Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Language
      Language
      Clear All
      Language
  • Subject
      Subject
      Clear All
      Subject
  • Item Type
      Item Type
      Clear All
      Item Type
  • Discipline
      Discipline
      Clear All
      Discipline
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
61 result(s) for "TRUE CRIME / White Collar Crime."
Sort by:
Fatal system error : the hunt for the new crime lords who are bringing down the Internet
This gripping espionage tale penetrates the network of international mobsters and hackers who use the Internet to extort money from businesses, steal from tens of millions of consumers, and attack government networks.
White Collar Crime in the Mutual Fund Industry
Peterson examines conditions and structures that led to abuses in the mutual fund industry. He seeks to provide understanding of not only the scandal's causes and its effects on investors, but also the regulatory response and reformation process. He breaks the scandal down into three parts: its root causes, regulatory responses by various actors, and attempts at reform and regulation. Key themes (e.g., why attorney generals were more successful in prosecuting this scandal than the SEC) are then identified to aid in a holistic understanding of the market timing and late trading scandal. The findings should help advance our understanding of financial scandals and white-collar crime.
The puppet masters : how the corrupt use legal structures to hide stolen assets and what to do about it
This report, the puppet masters, deals with the corporate and financial structures that form the building blocks of hidden money trails. In particular, it focuses on the ease with which corrupt actors hide their interests behind a corporate veil and the difficulties investigators face in trying to lift that veil. It serves as a powerful reminder that recovering the proceeds of corruption is a collective responsibility that involves both the public and private sector. Law enforcement and prosecution cannot go after stolen assets, confiscate and then return them if they are hidden behind the corporate veil. All financial centers and developed countries have committed, through the UN Convention against Corruption and international anti-money laundering and countering the financing of terrorism standards, to improving the transparency of legal entities and other arrangements. This report provides evidence of how far we still have to go to make these commitments a reality. Narrowing the gap between stated commitments and practice on the ground has a direct impact on actual recovery of assets.
Cybercrime and the law : challenges, issues, and outcomes
The first full-scale overview of cybercrime, law, and policy The exponential increase in cybercrimes in the past decade has raised new issues and challenges for law and law enforcement. Based on case studies drawn from her work as a lawyer, Susan W. Brenner identifies a diverse range of cybercrimes, including crimes that target computers (viruses, worms, Trojan horse programs, malware and DDoS attacks) and crimes in which the computer itself is used as a tool (cyberstalking, cyberextortion, cybertheft, and embezzlement). Illuminating legal issues unique to investigations in a digital environment, Brenner examines both national law enforcement agencies and transnational crime, and shows how cyberspace erodes the functional and empirical differences that have long distinguished crime from terrorism and both from warfare.
White Collar Crime in Housing
Subprime lending and mortgage fraud spread rapidly throughout the United States financial services sector during the 1990s and early 2000s, and in turn have been credited with contributing to an unprecedented global financial crisis. Koller, using diffusion theory as an interpretive framework, utilizes industry insider insights to examine how and why these innovative lending and fraud strategies diffused so quickly and deeply throughout the housing industry. She also assesses the viability of contemporary criminological and diffusion theories to explain the creation and control of white collar crime opportunities. Koller concludes that not only was the housing crisis predictable, it may have been preventable.
Risk Factors in Computer-Crime Victimization
Choi empirically assesses a computer-crime victimization model by applying Routine Activities Theory (RAT). He tests the components of RAT via structural equation modeling to assess the existence of any statistical significance between individual online lifestyles, the levels of computer security, and levels of individual computer-crime victimization. A self-report survey, which contained multiple measures of the risk factors and computer-crime victimization, was administered to 204 college students to gather data to test the model. The findings provide empirical supports for the components of RAT by delineating patterns of computer-crime victimization.
Cyber Criminology
Victimization through the Internet is becoming more prevalent as cyber criminals have developed more effective ways to remain anonymous. This volume explores today's interface of computer science, Internet science, and criminology. Topics discussed include the growing menace of cyber crime in Nigeria, Internet gambling and digital piracy, cyber stalking and sexual addiction on the Internet, child pornography, and the online exploitation of children. The book also examines terrorist use of the Internet, victimization on social networking websites, malware and hacking, the Islamic world in cyberspace, and human rights concerns that the digital age has created.
Adolescent Online Victimization
Marcum investigates Internet usage among college freshmen, their experiences with online victimization, and their relationships with online contacts. She finds that participating in online behaviors and activities that increased exposure to motivated offenders and target suitability also increased the likelihood of victimization, as well as formation of relationships with online contacts. Communicating with people met online and providing personal information over the Internet are significant predictors of the dependent variables for the entire sample, as well as for males and females when examined separately. Conversely, taking protective measures against victimization to improve guardianship did not decrease the likelihood of victimization.
Dishonest Dollars
In an environment where corporate scandals fill the headlines and ethics courses have suddenly become standard fare in business schools, Terry Leap offers welcome insights into and useful ways of thinking about a critical problem that permeates our society. His main contribution is an integrative model of white-collar crime, which smoothly incorporates influences from sociology, psychology, public policy, and business. As he explains the process that occurs across the many different categories of crimes within organizations, he finds that there are more similarities than differences between criminals in the suites and criminals in the streets. Leap's definition of crimes within organizations and the people who commit them are laid out in his first chapter. He then goes on to discuss the causes of and events surrounding white-collar crime, types of crimes and criminals, the decision-making processes of white-collar criminals, and the impact of these crimes. His concluding chapter predicts future trends in corporate crime, including an explanation of why we are likely to see more crime in health care. Throughout, Leap presents numerous specific examples and cases—from famous meltdowns such as Enron and WorldCom to less-publicized incidents including a weight-loss franchisee mislabeling doughnuts as low fat and a CEO of a South Carolina regional transportation authority misusing taxpayer money for lavish meals, personal expenses, and world travel.
The perverse organisation and its deadly sins
The Perverse Organisation and its Deadly Sins begins by examining the nature of perversity and its presence in corporate and organisational life. Then, four chapters examine the \"corporate sins\" of perverse pride, greed, envy and sloth, each taking case studies from major organisations suffering their effects. Finally, the book enquires into the nature of the consumer/provider pair as a centrepiece of the perverse cultural dynamics of current organisational life. The emphasis in the book is on perversity displayed by the organisation as such, rather than simply by its leaders, or other members, even though they may embody and manifest perverse primary symptoms to the extent that they at times engage in corrupt or criminal behaviour. What is explored is a group and organisation dynamic, more deeply embedded than conscious corruption. Within the perverse structure some roles become required to take up corrupt positions. They become part and parcel of the way things work. The person may condemn certain practices, but the role requires them. Tensions between person and role may mean that the person in role acts as they would not while in other roles. Such tensions may lead to the dynamics of perversity. This book is important reading for managers, consultants, and all who are interested in the dynamics propelling what seem to be the out-of-control dynamics within contemporary organisational life. It helps us understand how many people in positions of trust may end up abusing those positions. It looks at how we may be collectively perverse despite our individual attempts to be otherwise.