SlideShare a Scribd company logo
1 of 1
Theory and the White-Collar Offender
Our previous week’s discussion required an explanation for
inappropriate/criminal conduct committed by medical
professionals.
In a 2 page paper, examine which criminological theory best
explains this inappropriate/criminal conduct.
Which theory best describes your view of this white collar
offender.
Support your position with at least three (3) external references
and in paragraph references.

More Related Content

More from croftsshanon

1) Sequential pattern mining is a topic of data mining concerned wit.docx
1) Sequential pattern mining is a topic of data mining concerned wit.docx1) Sequential pattern mining is a topic of data mining concerned wit.docx
1) Sequential pattern mining is a topic of data mining concerned wit.docxcroftsshanon
 
1).Over the last few centuries numerous historical events have t.docx
1).Over the last few centuries numerous historical events have t.docx1).Over the last few centuries numerous historical events have t.docx
1).Over the last few centuries numerous historical events have t.docxcroftsshanon
 
1)Many of the New World’s early explorers were looking for a.docx
1)Many of the New World’s early explorers were looking for a.docx1)Many of the New World’s early explorers were looking for a.docx
1)Many of the New World’s early explorers were looking for a.docxcroftsshanon
 
1). Using the Web or other resources, write a brief paper about .docx
1). Using the Web or other resources, write a brief paper about .docx1). Using the Web or other resources, write a brief paper about .docx
1). Using the Web or other resources, write a brief paper about .docxcroftsshanon
 
1). Using the Web or other resources, write a brief paper about RSA,.docx
1). Using the Web or other resources, write a brief paper about RSA,.docx1). Using the Web or other resources, write a brief paper about RSA,.docx
1). Using the Web or other resources, write a brief paper about RSA,.docxcroftsshanon
 
1)Does Facebook have the constitutional right to deny someone from p.docx
1)Does Facebook have the constitutional right to deny someone from p.docx1)Does Facebook have the constitutional right to deny someone from p.docx
1)Does Facebook have the constitutional right to deny someone from p.docxcroftsshanon
 
1)  Your Research Project on the surveillance state consists of .docx
1)  Your Research Project on the surveillance state consists of .docx1)  Your Research Project on the surveillance state consists of .docx
1)  Your Research Project on the surveillance state consists of .docxcroftsshanon
 
1) Describe the price-earnings ratio.  What can investors learn .docx
1) Describe the price-earnings ratio.  What can investors learn .docx1) Describe the price-earnings ratio.  What can investors learn .docx
1) Describe the price-earnings ratio.  What can investors learn .docxcroftsshanon
 
1)what the Internet is and how it has changed the world.  ( 500 word.docx
1)what the Internet is and how it has changed the world.  ( 500 word.docx1)what the Internet is and how it has changed the world.  ( 500 word.docx
1)what the Internet is and how it has changed the world.  ( 500 word.docxcroftsshanon
 
1)  What are anabolic steroids Why are they abused2) Why do .docx
1)  What are anabolic steroids Why are they abused2) Why do .docx1)  What are anabolic steroids Why are they abused2) Why do .docx
1)  What are anabolic steroids Why are they abused2) Why do .docxcroftsshanon
 
1)Why are informal settings such as dinners useful2)Could t.docx
1)Why are informal settings such as dinners useful2)Could t.docx1)Why are informal settings such as dinners useful2)Could t.docx
1)Why are informal settings such as dinners useful2)Could t.docxcroftsshanon
 
1)  you are the web master for the Republican Party National Committ.docx
1)  you are the web master for the Republican Party National Committ.docx1)  you are the web master for the Republican Party National Committ.docx
1)  you are the web master for the Republican Party National Committ.docxcroftsshanon
 
1)  What are anabolic steroids Why are they abused2) Why.docx
1)  What are anabolic steroids Why are they abused2) Why.docx1)  What are anabolic steroids Why are they abused2) Why.docx
1)  What are anabolic steroids Why are they abused2) Why.docxcroftsshanon
 
1) Write a two page summary regarding how an  attacker uses Ping swe.docx
1) Write a two page summary regarding how an  attacker uses Ping swe.docx1) Write a two page summary regarding how an  attacker uses Ping swe.docx
1) Write a two page summary regarding how an  attacker uses Ping swe.docxcroftsshanon
 
1) What is the difference between race and ethnicity2) What.docx
1) What is the difference between race and ethnicity2) What.docx1) What is the difference between race and ethnicity2) What.docx
1) What is the difference between race and ethnicity2) What.docxcroftsshanon
 
1) What is the difference between biological and cultural evolut.docx
1) What is the difference between biological and cultural evolut.docx1) What is the difference between biological and cultural evolut.docx
1) What is the difference between biological and cultural evolut.docxcroftsshanon
 
1) Was the arrest of Mayo a legal arrest Discuss why. Please in.docx
1) Was the arrest of Mayo a legal arrest Discuss why. Please in.docx1) Was the arrest of Mayo a legal arrest Discuss why. Please in.docx
1) Was the arrest of Mayo a legal arrest Discuss why. Please in.docxcroftsshanon
 
1)  The Hub and Spoke Concept continues its development in the vario.docx
1)  The Hub and Spoke Concept continues its development in the vario.docx1)  The Hub and Spoke Concept continues its development in the vario.docx
1)  The Hub and Spoke Concept continues its development in the vario.docxcroftsshanon
 
1)  Is a trial a search for the truth or is it something else Expla.docx
1)  Is a trial a search for the truth or is it something else Expla.docx1)  Is a trial a search for the truth or is it something else Expla.docx
1)  Is a trial a search for the truth or is it something else Expla.docxcroftsshanon
 
