According to one law firm, “Embezzlement [can] involve the complex manipulation of computers through what investigators and corporate financial security experts refer to as computer embezzlement” (What is computer embezzlement?, 2018, para. 3). While the types of white collar crimes that can be committed using IT resources are limitless, the five most common types of these types are as follows:

1. Logic bombs: These methods use time-specific computer commands that are invoked at different times in order to illegally transfer funds, delete data or even turn off a computer system at prescheduled intervals;

2. Data diddling: This method disables a computer system’s embezzlement-detection control mechanisms;

3. Trapdoor and “salami” techniques: This method relies on the “slow but sure” approach to embezzling funds by deducting tiny amounts of funds from every financial transaction in the expectation that their loss will go unnoticed and illicitly diverting it them another account to which the employee has access.

4. Skimming: Popularly referred to as identity theft, this method involves stealing consumers’ computer-based account information from an organizational database and using it to illegally acquire goods and services.

5. Trojan horses: Finally, this method involves planting hidden commands that invoke unauthorized functions in existing computer systems, typically to divert funds to another account to which the perpetrator has access (What is computer embezzlement?, 2018)

Although the five types of computer-assisted white collar crimes listed above are the most common, it is reasonable to posit that this list is certainly not exhaustive. Indeed, a trusted insider armed with nothing more than a company laptop and ill intentions can manipulate accounts…

Sources Used in Documents:

References

Arya, A. & Sun, H. L. (2011, January 1). Stock option backdating at Comverse Technology: Ethical, regulatory, and governance issues. Journal of the International Academy for Case Studies, 17(1), 55-62.

Asner, M. A. (2015, February 3). White-collar crime, banks are more often prey than predator. American Banker, 1(17), 13.

Black’s law dictionary. (1990). St. Paul, MN: West Publishing Company.

Ball, T. (2015, January 1). International tax compliance agreements and Swiss bank privacy law: A model protecting a principled history. The George Washington International Law Review, 48(1), 233-240.

Cliff, G. & Wall-Parker, A. (2017, April). Statistical analysis of white collar crime. Criminology and Criminal Justice. Retrieved from http://criminology.oxfordre.com/view/10.1093/ acrefore/9780190264079.001.0001/acrefore-9780190264079-e-267.

Dervan, L. E. (2011, December). International white collar crime and the globalization of internal investigations. Fordham Urban Law Journal, 39(2), 361-365.

Dervan, L. E. (2011, December). International white collar crime and the globalization of internal investigations. Fordham Urban Law Journal, 39(2), 361-365.

Eichenwald, K. (2015, May 8). The 'flash crash' case doesn't add up; the government's case against "Mr. Flash Crash" is a misguided sham. Newsweek, 164(18), 37.

What is computer embezzlement? (2018). Geigle Law Firm. Retrieved from https://www.pga legal.net/blog/2017/10/what-is-computer-embezzlement.shtml.


Cite this Document:

"Information Technology And White-Collar Crime" (2018, August 27) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/information-technology-white-collar-crime-research-paper-2171965

"Information Technology And White-Collar Crime" 27 August 2018. Web.25 April. 2024. <
https://www.paperdue.com/essay/information-technology-white-collar-crime-research-paper-2171965>

"Information Technology And White-Collar Crime", 27 August 2018, Accessed.25 April. 2024,
https://www.paperdue.com/essay/information-technology-white-collar-crime-research-paper-2171965

Related Documents

White Collar Crime Theories, Laws and Processes Explain white collar crime in terms of various theories related to criminology and crime. A white collar crime is an illegal and unethical act that violates public trust (Friedrichs, 2010). Common examples include misrepresentation, stealing, misappropriation, self-dealing, and corruption (Echols & Richardson, 2011). Most are crimes of opportunity and hold similar characteristics to corporate crime -- fraud, insider trading and other illegal acts of a

In an environment where violent crimes outweigh white-collar crimes, the prosecutor will allocate his resources to fighting violent crimes. Resource availability thus determines how many cases will be pursued by the prosecutor's office. The prosecutor may also evaluate the type of crime affecting an area. This will enable the office to pursue a tougher sentence for the crimes in the area. The increase in white-collar crimes has forced the

White Collar Crime
PAGES 4 WORDS 1010

White Collar Crime: Identifying Valid Deterrents for White Collar Criminals Recent studies suggest that white collar crime is on the rise (Chayet, Waring & Weisburg, 2001; Recine, 2002). Many stereotypical beliefs regarding white collar criminals have been debunked over time as researchers start understanding what white collar crime is and who it effects. White collar crime affects all communities regardless of affluence, demographics, social factors or other considerations. White collar crime comes

White Collar Crime: The Influence of Societal Changes on Criminal Opportunities and the Nature of Crimes of Fraud The process of globalization, coupled with the advent of the information age has had a significant influence on the nature of crime. For instance, the complexity and diversity of white collar crime has surpassed that of traditional street crime by far and it continues to cost the United States billions every year. Introduced

White-collar crime is a term that has existed since 1939 when it was introduced by Edwin Sutherland during his speech to the American Sociological Society. In the speech, he defined white-collar crime as an offense committed by an individual of high social status and respectability in the course of his/her occupation. These crimes also refer to financially motivated non-violent offenses carried out by governmental and business professionals. Despite the disagreements

White Collar Crime
PAGES 5 WORDS 1617

white-collar crime. Specifically, it will focus on white-collar crime in America, including reasons why it occurs so frequently in the United States, and what business, industry, and the courts can do to combat it. White-collar crime is not a new idea in America, but it seems to have become even more prevalent in recent years. White-collar crime may not seem as harmful as other forms of violent crimes, but