Fraud smart:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Chichester, West Sussex
Wiley
2011
|
Ausgabe: | First published |
Schlagworte: | |
Online-Zugang: | TUM01 Volltext |
Beschreibung: | 1 Online-Ressource (xv, 258 Seiten) |
ISBN: | 9781119944775 1119944775 9781119960461 1119960460 9781119960478 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042740549 | ||
003 | DE-604 | ||
005 | 20160211 | ||
007 | cr|uuu---uuuuu | ||
008 | 150806s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781119944775 |c Online |9 978-1-119-94477-5 | ||
020 | |a 1119944775 |c Online |9 1-119-94477-5 | ||
020 | |a 9781119960461 |c Online |9 978-1-119-96046-1 | ||
020 | |a 1119960460 |c Online |9 1-119-96046-0 | ||
020 | |a 9781119960478 |c Online |9 978-1-119-96047-8 | ||
035 | |a (ZDB-4-NLEBK)421909 | ||
035 | |a (OCoLC)772845283 | ||
035 | |a (DE-599)BVBBV042740549 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 | ||
082 | 0 | |a 658.473 | |
084 | |a QL 415 |0 (DE-625)141716: |2 rvk | ||
100 | 1 | |a Pickett, K. H. Spencer |e Verfasser |0 (DE-588)17312593X |4 aut | |
245 | 1 | 0 | |a Fraud smart |c K.H. Spencer Pickett |
250 | |a First published | ||
264 | 1 | |a Chichester, West Sussex |b Wiley |c 2011 | |
300 | |a 1 Online-Ressource (xv, 258 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a FRAUD SMART; Contents; Preface; PART I: Understanding the Threat; 1: What Do We Mean by Fraud?; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Income; Expenditure; Assets; Data; OUR THREE KEY CONCLUSIONS; 2: A Wide Range of Threats; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Simple; Complex; Internal; External; OUR THREE KEY CONCLUSIONS; 3: The Global Scene; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Domestic; Foreign; Goods and Services; Financial Data; Personal Identity; Image Versus Reality; OUR THREE KEY CONCLUSIONS. | |
505 | 8 | |a 4: Building Your Fraud Smart ToolkitKEY LEARNING OBJECTIVES; PART I MULTICHOICE QUIZ; PART II: Appreciating Respective Roles; 5: Fraud Smart Roles and Responsibilities; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Corporate Anti-Fraud Policy; Fraud Prevention; Fraud Detection; Fraud Response; OUR THREE KEY CONCLUSIONS; 6: Fraud Smart Skills Profile; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Compliant; Honest; Competent; Astute; OUR THREE KEY CONCLUSIONS; 7: Fraud Smart Training Needs; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY? | |
505 | 8 | |a OUR MODEL EXPLAINEDAnti-Fraud Policy; Training Policy; Fraud Control Responsibilities; Current Versus Required Profile; Personal Development Strategy; OUR THREE KEY CONCLUSIONS; 8: Building Your Fraud Smart Toolkit; KEY LEARNING OBJECTIVES; PART II MULTICHOICE QUIZ; PART III: Embracing Sound Ethics; 9: The Moral Compass; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Societal Best Interests; Corporate Best Interests; Personal Best Interests; OUR THREE KEY CONCLUSIONS; 10: Implementing Values; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED. | |
505 | 8 | |a Corporate Code of EthicsAwareness; Disciplinary Code; Assessment; Cultural Integration; OUR THREE KEY CONCLUSIONS; 11: Whistleblowing; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Stance; Manager; Facilities; Experience; Awareness and Trust; OUR THREE KEY CONCLUSIONS; 12: Building Your Fraud Smart Toolkit; KEY LEARNING OBJECTIVES; PART III MULTICHOICE QUIZ; PART IV: Recognizing Red Flags; 13: The Ingredients of Fraud; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Benefits; Access; Motive; Concealment; OUR THREE KEY CONCLUSIONS; 14: Why People Slip Up | |
505 | 8 | |a WHAT CAN GO WRONG?WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Basic Salary Versus Added Pressure; Personal Needs Met?; Rationalization; Legality Versus Illegality; OUR THREE KEY CONCLUSIONS; 15: Recognizing Red Flags; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Lifestyle; Position; Behaviour; OUR THREE KEY CONCLUSIONS; 16: Building Your Fraud Smart Toolkit; KEY LEARNING OBJECTIVES; PART IV MULTICHOICE QUIZ; PART V: Mastering Suitable Controls; 17: The Control Concept; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Control Environment | |
505 | 8 | |a A professional guide to developing training for fraud risk and detectionThis book provides a simple but effective method of developing a fraud risk awareness strategy that focuses on training employees using a six-stage approach to this task that involves understanding the threat, appreciating respective responsibilities, embracing a sound moral compass, recognizing red flags, mastering suitable internal controls, and managing the risk of fraud. Using this step-by-step approach, all senior executives, managers, employees, and associates can develop an important new skill set that will help the | |
