The accredited counter fraud specialist handbook / / Martin Tunley [and three others] |
Autore | Tunley Martin |
Pubbl/distr/stampa | Chichester, England : , : Wiley, , 2015 |
Descrizione fisica | 1 online resource (305 p.) |
Disciplina | 658.4/73 |
Soggetto topico |
Fraud
Fraud - Prevention Fraud investigation |
ISBN |
1-119-01725-4
1-118-79879-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The Accredited Counter Fraud Specialist Handbook; Contents; CHAPTER ONE How the counter fraud profession developed and what the counter fraud professional should be; INTRODUCTION; COUNTER FRAUD PROFESSIONAL INFRASTRUCTURE; THE HISTORY OF THE COUNTER FRAUD PROFESSION; DEVELOPING A PROFESSIONAL INFRASTRUCTURE; THE ESSENCE OF THE COUNTER FRAUD PROFESSIONAL; The Enlightened Professional; The 'Reflective' Professional; The Counter Fraud Leader; REDEFINING THE COUNTER FRAUD PROFESSIONAL; REDEFINING THE LEXICON OF COUNTERING FRAUD
Communicating the Rewards of Successfully Countering Fraud to the Wider Organisation and Particularly the LeadersSecuring Positions of Influence within the Organisation; REVIEW; FURTHER READING; CHAPTER TWO The Fraud Act 2006 and fraud related legislation; INTRODUCTION; THE FRAUD ACT 2006; Offences Repealed; Overview; Criticism of the Fraud Act 2006; CRIMINAL LAW ACT 1977; CRIMINAL ATTEMPTS ACT 1981; THEFT ACT 1968; Section 1 - Basic definition of theft; Section 2 - Dishonesty; Section 3 - Appropriates; Section 4 - Property; Section 5 - Belonging to Another Section 6 - Intention to Permanently DepriveFRAUD RELATED OFFENCES; Section 16 - Obtaining Pecuniary Advantage by Deception (repealed by the Fraud Act 2006); Section 17 - False Accounting; Section 24a - Dishonestly Retaining a Wrongful Credit; BRIBERY ACT 2010; COMPUTER MISUSE ACT 1990; Section 1 - Unauthorised Access to Computer Material; Section 2 - Unauthorised Access with Intent to Commit or Facilitate Commission of Further Offences; Section 3 - Unauthorised Acts with Intent to Impair, or with Recklessness as to Impairing, Operation of Computer, etc. Section 3A - Making, Supplying or Obtaining Articles for Use in Offence under Section 1 or 3INVENTORY OF ADDITIONAL LEGISLATION; REVIEW; FURTHER READING; CHAPTER THREE Governing legislation; INTRODUCTION; CRIMINAL PROCEDURE AND INVESTIGATIONS ACT 1996; Introduction; The Role of the ACFS; Disclosure; Sensitive Material; DATA PROTECTION ACT 1998; DPA Terminology; Data Protection Principles; Criminal Offences; Statutory Exclusions; Best Practice to be DPA Compliant; HUMAN RIGHTS ACT 1998; How Does the HRA Work?; Convention Rights (the Articles); REGULATION OF INVESTIGATORY POWERS ACT 2000 What is Surveillance?Covert Surveillance; Directed Surveillance; Human and Technical Surveillance; Covert Human Intelligence Source (CHIS); Office of Surveillance Commissioner; TELECOMMUNICATIONS (LAWFUL BUSINESS PRACTICE) (INTERCEPTION OF COMMUNICATIONS) REGULATIONS 2000; POLICE AND CRIMINAL EVIDENCE ACT 1984; Scope of PACE and the Codes of Practice; Investigative Responsibilities; Right to Silence; Unreliable Evidence; Entry, Search and Seizure; Detention; Treatment in Custody; PUBLIC INTEREST DISCLOSURE ACT 1998; What Protection is Afforded to a Whistleblower? FREEDOM OF INFORMATION ACT 2000 |
Record Nr. | UNINA-9910132325803321 |
Tunley Martin | ||
Chichester, England : , : Wiley, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The accredited counter fraud specialist handbook / / Martin Tunley [and three others] |
Autore | Tunley Martin |
Pubbl/distr/stampa | Chichester, England : , : Wiley, , 2015 |
Descrizione fisica | 1 online resource (305 p.) |
Disciplina | 658.4/73 |
Soggetto topico |
Fraud
Fraud - Prevention Fraud investigation |
ISBN |
1-119-01725-4
