How to be a successful frauditor : a practical guide to investigating fraud in the workplace for internal auditors and managers /

This book shows how anyone who finds they need to investigate a fraud at work can conduct a successful investigation and maximise their chances of recovering stolen money. Drawing on the experiences of the author, including his role in a number of high profile cases at two organisations at the heart...

Full description

Saved in:
Bibliographic Details
Main Author: Tickner, Peter
Format: Electronic eBook
Language:English
Published: Chichester : Wiley, 2010.
Subjects:
Online Access:CONNECT
Table of Contents:
  • Cover; Title page; Copyright page; Foreword; Preface; Acknowledgments; Part I: Understanding fraud; Chapter 1: Fraud overview; What do We Mean by Fraud?; Drawing A Distinction Between Fraud and Corruption; Cash, Cash, Cash; The Basic and Basis of All Cash-Handling Frauds-Teeming and Lading; Chapter 2: Fraud basics; Think Fraud First!; Peter's Pointers to Peculation (i.e., Fraud); Some Basic Frauds Against Organisations; Part II: Planning and managing; Chapter 3: Planning A fraud investigation; Setting the Strategy for the Fraud Investigation; Planning the Initial Investigation
  • First Steps, Stopping the Losses and Starting the Initial Fact-FindingExpenses-The Short-Cut Route to Success; Case Study: Answers; Chapter 4: Managing the investigation; Why Effective Managing is the Next Most Important Task After Planning; Getting the Basics Right; Tips and Suggestions to Help Manage the Investigation; Chapter 5: Gathering and using intelligence and evidence; What is the Difference Between Intelligence and Evidence?; Gathering the Evidence; Email: can It be Evidence?; Witness Evidence Gathering; Chis or Informant? What are the Differences-and the risks?
  • Disclosure, Disclosure, DisclosurePart III: Investigation techniques; Chapter 6: Using analysts to support the investigation; Understanding the Role of A Fraud Investigation Analyst; Tasking Analysts Effectively; Making Sure That You Get the Right Result; Using Analysts During Civil and Criminal Cases; Chapter 7: Technology that aids fraud detection; Common Technological Tools Available to the Fraud Investigator; Taking the Internet Into the Fraud-Finder's Tent; Spreadsheet Versus Database?; Data Interrogation Tools; Using Specialised Data-Mining Tools
  • Chapter 8: Considering covert surveillanceWhat is Covert Surveillance?; What Might Be Done and When could You Consider It?; Counter-Surveillance, What to do If You are Under Attack; Using Evidence and Intelligence Gathered Through Covert Surveillance; Chapter 9: Fraud interviewing techniques; When You May Need to Interview; Understand Yourself Before You Try to Understand Others; General Principles for Fraud Interviewing; Chapter 10: Advanced techniques in fraud investigation; Advanced Techniques in The Context of This Book; The Appliance of Science ...; Where Attributes Come to the Fore
  • The Value of Variable SamplingUsing General Sampling Theory to Advantage in A Fraud Investigation; Fuzzy Logic and Data Interpretation; Hunting the Hunter; Part IV: Fraud types; Chapter 11: Catching your crooked contractor; To Catch A Crooked Contractor ...; Common Categories of Corrupt Contractors (In Ascending Order of Size); Using Companies House and Financial Assessments to Best Advantage; Using Due Diligence to Deal with Dodgy Contractors; Chapter 12: The danger that is a Trojan fraudster; So What Exactly is A Trojan Fraudster?; The Need for Effective Vetting of New Staff and Contractors