Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

The Criminal Violation of Financial Trust

Author(s): Donald R. Cressey


Source: American Sociological Review , Dec., 1950, Vol. 15, No. 6 (Dec., 1950), pp. 738-743
Published by: American Sociological Association

Stable URL: https://www.jstor.org/stable/2086606

JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org.

Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms

American Sociological Association is collaborating with JSTOR to digitize, preserve and extend
access to American Sociological Review

This content downloaded from


182.255.0.242 on Wed, 11 Jan 2023 07:29:13 UTC
All use subject to https://about.jstor.org/terms
This content downloaded from
182.255.0.242 on Wed, 11 Jan 2023 07:29:13 UTC
All use subject to https://about.jstor.org/terms
THE CRIMINAL VIOLATION OF FINANCIAL TRUST 739

ceptions, thus making possible the perfecting has been considered a "pillar of the commu-
or refinement of generalizations. However, nity" and a trusted and loyal employee
this notion, which is essentially an assump- actually has been gambling with his own
tion regarding the proper design for scientific and his company's money, an indication of
research, has been applied only rarely in immorality has been revealed, but his be-
criminology, and never in an attempt to havior has not been explained. Equally in
formulate a sociological theory of trust vio- contrast to the assumption regarding proper
lation. In fact, while the criminal violation scientific methodology are those conceptions
of financial trust poses serious problems for which assert that trust violation is caused
theoretical criminology, text-book writers by an assumed hidden variable, such as
and other sociologists who have offered "moral weakness" or "tensions,"4 or by
theories of criminal causation have for the weakness in the systems of checks upon the
most part ignored it.2 As a result, almost all trusted person. The latter "explanation"
publications on trust violation have been merely states, in a sense, that trust violation
issued by persons or agencies primarily inter- is caused by the existence of institutions
ested in the techniques used or in prevention whose functioning depends upon varying de-
of the crime, and the vast majority of the grees of trust.
explanations given in the literature merely The central problem of this study is
repeat and emphasize popular views. Few of that of providing an explanation in keep-
the explanations have been convincing since ing with the assumption of proper scientific
little attempt at an integration with an method and generalization by determining
explicit theory has been made. whether a definable sequence of events is
On the contrary, most of the current ex- always present when trust violation is pres-
planations are of a multiple factor type, ent, and never present when trust violation is
usually stated in terms of the way the trust absent. A major related problem is that of
violator spends the funds which he has dis- accounting for the presence in individual
honestly obtained. Thus, "gambling," cases of the events which make up the se-
"drink," and "extravagant living" are listed quence which differentiates violators from
as causes of embezzlement, even if behavior non-violators, These two problems are closely
of this kind is not present in even a majority related since the events in the person-situa-
of the cases.3 Such conceptions are in gen- tion complex at the time trust violation oc-
eral more in the nature of attempts to place curs cannot be completely separated from
blame or to indicate immorality than they the prior life experiences of the trust violator.
are explanations of the behavior. For ex- However, only the first problem, that con-
ample, if it is said that a trust violator who cerned with what Lewin calls "systematic"
causation, in contrast to "historical" or
2Only three sociologists have published detailed
account of research on the subject: E. Redden, Em- "genetic" causation,7 will be discussed here.
bezzlement, A Study of One Kind of Criminal Be-
havior, With Prediction Tables Based on Fidelity 4Cf. H. Koppel, "Other People's Money," Col-
Insurance Records, Ph.D. Dissertation, University of liers, 67 (April I6, 1921), 11-I2; J. Edgar Hoover,
Chicago, I939; Svend Riemer, "Embezzlement: op. cit., S. Lottier, op. cit.
Pathological Basis," Journal of Criminal Law and 'Cf. George E. Bennet, Fraud: Its Control
Criminology, 32 (Nov.-Dec., I940), 4II-423; S. Through Accounts, New York: Century, 1930, p.
Lottier, "Tension Theory of Criminal Behavior," 22; L. A. Pratt, Bank Frauds, Their Detection and
American Sociological Review, 7 (Dec., I942), 840- Prevention, New York: Ronald, 1947, pp. 7-I0.
848. 'Hall has pointed out that the economic system
3See, for example, The United States Fidelity in our modern society presupposes business tran-
and Guaranty Company, iooi Embezzlers, Balti- sactions based on a considerable amount of trust.
more: Author, I937, and iooi Embezzlers Post War, Jerome Hall, Theft, Law and Society, Boston: Little,
Baltimore: Author, Io50; J. Edgar Hoover, "Na- Brown and Company, 1935.
tional Bank Offenses," Journal of Criminal Law and 'Kurt Lewin, "Some Social and Psychological
Criminology, 24 (Sept.-Oct., IQ33), 655-663; V. Differences Between the United States and Ger-
Peterson, "Why Honest People Steal," Ibid., 38 many," Character and Personality, 4 (June, I936),
(July-August, I947), 94-I03. 265-293. For a discussion of these two types of ex-

This content downloaded from


182.255.0.242 on Wed, 11 Jan 2023 07:29:13 UTC
All use subject to https://about.jstor.org/terms
740 AMERICAN SOCIOLOGICAL REVIEW

Hypotheses in regard to the first problem, of those convicted for larceny by bailee,
the problem of systematic causation, were forgery, and confidence game.
formulated progressively. When an hypothe- The main source of direct information in
sis was formulated, a search for negative regard to the behavior, now called "the
cases was conducted, and when such cases criminal violation of financial trust," was
were found the hypothesis was re-formulated interview material obtained in informal con-
in light of them. The behavior to be ex- tacts over a period of five months with all
plained in this manner was at first defined prisoners whose behavior met the criteria
as embezzlement, and a legal definition of and who were confined at the Illinois State
that crime was used.8 Upon contact with Penitentiaries at Joliet.9 In some cases we
cases, however, it was almost immediately were able to write verbatim notes during the
discovered that the term is not used in a con-interviews without disturbing the subject,
sistent manner in the jurisdiction where the but in other cases it seemed appropriate to
research was conducted and that many per- make only outline notes, and in some cases
sons whose behavior was adequately de- no notes could be taken at all. In the last
scribed by the legal definition actually had two instances the content of the interview
been sentenced to the penitentiary on some was written down in the subject's own words
other charge. Consequently, the legal defi- as soon as he left the room.
nition was abandoned and in its place two The length and frequency of interviews
criteria for inclusion of any particular case with individual subjects depended to a large
in the study were established: (a) The per- extent upon the subject himself. Those sub-
son must have accepted a position of trust in jects who seemed reluctant to talk were
good faith. This is similar to the implication seen more frequently than those with whom
of the legal definition that the "felonious a friendly and confidential relationship was
intent" in embezzlement must have been established early in the process, but those
formulated after the time of taking posses- who could not present the details of their
sion. All legal definitions are in agreement in cases and backgrounds, even if they so de-
this respect. (b) The person must have vio- sired, were not interviewed as frequently as
lated the trust. These criteria permit the in- those who were able to do so. That is,
clusion of almost all persons convicted for "good" subjects were interviewed more often
embezzlement and in addition a proportion and more extensively than were "poor" sub-

planation in criminology see E. H. Sutherland, Determination of whether or not a particular


