Reference no: EM13778354
Please note that you are required to support your views by citing your sources in all assignments. Even if the question asks for your opinion, you are still expected to support your opinion with references to published works and other materials. APA format is necessary for your assignments when citing references, and assistance on how to do so is available using the APA Citation Center.
- Choose Library from the top navigation bar.
- Choose APA Citation Center from the left navigation bar.
- Click Example Sources.
- Scroll down and click APA Documentation.
For more information on citing your sources, please click on the "About this Course" link in the classroom.
You are the director of Worldwide Security for a Fortune 500 credit agency, a certified fraud examiner (CFE), an active member of the Association of Certified Fraud Examiners (ACFE), and you have in excess of twenty fraud investigators. You make presentations to universities throughout the country as well as at professional conferences about the dangers and true occurrences of fraud. You were just asked to review a case of identity theft of university professors, which started out as a couple professors receiving unexplained bills.Within a month, fifteen professors from all of the different departments started noticing unexplained charges and credit accounts on their credit reports.The new accounts took the form of credit cards, revolving credit accounts, car loans, school loans, and so forth. You were asked for your help because you are an expert in the field.
Please post an answer to 5 of the following 7 questions. Support your answers with academic or real life criminal justice examples to accentuate your point. Also, you must provide at least 1 feedback post to two of your classmates.
- In your opinion, what would be your plan to review the case of identity theft toward the university professors? Why?
- Do you think identity theft can be controlled? How would you propose to control it or at least slow it down?
- How would you protect the college professors from any fraudulent acts against them after the identity theft has been discovered?
- How would you identify all of the victims of identity theft? How would identifying all of the victims help you in your investigation?
- What are some of the investigative methods that you would use to identify the perpetrators of the identity theft crimes?
- If you were requested by the president of the college to create a loss prevention education workshop for the staff and professors, what would you include in the workshop? How would you evaluate the success of the lessons being presented in the workshop?
- What punishment do you think the perpetrator should receive for his or her crime?
Discuss how you would conduct an admission-seeking interview
: In preparation for the interviews, note the order of the witnesses who would be interviewed and how you would plan, conduct, and document your interviews. Discuss how you would conduct an admission-seeking interview of the plant controller
|
Explain the current business rules for drive-n-drop
: Create an ERD for each of the following statements that describe the current business rules for Drive-n-Drop. For each new statement being the business rule, extend the ERD to include the additional business rule in the ERD
|
Assumption of sociology stresses
: A basic assumption of Sociology stresses the relationship between individuals and society. Describe this relationship and provide an example of the interplay between self and society.
|
Theory relate to the practice of psychology
: Describe the content that should appear in a well-written informed consent form for a research study. Why is it important to obtain informed consent? What are the three principles outlined by the Belmont Report? What additional concerns do you hav..
|
What punishment do you think the perpetrator should receive
: How would you identify all of the victims of identity theft? How would identifying all of the victims help you in your investigation? What are some of the investigative methods that you would use to identify the perpetrators of the identity theft cri..
|
Symbolization of arguments to make explicit and clear
: What advantages does being able to symbolize our arguments provide? Are there disadvantages to using this technique to make the structure of our arguments more explicit and clear?
|
Is it ever morally permissible to lie to someone
: Is it ever morally permissible to lie to someone? Describe a circumstance in which it seems that lying might make more people happy than telling the truth.
|
How could the failure of enron have been avoided
: How could the failure of Enron have been avoided? List the root cause(s) of misconduct within the organization
|
How reactivity impacts measurement
: What issues should be considered when constructing surveys? What are the implications of double-barreled, loaded, and negative questions?
|