Gratis boekenweekgeschenk bij een bestelling boven de €17,50 (geldt alleen voor Nederlandstalige boeken)
,

Fighting Fraud

How to Establish and Manage an Anti-Fraud Program

Specificaties
Paperback, blz. | Engels
Elsevier Science | e druk, 2007
ISBN13: 9780123708687
Rubricering
Juridisch :
Elsevier Science e druk, 2007 9780123708687
€ 54,94
Levertijd ongeveer 9 werkdagen
Gratis verzonden

Samenvatting

This practical reference provides the basics for instituting a corporate anti-fraud program that helps prepare corporate security professionals and other corporate managers for fighting corporate fraud from inside the company. Fighting Fraud provides an exceptional foundation for security professionals or business executives involved in developing and implementing a corporate anti-fraud program as part of a corporate assets protection program.

The author’s intent is to provide the reader with a practitioner’s guide (a “how-to” book), augmented by some background information to put it all in perspective. The approach used should enable the readers to immediately put in place a useful anti-fraud program under the leadership of the corporate security officer (CSO), or other corporate professional.

Specificaties

ISBN13:9780123708687
Taal:Engels
Bindwijze:Paperback
Hoofdrubriek:Economie

Inhoudsopgave

<br>Preface</br><br>Acknowledgments</br><br>Introduction and Premise</br><br>Section I: An Introduction To The Wonderful World of Fraud</br><br> Chapter 1 The New-Old Global Business Environment</br><br> Introduction</br><br> Globalization of Business — Benefits to Nation-States</br><br> Expansions of the Global Marketplace and their Areas of Operations</br><br> Types of Corporations</br><br> Corporate Owners and Locations</br><br> Corporate Products</br><br> The High-Technology Factor</br><br> Nanotechnology1</br><br> High-Technology Related Frauds and Other Crimes</br><br> Advent of the Superhighways4</br><br> The Impact of Superhighways on Frauds and Other Crimes</br><br> A Short History of Crimes and Other Frauds Via the I-Way</br><br> Superhighway Frauds and Other Crimes to I-Way Robberies</br><br> I-Way Robbery — Its Prevalence </br><br> There Is No I-Way Patrol to Stop I-Way Robbers </br><br> Global Connectivity Via the I-Way = Global Exposure to</br><br> Attacks by Fraud-Threat Agents and Other Miscreants </br><br> Capabilities and Limitations of Law Enforcement </br><br> Challenges to Security Professionals and Others </br><br> Case Study 1</br><br> Case Study 2</br><br> Summary </br><br> Chapter 2 Corporate Assets, Frauds and Other Terms — What are They? </br><br> Introduction </br><br> Definition of General Fraud </br><br> Specific Fraud Definitions </br><br> Corporate Assets </br><br> Other Terms and Definitions </br><br> Case Study </br><br> Summary </br><br> Chapter 3 Fraud-Related Laws </br><br> Introduction </br><br> Some U.S. Federal Fraud-Related Laws </br><br> Relevant Consumer Protection Laws for Fraud in the United States </br><br> A Few Examples of U.S. Federal Enforcement of Fraud-Related Laws, Approach and Actions </br><br> Mail Fraud Statutes (condensed and paraphrased) </br><br> Money Laundering </br><br> Financial Institution Fraud (Bank Fraud) </br><br> Civil Litigation </br><br> U.S. Treasury Collection </br><br> Securities Violations </br><br> Role of Phone Companies </br><br> European Fraud-Related Laws </br><br> EU Fight Against Frauds </br><br> ASIA and Fighting Fraud </br><br> Case Study </br><br> "Blowing the Whistle" on Defrauders can be Dangerous </br><br> Summary </br><br> Chapter 4 Corporations Don't Commit Frauds, People Do</br><br> Introduction </br><br> Are Defrauders a Product of Their Environment, or is it in Their Genes?</br><br> Some Criminology Theories </br><br> Fraud-Threat Agents</br><br> Human Errors — Accidents </br><br> Man-Made or Malicious Fraud Threats </br><br> Potential Fraud-Threat Agents </br><br> Capabilities </br><br> Motivation </br><br> Access </br><br> Catalysts </br><br> Inhibitors </br><br> Amplifiers </br><br> Fraud-Related Factors for Attacking Systems </br><br> Relationship of Threat Elements </br><br> Case Study </br><br> Summary </br><br> Chapter 5 Fighting Fraud — Whose Job is it Anyway? </br><br> Introduction </br><br> Role of Executive Management </br><br> Role of Corporate Management </br><br> Role of the Corporate Employees </br><br> Role of the Ethics Director </br><br> Role of the Auditor </br><br> Role of the Fraud Examiner </br><br> Role of