Profiling the fraudster: removing the mask to prevent and detect fraud

"Detect and combat corporate fraud with new profiling techniquesProfiling the Fraudster: Removing the Mask to Prevent and Detect Fraud takes a step-by-step approach beyond the Fraud Triangle to identify characteristics in potential fraudsters, employees and new hires that will sound alarm bells...

Full description

Saved in:  
Bibliographic Details
Main Author: Padgett, Simon 1963- (Author)
Format: Print Book
Language:English
Published: Hoboken, NJ Wiley c 2015
In:Year: 2015
Online Access: Cover
Cover (Verlag)
Table of Contents
Blurb
Availability in Tübingen:Present in Tübingen.
UB: KB 20 A 7264
Check availability: HBZ Gateway
Subito Delivery Service: Order now.
Keywords:

MARC

LEADER 00000cam a2200000 4500
001 805546243
003 DE-627
005 20230610174852.0
007 tu
008 141125s2015 xxu||||| 00| ||eng c
010 |a  2014034566 
016 7 |a GBB4D6844  |2 UK 
020 |a 9781118871041  |c hbk. : £45.00  |9 978-1-118-87104-1 
024 3 |a 9781118871041 
035 |a (DE-627)805546243 
035 |a (DE-576)425828379 
035 |a (DE-599)GBV805546243 
035 |a (OCoLC)931728195 
035 |a (OCoLC)904447577 
035 |a (BL)016964328 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XD-US 
050 0 |a HV6768 
082 0 |a 658.4/73  |q LOC  |2 23 
082 0 |a 658.473 
082 0 4 |a BUS001000  |q bisacsh 
084 |a 2,1  |2 ssgn 
100 1 |a Padgett, Simon  |d 1963-  |0 (DE-588)1068119233  |0 (DE-627)819654361  |0 (DE-576)425828336  |4 aut 
109 |a Padgett, Simon 1963- 
245 1 0 |a Profiling the fraudster  |b removing the mask to prevent and detect fraud  |c Simon Padgett 
264 1 |a Hoboken, NJ  |b Wiley  |c c 2015 
300 |a XIX, 247 S.  |b graph. Darst.  |c 25 cm 
336 |a Text  |b txt  |2 rdacontent 
337 |a ohne Hilfsmittel zu benutzen  |b n  |2 rdamedia 
338 |a Band  |b nc  |2 rdacarrier 
490 0 |a Wiley corporate F & A series 
500 |a Includes bibliographical references and index 
505 8 0 |a Machine generated contents note: Preface Acknowledgments Part One: Occupational Fraud and Corruption Chapter 1: Introduction to Occupational Fraud and Corruption and Recent Trends Deception through Breaching Trust Global Trends in Occupational Fraud The Cost of Occupational Fraud and Corruption Types of Occupational Fraud Early Fraud The Fight against Fraud Profiling as a Solution Chapter 2: Types of Occupational Fraud and Corruption A Myriad of Fraud Schemes Chapter 3: What Is Fraud and More Specifically Occupational Fraud? The Association of Certified Fraud Examiners (ACFE) Definition The American Institute of Certified Public Accountants (AICPA) Definition Statement of Auditing Standard No. 99 (SAS 99) Definition The Institute of Internal Auditors (IIA) Definition Duration of Fraud Schemes Chapter 4: Corruption The Geography of Corruption The Fight against Corruption Corruption and the Public Purse Cultural and Legal Influences on Corruption Chapter 5: Normative Crime Analysis and Investigative Psychology Fraud is Not a Norm Investigative Psychology Chapter 6: The Fraud Triangle Becomes the Fraud Diamond: A Journey through the Theory The Fraud Triangle Fraud Risk The Theory Shaping Early Fraud Profiling Part Two: Profiling the Fraudster Chapter 7: Using Profiling in the Fight against Crime and Occupational Fraud The Mind of Adolf Hitler Development of the Psychology Modeling Modeling in Fraud Detection Chapter 8: Criminal and Fraud Offender Profiling The Criminal Mindset Investigative Psychology