Computer-aided fraud prevention and detection: a step-by-step guide
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, N.J.
John Wiley & Sons
©2009
|
Schlagworte: | |
Online-Zugang: | FRO01 UBG01 Volltext |
Beschreibung: | Includes bibliographical references and index Using software to detect improper transactions are techniques that have grown in importance for fraud examiners. This book provides fraud examiners and auditors with step-by-step guidance on using data extraction and software to detect and prevent fraud. Its implementation guidance is supplemented by more than 60 case studies. Plus, it enables readers to use data to identify known and unknown symptoms of fraud. Auditors and fraud examiners will discover how to leverage data analysis as a powerful tool to detect and prevent fraud from occurring in any organization |
Beschreibung: | 1 Online-Ressource (xviii, 280 pages) |
ISBN: | 9781119203971 111920397X 9780470451601 0470451602 9780470451618 0470451610 9780470451137 0470451130 128211364X 9781282113640 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043389555 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2009 |||| o||u| ||||||eng d | ||
020 | |a 9781119203971 |c electronic bk. |9 978-1-119-20397-1 | ||
020 | |a 111920397X |c electronic bk. |9 1-119-20397-X | ||
020 | |a 9780470451601 |c electronic bk. |9 978-0-470-45160-1 | ||
020 | |a 0470451602 |c electronic bk. |9 0-470-45160-2 | ||
020 | |a 9780470451618 |c electronic bk.Adobe Digital Editions |9 978-0-470-45161-8 | ||
020 | |a 0470451610 |c electronic bk.Adobe Digital Editions |9 0-470-45161-0 | ||
020 | |a 9780470451137 |c electronic bk.Mobipocket Reader |9 978-0-470-45113-7 | ||
020 | |a 0470451130 |c electronic bk.Mobipocket Reader |9 0-470-45113-0 | ||
020 | |a 128211364X |9 1-282-11364-X | ||
020 | |a 9781282113640 |9 978-1-282-11364-0 | ||
024 | 7 | |a 10.1002/9781119203971 |2 doi | |
035 | |a (ZDB-35-WIC)ocn320955151 | ||
035 | |a (OCoLC)320955151 | ||
035 | |a (DE-599)BVBBV043389555 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-861 | ||
082 | 0 | |a 364.4 |2 22 | |
084 | |a PH 8480 |0 (DE-625)136505: |2 rvk | ||
100 | 1 | |a Coderre, David G. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Computer-aided fraud prevention and detection |b a step-by-step guide |c David Coderre |
264 | 1 | |a Hoboken, N.J. |b John Wiley & Sons |c ©2009 | |
300 | |a 1 Online-Ressource (xviii, 280 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Using software to detect improper transactions are techniques that have grown in importance for fraud examiners. This book provides fraud examiners and auditors with step-by-step guidance on using data extraction and software to detect and prevent fraud. Its implementation guidance is supplemented by more than 60 case studies. Plus, it enables readers to use data to identify known and unknown symptoms of fraud. Auditors and fraud examiners will discover how to leverage data analysis as a powerful tool to detect and prevent fraud from occurring in any organization | ||
650 | 4 | |a Auditing, Internal | |
650 | 4 | |a Fraud investigation | |
650 | 4 | |a Fraud | |
650 | 7 | |a SOCIAL SCIENCE / Criminology |2 bisacsh | |
650 | 7 | |a Auditing, Internal / Data processing |2 fast | |
650 | 7 | |a Fraud |2 fast | |
650 | 7 | |a Fraud investigation |2 fast | |
650 | 7 | |a Fraud / Prevention |2 fast | |
650 | 4 | |a Datenverarbeitung | |
650 | 4 | |a Fraud | |
650 | 4 | |a Fraud investigation | |
650 | 4 | |a Fraud / Prevention | |
650 | 4 | |a Auditing, Internal / Data processing | |
650 | 0 | 7 | |a Bilanzdelikt |0 (DE-588)4145377-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Wirtschaftsprüfung |0 (DE-588)4066505-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Prävention |0 (DE-588)4076308-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Bilanzdelikt |0 (DE-588)4145377-3 |D s |
689 | 0 | 1 | |a Prävention |0 (DE-588)4076308-0 |D s |
689 | 0 | 2 | |a Wirtschaftsprüfung |0 (DE-588)4066505-7 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-0-470-39243-0 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 0-470-39243-6 |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119203971 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028808139 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119203971 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119203971 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175962757136384 |
---|---|
any_adam_object | |
author | Coderre, David G. |
author_facet | Coderre, David G. |
author_role | aut |
author_sort | Coderre, David G. |
author_variant | d g c dg dgc |
