Note
0.0
(0)
Rate it
Take a practice test
Chat with Kai
Explore Top Notes
Genetic Factors
Note
Studied by 1 person
5.0
(1)
Industrial Revolution
Note
Studied by 80 people
5.0
(1)
Science Inc 8/9
Note
Studied by 41 people
5.0
(1)
2.2 The Water Cycle and Oxygen-Demanding Waste
Note
Studied by 13 people
5.0
(1)
Cognitive Approach - Cognitive Processes
Note
Studied by 16 people
5.0
(1)
The Chemical Components of a Cell
Note
Studied by 2 people
5.0
(1)
Home
CL Lecture 5/2 CH 13
CL Lecture 5/2 CH 13
Eminent Domain and Public Good
Government can take private property for public use (e.g., highways).
Must compensate the owner.
Example: Interstate highway system in the 1950s under Truman.
Types of Taking/Theft
Historically focused on tangible property.
Key types:
Larceny: Simple theft.
Embezzlement: Misappropriation of funds or assets by someone in a position of trust.
Taking by false pretenses: Deception to obtain property.
Receiving stolen property.
Forgery.
Robbery: Taking property directly from a person with the threat of violence (violent crime).
Extortion: Threatening someone for money or protection.
Taking by False Pretenses
Examples:
Scam emails (e.g., Nigerian prince scam).
Phishing emails.
Scam texts (e.g., toll notifications).
QR code scams to steal phone information.
Avoiding Email Scams
Be wary of emails asking for immediate action.
Hover over links to verify the destination URL.
Check the sender's email address.
Extortion
Differentiated from robbery: not imminent force, but a delayed threat.
Common in gang activity: protection money.
Failure to pay results in property damage and increased fees.
Larceny
Unlawfully taking someone's property without consent.
The intent is to permanently deny access to the item.
If someone borrows something and never returns it, that's larceny.
Example: A colleague in Finland borrows his neighbor's lawnmower and puts it back after mowing his yard.
He is stealing their gas.
Intellectual Property
Academics: Citations required to give credit to sources.
Plagiarism: Stealing someone else's work and presenting it as your own.
Copyright infringement.
Corporate Espionage
Hydraulic fracturing example: company refusing to disclose chemicals used due to proprietary concerns.
The person who's intellectual property has been taken is the one required to enforce it.
Intent in Theft
Critical components: act and intent.
Intent: to deprive the individual of their property.
Taking something without using or selling it can still be theft.
Removing Property
Picking up an item in a store with the intent of paying for it is not theft.
Walking out of the store without paying for the item is theft.
You must transport the object outside of whatever area it's being displayed.
Returning to pay for an item you forgot to pay for negates the theft.
Value and Severity of Theft
The higher the dollar amount, the more severe the legal consequences.
Embezzlement
Theft from a position of trust and control over assets.
Violating that trust by siphoning off assets.
Example: Ponzi schemes.
Ponzi Schemes
Based on geometrically expanding groups of investors.
Promises of high returns (e.g., 200% in 30 days).
Early investors are paid with money from new investors.
Scheme collapses when new investors can't be found or too many people withdraw.
Ponzi's initial concept involved buying universal postal stamps in Italy and selling them in the US for profit.
Example: Office Space and Superman
A fraction of cent is skimmed off of each transaction.
Gas Prices
Gas is sold at two dollars and eighty nine cents and nine tenths.
Gas stations make the majority of there money from inside, not from gas.
Gas companies are in a race to the bottom.
Euro Cents
Some parts of Europe don't have a single cent because of rounding.
False Pretenses
Representing yourself as the owner of property and selling it to someone else.
Real estate larceny.
Always do a title search when buying a home.
Mechanic's Lien
If you don't pay an electrician, they can put a mechanic's lien on the house.
Homeowners Associations
Never be a part of a homeowners association if possible.
Identity Theft
Relatively new criminal action.
Easy access to information makes it easy for identity theft to occur.
Shred or burn credit card applications.
Opt out of unsolicited applications.
It takes around 80 hours to figure out identity theft.
Virtual Credit Card
A virtual credit card that can be changed easily.
TapPay and Apple Pay
Not recommended because of the danger of having financial information on your phone.
VPNs
Good to have on your computer traveling overseas.
Note
0.0
(0)
Rate it
Take a practice test
Chat with Kai
Explore Top Notes
Genetic Factors
Note
Studied by 1 person
5.0
(1)
Industrial Revolution
Note
Studied by 80 people
5.0
(1)
Science Inc 8/9
Note
Studied by 41 people
5.0
(1)
2.2 The Water Cycle and Oxygen-Demanding Waste
Note
Studied by 13 people
5.0
(1)
Cognitive Approach - Cognitive Processes
Note
Studied by 16 people
5.0
(1)
The Chemical Components of a Cell
Note
Studied by 2 people
5.0
(1)