|
|
|
|
LEADER |
10087nam a2200769 4500 |
001 |
ocn896806932 |
003 |
OCoLC |
005 |
20170124065905.1 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
141121s2014 nju ob 001 0 eng |
010 |
|
|
|a 2014046063
|
040 |
|
|
|a DLC
|b eng
|e rda
|c DLC
|d N$T
|d EBLCP
|d BAL
|d CDX
|d DG1
|d TEFOD
|d OCLCF
|d RECBK
|d VT2
|d BAL
|d DEBBG
|d GrThAP
|
019 |
|
|
|a 910550433
|
020 |
|
|
|a 9781118929759 (pdf)
|
020 |
|
|
|a 1118929756 (pdf)
|
020 |
|
|
|a 9781118929766 (epub)
|
020 |
|
|
|a 1118929764 (epub)
|
020 |
|
|
|z 9781118871041 (hardback)
|
020 |
|
|
|a 9781118929773
|
020 |
|
|
|a 1118929772
|
020 |
|
|
|a 1118871049
|
020 |
|
|
|a 9781118871041
|
029 |
1 |
|
|a CHVBK
|b 334087694
|
029 |
1 |
|
|a CHBIS
|b 010442368
|
029 |
1 |
|
|a DEBBG
|b BV043615963
|
029 |
1 |
|
|a AU@
|b 000053832728
|
029 |
1 |
|
|a DEBBG
|b BV043397320
|
035 |
|
|
|a (OCoLC)896806932
|z (OCoLC)910550433
|
037 |
|
|
|a 7FFD8E3B-ED17-4490-9A6A-4E2B2B04148D
|b OverDrive, Inc.
|n http://www.overdrive.com
|
042 |
|
|
|a pcc
|
050 |
0 |
0 |
|a HV6768
|
072 |
|
7 |
|a BUS
|x 082000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 041000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 042000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 085000
|2 bisacsh
|
082 |
0 |
0 |
|a 658.4/73
|2 23
|
084 |
|
|
|a BUS001000
|2 bisacsh
|
049 |
|
|
|a MAIN
|
100 |
1 |
|
|a Padgett, Simon,
|d 1963-
|
245 |
1 |
0 |
|a Profiling the fraudster :
|b removing the mask to prevent and detect fraud /
|c Simon Padgett.
|
264 |
|
1 |
|a Hoboken, New Jersey :
|b Wiley,
|c 2014.
|
300 |
|
|
|a 1 online resource.
|
336 |
|
|
|a text
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
490 |
0 |
|
|a Wiley corporate F&A series
|
520 |
|
|
|a "Detect and combat corporate fraud with new profiling techniquesProfiling the Fraudster: Removing the Mask to Prevent and Detect Fraud takes a step-by-step approach beyond the Fraud Triangle to identify characteristics in potential fraudsters, employees and new hires that will sound alarm bells before they get their hands on your organization's assets. The typical organization loses a staggering 5% of its annual revenue to fraud. Traditional fraud investigations focus on the breakdown of internal controls but what happens when the human beings forming a key component of that chain of control are inherently dishonest? This book shows you how to recognize the characteristics and behavioral patterns of potential fraudsters who are entrusted with safeguarding corporate assets. The book includes: An in-depth look at fraud investigation techniques and how these can be enhanced by using the characteristics of fraudulent behavior, A detailed look at profiling potential perpetrators of fraud, A detailed breakdown of how to compile a fraud profile, A discussion of a wide range of organizational fraud, including abuse of power, embezzlement, computer fraud, expense abuse, and more, Tables, illustrations, and diagrams to enhance the narrative If you're a corporate fraud investigator, auditor, forensic accountant, law enforcement professional, or anyone challenged with safeguarding your organizations assets--Profiling the Fraudster shows you how to remove the mask and prevent and detect fraud"--
|c Provided by publisher.
|
504 |
|
|
|a Includes bibliographical references and index.
|
500 |
|
|
|a Machine generated contents note: Preface Acknowledgments Part One: Occupational Fraud and Corruption Chapter 1: Introduction to Occupational Fraud and Corruption and Recent Trends Deception through Breaching Trust Global Trends in Occupational Fraud The Cost of Occupational Fraud and Corruption Types of Occupational Fraud Early Fraud The Fight against Fraud Profiling as a Solution Chapter 2: Types of Occupational Fraud and Corruption A Myriad of Fraud Schemes Chapter 3: What Is Fraud and More Specifically Occupational Fraud? The Association of Certified Fraud Examiners (ACFE) Definition The American Institute of Certified Public Accountants (AICPA) Definition Statement of Auditing Standard No. 99 (SAS 99) Definition The Institute of Internal Auditors (IIA) Definition Duration of Fraud Schemes Chapter 4: Corruption The Geography of Corruption The Fight against Corruption Corruption and the Public Purse Cultural and Legal Influences on Corruption Chapter 5: Normative Crime Analysis and Investigative Psychology Fraud is Not a Norm Investigative Psychology Chapter 6: The Fraud Triangle Becomes the Fraud Diamond: A Journey through the Theory The Fraud Triangle Fraud Risk The Theory Shaping Early Fraud Profiling Part Two: Profiling the Fraudster Chapter 7: Using Profiling in the Fight against Crime and Occupational Fraud The Mind of Adolf Hitler Development of the Psychology Modeling Modeling in Fraud Detection Chapter 8: Criminal and Fraud Offender Profiling The Criminal Mindset Investigative Psychology Fraud Offender Profiling Profiling Challenges Chapter 9: Behavioral Warning Signs or Red Flags How Red Flags Help Us Discover Fraud Management Red Flags Changes in Employee Behavior Representing Red Flags Fraudsters Living beyond Their Means Exhibit Key Red Flags Red Flags in the Accounting System Behavioral Characteristics as Red Flags to Fraud Chapter 10: Motivation and Opportunity as Key Indicators The Motivation The Opportunity Chapter 11: Profiling Individual Behavior and Characteristics of a Fraudster Perpetrator's Gender Perpetrator's Age Perpetrator's Tenure Perpetrator's Education Level Behavioral Red Flags Based on Perpetrator's Position Behavioral Red Flags Based on Scheme Type Behavioral Red Flags Based on Department Chapter 12: Profiling the Fraudster's Position and Department Perpetrator's Position Perpetrator's Department Chapter 13: Profiling the Fraud Methodology or Modus Operandi Collusion Position of Employment Creates the Opportunity Many Ways to Defraud an Organization Chapter 14: Profiling the Victim Organization and its Geography Fraud Victim Organizations by Geographical Location Corruption Cases by Region Types of Fraud Victim Organizations Size of Fraud Victim Organizations Methods of Fraud in Small Businesses Industry of Fraud Victim Organizations Corruption Cases by Industry Chapter 15: Profiling the Consequences Legal Proceedings and Loss Recovery Losses Recovered An Often Unconsidered Consequence Chapter 16: Using Case Studies for Profiling Fraudsters Why Re-Invent the Wheel? Some High Profile Fraud Cases Chapter 17: The Use of Offender Profiling in Forensic Investigations Collation of Information Fraud Crime Intelligence Intelligence Led Investigating The Value of Offender Profiling Improved Internal Controls Part Three: Building a Fraud Profiling Methodology for Your Organization Chapter 18: Profiling as Part of Your Sound Anti-fraud Program Anti-Fraud Controls at Victim Organizations Anti-Fraud Controls in Small Businesses Anti-Fraud Controls by Region Effectiveness of Controls Control Weaknesses That Contributed to Fraud Types of Offender Profiling Chapter 19: Information Sources and the Role of Data Mining Forensic Profiling and the Use of Data Mining Supervised and Unsupervised Learning Privacy and Ethical Concerns Surrounding Data Mining Contributing to the Profiling Mechanism Chapter 20: Fraud Profiling Your Organization Personal Particulars of the Offender Obtaining Modus Operandi Information Determine the Motive of the Offender Opportunity Red Flags Lifestyle Change Chapter 21: The Process of Developing a Fraud Profile Development of a Fraud Risk Assessment Development of the Fraud Profile Development of a Fraud Detection Net Chapter 22: The Role of the HR Recruitment Process in Profiling Perpetrator's Criminal History Perpetrator's Employment History Controlling Human Risk Effective Human Performance Human Resource Departments Closing the Door on Fraud The CV: Fact or Fiction? Bibliography About the Association of Certified Fraud Examiners (ACFE) and the Report to the Nations on Occupational Fraud and Abuse About the Author Index .
|
588 |
|
|
|a Description based on print version record and CIP data provided by publisher.
|
505 |
0 |
|
|a Occupational fraud and corruption -- Introduction to occupational fraud and corruption and recent trends -- Types of occupational fraud and corruption -- What is fraud and more specifically occupational fraud? -- Corruption -- Normative crime analysis and investigative psychology -- The fraud triangle becomes the fraud diamond: a journey through the theory -- Profiling the fraudster -- Using profiling in the fight against crime and occupational fraud -- Criminal and fraud offender profiling -- Behavioral warning signs or red flags -- Motivation and opportunity as key indicators -- Profiling individual behavior and characteristics of a fraudster -- Profiling the fraudster's position and department -- Profiling the victim organization and its geography -- Profiling the consequences -- Using case studies for profiling fraudsters -- The use of offender profiling in forensic investigations -- Building a fraud profiling methodology for your organization -- Profiling as part of your sound antifraud program -- Information sources and the role of data mining -- Fraud profiling your organization -- The process of developing a fraud profile -- The role of HR recruitment process in profiling.
|
650 |
|
0 |
|a Corporations
|x Corrupt practices.
|
650 |
|
0 |
|a White collar crimes.
|
650 |
|
0 |
|a Fraud.
|
650 |
|
0 |
|a Fraud
|x Prevention.
|
650 |
|
0 |
|a Fraud investigation.
|
650 |
|
7 |
|a BUSINESS & ECONOMICS / Accounting / General.
|2 bisacsh
|
650 |
|
7 |
|a Corporations
|x Corrupt practices.
|2 fast
|0 (OCoLC)fst00879825
|
650 |
|
7 |
|a Fraud.
|2 fast
|0 (OCoLC)fst00933786
|
650 |
|
7 |
|a Fraud investigation.
|2 fast
|0 (OCoLC)fst00933803
|
650 |
|
7 |
|a Fraud
|x Prevention.
|2 fast
|0 (OCoLC)fst00933790
|
650 |
|
7 |
|a White collar crimes.
|2 fast
|0 (OCoLC)fst01174622
|
655 |
|
4 |
|a Electronic books.
|
776 |
0 |
8 |
|i Print version:
|a Padgett, Simon, 1963-
|t Profiling the fraudster
|d Hoboken, New Jersey : Wiley, 2014
|z 9781118871041
|w (DLC) 2014034566
|
856 |
4 |
0 |
|u https://doi.org/10.1002/9781118929773
|z Full Text via HEAL-Link
|
994 |
|
|
|a 92
|b DG1
|