SlideShare a Scribd company logo
1 of 16
Business Crime
By 4th group
Orysta Setyoko 110810251025
Ika Nina B 110810251026
Mirza Ananta 1108102510
Abdul Rohim 1108102110
Retno Pusalia 1108102510
Definition
Understanding of business crime itself, it can be
drawn from the meaning of the word "crime"
and "business". So the Business Crime is an act
that is prohibited by legislation in the broad
sense (the law), which is illegal and punishable
by criminal penalties committed by both
individuals and companies in trading activity
(business) that include:
employment, profession, income, livelihood and
profit, etc.
Kind of Business Crime
White Collar Crime
Occupational Crime
Cyber Crime
White-Collar Crime
The U.S. Congress defined white-collar
crime as an illegal act or series of illegal acts
committed by non-physical means and by
concealment or guile, to obtain money or
property, or to obtain business or personal
advantage.
The term white-collar crime was coined in the
1930’s by Edwin Sutherland who defined it as
crime committed by a person of respectability
and high social status in the course of his
occupation.
How workers/employees of a company
can be victims of white collar crime
Some ways that employees of a company can
become victims of white-collar crime can be that
workers are being exposed to the harms and risks of
being involved in a crime. Another harm making
employees victims of white-collar crime can be when
employers are aware of a physical harm that can
affect their employees. An example of this danger
can be depicted with miners in Newfoundland who
were exposed to Radon gas, which the company (and
the Canadian government) were aware was a danger
to people’s health, yet there was nothing done to
protect the employees.
Occupational Crime
Occupational crime is a crime that is committed
through opportunity created in the course of
legal occupation.
Three Types of Occupational Crime, are :
1. Organizational
2. State-based Authority
3. Professionals
Organizational Crime
Definition: crimes for the benefit of an employing
organization
Examples:
 Price Fixing : tacit price fixing occurs when a limited
number of controlling companies in a particular market
follow the lead of their competitors in price increases.
Overt price fixing involves secret meetings and subtle
communications between competitors in given
industries.
False advertising : when companies use false
advertisements to entice consumers to buy products or
services that offer few, if any, of the publicized benefits.
State-based Authority Crime
Definition: crimes committed by govt. officials or
employees through the exercise of their
power given to them by their job
Examples:
Senator taking Bribes
Professional Crime
Definition: crimes committed by professionals
which violate the trust placed in them by their
patients/clients/individuals
Examples:
 Sexual assault by dentists while patient is asleep
 Lawyers billing clients for hours they did not work
 Doctors/Vets making a false diagnosis
Definition of Cybercrime
• We can define a (genuine) cybercrime as a crime
in which:
▫ the criminal act can be carried out only through the
use of cyber-technology and can take place only in the
cyber realm. (Tavani, 2000)
• Like Forester and Morrison's definition, this one
rules out the three scenarios involving the
computer lab as genuine cybercrimes.
Three Categories of Cybercrime
1. Cyberpiracy - using cyber-technology in unauthorized ways to:
a. reproduce copies of proprietary software and proprietary information, or
b. distribute proprietary information (in digital form) across a computer
network.
2. Cybertrespass - using cyber-technology to gain or to exceed unauthorized access to:
a. an individual's or an organization's computer system, or
b. a password-protected Web site.
3. Cybervandalism - using cyber-technology to unleash one or more programs that:
a. disrupt the transmission of electronic information across one or more
computer networks, including the Internet, or
b. destroy data resident in a computer or damage a computer system's
resources, or both.
Examples of the Three Categories of
Cybercrime
Consider three actual cases:
• 1. Distributing proprietary MP3 files on the
Internet via peer-to peer (P2P) technology;
• 2. unleashing the ILOVEYOU computer virus;
• 3. Launching the denial-of-service attacks on
commercial Web sites.
Categorizing specific Cybercrimes
• Crimes involving the distribution of proprietary
MP3 files would come under the category of
cyberpiracy (category i).
• The crime involving the ILOVEYOU or "love
bug" virus clearly falls under cybervandalism
(category iii).
• The denial-of-service attacks on Web sites falls
under the heading of cybertrespass (category
ii), as well asunder category (iii); it spans more
than one cybercrime category.
Literature
• http://en.wikipedia.org/wiki/White-
collar_crime#Occupational_crime
• http://news.detik.com/read/2012/04/20/14441
9/1897434/10/hakim-nazar-lakukan-kejahatan-
kerah-putih-gunakan-akal-bulus-untuk-uang
• http://www.bbc.co.uk/indonesia/dunia/2012/0
2/120225_berlusconi.shtml
• http://www.julianhermida.com/contcorporate.h
tm

