SlideShare a Scribd company logo
1 of 6
Case Study 3.1: White Collar Crime: The Gap Between
Perpetrators and Victims
When a prominent business leader ends up in prison, we often
ask: “Why would a successful person with so much to lose risk
it all by engaging in criminal activity?” Harvard professor
Eugene Soltes sets out to answer this question in his book Why
Do They Do It? In addition to reviewing what experts have to
say on the subject, he interviews executives serving jail time for
insider trading, manipulating interest rates, backdating stock
options, falsifying financial statements, and stealing from
investors. Soltes points out that while he analyzes the failures
of prominent executives, we can learn from their example to
avoid a similar fate.
Soltes reports that two common explanations for white collar
crime—personality weaknesses and judging that the benefits
outweigh the costs—don’t explain the actions of his subjects.
For the most part, the convicted executives didn’t have poor
self-control or lack empathy. (One exception was Bernie
Madoff, who seemed to lack feeling even for his own family.)
And they didn’t carefully weigh the costs and benefits of their
actions. Scott London, a KPMG senior partner who provided
inside trading information to a friend, noted, “At the time this
[securities fraud] was going on, I just never really thought
about the consequences” (p. 99). London made little money
from providing the information to his friend but had to pay a
high cost. In addition to going to jail, he lost his CPA license
and his job (which paid $650,000 to $900,000 a year) and had to
resign from three charitable boards.
Professor Soltes puts much of the blame for corporate crime on
the disconnect between the action and the harm. In large
companies, perpetrators are separated physically and
psychologically from their victims. Their misbehavior is eased
by the fact that they are distanced from the harm caused by their
crimes. The CFO of ProQuest, for example, illegally boosted
earnings, which cost shareholders $437 million when the scam
was discovered. However, he didn’t think he did much damage
because he carried out his crime on a computer and didn’t target
a particular individual or group. In addition, perpetrators are
often rewarded for misbehavior (get promoted or honored for
making the numbers) before they are caught. According to
Soltes:
Each kind of corporate misconduct has facets that make it
resonate less intuitively. With financial reporting fraud, the
effects are not felt until long into the future and the victims are
often applauding the perpetrator’s behavior until the deception
is revealed. With insider trading, it’s difficult to identify
precisely which investors are harmed. And with tax evasion, the
reduction to government coffers make the harm to specific
individuals so diffuse that it no longer feels salient to say it
harmed any individual person. (pp. 128–129)
Many of the disgraced executives didn’t consider the moral
implications of their actions. They saw themselves as solving
immediate business problems under time pressures in order to
further their careers. They relied on their intuitions, which
lacked a moral component. No one then challenged their
choices. Executives at Symbol Technologies, for example, were
convicted of booking sales for equipment that wasn’t shipped in
order to continue to reach earning projections. Said one
executive engaged in the scheme: “We always came up with
solutions . . . Whatever it took, you did it and you got success
from it.” (p. 189)
Soltes concludes by offering suggestions to reduce corporate
misbehavior in ourselves and others. (Financial fraud costs the
United States nearly $400 billion a year.) He argues that we
need “uncomfortable dissonance” if we are to avoid falling
victim to faulty intuition. To engage in deliberate reasoning, we
need to hear more dissenting opinions when making choices,
something that his leaders failed to do. Along with dissonance
we need to be humble, to appreciate “our lack of invincibility—
our inherent weakness and frailty” (p. 329). Doing so will
encourage us to stop and reflect. However, moving toward
greater humility may not be easy. The former executives
interviewed by Soltes didn’t appear all that humbled by their
experiences. Instead, they believed that what they did wasn’t so
bad and that others were more at fault. According to Soltes:
“Virtually every one of the former executives I spoke with
pointed out, even complained, that it was not he who was the
true villain—it was always someone else” (p. 329).
Discussion Probes
1. What steps can organizations take to reduce the physical and
psychological distance between financial crimes and the harms
they cause?
2. What might be other reasons that executives commit white-
collar crimes?
3. How can we help ensure that moral considerations are
factored into important organizational decisions?
4. How open are you to “uncomfortable dissonance?” How can
you ensure that you will hear from those with different
opinions?
5. Why do so many disgraced executives excuse their behavior?
6. What are some strategies for recognizing our “inherent
weakness and frailty?”
A malware protection procedure guide
2
A malware protection procedure guide
A malware protection procedure guide
User access websites and download files from unknown sources
which could compromise user system such file or application
know as malware or malicious software. Which can Record
keystroke, leak personal information, get user credential or
credit card or bank detail of user, Malware can also use to
control user machines remotely.
Common Malware type is Virus, Trojan, Worm, spyware,
Backdoor, Rootkit. Every day new malware and viruses are
detected. Best practices for the defending system from malware
is an update and implement antivirus scanning and patching
regularly. On updating the antivirus program, we download new
definitions, then start looking for new viruses listed in the
definition.
a. List of approved anti-malware software
a. AVG Business Edition
b. Windows defender
c. Bitdefender Gravity Zone Advance Business security
Anti-Spyware
A. Total AV
B. Norton by Symantec
Antivirus software is running and identifying any malware
before it causes trouble. Symptoms of malware infection are
Slow response opening application, abnormal application
behavior, OS not functioning correctly, Numerous windows pop
up on the screen. We will use AVG, an antivirus program, to
identify malware or spyware on the system. Manual scan good
temporary measure but in real-time scan should perform regular
intervals that minimizes impact to users.
Ensuring anti-malware software and data is up to date. Always
ensure that the system running on the latest security patch helps
to protect the system form other security risks or virus attacks.
All workstations have an antivirus with updated virus
definition, detection, and repair engine. Schedule a daily fast
scan to check for viruses such as activity we can conduct during
non-peak hours, such as during lunch break. Also, we can
schedule a complete scan on Sunday when the system is
performing minimal activities. Always scan removable disk and
files downloaded from the internet before using it. Also, backup
all programs and data regularly. Recovery from clean backup is
the best way to restore files. We can also review logs to find
any anomalies.
If any system is get attacked with malware, the IT administrator
should disconnect those systems from the network to prevent
further damage from the attacker.IT admin wants to know about
the infection to stop it spreading or compromising our person
file. Use a deep scan option and check for any possible malware
infection. If we found any malware, remove it. If we did not
find anything and we still feel something is not right boot
system in safe mode. In safe mode, minimum required services
and programs will load and prevent any malware is set to
startup when OS starts and if PC working fast in safe mode
means possible malware infection. “Before starting anything,
delete temporary files to accelerate the malware scan, while
clearing downloaded virus files.” (Elsie Otachi,2019)
Reference
1. Otachi, E. (2019, September 17). What To Do If You Think
Your Computer Or Server Has Been Infected With Malware.
Retrieved from https://helpdeskgeek.com/help-desk/what-to-do-
if-you-think-your-computer-or-server-has-been-infected-with-
malware/
2. Solomon, M. (2011). Security strategies in windows
platforms and applications. Sudbury, MA: Jones & Bartlett
Learning.(Chapter 5)

