Typical Characteristics of Computer Fraudsters

Typical Characteristics of Computer Fraudsters

Prev Question Next Question

Question

The typical computer fraudsters are usually persons with which of the following characteristics?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

C.

These people, as employees, are trusted to perform their duties honestly and not take advantage of the trust placed in them.

The following answers are incorrect: They have had previous contact with law enforcement.

Is incorrect because most often it is a person that holds a position of trust and this answer implies they have a criminal background.

This type of individual is typically not in a position of trust within an organization.

They conspire with others.

Is incorrect because they typically work alone, often as a form of retribution over a percieved injustice done to them.

They deviate from the accepted norms of society.

Is incorrect because while the nature of fraudsters deviate from the norm, the fraudsters often hold a position of trust within the organization.

Computer fraudsters can come from a variety of backgrounds and have different motivations for their actions. However, there are some common characteristics that are often associated with these individuals. Let's discuss each of the options provided:

A. They have had previous contact with law enforcement: While some computer fraudsters may have a criminal record or previous run-ins with law enforcement, this is not necessarily a defining characteristic of this group. Many computer fraudsters may have no prior criminal history or contact with law enforcement before engaging in fraudulent activities.

B. They conspire with others: It's not uncommon for computer fraudsters to work with others, especially when carrying out more complex schemes. However, this is not a defining characteristic, as many fraudsters operate independently.

C. They hold a position of trust: This is a more accurate characteristic of computer fraudsters. Individuals who hold positions of trust, such as employees with access to sensitive data, are often in a better position to carry out fraudulent activities. They may abuse their position to steal data or engage in other illicit activities.

D. They deviate from the accepted norms of society: This is also a characteristic of computer fraudsters, as their actions are generally illegal and violate social norms. However, it's important to note that not all individuals who deviate from societal norms are computer fraudsters, and not all computer fraudsters necessarily deviate from societal norms in other areas of their lives.

In summary, while all of the options listed may apply to some computer fraudsters, holding a position of trust is generally a more defining characteristic of this group.