Fraud Offender Profiling Profiling Challenges Chapter 9: Behavioral Warning Signs or Red Flags How Red Flags Help Us Discover Fraud Management Red Flags Changes in Employee Behavior Representing Red Flags Fraudsters Living beyond Their Means Exhibit Key Red Flags Red Flags in the Accounting System Behavioral Characteristics as Red Flags to Fraud Chapter 10: Motivation and Opportunity as Key Indicators The Motivation The Opportunity Chapter 11: Profiling Individual Behavior and Characteristics of a Fraudster Perpetrator's Gender Perpetrator's Age Perpetrator's Tenure Perpetrator's Education Level Behavioral Red Flags Based on Perpetrator's Position Behavioral Red Flags Based on Scheme Type Behavioral Red Flags Based on Department Chapter 12: Profiling the Fraudster's Position and Department Perpetrator's Position Perpetrator's Department Chapter 13: Profiling the Fraud Methodology or Modus Operandi Collusion Position of Employment Creates the Opportunity Many Ways to Defraud an Organization Chapter 14: Profiling the Victim Organization and its Geography Fraud Victim Organizations by Geographical Location Corruption Cases by Region Types of Fraud Victim Organizations Size of Fraud Victim Organizations Methods of Fraud in Small Businesses Industry of Fraud Victim Organizations Corruption Cases by Industry Chapter 15: Profiling the Consequences Legal Proceedings and Loss Recovery Losses Recovered An Often Unconsidered Consequence Chapter 16: Using Case Studies for Profiling Fraudsters Why Re-Invent the Wheel? Some High Profile Fraud Cases Chapter 17: The Use of Offender Profiling in Forensic Investigations Collation of Information Fraud Crime Intelligence Intelligence Led Investigating The Value of Offender Profiling Improved Internal Controls Part Three: Building a Fraud Profiling Methodology for Your Organization Chapter 18: Profiling as Part of Your Sound Anti-fraud Program Anti-Fraud Controls at Victim Organizations Anti-Fraud Controls in Small Businesses Anti-Fraud Controls by Region Effectiveness of Controls Control Weaknesses That Contributed to Fraud Types of Offender Profiling Chapter 19: Information Sources and the Role of Data Mining Forensic Profiling and the Use of Data Mining Supervised and Unsupervised Learning Privacy and Ethical Concerns Surrounding Data Mining Contributing to the Profiling Mechanism Chapter 20: Fraud Profiling Your Organization Personal Particulars of the Offender Obtaining Modus Operandi Information Determine the Motive of the Offender Opportunity Red Flags Lifestyle Change Chapter 21: The Process of Developing a Fraud Profile Development of a Fraud Risk Assessment Development of the Fraud Profile Development of a Fraud Detection Net Chapter 22: The Role of the HR Recruitment Process in Profiling Perpetrator's Criminal History Perpetrator's Employment History Controlling Human Risk Effective Human Performance Human Resource Departments Closing the Door on Fraud The CV: Fact or Fiction? Bibliography About the Association of Certified Fraud Examiners (ACFE) and the Report to the Nations on Occupational Fraud and Abuse About the Author Index . 