More Related Content

What's hot

The Effect of Crime on Communities
The Effect of Crime on CommunitiesThe Effect of Crime on Communities
The Effect of Crime on CommunitiesDani Cathro
 
Sutherland's differential association theory
Sutherland's differential association theorySutherland's differential association theory
Sutherland's differential association theorycapesociology
 
Money laundering
Money launderingMoney laundering
Money launderingsaadiakh
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Criminal Behavior Powerpoint
Criminal  Behavior  PowerpointCriminal  Behavior  Powerpoint
Criminal Behavior PowerpointJazmin0915
 
Theories of female criminality
Theories of female criminalityTheories of female criminality
Theories of female criminalityA K DAS's | Law
 
Differential Association Theory- Cunningham
Differential Association Theory- CunninghamDifferential Association Theory- Cunningham
Differential Association Theory- Cunningham2576390
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
AML Sanctions Presentation
AML Sanctions PresentationAML Sanctions Presentation
AML Sanctions Presentationwilliamsmcguire
 
Punjab protection of women act 2016.f
Punjab protection of women act 2016.fPunjab protection of women act 2016.f
Punjab protection of women act 2016.fArooj Ashiq
 
Concept of crime
Concept of crimeConcept of crime
Concept of crimeSonuVashist
 

What's hot (20)

Corporate crime presentation
Corporate crime presentationCorporate crime presentation
Corporate crime presentation
 
The Effect of Crime on Communities
The Effect of Crime on CommunitiesThe Effect of Crime on Communities
The Effect of Crime on Communities
 
COMMERCIAL LAW
COMMERCIAL LAW COMMERCIAL LAW
COMMERCIAL LAW
 
Crime and Deviance
Crime and DevianceCrime and Deviance
Crime and Deviance
 
Fraud embezzlement
Fraud embezzlementFraud embezzlement
Fraud embezzlement
 
Sutherland's differential association theory
Sutherland's differential association theorySutherland's differential association theory
Sutherland's differential association theory
 
Money laundering
Money launderingMoney laundering
Money laundering
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Criminal Behavior Powerpoint
Criminal  Behavior  PowerpointCriminal  Behavior  Powerpoint
Criminal Behavior Powerpoint
 
Theories of female criminality
Theories of female criminalityTheories of female criminality
Theories of female criminality
 
Trait theory
Trait theoryTrait theory
Trait theory
 
Penology
PenologyPenology
Penology
 
Differential Association Theory- Cunningham
Differential Association Theory- CunninghamDifferential Association Theory- Cunningham
Differential Association Theory- Cunningham
 
Undue Influence
Undue InfluenceUndue Influence
Undue Influence
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
AML Sanctions Presentation
AML Sanctions PresentationAML Sanctions Presentation
AML Sanctions Presentation
 
Punjab protection of women act 2016.f
Punjab protection of women act 2016.fPunjab protection of women act 2016.f
Punjab protection of women act 2016.f
 
Money laundering
Money laundering  Money laundering
Money laundering
 
Concept of crime
Concept of crimeConcept of crime
Concept of crime
 
Software piracy
Software piracySoftware piracy
Software piracy
 

Viewers also liked

Chapter 16 Solids, Liquids, Gases
Chapter 16 Solids, Liquids, GasesChapter 16 Solids, Liquids, Gases
Chapter 16 Solids, Liquids, Gasesannperry09
 
Corporate crime
Corporate crimeCorporate crime
Corporate crimelemonhusk
 
Attorney Ray Richards Criminal law Breakdown Presenttaion
Attorney Ray Richards Criminal law Breakdown PresenttaionAttorney Ray Richards Criminal law Breakdown Presenttaion
Attorney Ray Richards Criminal law Breakdown PresenttaionAttorney Ray Richards
 