Principles of Criminology, New York: Lippincott, prisoner's behavior met the criteria was made by
I947, p. 5, and J. F. Brown and D. W. Orr, "Field examination of documents in his personal file
Theoretical Approach to Criminology," Journal of and by preliminary or "screening" interviews. The
Criminal Psychopathology, 3 (Oct., 194I), 236-252. document most heavily relied upon for this pur-
'"The fraudulent appropriation to his own use pose was the "State's Attorney's Report" (the
or benefit of property or money entrusted to him official statement of facts in each case), but other
by another, on the part of a clerk, agent, trustee, documents, such as reports of the Chicago Crime
public officer or other person acting in a fiduciary Commission, letters from former employers and
capacity." Black's Law Dictionary, St. Paul: West from friends and relatives, and the prisoner's state-
Publishing Co., I933, p. 633. Almost all studies ment upon admission to the institution also were
pertinent to the current research have been studies consulted. In the screening interviews the subjects
of embezzlement. But since this term has been used were never asked the question, "Did you accept
to denote the behavior of all fidelity bond default- your position of trust in good faith?" but instead
ers, the criminal behavior of all persons employed in the interviewer waited for the subject to give the
banks, and the behavior of swindlers as well as em- information spontaneously. Ordinarily, evidence of
bezzlers, it is obvious that the factual conclusions acceptance in good faith came out in the first inter-
of the studies are not immediately comparable in view in form of statements such as the following:
all respects. The varied usage of the term is due to "I had no idea I was going to do this until the day
oversight on the part of some investigators, but it it happened." Evidence of acceptance in bad faith
is also due in part to the existence of a variety of was presented, for example, as follows: "My case
legal definitions among the states and foreign coun- isn't like embezzlement because I knew when I took
tries. their money that I was going to use it for myself."

This content downloaded from


182.255.0.242 on Wed, 11 Jan 2023 07:29:13 UTC
All use subject to https://about.jstor.org/terms
THE CRIMINAL VIOLATION OF FINANCIAL TRUST 74I

jects-those whose intelligence, educational does not take place trust violation will not
background and vocabulary restricted the occur. This hypothesis proved fruitful, but
communication of their experiences. Those like the first one it had to be revised when
who described their behavior fluently became persons were found who claimed that while
crucial cases, their testimony causing the an emergency had been present at the time
abandonment of the hypotheses which had they violated the trust, other, perhaps even
guided the research up to the time they were more extreme, emergencies had been pres-
encountered. The new hypotheses were then ent in earlier periods when they did not
checked against the less fluent cases. violate it. Others reported that there had
The initial hypothesis, which was aban- been no financial emergency in their cases,
doned almost immediately, was that posi- and a few "explained" their behavior in
tions of financial trust are violated when terms of antagonistic attitudes toward the
the incumbent has learned in connection with employer or feelings of being abused, under-
the business or profession in which he is paid, or discriminated against in some other
employed that some forms of trust viola- way.
tions are merely "technical violations" and The next revision shifted the emphasis
are not really "illegal" or "wrong," and, on from emergency to psychological isolation,
the negative side, that they are not violated stating that persons become trust violators
if this kind of definition of the behavior has when they conceive of themselves as having
not been learned. This hypothesis was sug- incured financial obligations which are con-
gested by Sutherland in his writings on white sidered as non-socially-sanctionable and
collar crime.10 In the interviews, however, which, consequently, must be satisfied by a
many trust violators expressed the idea that private or secret means. Negatively, if such
they knew the behavior to be illegal and non-shareable obligations are not present,
wrong at all times and that they merely trust violation will not occur. This hypo-
"kidded themselves" into thinking that it was thesis had the advantage of calling attention
not illegal. Others reported that they knew to the fact that not all emergencies, even if
of no one in their business or profession who they are created by prior "immoral" be-
was carrying on practices similar to theirs and havior on the part of the trusted person, are
some of them defined their offenses as theft important to trust violation. It had been
rather than as trust violation. suggested by LaPiere and Farnsworth who
In view of these negative cases, a second cite Sutherland as having shown that in cases
hypothesis, which included some of the of white collar crime the person is frequently
"multiple factor" ideas of gambling and confronted "with the alternative of commit-
family emergencies, as well as the potential ting a crime or losing something he values
trust violators' attitudes toward them, was above his integrity,"12 but it was brought
formulated. This hypothesis was in part de- into the present study by a suggestion from a
rived from Riemer's statement that the prisoner who stated that he believed that no
"opportunities" inherent in trust positions embezzlement would ever occur if the
form "temptations" if the incumbents de- trusted person always told his wife and
velop anti-social attitudes which make pos- family about his financial problems, no mat-
sible an abandonment of the folkways of ter what the consequences. However, when
business behavior.11 The formulation was the cases were re-examined in light of this
that positions of trust are violated when the hypothesis it was found that in a few of
incumbent structures a real or supposed need them there was nothing which could be
for extra funds or extended use of property considered as financial obligation, that is,
as an "emergency" which cannot be met by as a debt which had been incurred in the
legal means, and that if such an emergency past and for which the person at present

1 E. H. Sutherland, White Collar Crime, New 12R. T. LaPiere and P. R. Farnsworth, Social
York: Dryden, I949. Psychology, New York: McGraw-Hill, I949, p.
1 Svend Riemer, op. cit. 344.