1-118-79879-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The Accredited Counter Fraud Specialist Handbook; Contents; CHAPTER ONE How the counter fraud profession developed and what the counter fraud professional should be; INTRODUCTION; COUNTER FRAUD PROFESSIONAL INFRASTRUCTURE; THE HISTORY OF THE COUNTER FRAUD PROFESSION; DEVELOPING A PROFESSIONAL INFRASTRUCTURE; THE ESSENCE OF THE COUNTER FRAUD PROFESSIONAL; The Enlightened Professional; The 'Reflective' Professional; The Counter Fraud Leader; REDEFINING THE COUNTER FRAUD PROFESSIONAL; REDEFINING THE LEXICON OF COUNTERING FRAUD
Communicating the Rewards of Successfully Countering Fraud to the Wider Organisation and Particularly the LeadersSecuring Positions of Influence within the Organisation; REVIEW; FURTHER READING; CHAPTER TWO The Fraud Act 2006 and fraud related legislation; INTRODUCTION; THE FRAUD ACT 2006; Offences Repealed; Overview; Criticism of the Fraud Act 2006; CRIMINAL LAW ACT 1977; CRIMINAL ATTEMPTS ACT 1981; THEFT ACT 1968; Section 1 - Basic definition of theft; Section 2 - Dishonesty; Section 3 - Appropriates; Section 4 - Property; Section 5 - Belonging to Another Section 6 - Intention to Permanently DepriveFRAUD RELATED OFFENCES; Section 16 - Obtaining Pecuniary Advantage by Deception (repealed by the Fraud Act 2006); Section 17 - False Accounting; Section 24a - Dishonestly Retaining a Wrongful Credit; BRIBERY ACT 2010; COMPUTER MISUSE ACT 1990; Section 1 - Unauthorised Access to Computer Material; Section 2 - Unauthorised Access with Intent to Commit or Facilitate Commission of Further Offences; Section 3 - Unauthorised Acts with Intent to Impair, or with Recklessness as to Impairing, Operation of Computer, etc. Section 3A - Making, Supplying or Obtaining Articles for Use in Offence under Section 1 or 3INVENTORY OF ADDITIONAL LEGISLATION; REVIEW; FURTHER READING; CHAPTER THREE Governing legislation; INTRODUCTION; CRIMINAL PROCEDURE AND INVESTIGATIONS ACT 1996; Introduction; The Role of the ACFS; Disclosure; Sensitive Material; DATA PROTECTION ACT 1998; DPA Terminology; Data Protection Principles; Criminal Offences; Statutory Exclusions; Best Practice to be DPA Compliant; HUMAN RIGHTS ACT 1998; How Does the HRA Work?; Convention Rights (the Articles); REGULATION OF INVESTIGATORY POWERS ACT 2000 What is Surveillance?Covert Surveillance; Directed Surveillance; Human and Technical Surveillance; Covert Human Intelligence Source (CHIS); Office of Surveillance Commissioner; TELECOMMUNICATIONS (LAWFUL BUSINESS PRACTICE) (INTERCEPTION OF COMMUNICATIONS) REGULATIONS 2000; POLICE AND CRIMINAL EVIDENCE ACT 1984; Scope of PACE and the Codes of Practice; Investigative Responsibilities; Right to Silence; Unreliable Evidence; Entry, Search and Seizure; Detention; Treatment in Custody; PUBLIC INTEREST DISCLOSURE ACT 1998; What Protection is Afforded to a Whistleblower? FREEDOM OF INFORMATION ACT 2000 |
Record Nr. | UNINA-9910825121103321 |
Tunley Martin | ||
Chichester, England : , : Wiley, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Anti-fraud risk and control workbook [[electronic resource] /] / Peter Goldmann |
Autore | Goldmann Peter <1953-> |
Pubbl/distr/stampa | Hoboken, NJ, : John Wiley & Sons, 2009 |
Descrizione fisica | 1 online resource (195 p.) |
Disciplina | 658.4/73 |
Soggetto topico |
Fraud - United States
Fraud - United States - Prevention Auditing Forensic accounting |
ISBN |
0-470-52494-4
1-119-20565-4 1-282-68273-3 9786612682735 0-470-52492-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Anti-Fraud Risk and Control Workbook; Contents; Preface; Acknowledgments; Chapter One: Why No Organization Is Immune to Fraud; Chapter Two: The Human Element of Fraud; Chapter Three: Internal Fraud: Employee Level; Chapter Four: Internal Fraud: Management Level; Chapter Five: External Fraud: Protecting Against Dishonest Outsiders; Chapter Six: Conducting a Successful Fraud Risk Assessment; Chapter Seven: Basic Fraud Detection Tools and Techniques; Chapter Eight: Advanced Fraud Detection Tools and Techniques; Appendix A: Answers to Chapter Quizzes; Appendix B: Answer Key for Case Studies
