Given the virtual ubiquity of information technology (IT) today, it is not surprising that while collar crime using these resources has assumed new importance and relevance (Dervan, 2014). As discussed further below, white collar crimes are by definition nonviolent in nature but the enormous amount of funds that are derived from such unlawful activities are increasingly being diverted to fund violent terrorist organizations that target the interests of the United States at home and abroad (Ndubueze & Igbo, 2016; Priyatno, 2017). The purpose of this paper is to provide an overview of white collar crime in general and how IT has been used to perpetrate these crimes in recent years in particular. In addition, an examination will also be provided concerning the various types of white collar crimes that are committed using IT and how they are facilitated through collaboration between mainstream business practitioners and the criminal underworld preparatory to developing a final study concerning these issues. Finally, a discussion concerning how the current legal framework in the U.S. only encourages white collar crimes by high-level executives and corresponding recommendations will conclude the study.
Review and Discussion
Overview of white collar crime
In a speech delivered at the American Sociological Society in 1939, sociologist Edwin Sutherland coined the term “white-collar crime†to describe “crimes committed by a person of respectability and high social status in the course of his occupation†(as cited in Cliff & Wall-Parker, 2017, p. 1). This popular perception of white collar crimes being typically committed by the more otherwise-respectable members of American society have resulted in a concomitant view that these perpetrators should be treated less harshly than hardened criminals that engage in violent crimes. As previously reported, the definition provided by Black’s Law Dictionary (1990), states that white collar crime is “a term signifying various types of unlawful, nonviolent conduct committed by corporations and individuals including theft or fraud and other violations of trust committed in the course of the offender’s occupation†(p. 1596). This legal definition of white collar crime is not universally accepted, however, and many sociologists cite other salient factors are being characteristic of these types of criminal behaviors, but they all share two common features that make this category of crime appear less “criminal†in nature compared to other categories: (1) their nonviolent nature and (2) their inextricable connection with perpetrators’ occupations.
The prevailing view that white collar criminals should be treated differently from other categories of law offenders serves, at least in part, to explain why some people turn to crime in order to achieve their personal and professional goals even when they were not necessarily forced to do so. Furthermore, there is a growing body of evidence that indicates some managers will commit white collar crimes whether they need to or not depending on the circumstances (Cliff & Wall-Parker, 2017). When managers are confronted with financial pressure, however, the likelihood that they will engage in some type of fraudulent behaviors at work intensifies greatly. In fact, financial pressure is considered one of the three primary causes of white collar crime as shown in Figure 1 below.
Figure 1. The fraud triangle: a framework for identifying white collar crime opportunities
Source: http://www.brumellgroup.com/wp-content/uploads/Fraud_Triangle-680×380.png
As the fraud triangle depicted in Figure 1 above makes clear, many people may succumb to the temptation to commit white collar crimes by virtue of this combination of factors, but it is important to note that all of them (or even two of them) are not necessarily essential. In other words, each of these factors (or another factor altogether) may be sufficiently compelling to induce even the most loyal and honest employees to perpetrate some type of white collar crime. Moreover, it is the rare criminals who are unable to rationalize their actions for whatever reasons. The fact that the prevailing social view of such crimes places them in a lesser category compared to violent crimes only adds additional impetus to the process. It is also important to note that the “opportunity†factor has been amplified greatly in recent years through the proliferation of IT resources at home and in the workplace, and these issues are discussed further below.
White collar crimes and information technology
Criminals of yesteryear could only dream about a technology that allowed them to commit crimes without ever leaving the comfort of their homes and it is little wonder that IT has created an explosion in white collar crimes. Based on the foregoing definition of white collar crime as involving individuals’ occupation and being nonviolent in order to realize an unjust gain of some sort, it is readily apparent that IT can be exploited in a number of ways. While gaining unauthorized access to computer systems is a crime in and of itself, the foregoing definition of white collar crime also requires that the perpetrators unjustly benefit materially (e.g., monetarily) in some fashion as a part of their occupation.
One of the most common strategies for using IT for white collar crimes is to embezzle funds from an employer. According to one law firm, “Embezzlement [can] involve the complex manipulation of computers through what investigators and corporate financial security experts refer to as computer embezzlement†(What is computer embezzlement?, 2018, para. 3). While the types of white collar crimes that can be committed using IT resources are limitless, the five most common types of these types are as follows:
1. Logic bombs: These methods use time-specific computer commands that are invoked at different times in order to illegally transfer funds, delete data or even turn off a computer system at prescheduled intervals;
2. Data diddling: This method disables a computer system’s embezzlement-detection control mechanisms;
3. Trapdoor and “salami†techniques: This method relies on the “slow but sure†approach to embezzling funds by deducting tiny amounts of funds from every financial transaction in the expectation that their loss will go unnoticed and illicitly diverting it them another account to which the employee has access.
4. Skimming: Popularly referred to as identity theft, this method involves stealing consumers’ computer-based account information from an organizational database and using it to illegally acquire goods and services.
5. Trojan horses: Finally, this method involves planting hidden commands that invoke unauthorized functions in existing computer systems, typically to divert funds to another account to which the perpetrator has access (What is computer embezzlement?, 2018)
Although the five types of computer-assisted white collar crimes listed above are the most common, it is reasonable to posit that this list is certainly not exhaustive. Indeed, a trusted insider armed with nothing more than a company laptop and ill intentions can manipulate accounts payable and receivable as well as supply chain and inventory data to the point where the ill-gotten gains are so well concealed that it requires a full-blown audit to discover the crimes. For example, in the case of skimming techniques, an employer may remain unaware of these types of illegal activities unless and until the perpetrator is caught outside of the workplace setting. Similarly, payroll executives may be able to exploit weaknesses in their payroll systems to divert funds or pay fictitious employees with money that is diverted to an account to which they have access.
