Countering fraud for competitive advantage [[electronic resource] ] : the professional approach to reducing the last great hidden cost / / Mark Button & Jim Gee
| Countering fraud for competitive advantage [[electronic resource] ] : the professional approach to reducing the last great hidden cost / / Mark Button & Jim Gee |
| Autore | Button Mark |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Chichester, U.K., : Wiley, 2013 |
| Descrizione fisica | 1 online resource (210 p.) |
| Disciplina | 658.4/73 |
| Altri autori (Persone) | GeeJim <1957-> |
| Soggetto topico |
Fraud - Prevention
Employee theft - Prevention Auditing, Internal |
| ISBN |
1-119-20829-7
1-119-96040-1 1-299-24179-4 1-118-45425-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
countering fraud for competitive advantage : the professional approach to reducing the last great hidden cost; Contents; 1 Introduction; 1.1 BOOK OUTLINE; END NOTES; 2 The Fraud Problem; 2.1 INTRODUCTION; 2.2 THE FRAUD PROBLEM; 2.2.1 What is Fraud?; 2.2.2 Types of Fraud; 2.3 THE EXTENT OF FRAUD; 2.4 TRENDS IN FRAUD; 2.5 THE IMPACT OF FRAUD; 2.5.1 Fraud Leads to More Fraud; 2.5.2 Psychological and Health Impacts; 2.5.3 Reputation; 2.5.4 Change in Behaviour; 2.6 CONCLUSION; FURTHER READING; END NOTES; 3 The Fraudster and the Culture of Fraud; 3.1 INTRODUCTION; 3.2 UNDERSTANDING THE FRAUDSTER
3.2.1 Profiling Fraudsters3.2.2 Pressure; 3.2.3 Rationalisation; 3.2.4 Opportunity; 3.2.5 Red Flags; 3.3 CULTURES AND FRAUD; 3.4 CONCLUSION; FURTHER READING; END NOTES; 4 The Resilience to Fraud; 4.1 INTRODUCTION; 4.2 NATIONAL RESILIENCE; 4.3 ORGANISATIONAL RESILIENCE; 4.3.1 Adopting the Right Strategy; 4.3.2 Accurately Identifying the Risks; 4.3.3 Creating and Maintaining a Strong Structure; 4.3.4 Taking Action to Tackle the Problem; 4.3.5 Defining Success; 4.3.6 Overall Analysis; 4.4 FURTHER RESEARCH; 4.5 ACFE RESEARCH 4.6 UNDERSTANDING THE PROBLEM: FUSING THE FRAUDSTER, THE CULTURE, AND THE STRUCTURES OF RESILIENCE4.7 CONCLUSION; FURTHER READING; END NOTES; 5 Measuring Fraud Losses and Tailoring the Strategy; 5.1 INTRODUCTION; 5.2 THE PROBLEM WITH RISK MANAGEMENT; 5.3 MEASURING FRAUD; 5.4 WIDER BENEFITS OF FRAUD MEASUREMENT; 5.5 CONCLUSION; FURTHER READING; END NOTES; 6 Creating an Anti-Fraud Culture and Preventing Fraud; 6.1 INTRODUCTION; 6.2 SITUATIONAL MEASURES; 6.2.1 Increasing the Effort; 6.2.2 Increasing the Risks; 6.2.3 Reducing Rewards; 6.2.4 Reducing Provocations and Excuses; 6.2.5 Displacement 6.3 CREATING AN ANTI-FRAUD CULTURE6.3.1 A Model Anti-Fraud Culture Strategy; 6.3.2 Deterrence; 6.3.3 Reputation; 6.4 CONCLUSION; FURTHER READING; END NOTES; 7 Detecting Fraud and Investigating Professionally; 7.1 INTRODUCTION; 7.2 THE COSTS OF INVESTIGATION; 7.3 WHO WILL INVESTIGATE?; 7.3.1 Investigative Resources; 7.4 PROACTIVE INVESTIGATIONS; 7.4.1 Data-Matching; 7.4.2 Data-Mining; 7.4.3 Data-sharing and Networking; 7.4.4 Intelligence; 7.5 REACTIVE INVESTIGATIONS; 7.6 CONDUCTING FRAUD INVESTIGATIONS; 7.6.1 Interviews; 7.6.2 Surveillance; 7.6.3 Searches; 7.6.4 Forensics 7.7 PSYCHOLOGY AND INVESTIGATION7.7.1 Verbal Cues; 7.7.2 Vocal Cues; 7.7.3 Visual Cues; 7.7.4 Experiments Increasing Cognitive Load; 7.8 CONCLUSION; FURTHER READING; END NOTES; 8 Sanctioning Fraudsters and Pursuing Redress; 8.1 INTRODUCTION; 8.2 UNDERSTANDING FRAUDSTERS AND THE PLACE OF DETERRENCE; 8.3 THE SANCTIONS TOOL BOX; 8.3.1 Quasi-Sanctions; 8.3.2 The Main Formal Sanctions; 8.3.3 Possible Parallel Sanctions; 8.4 PUBLICISING SANCTIONS; 8.5 CONCLUSION; FURTHER READING; END NOTES; 9 Enhancing Performance through Counter-Fraud Metrics; 9.1 INTRODUCTION 9.2 NEWWAYS OF THINKING ABOUT SECURITY AND FRAUD |
| Record Nr. | UNINA-9910139235603321 |
Button Mark
|
||
| Chichester, U.K., : Wiley, 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Countering fraud for competitive advantage : the professional approach to reducing the last great hidden cost / / Mark Button & Jim Gee
| Countering fraud for competitive advantage : the professional approach to reducing the last great hidden cost / / Mark Button & Jim Gee |
| Autore | Button Mark |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Chichester, U.K., : Wiley, 2013 |
| Descrizione fisica | 1 online resource (210 p.) |
| Disciplina | 658.4/73 |
| Altri autori (Persone) | GeeJim <1957-> |
| Soggetto topico |
Fraud - Prevention
Employee theft - Prevention Auditing, Internal |
| ISBN |
9781119208297
1119208297 9781119960409 1119960401 9781299241794 1299241794 9781118454251 1118454251 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
countering fraud for competitive advantage : the professional approach to reducing the last great hidden cost; Contents; 1 Introduction; 1.1 BOOK OUTLINE; END NOTES; 2 The Fraud Problem; 2.1 INTRODUCTION; 2.2 THE FRAUD PROBLEM; 2.2.1 What is Fraud?; 2.2.2 Types of Fraud; 2.3 THE EXTENT OF FRAUD; 2.4 TRENDS IN FRAUD; 2.5 THE IMPACT OF FRAUD; 2.5.1 Fraud Leads to More Fraud; 2.5.2 Psychological and Health Impacts; 2.5.3 Reputation; 2.5.4 Change in Behaviour; 2.6 CONCLUSION; FURTHER READING; END NOTES; 3 The Fraudster and the Culture of Fraud; 3.1 INTRODUCTION; 3.2 UNDERSTANDING THE FRAUDSTER
3.2.1 Profiling Fraudsters3.2.2 Pressure; 3.2.3 Rationalisation; 3.2.4 Opportunity; 3.2.5 Red Flags; 3.3 CULTURES AND FRAUD; 3.4 CONCLUSION; FURTHER READING; END NOTES; 4 The Resilience to Fraud; 4.1 INTRODUCTION; 4.2 NATIONAL RESILIENCE; 4.3 ORGANISATIONAL RESILIENCE; 4.3.1 Adopting the Right Strategy; 4.3.2 Accurately Identifying the Risks; 4.3.3 Creating and Maintaining a Strong Structure; 4.3.4 Taking Action to Tackle the Problem; 4.3.5 Defining Success; 4.3.6 Overall Analysis; 4.4 FURTHER RESEARCH; 4.5 ACFE RESEARCH 4.6 UNDERSTANDING THE PROBLEM: FUSING THE FRAUDSTER, THE CULTURE, AND THE STRUCTURES OF RESILIENCE4.7 CONCLUSION; FURTHER READING; END NOTES; 5 Measuring Fraud Losses and Tailoring the Strategy; 5.1 INTRODUCTION; 5.2 THE PROBLEM WITH RISK MANAGEMENT; 5.3 MEASURING FRAUD; 5.4 WIDER BENEFITS OF FRAUD MEASUREMENT; 5.5 CONCLUSION; FURTHER READING; END NOTES; 6 Creating an Anti-Fraud Culture and Preventing Fraud; 6.1 INTRODUCTION; 6.2 SITUATIONAL MEASURES; 6.2.1 Increasing the Effort; 6.2.2 Increasing the Risks; 6.2.3 Reducing Rewards; 6.2.4 Reducing Provocations and Excuses; 6.2.5 Displacement 6.3 CREATING AN ANTI-FRAUD CULTURE6.3.1 A Model Anti-Fraud Culture Strategy; 6.3.2 Deterrence; 6.3.3 Reputation; 6.4 CONCLUSION; FURTHER READING; END NOTES; 7 Detecting Fraud and Investigating Professionally; 7.1 INTRODUCTION; 7.2 THE COSTS OF INVESTIGATION; 7.3 WHO WILL INVESTIGATE?; 7.3.1 Investigative Resources; 7.4 PROACTIVE INVESTIGATIONS; 7.4.1 Data-Matching; 7.4.2 Data-Mining; 7.4.3 Data-sharing and Networking; 7.4.4 Intelligence; 7.5 REACTIVE INVESTIGATIONS; 7.6 CONDUCTING FRAUD INVESTIGATIONS; 7.6.1 Interviews; 7.6.2 Surveillance; 7.6.3 Searches; 7.6.4 Forensics 7.7 PSYCHOLOGY AND INVESTIGATION7.7.1 Verbal Cues; 7.7.2 Vocal Cues; 7.7.3 Visual Cues; 7.7.4 Experiments Increasing Cognitive Load; 7.8 CONCLUSION; FURTHER READING; END NOTES; 8 Sanctioning Fraudsters and Pursuing Redress; 8.1 INTRODUCTION; 8.2 UNDERSTANDING FRAUDSTERS AND THE PLACE OF DETERRENCE; 8.3 THE SANCTIONS TOOL BOX; 8.3.1 Quasi-Sanctions; 8.3.2 The Main Formal Sanctions; 8.3.3 Possible Parallel Sanctions; 8.4 PUBLICISING SANCTIONS; 8.5 CONCLUSION; FURTHER READING; END NOTES; 9 Enhancing Performance through Counter-Fraud Metrics; 9.1 INTRODUCTION 9.2 NEWWAYS OF THINKING ABOUT SECURITY AND FRAUD |
| Record Nr. | UNINA-9910820568703321 |
Button Mark
|
||
| Chichester, U.K., : Wiley, 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The National Infrastructure Advisory Council's final report and recommendations on the insider threat to critical infrastructures [[electronic resource] /] / Thomas Noonan, Edmund Archuleta
| The National Infrastructure Advisory Council's final report and recommendations on the insider threat to critical infrastructures [[electronic resource] /] / Thomas Noonan, Edmund Archuleta |
| Pubbl/distr/stampa | [Washington, D.C.] : , : DHS/NIAC, , [2008] |
| Descrizione fisica | 1 online resource (55 pages) : digital, PDF file |
| Altri autori (Persone) |
NoonanThomas
ArchuletaEdmund |
| Soggetto topico |
Infrastructure (Economics) - United States
Computer networks - Security measures Computer security Employee theft - Prevention |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Insider threat to critical infrastructures |
| Record Nr. | UNINA-9910698809703321 |
| [Washington, D.C.] : , : DHS/NIAC, , [2008] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Preventing and detecting employee theft and embezzlement [[electronic resource] ] : a practical guide / / Stephen Pedneault
| Preventing and detecting employee theft and embezzlement [[electronic resource] ] : a practical guide / / Stephen Pedneault |
| Autore | Pedneault Stephen <1966-> |
| Pubbl/distr/stampa | Hoboken, N.J., : Wiley, c2010 |
| Descrizione fisica | 1 online resource (336 p.) |
| Disciplina |
658.3/8
658.473 |
| Collana | Wiley Professional Advisory Services |
| Soggetto topico |
Employee theft - Prevention
Employee theft Embezzlement - Prevention Embezzlement Employee crimes - Prevention |
| Soggetto genere / forma | Electronic books. |
| ISBN |
0-470-63683-1
1-119-20513-1 1-280-75221-1 9786613677877 0-470-63681-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Preventing and Detecting Employee Theft and Embezzlement: A Practical Guide; Contents; Preface; Acknowledgments; Introduction; Chapter 1: Hiring the Right Employees; Chapter 2: Know Your Employees; Chapter 3: Sales, Cash Receipts, and Collections; Chapter 4: Credit Card Sales, Transactions, and Merchant Statements; Chapter 5: Purchases, Cash Disbursements, Checks, and Petty Cash; Chapter 6: Credit Cards and Debit Cards; Chapter 7: Employee Expense Reimbursement; Chapter 8: Electronic Banking; Chapter 9: Payroll Processing; Chapter 10: Inventory Issues and Controls
Chapter 11: Bank Statements, Canceled Checks, and ReconciliationsChapter 12: Financial Reports; Chapter 13: Safeguarding Your Bookkeeping or Accounting Systems; Chapter 14: Prevention, Detection, and Insurance; Chapter 15: Your Response to an Identified or Potential Issue; Appendix A: Embezzlement Controls for Business Enterprises; Appendix B: Who Was Lester Amos Pratt?; About the Author; Index |
| Record Nr. | UNINA-9910140595803321 |
Pedneault Stephen <1966->
|
||
| Hoboken, N.J., : Wiley, c2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Preventing and detecting employee theft and embezzlement [[electronic resource] ] : a practical guide / / Stephen Pedneault
| Preventing and detecting employee theft and embezzlement [[electronic resource] ] : a practical guide / / Stephen Pedneault |
| Autore | Pedneault Stephen <1966-> |
| Pubbl/distr/stampa | Hoboken, N.J., : Wiley, c2010 |
| Descrizione fisica | 1 online resource (336 p.) |
| Disciplina |
658.3/8
658.473 |
| Collana | Wiley Professional Advisory Services |
| Soggetto topico |
Employee theft - Prevention
Employee theft Embezzlement - Prevention Embezzlement Employee crimes - Prevention |
| ISBN |
0-470-63683-1
1-119-20513-1 1-280-75221-1 9786613677877 0-470-63681-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Preventing and Detecting Employee Theft and Embezzlement: A Practical Guide; Contents; Preface; Acknowledgments; Introduction; Chapter 1: Hiring the Right Employees; Chapter 2: Know Your Employees; Chapter 3: Sales, Cash Receipts, and Collections; Chapter 4: Credit Card Sales, Transactions, and Merchant Statements; Chapter 5: Purchases, Cash Disbursements, Checks, and Petty Cash; Chapter 6: Credit Cards and Debit Cards; Chapter 7: Employee Expense Reimbursement; Chapter 8: Electronic Banking; Chapter 9: Payroll Processing; Chapter 10: Inventory Issues and Controls
Chapter 11: Bank Statements, Canceled Checks, and ReconciliationsChapter 12: Financial Reports; Chapter 13: Safeguarding Your Bookkeeping or Accounting Systems; Chapter 14: Prevention, Detection, and Insurance; Chapter 15: Your Response to an Identified or Potential Issue; Appendix A: Embezzlement Controls for Business Enterprises; Appendix B: Who Was Lester Amos Pratt?; About the Author; Index |
| Record Nr. | UNINA-9910830820103321 |
Pedneault Stephen <1966->
|
||
| Hoboken, N.J., : Wiley, c2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Preventing and detecting employee theft and embezzlement : a practical guide / / Stephen Pedneault
| Preventing and detecting employee theft and embezzlement : a practical guide / / Stephen Pedneault |
| Autore | Pedneault Stephen <1966-> |
| Pubbl/distr/stampa | Hoboken, N.J., : Wiley, c2010 |
| Descrizione fisica | 1 online resource (336 p.) |
| Disciplina | 658.3/8 |
| Collana | Wiley Professional Advisory Services |
| Soggetto topico |
Employee theft - Prevention
Employee theft Embezzlement - Prevention Embezzlement Employee crimes - Prevention |
| ISBN |
9786613677877
9780470636831 0470636831 9781119205135 1119205131 9781280752216 1280752211 9780470636817 0470636815 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Preventing and Detecting Employee Theft and Embezzlement: A Practical Guide; Contents; Preface; Acknowledgments; Introduction; Chapter 1: Hiring the Right Employees; Chapter 2: Know Your Employees; Chapter 3: Sales, Cash Receipts, and Collections; Chapter 4: Credit Card Sales, Transactions, and Merchant Statements; Chapter 5: Purchases, Cash Disbursements, Checks, and Petty Cash; Chapter 6: Credit Cards and Debit Cards; Chapter 7: Employee Expense Reimbursement; Chapter 8: Electronic Banking; Chapter 9: Payroll Processing; Chapter 10: Inventory Issues and Controls
Chapter 11: Bank Statements, Canceled Checks, and ReconciliationsChapter 12: Financial Reports; Chapter 13: Safeguarding Your Bookkeeping or Accounting Systems; Chapter 14: Prevention, Detection, and Insurance; Chapter 15: Your Response to an Identified or Potential Issue; Appendix A: Embezzlement Controls for Business Enterprises; Appendix B: Who Was Lester Amos Pratt?; About the Author; Index |
| Record Nr. | UNINA-9911020193703321 |
Pedneault Stephen <1966->
|
||
| Hoboken, N.J., : Wiley, c2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security and Loss Prevention : An Introduction
| Security and Loss Prevention : An Introduction |
| Autore | Purpura Philip |
| Edizione | [5th ed.] |
| Pubbl/distr/stampa | Burlington, : Elsevier Science, 2007 |
| Descrizione fisica | 1 online resource (593 p.) |
| Disciplina |
658.4/73
658.4056 658.473 |
| Collana | OSHA factsheet |
| Soggetto topico |
Burglary protection
Employee theft - Prevention Employee theft -- Prevention Fire prevention Private security services Security systems Shoplifting - Prevention Shoplifting -- Prevention Private security services - Prevention Burglary protection - Prevention Employee theft Shoplifting Social Welfare & Social Work Social Sciences Criminology, Penology & Juvenile Delinquency |
| ISBN |
9786613837875
9781283525428 1283525429 9780080554006 0080554008 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Security and Loss Prevention: An Introduction; Copyright Page; Dedication; Table of Contents; About the Author; Preface; Acknowledgments; PART I: Introduction to Security and Loss Prevention; Chapter 1. The History of Security and Loss Prevention: A Critical Perspective; Objectives; Why Critical Thinking?; How Can We Think Critically?; Why Think Critically about the History of Security and Loss Prevention?; Security and Loss Prevention Defined; History; Early Civilizations; More Contemporary Times; Case Problems; References
Chapter 2. The Business, Careers, and Challenges of Security and Loss PreventionObjectives; Introduction; Metrics; The Security Industry; Careers: Loss Prevention Services and Specialists; The Limitations of the Criminal Justice System: Implications for Loss Prevention Practitioners; Challenges of the Security Industry; Case Problems; References; PART II: Reducing the Problem of Loss; Chapter 3. Foundations of Security and Loss Prevention; Objectives; The Security and Loss Prevention Profession; Methods for Protection Programs; Standards and Regulations; Evaluation of Loss Prevention Programs Proprietary SecurityCase Problems; References; Chapter 4. Law; Objectives; Introduction; Judicial Systems; Origins of Law; Tort Law and Controls Over Private Security; Legal Theory of Premises Security Claims; Contract Law; Civil Justice Procedures; Administrative Law; Criminal Justice Procedures; Case Problems; The Decision for "You Be the Judge"; References; Chapter 5. Internal and External Relations; Objectives; Internal and External Relations; Internal Relations; External Relations; Special Problems; Case Problems; References; Chapter 6. Applicant Screening and Employee Socialization ObjectivesIntroduction; Employment Law; Screening Methods; Employee Socialization; Case Problems; The Decision for "You Be the Judge"; References; Chapter 7. Internal Threats and Countermeasures; Objectives; Introduction; Internal Theft; Management Countermeasures; Physical Security Countermeasures; Case Problems; References; Chapter 8. External Threats and Countermeasures; Objectives; Introduction; Methods of Unauthorized Entry; Countermeasures; Case Problems; References; Chapter 9. Services and Systems: Methods Toward Wise Purchasing Decisions; Objectives; Introduction Pitfalls when Purchasing Security Services and SystemsPurchasing Security Services; Purchasing Security Systems; Outsourcing; Case Problem; The Decision for "You Be the Judge"; References; Chapter 10. Investigations; Objectives; Introduction; Types of Investigations; Law; Evidence; Interviewing and Interrogation; Information Sources; Identity Theft; Investigative Leads; Surveillance; Information Accuracy; Report Writing; Testimony; Case Problems; References; Chapter 11. Accounting, Accountability, and Auditing; Objectives; Introduction; Accounting; Accountability; Auditing; Fraud Governance, Risk Management, and Compliance |
| Record Nr. | UNINA-9910703128403321 |
Purpura Philip
|
||
| Burlington, : Elsevier Science, 2007 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||