top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Countering fraud for competitive advantage [[electronic resource] ] : the professional approach to reducing the last great hidden cost / / Mark Button & Jim Gee
Countering fraud for competitive advantage [[electronic resource] ] : the professional approach to reducing the last great hidden cost / / Mark Button & Jim Gee
Autore Button Mark
Edizione [1st edition]
Pubbl/distr/stampa Chichester, U.K., : Wiley, 2013
Descrizione fisica 1 online resource (210 p.)
Disciplina 658.4/73
Altri autori (Persone) GeeJim <1957->
Soggetto topico Fraud - Prevention
Employee theft - Prevention
Auditing, Internal
ISBN 1-119-20829-7
1-119-96040-1
1-299-24179-4
1-118-45425-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto countering fraud for competitive advantage : the professional approach to reducing the last great hidden cost; Contents; 1 Introduction; 1.1 BOOK OUTLINE; END NOTES; 2 The Fraud Problem; 2.1 INTRODUCTION; 2.2 THE FRAUD PROBLEM; 2.2.1 What is Fraud?; 2.2.2 Types of Fraud; 2.3 THE EXTENT OF FRAUD; 2.4 TRENDS IN FRAUD; 2.5 THE IMPACT OF FRAUD; 2.5.1 Fraud Leads to More Fraud; 2.5.2 Psychological and Health Impacts; 2.5.3 Reputation; 2.5.4 Change in Behaviour; 2.6 CONCLUSION; FURTHER READING; END NOTES; 3 The Fraudster and the Culture of Fraud; 3.1 INTRODUCTION; 3.2 UNDERSTANDING THE FRAUDSTER
3.2.1 Profiling Fraudsters3.2.2 Pressure; 3.2.3 Rationalisation; 3.2.4 Opportunity; 3.2.5 Red Flags; 3.3 CULTURES AND FRAUD; 3.4 CONCLUSION; FURTHER READING; END NOTES; 4 The Resilience to Fraud; 4.1 INTRODUCTION; 4.2 NATIONAL RESILIENCE; 4.3 ORGANISATIONAL RESILIENCE; 4.3.1 Adopting the Right Strategy; 4.3.2 Accurately Identifying the Risks; 4.3.3 Creating and Maintaining a Strong Structure; 4.3.4 Taking Action to Tackle the Problem; 4.3.5 Defining Success; 4.3.6 Overall Analysis; 4.4 FURTHER RESEARCH; 4.5 ACFE RESEARCH
4.6 UNDERSTANDING THE PROBLEM: FUSING THE FRAUDSTER, THE CULTURE, AND THE STRUCTURES OF RESILIENCE4.7 CONCLUSION; FURTHER READING; END NOTES; 5 Measuring Fraud Losses and Tailoring the Strategy; 5.1 INTRODUCTION; 5.2 THE PROBLEM WITH RISK MANAGEMENT; 5.3 MEASURING FRAUD; 5.4 WIDER BENEFITS OF FRAUD MEASUREMENT; 5.5 CONCLUSION; FURTHER READING; END NOTES; 6 Creating an Anti-Fraud Culture and Preventing Fraud; 6.1 INTRODUCTION; 6.2 SITUATIONAL MEASURES; 6.2.1 Increasing the Effort; 6.2.2 Increasing the Risks; 6.2.3 Reducing Rewards; 6.2.4 Reducing Provocations and Excuses; 6.2.5 Displacement
6.3 CREATING AN ANTI-FRAUD CULTURE6.3.1 A Model Anti-Fraud Culture Strategy; 6.3.2 Deterrence; 6.3.3 Reputation; 6.4 CONCLUSION; FURTHER READING; END NOTES; 7 Detecting Fraud and Investigating Professionally; 7.1 INTRODUCTION; 7.2 THE COSTS OF INVESTIGATION; 7.3 WHO WILL INVESTIGATE?; 7.3.1 Investigative Resources; 7.4 PROACTIVE INVESTIGATIONS; 7.4.1 Data-Matching; 7.4.2 Data-Mining; 7.4.3 Data-sharing and Networking; 7.4.4 Intelligence; 7.5 REACTIVE INVESTIGATIONS; 7.6 CONDUCTING FRAUD INVESTIGATIONS; 7.6.1 Interviews; 7.6.2 Surveillance; 7.6.3 Searches; 7.6.4 Forensics
7.7 PSYCHOLOGY AND INVESTIGATION7.7.1 Verbal Cues; 7.7.2 Vocal Cues; 7.7.3 Visual Cues; 7.7.4 Experiments Increasing Cognitive Load; 7.8 CONCLUSION; FURTHER READING; END NOTES; 8 Sanctioning Fraudsters and Pursuing Redress; 8.1 INTRODUCTION; 8.2 UNDERSTANDING FRAUDSTERS AND THE PLACE OF DETERRENCE; 8.3 THE SANCTIONS TOOL BOX; 8.3.1 Quasi-Sanctions; 8.3.2 The Main Formal Sanctions; 8.3.3 Possible Parallel Sanctions; 8.4 PUBLICISING SANCTIONS; 8.5 CONCLUSION; FURTHER READING; END NOTES; 9 Enhancing Performance through Counter-Fraud Metrics; 9.1 INTRODUCTION
9.2 NEWWAYS OF THINKING ABOUT SECURITY AND FRAUD
Record Nr. UNINA-9910139235603321
Button Mark  
Chichester, U.K., : Wiley, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Countering fraud for competitive advantage : the professional approach to reducing the last great hidden cost / / Mark Button & Jim Gee
Countering fraud for competitive advantage : the professional approach to reducing the last great hidden cost / / Mark Button & Jim Gee
Autore Button Mark
Edizione [1st edition]
Pubbl/distr/stampa Chichester, U.K., : Wiley, 2013
Descrizione fisica 1 online resource (210 p.)
Disciplina 658.4/73
Altri autori (Persone) GeeJim <1957->
Soggetto topico Fraud - Prevention
Employee theft - Prevention
Auditing, Internal
ISBN 9781119208297
1119208297
9781119960409
1119960401
9781299241794
1299241794
9781118454251
1118454251
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto countering fraud for competitive advantage : the professional approach to reducing the last great hidden cost; Contents; 1 Introduction; 1.1 BOOK OUTLINE; END NOTES; 2 The Fraud Problem; 2.1 INTRODUCTION; 2.2 THE FRAUD PROBLEM; 2.2.1 What is Fraud?; 2.2.2 Types of Fraud; 2.3 THE EXTENT OF FRAUD; 2.4 TRENDS IN FRAUD; 2.5 THE IMPACT OF FRAUD; 2.5.1 Fraud Leads to More Fraud; 2.5.2 Psychological and Health Impacts; 2.5.3 Reputation; 2.5.4 Change in Behaviour; 2.6 CONCLUSION; FURTHER READING; END NOTES; 3 The Fraudster and the Culture of Fraud; 3.1 INTRODUCTION; 3.2 UNDERSTANDING THE FRAUDSTER
3.2.1 Profiling Fraudsters3.2.2 Pressure; 3.2.3 Rationalisation; 3.2.4 Opportunity; 3.2.5 Red Flags; 3.3 CULTURES AND FRAUD; 3.4 CONCLUSION; FURTHER READING; END NOTES; 4 The Resilience to Fraud; 4.1 INTRODUCTION; 4.2 NATIONAL RESILIENCE; 4.3 ORGANISATIONAL RESILIENCE; 4.3.1 Adopting the Right Strategy; 4.3.2 Accurately Identifying the Risks; 4.3.3 Creating and Maintaining a Strong Structure; 4.3.4 Taking Action to Tackle the Problem; 4.3.5 Defining Success; 4.3.6 Overall Analysis; 4.4 FURTHER RESEARCH; 4.5 ACFE RESEARCH
4.6 UNDERSTANDING THE PROBLEM: FUSING THE FRAUDSTER, THE CULTURE, AND THE STRUCTURES OF RESILIENCE4.7 CONCLUSION; FURTHER READING; END NOTES; 5 Measuring Fraud Losses and Tailoring the Strategy; 5.1 INTRODUCTION; 5.2 THE PROBLEM WITH RISK MANAGEMENT; 5.3 MEASURING FRAUD; 5.4 WIDER BENEFITS OF FRAUD MEASUREMENT; 5.5 CONCLUSION; FURTHER READING; END NOTES; 6 Creating an Anti-Fraud Culture and Preventing Fraud; 6.1 INTRODUCTION; 6.2 SITUATIONAL MEASURES; 6.2.1 Increasing the Effort; 6.2.2 Increasing the Risks; 6.2.3 Reducing Rewards; 6.2.4 Reducing Provocations and Excuses; 6.2.5 Displacement
6.3 CREATING AN ANTI-FRAUD CULTURE6.3.1 A Model Anti-Fraud Culture Strategy; 6.3.2 Deterrence; 6.3.3 Reputation; 6.4 CONCLUSION; FURTHER READING; END NOTES; 7 Detecting Fraud and Investigating Professionally; 7.1 INTRODUCTION; 7.2 THE COSTS OF INVESTIGATION; 7.3 WHO WILL INVESTIGATE?; 7.3.1 Investigative Resources; 7.4 PROACTIVE INVESTIGATIONS; 7.4.1 Data-Matching; 7.4.2 Data-Mining; 7.4.3 Data-sharing and Networking; 7.4.4 Intelligence; 7.5 REACTIVE INVESTIGATIONS; 7.6 CONDUCTING FRAUD INVESTIGATIONS; 7.6.1 Interviews; 7.6.2 Surveillance; 7.6.3 Searches; 7.6.4 Forensics
7.7 PSYCHOLOGY AND INVESTIGATION7.7.1 Verbal Cues; 7.7.2 Vocal Cues; 7.7.3 Visual Cues; 7.7.4 Experiments Increasing Cognitive Load; 7.8 CONCLUSION; FURTHER READING; END NOTES; 8 Sanctioning Fraudsters and Pursuing Redress; 8.1 INTRODUCTION; 8.2 UNDERSTANDING FRAUDSTERS AND THE PLACE OF DETERRENCE; 8.3 THE SANCTIONS TOOL BOX; 8.3.1 Quasi-Sanctions; 8.3.2 The Main Formal Sanctions; 8.3.3 Possible Parallel Sanctions; 8.4 PUBLICISING SANCTIONS; 8.5 CONCLUSION; FURTHER READING; END NOTES; 9 Enhancing Performance through Counter-Fraud Metrics; 9.1 INTRODUCTION
9.2 NEWWAYS OF THINKING ABOUT SECURITY AND FRAUD
Record Nr. UNINA-9910820568703321
Button Mark  
Chichester, U.K., : Wiley, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The National Infrastructure Advisory Council's final report and recommendations on the insider threat to critical infrastructures [[electronic resource] /] / Thomas Noonan, Edmund Archuleta
The National Infrastructure Advisory Council's final report and recommendations on the insider threat to critical infrastructures [[electronic resource] /] / Thomas Noonan, Edmund Archuleta
Pubbl/distr/stampa [Washington, D.C.] : , : DHS/NIAC, , [2008]
Descrizione fisica 1 online resource (55 pages) : digital, PDF file
Altri autori (Persone) NoonanThomas
ArchuletaEdmund
Soggetto topico Infrastructure (Economics) - United States
Computer networks - Security measures
Computer security
Employee theft - Prevention
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Insider threat to critical infrastructures
Record Nr. UNINA-9910698809703321
[Washington, D.C.] : , : DHS/NIAC, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Preventing and detecting employee theft and embezzlement [[electronic resource] ] : a practical guide / / Stephen Pedneault
Preventing and detecting employee theft and embezzlement [[electronic resource] ] : a practical guide / / Stephen Pedneault
Autore Pedneault Stephen <1966->
Pubbl/distr/stampa Hoboken, N.J., : Wiley, c2010
Descrizione fisica 1 online resource (336 p.)
Disciplina 658.3/8
658.473
Collana Wiley Professional Advisory Services
Soggetto topico Employee theft - Prevention
Employee theft
Embezzlement - Prevention
Embezzlement
Employee crimes - Prevention
Soggetto genere / forma Electronic books.