Business Torts and crimes
Business Torts and   crimesBusiness Torts and   crimes
Business Torts and crimesMansur Rashid
 
Principles of criminal liability
Principles of criminal liabilityPrinciples of criminal liability
Principles of criminal liabilitysevans-idaho
 
Lecture 6 introduction to criminal law
Lecture 6 introduction to criminal lawLecture 6 introduction to criminal law
Lecture 6 introduction to criminal lawfatima d
 
ICLG Guide to Business Crime 2018 - Ireland
ICLG Guide to Business Crime 2018 - IrelandICLG Guide to Business Crime 2018 - Ireland
ICLG Guide to Business Crime 2018 - IrelandMatheson Law Firm
 
INTRODUCTION TO CRIMINAL LAW
INTRODUCTION TO CRIMINAL LAWINTRODUCTION TO CRIMINAL LAW
INTRODUCTION TO CRIMINAL LAWKaryll Mitra
 
Crime and its types
Crime and its typesCrime and its types
Crime and its typesAsad Ali
 

Viewers also liked (12)

Criminal Law
Criminal LawCriminal Law
Criminal Law
 
Criminal law.power point....
Criminal law.power point....Criminal law.power point....
Criminal law.power point....
 
Chapter 16 Solids, Liquids, Gases
Chapter 16 Solids, Liquids, GasesChapter 16 Solids, Liquids, Gases
Chapter 16 Solids, Liquids, Gases
 
Corporate crime
Corporate crimeCorporate crime
Corporate crime
 
Attorney Ray Richards Criminal law Breakdown Presenttaion
Attorney Ray Richards Criminal law Breakdown PresenttaionAttorney Ray Richards Criminal law Breakdown Presenttaion
Attorney Ray Richards Criminal law Breakdown Presenttaion
 
Business Torts and crimes
Business Torts and   crimesBusiness Torts and   crimes
Business Torts and crimes
 
Principles of criminal liability
Principles of criminal liabilityPrinciples of criminal liability
Principles of criminal liability
 
Lecture 6 introduction to criminal law
Lecture 6 introduction to criminal lawLecture 6 introduction to criminal law
Lecture 6 introduction to criminal law
 
ICLG Guide to Business Crime 2018 - Ireland
ICLG Guide to Business Crime 2018 - IrelandICLG Guide to Business Crime 2018 - Ireland
ICLG Guide to Business Crime 2018 - Ireland
 
Crime definition
Crime definitionCrime definition
Crime definition
 
INTRODUCTION TO CRIMINAL LAW
INTRODUCTION TO CRIMINAL LAWINTRODUCTION TO CRIMINAL LAW
INTRODUCTION TO CRIMINAL LAW
 
Crime and its types
Crime and its typesCrime and its types
Crime and its types
 

Similar to Business crime

Digital defamation presentation
Digital defamation presentationDigital defamation presentation
Digital defamation presentationMelfi Associates
 
Volonino ppt 01
Volonino ppt 01Volonino ppt 01
Volonino ppt 01lbadeniji
 
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptPresentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptFranciscoJoaoVitug
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsDavid Sweigert
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldAmae OlFato
 
Chapter 16
Chapter 16Chapter 16
Chapter 16glickauf
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Faridah Husin
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Fahad Saleem
 

Similar to Business crime (15)

Digital defamation presentation
Digital defamation presentationDigital defamation presentation
Digital defamation presentation
 
Volonino ppt 01
Volonino ppt 01Volonino ppt 01
Volonino ppt 01
 
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptPresentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
 
White collar crime
White collar crimeWhite collar crime
White collar crime
 
Blowing the whistle
Blowing the whistleBlowing the whistle
Blowing the whistle
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
The Medicare Bill
The Medicare BillThe Medicare Bill
The Medicare Bill
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Ethical dilemma
Ethical dilemmaEthical dilemma
Ethical dilemma
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues
 

