Search Results - control fraud

  • Showing 1 - 8 results of 8
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Fraud smart by Pickett, K. H. Spencer

    Published 2011
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  6. 6

    Small change, big problems detecting and preventing financial misconduct in your library / by Snyder, Herbert

    Published 2006
    Table of Contents: “…Fraud : how it occurs in organizations and why libraries are susceptible -- Internal control : what it is and why libraries need it -- Common weaknesses in your library's internal control system : how to recognize and correct them -- Change management and fraud prevention : allowing the improvements you make to work -- Specific types of fraud : understanding, detecting, and preventing them -- Uncovering fraud : techniques for your library to use -- If fraud happens : dealing with the fallout -- A closing thought : getting what you pay for in fraud prevention.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 7

    Money laundering prevention deterring, detecting, and resolving financial fraud / by Turner, Jonathan E., 1969-

    Published 2011
    Table of Contents: “…-- Evolution of AML Controls -- Adjusting to Rapidly Increasing Scale -- A Highly Flexible Methodology Results in Processes that Are Difficult to Stop -- AML Is a Process, Not a Destination -- All Countries' Regulatory Programs Are Not Equal -- Technology and Offshore Havens Intersect -- The Cost vs. the Benefit -- Consider the Pace of Change and Progress -- Conclusion -- ch. 6 Discovery and Prevention -- Early Warning Is Essential to AML -- Proactive Means Active -- By the Numbers -- Paradigm Shift -- Testing Your Own AML Systems -- Expanding the Business Comparison -- The Regulatory Framework -- High-Risk Areas -- Money Laundering Meets Terror Financing -- Hiding in Plain Sight -- Criminalizing the Concealment Activities -- Creating Financial Fronts -- Keeping the Money Moving -- Keeping the Tax Man Happy -- Conclusion -- ch. 7 Terror Financing -- Terrorists Use Money Laundering Techniques -- Similarities and Distinctions -- Application of the Methodology to Terror Financing -- Global Impact of Financial Crimes -- Alternative Laundering Mechanisms -- Regulatory Responses -- Conclusion -- ch. 8 Identifying Risk Exposures -- AML Exposures: Assessing Financial Institution Risk -- Language, Culture, and Ethnicity -- The Legal Landscape -- Geography: Distance Matters -- The Goal of the Launderer Is to Hide -- The United States Takes a Different Approach -- Laundering Groups Seek to Evade Detection -- A Fractured Enforcement and Regulatory Picture -- The Regulatory Position on Cyber Risks -- Simple Fraud, Still Successful -- Conclusion -- ch. 9 Investigating Money Movement -- Money Laundering Is Now Transnational Organized Crime -- Succeeding in the Investigative Process -- Government Access to Information -- Mining Data for Money Laundering -- Some Products Help the Perpetrators -- Investigating Virtual Payment Technologies -- Looking to the Future Investigative Issues -- Putting an Investigative Plan in Motion -- People Are Essential to Proof -- Finding Money Laundering Abroad -- Money Laundering Exposure during the Financial Industry Consolidation -- Conclusion -- ch. 10 Reporting and Recovery -- Reporting to Law Enforcement -- Honest People Act Differently -- Anticipating Challenges with Cyber Recoveries -- Building Appropriate Controls into Online Payment Systems -- Global Coordination on Future Issues -- Weighing Access vs. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  8. 8