More Related Content

Similar to Case Study 3.1 White Collar Crime The Gap Between Perpetrators a.docx

Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
Cybersecurity: How to be Proactive
Cybersecurity: How to be ProactiveCybersecurity: How to be Proactive
Cybersecurity: How to be ProactiveBrown Smith Wallace
 
Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementMighty Guides, Inc.
 
Sub Material Fraud Risk White Paper
Sub Material Fraud Risk White PaperSub Material Fraud Risk White Paper
Sub Material Fraud Risk White Paperjhare
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection RecommendationsAlienVault
 
53Pan has just been hired as the new cybersecurity manager .pdf
53Pan has just been hired as the new cybersecurity manager .pdf53Pan has just been hired as the new cybersecurity manager .pdf
53Pan has just been hired as the new cybersecurity manager .pdfacecomputertcr
 
Avoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AloneAvoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AlonePortalGuard
 
1.5 Pages are requiredYou have been hired .docx
1.5 Pages are requiredYou have been hired .docx1.5 Pages are requiredYou have been hired .docx
1.5 Pages are requiredYou have been hired .docxchristiandean12115
 
Discussion #1Based on authoritative sources (including peer revi.docx
Discussion #1Based on authoritative sources (including peer revi.docxDiscussion #1Based on authoritative sources (including peer revi.docx
Discussion #1Based on authoritative sources (including peer revi.docxcuddietheresa
 