the Chief Security Officer (CSO) </br><br> Why the Corporate Security Professional? </br><br> Case Study </br><br> Summary </br><br> Chapter 6 Where There is a Will There is a Way — Fraud Schemes </br><br> Introduction </br><br> Types of Fraud Schemes </br><br> Financial </br><br> Credit Card Skimming </br><br> Mortgage Frauds </br><br> Computer and Telecommunications Frauds </br><br> ATM Frauds</br><br> Click Fraud</br><br> Clip-on Fraud</br><br> Securities Frauds</br><br> Employment Application Frauds</br><br> Identity Theft Scams</br><br> "Nigerian Scam"</br><br> Accounting Fraud Schemes</br><br> Bribery and Corruption</br><br> Conflicts of Interest</br><br> Purchasing — Four Basic Categories</br><br> Inventory17</br><br> Investments and Fixed Assets</br><br> Payroll and Personal Expenses</br><br> Procurement/Contracts</br><br> Telemarketing Fraud</br><br> Advance Fee Scheme</br><br> Common Health Insurance Frauds</br><br> Letter of Credit Fraud</br><br> Prime Bank Notes</br><br> The Ponzi Scheme</br><br> Pyramid Scheme</br><br> Case Study</br><br> Summary</br><br> Chapter 7 Fraud Cases and Commentary — Learning by Example</br><br> Introduction</br><br> Actual Fraud and Fraud-Related Cases</br><br> Phishers and Taxpayers</br><br> Fraud by Corporate Executives</br><br> Foreign Exchange Trading Fraud</br><br> Katrina Waste and Frauds</br><br> Organized Crime and Cybercrime</br><br> Securities Fraud in Cyberspace</br><br> Computer Hard Drives Lead to Frauds</br><br> Debt-Collecting Frauds</br><br> Government Contracting Fraud</br><br> Fraud-Threat Agents Can Be Anyone in Any Position</br><br> U.S. Securities and Exchange Commission (SEC) Fighting Fraud</br><br> Fraud in School Systems</br><br> Dead Soldiers and E-Mail Scams</br><br> Another Example of Insider Fraud</br><br> Executive Management and Accounting Fraud</br><br> Merchandise Receipt and Exchange Fraud</br><br> Click Frauds</br><br> Mortgage Fraud</br><br> Government Contractors and Fraud</br><br> Frauds and Microsoft Software</br><br> Y2K-Related Fraud</br><br> Data Storage Conducive to Fraud-Threat Agents</br><br> Another Example of Click Fraud</br><br> Pyramid Schemes Move on to the Internet</br><br> Prepaid Cellular Phone Fraud</br><br> Identifying International Corruption</br><br> Credit Card Information Theft and Frauds</br><br> Hackers, Crackers, Phishers, Oh My!</br><br> Urban Legends and Frauds</br><br> Medical Research Frauds</br><br> Corruption and the War in Iraq</br><br> Comments on Identity Thefts as a Vehicle to Fraud</br><br> Lobbyists and Corruption</br><br> Internet Scams are International</br><br> Faking a Medical Condition</br><br> Internet Fraud Sweep</br><br> ATM Fraud</br><br> Social Security Scam</br><br> Stamp Fraud</br><br> Banker and Identity Theft</br><br> Accounting Firm Fraud</br><br> Lawyers and Medical Rip-offs</br><br> Another Mention of the "Nigerian" Scams — Variations on a Theme</br><br> Case Study</br><br> Summary</br><br>Section II: Establishing and Managing an Anti-Fraud Program</br><br> Chapter 8 The International Widget Corporation</br><br> Introduction</br><br> IWC Background Information</br><br> Key Elements for the CSO to Consider</br><br> Getting to Know IWC</br><br> IWC's Business Plan</br><br> Strategic Business Plan</br><br> Tactical Business Plan</br><br> IWC's Annual Business Plan</br><br> IWC and the History of Its CSO</br><br> Key Elements of IWC's Annual Business Plan</br><br> Anti-Fraud Program Planning</br><br> IWC's Departments of Primary Importance to the CSO</br><br> IWC Vision, Mission, and Quality Statements</br><br> Plans</br><br> Other IWC Plans and CSO Support</br><br> Case Study</br><br> Summary</br><br> Chapter 9 Establishing an Anti-Fraud Program</br><br> Introduction</br><br> IWC's Anti-Fraud Program</br><br> Anti-Fraud Program Project Planning</br><br> IWC Anti-Fraud Program Project Planning and Management</br><br> Anti-Fraud Program Project Team</br><br> Anti-Fraud Drivers — The First Major Task in Anti-Fraud Program Development</br><br> IWC Anti-Fraud Program Requirements — Policies96</br><br> Risk Assessment — The Second Major Task in Developing an Anti-Fraud Program</br><br> Basics of IWC's Risk Assessment Process97</br><br> Threats</br><br> Natural Threats</br><br> Man-Made Threats</br><br> Vulnerabilities</br><br> Risks</br><br> Assets Protection Risk Assessments</br><br> Assets Protection Risk Analyses</br><br> Developing Anti-Fraud Defenses</br><br> Three Key Ingredients in an Anti-Fraud