Appendix C: An Introduction to Cyber FraudResources; Notes; Glossary; About the Author; Index |
Record Nr. | UNINA-9910143084003321 |
Goldmann Peter <1953-> | ||
Hoboken, NJ, : John Wiley & Sons, 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Anti-fraud risk and control workbook / / Peter Goldmann |
Autore | Goldmann Peter <1953-> |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Hoboken, NJ, : John Wiley & Sons, 2009 |
Descrizione fisica | 1 online resource (195 p.) |
Disciplina | 658.4/73 |
Soggetto topico |
Fraud - United States
Fraud - United States - Prevention Auditing Forensic accounting |
ISBN |
0-470-52494-4
1-119-20565-4 1-282-68273-3 9786612682735 0-470-52492-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Anti-Fraud Risk and Control Workbook; Contents; Preface; Acknowledgments; Chapter One: Why No Organization Is Immune to Fraud; Chapter Two: The Human Element of Fraud; Chapter Three: Internal Fraud: Employee Level; Chapter Four: Internal Fraud: Management Level; Chapter Five: External Fraud: Protecting Against Dishonest Outsiders; Chapter Six: Conducting a Successful Fraud Risk Assessment; Chapter Seven: Basic Fraud Detection Tools and Techniques; Chapter Eight: Advanced Fraud Detection Tools and Techniques; Appendix A: Answers to Chapter Quizzes; Appendix B: Answer Key for Case Studies
Appendix C: An Introduction to Cyber FraudResources; Notes; Glossary; About the Author; Index |
Record Nr. | UNINA-9910810109003321 |
Goldmann Peter <1953-> | ||
Hoboken, NJ, : John Wiley & Sons, 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Bribery and corruption : how to be an impeccable and profitable corporate citizen / / Michael J. Comer and Timothy E. Stephens |
Autore | Comer Michael J. |
Pubbl/distr/stampa | London ; ; New York : , : Routledge, , 2016 |
Descrizione fisica | 1 online resource (911 p.) |
Disciplina | 658.4/73 |
Altri autori (Persone) | StephensTimothy E |
Soggetto topico |
Corruption
Corruption - Prevention Bribery - Prevention |
Soggetto genere / forma | Electronic books. |
ISBN |
1-317-17260-4
1-315-56991-4 1-317-17259-0 1-299-26363-1 1-4094-5358-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword: the honourable Kenneth Mutt KC -- Noble cause corruption -- Background on corruption laws -- A bit of dodgy history -- The main conventions -- UK and US regulatory agencies -- The Bribery Act 2010 and friends -- Objectives and limitations -- Main sections of the act -- Enforcement, penalties and sentencing -- Other relevant UK legislation and guidelines -- US and worldwide legislation and guidelines -- The taxonomy of corruption -- Introduction to a universal problem -- Sectoral corruption -- The mechanics of corruption -- Examples of high risk processes and contexts -- Risk assessment -- Introduction and the nature of risk -- Preparation and catalogues -- Common pre-conditional factors -- Evaluation tools and techniques -- Exposing corruption -- Introduction and background -- Critical point auditing -- Manual tests -- Effective baseline controls -- Introduction on the nature of controls -- Control tools and misconceptions -- Ownership and the tone from the top -- Budgets, policies and procedures -- Due diligence, integrity reporting and contingency planning -- Contractual controls and personnel procedures -- Accounting procedures, fidelity and insurance -- Additional controls -- Introduction, principles and policies -- Additional anti-corruption strategies -- Dealing with corruption -- Facilitation payments, gifts and third party agents -- Join ventures, acquisitions and ipos -- Other projects and controls -- Internal and regulatory investigations -- Background and strategy to internal investigations -- Key elements and case handling -- Regulatory investigations -- Negotiating settlements and going to court. |