Peter Giblin - Tone at the Top
Peter Giblin - Tone at the TopPeter Giblin - Tone at the Top
Peter Giblin - Tone at the TopPeter Giblin
 
Protecting your pc in the new year
Protecting your pc in the new yearProtecting your pc in the new year
Protecting your pc in the new yearMichael Wells
 
How to recover from your next data breach
How to recover from your next data breachHow to recover from your next data breach
How to recover from your next data breachSILO Compliance Systems
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills
 
Journal+Feature-InsiderThreat
Journal+Feature-InsiderThreatJournal+Feature-InsiderThreat
Journal+Feature-InsiderThreatAnthony Buenger
 
Case Study
Case StudyCase Study
Case Studybogans
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityAliyuMuhammadButu
 

Similar to Case Study 3.1 White Collar Crime The Gap Between Perpetrators a.docx (20)

Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Cybersecurity: How to be Proactive
Cybersecurity: How to be ProactiveCybersecurity: How to be Proactive
Cybersecurity: How to be Proactive
 
Robust Software Solutions.pptx
Robust Software Solutions.pptxRobust Software Solutions.pptx
Robust Software Solutions.pptx
 
Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability Management
 
Sub Material Fraud Risk White Paper
Sub Material Fraud Risk White PaperSub Material Fraud Risk White Paper
Sub Material Fraud Risk White Paper
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection Recommendations
 
53Pan has just been hired as the new cybersecurity manager .pdf
53Pan has just been hired as the new cybersecurity manager .pdf53Pan has just been hired as the new cybersecurity manager .pdf
53Pan has just been hired as the new cybersecurity manager .pdf
 
Avoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AloneAvoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not Alone
 
1.5 Pages are requiredYou have been hired .docx
1.5 Pages are requiredYou have been hired .docx1.5 Pages are requiredYou have been hired .docx
1.5 Pages are requiredYou have been hired .docx
 
Discussion #1Based on authoritative sources (including peer revi.docx
Discussion #1Based on authoritative sources (including peer revi.docxDiscussion #1Based on authoritative sources (including peer revi.docx
Discussion #1Based on authoritative sources (including peer revi.docx
 
Peter Giblin - Tone at the Top
Peter Giblin - Tone at the TopPeter Giblin - Tone at the Top
Peter Giblin - Tone at the Top
 
Protecting your pc in the new year
Protecting your pc in the new yearProtecting your pc in the new year
Protecting your pc in the new year
 
How to recover from your next data breach
How to recover from your next data breachHow to recover from your next data breach
How to recover from your next data breach
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
 
Journal+Feature-InsiderThreat
Journal+Feature-InsiderThreatJournal+Feature-InsiderThreat
Journal+Feature-InsiderThreat
 
Case Study
Case StudyCase Study
Case Study
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 

More from jasoninnes20

1-2paragraphsapa formatWelcome to Module 6. Divers.docx
1-2paragraphsapa formatWelcome to Module 6. Divers.docx1-2paragraphsapa formatWelcome to Module 6. Divers.docx
1-2paragraphsapa formatWelcome to Module 6. Divers.docxjasoninnes20
 
1-Post a two-paragraph summary of the lecture;  2- Review the li.docx
1-Post a two-paragraph summary of the lecture;  2- Review the li.docx1-Post a two-paragraph summary of the lecture;  2- Review the li.docx
1-Post a two-paragraph summary of the lecture;  2- Review the li.docxjasoninnes20
 
1-What are the pros and cons of parole. Discuss!2-Discuss ways t.docx
1-What are the pros and cons of parole. Discuss!2-Discuss ways t.docx1-What are the pros and cons of parole. Discuss!2-Discuss ways t.docx
1-What are the pros and cons of parole. Discuss!2-Discuss ways t.docxjasoninnes20
 
1-page (max) proposal including a Title, Executive Summary, Outline,.docx
1-page (max) proposal including a Title, Executive Summary, Outline,.docx1-page (max) proposal including a Title, Executive Summary, Outline,.docx
1-page (max) proposal including a Title, Executive Summary, Outline,.docxjasoninnes20
 
1-Identify the benefits of sharing your action research with oth.docx
1-Identify the benefits of sharing your action research with oth.docx1-Identify the benefits of sharing your action research with oth.docx
1-Identify the benefits of sharing your action research with oth.docxjasoninnes20
 
1-page APA 7 the edition No referenceDescription of Personal a.docx
1-page APA 7 the edition  No referenceDescription of Personal a.docx1-page APA 7 the edition  No referenceDescription of Personal a.docx
1-page APA 7 the edition No referenceDescription of Personal a.docxjasoninnes20
 
1-Pretend that you are a new teacher.  You see that one of your st.docx
1-Pretend that you are a new teacher.  You see that one of your st.docx1-Pretend that you are a new teacher.  You see that one of your st.docx
1-Pretend that you are a new teacher.  You see that one of your st.docxjasoninnes20
 
1- What is the difference between a multi-valued attribute and a.docx
1- What is the difference between a multi-valued attribute and a.docx1- What is the difference between a multi-valued attribute and a.docx
1- What is the difference between a multi-valued attribute and a.docxjasoninnes20
 
1- What is a Relational Algebra What are the operators. Explain.docx
1- What is a Relational Algebra What are the operators. Explain.docx1- What is a Relational Algebra What are the operators. Explain.docx
1- What is a Relational Algebra What are the operators. Explain.docxjasoninnes20
 
1- Watch the movie Don Quixote, which is an adaptation of Cerv.docx
1- Watch the movie Don Quixote, which is an adaptation of Cerv.docx1- Watch the movie Don Quixote, which is an adaptation of Cerv.docx
1- Watch the movie Don Quixote, which is an adaptation of Cerv.docxjasoninnes20
 
1- reply to both below, no more than 75 words per each.  PSY 771.docx
1- reply to both below, no more than 75 words per each.  PSY 771.docx1- reply to both below, no more than 75 words per each.  PSY 771.docx
1- reply to both below, no more than 75 words per each.  PSY 771.docxjasoninnes20
 
1- Pathogenesis 2- Organs affected in the body 3- Chain of i.docx
1- Pathogenesis 2- Organs affected in the body 3- Chain of i.docx1- Pathogenesis 2- Organs affected in the body 3- Chain of i.docx
1- Pathogenesis 2- Organs affected in the body 3- Chain of i.docxjasoninnes20
 
1-  I can totally see where there would be tension between.docx
1-  I can totally see where there would be tension between.docx1-  I can totally see where there would be tension between.docx
1-  I can totally see where there would be tension between.docxjasoninnes20
 
1- One of the most difficult challenges leaders face is to integrate.docx
1- One of the most difficult challenges leaders face is to integrate.docx1- One of the most difficult challenges leaders face is to integrate.docx
1- One of the most difficult challenges leaders face is to integrate.docxjasoninnes20
 
1- Design one assignment of the Word Find (education word) and the o.docx
1- Design one assignment of the Word Find (education word) and the o.docx1- Design one assignment of the Word Find (education word) and the o.docx
1- Design one assignment of the Word Find (education word) and the o.docxjasoninnes20
 
1- This chapter suggests that emotional intelligence is an interpers.docx
1- This chapter suggests that emotional intelligence is an interpers.docx1- This chapter suggests that emotional intelligence is an interpers.docx
1- This chapter suggests that emotional intelligence is an interpers.docxjasoninnes20
 
1-2 pages APA format1. overall purpose of site 2. resources .docx
1-2 pages APA format1. overall purpose of site 2. resources .docx1-2 pages APA format1. overall purpose of site 2. resources .docx
1-2 pages APA format1. overall purpose of site 2. resources .docxjasoninnes20
 
1-Define Energy.2- What is Potential energy3- What is K.docx
1-Define Energy.2- What is Potential energy3- What is K.docx1-Define Energy.2- What is Potential energy3- What is K.docx
1-Define Energy.2- What is Potential energy3- What is K.docxjasoninnes20
 
1- Find one quote from chapter 7-9. Explain why this quote stood.docx
1- Find one quote from chapter 7-9. Explain why this quote stood.docx1- Find one quote from chapter 7-9. Explain why this quote stood.docx
1- Find one quote from chapter 7-9. Explain why this quote stood.docxjasoninnes20
 
