Profiling The Fraudster - Simon Padgett - E-Book

Profiling The Fraudster E-Book

Simon Padgett

0,0
44,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

Detect and combat corporate fraud with new profilingtechniques Profiling the Fraudster: Removing the Mask to Prevent andDetect Fraud takes a step-by-step approach beyond the FraudTriangle to identify characteristics in potential fraudsters,employees and new hires that will sound alarm bells before they gettheir hands on your organization's assets. The typical organizationloses a staggering 5% of its annual revenue to fraud. Traditionalfraud investigations focus on the breakdown of internal controlsbut what happens when the human beings forming a key component ofthat chain of control are inherently dishonest? This book shows youhow to recognize the characteristics and behavioral patterns ofpotential fraudsters who are entrusted with safeguarding corporateassets. The book includes: * An in-depth look at fraud investigation techniques and howthese can be enhanced by using the characteristics of fraudulentbehavior, * A detailed look at profiling potential perpetrators offraud, * A detailed breakdown of how to compile a fraud profile, * A discussion of a wide range of organizational fraud, includingabuse of power, embezzlement, computer fraud, expense abuse, andmore, * Tables, illustrations, and diagrams to enhance thenarrative If you're a corporate fraud investigator, auditor, forensicaccountant, law enforcement professional, or anyone challenged withsafeguarding your organizations assets--Profiling theFraudster shows you how to remove the mask and prevent anddetect fraud.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 363

Veröffentlichungsjahr: 2014

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents

Series Page

Title Page

Copyright

Dedication

Preface

Acknowledgments

Part I: Occupational Fraud and Corruption

Chapter 1: Introduction to Occupational Fraud and Corruption and Recent Trends

Deception through Breaching Trust

Global Trends in Occupational Fraud

The Cost of Occupational Fraud and Corruption

Types of Occupational Fraud

Early Fraud

The Fight against Fraud

Profiling as a Solution

Chapter 2: Types of Occupational Fraud and Corruption

A Myriad of Fraud Schemes

Cybercrime

Chapter 3: What Is Fraud and More Specifically Occupational Fraud?

The Association of Certified Fraud Examiners' Definition

The American Institute of Certified Public Accountants' Definition

Statement of Auditing Standard No. 99 Definition

The Institute of Internal Auditors Definition

Duration of Fraud Schemes

Chapter 4: Corruption

The Geography of Corruption

The Fight against Corruption

Corruption and the Public Purse

Cultural and Legal Influences on Corruption

Chapter 5: Normative Crime Analysis and Investigative Psychology

Fraud Is Not a Norm

Investigative Psychology

Chapter 6: The Fraud Triangle Becomes the Fraud Diamond: A Journey through the Theory

The Fraud Triangle

Fraud Risk

The Theory Shaping Early Fraud Profiling

Part II: Profiling the Fraudster

Chapter 7: Using Profiling in the Fight against Crime and Occupational Fraud

The Mind of Adolf Hitler

Development of the Psychology

Modeling

Modeling in Fraud Detection

Chapter 8: Criminal and Fraud Offender Profiling

The Criminal Mind-Set

Investigative Psychology

Fraud Offender Profiling

Profiling Challenges

Chapter 9: Behavioral Warning Signs or Red Flags

How Red Flags Help Us Discover Fraud

Management Red Flags

Changes in Employee Behavior Representing Red Flags

Fraudsters Living beyond Their Means Exhibit Key Red Flags

Red Flags in the Accounting System

Behavioral Characteristics as Red Flags to Fraud

Chapter 10: Motivation and Opportunity as Key Indicators

The Motivation

The Opportunity

Chapter 11: Profiling Individual Behavior and Characteristics of a Fraudster

Perpetrator's Gender

Perpetrator's Age

Perpetrator's Tenure

Perpetrator's Education Level

Behavioral Red Flags Based on Perpetrator's Position

Behavioral Red Flags Based on Scheme Type

Behavioral Red Flags Based on Department

Chapter 12: Profiling the Fraudster's Position and Department

Perpetrator's Position

Perpetrator's Department

Chapter 13: Profiling the Fraud Methodology or Modus Operandi

Collusion

Position of Employment Creates the Opportunity

Many Ways to Defraud an Organization

Chapter 14: Profiling the Victim Organization and Its Geography

Fraud Victim Organizations by Geographic Location

Corruption Cases by Region

Types of Fraud Victim Organizations

Size of Fraud Victim Organizations

Methods of Fraud in Small Businesses

Industry of Fraud Victim Organizations

Corruption Cases by Industry

Chapter 15: Profiling the Consequences

Legal Proceedings and Loss Recovery

Losses Recovered

An Often Unconsidered Consequence

Chapter 16: Using Case Studies for Profiling Fraudsters

Why Reinvent the Wheel?