building | Verbundindex |
bvnumber | BV043389555 |
classification_rvk | PH 8480 |
collection | ZDB-35-WIC |
ctrlnum | (ZDB-35-WIC)ocn320955151 (OCoLC)320955151 (DE-599)BVBBV043389555 |
dewey-full | 364.4 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.4 |
dewey-search | 364.4 |
dewey-sort | 3364.4 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03758nmm a2200769zc 4500</leader><controlfield tag="001">BV043389555</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119203971</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-20397-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">111920397X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-119-20397-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470451601</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-470-45160-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470451602</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-470-45160-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470451618</subfield><subfield code="c">electronic bk.Adobe Digital Editions</subfield><subfield code="9">978-0-470-45161-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470451610</subfield><subfield code="c">electronic bk.Adobe Digital Editions</subfield><subfield code="9">0-470-45161-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470451137</subfield><subfield code="c">electronic bk.Mobipocket Reader</subfield><subfield code="9">978-0-470-45113-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470451130</subfield><subfield code="c">electronic bk.Mobipocket Reader</subfield><subfield code="9">0-470-45113-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">128211364X</subfield><subfield code="9">1-282-11364-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781282113640</subfield><subfield code="9">978-1-282-11364-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781119203971</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn320955151</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)320955151</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043389555</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-861</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.4</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PH 8480</subfield><subfield code="0">(DE-625)136505:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Coderre, David G.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer-aided fraud prevention and detection</subfield><subfield code="b">a step-by-step guide</subfield><subfield code="c">David Coderre</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, N.J.</subfield><subfield code="b">John Wiley & Sons</subfield><subfield code="c">©2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xviii, 280 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Using software to detect improper transactions are techniques that have grown in importance for fraud examiners. This book provides fraud examiners and auditors with step-by-step guidance on using data extraction and software to detect and prevent fraud. Its implementation guidance is supplemented by more than 60 case studies. Plus, it enables readers to use data to identify known and unknown symptoms of fraud. Auditors and fraud examiners will discover how to leverage data analysis as a powerful tool to detect and prevent fraud from occurring in any organization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Auditing, Internal</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraud investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraud</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE / Criminology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Auditing, Internal / Data processing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Fraud</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Fraud investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Fraud / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenverarbeitung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraud</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraud investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraud / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Auditing, Internal / Data processing</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bilanzdelikt</subfield><subfield code="0">(DE-588)4145377-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Wirtschaftsprüfung</subfield><subfield code="0">(DE-588)4066505-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Bilanzdelikt</subfield><subfield code="0">(DE-588)4145377-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Wirtschaftsprüfung</subfield><subfield code="0">(DE-588)4066505-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-0-470-39243-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">0-470-39243-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119203971</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028808139</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119203971</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119203971</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043389555 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:24:37Z |
institution | BVB |
isbn | 9781119203971 111920397X 9780470451601 0470451602 9780470451618 0470451610 9780470451137 0470451130 128211364X 9781282113640 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028808139 |
oclc_num | 320955151 |
open_access_boolean | |
owner | DE-861 |
owner_facet | DE-861 |
physical | 1 Online-Ressource (xviii, 280 pages) |
psigel | ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | John Wiley & Sons |
record_format | marc |
spelling | Coderre, David G. Verfasser aut Computer-aided fraud prevention and detection a step-by-step guide David Coderre Hoboken, N.J. John Wiley & Sons ©2009 1 Online-Ressource (xviii, 280 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Using software to detect improper transactions are techniques that have grown in importance for fraud examiners. This book provides fraud examiners and auditors with step-by-step guidance on using data extraction and software to detect and prevent fraud. Its implementation guidance is supplemented by more than 60 case studies. Plus, it enables readers to use data to identify known and unknown symptoms of fraud. Auditors and fraud examiners will discover how to leverage data analysis as a powerful tool to detect and prevent fraud from occurring in any organization Auditing, Internal Fraud investigation Fraud SOCIAL SCIENCE / Criminology bisacsh Auditing, Internal / Data processing fast Fraud fast Fraud investigation fast Fraud / Prevention fast Datenverarbeitung Fraud / Prevention Auditing, Internal / Data processing Bilanzdelikt (DE-588)4145377-3 gnd rswk-swf Wirtschaftsprüfung (DE-588)4066505-7 gnd rswk-swf Prävention (DE-588)4076308-0 gnd rswk-swf Bilanzdelikt (DE-588)4145377-3 s Prävention (DE-588)4076308-0 s Wirtschaftsprüfung (DE-588)4066505-7 s 1\p DE-604 Erscheint auch als Druck-Ausgabe, Hardcover 978-0-470-39243-0 Erscheint auch als Druck-Ausgabe, Hardcover 0-470-39243-6 https://onlinelibrary.wiley.com/doi/book/10.1002/9781119203971 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Coderre, David G. Computer-aided fraud prevention and detection a step-by-step guide Auditing, Internal Fraud investigation Fraud SOCIAL SCIENCE / Criminology bisacsh Auditing, Internal / Data processing fast Fraud fast Fraud investigation fast Fraud / Prevention fast Datenverarbeitung Fraud / Prevention Auditing, Internal / Data processing Bilanzdelikt (DE-588)4145377-3 gnd Wirtschaftsprüfung (DE-588)4066505-7 gnd Prävention (DE-588)4076308-0 gnd |
subject_GND | (DE-588)4145377-3 (DE-588)4066505-7 (DE-588)4076308-0 |
title | Computer-aided fraud prevention and detection a step-by-step guide |
title_auth | Computer-aided fraud prevention and detection a step-by-step guide |
title_exact_search | Computer-aided fraud prevention and detection a step-by-step guide |
title_full | Computer-aided fraud prevention and detection a step-by-step guide David Coderre |
title_fullStr | Computer-aided fraud prevention and detection a step-by-step guide David Coderre |
title_full_unstemmed | Computer-aided fraud prevention and detection a step-by-step guide David Coderre |
title_short | Computer-aided fraud prevention and detection |
title_sort | computer aided fraud prevention and detection a step by step guide |
title_sub | a step-by-step guide |
topic | Auditing, Internal Fraud investigation Fraud SOCIAL SCIENCE / Criminology bisacsh Auditing, Internal / Data processing fast Fraud fast Fraud investigation fast Fraud / Prevention fast Datenverarbeitung Fraud / Prevention Auditing, Internal / Data processing Bilanzdelikt (DE-588)4145377-3 gnd Wirtschaftsprüfung (DE-588)4066505-7 gnd Prävention (DE-588)4076308-0 gnd |
topic_facet | Auditing, Internal Fraud investigation Fraud SOCIAL SCIENCE / Criminology Auditing, Internal / Data processing Fraud / Prevention Datenverarbeitung Bilanzdelikt Wirtschaftsprüfung Prävention |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9781119203971 |
work_keys_str_mv | AT coderredavidg computeraidedfraudpreventionanddetectionastepbystepguide |