Search Results - control fraud

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Fraud smart by Pickett, K. H. Spencer

    Published 2011
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  9. 9

    Small change, big problems detecting and preventing financial misconduct in your library / by Snyder, Herbert

    Published 2006
    Table of Contents: “…Fraud : how it occurs in organizations and why libraries are susceptible -- Internal control : what it is and why libraries need it -- Common weaknesses in your library's internal control system : how to recognize and correct them -- Change management and fraud prevention : allowing the improvements you make to work -- Specific types of fraud : understanding, detecting, and preventing them -- Uncovering fraud : techniques for your library to use -- If fraud happens : dealing with the fallout -- A closing thought : getting what you pay for in fraud prevention.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  10. 10

    Securities fraud, 1996-2001 incentive pay, governance, and class action lawsuits / by Wang, Ke, 1972 Nov. 6-

    Published 2010
    Table of Contents: “…Defining securities fraud -- Theorizing securities fraud: a complex and inadequately researched phenomenon -- Explaining securities fraud: an integrated conceptual model -- Finding the deviant corporations: research methods and data -- Incentive compensation: a source of securities fraud -- Corporate governance : a fraud-preventing process depending on context -- Controlling securities fraud : policy implications.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  11. 11
  12. 12
  13. 13

    Money laundering prevention deterring, detecting, and resolving financial fraud / by Turner, Jonathan E., 1969-

    Published 2011
    Table of Contents: “…-- Evolution of AML Controls -- Adjusting to Rapidly Increasing Scale -- A Highly Flexible Methodology Results in Processes that Are Difficult to Stop -- AML Is a Process, Not a Destination -- All Countries' Regulatory Programs Are Not Equal -- Technology and Offshore Havens Intersect -- The Cost vs. the Benefit -- Consider the Pace of Change and Progress -- Conclusion -- ch. 6 Discovery and Prevention -- Early Warning Is Essential to AML -- Proactive Means Active -- By the Numbers -- Paradigm Shift -- Testing Your Own AML Systems -- Expanding the Business Comparison -- The Regulatory Framework -- High-Risk Areas -- Money Laundering Meets Terror Financing -- Hiding in Plain Sight -- Criminalizing the Concealment Activities -- Creating Financial Fronts -- Keeping the Money Moving -- Keeping the Tax Man Happy -- Conclusion -- ch. 7 Terror Financing -- Terrorists Use Money Laundering Techniques -- Similarities and Distinctions -- Application of the Methodology to Terror Financing -- Global Impact of Financial Crimes -- Alternative Laundering Mechanisms -- Regulatory Responses -- Conclusion -- ch. 8 Identifying Risk Exposures -- AML Exposures: Assessing Financial Institution Risk -- Language, Culture, and Ethnicity -- The Legal Landscape -- Geography: Distance Matters -- The Goal of the Launderer Is to Hide -- The United States Takes a Different Approach -- Laundering Groups Seek to Evade Detection -- A Fractured Enforcement and Regulatory Picture -- The Regulatory Position on Cyber Risks -- Simple Fraud, Still Successful -- Conclusion -- ch. 9 Investigating Money Movement -- Money Laundering Is Now Transnational Organized Crime -- Succeeding in the Investigative Process -- Government Access to Information -- Mining Data for Money Laundering -- Some Products Help the Perpetrators -- Investigating Virtual Payment Technologies -- Looking to the Future Investigative Issues -- Putting an Investigative Plan in Motion -- People Are Essential to Proof -- Finding Money Laundering Abroad -- Money Laundering Exposure during the Financial Industry Consolidation -- Conclusion -- ch. 10 Reporting and Recovery -- Reporting to Law Enforcement -- Honest People Act Differently -- Anticipating Challenges with Cyber Recoveries -- Building Appropriate Controls into Online Payment Systems -- Global Coordination on Future Issues -- Weighing Access vs. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Auditor Essentials : 100 Concepts, Tips, Tools, and Techniques for Success / by Murdock, Hernan

    Published 2018
    Table of Contents: “…Association of Certified Fraud Examiners (ACFE) Audit - Compliance. Audit - Financial. …”
    Click here to view.
    Electronic eBook
  19. 19

    Demystifying communications risk a guide to revenue risk management in the communications sector / by Johnson, Mark

    Published 2012
    Table of Contents: “…Communications fraud control -- Revenue assurance -- Managing communications revenue risks -- Managing insider fraud : Nick Mann -- Money laundering & corruption -- ICT and cyber security risks in telecoms -- Other risk management considerations -- Other strategic risks -- Conclusion.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  20. 20

    The EQ interview finding employees with high emotional intelligence / by Lynn, Adele B.

    Published 2008
    Table of Contents: “…The five areas of emotional intelligence and the EQ job competencies -- Self-awareness -- Self-control or self-management -- Empathy -- Social expertness -- Personal influence : influencing self -- Mastery of purpose and vision -- The EQ fraud and other warning signs.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook