Arakin 4 kurs new 001 176. indd


b) Give definitions to the following words used in the text: embezzlement



Download 1,55 Mb.
Pdf ko'rish
bet168/265
Sana06.07.2022
Hajmi1,55 Mb.
#746470
TuriУчебник
1   ...   164   165   166   167   168   169   170   171   ...   265
Bog'liq
4 курс Аракин

b) Give definitions to the following words used in the text: embezzlement, 
insider trading, identity theft (ID theft), accounting fraud


26
c) Pair work. Team up with another student and answer the questions given 
at the beginning of the article.
d) Give a heading to each paragraph of the text. Write a summary of the 
article. Present your summaries in class for further improvement.
8. Read two examples of white collar crime known as ‘consumer fraud’. In each 
of the examples, it was an individual who was the victim, but he was spending the 
company’s money. So any business who buys something is at risk.
A supply manager buys 100,000 pens at an unbelievable $0.04 each. 
After receiving the pens, the supply manager realizes that the pens 
are only 1/8 full of ink. He could have bought the pens from a reliable, 
well-known supplier for $ 0.09 each, but instead he took the lowest 
bid without looking at who the bidder is.
A security director buys 35 uniforms from a catalog he receives on 
mail. They are $20 each, and only required $10 deposit each. The 
uniforms never arrive and the business’s phone number has been 
disconnected.
a) Experts say that white collar crime occurs when the four components are 
present: money, trust, greed and opportunity. Why did people become victims 
of fraud? Bearing in mind the four components mentioned above, analyze the 
cases of consumer fraud
b) Imagine that you have to work out a fraud awareness program for employees. 
Team up with another student and discuss the points that might be included into it
9. Read the text for obtaining the information and further reference
Computer-related Crimes
As internet usage continues to rise throughout the world, the threat 
of cyber crime also grows. Computer crimes are believed to be the 
fastest growing type of crime in America. Because these crimes are 
comparatively new, some computer users may not be aware of their 
devastating effects. Most cases of computer crime are discovered by 
accident because people who use computers to commit crimes are 
more likely than not to be bright enough to cover their tracks.
Credit fraud is a common form of cyber crime. Certain computer 
viruses can log keystrokes on your keyboard and send them to hack-


27
ers who can then take your Social Security number, credit card num-
ber and home address. The information will be used by the hacker for 
his own means.
Harassment or cyber bullying is a growing problem among teenag-
ers. Some countries in Europe and several states in the USA have 
laws to punish those who consistently harass somebody over the 
Internet.
Drug trafficking also happens over the Internet. Many traffickers 
use encrypted emails to arrange drug deals.
The most talked about form of cyber crime is thievery or piracy. 
Downloading music from peer-to peer websites is illegal and therefore 
a form of cyber crime.
Computer crime prevention starts with individual computer users. 
Just as you wouldn’t walk down a dark alley alone at night, neither 
should you surf the net without exercising a few basic precautions.
Here are some instructions which you should follow:
— Install antivirus software in your computer and make sure it is 
running properly.
— Use encryption software on important files.
— Monitor the personal information you give out very carefully. 
Never provide personal details on an unsecured website.
— Keep an eye out for email scams. They come in all varieties, but 
most try to entice you by promising lots of money for very little effort. 
Apply common sense to any offer you receive via email and never respond 
to anyone asking for an address, bank account or phone number.
— Maintain a reliable password on your computer and never allow 
anyone you don’t know to use it. Passwords should be complicated — 
using letters and numbers alike arranged in an order that can’t easily 
be passed. Don’t give out your password to anyone else.
— Back up your files on a secure hard drive which isn’t in regular 
contact with the remainder of your network. In case you are hacked 
or your files are corrupted by a virus, your back-ups will ensure you 
don’t lose any data.

Download 1,55 Mb.

Do'stlaringiz bilan baham:
1   ...   164   165   166   167   168   169   170   171   ...   265




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish