Book description
Fraudulent activity can approach you or your organization through a variety of avenues, ranging from the cyber world, social media, unsolicited e-mails, poor hiring practices, dishonest associates, and weak operating procedures. With a focus on prevention measures, A Comprehensive Look at Fraud Identification and Prevention presents proven tips, advice, and recommendations for fraud awareness, protection, and prevention.
The book supplies a detailed examination of the wide range of threats that exist to provide you with a plan to protect the assets of your organization, and even your own assets, against the many faces of fraud in today's technologically advanced environment. The many types of fraud covered include:
- Employee theft and fraud
- Organizational fraud
- Identity theft and fraud
- Fraud against the elderly
- Internet, computer, and e-mail fraud
- Ponzi and pyramid schemes
The methods of prevention presented in the book are based on what is referred to as the path of least resistance. With fraud and other types of criminal activity, criminals take the path with the fewest barriers in their way. By implementing the methods presented in this book, you will be able to deter would-be criminals and send them on their way to search for easier targets with fewer barriers.
Discussion categories include identification and prevention aspects for organizational and individual frauds along with the many avenues used to facilitate the attacks. Explaining how some fraud typologies can overlap and co-mingle, the book provides the methods you need to protect your organization, and yourself, from becoming a target and victim of fraud.
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents (1/2)
- Contents (2/2)
- Foreword
- Fraud and Prevention
- About the Author
- Chapter 1: Fraud (1/2)
- Chapter 1: Fraud (2/2)
- Chapter 2: Employee Theft and Fraud (1/5)
- Chapter 2: Employee Theft and Fraud (2/5)
- Chapter 2: Employee Theft and Fraud (3/5)
- Chapter 2: Employee Theft and Fraud (4/5)
- Chapter 2: Employee Theft and Fraud (5/5)
- Chapter 3: Organizational Fraud (1/5)
- Chapter 3: Organizational Fraud (2/5)
- Chapter 3: Organizational Fraud (3/5)
- Chapter 3: Organizational Fraud (4/5)
- Chapter 3: Organizational Fraud (5/5)
- Chapter 4: Small Business Fraud (1/3)
- Chapter 4: Small Business Fraud (2/3)
- Chapter 4: Small Business Fraud (3/3)
- Chapter 5: Investment Fraud (1/5)
- Chapter 5: Investment Fraud (2/5)
- Chapter 5: Investment Fraud (3/5)
- Chapter 5: Investment Fraud (4/5)
- Chapter 5: Investment Fraud (5/5)
- Chapter 6: Organized Retail Fraud/Theft (1/4)
- Chapter 6: Organized Retail Fraud/Theft (2/4)
- Chapter 6: Organized Retail Fraud/Theft (3/4)
- Chapter 6: Organized Retail Fraud/Theft (4/4)
- Chapter 7: Frauds Targeting the Individual (1/8)
- Chapter 7: Frauds Targeting the Individual (2/8)
- Chapter 7: Frauds Targeting the Individual (3/8)
- Chapter 7: Frauds Targeting the Individual (4/8)
- Chapter 7: Frauds Targeting the Individual (5/8)
- Chapter 7: Frauds Targeting the Individual (6/8)
- Chapter 7: Frauds Targeting the Individual (7/8)
- Chapter 7: Frauds Targeting the Individual (8/8)
- Chapter 8: Frauds against the Elderly (1/4)
- Chapter 8: Frauds against the Elderly (2/4)
- Chapter 8: Frauds against the Elderly (3/4)
- Chapter 8: Frauds against the Elderly (4/4)
- Chapter 9: Advance Fee Fraud (1/6)
- Chapter 9: Advance Fee Fraud (2/6)
- Chapter 9: Advance Fee Fraud (3/6)
- Chapter 9: Advance Fee Fraud (4/6)
- Chapter 9: Advance Fee Fraud (5/6)
- Chapter 9: Advance Fee Fraud (6/6)
- Chapter 10: Identity Theft/Identity Fraud (1/6)
- Chapter 10: Identity Theft/Identity Fraud (2/6)
- Chapter 10: Identity Theft/Identity Fraud (3/6)
- Chapter 10: Identity Theft/Identity Fraud (4/6)
- Chapter 10: Identity Theft/Identity Fraud (5/6)
- Chapter 10: Identity Theft/Identity Fraud (6/6)
- Chapter 11: Internet Fraud (1/7)
- Chapter 11: Internet Fraud (2/7)
- Chapter 11: Internet Fraud (3/7)
- Chapter 11: Internet Fraud (4/7)
- Chapter 11: Internet Fraud (5/7)
- Chapter 11: Internet Fraud (6/7)
- Chapter 11: Internet Fraud (7/7)
- Chapter 12: Internet, Computer, and E-mail Fraud (1/4)
- Chapter 12: Internet, Computer, and E-mail Fraud (2/4)
- Chapter 12: Internet, Computer, and E-mail Fraud (3/4)
- Chapter 12: Internet, Computer, and E-mail Fraud (4/4)
- Appendix A: Social Security Number Prefixes
- Appendix B: Advance Fee Fraud Scheme Letters (1/4)
- Appendix B: Advance Fee Fraud Scheme Letters (2/4)
- Appendix B: Advance Fee Fraud Scheme Letters (3/4)
- Appendix B: Advance Fee Fraud Scheme Letters (4/4)
- Appendix C: Work-at-Home, Mystery Shopping, Inheritance, and Lottery Schemes (1/3)
- Appendix C: Work-at-Home, Mystery Shopping, Inheritance, and Lottery Schemes (2/3)
- Appendix C: Work-at-Home, Mystery Shopping, Inheritance, and Lottery Schemes (3/3)
- Back Cover
Product information
- Title: A Comprehensive Look at Fraud Identification and Prevention
- Author(s):
- Release date: May 2015
- Publisher(s): CRC Press
- ISBN: 9781498700337
You might also like
book
Managing Fraud Risk: A Practical Guide for Directors and Managers
A strategic, practical, cost-effective approach to fraud prevention In troubled economic times, the risk of fraud …
book
Faces of Fraud: Cases and Lessons from a Life Fighting Fraudsters
The ultimate tool for understanding, investigating and preventing fraud Fraud is an evil with a life …
book
The Fraud Audit: Responding to the Risk of Fraud in Core Business Systems
Essential guidance for creation of an effective fraud audit program in core business systems The Association …
book
Fraud Examination Casebook with Documents
A practical advantage for entry-level fraud examiners with start-to-finish casework Fraud Examination Casebook with Documents provides …