Corporate Fraud and Internal Control - Richard E. Cascarino - E-Book

Corporate Fraud and Internal Control E-Book

Richard E. Cascarino

0,0
48,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

Essential guidance for companies to examine and improve their fraud programs

Corporate governance legislation has become increasingly concerned with the ongoing resilience of organizations and, particularly, with their ability to resist corporate fraud from the lowest levels to the upper echelons of executive management. It has become unacceptable for those responsible for corporate governance to claim, "I didn't know." Corporate Fraud and Internal Control focuses on the appropriateness of the design of the system of internal controls in fraud risk mitigation, as well as the mechanisms to ensure effective implementation and monitoring on an ongoing basis.

  • Applicable for a wide variety of environments, including governmental, financial, manufacturing and e-business sectors
  • Includes case studies from the United States, Europe, and Africa
  • Follows the standards laid down by the Association of Certified Fraud Examiners, the internationally recognized body governing this activity
  • Accompanying interrogation software demo (software demo is not included as part of this book's e-book file, but is available for download after purchase)

Written by a fraud prevention leader, Corporate Fraud and Internal Control addresses the concerns of both management and audit in ensuring a demonstrable level of activity to ensure sustainability of the organization and minimization of the impacts of fraud, upon early detection.

Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:

EPUB

Veröffentlichungsjahr: 2012

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents

Cover

Title

Copyright

Preface

CHAPTER ONE: Nature of Fraud

FRAUD AND IRREGULARITIES: DEFINITIONS AND CONCEPTS

COST OF FRAUD

NOTES

CHAPTER TWO: Elements of the Crimes of Theft and Fraud

DOCUMENT FRAUD

CORROBORATING DOCUMENTS

PROCUREMENT FRAUD

BRIBERY AND CORRUPTION

INDUSTRIAL ESPIONAGE

CHECK FRAUD AND MONEY LAUNDERING

NOTES

CHAPTER THREE: Frauds Against the Individual

ONLINE AUCTION FRAUD

CONSUMER FRAUDS

TELEPHONE FRAUDS

CHARITY FRAUDS

MISREPRESENTATION OF MATERIAL FACTS

CONCEALMENT OF MATERIAL FACTS

ADVANCE FEES (4-1-9) FRAUDS

“MIDDLEMAN” FRAUDS

BAIT AND SWITCH

LARCENY

EXTORTION

COUNTERFEIT GOODS AND INTELLECTUAL PROPERTY

AFFINITY FRAUDS

PYRAMID SCHEMES

PONZI SCHEMES

CAREER OPPORTUNITIES

CASH RECOVERY FRAUDS

CHAPTER FOUR: Frauds Against the Organization

BANKRUPTCY FRAUD

CHECK FRAUD

OBTAINING FRAUDULENT LOANS

UNSOLICITED ORDERS

EMBEZZLEMENT

BRIBERY

CORRUPTION

CONFLICTS OF INTEREST

BREACH OF FIDUCIARY DUTY

THEFT OF TRADE SECRETS

FALSE CLAIMS

FALSE CONVEYANCING

TUNNELING

CONSPIRACY

LAPPING

KITING

FRAUDULENT AFFILIATIONS

COUNTERFEIT MONEY

BENEFIT FRAUDS

INSURANCE FRAUD

PAYMENT CARD FRAUDS

PENSION FRAUDS

TAX FRAUD

INSIDER TRADING AND MARKET ABUSE

CLICK FRAUD

COUNTERFEIT GOODS AND INTELLECTUAL PROPERTY

PROCUREMENT FRAUD

NOTES

CHAPTER FIVE: Fighting Corruption

BRIBERY IN CONTRACTS

RED FLAGS AT ENRON AND WORLDCOM