650 | 4 | |a Auditing, Internal | |
650 | 4 | |a Business and economics / Auditing | |
650 | 4 | |a Employee crimes / Prevention | |
650 | 4 | |a Employee theft | |
650 | 4 | |a Business | |
650 | 7 | |a BUSINESS & ECONOMICS / Corporate Governance |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Leadership |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Organizational Development |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Workplace Culture |2 bisacsh | |
650 | 7 | |a Fraud / Prevention |2 fast | |
650 | 4 | |a Führung | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Fraud |x Prevention | |
650 | 0 | 7 | |a Betrug |0 (DE-588)4006249-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Wirtschaftskriminalität |0 (DE-588)4066464-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Betrug |0 (DE-588)4006249-1 |D s |
689 | 0 | 1 | |a Wirtschaftskriminalität |0 (DE-588)4066464-8 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-0-470-68258-6 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=421909 |x Aggregator |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-4-NLEBK | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028171421 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=421909 |l TUM01 |p ZDB-4-NLEBK |q TUM_PDA_EBSCOBAE_gekauft |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804174954839670784 |
---|---|
any_adam_object | |
author | Pickett, K. H. Spencer |
author_GND | (DE-588)17312593X |
author_facet | Pickett, K. H. Spencer |
author_role | aut |
author_sort | Pickett, K. H. Spencer |
author_variant | k h s p khs khsp |
building | Verbundindex |
bvnumber | BV042740549 |
classification_rvk | QL 415 |
collection | ZDB-4-NLEBK |
contents | FRAUD SMART; Contents; Preface; PART I: Understanding the Threat; 1: What Do We Mean by Fraud?; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Income; Expenditure; Assets; Data; OUR THREE KEY CONCLUSIONS; 2: A Wide Range of Threats; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Simple; Complex; Internal; External; OUR THREE KEY CONCLUSIONS; 3: The Global Scene; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Domestic; Foreign; Goods and Services; Financial Data; Personal Identity; Image Versus Reality; OUR THREE KEY CONCLUSIONS. 4: Building Your Fraud Smart ToolkitKEY LEARNING OBJECTIVES; PART I MULTICHOICE QUIZ; PART II: Appreciating Respective Roles; 5: Fraud Smart Roles and Responsibilities; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Corporate Anti-Fraud Policy; Fraud Prevention; Fraud Detection; Fraud Response; OUR THREE KEY CONCLUSIONS; 6: Fraud Smart Skills Profile; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Compliant; Honest; Competent; Astute; OUR THREE KEY CONCLUSIONS; 7: Fraud Smart Training Needs; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY? OUR MODEL EXPLAINEDAnti-Fraud Policy; Training Policy; Fraud Control Responsibilities; Current Versus Required Profile; Personal Development Strategy; OUR THREE KEY CONCLUSIONS; 8: Building Your Fraud Smart Toolkit; KEY LEARNING OBJECTIVES; PART II MULTICHOICE QUIZ; PART III: Embracing Sound Ethics; 9: The Moral Compass; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Societal Best Interests; Corporate Best Interests; Personal Best Interests; OUR THREE KEY CONCLUSIONS; 10: Implementing Values; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED. Corporate Code of EthicsAwareness; Disciplinary Code; Assessment; Cultural Integration; OUR THREE KEY CONCLUSIONS; 11: Whistleblowing; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Stance; Manager; Facilities; Experience; Awareness and Trust; OUR THREE KEY CONCLUSIONS; 12: Building Your Fraud Smart Toolkit; KEY LEARNING OBJECTIVES; PART III MULTICHOICE QUIZ; PART IV: Recognizing Red Flags; 13: The Ingredients of Fraud; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Benefits; Access; Motive; Concealment; OUR THREE KEY CONCLUSIONS; 14: Why People Slip Up WHAT CAN GO WRONG?WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Basic Salary Versus Added Pressure; Personal Needs Met?; Rationalization; Legality Versus Illegality; OUR THREE KEY CONCLUSIONS; 15: Recognizing Red