More from Ardha

Work agreement, collective working agreement and labor.
Work agreement, collective working agreement and labor.Work agreement, collective working agreement and labor.
Work agreement, collective working agreement and labor.Ardha
 
Transformational leadership
Transformational leadershipTransformational leadership
Transformational leadershipArdha
 
The difference between the economic system
The difference between the economic systemThe difference between the economic system
The difference between the economic systemArdha
 
Team work
Team workTeam work
Team workArdha
 
Studi kelayakan bisnis
Studi kelayakan bisnisStudi kelayakan bisnis
Studi kelayakan bisnisArdha
 
Specific relations behaviors
Specific relations behaviorsSpecific relations behaviors
Specific relations behaviorsArdha
 
Pt pgas
Pt pgasPt pgas
Pt pgasArdha
 
Management of member’s participation
Management of member’s participationManagement of member’s participation
Management of member’s participationArdha
 
Leasing
LeasingLeasing
LeasingArdha
 
Leadership
LeadershipLeadership
LeadershipArdha
 
Kependudukan dan masalah sosekbud
Kependudukan dan masalah sosekbudKependudukan dan masalah sosekbud
Kependudukan dan masalah sosekbudArdha
 
Individual learning
Individual learningIndividual learning
Individual learningArdha
 
Income tax article 24
Income tax article 24Income tax article 24
Income tax article 24Ardha
 
Global hrm
Global hrmGlobal hrm
Global hrmArdha
 
Designing & managing integrated marketing communications
Designing & managing integrated marketing communicationsDesigning & managing integrated marketing communications
Designing & managing integrated marketing communicationsArdha
 
Demokrasi indonesia
Demokrasi indonesiaDemokrasi indonesia
Demokrasi indonesiaArdha
 
It infrastructure and emerging technologies
It infrastructure and emerging technologiesIt infrastructure and emerging technologies
It infrastructure and emerging technologiesArdha
 
Decision making theory and process
Decision making theory and processDecision making theory and process
Decision making theory and processArdha
 
Bond valuation
Bond valuationBond valuation
Bond valuationArdha
 
Bad news
Bad newsBad news
Bad newsArdha
 

More from Ardha (20)

Work agreement, collective working agreement and labor.
Work agreement, collective working agreement and labor.Work agreement, collective working agreement and labor.
Work agreement, collective working agreement and labor.
 
Transformational leadership
Transformational leadershipTransformational leadership
Transformational leadership
 
The difference between the economic system
The difference between the economic systemThe difference between the economic system
The difference between the economic system
 
Team work
Team workTeam work
Team work
 
Studi kelayakan bisnis
Studi kelayakan bisnisStudi kelayakan bisnis
Studi kelayakan bisnis
 
Specific relations behaviors
Specific relations behaviorsSpecific relations behaviors
Specific relations behaviors
 
Pt pgas
Pt pgasPt pgas
Pt pgas
 
Management of member’s participation
Management of member’s participationManagement of member’s participation
Management of member’s participation
 
Leasing
LeasingLeasing
Leasing
 
Leadership
LeadershipLeadership
Leadership
 
Kependudukan dan masalah sosekbud
Kependudukan dan masalah sosekbudKependudukan dan masalah sosekbud
Kependudukan dan masalah sosekbud
 
Individual learning
Individual learningIndividual learning
Individual learning
 
Income tax article 24
Income tax article 24Income tax article 24
Income tax article 24
 
Global hrm
Global hrmGlobal hrm
Global hrm
 
Designing & managing integrated marketing communications
Designing & managing integrated marketing communicationsDesigning & managing integrated marketing communications
Designing & managing integrated marketing communications
 
Demokrasi indonesia
Demokrasi indonesiaDemokrasi indonesia
Demokrasi indonesia
 
It infrastructure and emerging technologies
It infrastructure and emerging technologiesIt infrastructure and emerging technologies
It infrastructure and emerging technologies
 
Decision making theory and process
Decision making theory and processDecision making theory and process
Decision making theory and process
 
