Preview

Annotated Bibliography

Satisfactory Essays
Open Document
Open Document
482 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Annotated Bibliography
Annotated Bibliography

Computer Crimes. (2007, Spring)American Criminal Law Review,285(51). Retrieved July 1st from Gale Power Search Database
This article gives a good overview of actual computer crimes and general information and examples such. Information about what is involved in a computer crime and what the laws enforced are all discussed in this article.
The Challenge Of White Collar Sentencing. (2007,Spring) Journal of Criminal Law and Criminology, 731(29). Retrieved July 1st from Gale Power Search Database
Great source of explanation and real examples of how it is tough to keep white collar criminals behind bars and what is being done to fix this problem. Examples of what the author thinks to enforce white collar sentencing are also given.
Multilevel Franchise or Pyramid Scheme?(1985, October) Journal of Small Business Management, 54 (5). Retrieved July 1st from Gale Power Search Database
The famous pyramid scheme is dissected and shows the ins and outs. This article discusses how legal businesses find loop holes and teeter on the edge of legality.
The Fight Against Fraud: A Look At Best Practices Used in the Effort to Defeat Corporate Fraud. (2004, April) Internal Auditor, 34 (5) Retrieved July 1st from Gale Power Search Database
The methods of beating fraud in corporations are discussed along with how certain situations have been squashed. Many individuals have worked very hard to beat these crimes and it shows how they did it.
Signs Of Fraud (2000, December) The CPA Journal, 60, retrieved July 1st from Gale Power Search Database
This article is taken from actual CPA’s and how they can detect signs of fraudulent activities within corporations or small business’s. It shows how many activities may seem harmless but may actually be certain signs of crimes being committed.
Crime Wave! The 100 Corporate Criminals of the 1990’s (1999, July) 9, Multinational Monitor, Retrieved July 1st from Gale Power Search Database
This article discusses



Bibliography: Computer Crimes. (2007, Spring)American Criminal Law Review,285(51). Retrieved July 1st from Gale Power Search Database This article gives a good overview of actual computer crimes and general information and examples such Multilevel Franchise or Pyramid Scheme?(1985, October) Journal of Small Business Management, 54 (5). Retrieved July 1st from Gale Power Search Database The famous pyramid scheme is dissected and shows the ins and outs Signs Of Fraud (2000, December) The CPA Journal, 60, retrieved July 1st from Gale Power Search Database This article is taken from actual CPA’s and how they can detect signs of fraudulent activities within corporations or small business’s Crime Wave! The 100 Corporate Criminals of the 1990’s (1999, July) 9, Multinational Monitor, Retrieved July 1st from Gale Power Search Database This article discusses great examples of real offenders and white collar crimes of all types Finding Fraud on the Internet (1996, October) 14 (4), Internal Auditor, Retrieved July 1st from Gale Power Search Database This article goes into detail about the most widely known source of fraud: the internet Booth,K. (2002)Called to Account. Time Article. Retrieved July 1, 2008, from http://www.time.com/time/business/article/0,8599,263006,00.html This is an article about the famous Enron scandal

You May Also Find These Documents Helpful

  • Better Essays

    Dervaes, J. R. 2007. Fraud’s finer points: Small organizations need internal control, part one. Fraud Magazine September/October .…

    • 6558 Words
    • 27 Pages
    Better Essays
  • Satisfactory Essays

    Introduction: This paper will explain why the topic of White Collar Crime needs to be researched and what actions should be taken, while during the research.…

    • 553 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    American Institute of Certified Public Accountants. (2001). Statement of Auditing Standards No. 95, Generally Accepted Auditing Standards,…

    • 1198 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    The current major laws related to computer crime and issues related to the enforcement of these laws.…

    • 336 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Accounting, Fraud

    • 2038 Words
    • 9 Pages

    Ulinski, Michael. "AN ANALYSIS OF SMALL COMPANY FRAUDS AND." American Society of Behavioral Society. Dept of Business, Pace University. 05 Feb. 2008<http://www.asbbs.org/files/2006/ASBBS%20EJournal%202006%20HTM%20Files/AN%20ANALYSIS%20OF%20SMALL%20asbbs%20e-journal%202006.htm>.…

    • 2038 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    References: Singleton, T., Singleton, A., Bologna, J., & Linquist, R. (2006). Fraud Auditing and Forensic Accounting (3rd ed.). Hoboken, NJ: John Wiley & Sons, Inc.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Sutherland, Edwin Hardin. (1983). ‘White collar crime: The uncut version.’ Eds. Gilbert Geis, and Colin Goff. Vol. 58. New Haven: Yale University Press.…

    • 1840 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Carter, David. (1995, July). Types of computer crimes. The FBI Magazine, Retrieved from http://www.lectlaw.com/files/cri14.htm, doi: The Lectric Law Library…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Rolemodel

    • 844 Words
    • 4 Pages

    Raspante, J. F., & Tarasco, J. A. (n.d.). Traps for the Unwary in CPA Firm…

    • 844 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Enron, WorldCom, Tyco, HealthSouth and Adelphia were selected for analysis because of the availability of information regarding specific events occured before, during and after the fraud period as well as the ethical issues involved . There is abundant literature presented on the Enron and WorldCom scandal. Tyco, Adelphia, and HealthSouth were selected to expand and support the information available in the WorldCom and Enron cases.…

    • 7226 Words
    • 21 Pages
    Powerful Essays
  • Better Essays

    Computer Fraud and Crimes

    • 1013 Words
    • 5 Pages

    amounts of memory being used and the file usage if something is going on that…

    • 1013 Words
    • 5 Pages
    Better Essays
  • Best Essays

    Patriot Act

    • 2067 Words
    • 9 Pages

    Britz, M. (2009). Computer Forensics and Cyber Crime. Upper Saddle River, New Jersey: Prentice Hall.…

    • 2067 Words
    • 9 Pages
    Best Essays
  • Powerful Essays

    Financial Fraud in Canada

    • 7202 Words
    • 29 Pages

    "Seven signs of internal fraud." PwC US: Building relationships, creating value. N.p., n.d. Web. 3 Apr. 2011. .…

    • 7202 Words
    • 29 Pages
    Powerful Essays
  • Good Essays

    computer crime

    • 732 Words
    • 3 Pages

    Computer crime, or Cybercrime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime is criminal exploitation of the Internet. Dr. Debarati Halder and Dr. K. Jaishankar (2011) define Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS).” Some examples of computer crimes are as follows:…

    • 732 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cyber Crime

    • 8636 Words
    • 35 Pages

    Trends are developing to shift the nature of crimes from traditional to Hi-Tech and it is impossible to prevent people from misusing technology to commit crimes. Computer or networks may be used as a tool or a storage medium to commit crimes. In the meantime, we must keep in mind that all computers related systems are vulnerable to destruction and intrusion. As a result some authors classify computer crimes under three areas such as :…

    • 8636 Words
    • 35 Pages
    Good Essays

Related Topics