Flags; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Lifestyle; Position; Behaviour; OUR THREE KEY CONCLUSIONS; 16: Building Your Fraud Smart Toolkit; KEY LEARNING OBJECTIVES; PART IV MULTICHOICE QUIZ; PART V: Mastering Suitable Controls; 17: The Control Concept; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Control Environment A professional guide to developing training for fraud risk and detectionThis book provides a simple but effective method of developing a fraud risk awareness strategy that focuses on training employees using a six-stage approach to this task that involves understanding the threat, appreciating respective responsibilities, embracing a sound moral compass, recognizing red flags, mastering suitable internal controls, and managing the risk of fraud. Using this step-by-step approach, all senior executives, managers, employees, and associates can develop an important new skill set that will help the |
ctrlnum | (ZDB-4-NLEBK)421909 (OCoLC)772845283 (DE-599)BVBBV042740549 |
dewey-full | 658.473 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.473 |
dewey-search | 658.473 |
dewey-sort | 3658.473 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | First published |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06129nmm a2200697zc 4500</leader><controlfield tag="001">BV042740549</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160211 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150806s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119944775</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-119-94477-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119944775</subfield><subfield code="c">Online</subfield><subfield code="9">1-119-94477-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119960461</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-119-96046-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119960460</subfield><subfield code="c">Online</subfield><subfield code="9">1-119-96046-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119960478</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-119-96047-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-NLEBK)421909</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)772845283</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042740549</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.473</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QL 415</subfield><subfield code="0">(DE-625)141716:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pickett, K. H. Spencer</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)17312593X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fraud smart</subfield><subfield code="c">K.H. Spencer Pickett</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First published</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chichester, West Sussex</subfield><subfield code="b">Wiley</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xv, 258 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">FRAUD SMART; Contents; Preface; PART I: Understanding the Threat; 1: What Do We Mean by Fraud?; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Income; Expenditure; Assets; Data; OUR THREE KEY CONCLUSIONS; 2: A Wide Range of Threats; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Simple; Complex; Internal; External; OUR THREE KEY CONCLUSIONS; 3: The Global Scene; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Domestic; Foreign; Goods and Services; Financial Data; Personal Identity; Image Versus Reality; OUR THREE KEY CONCLUSIONS.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4: Building Your Fraud Smart ToolkitKEY LEARNING OBJECTIVES; PART I MULTICHOICE QUIZ; PART II: Appreciating Respective Roles; 5: Fraud Smart Roles and Responsibilities; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Corporate Anti-Fraud Policy; Fraud Prevention; Fraud Detection; Fraud Response; OUR THREE KEY CONCLUSIONS; 6: Fraud Smart Skills Profile; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Compliant; Honest; Competent; Astute; OUR THREE KEY CONCLUSIONS; 7: Fraud Smart Training Needs; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">OUR MODEL EXPLAINEDAnti-Fraud Policy; Training Policy; Fraud Control Responsibilities; Current Versus Required Profile; Personal Development Strategy; OUR THREE KEY CONCLUSIONS; 8: Building Your Fraud Smart Toolkit; KEY LEARNING OBJECTIVES; PART II MULTICHOICE QUIZ; PART III: Embracing Sound Ethics; 9: The Moral