1-Confucianism2-ShintoChoose one of the religious system.docx
1-Confucianism2-ShintoChoose one of the religious system.docx1-Confucianism2-ShintoChoose one of the religious system.docx
1-Confucianism2-ShintoChoose one of the religious system.docxjasoninnes20
 

More from jasoninnes20 (20)

1-2paragraphsapa formatWelcome to Module 6. Divers.docx
1-2paragraphsapa formatWelcome to Module 6. Divers.docx1-2paragraphsapa formatWelcome to Module 6. Divers.docx
1-2paragraphsapa formatWelcome to Module 6. Divers.docx
 
1-Post a two-paragraph summary of the lecture;  2- Review the li.docx
1-Post a two-paragraph summary of the lecture;  2- Review the li.docx1-Post a two-paragraph summary of the lecture;  2- Review the li.docx
1-Post a two-paragraph summary of the lecture;  2- Review the li.docx
 
1-What are the pros and cons of parole. Discuss!2-Discuss ways t.docx
1-What are the pros and cons of parole. Discuss!2-Discuss ways t.docx1-What are the pros and cons of parole. Discuss!2-Discuss ways t.docx
1-What are the pros and cons of parole. Discuss!2-Discuss ways t.docx
 
1-page (max) proposal including a Title, Executive Summary, Outline,.docx
1-page (max) proposal including a Title, Executive Summary, Outline,.docx1-page (max) proposal including a Title, Executive Summary, Outline,.docx
1-page (max) proposal including a Title, Executive Summary, Outline,.docx
 
1-Identify the benefits of sharing your action research with oth.docx
1-Identify the benefits of sharing your action research with oth.docx1-Identify the benefits of sharing your action research with oth.docx
1-Identify the benefits of sharing your action research with oth.docx
 
1-page APA 7 the edition No referenceDescription of Personal a.docx
1-page APA 7 the edition  No referenceDescription of Personal a.docx1-page APA 7 the edition  No referenceDescription of Personal a.docx
1-page APA 7 the edition No referenceDescription of Personal a.docx
 
1-Pretend that you are a new teacher.  You see that one of your st.docx
1-Pretend that you are a new teacher.  You see that one of your st.docx1-Pretend that you are a new teacher.  You see that one of your st.docx
1-Pretend that you are a new teacher.  You see that one of your st.docx
 
1- What is the difference between a multi-valued attribute and a.docx
1- What is the difference between a multi-valued attribute and a.docx1- What is the difference between a multi-valued attribute and a.docx
1- What is the difference between a multi-valued attribute and a.docx
 
1- What is a Relational Algebra What are the operators. Explain.docx
1- What is a Relational Algebra What are the operators. Explain.docx1- What is a Relational Algebra What are the operators. Explain.docx
1- What is a Relational Algebra What are the operators. Explain.docx
 
1- Watch the movie Don Quixote, which is an adaptation of Cerv.docx
1- Watch the movie Don Quixote, which is an adaptation of Cerv.docx1- Watch the movie Don Quixote, which is an adaptation of Cerv.docx
1- Watch the movie Don Quixote, which is an adaptation of Cerv.docx
 
1- reply to both below, no more than 75 words per each.  PSY 771.docx
1- reply to both below, no more than 75 words per each.  PSY 771.docx1- reply to both below, no more than 75 words per each.  PSY 771.docx
1- reply to both below, no more than 75 words per each.  PSY 771.docx
 
1- Pathogenesis 2- Organs affected in the body 3- Chain of i.docx
1- Pathogenesis 2- Organs affected in the body 3- Chain of i.docx1- Pathogenesis 2- Organs affected in the body 3- Chain of i.docx
1- Pathogenesis 2- Organs affected in the body 3- Chain of i.docx
 
1-  I can totally see where there would be tension between.docx
1-  I can totally see where there would be tension between.docx1-  I can totally see where there would be tension between.docx
1-  I can totally see where there would be tension between.docx
 
1- One of the most difficult challenges leaders face is to integrate.docx
1- One of the most difficult challenges leaders face is to integrate.docx1- One of the most difficult challenges leaders face is to integrate.docx
1- One of the most difficult challenges leaders face is to integrate.docx
 