This content downloaded from


182.255.0.242 on Wed, 11 Jan 2023 07:29:13 UTC
All use subject to https://about.jstor.org/terms
742 AMERICAN SOCIOLOGICAL REVIEW

felt responsible. Also, in some cases there amined with a view to answering the ques-
had been non-sanctionable obligations at a tion: "Why did these men not violate their
prior time, and these obligations had not trust at an earlier period?" it was seen that
been alleviated by means of trust viola- in earlier periods one or more of the events
tion. It became increasingly apparent at this in the sequence had not been present. A
point that trust violation could not be at- search of cases reported in the literature also
tributed to a single event, but that its ex- showed no negative cases, though it should
planation could be made only in terms of a be pointed out that in many of the reports
sequence of events, a process. crucial information which would either con-
Again the hypothesis was re-formulated, tradict or affirm the hypothesis is not given.
emphasizing this time not financial obliga- A similar search of about 200 unpublished
tions which were considered as non-socially- cases collected by E. H. Sutherland in the
sanctionable and hence as non-shareable, but 1930's, before he had formulated the differ-
non-shareable problems of that nature. This ential association theory, likewise showed no
hypothesis also pointed up the idea that not negative cases.
only was a non-shareable problem necessary, The events present in the process cannot
but that the person had to possess (a) be considered in great detail here. How-
knowledge or awareness of the fact that the ever, brief comments about the sequence are
problem could to some extent be solved by in order.
means of trust violation and (b) the tech- (i) Criteria of an objective nature in re-
nical skill necessary for such violation. Nega- gard to the degree of "shareability" which
tive cases appeared, however, in instances specific types of problems have in our cul-
where men reported that what they con- ture were not set up, but instead the sub-
sidered a non-shareable problem had been ject's definition of the situation was used as
present for some period of time and that a datum.'3 Consequently, a list which would
they had known for some time before the exhaust all of the possible problems which
violation took place that the problem could could be considered as non-shareable and
be solved by violating their position of trust which might play a part in the etiology of
by using a particular skill. Some stated that trust violation is not conceivable. For pur-
they did not violate the trust at the earlier poses of illustration, however, we may cite
period because the situation was not in sharp one type of problem which is frequently so
enough focus to "break down their ideas of defined.
right and wrong." This type of problem is that which the
Such statements suggested the final re- trusted person considers to have resulted
vision, which took the following form: from the violation of the obligations
Trusted persons become trust violators when "ascribed" to his position of trust, that is,
they conceive of themselves as having a those obligations of a non-financial nature
financial problem which is non-shareable, which are expected of persons in consequence
have the knowledge or awareness that this of their incumbency in positions of financial
problem can be secretly resolved by vio- trust. Just as persons in trusted positions
lation of the position of financial trust, and have obligations not to violate the trust by
are able to apply to their own conduct in taking funds, most of them also have obli-
that situation verbalizations which enable gations, for example, to maintain an enviable
them to adjust their conceptions of them- position in the community and to refrain
selves as trusted persons with their concep- from certain types of gambling and from
tions of themselves as users of the entrusted
funds or property. s Evidence of the presence of non-shareable
This hypothesis proved to be far superior problems was found in the language used by trust
violators. None of them, of course, used the words
to the others, and no evidence necessitating
"non-shareable problem," but many of them stated
its rejection has been found as yet. In all of that they were "ashamed" to tell anyone of a cer-
the cases interviewed the sequence has been tain situation or that they had "too much false
found to be present, and when cases were ex- pride" to get help from others.