Compass; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Societal Best Interests; Corporate Best Interests; Personal Best Interests; OUR THREE KEY CONCLUSIONS; 10: Implementing Values; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Corporate Code of EthicsAwareness; Disciplinary Code; Assessment; Cultural Integration; OUR THREE KEY CONCLUSIONS; 11: Whistleblowing; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Stance; Manager; Facilities; Experience; Awareness and Trust; OUR THREE KEY CONCLUSIONS; 12: Building Your Fraud Smart Toolkit; KEY LEARNING OBJECTIVES; PART III MULTICHOICE QUIZ; PART IV: Recognizing Red Flags; 13: The Ingredients of Fraud; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Benefits; Access; Motive; Concealment; OUR THREE KEY CONCLUSIONS; 14: Why People Slip Up</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">WHAT CAN GO WRONG?WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Basic Salary Versus Added Pressure; Personal Needs Met?; Rationalization; Legality Versus Illegality; OUR THREE KEY CONCLUSIONS; 15: Recognizing Red Flags; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Lifestyle; Position; Behaviour; OUR THREE KEY CONCLUSIONS; 16: Building Your Fraud Smart Toolkit; KEY LEARNING OBJECTIVES; PART IV MULTICHOICE QUIZ; PART V: Mastering Suitable Controls; 17: The Control Concept; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Control Environment</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">A professional guide to developing training for fraud risk and detectionThis book provides a simple but effective method of developing a fraud risk awareness strategy that focuses on training employees using a six-stage approach to this task that involves understanding the threat, appreciating respective responsibilities, embracing a sound moral compass, recognizing red flags, mastering suitable internal controls, and managing the risk of fraud. Using this step-by-step approach, all senior executives, managers, employees, and associates can develop an important new skill set that will help the</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Auditing, Internal</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business and economics / Auditing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Employee crimes / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Employee theft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Corporate Governance</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Leadership</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Organizational Development</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Workplace Culture</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Fraud / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Führung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraud</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betrug</subfield><subfield code="0">(DE-588)4006249-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Wirtschaftskriminalität</subfield><subfield code="0">(DE-588)4066464-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Betrug</subfield><subfield code="0">(DE-588)4006249-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Wirtschaftskriminalität</subfield><subfield code="0">(DE-588)4066464-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-0-470-68258-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=421909</subfield><subfield code="x">Aggregator</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-NLEBK</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028171421</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=421909</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-4-NLEBK</subfield><subfield code="q">TUM_PDA_EBSCOBAE_gekauft</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042740549 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:08:36Z |
institution | BVB |
isbn | 9781119944775 1119944775 9781119960461 1119960460 9781119960478 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028171421 |
oclc_num | 772845283 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xv, 258 Seiten) |
psigel | ZDB-4-NLEBK ZDB-4-NLEBK TUM_PDA_EBSCOBAE_gekauft |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Wiley |
record_format | marc |