1- Design one assignment of the Word Find (education word) and the o.docx
1- Design one assignment of the Word Find (education word) and the o.docx1- Design one assignment of the Word Find (education word) and the o.docx
1- Design one assignment of the Word Find (education word) and the o.docx
 
1- This chapter suggests that emotional intelligence is an interpers.docx
1- This chapter suggests that emotional intelligence is an interpers.docx1- This chapter suggests that emotional intelligence is an interpers.docx
1- This chapter suggests that emotional intelligence is an interpers.docx
 
1-2 pages APA format1. overall purpose of site 2. resources .docx
1-2 pages APA format1. overall purpose of site 2. resources .docx1-2 pages APA format1. overall purpose of site 2. resources .docx
1-2 pages APA format1. overall purpose of site 2. resources .docx
 
1-Define Energy.2- What is Potential energy3- What is K.docx
1-Define Energy.2- What is Potential energy3- What is K.docx1-Define Energy.2- What is Potential energy3- What is K.docx
1-Define Energy.2- What is Potential energy3- What is K.docx
 
1- Find one quote from chapter 7-9. Explain why this quote stood.docx
1- Find one quote from chapter 7-9. Explain why this quote stood.docx1- Find one quote from chapter 7-9. Explain why this quote stood.docx
1- Find one quote from chapter 7-9. Explain why this quote stood.docx
 
1-Confucianism2-ShintoChoose one of the religious system.docx
1-Confucianism2-ShintoChoose one of the religious system.docx1-Confucianism2-ShintoChoose one of the religious system.docx
1-Confucianism2-ShintoChoose one of the religious system.docx
 

Recently uploaded

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 

Recently uploaded (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Case Study 3.1 White Collar Crime The Gap Between Perpetrators a.docx