This content downloaded from


182.255.0.242 on Wed, 11 Jan 2023 07:29:13 UTC
All use subject to https://about.jstor.org/terms
THE CRIMINAL VIOLATION OF FINANCIAL TRUST 743

what may be loosely described as riotous ing" or "insight" or "perception" that the
living.'4 When persons incur financial re- non-shareable problem can and may be
sponsibilities as a result of violation of these solved by trust violation involves both
ascribed obligations they often consider that knowledge of this fact and a "rationaliza-
they must be kept secret, and meeting them tion" of the behavior.
becomes a non-shareable problem. (3) The verbalizations ("rationaliza-
The concept of the non-shareable problem tions") used by trust violators are reflec-
and consideration of the type of non-share- tions of contact with cultural ideologies
able problem just discussed help to make which adjust for the person contradictory
understandable the reported high incidence ideas in regard to criminality on the one
of "wine, women and wagering" in the be- hand and in regard to integrity, honesty and
havior of embezzlers and other trust vio- morality on the other. Upon the appearance
lators, but these modes of behavior are not of a non-shareable problem the trusted per-
used as explanatory principles. In fact, it son applies to his own situation a verbaliza-
appears that the use of them as explanations tion which the groups in which he has had
of trust violation merely indicates lack of membership have applied to others, or which
understanding of the problem.'5 he himself has applied to the behavior of
(2) A non-shareable problem becomes a others. This is his motivation.1 The hy-
stimulus to violation of a position of trust pothesized reactions of others to "borrowing"
only when the position is perceived as offer- (criminal behavior) in order to solve a non-
ing a private solution to this specific prob- shareable problem, for example, are much
lem. In addition to having a financial prob- different from the hypothesized reactions to
lem which he feels he cannot share with per- "stealing" or "embezzling," and the trusted
sons who, from a more objective point of person behaves accordingly. It is because of
view, could help him, the trusted person an ability to hypothesize reactions which
must have a certain amount of knowledge will not consistently and severely condemn
or information about trust violation in his criminal behavior that the trusted person
general, and he must be able to apply that takes the role of what we have called the
general information to his own specific situa- "trust violator." He often does not think of
tion. The presence of this event is often indi- himself as playing that role, but instead
cated by trust violators in their use of the thinks of himself as playing another role,
language "it occurred to me" or "it dawned such as that of a special kind of borrower or
on me" that the entrusted funds could be businessman.
used for such and such purpose. This "dawn- The final hypothesis in its complete form
made it possible to account for some of the
14E. C. Hughes has pointed out that in additionfeatures of trust violation and for some in-
to the specifically determining traits, a complex of
dividual cases of that behavior which could
"auxiliary traits" is expected of incumbents of cer-
tain statuses. "Dilemmas and Contradictions of not be accounted for by other hypotheses.
Status," American Journal of Sociology, 50 (March, However, the fact that it was revised several
I945), 353-359. In law, this type of obligation times is probably means that future revision
called an "obediential obligation" since it is a con-
will be necessary if negative cases are found.
sequence of a situation or a relationship, not of
a contract. Black's Law Dictionary, op. cit., p.
The location by another investigator of per-
I274. sons who have violated positions of trust
15 We do not mean to imply that statistical which were accepted in good faith, but in
studies of personal and social traits as selective fac- whose behavior the sequence was not pres-
tors in trust violation have no place. A study, for
ent, will call for either a new revision of the
example, showing a precise relationship between the
presence of certain personal and social traits and hypothesis or a redefinition of the behavior
the structuring of a financial problem as non-share- included in the scope of the present hypothe-
able would be extremely valuable. What we wish SiS.
to imply is that such studies of selective factors,
even if properly carried out, do not solve the prob- 16 Cf. C. Wright Mills, "Situated Actions and
lem of etiology. Cf. A. R. Lindesmith, op. cit., pp. Vocabularies of Motive," American Sociological Re-
I57-I58. view, 5 (Dec., I940), 904-9I3.

This content downloaded from


182.255.0.242 on Wed, 11 Jan 2023 07:29:13 UTC
All use subject to https://about.jstor.org/terms

You might also like