Profiling the fraudster: removing the mask to prevent and detect fraud
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, New Jersey
Wiley
2014
|
Schriftenreihe: | Wiley corporate F&A series
|
Schlagworte: | |
Online-Zugang: | FRO01 UBG01 UBY01 Volltext |
Beschreibung: | Data Mining Forensic Profiling and the Use of Data Mining Supervised and Unsupervised Learning Privacy and Ethical Concerns Surrounding Data Mining Contributing to the Profiling Mechanism Chapter 20: Fraud Profiling Your Organization Personal Particulars of the Offender Obtaining Modus Operandi Information Determine the Motive of the Offender Opportunity Red Flags Lifestyle Change Chapter 21: The Process of Developing a Fraud Profile Development of a Fraud Risk Assessment Development of the Fraud Profile Development of a Fraud Detection Net Chapter 22: The Role of the HR Recruitment Process in Profiling Perpetrator's Criminal History Perpetrator's Employment History Controlling Human Risk Effective Human Performance Human Resource Departments Closing the Door on Fraud The CV: Fact or Fiction? Bibliography About the Association of Certified Fraud Examiners (ACFE) and the Report to the Nations on Occupational Fraud and Abuse About the Author Index "Detect and combat corporate fraud with new profiling techniquesProfiling the Fraudster: Removing the Mask to Prevent and Detect Fraud takes a step-by-step approach beyond the Fraud Triangle to identify characteristics in potential fraudsters, employees and new hires that will sound alarm bells before they get their hands on your organization's assets. The typical organization loses a staggering 5% of its annual revenue to fraud. Traditional fraud investigations focus on the breakdown of internal controls but what happens when the human beings forming a key component of that chain of control are inherently dishonest? This book shows you how to recognize the characteristics and behavioral patterns of potential fraudsters who are entrusted with safeguarding corporate assets. The book includes: An in-depth look at fraud investigation techniques and how these can be enhanced by using the characteristics of fraudulent behavior, A detailed look at profiling potential perpetrators of fraud, A detailed breakdown of how to compile a fraud profile, A discussion of a wide range of organizational fraud, including abuse of power, embezzlement, computer fraud, expense abuse, and more, Tables, illustrations, and diagrams to enhance the narrative If you're a corporate fraud investigator, auditor, forensic accountant, law enforcement professional, or anyone challenged with safeguarding your organizations assets--Profiling the Fraudster shows you how to remove the mask and prevent and detect fraud"-- Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781118929759 1118929756 9781118929766 1118929764 9781118929773 1118929772 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043397320 | ||
003 | DE-604 | ||
005 | 20210310 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781118929759 |c pdf |9 978-1-118-92975-9 | ||
020 | |a 1118929756 |c pdf |9 1-118-92975-6 | ||
020 | |a 9781118929766 |c epub |9 978-1-118-92976-6 | ||
020 | |a 1118929764 |c epub |9 1-118-92976-4 | ||
020 | |a 9781118929773 |9 978-1-118-92977-3 | ||
020 | |a 1118929772 |9 1-118-92977-2 | ||
024 | 7 | |a 10.1002/9781118929773 |2 doi | |
035 | |a (ZDB-35-WIC)ocn896806932 | ||
035 | |a (OCoLC)896806932 | ||
035 | |a (DE-599)BVBBV043397320 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-861 |a DE-706 | ||
082 | 0 | |a 658.4/73 |2 23 | |
100 | 1 | |a Padgett, Simon |e Verfasser |4 aut | |
245 | 1 | 0 | |a Profiling the fraudster |b removing the mask to prevent and detect fraud |c Simon Padgett |
264 | 1 | |a Hoboken, New Jersey |b Wiley |c 2014 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Wiley corporate F&A series | |
500 | |a Data Mining Forensic Profiling and the Use of Data Mining Supervised and Unsupervised Learning Privacy and Ethical Concerns Surrounding Data Mining Contributing to the Profiling Mechanism Chapter 20: Fraud Profiling Your Organization Personal Particulars of the Offender Obtaining Modus Operandi Information Determine the Motive of the Offender Opportunity Red Flags Lifestyle Change Chapter 21: The Process of Developing a Fraud Profile Development of a Fraud Risk Assessment Development of the Fraud Profile Development of a Fraud Detection Net Chapter 22: The Role of the HR Recruitment Process in Profiling Perpetrator's Criminal History Perpetrator's Employment History Controlling Human Risk Effective Human Performance Human Resource Departments Closing the Door on Fraud The CV: Fact or Fiction? Bibliography About the Association of Certified Fraud Examiners (ACFE) and the Report to the Nations on Occupational Fraud and Abuse About the Author Index | ||
500 | |a "Detect and combat corporate fraud with new profiling techniquesProfiling the Fraudster: Removing the Mask to Prevent and Detect Fraud takes a step-by-step approach beyond the Fraud Triangle to identify characteristics in potential fraudsters, employees and new hires that will sound alarm bells before they get their hands on your organization's assets. The typical organization loses a staggering 5% of its annual revenue to fraud. Traditional fraud investigations focus on the breakdown of internal controls but what happens when the human beings forming a key component of that chain of control are inherently dishonest? This book shows you how to recognize the characteristics and behavioral patterns of potential fraudsters who are entrusted with safeguarding corporate assets. The book includes: An in-depth look at fraud investigation techniques and how these can be enhanced by using the characteristics of fraudulent behavior, A detailed look at profiling potential perpetrators of fraud, A detailed breakdown of how to compile a fraud profile, A discussion of a wide range of organizational fraud, including abuse of power, embezzlement, computer fraud, expense abuse, and more, Tables, illustrations, and diagrams to enhance the narrative If you're a corporate fraud investigator, auditor, forensic accountant, law enforcement professional, or anyone challenged with safeguarding your organizations assets--Profiling the Fraudster shows you how to remove the mask and prevent and detect fraud"-- | ||
500 | |a Includes bibliographical references and index | ||
650 | 7 | |a BUSINESS & ECONOMICS / Accounting / General |2 bisacsh | |
650 | 7 | |a Corporations / Corrupt practices |2 fast | |
650 | 7 | |a Fraud |2 fast | |
650 | 7 | |a Fraud investigation |2 fast | |
650 | 7 | |a Fraud / Prevention |2 fast | |
650 | 7 | |a White collar crimes |2 fast | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Corporations / Corrupt practices | |
650 | 4 | |a White collar crimes | |
650 | 4 | |a Fraud | |
650 | 4 | |a Fraud / Prevention | |
650 | 4 | |a Fraud investigation | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-1-118-87104-1 |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118929773 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028815904 | ||
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118929773 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118929773 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118929773 |l UBY01 |p ZDB-35-WIC |q UBY_PDA_WIC_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175979339317248 |
---|---|
any_adam_object | |
author | Padgett, Simon |
author_facet | Padgett, Simon |
author_role | aut |
author_sort | Padgett, Simon |
author_variant | s p sp |
building | Verbundindex |
bvnumber | BV043397320 |
collection | ZDB-35-WIC |
ctrlnum | (ZDB-35-WIC)ocn896806932 (OCoLC)896806932 (DE-599)BVBBV043397320 |
dewey-full | 658.4/73 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/73 |
dewey-search | 658.4/73 |
dewey-sort | 3658.4 273 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04862nmm a2200625zc 4500</leader><controlfield tag="001">BV043397320</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210310 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118929759</subfield><subfield code="c">pdf</subfield><subfield code="9">978-1-118-92975-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118929756</subfield><subfield code="c">pdf</subfield><subfield code="9">1-118-92975-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118929766</subfield><subfield code="c">epub</subfield><subfield code="9">978-1-118-92976-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118929764</subfield><subfield code="c">epub</subfield><subfield code="9">1-118-92976-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118929773</subfield><subfield code="9">978-1-118-92977-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118929772</subfield><subfield code="9">1-118-92977-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781118929773</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn896806932</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)896806932</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043397320</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/73</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Padgett, Simon</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Profiling the fraudster</subfield><subfield code="b">removing the mask to prevent and detect fraud</subfield><subfield code="c">Simon Padgett</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">Wiley</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Wiley corporate F&A series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Data Mining Forensic Profiling and the Use of Data Mining Supervised and Unsupervised Learning Privacy and Ethical Concerns Surrounding Data Mining Contributing to the Profiling Mechanism Chapter 20: Fraud Profiling Your Organization Personal Particulars of the Offender Obtaining Modus Operandi Information Determine the Motive of the Offender Opportunity Red Flags Lifestyle Change Chapter 21: The Process of Developing a Fraud Profile Development of a Fraud Risk Assessment Development of the Fraud Profile Development of a Fraud Detection Net Chapter 22: The Role of the HR Recruitment Process in Profiling Perpetrator's Criminal History Perpetrator's Employment History Controlling Human Risk Effective Human Performance Human Resource Departments Closing the Door on Fraud The CV: Fact or Fiction? Bibliography About the Association of Certified Fraud Examiners (ACFE) and the Report to the Nations on Occupational Fraud and Abuse About the Author Index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Detect and combat corporate fraud with new profiling techniquesProfiling the Fraudster: Removing the Mask to Prevent and Detect Fraud takes a step-by-step approach beyond the Fraud Triangle to identify characteristics in potential fraudsters, employees and new hires that will sound alarm bells before they get their hands on your organization's assets. The typical organization loses a staggering 5% of its annual revenue to fraud. Traditional fraud investigations focus on the breakdown of internal controls but what happens when the human beings forming a key component of that chain of control are inherently dishonest? This book shows you how to recognize the characteristics and behavioral patterns of potential fraudsters who are entrusted with safeguarding corporate assets. The book includes: An in-depth look at fraud investigation techniques and how these can be enhanced by using the characteristics of fraudulent behavior, A detailed look at profiling potential perpetrators of fraud, A detailed breakdown of how to compile a fraud profile, A discussion of a wide range of organizational fraud, including abuse of power, embezzlement, computer fraud, expense abuse, and more, Tables, illustrations, and diagrams to enhance the narrative If you're a corporate fraud investigator, auditor, forensic accountant, law enforcement professional, or anyone challenged with safeguarding your organizations assets--Profiling the Fraudster shows you how to remove the mask and prevent and detect fraud"--</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Accounting / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Corporations / Corrupt practices</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Fraud</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Fraud investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Fraud / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">White collar crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Corporations / Corrupt practices</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">White collar crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraud</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraud / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraud investigation</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-118-87104-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118929773</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028815904</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118929773</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118929773</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118929773</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBY_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043397320 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:24:53Z |
institution | BVB |
isbn | 9781118929759 1118929756 9781118929766 1118929764 9781118929773 1118929772 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028815904 |
oclc_num | 896806932 |
open_access_boolean | |
owner | DE-861 DE-706 |
owner_facet | DE-861 DE-706 |
physical | 1 Online-Ressource |
psigel | ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC UBY_PDA_WIC_Kauf |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Wiley |
record_format | marc |
series2 | Wiley corporate F&A series |
spelling | Padgett, Simon Verfasser aut Profiling the fraudster removing the mask to prevent and detect fraud Simon Padgett Hoboken, New Jersey Wiley 2014 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Wiley corporate F&A series Data Mining Forensic Profiling and the Use of Data Mining Supervised and Unsupervised Learning Privacy and Ethical Concerns Surrounding Data Mining Contributing to the Profiling Mechanism Chapter 20: Fraud Profiling Your Organization Personal Particulars of the Offender Obtaining Modus Operandi Information Determine the Motive of the Offender Opportunity Red Flags Lifestyle Change Chapter 21: The Process of Developing a Fraud Profile Development of a Fraud Risk Assessment Development of the Fraud Profile Development of a Fraud Detection Net Chapter 22: The Role of the HR Recruitment Process in Profiling Perpetrator's Criminal History Perpetrator's Employment History Controlling Human Risk Effective Human Performance Human Resource Departments Closing the Door on Fraud The CV: Fact or Fiction? Bibliography About the Association of Certified Fraud Examiners (ACFE) and the Report to the Nations on Occupational Fraud and Abuse About the Author Index "Detect and combat corporate fraud with new profiling techniquesProfiling the Fraudster: Removing the Mask to Prevent and Detect Fraud takes a step-by-step approach beyond the Fraud Triangle to identify characteristics in potential fraudsters, employees and new hires that will sound alarm bells before they get their hands on your organization's assets. The typical organization loses a staggering 5% of its annual revenue to fraud. Traditional fraud investigations focus on the breakdown of internal controls but what happens when the human beings forming a key component of that chain of control are inherently dishonest? This book shows you how to recognize the characteristics and behavioral patterns of potential fraudsters who are entrusted with safeguarding corporate assets. The book includes: An in-depth look at fraud investigation techniques and how these can be enhanced by using the characteristics of fraudulent behavior, A detailed look at profiling potential perpetrators of fraud, A detailed breakdown of how to compile a fraud profile, A discussion of a wide range of organizational fraud, including abuse of power, embezzlement, computer fraud, expense abuse, and more, Tables, illustrations, and diagrams to enhance the narrative If you're a corporate fraud investigator, auditor, forensic accountant, law enforcement professional, or anyone challenged with safeguarding your organizations assets--Profiling the Fraudster shows you how to remove the mask and prevent and detect fraud"-- Includes bibliographical references and index BUSINESS & ECONOMICS / Accounting / General bisacsh Corporations / Corrupt practices fast Fraud fast Fraud investigation fast Fraud / Prevention fast White collar crimes fast Wirtschaft Corporations / Corrupt practices White collar crimes Fraud Fraud / Prevention Fraud investigation Erscheint auch als Druck-Ausgabe, Hardcover 978-1-118-87104-1 https://onlinelibrary.wiley.com/doi/book/10.1002/9781118929773 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Padgett, Simon Profiling the fraudster removing the mask to prevent and detect fraud BUSINESS & ECONOMICS / Accounting / General bisacsh Corporations / Corrupt practices fast Fraud fast Fraud investigation fast Fraud / Prevention fast White collar crimes fast Wirtschaft Corporations / Corrupt practices White collar crimes Fraud Fraud / Prevention Fraud investigation |
title | Profiling the fraudster removing the mask to prevent and detect fraud |
title_auth | Profiling the fraudster removing the mask to prevent and detect fraud |
title_exact_search | Profiling the fraudster removing the mask to prevent and detect fraud |
title_full | Profiling the fraudster removing the mask to prevent and detect fraud Simon Padgett |
title_fullStr | Profiling the fraudster removing the mask to prevent and detect fraud Simon Padgett |
title_full_unstemmed | Profiling the fraudster removing the mask to prevent and detect fraud Simon Padgett |
title_short | Profiling the fraudster |
title_sort | profiling the fraudster removing the mask to prevent and detect fraud |
title_sub | removing the mask to prevent and detect fraud |
topic | BUSINESS & ECONOMICS / Accounting / General bisacsh Corporations / Corrupt practices fast Fraud fast Fraud investigation fast Fraud / Prevention fast White collar crimes fast Wirtschaft Corporations / Corrupt practices White collar crimes Fraud Fraud / Prevention Fraud investigation |
topic_facet | BUSINESS & ECONOMICS / Accounting / General Corporations / Corrupt practices Fraud Fraud investigation Fraud / Prevention White collar crimes Wirtschaft |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9781118929773 |
work_keys_str_mv | AT padgettsimon profilingthefraudsterremovingthemasktopreventanddetectfraud |