Program's Defenses</br><br> IWC's Anti-Fraud Policies</br><br> Anti-Fraud Requirements and Policy Directive</br><br> Anti-Fraud Procedures</br><br> The CSO and Security Department's Anti-Fraud Accountabilities</br><br> Off-Site Corporate Facilities</br><br> Recruiting Anti-Fraud Professionals</br><br> Case Study</br><br> Summary</br><br> Chapter 10 Managing an Anti-Fraud Program</br><br> Introduction</br><br> CSO Leadership</br><br> Management versus Leadership</br><br> Meeting Customers' Expectations</br><br> IWC Internal Customers</br><br> IWC External Customers</br><br> IWC Executive Management Expectations of a CSO</br><br> Managing Risk</br><br> Security's Vision, Mission, and Quality Statements</br><br> Managing the IWC Anti-Fraud Program</br><br> Planning</br><br> Some Aspects to Incorporate into an Anti-Fraud Program Plan</br><br> Budgeting</br><br> Controlling</br><br> Quality, Process Improvement, and Assessment of Organization Performance</br><br> Process Management</br><br> Performance Management</br><br> Using Technology to Deliver Anti-Fraud Program Support and Services</br><br> Managing Quality and Management Oversight</br><br> What is Risk Management As It Relates to IWC's Anti-Fraud Program?</br><br> Managing and Reducing Risks to Corporate Assets</br><br> Program for Managing Anti-Fraud Defensive Risks</br><br> Responding to Fraud Incidents</br><br> Managing Fraud Threats</br><br> Case Study</br><br> Summary</br><br> Chapter 11 Winning through Teaming</br><br> Introduction</br><br> Anti-Fraud Program Team Building</br><br> Executive Management as Team Members</br><br> Teaming with IWC Executive Management Through a Business Approach</br><br> Teaming with Corporate Peers</br><br> Teaming and Dealing with Office Politics</br><br> Teaming with Your Security Managers</br><br> Teaming with Your Security Staff</br><br> Teaming and Dealing with Satellite Offices in IWC Headquarters in the United States</br><br> Teaming and Dealing with Satellite Offices in Foreign Lands</br><br> Case Study</br><br> Summary</br><br> Chapter 12 Anti-Fraud Functions</br><br> Introduction</br><br> Anti-Fraud Project Team Functional Tasks</br><br> Anti-Fraud Functions</br><br> Anti-Fraud Program's Non-Security Team Functions and Members</br><br> Case Study</br><br> Summary</br><br> Chapter 13 Are We Winning the Battle? How Do We Know?</br><br> Measure it!</br><br> Introduction</br><br> Measuring an Anti-Fraud Program's Costs, Benefits,</br><br> Successes, and Failures</br><br> Common LOE Measurement Techniques for Each Function</br><br> Examples of Metrics by Function</br><br> Investigations and NCIS Metric Chares</br><br> Examples of Anti-Fraud Investigations Metrics</br><br> Process Measurements</br><br> Case Study</br><br> Summary</br><br>Section III: The Fraudulent Future</br><br> Chapter 14 What Will the Fraudulent Future Hold for Corporations?</br><br> Introduction</br><br> Globalization of Business to Continue</br><br> Employees of the Future</br><br> The Future Global Corporation</br><br> Future of Fraud Attacks on Corporations</br><br> Future Anti-Fraud Protection Needs of Corporations</br><br> Case Study</br><br> Summary</br><br> Chapter 15 The Impact of High Technology on Fraud</br><br> Introduction</br><br> High-Technology Frauds</br><br> High-Technology Anti-Fraud Defenses</br><br> Case Study</br><br> Summary</br><br> Chapter 16 What the Security and Other Anti-Fraud Professionals Must Do Now to Personally Prepare to Combat Tomorrow's Frauds</br><br> Introduction</br><br> Becoming and Staying Proactive and Aggressive in Fighting Fraud</br><br> Getting a Fraud Education</br><br> Gaining Fraud-Related Certifications</br><br> Associations</br><br> Gaining Anti-Fraud Experience</br><br> To Conduct or not to Conduct Fraud Lectures and Write Fraud Articles</br><br> Case Study</br><br> Summary</br><br> Chapter 17 Summary and Final Thoughts</br><br> Introduction</br><br> Summary</br><br> Final Thoughts</br><br> hat Others Think About the Anti-Fraud Leadership</br><br> Position in a Corporation</br><br> Toby J. F. Bishop, CFE, CPA, FCA, President and Chief</br><br> Executive Office, Association of Certified Fraud Examiners</br><br> World Headquarters</br><br> In Conclusion-My Thoughts</br><br> Some References</br><br> End of Line</br><br>About the Author</br><br>Index</br><br></br>

Net verschenen

€ 54,94
Levertijd ongeveer 9 werkdagen
Gratis verzonden

Rubrieken

    Personen

      Trefwoorden

        Fighting Fraud