Discuss some of the internet fraud schemes
Discuss the difference between “insider corporate spies” and “outsider corporate spies.” How does each group engage in corporate espionage?
Identify and describe at least three methods that identity thieves use to steal personal information.
Explain how the historical description of an embezzler no longer applies. How are modern embezzlers described?