Chapter 19: White Collar & Cyber Crime

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:23 PM on 4/7/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

18 Terms

1
New cards

what are some characteristics of white collar crime

High status, respectable offenders

Crime occurs in context of occupation

Employs sophisticated legal defense and political lobbying efforts

Large impact

Veiled in legitimacy

Less likely to receive media attention

2
New cards

Fraud

dishonest acts to take property or money

3
New cards

Laundering

transforming illegitimate money to legitimate

4
New cards

Embezzlement

misappropriating funds entrusted for another purpose

5
New cards

Insider trading

using private, insider info to influence stock purchasing

6
New cards

what are the 3 phases/generations of cyber crime

1st gen- using computers to further conventional offences. Storage, accounting, etc.

2nd gen- using the internet to globalize conventional offences. Networking 

3rd gen- crimes taking space within cyberspace. Virus, hacking, spyware, etc

7
New cards

what are the challenges to combatting cyber crime

Outdated laws and definitions

Accessibility of AI

Rich in targets, fast and anonymous

8
New cards

what are the levels of the internet

Surface web- content indexed by search engines, e.g., google

Deep web- available, but not indexed and usually password protected

Dark web- encrypted access that actively conceals identities and payments

9
New cards

what are the hat types for hacking

White hat- ethical services

Black hat- accessing systems unauthorized for malicious purpose

Grey hat- accessing systems unauthorized for malicious purpose, then offering solution for profit

10
New cards

Organized crime

networks of laundering, and theft

11
New cards

Cyberbullying/stalking

using the internet to track another person

12
New cards

Exploitation

production and distribution of sexual content involving minors

13
New cards

Trafficking

recruiting and/or transporting persons for the purpose of exploitation

14
New cards

Cyberwarfare

network-based conflicts involving politically motivated attacks by a nation-state or international organization

15
New cards

Homegrown

targeting victims of same citizenship

16
New cards

Foreign fighters

individuals who travel to join a terrorist cause

17
New cards

Lone actors

single perp who commits an act of terrorism without direction from group

18
New cards

what are three ways of counting violent extremism

Prevention- education and counter-narratives

Intervention- interruption through disengagement and deradicalization

Rehabilitation- applying risk, needs, and responsibility principles