spelling | Pickett, K. H. Spencer Verfasser (DE-588)17312593X aut Fraud smart K.H. Spencer Pickett First published Chichester, West Sussex Wiley 2011 1 Online-Ressource (xv, 258 Seiten) txt rdacontent c rdamedia cr rdacarrier FRAUD SMART; Contents; Preface; PART I: Understanding the Threat; 1: What Do We Mean by Fraud?; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Income; Expenditure; Assets; Data; OUR THREE KEY CONCLUSIONS; 2: A Wide Range of Threats; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Simple; Complex; Internal; External; OUR THREE KEY CONCLUSIONS; 3: The Global Scene; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Domestic; Foreign; Goods and Services; Financial Data; Personal Identity; Image Versus Reality; OUR THREE KEY CONCLUSIONS. 4: Building Your Fraud Smart ToolkitKEY LEARNING OBJECTIVES; PART I MULTICHOICE QUIZ; PART II: Appreciating Respective Roles; 5: Fraud Smart Roles and Responsibilities; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Corporate Anti-Fraud Policy; Fraud Prevention; Fraud Detection; Fraud Response; OUR THREE KEY CONCLUSIONS; 6: Fraud Smart Skills Profile; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Compliant; Honest; Competent; Astute; OUR THREE KEY CONCLUSIONS; 7: Fraud Smart Training Needs; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY? OUR MODEL EXPLAINEDAnti-Fraud Policy; Training Policy; Fraud Control Responsibilities; Current Versus Required Profile; Personal Development Strategy; OUR THREE KEY CONCLUSIONS; 8: Building Your Fraud Smart Toolkit; KEY LEARNING OBJECTIVES; PART II MULTICHOICE QUIZ; PART III: Embracing Sound Ethics; 9: The Moral Compass; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Societal Best Interests; Corporate Best Interests; Personal Best Interests; OUR THREE KEY CONCLUSIONS; 10: Implementing Values; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED. Corporate Code of EthicsAwareness; Disciplinary Code; Assessment; Cultural Integration; OUR THREE KEY CONCLUSIONS; 11: Whistleblowing; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Stance; Manager; Facilities; Experience; Awareness and Trust; OUR THREE KEY CONCLUSIONS; 12: Building Your Fraud Smart Toolkit; KEY LEARNING OBJECTIVES; PART III MULTICHOICE QUIZ; PART IV: Recognizing Red Flags; 13: The Ingredients of Fraud; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Benefits; Access; Motive; Concealment; OUR THREE KEY CONCLUSIONS; 14: Why People Slip Up WHAT CAN GO WRONG?WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Basic Salary Versus Added Pressure; Personal Needs Met?; Rationalization; Legality Versus Illegality; OUR THREE KEY CONCLUSIONS; 15: Recognizing Red Flags; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Lifestyle; Position; Behaviour; OUR THREE KEY CONCLUSIONS; 16: Building Your Fraud Smart Toolkit; KEY LEARNING OBJECTIVES; PART IV MULTICHOICE QUIZ; PART V: Mastering Suitable Controls; 17: The Control Concept; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Control Environment A professional guide to developing training for fraud risk and detectionThis book provides a simple but effective method of developing a fraud risk awareness strategy that focuses on training employees using a six-stage approach to this task that involves understanding the threat, appreciating respective responsibilities, embracing a sound moral compass, recognizing red flags, mastering suitable internal controls, and managing the risk of fraud. Using this step-by-step approach, all senior executives, managers, employees, and associates can develop an important new skill set that will help the Auditing, Internal Business and economics / Auditing Employee crimes / Prevention Employee theft Business BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh BUSINESS & ECONOMICS / Workplace Culture bisacsh Fraud / Prevention fast Führung Wirtschaft Fraud Prevention Betrug (DE-588)4006249-1 gnd rswk-swf Wirtschaftskriminalität (DE-588)4066464-8 gnd rswk-swf Betrug (DE-588)4006249-1 s Wirtschaftskriminalität (DE-588)4066464-8 s 1\p DE-604 Erscheint auch als Druck-Ausgabe, Hardcover 978-0-470-68258-6 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=421909 Aggregator URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Pickett, K. H. Spencer Fraud smart FRAUD SMART; Contents; Preface; PART I: Understanding the Threat; 1: What Do We Mean by Fraud?; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Income; Expenditure; Assets; Data; OUR THREE KEY CONCLUSIONS; 2: A Wide Range of Threats; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Simple; Complex; Internal; External; OUR THREE KEY CONCLUSIONS; 3: The Global Scene; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Domestic; Foreign; Goods and Services; Financial Data; Personal Identity; Image Versus Reality; OUR THREE KEY CONCLUSIONS. 