Today's White-Collar Crime: Theories, Analysis, and Trends
Verified
Added on 2023/04/22
|10
|3328
|94
AI Summary
This document provides an in-depth analysis of white-collar crime theories, organizational crime, corporate criminal liabilities, and trends in white-collar crime. It also discusses the role of intelligence analysts in combating white-collar crime.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
TODAY’S WHITE-COLLAR CRIME2 Contents Summary.....................................................................................................................................................3 Chapter 6 White Collar-Crime Theory.........................................................................................................3 Chapter 7 Organizational Crime and Corporate Criminal Liabilities.............................................................4 Chapter 8 White Collar Crime......................................................................................................................6 Chapter 9 White-Collar Crime Analysis and Trends.....................................................................................7 Chapter 10 Where Do We Go From Here? The future of White-Collar Crime.............................................9
TODAY’S WHITE-COLLAR CRIME3 Summary Chapter 6 White Collar-Crime Theory The chapter provides detail knowledge of white-collar crime theories. Various typologies to white-collar crimes with historical aspects are discussed with positivist perspectives of several theories such as social strain theory and complementary theories. The history of white-collar crime is described in detail with the origin of the study that addresses the American Sociological Society. The theory of the Leisure Class was published with satirical and scholarly professor Thorstein Veblen. The theory addresses the spending pattern of middle and upper-class people of society as it was not concentrated only with the examination of social class. The fundamental examination was focused while realizing the concept of consumerism in the society with the evolution of conspicuous expenditure. Next theory discussed was the theory of social strain that was published in 1938 by Robert Merton. There were five reactions that Merton categorized in this theory such as conformity, ritualism, innovation, rebellion, and retreatism. Legitimate means are used in order to achieve the goals thereby there are a foundation means of understanding and engaging in illegal acts of embezzlement and fraud. Learning of criminal behavior takes place with intimate groups of the society thereby illicit activities take place with socioeconomic ladder (McCarthy & Hagan, 1995). Furthermore, the chapter discusses the feminist theory in white- collar crime. Meda Chesney is a social constructionist in critical-feminist theory who has mentioned trends that focus on a crime that is committed by women and they are violent and non-violent crimes that are described in detail. There is a dramatic increase in crime among women that has been observed in a decade. These findings and the results are important to focus on the assert of theories by Adler with a hypothetical situation that man is just involved in crime. In fact, there is a rise in crime rate due to the involvement of crime by women which ranks in corporate history with a higher public trust. Sutherland’s theory has addressed the most important contribution in criminology and sociology that was studied with a focus on companion theory of differential association. There is an increase in the research for criminal learning theories with delinquent and criminal entities that are measured. The shortchanges that is observed in Sutherland’s theory is about individual volition (Hagan, 1990). The economic emphasize is measured effectively with the positivist researchonMcCarthy’stheory.Conspicuousconsumptiontheory,socialstraintheory,
TODAY’S WHITE-COLLAR CRIME4 differential association theory, response to Sutherland’s white-collar crime, positivists Cressey’s theory and feminist theories are discussed in detail with contemporary studies and involvement of predominant approach of white-collar crime. The demonstration of equal concern in exposure to crime are detailed with criminal methods adapted and differential association process is studied with correspondence to Sutherland’s theory (Bruinsma, 1992). There is subsequent research that is conducted which raises the compelling differential methods of criminal behavior. Moreover, there is detail information about the adversity of street life and the case of hunger and unemployment that is reflected in the study. References Bruinsma, G. (1992), “Differential Association Theory Reconsidered: An Extension and Its Empirical Test”, Journal of Quantitative Criminology, 8: 29–49. Hagan, J. (1990), Structural Criminology. New Brunswick, NJ: Rutgers University Press McCarthy, B., & Hagan, J. (1995), “Getting into Crime: The Structure and Process of Criminal Embeddedness”, Social Science Research, 24: 63–95. Chapter 7 Organizational Crime and Corporate Criminal Liabilities This chapter gives detail information about the democracy of white-collar crime, corporate crime and changes observed in the occupational crime, the shift towards crime research, steps to reduce organizational crime, an environmental example of organizational deviance, curtailing corporate crime, antidote to corporate criminal liability and various examples of organizational crime. The original agenda that was specifically offered by Sutherland was viewed in the collectivist society was examined to an extent for individual motivations. The individual motivation was restricted in a person for a white-collar crime that was observed. The chapter includes the exploration of organized crime that is motivated for committing a criminal record. The issues of social class were reflected with the inclusion of rationalizations that are committed in the organizational crime and corporate criminal records. There is a strong desire for people and the criminal
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
TODAY’S WHITE-COLLAR CRIME5 behavior that results in organized crime and corporate crime. These are the two groups that are formed from criminal behavior and engaging with criminals. The chapter consists of detail knowledge about the analysis of organizational structure with the environmental factors that affect an organization for indulging in white-collar crime. The business competes with nature and the popular areas that attract criminal activities with respect to the fraudulent activities that are not accepted by society (Akard, 1992). The corporations, professional organizations, and institutions are involved with various sizes, shapes, and structure of the organization. Sutherland has even described in detail about the white-collar crime that examines the corporate crime and well illicit the organizational activities that report to criminal offense. In order to reduce the level of organizational crime, the findings reveal the analysis of Fortune 500 companies that are analyzed with securities and exchange fraud. Around 60 percent of companies have analyzed with 4.4 average rates of violations. To curtail the organizational crime, it is effectively noted that the agreements are to be strengthened by an organization and substantial remedies should be taken for violations. There should be an increase in the fine ceilings that are assessed accordingly. Another approach is to create stiff criminal penalties for employees and organization who violate the environment (Hagan, 1985). Stronger statutes should be observed for violated federal laws. Another step is to extensively use imprisonment for longer sentences. Thereby it is important that organizational crime should be lowered in order to focus on the development of the organization and reducing the impact of organizational crime intensively. For combating fraud, the inclusion of SOX is measured with five sections that should be followed in case of corporate crime (Commons, 1909). Section 302 for corporate responsibility of company reports, section 401 with the disclosure of reports, section 404 for enhanced financial records and its disclosure, section409 for real-time disclosure, section 802 for altering documents and criminal penalties, etc. have been the measures taken as an antidote with the law for reducing corporate crime. There are several examples of companies that are depicted in order to understand the impact of organizational crime and corporate crime. References Akard, P, J. (1992). “Corporate mobilization and political power: The transformation of US economic policy in the 1970s.” American Sociological Review 57: 597–615.
TODAY’S WHITE-COLLAR CRIME6 Commons, J R, (1909). “American Shoemakers, 1648–1895: A Sketch of Industrial Evolution.” Quarterly Journal of Economies, vol. 24, pp. 39–84. Hagan, J., (1985). Modern criminology: Crime, criminal behavior, and its control. New York: McGraw-Hill, Inc. Chapter 8 White Collar Crime Thischapterhelpsinunderstandingthecommonwhite-collarcrimesthatarebeyond rudimentary discussion. The examples of criminal statutes are mail fraud, extortion, access to the device, check forgery, wire fraud, false entries, money laundering, etc. The detail discussion about the development of white-collar criminal activities is discussed while investigating the behavioral aspects of offenders. Conspiracy is referred to inchoate offense which is carried with an illegal act that does not satisfy other people (Lawrence & Yuval, 2001). There is two or more person who is included in the crime and is an overt act. Conspiracy is one of frequent white- collar crime that is observed by prosecutors. Mail fraud is a white-collar crime where a person commits a crime while using emails and obtain a handsome amount with fraudulent activities. The US Code has several sections in 1341 for mail fraud that can be used as an example with several elements of mail