(a)
Case summary: A person C, fraudulently representing a company DCC, sends an email to another person E stating that some suspicious activity has been observed in her account. He asks E to re-register her credit card number and password for the account.
To find:The type of cybercrime.
(b)
Case summary:A person C, fraudulently representing a company BBRF, sends an email to another person D and asks him to update his security information in order to avoid the account from being closed.
To find: The type of cybercrime.
(c)
Case summary:A person F posts her resume for a position in business, and managerial finance and accounting on an online job posting site called GWC. Another person H, falsely representing himself an employment officer of a corporation, calls F asking for more personal information via email.
To find:The type of cybercrime.
Trending nowThis is a popular solution!
Chapter 10 Solutions
The Legal Environment of Business: Text and Cases (MindTap Course List)
- Which of the following is true with regard to Cressey’s theory of crime causation? a. For a fraud to occur, only one of the fraud triangle attributes (perceived pressure, perceived opportunity, or rationalization) needs to be present. b. Rationalization is the least important attribute of the fraud triangle c. Financial pressure that is sharable will never result in a fraud. d. Opportunity includes both the opportunity to complete the fraud as well as conceal it without getting caught.arrow_forwardIf Julie uses her roommate Rhonda's school internet account to do research for her term paper rather than her own account, has she committed a crime? What if the account is linked to Rhonda's account with the Bursar's office?arrow_forwardWhich crime is BEST represented by the following situation? Dagan sneaks into an event center through an unlocked window to steal valuable items on display for an event the next day. A. Conspiracy B. Fraud C. Burglary D. Larcenyarrow_forward
- Megan is a single 40-year-old who has borrowed money on numerous occasions. Her payment record has been good, except she has been delinquent in paying a few bills. Which of the following statements is true regarding credit information gathered on Megan? Because Megan has been delinquent, she waives her right to see the credit files. If Megan is rejected for a loan because of the consumer report, the lender must tell her the name of the agency that supplied the report. Megan has a right to have the information regarding her delinquency in paying a few loans stricken from her credit record because her record has generally been good. Megan's delinquencies can be reported by credit reporting agencies for a period of 12 years.arrow_forwardAfter working as the manager of Piedmont Commons branch of Washington Mutual Bank (Washington), Dave Cummings was transferred to another branch. The new manager of Piedmont discovered $58,000 was missing from cash dispenser machines to which Cummings had had access. Bank investigators found security photos showing Cummings violating bank policy requiring two persons to be present when cash was handled. employees told them he had frequently violated the policy. The investigators asked him to take a polygraph test and he refused. Washington fired him telling him it was because he violated the policy. Cummings sued Washington alleging it had violated the EPPA. Had it? full-time sales associate for Kohl’s Department stores, inc., Pamela Manning worked predictable shifts starting no earlier than 9 a.m. and lasting no later than 7 p.m. Kohl’s carried out a nationwide staff restructuring which cut the hours for Manning’s department. she kept her hours by working in other departments as…arrow_forward3. An individual had been involved in an incident inside and outside a Manila restaurant where hiswallet was stolen. He also suffered minor injuries in the incident. He requested access to therestaurant CCTV footage relating to himself, saying he wants to see all details surrounding theincident and possibly figure out a way to recover his wallet. He tried to speak to the managerpersonally but was referred to the security guard. After a few days of following up on his request, hewas finally informed that the establishment would not provide him any data. This infuriated him and,upon going back to the restaurant, he demanded his right to view the footage or else he would createa scene. He was told that, as per their security policy, no “outsider” is allowed to enter areas in theirestablishment designated only as “for employees only”. As a compromise, the manager said theywould give him a record of the footage using the customer’s handheld gadget. What data privacyright is being…arrow_forward
- Cameron is an accountant in the accounting department of Data Analytics Company. Cameron’s son’s college tuition is due within a week, or he cannot continue taking classes. To meet the due date, Cameron transfers funds from Data Analytics to a fictitious bank account, planning to repay the firm within one month. The transfer is discovered before the firm is repaid, and Cameron is arrested. What crime, or crimes, if any, has Cameron committed?arrow_forwardThirty-two-year-old Arsenio Johnson, a retail support officer at a bank in the Corporate Area, has been charged with larceny as a servant and breaches of the Proceeds of Crime Act and the Cybercrimes Act. Reports from detectives assigned to the Fraud Squad are that about 4pm on Wednesday, July13, Johnson was arrested following investigative leads. The allegations are that betweenJanuary 2020 and July 2022; Johnson effected a number of unauthorised transfers of monies from the bank’s suspense account to two accounts associated with him. Based on preliminary investigations, $5.8 million has been established as having been defrauded. However, an audit is being conducted to ascertain the exact amount that was involved. QUESTION Outline the concept of ‘Ethical Dilemma’ for an organization and How do this scenario qualify and outline two (2) actions the organization could have taken to prevent this issue.arrow_forwardOf all the types of occupational fraud, which of the following is the most common?A. CorruptionB. Asset misappropriationC. Fraudulent statementsD. Briberyarrow_forward
- 106 According to the Red Flags rules under the Fair and Accurate Credit Transactions Act (FACTA), which of the following circumstances is a warning sign of identity theft A) Late student loan payment B) Recent escalation of unusual credit card charges C) Account owner status as a non-resident alien D) Early payoff of a car loanarrow_forwardThe National Safety Council estimates that one quarter of all automobile and truck accidents involve cell phone use or texting. In fatality and injury vehicle accidents, plaintiffs’ attorneys subpoena cell phone records, which often form the basis of compelling liability cases against driver-employees and their employers via vicarious liability. While balancing the privacy rights of the employee, with the business practice of the employer, is it appropriate to ban all cell phone usage while driving on company business. Please fully discuss. HINT: Address the Vicarious Liability & Privacy Rights Issues. Please use the IRAC format Issue: Call of the QuestionRule: Rule of Law to be applied to properly answer the questionAnalysis: Applying the rule of law to the facts of the problem presentedConclusion: Answer to the Issuearrow_forwardWhat type of crime is petty theft? A. Infraction B. Misdemeanor C. Capital Crime D. Felonyarrow_forward
- BUSN 11 Introduction to Business Student EditionBusinessISBN:9781337407137Author:KellyPublisher:Cengage LearningEssentials of Business Communication (MindTap Cou...BusinessISBN:9781337386494Author:Mary Ellen Guffey, Dana LoewyPublisher:Cengage LearningAccounting Information Systems (14th Edition)BusinessISBN:9780134474021Author:Marshall B. Romney, Paul J. SteinbartPublisher:PEARSON
- International Business: Competing in the Global M...BusinessISBN:9781259929441Author:Charles W. L. Hill Dr, G. Tomas M. HultPublisher:McGraw-Hill Education