4: Building Your Fraud Smart ToolkitKEY LEARNING OBJECTIVES; PART I MULTICHOICE QUIZ; PART II: Appreciating Respective Roles; 5: Fraud Smart Roles and Responsibilities; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Corporate Anti-Fraud Policy; Fraud Prevention; Fraud Detection; Fraud Response; OUR THREE KEY CONCLUSIONS; 6: Fraud Smart Skills Profile; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Compliant; Honest; Competent; Astute; OUR THREE KEY CONCLUSIONS; 7: Fraud Smart Training Needs; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY? OUR MODEL EXPLAINEDAnti-Fraud Policy; Training Policy; Fraud Control Responsibilities; Current Versus Required Profile; Personal Development Strategy; OUR THREE KEY CONCLUSIONS; 8: Building Your Fraud Smart Toolkit; KEY LEARNING OBJECTIVES; PART II MULTICHOICE QUIZ; PART III: Embracing Sound Ethics; 9: The Moral Compass; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Societal Best Interests; Corporate Best Interests; Personal Best Interests; OUR THREE KEY CONCLUSIONS; 10: Implementing Values; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED. Corporate Code of EthicsAwareness; Disciplinary Code; Assessment; Cultural Integration; OUR THREE KEY CONCLUSIONS; 11: Whistleblowing; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Stance; Manager; Facilities; Experience; Awareness and Trust; OUR THREE KEY CONCLUSIONS; 12: Building Your Fraud Smart Toolkit; KEY LEARNING OBJECTIVES; PART III MULTICHOICE QUIZ; PART IV: Recognizing Red Flags; 13: The Ingredients of Fraud; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Benefits; Access; Motive; Concealment; OUR THREE KEY CONCLUSIONS; 14: Why People Slip Up WHAT CAN GO WRONG?WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Basic Salary Versus Added Pressure; Personal Needs Met?; Rationalization; Legality Versus Illegality; OUR THREE KEY CONCLUSIONS; 15: Recognizing Red Flags; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Lifestyle; Position; Behaviour; OUR THREE KEY CONCLUSIONS; 16: Building Your Fraud Smart Toolkit; KEY LEARNING OBJECTIVES; PART IV MULTICHOICE QUIZ; PART V: Mastering Suitable Controls; 17: The Control Concept; WHAT CAN GO WRONG?; WHAT DO THE EXPERTS SAY?; OUR MODEL EXPLAINED; Control Environment A professional guide to developing training for fraud risk and detectionThis book provides a simple but effective method of developing a fraud risk awareness strategy that focuses on training employees using a six-stage approach to this task that involves understanding the threat, appreciating respective responsibilities, embracing a sound moral compass, recognizing red flags, mastering suitable internal controls, and managing the risk of fraud. Using this step-by-step approach, all senior executives, managers, employees, and associates can develop an important new skill set that will help the Auditing, Internal Business and economics / Auditing Employee crimes / Prevention Employee theft Business BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh BUSINESS & ECONOMICS / Workplace Culture bisacsh Fraud / Prevention fast Führung Wirtschaft Fraud Prevention Betrug (DE-588)4006249-1 gnd Wirtschaftskriminalität (DE-588)4066464-8 gnd |
subject_GND | (DE-588)4006249-1 (DE-588)4066464-8 |
title | Fraud smart |
title_auth | Fraud smart |
title_exact_search | Fraud smart |
title_full | Fraud smart K.H. Spencer Pickett |
title_fullStr | Fraud smart K.H. Spencer Pickett |
title_full_unstemmed | Fraud smart K.H. Spencer Pickett |
title_short | Fraud smart |
title_sort | fraud smart |
topic | Auditing, Internal Business and economics / Auditing Employee crimes / Prevention Employee theft Business BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh BUSINESS & ECONOMICS / Workplace Culture bisacsh Fraud / Prevention fast Führung Wirtschaft Fraud Prevention Betrug (DE-588)4006249-1 gnd Wirtschaftskriminalität (DE-588)4066464-8 gnd |
topic_facet | Auditing, Internal Business and economics / Auditing Employee crimes / Prevention Employee theft Business BUSINESS & ECONOMICS / Corporate Governance BUSINESS & ECONOMICS / Leadership BUSINESS & ECONOMICS / Organizational Development BUSINESS & ECONOMICS / Workplace Culture Fraud / Prevention Führung Wirtschaft Fraud Prevention Betrug Wirtschaftskriminalität |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=421909 |
work_keys_str_mv | AT pickettkhspencer fraudsmart |