Discussion Post: Cyber White-Collar Crime
• Discuss some of the internet fraud schemes
• Discuss the difference between "insider corporate spies" and "outsider corporate spies." How does each group engage in corporate espionage?
• Identify and describe at least three methods that identity thieves use to steal personal information.
• Explain how the historical description of an embezzler no longer applies. How are modern embezzlers described?
The response must include a reference list. Using one-inch margins, double-space, Times New Roman 12 pnt font and APA style of writing and citations.