  • 1. Case Study 3.1: White Collar Crime: The Gap Between Perpetrators and Victims When a prominent business leader ends up in prison, we often ask: “Why would a successful person with so much to lose risk it all by engaging in criminal activity?” Harvard professor Eugene Soltes sets out to answer this question in his book Why Do They Do It? In addition to reviewing what experts have to say on the subject, he interviews executives serving jail time for insider trading, manipulating interest rates, backdating stock options, falsifying financial statements, and stealing from investors. Soltes points out that while he analyzes the failures of prominent executives, we can learn from their example to avoid a similar fate. Soltes reports that two common explanations for white collar crime—personality weaknesses and judging that the benefits outweigh the costs—don’t explain the actions of his subjects. For the most part, the convicted executives didn’t have poor self-control or lack empathy. (One exception was Bernie Madoff, who seemed to lack feeling even for his own family.) And they didn’t carefully weigh the costs and benefits of their actions. Scott London, a KPMG senior partner who provided inside trading information to a friend, noted, “At the time this [securities fraud] was going on, I just never really thought about the consequences” (p. 99). London made little money from providing the information to his friend but had to pay a high cost. In addition to going to jail, he lost his CPA license and his job (which paid $650,000 to $900,000 a year) and had to resign from three charitable boards. Professor Soltes puts much of the blame for corporate crime on the disconnect between the action and the harm. In large companies, perpetrators are separated physically and psychologically from their victims. Their misbehavior is eased by the fact that they are distanced from the harm caused by their crimes. The CFO of ProQuest, for example, illegally boosted
  • 2. earnings, which cost shareholders $437 million when the scam was discovered. However, he didn’t think he did much damage because he carried out his crime on a computer and didn’t target a particular individual or group. In addition, perpetrators are often rewarded for misbehavior (get promoted or honored for making the numbers) before they are caught. According to Soltes: Each kind of corporate misconduct has facets that make it resonate less intuitively. With financial reporting fraud, the effects are not felt until long into the future and the victims are often applauding the perpetrator’s behavior until the deception is revealed. With insider trading, it’s difficult to identify precisely which investors are harmed. And with tax evasion, the reduction to government coffers make the harm to specific individuals so diffuse that it no longer feels salient to say it harmed any individual person. (pp. 128–129) Many of the disgraced executives didn’t consider the moral implications of their actions. They saw themselves as solving immediate business problems under time pressures in order to further their careers. They relied on their intuitions, which lacked a moral component. No one then challenged their choices. Executives at Symbol Technologies, for example, were convicted of booking sales for equipment that wasn’t shipped in order to continue to reach earning projections. Said one executive engaged in the scheme: “We always came up with solutions . . . Whatever it took, you did it and you got success from it.” (p. 189) Soltes concludes by offering suggestions to reduce corporate misbehavior in ourselves and others. (Financial fraud costs the United States nearly $400 billion a year.) He argues that we need “uncomfortable dissonance” if we are to avoid falling victim to faulty intuition. To engage in deliberate reasoning, we need to hear more dissenting opinions when making choices, something that his leaders failed to do. Along with dissonance we need to be humble, to appreciate “our lack of invincibility— our inherent weakness and frailty” (p. 329). Doing so will
  • 3. encourage us to stop and reflect. However, moving toward greater humility may not be easy. The former executives interviewed by Soltes didn’t appear all that humbled by their experiences. Instead, they believed that what they did wasn’t so bad and that others were more at fault. According to Soltes: “Virtually every one of the former executives I spoke with pointed out, even complained, that it was not he who was the true villain—it was always someone else” (p. 329). Discussion Probes 1. What steps can organizations take to reduce the physical and psychological distance between financial crimes and the harms they cause? 2. What might be other reasons that executives commit white- collar crimes? 3. How can we help ensure that moral considerations are factored into important organizational decisions? 4. How open are you to “uncomfortable dissonance?” How can you ensure that you will hear from those with different opinions? 5. Why do so many disgraced executives excuse their behavior? 6. What are some strategies for recognizing our “inherent weakness and frailty?” A malware protection procedure guide 2
  • 4. A malware protection procedure guide A malware protection procedure guide User access websites and download files from unknown sources which could compromise user system such file or application know as malware or malicious software. Which can Record keystroke, leak personal information, get user credential or credit card or bank detail of user, Malware can also use to control user machines remotely. Common Malware type is Virus, Trojan, Worm, spyware, Backdoor, Rootkit. Every day new malware and viruses are detected. Best practices for the defending system from malware is an update and implement antivirus scanning and patching regularly. On updating the antivirus program, we download new definitions, then start looking for new viruses listed in the definition.
  • 5. a. List of approved anti-malware software a. AVG Business Edition b. Windows defender c. Bitdefender Gravity Zone Advance Business security Anti-Spyware A. Total AV B. Norton by Symantec Antivirus software is running and identifying any malware before it causes trouble. Symptoms of malware infection are Slow response opening application, abnormal application behavior, OS not functioning correctly, Numerous windows pop up on the screen. We will use AVG, an antivirus program, to identify malware or spyware on the system. Manual scan good temporary measure but in real-time scan should perform regular intervals that minimizes impact to users. Ensuring anti-malware software and data is up to date. Always ensure that the system running on the latest security patch helps to protect the system form other security risks or virus attacks. All workstations have an antivirus with updated virus definition, detection, and repair engine. Schedule a daily fast scan to check for viruses such as activity we can conduct during non-peak hours, such as during lunch break. Also, we can schedule a complete scan on Sunday when the system is performing minimal activities. Always scan removable disk and files downloaded from the internet before using it. Also, backup all programs and data regularly. Recovery from clean backup is the best way to restore files. We can also review logs to find any anomalies. If any system is get attacked with malware, the IT administrator should disconnect those systems from the network to prevent further damage from the attacker.IT admin wants to know about the infection to stop it spreading or compromising our person file. Use a deep scan option and check for any possible malware infection. If we found any malware, remove it. If we did not find anything and we still feel something is not right boot system in safe mode. In safe mode, minimum required services
  • 6. and programs will load and prevent any malware is set to startup when OS starts and if PC working fast in safe mode means possible malware infection. “Before starting anything, delete temporary files to accelerate the malware scan, while clearing downloaded virus files.” (Elsie Otachi,2019) Reference 1. Otachi, E. (2019, September 17). What To Do If You Think Your Computer Or Server Has Been Infected With Malware. Retrieved from https://helpdeskgeek.com/help-desk/what-to-do- if-you-think-your-computer-or-server-has-been-infected-with- malware/ 2. Solomon, M. (2011). Security strategies in windows platforms and applications. Sudbury, MA: Jones & Bartlett Learning.(Chapter 5)