Likewise, insiders using the trapdoor/salami techniques may rake in thousands of dollars from the fractions of pennies left over from millions of financial transactions processed by their employers each week, reassured that few people will notice a missing fraction of a cent here or there. Even though larger organizations have more resources available and more avenues by which IT can be used to embezzle funds, small businesses in particular lack the same in-house resources and expertise enjoyed by the larger counterparts that are needed to monitor and detect these types of white collar crimes (van Wyk, 2017). Given that the majority of small businesses fail within the first year of operation, it is also reasonable to suggest that these types of white collar crimes are the cause in many cases. In fact, in some scenarios, these types of white collar crimes may go on for years before being discovered, if they ever are, and perpetrators are reassured that even if they are caught, they will likely be treated far less harshly than violent criminals as discussed further below.
Current legal framework for white collar crime in the U.S.
It is one of the perplexing aspects of the American criminal justice system that criminals that use a $50 “Saturday night special†to rob people of a few dollars are treated far more harshly, including lengthy prison sentences, than white collar criminals that may be guilty of extorting tens or even hundreds of thousands of dollars. One of the recurrent themes that quickly emerges from the scholarship concerning the use of IT resources and white collar crime is the laxity of punishment meted out to high-placed executives who intentionally bilk shareholders out of millions of dollars, only to receive a legal slap on the wrist as a result.
If criminal charges are brought at all, white collar criminals can expect to receive a monetary sanction of some sort (invariably far less than their illicitly gotten gains) or perhaps lose their jobs (Arya & Sun, 2011). In truly extreme cases, if white collar criminals are actually sentenced to serve prison time, they can expect to serve their time in cozy minimum-security federal prisons if their crimes involved the interstate transfer of funds where they enjoy comparatively comfortable accommodations. This does not mean, of course, that the penalties for violent crimes should be lowered to match the punishments given to white collar criminals, but it does mean that the problem is currently severe and most authorities agree that the proliferation of IT resources throughout all organizational settings will only make things worse in the future.
The current legal framework also fails to take into account the potential for the funds obtained through white collar crimes to be diverted to criminal organizations, including most especially international terrorist organizations that use this money to fund their violent operations, including those directed against the United States. Clearly, the percentage of white collar crimes being used for this purpose is currently most likely small, but the widespread deployment and increasing sophistication of IT mean that this percentage will probably grow well into the foreseeable future unless steps are taken to address the problem of white collar crime head on.
The optimal approach to reducing white collar crime in the United States is to remove the opportunities to commit these crimes. Far too many businesses, especially smaller enterprises, place an enormous amount of trust in their employees and fail to implement the security protocols that are needed to protect IT systems and sensitive data. As the fraud triangle depicted in Figure 1 above made clear, the opportunity to commit a white collar crime is one of the overarching reasons people succumb to the temptation, and removing this pillar of the triad represents the first important step in the right direction.
Conclusion
By definition, white collar crimes are nonviolent, and are committed as part of individuals’ occupation which provide them with some type of unjust monetary gain. This definition means that the cashier who takes some office supplies home or slips a few bucks into his pocket instead of the cash register is guilty of a white collar crime. The popular view of white collar criminals, though, is that of a fat-cat executive who embezzles large sums of money and only receives a modest punishment if caught. The research was consistent in showing that this prevailing view and the legal framework used to combat it needs to be changed to reflect the reality of white collar crime and its facilitation through information technologies.
References
Arya, A. & Sun, H. L. (2011, January 1). Stock option backdating at Comverse Technology: Ethical, regulatory, and governance issues. Journal of the International Academy for Case Studies, 17(1), 55-62.
Asner, M. A. (2015, February 3). White-collar crime, banks are more often prey than predator. American Banker, 1(17), 13.
Black’s law dictionary. (1990). St. Paul, MN: West Publishing Company.
Ball, T. (2015, January 1). International tax compliance agreements and Swiss bank privacy law: A model protecting a principled history. The George Washington International Law Review, 48(1), 233-240.
Cliff, G. & Wall-Parker, A. (2017, April). Statistical analysis of white collar crime. Criminology and Criminal Justice. Retrieved from http://criminology.oxfordre.com/view/10.1093/ acrefore/9780190264079.001.0001/acrefore-9780190264079-e-267.
Dervan, L. E. (2011, December). International white collar crime and the globalization of internal investigations. Fordham Urban Law Journal, 39(2), 361-365.
Dervan, L. E. (2011, December). International white collar crime and the globalization of internal investigations. Fordham Urban Law Journal, 39(2), 361-365.
Eichenwald, K. (2015, May 8). The ‘flash crash’ case doesn’t add up; the government’s case against “Mr. Flash Crash” is a misguided sham. Newsweek, 164(18), 37.
Goldfarb, R. (2018, Winter). No big-game hunting at Justice: How federal prosecutors let major white-collar criminals off the hook and stick shareholders with the costs of corporate crime. The American Prospect, 29(1), 110-114.
Ndubueze, P. N. & Igo, E. U. (2016, July-December). Cyber crime victimization among Internet active Nigerians: An analysis of socio-demographic correlates. International Journal of Criminal Justice Sciences, 8(2), 225-234.
Priyatno, D. (2017, Januray). The alternative model of corporate criminal sanction management in Indonesia. Journal of Legal, Ethical and Regulatory Issues, 20(1), 37-41.
van Wyk, B. (2017, June). How technology can help combat payroll fraud in Africa. African Business, 442, 40-43.
What is computer embezzlement? (2018). Geigle Law Firm. Retrieved from https://www.pga legal.net/blog/2017/10/what-is-computer-embezzlement.shtml.
.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.