Learning Check Answers

Answers to the Learning Check boxes within the text are provided here for your reference.

 Learning Check 14.1

1. According to the text, which theorist is largely credited for coining the term “white-collar crime” in the late-1930s in his Presidential Address to the American Sociological Society (ASS)?

  1. Hirschi
  2. Sutherland
  3. Lombroso
  4. Matza
  5. Agnew

Answer: B

2. According to the text, there were numerous studies of corporate crime prior to this theorist’s Presidential Address in the 1930s.

  1. True
  2. False

Answer: A

3. According to the text, there is a clear definition of what “white-collar/corporate crime” is.

  1. True
  2. False

Answer: B


  Learning Check 14.2

1. According to the text, studies show what percentage of the largest 25 corporations in the Fortune 500 companies have been convicted of a violation between 1977 and 1990?

  1. 20%
  2. 40%
  3. 60%
  4. 80%
  5. 100%

Answer: E

2. According to the text, white-collar/corporate crimes cost the US society far more each year in terms of injuries/death than all street crimes combined.

  1. True
  2. False

Answer: A


Learning Check 14.3

The President’s Commission on Organized Crime noted that when defining organized crime, the problem is associated with the word (1)                   . Outlaw motorcycle gangs refer to themselves as (2)               - percenters. Some have attributed the growth of prison gangs to the 1964 U.S. Supreme Court decision (3)                 . A key component of the (4)                               was the Racketeer Influenced and Corrupt Organizations (RICO).


(1) organized

(2) one

(3) Cooper v. Pate

(4) Organized Crime Control Act


 Learning Check 14.4

The (1)                             hackers are individuals who violate computer security essentially for the purpose of being malicious or for personal gain. The (2)                                 method of internet fraud involves a victim removing his or her credit card when paying for their merchandise and then the offender peers over the victim’s shoulder and memorizes the numbers. Activities associated with (3)                      include monitoring e-mail communication; sending e-mails that threaten, insult, or harass; and using the victim’s e-mail identity to send false messages to others or to purchase goods and services. The (4)                            Act was established to address various problems associated with the Internet including piracy.


(1) Black hat

(2) Shoulder surfing

(3) Cyberstalking

(4) Digital Millennium Copyright Act (DMCA)