Verified Document

Theft In The Office It Research Proposal

Indeed, in RICO cases, there may well be elements of violent and even homicidal criminal activities involved that clearly make the thefts involved fall outside the purviews of the sentencing regimens established for white collar crimes. According to Podger, "If the conduct is fraud and the predicate act is mail or wire fraud, it should be designated as a white collar crime. When, however, the RICO predicate relates to a state-based offense such as murder or robbery, it should clearly be outside the realm of being a white collar crime" (731). Consequently, a mere cursory analysis of the specific controlling statute may not provide any substantive guidance concerning whether the criminal activity should be handled as a white collar crime. As Podger points out, "The circumstances of the conduct may be equally important in categorizing the activity" (732). These circumstances relate to the position of trust held by the perpetrator. In some cases, acts of theft are committed by an organization's top leaders, while in others they are committed by employees who are simply seeking to gain personal profit at the expense of the company. While many observers might suggest that tougher and longer sentences in prison serve as the best deterrent to white collar crimes, Podger emphasizes that other alternatives exist that might better serve the interests of society as well as the individuals involved. To help reduce the incidence of future criminal behaviors by those in a position of trust and power, Podgor suggests that, "White collar sentences need to be reevaluated. In essence, the mathematical computations that form the essence of sentencing in the federal...

Because many white-collar criminals are first offenders and pose little risk of future dangerous to society and are unlikely to regain a comparable position of power in which they can reoffend, Podger recommends considering alternative that could better rehabilitate individual criminals rather than the strict sentencing guidelines set forth by federal statutes. In sum, this author concludes that, "It is important to strive for a sentencing system that is classless, but in doing so it is also important to respect real differences" (Podger 732).
Conclusion

Most people would agree that people who are in a position of trust and who commit theft from their organizations deserve to be punished. In her study, Podger agrees with this view but cautions that existing sentencing regimens for white-collar criminals may be doing more harm than good and have done little to reverse the increasing incidence of white-collar crimes in the United States in recent years. While no policymaker or law enforcement authority would likely want to be viewed as being "soft on crime," particularly in this environment, Podger makes some good points concerning the need to make the punishment fit the crime and recommends alternative methods of punishment that take into account the sociological issues that may compel individuals to steal from their companies in the first place.

Works Cited

Black's Law Dictionary. St. Paul, MN: West Publishing Company, 1990.

Podgor, Ellen S. 2007. "The Challenge of White Collar Sentencing." Journal…

Sources used in this document:
Works Cited

Black's Law Dictionary. St. Paul, MN: West Publishing Company, 1990.

Podgor, Ellen S. 2007. "The Challenge of White Collar Sentencing." Journal of Criminal Law

and Criminology 97(3): 731-732.
Cite this Document:
Copy Bibliography Citation

Related Documents

Office Automation for the 21st
Words: 696 Length: 2 Document Type: Term Paper

Our office uses Orchestra - a web-based communication initiative and ultimate collaborative solution. Web-based Collaboration Software Advantages When using a web-based collaboration environment; several highly useful tools are made available to all involved. These can include whiteboard displays and file saves, instant messaging in synchrony and real-time, accessible at all times, proactive data 'pushes' to the recipients - replacing the passive 'search and grab' technology of the 1990's. Flexibility, scalability, and accessibility

1999 Movie Office Space, Written
Words: 2425 Length: 8 Document Type: Research Paper

Then he checks the bank account and is amazed to find out that over $300,000 dollars has siphoned off to them in just a short time. He, Samir and Michael are panicked and sure they will be caught. Peter, reasserting his moral code, says he will take full responsibility, writes a note confessing the crime, and places it, along with travelers' checks paying back the total amount, under Lumbergh's

Identity Theft but He That
Words: 2933 Length: 10 Document Type: Term Paper

In one case in 2000, two-20-year-olds hacked into the Lowe's credit card mainframe from a white Pontiac Grand Prix parked outside a store, synching a single laptop to the wireless system that was meant for employees to use to locate products. The hackers, obviously to blame for the crime, played on the flaws of a computer system that should not have allowed for a security breach. While the same hackers

Identity Theft When It Comes
Words: 3016 Length: 10 Document Type: Term Paper

Criminals don't always need to have shotguns and masks to threat and rob money; it only takes a social security number, or a pre-approved credit card application from trash to make things according to their wicked way (ID Theft, 2004). Some consumers have had credit card numbers and Social Security numbers stolen and used fraudulently or identity theft. By taking reasonable steps to protect your personal information, this can mitigate the

Identity Theft Using the Knowledge
Words: 2712 Length: 8 Document Type: Thesis

Spyware runs automatically without the user's knowledge and transmits vital information. Spyware can also record your keystrokes and one might end up revealing all usernames, passwords and other details to identity thieves. (Atlantic Publishing, 2008); (Schwabach, 2005) Identity thieves have also found novel ways to steal and use identities. For instance, cyber criminals recently hacked Facebook, a popular social networking site, and changed a user's page asking people to help

Identity Theft Is a Crime
Words: 2068 Length: 6 Document Type: Term Paper

Wikipedia.org/wiki/Identity_theft. Hoar, Sean B. Identity Theft: The Crime of the New Millennium (2001). U.S. Department of Justice. Retrieved March 20, 2007 at http://www.cybercrime.gov/usamarch2001_3.htm. Has some clown taken over your good name? (2004). The Police Notebook. University of Oklahoma Police Department. Retrieved March 20, 2007 at http://www.ou.edu/oupd/idtheft.htm. Thorne, J. And Segal, a. (2006). Identity theft: The new way to rob a bank. CNN online. Retrieved March 20, 2007 at http://www.cnn.com/2006/U.S./05/18/identity.theft/index.html. New technology may increase identity

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now