1)  An IT Security consultant has made three primary recommendations.docx
1)  An IT Security consultant has made three primary recommendations.docx1)  An IT Security consultant has made three primary recommendations.docx
1)  An IT Security consultant has made three primary recommendations.docxcroftsshanon
 

More from croftsshanon (20)

1) Sequential pattern mining is a topic of data mining concerned wit.docx
1) Sequential pattern mining is a topic of data mining concerned wit.docx1) Sequential pattern mining is a topic of data mining concerned wit.docx
1) Sequential pattern mining is a topic of data mining concerned wit.docx
 
1).Over the last few centuries numerous historical events have t.docx
1).Over the last few centuries numerous historical events have t.docx1).Over the last few centuries numerous historical events have t.docx
1).Over the last few centuries numerous historical events have t.docx
 
1)Many of the New World’s early explorers were looking for a.docx
1)Many of the New World’s early explorers were looking for a.docx1)Many of the New World’s early explorers were looking for a.docx
1)Many of the New World’s early explorers were looking for a.docx
 
1). Using the Web or other resources, write a brief paper about .docx
1). Using the Web or other resources, write a brief paper about .docx1). Using the Web or other resources, write a brief paper about .docx
1). Using the Web or other resources, write a brief paper about .docx
 
1). Using the Web or other resources, write a brief paper about RSA,.docx
1). Using the Web or other resources, write a brief paper about RSA,.docx1). Using the Web or other resources, write a brief paper about RSA,.docx
1). Using the Web or other resources, write a brief paper about RSA,.docx
 
1)Does Facebook have the constitutional right to deny someone from p.docx
1)Does Facebook have the constitutional right to deny someone from p.docx1)Does Facebook have the constitutional right to deny someone from p.docx
1)Does Facebook have the constitutional right to deny someone from p.docx
 
1)  Your Research Project on the surveillance state consists of .docx
1)  Your Research Project on the surveillance state consists of .docx1)  Your Research Project on the surveillance state consists of .docx
1)  Your Research Project on the surveillance state consists of .docx
 
1) Describe the price-earnings ratio.  What can investors learn .docx
1) Describe the price-earnings ratio.  What can investors learn .docx1) Describe the price-earnings ratio.  What can investors learn .docx
1) Describe the price-earnings ratio.  What can investors learn .docx
 
1)what the Internet is and how it has changed the world.  ( 500 word.docx
1)what the Internet is and how it has changed the world.  ( 500 word.docx1)what the Internet is and how it has changed the world.  ( 500 word.docx
1)what the Internet is and how it has changed the world.  ( 500 word.docx
 
1)  What are anabolic steroids Why are they abused2) Why do .docx
1)  What are anabolic steroids Why are they abused2) Why do .docx1)  What are anabolic steroids Why are they abused2) Why do .docx
1)  What are anabolic steroids Why are they abused2) Why do .docx
 
1)Why are informal settings such as dinners useful2)Could t.docx
1)Why are informal settings such as dinners useful2)Could t.docx1)Why are informal settings such as dinners useful2)Could t.docx
1)Why are informal settings such as dinners useful2)Could t.docx
 
1)  you are the web master for the Republican Party National Committ.docx
1)  you are the web master for the Republican Party National Committ.docx1)  you are the web master for the Republican Party National Committ.docx
1)  you are the web master for the Republican Party National Committ.docx
 
1)  What are anabolic steroids Why are they abused2) Why.docx
1)  What are anabolic steroids Why are they abused2) Why.docx1)  What are anabolic steroids Why are they abused2) Why.docx
1)  What are anabolic steroids Why are they abused2) Why.docx
 
1) Write a two page summary regarding how an  attacker uses Ping swe.docx
1) Write a two page summary regarding how an  attacker uses Ping swe.docx1) Write a two page summary regarding how an  attacker uses Ping swe.docx
1) Write a two page summary regarding how an  attacker uses Ping swe.docx
 
1) What is the difference between race and ethnicity2) What.docx
1) What is the difference between race and ethnicity2) What.docx1) What is the difference between race and ethnicity2) What.docx
1) What is the difference between race and ethnicity2) What.docx
 
1) What is the difference between biological and cultural evolut.docx
1) What is the difference between biological and cultural evolut.docx1) What is the difference between biological and cultural evolut.docx
1) What is the difference between biological and cultural evolut.docx
 
1) Was the arrest of Mayo a legal arrest Discuss why. Please in.docx
1) Was the arrest of Mayo a legal arrest Discuss why. Please in.docx1) Was the arrest of Mayo a legal arrest Discuss why. Please in.docx
1) Was the arrest of Mayo a legal arrest Discuss why. Please in.docx
 
1)  The Hub and Spoke Concept continues its development in the vario.docx
1)  The Hub and Spoke Concept continues its development in the vario.docx1)  The Hub and Spoke Concept continues its development in the vario.docx
1)  The Hub and Spoke Concept continues its development in the vario.docx
 
1)  Is a trial a search for the truth or is it something else Expla.docx
1)  Is a trial a search for the truth or is it something else Expla.docx1)  Is a trial a search for the truth or is it something else Expla.docx
1)  Is a trial a search for the truth or is it something else Expla.docx
 
1)  An IT Security consultant has made three primary recommendations.docx
1)  An IT Security consultant has made three primary recommendations.docx1)  An IT Security consultant has made three primary recommendations.docx
1)  An IT Security consultant has made three primary recommendations.docx
 

Recently uploaded

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 

Recently uploaded (20)

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

Theory and the White-Collar OffenderOur previous week’s disc.docx

  • 1. Theory and the White-Collar Offender Our previous week’s discussion required an explanation for inappropriate/criminal conduct committed by medical professionals. In a 2 page paper, examine which criminological theory best explains this inappropriate/criminal conduct. Which theory best describes your view of this white collar offender. Support your position with at least three (3) external references and in paragraph references.