NEPOTISM AND FAVORITISM

ABUSE OF AUTHORITY

DEVELOPING AN OVERALL ANTICORRUPTION CULTURE

NOTES

CHAPTER SIX: Role of Ethics in Fighting Fraud

HOW MORAL DECISIONS ARE MADE

NATURE AND ROLE OF ETHICS

MANAGING ETHICAL RISK

REPORTING OF FRAUD

NOTES

CHAPTER SEVEN: Controlling Fraud

CORPORATE GOVERNANCE AND FRAUD PREVENTION

AUDIT COMMITTEE’S ROLE IN FIGHTING FRAUD

INTERNAL CONTROL AND THE PREVENTION OF FRAUD

FIGHTING SHRINKAGE

INTERNAL AUDIT ROLE

NOTES

CHAPTER EIGHT: Fraud Risk Management

ESTABLISHING THE CORPORATE FRAUD RISK PROFILE

CASCARINO CUBE

ROLES OF THE INTERNAL, EXTERNAL, AND FORENSIC AUDITOR

WHISTLEBLOWING IN DETECTING FRAUD

NOTE

CHAPTER NINE: Investigating Fraud

RED FLAGS AND INDICATORS OF FRAUD

CORPORATE FRAUD INDICATORS

CONDUCTING AN INVESTIGATION

TOOLS AND TECHNIQUES

USE OF THE POLYGRAPH

DOCUMENTING THE INVESTIGATIVE PROCESS

EVIDENCE ANALYSIS

INVESTIGATIVE ERRORS

AFTER THE EVENT

ESTABLISHING AN INVESTIGATIONS FUNCTION

TRACING AND RECOVERING ASSETS

NOTES

CHAPTER TEN: Computer Fraud and Countermeasures

MAINFRAME ARCHITECTURES

MAINFRAME COMMUNICATIONS

CONTROL OF SERVERS

WAN COMMUNICATIONS

WORKSTATION SECURITY

MOBILE COMPUTING AND THE INTERNET

CLOUD COMPUTING

COMPUTER AND INFORMATION FRAUD

MONITORING TOOLS

PREVENTING E-COMMERCE FRAUD

E-COMMERCE CONTROL OPPORTUNITIES

E-PAYMENTS

INTERNAL CONTROL BEST PRACTICES

NEWER FRAUD SCHEMES

PROTECTING DIGITAL ASSETS

FOILING THE HACKERS

INVESTIGATING COMPUTER FRAUD

COMPUTER LAW

NOTE

CHAPTER ELEVEN: Legal Issues Surrounding Fraud

IMPACT OF A CONSTITUTION

FRAUD AND THE LAWS OF EVIDENCE

ASSET RECOVERY

LABOR LEGISLATION AND FRAUD

NOTE

CHAPTER TWELVE: Industry-Related Fraud Opportunities

BANKING FRAUD

MONEY LAUNDERING

HEALTH CARE FRAUD

INSURANCE FRAUD

TAX FRAUD

SOCIAL SECURITY FRAUD

FRAUD AFTER DEATH

CONSTRUCTION FRAUD

NOTES

APPENDIX A: Audit Committee Charter

APPENDIX B: Corporate Fraud Policy

POLICY

BACKGROUND AND IMPLEMENTATION

FRAUD AWARENESS TRAINING

APPENDIX C: Whistleblowing Policy

REPORTING AND INVESTIGATION

APPENDIX D: Fraud Prevention Checklist

APPENDIX E: Fraud Risk Questionnaire Sample

APPENDIX F: Fraud Risk Analysis

APPENDIX G: Fraud CAATs

TECHNIQUES

TOOLS

CONTINUOUS MONITORING

Glossary

About the Author

About the Web Site

Index

End User License Agreement

List of Illustrations

CHAPTER ONE: Nature of Fraud

EXHIBIT 1.1 Fraud Triangle

CHAPTER SIX: Role of Ethics in Fighting Fraud

EXHIBIT 6.1 Managing Ethical Risk

CHAPTER EIGHT: Fraud Risk Management

EXHIBIT 8.1 Fraud Risk Example

CHAPTER TEN: Computer Fraud and Countermeasures

EXHIBIT 10.1 IT Architecture

EXHIBIT 10.2 User Access Paths

Guide

Cover

Table of Contents

Begin Reading

Pages

cover

content

i

ii

ix

x

xi

xii

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

335

336

337

338

339

340

341

342

343

344

345

347

348

349

351

352

353

354

355

357

358

359

360

361

362

363

364

365

366

367

368

369

371

372

373

374

375

377

379

381

382

383

384

385

386

387

388

Corporate Fraud and Internal Control

A Framework for Prevention

RICHARD E. CASCARINO

Copyright © 2013 by Richard E. Cascarino. All rights reserved.

Published by John Wiley & Sons, Inc., Hoboken, New Jersey.

Published simultaneously in Canada.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. For more information about Wiley products, visit our web site at www.wiley.com.

Library of Congress Cataloging-in-Publication Data

Cascarino, Richard. Corporate fraud and internal control : a framework for prevention/Richard E. Cascarino. p. cm.—(The Wiley corporate F&A series) Includes bibliographical references and index. ISBN 978-1-118-30156-2 (cloth); ISBN 978-1-118-41980-9 (ebk); ISBN 978-1-118-42172-7 (ebk);ISBN (eMobi) 978-1-118-43402-4 (ebk) 1. Fraud–Prevention. 2. Auditing, Internal. I. Title. HV6691.C38 2013 658.4’73–dc23

2012022692

Preface

DATING BACK TO 3500 BC, records of various civilizations indicate by patterns of checks and ticks that record verification took place. In ancient Egyptian, Greek, Chinese, and Roman civilizations, rulers sought to confirm official records by comparing two sets of such records. The lowest-ranking magistrate in ancient Rome was a quaestor, or investigator. This elected official traditionally worked within the treasury to supervise the financial affairs of the empire.

Accuracy of records was tested, typically by two officials working together. One official read from the one record sheet and the other checked against the other record sheet. The term “auditor” is derived from the Latin auditus, meaning a hearing.

With the fall of the Roman Empire, auditing and internal control disappeared in Europe. It was not until the Middle Ages that the growth of centralized control once again demanded proof of the adequacy and correctness of record keeping and the prevention of the defrauding of the king.

In the Orient, however, audit can trace its ancestry back to the Western Zhou Dynasty some 3000 years ago, in which it continued in various forms until the Song Dynasty in 992AD when a “royal audit court” was established. Audit in China took the form of Inspectorates until the Revolution of 1911 when an Audit Court was established, a Chamber of Audit set up, and Audit Law was issued. Auditing continued until the founding of the People’s Republic of China in 1949 when audit was conducted by internal supervision within the Departments of Public Finance.

In 1982, the Constitution of the People’s Republic of China was promulgated resulting in the 1983 formation of the National Audit Office of the People’s Republic of China.

Today, capital markets, which have been rocked by recent corporate scandals and frauds on an international scale, are demanding that financial organizations, publicly listed companies, multinational companies, and the public sector implement sound corporate governance. Large-scale fraud has severely eroded investor confidence; in many cases, investors are simply waiting for the next large fraud to be announced.

In the past, many organizations, companies, and government bodies have operated in a purely reactive mode to the problem of fraud. That is, only after a fraud had taken place were decisions made regarding how to combat it. With the increasing impact of corporate governance legislation and the changes in society of recent years, the need to fight fraud in a proactive manner has become paramount.

Companies now must accept their corporate responsibility to protect assets and employees from the temptations and impacts of fraud.

At the individual level, fraud is impacting every citizen, either directly through being defrauded or indirectly through the impact of higher taxation or shopping bills. Individual fraud is also creating an atmosphere in which individuals feel cheated and defrauded, and that they have the right to retaliate by cheating and defrauding others.

Police services are under increasing pressure to combat all types of crime, particularly violent crime. As a result, often white-collar crime, corruption, and fraud are treated as the “poor relation” at the low end of the resources chain and receive priority only in egregious cases when they become front-page news in the newspapers.

As a result, organizations have no choice but to develop plans and strategies to deter, detect, and, where required, prove fraud utilizing their own in-house control mechanisms and systems of internal control.

This book addresses the roles of the board and its management and audit committees in implementing a system of internal controls that adequately defends against fraudulent and corrupt practices both within the organization and against it. The book itself consists of 12 chapters.

Chapter 1, “Nature of Fraud,” introduces fraud and irregularities, covering the elements of the crimes of theft and fraud as well as the nature and cost of fraud. It includes the basics of fraud and financial irregularities and defines fraud and prejudice resulting from fraud. It also presents general safeguards to make fraud in commerce more difficult, and ways to seek redress from fraud perpetrators.

Chapter 2, “Elements of the Crimes of Theft and Fraud,” explores how fraud and conventional theft differ legally. It also helps identify the principal control elements required to reduce the likelihood of a fraud occurring and its impact, should it occur, and to increase the probability of early detection in the event of an occurrence.

Chapter 3, “Frauds Against the Individual,” identifies specific types of fraud against the individual that, left unchecked, may increase the probability of a loyal employee turning against the employer in desperation. It also identifies corporate responsibility in educating employees against potential fraud attacks against them personally.

Chapter 4, “Frauds Against the Organization,” helps readers recognize specific types of fraud against the organization, their red flags, and the failure or lack of internal controls that expose organizations to such attacks. It also differentiates between internal frauds carried out from inside the organization against the interests of the organization, and external frauds carried out against the organization from an external source with or without the cooperation of current employees.

Chapter 5, “Fighting Corruption,” identifies areas of vulnerability within the organization that expose it to managerial-level frauds and internal corruption. It also identifies areas and indicators where organizations may be—unwittingly or deliberately—the perpetrators of such corruption against third parties.

Chapter 6, “Role of Ethics in Fighting Fraud,” explores the nature and role of ethics within the organization to combat fraud and helps readers evaluate the current state of ethical structures within an organization. The chapter helps readers design a code of conduct that will reduce the likelihood of fraud occurrences and increase the probability of early detection.

Chapter 7, “Controlling Fraud,” defines the roles of corporate governance and the structures organizations utilize to prevent fraud. The chapter helps readers evaluate the system of internal control the organization relies on to minimize fraud and makes practical recommendations for improvement where required. The chapter emphasizes the role internal audit must play in controlling fraud.

Chapter 8, “Fraud Risk Management,” identifies appropriate techniques to establish the corporate fraud risk profile and clarifies the roles of internal, external, and forensic audit in the fight against fraud. It helps readers design and implement effective whistleblowing both within and external to the organization as a fraud preventive and detective measure.

Chapter 9, “Investigating Fraud,” assists the reader in identifying the red flags and indicators of fraud that should trigger a fraud investigation. It also identifies the forensic techniques available and the resources and training required to implement an appropriate fraud investigation. In addition, it covers the requirements for establishing an internal investigation function and determination of the appropriateness and the appropriate measures for tracing and recovering lost assets.

Chapter 10, “Computer Fraud and Countermeasures,” helps readers identify areas of vulnerability to fraudulent use of information systems and processing of fraudulent transactions. It also helps facilitate the design and implementation of appropriate measures to defend the digital assets of the organization.

Chapter 11, “Legal Issues Surrounding Fraud,” assists readers to evaluate the current legislative framework for the country or countries in which the organizations are operating and evaluate the effectiveness of deterrent mechanisms for fraud, including international electronic fraud.

Chapter 12, “Industry-Related Fraud Opportunities,” identifies fraud opportunities specific to certain industries as well as government institutions. Its aim is to assist in the design of effective control mechanisms against specific risks to achieve optimal control effectiveness at minimized cost.

In addition, appendices are provided to give examples of antifraud opportunities, policies, and checklists as well as the basis for legal jurisdictions for fraud prevention and prosecution. An educational version of IDEA Data Analysis software is also provided via a web site download.

CHAPTER ONENature of Fraud

Fraud is like cancer. Most of us know someone who has it. We know people who will eventually have it. It has become common but we can take steps to protect ourselves through healthy choices and regular checkups using the latest tools and technology. But if people ignore the problem and live dangerously, then there’s a much greater chance of becoming a victim.

—Toby Bishop, CEO, Association of Certified Fraud Examiners

After studying this chapter, you should be able to:

Briefly outline the definitions and concepts underlying fraud and irregularities

Describe the basic types of fraud

Understand the profiles and motivators of fraud

Define the responsibilities for fraud detection and prevention

More and more incidents of private and public fraud are being reported daily in the media, and increasingly prosecutions for this offense are being conducted in the various courts. This chapter examines the phenomenon in order to obtain a full appreciation of what exactly fraud is.

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!