520 |a "Detect and combat corporate fraud with new profiling techniquesProfiling the Fraudster: Removing the Mask to Prevent and Detect Fraud takes a step-by-step approach beyond the Fraud Triangle to identify characteristics in potential fraudsters, employees and new hires that will sound alarm bells before they get their hands on your organization's assets. The typical organization loses a staggering 5% of its annual revenue to fraud. Traditional fraud investigations focus on the breakdown of internal controls but what happens when the human beings forming a key component of that chain of control are inherently dishonest? This book shows you how to recognize the characteristics and behavioral patterns of potential fraudsters who are entrusted with safeguarding corporate assets. The book includes: An in-depth look at fraud investigation techniques and how these can be enhanced by using the characteristics of fraudulent behavior, A detailed look at profiling potential perpetrators of fraud, A detailed breakdown of how to compile a fraud profile, A discussion of a wide range of organizational fraud, including abuse of power, embezzlement, computer fraud, expense abuse, and more, Tables, illustrations, and diagrams to enhance the narrative If you're a corporate fraud investigator, auditor, forensic accountant, law enforcement professional, or anyone challenged with safeguarding your organizations assets--Profiling the Fraudster shows you how to remove the mask and prevent and detect fraud"-- 
583 1 |a Archivierung/Langzeitarchivierung gewährleistet  |f SSG  |2 pdager  |5 DE-21 
650 7 |8 1.1\x  |a Betrug  |0 (DE-627)091351448  |0 (DE-2867)18736-3  |2 stw 
650 7 |8 1.2\x  |a Korruption  |0 (DE-627)091372232  |0 (DE-2867)16193-4  |2 stw 
650 7 |8 1.3\x  |a Arbeitskräfte  |0 (DE-627)09134753X  |0 (DE-2867)11262-1  |2 stw 
650 7 |8 1.4\x  |a Personalkontrolle  |0 (DE-627)571743447  |0 (DE-2867)27167-1  |2 stw 
650 0 |a Corporations  |x Corrupt practices 
650 0 |a White collar crimes 
650 0 |a Fraud 
650 0 |a Fraud  |x Prevention 
650 0 |a Fraud investigation 
689 0 0 |d s  |0 (DE-588)4066464-8  |0 (DE-627)106113437  |0 (DE-576)209164719  |a Wirtschaftskriminalität  |2 gnd 
689 0 1 |d s  |0 (DE-588)4032524-6  |0 (DE-627)104704799  |0 (DE-576)208997288  |a Korruption  |2 gnd 
689 0 2 |d s  |0 (DE-588)4187100-5  |0 (DE-627)105274755  |0 (DE-576)21004358X  |a Unterschlagung  |2 gnd 
689 0 3 |d s  |0 (DE-588)4076308-0  |0 (DE-627)104364106  |0 (DE-576)209201428  |a Prävention  |2 gnd 
689 0 4 |d s  |0 (DE-588)7548425-0  |0 (DE-627)520312457  |0 (DE-576)257768599  |a Täterprofil  |2 gnd 
689 0 |5 DE-101 
776 1 |z 9781118929759 
776 0 8 |i Online version  |a Profiling the fraudster  |w (DLC)2014046063 
776 0 8 |i Online-Ausg.  |w (DE-576)BSZ485053837 
856 4 2 |u http://catalogimages.wiley.com/images/db/jimages/9781118871041.jpg  |v 2014-11-25  |x Verlag  |3 Cover 
856 4 2 |u https://swbplus.bsz-bw.de/bsz425828379inh.htm  |m V:DE-576;B:DE-21  |q application/pdf  |v 20150313103152  |3 Inhaltsverzeichnis 
856 4 2 |u https://swbplus.bsz-bw.de/bsz425828379cov.jpg  |m V:DE-576  |m X:wiley  |q image/jpeg  |v 20150415174352  |3 Cover 
856 4 2 |u https://swbplus.bsz-bw.de/bsz425828379kla.htm  |m V:DE-576;B:DE-21  |q application/pdf  |v 20150316104818  |3 Klappentext 
935 |i Blocktest 
951 |a BO 
ELC |b 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 3174348250 
LOK |0 003 DE-627 
LOK |0 004 805546243 
LOK |0 005 20150306120851 
LOK |0 008 150205||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21  |c DE-627  |d DE-21 
LOK |0 852   |a DE-21 
LOK |0 852 1  |c KB 20 A 7264  |9 00 
LOK |0 935   |a krim 
LOK |0 938   |a 1503  |f 34 
ORI |a SA-MARC-krimdoka001.raw 
SIG |a UB: KB 20 A 7264