Record Nr. | UNINA-9910465614603321 |
Comer Michael J. | ||
London ; ; New York : , : Routledge, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Bribery and corruption : how to be an impeccable and profitable corporate citizen / / Michael J. Comer and Timothy E. Stephens |
Autore | Comer Michael J. |
Pubbl/distr/stampa | London ; ; New York : , : Routledge, , 2016 |
Descrizione fisica | 1 online resource (911 p.) |
Disciplina | 658.4/73 |
Altri autori (Persone) | StephensTimothy E |
Soggetto topico |
Corruption
Corruption - Prevention Bribery - Prevention |
ISBN |
1-4724-0452-1
1-317-17260-4 1-315-56991-4 1-317-17259-0 1-299-26363-1 1-4094-5358-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword: the honourable Kenneth Mutt KC -- Noble cause corruption -- Background on corruption laws -- A bit of dodgy history -- The main conventions -- UK and US regulatory agencies -- The Bribery Act 2010 and friends -- Objectives and limitations -- Main sections of the act -- Enforcement, penalties and sentencing -- Other relevant UK legislation and guidelines -- US and worldwide legislation and guidelines -- The taxonomy of corruption -- Introduction to a universal problem -- Sectoral corruption -- The mechanics of corruption -- Examples of high risk processes and contexts -- Risk assessment -- Introduction and the nature of risk -- Preparation and catalogues -- Common pre-conditional factors -- Evaluation tools and techniques -- Exposing corruption -- Introduction and background -- Critical point auditing -- Manual tests -- Effective baseline controls -- Introduction on the nature of controls -- Control tools and misconceptions -- Ownership and the tone from the top -- Budgets, policies and procedures -- Due diligence, integrity reporting and contingency planning -- Contractual controls and personnel procedures -- Accounting procedures, fidelity and insurance -- Additional controls -- Introduction, principles and policies -- Additional anti-corruption strategies -- Dealing with corruption -- Facilitation payments, gifts and third party agents -- Join ventures, acquisitions and ipos -- Other projects and controls -- Internal and regulatory investigations -- Background and strategy to internal investigations -- Key elements and case handling -- Regulatory investigations -- Negotiating settlements and going to court. |
Record Nr. | UNINA-9910792075903321 |
Comer Michael J. | ||
London ; ; New York : , : Routledge, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Bribery and corruption : how to be an impeccable and profitable corporate citizen / / Michael J. Comer and Timothy E. Stephens |
Autore | Comer Michael J. |
Edizione | [1st ed.] |
Pubbl/distr/stampa | London ; ; New York : , : Routledge, , 2016 |
Descrizione fisica | 1 online resource (911 p.) |
Disciplina | 658.4/73 |
Altri autori (Persone) | StephensTimothy E |
Soggetto topico |
Corruption
Corruption - Prevention Bribery - Prevention |
ISBN |
1-4724-0452-1
1-317-17260-4 1-315-56991-4 1-317-17259-0 1-299-26363-1 1-4094-5358-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword: the honourable Kenneth Mutt KC -- Noble cause corruption -- Background on corruption laws -- A bit of dodgy history -- The main conventions -- UK and US regulatory agencies -- The Bribery Act 2010 and friends -- Objectives and limitations -- Main sections of the act -- Enforcement, penalties and sentencing -- Other relevant UK legislation and guidelines -- US and worldwide legislation and guidelines -- The taxonomy of corruption -- Introduction to a universal problem -- Sectoral corruption -- The mechanics of corruption -- Examples of high risk processes and contexts -- Risk assessment -- Introduction and the nature of risk -- Preparation and catalogues -- Common pre-conditional factors -- Evaluation tools and techniques -- Exposing corruption -- Introduction and background -- Critical point auditing -- Manual tests -- Effective baseline controls -- Introduction on the nature of controls -- Control tools and misconceptions -- Ownership and the tone from the top -- Budgets, policies and procedures -- Due diligence, integrity reporting and contingency planning -- Contractual controls and personnel procedures -- Accounting procedures, fidelity and insurance -- Additional controls -- Introduction, principles and policies -- Additional anti-corruption strategies -- Dealing with corruption -- Facilitation payments, gifts and third party agents -- Join ventures, acquisitions and ipos -- Other projects and controls -- Internal and regulatory investigations -- Background and strategy to internal investigations -- Key elements and case handling -- Regulatory investigations -- Negotiating settlements and going to court. |
Record Nr. | UNINA-9910815552703321 |
Comer Michael J. | ||
London ; ; New York : , : Routledge, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Business under fire [[electronic resource] ] : how Israeli companies are succeeding in the face of terror--and what we can learn from them / / Dan Carrison |
Autore | Carrison Dan |
Pubbl/distr/stampa | New York, : AMACOM, American Management Association, c2005 |
Descrizione fisica | 1 online resource (239 p.) |
Disciplina | 658.4/73 |
Soggetto topico |
Corporations - Security measures - Israel
Terrorism - Israel - Prevention Executives - Israel |
Soggetto genere / forma | Electronic books. |
ISBN | 0-8144-2848-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preliminaries; Contents; THE ASSAULT ON THE ECONOMY; MEETING THE THREAT; MANAGING THROUGH THE CRISIS; ELEVEN MONTHS' ANNUAL LEAVE; THE UNIQUE ROLE OF THE BUSINESS COMMUNITY; PREPARING FOR THE LONG HAUL; Index |
Record Nr. | UNINA-9910449949203321 |
Carrison Dan | ||
New York, : AMACOM, American Management Association, c2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Business under fire [[electronic resource] ] : how Israeli companies are succeeding in the face of terror--and what we can learn from them / / Dan Carrison |
Autore | Carrison Dan |
Pubbl/distr/stampa | New York, : AMACOM, American Management Association, c2005 |
Descrizione fisica | 1 online resource (239 p.) |
Disciplina | 658.4/73 |
Soggetto topico |
Corporations - Security measures - Israel
Terrorism - Israel - Prevention Executives - Israel |
ISBN | 0-8144-2848-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preliminaries; Contents; THE ASSAULT ON THE ECONOMY; MEETING THE THREAT; MANAGING THROUGH THE CRISIS; ELEVEN MONTHS' ANNUAL LEAVE; THE UNIQUE ROLE OF THE BUSINESS COMMUNITY; PREPARING FOR THE LONG HAUL; Index |
Record Nr. | UNINA-9910783279503321 |
Carrison Dan | ||
New York, : AMACOM, American Management Association, c2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Business under fire : how Israeli companies are succeeding in the face of terror--and what we can learn from them / / Dan Carrison |
Autore | Carrison Dan |
Edizione | [1st ed.] |
Pubbl/distr/stampa | New York, : AMACOM, American Management Association, c2005 |
Descrizione fisica | 1 online resource (239 p.) |
Disciplina | 658.4/73 |
Soggetto topico |
Corporations - Security measures - Israel
Terrorism - Israel - Prevention Executives - Israel |
ISBN | 0-8144-2848-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preliminaries; Contents; THE ASSAULT ON THE ECONOMY; MEETING THE THREAT; MANAGING THROUGH THE CRISIS; ELEVEN MONTHS' ANNUAL LEAVE; THE UNIQUE ROLE OF THE BUSINESS COMMUNITY; PREPARING FOR THE LONG HAUL; Index |
Record Nr. | UNINA-9910824075203321 |
Carrison Dan | ||
New York, : AMACOM, American Management Association, c2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|