Some High-Profile Fraud Cases

Chapter 17: The Use of Offender Profiling in Forensic Investigations

Collation of Information

Fraud Crime Intelligence

Intelligence-Led Investigating

The Value of Offender Profiling

Improved Internal Controls

Part III: Building a Fraud Profiling Methodology for Your Organization

Chapter 18: Profiling as Part of Your Sound Antifraud Program

Antifraud Controls at Victim Organizations

Antifraud Controls in Small Businesses

Antifraud Controls by Region

Effectiveness of Controls

Control Weaknesses That Contributed to Fraud

Types of Offender Profiling

Chapter 19: Information Sources and the Role of Data Mining

Forensic Profiling and the Use of Data Mining

Supervised and Unsupervised Learning

Privacy and Ethical Concerns Surrounding Data Mining

Contributing to the Profiling Mechanism

Chapter 20: Fraud Profiling Your Organization

Personal Particulars of the Offender

Obtaining Modus Operandi Information

Determine the Motive of the Offender

Opportunity

Red Flags

Lifestyle Change

Chapter 21: The Process of Developing a Fraud Profile

Development of a Fraud Risk Assessment

Development of the Fraud Profile

Development of a Fraud Detection Net

Chapter 22: The Role of the HR Recruitment Process in Profiling

Perpetrator's Criminal History

Perpetrator's Employment History

Controlling Human Risk

Effective Human Performance

HR Departments Closing the Door on Fraud

The Curriculum Vitae: Fact or Fiction?

Bibliography

About the Author

About the Association of Certified Fraud Examiners and the Report to the Nations on Occupational Fraud and Abuse

About Certified Fraud Examiners

About the ACFE's 2012

Report to the Nations on Occupational Fraud and Abuse

Index

End User License Agreement

Pages

xiii

xiv

xv

xvi

xvii

xviii

xix

xx

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

1

2

51

52

173

174

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

Guide

Cover

Table of Contents

Preface

Begin Reading

List of Illustrations

Figure 1.1

Figure 1.2

Figure 1.3

Figure 1.4

Figure 3.1

Figure 4.1

Figure 5.1

Figure 6.1

Figure 6.2

Figure 6.3

Figure 6.4

Figure 6.5

Figure 6.6

Figure 8.1

Figure 9.1

Figure 10.1

Figure 11.1

Figure 11.2

Figure 11.3

Figure 11.4

Figure 11.5

Figure 11.6

Figure 11.7

Figure 11.8

Figure 11.9

Figure 11.10

Figure 11.11

Figure 11.12

Figure 12.1

Figure 12.2

Figure 12.3

Figure 12.4

Figure 12.5

Figure 12.6

Figure 12.7

Figure 13.1

Figure 13.2

Figure 13.3

Figure 14.1

Figure 14.2

Figure 14.3

Figure 14.4

Figure 14.5

Figure 14.6

Figure 14.7

Figure 14.8

Figure 14.9

Figure 14.10

Figure 14.11

Figure 15.1

Figure 15.2

Figure 15.3

Figure 15.4

Figure 15.5

Figure 15.6

Figure 18.1

Figure 18.2

Figure 18.3

Figure 18.4

Figure 18.5

Figure 18.6

Figure 21.1

Figure 21.2

Figure 21.3

Figure 21.4

Figure 22.1

List of Tables

TheWiley Corporate F&A series provides information, tools, and insights to corporate professionals responsible for issues affecting the profitability of their company, from accounting and finance to internal controls and performance management.

Founded in 1807, JohnWiley & Sons is the oldest independent publishing company in theUnited States.With offices in North America, Europe, Asia, and Australia,Wiley is globally committed to developing and marketing print and electronic products and services for our customers’ professional and personal knowledge and understanding.

Profiling the Fraudster

Removing the Mask toPrevent and Detect Fraud

SIMON PADGETT

Cover image: © iStock.com/Terry Bridges

Cover design: Wiley

Copyright © 2015 by John Wiley & Sons, Inc. All rights reserved.

Published by John Wiley & Sons, Inc., Hoboken, New Jersey.

Published simultaneously in Canada.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.

Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.

Library of Congress Cataloging-in-Publication Data

Padgett, Simon

Profiling the fraudster : removing the mask to prevent and detect fraud / Simon Padgett.

pages cm. -- (Wiley corporate F&A series)

Includes bibliographical references and index.

ISBN 978-1-118-87104-1 (hardback)

1. Corporations--Corrupt practices. 2. White collar crimes. 3. Fraud. 4. Fraud--Prevention. 5. Fraud investigation. I. Title.

HV6768.P33 2014

658.4'73--dc23

2014034566

This book is dedicated to all the honest people in the world who face the uphill daily survival challenge while watching others steal their way to a luxury lifestyle. People with integrity have shaped my life and this book.

Preface

THE TYPICAL ORGANIZATION LOSES 5 PERCENT of its annual revenue to fraud. Applied to the estimated 2011 gross world product, this figure translates to a potential total fraud loss of more than $3.5 trillion worldwide, according to the Association of Certified Fraud Examiners (ACFE) . So, put in context, fraud material.

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!