fraud crime. Wire fraud is involved with a common element of defrauding the purpose of money with fictitious means. There is a transmission of image and signals that are used via television, radio r any form of telecommunication. There is a catch-all charge that is mentioned and the prosecutors are charged accordingly with computer crimes. There is a server that is located on different state with an interstate commerce activity. Then there is embezzlement, access device fraud, check fraud, false entries and money laundering white-collar crime that are discussed. A detail discussion about Asset Forfeiture is presented with civil judicial forfeiture, criminal forfeiture and administrative forfeiture. ThekeyelementsofthestatutesarediscussedinbriefwiththefamiliarityoftheUS Constitution's Bill of rights. The most common form that is presented is of government agencies form of forfeiture. The crime does not extensively include real estate and monetary assets (Dan
TODAY’S WHITE-COLLAR CRIME7 & Kathleen, 2002). The computer purchased assets are majorly put into official use by several agencies. This seems that placing the property in official use is the major administrative forfeiture that enhances law enforcement with several investigations of forfeiture proceedings. The criminal forfeiture is about obtaining assets that are an act of illegal judicial forfeiture that requires a major acceptance of specific items in personam. The monetary instruments including bonds, cash and stocks are seized by federal law with an extensive form that involves real estate claim. There is a civil forfeiture judicial that requires several false statements with an entry to counterfeittheUScurrency.Thereisanaccessdevicethatisobservedwithseveral counterfeiting currencies, access device fraud, fraud in connection, mail fraud, wire fraud or money laundering. There are proceedings with the entries that are depicted with 18 USC 1001, 18 USC 472, 18 USC 1029, 18 USC 1030, 18 USC 1341 and 18 USC 1956 respectively with the proceeds of crime and criminal activities. There are several examples that are discussed such as social democrats that were engaged in Germany while strengthening the country’s law which was a real war against money laundering and the reluctant banks in Texas and Florida that made money by laundering drug profits (David & Philip, 2002). References Dan E. & Kathleen D., (2002). “U.S. Probe of September 11 Financing Wraps Up: Terror Money Traced Via ATM, Credit Card Usage,” Washington Post. David J., & Philip S., (2002). “Man Held Since August Is Charged with a Role in September 11 Terror Plot,” New York Times, December 12, 2001; Dan Egger, “Suspect’s Silence Baffled Agents Before September 11,” International Herald Tribune, February 1, 2002. Lawrence M., & Yuval E, (2001). “The Dilemma of Dirty Money,” World Policy Journal, vol. 18. Chapter 9 White-Collar Crime Analysis and Trends This chapter consists of a detailed analysis of Intelligence Analysts. The basic elements are revisedwiththecriminalintelligenceservicethatincludesaprocessofcollectingdata, evaluation, analysis, dissemination, and re-evaluation on suspected criminals. There are varieties
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TODAY’S WHITE-COLLAR CRIME8 of titles that are referred to as the criminal intelligence analyst (Heuer, 1999). These are law enforcement intelligence analyst, intelligence research specialist, crime analyst or criminal research specialist. These are critically responsible for analyzing and examining the data in criminalrecordswithanaimtovisualizethedataandtomakeeffortsonproviding recommendations where necessary as supervisory personnel. The integrity of the analyst is observed with the most candidates who have undergone several investigations and being hired with the comprehensive credit check. There is an illegal drug screening test, background check and community history about the relevance of competition. There are several agencies that have madestringenteffortsandpracticesforsuccessfulcompletionofseveralpsychological evaluation and polygraph examination. However, there are different types of law enforcement intelligence such as tactical intelligence and strategic intelligence. Tactical intelligence is one of the most used intelligence. There are immediate enforcement actions such as interdictions, seizures, and arrest that are included in tactical intelligence. There is a short term surveillance operation that is coupled with the direct action opportunity by officer observations as it provides detail information of analysis that is explored with particular incidents such as witness names, suspect and address. The use of information is referred to with a human intelligence system known as HUMINT. A strong relationship is measured between technology and HUMINT, for example, Seal Beach Police Department’s duty in California that was acquired with Internet Protocol to access crime condition and provide information to officers on scenes. The information about daisy chains is analyzed by intelligence analysts with the accuracy of information and the quality of information that is provided in detail with evidence and proof. In order to minimize the potential hazards, analysts use the triangulation process which is to substantiate the level of information with a quality concern and required information on suspects, witness, patrol officers, and surveillance equipment. The accuracy of the data is verified with the secondary sources that established the level of confidence and intelligence data. The strict guidelines should be followed by analysts in order to measure a quantitative value of data and obtain information through surveillance operations (Peterson, 200). There is an external validity of information that is obtained with an internal perspective and external perspectives. There are several tools that are used by military analysts to identify the level of pattern and trend in terrorist activity. Another perspective of strategic intelligence is discussed with a strategic approach that helps to identify the money laundering trends. An inductive approach is used by
TODAY’S WHITE-COLLAR CRIME9 strategic intelligence that gives detail about the range of activities performed such as bank account numbers, telephone numbers and subscriber names that allows all the information to depict the connection between the entities and individuals while using a deductive approach. References Heuer, R.J. (1999). The Psychology of Intelligence Analysis. Washington, DC: U.S. Government Printing Office Peterson, M.B., Morehouse, B., Wright, R., Eds. (2000). Intelligence 2000: Revising the basic elements. Lawrenceville, NJ: Law Enforcement Intelligence Unit Chapter 10 Where Do We Go From Here? The future of White-Collar Crime The chapter includes the detail about the legal framework of crime, the pervasiveness of corruption and inextricable links of criminal behavior. White-collar crime is not only observed in wealthy perpetrated and large corporations, it even includes the faceless corporations that are known with public extinction and offenses. Even high profile cases are involved in white-collar crime and S&L scandals are observed. The trends and patterns of white-collar crime include the progress of forms of crime that is reluctantly observed in the past two decades (Aberbach & Rockman, 2000). There are different forms of crime that are cyclical in nature and these are introduced in the chapter. Curtailing the criminal activity is important while asking several questions about trends analysis and its increase in recent years. It is important to be prepared for the increase in white-collar crime while taking effective steps to meet the challenge of white- collar crime. Due to dramatic changes in offense rate and economic policy, there is a change that is measured regardless of the government laws and social spending on criminal records and activities. The incidents of white-collar crime and violent cases are rising that are examined from the years that have evidence of percent increase in National Crime Index (Geis, Meier & Salinger, 1995). The murder rates have risen to 2.5 percent which is reported that the police investigation and reduce crime rate need to be very well managed by the police department. However, with the help of
TODAY’S WHITE-COLLAR CRIME10 information technology, crime incidents are prolific and can be determined easily. It is important to know that the recommendations and suggestions for social change can be adapted with the cyclical change in the criminal law. The use of activism should be clearly adapted with respect to the formulation of social and economic change in policies. The information that is reported takes into account the identification of theft and the act of fraud. The pinnacle of the cycle of change has been observed and it is thereby important to gain information that is viable and is helpful to determine the white-collar crime. For social change, the government should take seriously the issues of white-collar crime, break the level of corporate and state corruption activity, work on strain theory, work on non-traditional techniques and strictly beware of the crime control activities while visualizing the major objective of crime control department (Aubert, 1952). The chapter identifies the major cyclical nature of the crime and the activities in white-collar crime. The recommendations are helpful to consider the reduction of white-collar crime in the US economy while placinga major value of investigatingcrimeand implementingstrategic activities of crime and related information. References Aberbach, J. & Rockman, B. (2000). In the Web of Politics: Three Decades of the U.S. Federal Executive. Washington, DC: Brookings Institution Press. Aubert, V. (1952) “White-collar crime and social structure.” The American Journal of Sociology, 58(3): 263–271. Geis,G.,Meier,R.F.,&Salinger,L.M.,(1995)WhiteCollarCrime:ClassicAnd Contemporary Views. New York: The Free Press.