ISBN 0-470-63683-1
1-119-20513-1
1-280-75221-1
9786613677877
0-470-63681-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preventing and Detecting Employee Theft and Embezzlement: A Practical Guide; Contents; Preface; Acknowledgments; Introduction; Chapter 1: Hiring the Right Employees; Chapter 2: Know Your Employees; Chapter 3: Sales, Cash Receipts, and Collections; Chapter 4: Credit Card Sales, Transactions, and Merchant Statements; Chapter 5: Purchases, Cash Disbursements, Checks, and Petty Cash; Chapter 6: Credit Cards and Debit Cards; Chapter 7: Employee Expense Reimbursement; Chapter 8: Electronic Banking; Chapter 9: Payroll Processing; Chapter 10: Inventory Issues and Controls
Chapter 11: Bank Statements, Canceled Checks, and ReconciliationsChapter 12: Financial Reports; Chapter 13: Safeguarding Your Bookkeeping or Accounting Systems; Chapter 14: Prevention, Detection, and Insurance; Chapter 15: Your Response to an Identified or Potential Issue; Appendix A: Embezzlement Controls for Business Enterprises; Appendix B: Who Was Lester Amos Pratt?; About the Author; Index
Record Nr. UNINA-9910140595803321
Pedneault Stephen <1966->  
Hoboken, N.J., : Wiley, c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Preventing and detecting employee theft and embezzlement [[electronic resource] ] : a practical guide / / Stephen Pedneault
Preventing and detecting employee theft and embezzlement [[electronic resource] ] : a practical guide / / Stephen Pedneault
Autore Pedneault Stephen <1966->
Pubbl/distr/stampa Hoboken, N.J., : Wiley, c2010
Descrizione fisica 1 online resource (336 p.)
Disciplina 658.3/8
658.473
Collana Wiley Professional Advisory Services
Soggetto topico Employee theft - Prevention
Employee theft
Embezzlement - Prevention
Embezzlement
Employee crimes - Prevention
ISBN 0-470-63683-1
1-119-20513-1
1-280-75221-1
9786613677877
0-470-63681-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preventing and Detecting Employee Theft and Embezzlement: A Practical Guide; Contents; Preface; Acknowledgments; Introduction; Chapter 1: Hiring the Right Employees; Chapter 2: Know Your Employees; Chapter 3: Sales, Cash Receipts, and Collections; Chapter 4: Credit Card Sales, Transactions, and Merchant Statements; Chapter 5: Purchases, Cash Disbursements, Checks, and Petty Cash; Chapter 6: Credit Cards and Debit Cards; Chapter 7: Employee Expense Reimbursement; Chapter 8: Electronic Banking; Chapter 9: Payroll Processing; Chapter 10: Inventory Issues and Controls
Chapter 11: Bank Statements, Canceled Checks, and ReconciliationsChapter 12: Financial Reports; Chapter 13: Safeguarding Your Bookkeeping or Accounting Systems; Chapter 14: Prevention, Detection, and Insurance; Chapter 15: Your Response to an Identified or Potential Issue; Appendix A: Embezzlement Controls for Business Enterprises; Appendix B: Who Was Lester Amos Pratt?; About the Author; Index
Record Nr. UNINA-9910830820103321
Pedneault Stephen <1966->  
Hoboken, N.J., : Wiley, c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Preventing and detecting employee theft and embezzlement : a practical guide / / Stephen Pedneault
Preventing and detecting employee theft and embezzlement : a practical guide / / Stephen Pedneault
Autore Pedneault Stephen <1966->
Pubbl/distr/stampa Hoboken, N.J., : Wiley, c2010
Descrizione fisica 1 online resource (336 p.)
Disciplina 658.3/8
Collana Wiley Professional Advisory Services
Soggetto topico Employee theft - Prevention
Employee theft
Embezzlement - Prevention
Embezzlement
Employee crimes - Prevention
ISBN 9786613677877
9780470636831
0470636831
9781119205135
1119205131
9781280752216
1280752211
9780470636817
0470636815
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preventing and Detecting Employee Theft and Embezzlement: A Practical Guide; Contents; Preface; Acknowledgments; Introduction; Chapter 1: Hiring the Right Employees; Chapter 2: Know Your Employees; Chapter 3: Sales, Cash Receipts, and Collections; Chapter 4: Credit Card Sales, Transactions, and Merchant Statements; Chapter 5: Purchases, Cash Disbursements, Checks, and Petty Cash; Chapter 6: Credit Cards and Debit Cards; Chapter 7: Employee Expense Reimbursement; Chapter 8: Electronic Banking; Chapter 9: Payroll Processing; Chapter 10: Inventory Issues and Controls
Chapter 11: Bank Statements, Canceled Checks, and ReconciliationsChapter 12: Financial Reports; Chapter 13: Safeguarding Your Bookkeeping or Accounting Systems; Chapter 14: Prevention, Detection, and Insurance; Chapter 15: Your Response to an Identified or Potential Issue; Appendix A: Embezzlement Controls for Business Enterprises; Appendix B: Who Was Lester Amos Pratt?; About the Author; Index
Record Nr. UNINA-9911020193703321
Pedneault Stephen <1966->  
Hoboken, N.J., : Wiley, c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Loss Prevention : An Introduction
Security and Loss Prevention : An Introduction
Autore Purpura Philip
Edizione [5th ed.]
Pubbl/distr/stampa Burlington, : Elsevier Science, 2007
Descrizione fisica 1 online resource (593 p.)
Disciplina 658.4/73
658.4056
658.473
Collana OSHA factsheet
Soggetto topico Burglary protection
Employee theft - Prevention
Employee theft -- Prevention
Fire prevention
Private security services
Security systems
Shoplifting - Prevention
Shoplifting -- Prevention
Private security services - Prevention
Burglary protection - Prevention
Employee theft
Shoplifting
Social Welfare & Social Work
Social Sciences
Criminology, Penology & Juvenile Delinquency
ISBN 9786613837875
9781283525428
1283525429
9780080554006
0080554008
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Security and Loss Prevention: An Introduction; Copyright Page; Dedication; Table of Contents; About the Author; Preface; Acknowledgments; PART I: Introduction to Security and Loss Prevention; Chapter 1. The History of Security and Loss Prevention: A Critical Perspective; Objectives; Why Critical Thinking?; How Can We Think Critically?; Why Think Critically about the History of Security and Loss Prevention?; Security and Loss Prevention Defined; History; Early Civilizations; More Contemporary Times; Case Problems; References
Chapter 2. The Business, Careers, and Challenges of Security and Loss PreventionObjectives; Introduction; Metrics; The Security Industry; Careers: Loss Prevention Services and Specialists; The Limitations of the Criminal Justice System: Implications for Loss Prevention Practitioners; Challenges of the Security Industry; Case Problems; References; PART II: Reducing the Problem of Loss; Chapter 3. Foundations of Security and Loss Prevention; Objectives; The Security and Loss Prevention Profession; Methods for Protection Programs; Standards and Regulations; Evaluation of Loss Prevention Programs
Proprietary SecurityCase Problems; References; Chapter 4. Law; Objectives; Introduction; Judicial Systems; Origins of Law; Tort Law and Controls Over Private Security; Legal Theory of Premises Security Claims; Contract Law; Civil Justice Procedures; Administrative Law; Criminal Justice Procedures; Case Problems; The Decision for "You Be the Judge"; References; Chapter 5. Internal and External Relations; Objectives; Internal and External Relations; Internal Relations; External Relations; Special Problems; Case Problems; References; Chapter 6. Applicant Screening and Employee Socialization
ObjectivesIntroduction; Employment Law; Screening Methods; Employee Socialization; Case Problems; The Decision for "You Be the Judge"; References; Chapter 7. Internal Threats and Countermeasures; Objectives; Introduction; Internal Theft; Management Countermeasures; Physical Security Countermeasures; Case Problems; References; Chapter 8. External Threats and Countermeasures; Objectives; Introduction; Methods of Unauthorized Entry; Countermeasures; Case Problems; References; Chapter 9. Services and Systems: Methods Toward Wise Purchasing Decisions; Objectives; Introduction
Pitfalls when Purchasing Security Services and SystemsPurchasing Security Services; Purchasing Security Systems; Outsourcing; Case Problem; The Decision for "You Be the Judge"; References; Chapter 10. Investigations; Objectives; Introduction; Types of Investigations; Law; Evidence; Interviewing and Interrogation; Information Sources; Identity Theft; Investigative Leads; Surveillance; Information Accuracy; Report Writing; Testimony; Case Problems; References; Chapter 11. Accounting, Accountability, and Auditing; Objectives; Introduction; Accounting; Accountability; Auditing; Fraud
Governance, Risk Management, and Compliance
Record Nr. UNINA-9910703128403321
Purpura Philip  
Burlington, : Elsevier Science, 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui