Search Results - control fraud

  • Showing 1 - 16 results of 16
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    The role of central bank of kenya in controlling bank : an investigative study / by Sokpor, Claude Kodzo Dotse

    Published 2006
    Book
  6. 6
  7. 7
  8. 8
  9. 9

    Fraud smart by Pickett, K. H. Spencer

    Published 2011
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  10. 10

    Securities fraud, 1996-2001 incentive pay, governance, and class action lawsuits / by Wang, Ke, 1972 Nov. 6-

    Published 2010
    Table of Contents: “…Defining securities fraud -- Theorizing securities fraud: a complex and inadequately researched phenomenon -- Explaining securities fraud: an integrated conceptual model -- Finding the deviant corporations: research methods and data -- Incentive compensation: a source of securities fraud -- Corporate governance : a fraud-preventing process depending on context -- Controlling securities fraud : policy implications.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  11. 11

    Money laundering prevention deterring, detecting, and resolving financial fraud / by Turner, Jonathan E., 1969-

    Published 2011
    Table of Contents: “…-- Evolution of AML Controls -- Adjusting to Rapidly Increasing Scale -- A Highly Flexible Methodology Results in Processes that Are Difficult to Stop -- AML Is a Process, Not a Destination -- All Countries' Regulatory Programs Are Not Equal -- Technology and Offshore Havens Intersect -- The Cost vs. the Benefit -- Consider the Pace of Change and Progress -- Conclusion -- ch. 6 Discovery and Prevention -- Early Warning Is Essential to AML -- Proactive Means Active -- By the Numbers -- Paradigm Shift -- Testing Your Own AML Systems -- Expanding the Business Comparison -- The Regulatory Framework -- High-Risk Areas -- Money Laundering Meets Terror Financing -- Hiding in Plain Sight -- Criminalizing the Concealment Activities -- Creating Financial Fronts -- Keeping the Money Moving -- Keeping the Tax Man Happy -- Conclusion -- ch. 7 Terror Financing -- Terrorists Use Money Laundering Techniques -- Similarities and Distinctions -- Application of the Methodology to Terror Financing -- Global Impact of Financial Crimes -- Alternative Laundering Mechanisms -- Regulatory Responses -- Conclusion -- ch. 8 Identifying Risk Exposures -- AML Exposures: Assessing Financial Institution Risk -- Language, Culture, and Ethnicity -- The Legal Landscape -- Geography: Distance Matters -- The Goal of the Launderer Is to Hide -- The United States Takes a Different Approach -- Laundering Groups Seek to Evade Detection -- A Fractured Enforcement and Regulatory Picture -- The Regulatory Position on Cyber Risks -- Simple Fraud, Still Successful -- Conclusion -- ch. 9 Investigating Money Movement -- Money Laundering Is Now Transnational Organized Crime -- Succeeding in the Investigative Process -- Government Access to Information -- Mining Data for Money Laundering -- Some Products Help the Perpetrators -- Investigating Virtual Payment Technologies -- Looking to the Future Investigative Issues -- Putting an Investigative Plan in Motion -- People Are Essential to Proof -- Finding Money Laundering Abroad -- Money Laundering Exposure during the Financial Industry Consolidation -- Conclusion -- ch. 10 Reporting and Recovery -- Reporting to Law Enforcement -- Honest People Act Differently -- Anticipating Challenges with Cyber Recoveries -- Building Appropriate Controls into Online Payment Systems -- Global Coordination on Future Issues -- Weighing Access vs. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  12. 12

    The EQ interview finding employees with high emotional intelligence / by Lynn, Adele B.

    Published 2008
    Table of Contents: “…The five areas of emotional intelligence and the EQ job competencies -- Self-awareness -- Self-control or self-management -- Empathy -- Social expertness -- Personal influence : influencing self -- Mastery of purpose and vision -- The EQ fraud and other warning signs.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  13. 13

    Computer forensics an essential guide for accountants, lawyers, and managers / by Sheetz, Michael

    Published 2007
    Table of Contents: “…-- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  14. 14

    The complete hiring and firing handbook every manager's guide to working with employees legally / by Fleischer, Charles H.

    Published 2005
    Table of Contents: “…Introduction -- To hire or not to hire -- Eligibility for employment -- Discrimination -- Specific types of discrimination -- Procedures and remedies for discrimination -- Job description -- Recruiting -- Resumes and resumes fraud -- Applications -- Interviews -- Controls of employment -- Noncomplete and other agreements -- Requirements applicable to new employees -- Firing -- The decision-making process -- Voluntary and involuntary termination -- Layoffs -- Protected status -- Retaliation -- Strikes and concerted activities -- Wrongful discharge -- The firing process -- Final pay and continued benefits -- Severance packages and releases -- References -- Enforcing restrictive covenants -- unemployment insurance -- Conclusion.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  15. 15

    A survival guide for working with humans dealing with whiners, back-stabbers, know-it-alls, and other difficult people / by Scott, Gini Graham

    Published 2004
    Table of Contents: “…-- Fraud happens -- The great communicator--not! -- Learning to let 'em go : the demanding client -- The give and take paradox -- When nothing seems to work, it's time to go legal -- Passing the responsibility buck -- Get out while you can -- When help turns to help!!!…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  16. 16