Bond valuation
Bond valuationBond valuation
Bond valuation
 
Bad news
Bad newsBad news
Bad news
 

Recently uploaded

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Business crime

  • 1. Business Crime By 4th group Orysta Setyoko 110810251025 Ika Nina B 110810251026 Mirza Ananta 1108102510 Abdul Rohim 1108102110 Retno Pusalia 1108102510
  • 2. Definition Understanding of business crime itself, it can be drawn from the meaning of the word "crime" and "business". So the Business Crime is an act that is prohibited by legislation in the broad sense (the law), which is illegal and punishable by criminal penalties committed by both individuals and companies in trading activity (business) that include: employment, profession, income, livelihood and profit, etc.
  • 3. Kind of Business Crime White Collar Crime Occupational Crime Cyber Crime
  • 4. White-Collar Crime The U.S. Congress defined white-collar crime as an illegal act or series of illegal acts committed by non-physical means and by concealment or guile, to obtain money or property, or to obtain business or personal advantage. The term white-collar crime was coined in the 1930’s by Edwin Sutherland who defined it as crime committed by a person of respectability and high social status in the course of his occupation.
  • 5. How workers/employees of a company can be victims of white collar crime Some ways that employees of a company can become victims of white-collar crime can be that workers are being exposed to the harms and risks of being involved in a crime. Another harm making employees victims of white-collar crime can be when employers are aware of a physical harm that can affect their employees. An example of this danger can be depicted with miners in Newfoundland who were exposed to Radon gas, which the company (and the Canadian government) were aware was a danger to people’s health, yet there was nothing done to protect the employees.
  • 6.
  • 7. Occupational Crime Occupational crime is a crime that is committed through opportunity created in the course of legal occupation. Three Types of Occupational Crime, are : 1. Organizational 2. State-based Authority 3. Professionals
  • 8. Organizational Crime Definition: crimes for the benefit of an employing organization Examples:  Price Fixing : tacit price fixing occurs when a limited number of controlling companies in a particular market follow the lead of their competitors in price increases. Overt price fixing involves secret meetings and subtle communications between competitors in given industries. False advertising : when companies use false advertisements to entice consumers to buy products or services that offer few, if any, of the publicized benefits.
  • 9. State-based Authority Crime Definition: crimes committed by govt. officials or employees through the exercise of their power given to them by their job Examples: Senator taking Bribes
  • 10.
  • 11. Professional Crime Definition: crimes committed by professionals which violate the trust placed in them by their patients/clients/individuals Examples:  Sexual assault by dentists while patient is asleep  Lawyers billing clients for hours they did not work  Doctors/Vets making a false diagnosis
  • 12. Definition of Cybercrime • We can define a (genuine) cybercrime as a crime in which: ▫ the criminal act can be carried out only through the use of cyber-technology and can take place only in the cyber realm. (Tavani, 2000) • Like Forester and Morrison's definition, this one rules out the three scenarios involving the computer lab as genuine cybercrimes.
  • 13. Three Categories of Cybercrime 1. Cyberpiracy - using cyber-technology in unauthorized ways to: a. reproduce copies of proprietary software and proprietary information, or b. distribute proprietary information (in digital form) across a computer network. 2. Cybertrespass - using cyber-technology to gain or to exceed unauthorized access to: a. an individual's or an organization's computer system, or b. a password-protected Web site. 3. Cybervandalism - using cyber-technology to unleash one or more programs that: a. disrupt the transmission of electronic information across one or more computer networks, including the Internet, or b. destroy data resident in a computer or damage a computer system's resources, or both.
  • 14. Examples of the Three Categories of Cybercrime Consider three actual cases: • 1. Distributing proprietary MP3 files on the Internet via peer-to peer (P2P) technology; • 2. unleashing the ILOVEYOU computer virus; • 3. Launching the denial-of-service attacks on commercial Web sites.
  • 15. Categorizing specific Cybercrimes • Crimes involving the distribution of proprietary MP3 files would come under the category of cyberpiracy (category i). • The crime involving the ILOVEYOU or "love bug" virus clearly falls under cybervandalism (category iii). • The denial-of-service attacks on Web sites falls under the heading of cybertrespass (category ii), as well asunder category (iii); it spans more than one cybercrime category.