Tickner, Peter.

How to be a Successful Frauditor. - Hoboken : Wiley, 2012. - 1 online resource (667 p.) - eBooks on Demand Wiley Corporate F&A . - Wiley Corporate F&A .

Cover; Title page; Copyright page; Foreword; Preface; Acknowledgments; Part I: Understanding fraud; Chapter 1: Fraud overview; What do We Mean by Fraud?; Drawing A Distinction Between Fraud and Corruption; Cash, Cash, Cash; The Basic and Basis of All Cash-Handling Frauds-Teeming and Lading; Chapter 2: Fraud basics; Think Fraud First!; Peter's Pointers to Peculation (i.e., Fraud); Some Basic Frauds Against Organisations; Part II: Planning and managing; Chapter 3: Planning A fraud investigation; Setting the Strategy for the Fraud Investigation; Planning the Initial Investigation First Steps, Stopping the Losses and Starting the Initial Fact-FindingExpenses-The Short-Cut Route to Success; Case Study: Answers; Chapter 4: Managing the investigation; Why Effective Managing is the Next Most Important Task After Planning; Getting the Basics Right; Tips and Suggestions to Help Manage the Investigation; Chapter 5: Gathering and using intelligence and evidence; What is the Difference Between Intelligence and Evidence?; Gathering the Evidence; Email: can It be Evidence?; Witness Evidence Gathering; Chis or Informant? What are the Differences-and the risks? Disclosure, Disclosure, DisclosurePart III: Investigation techniques; Chapter 6: Using analysts to support the investigation; Understanding the Role of A Fraud Investigation Analyst; Tasking Analysts Effectively; Making Sure That You Get the Right Result; Using Analysts During Civil and Criminal Cases; Chapter 7: Technology that aids fraud detection; Common Technological Tools Available to the Fraud Investigator; Taking the Internet Into the Fraud-Finder's Tent; Spreadsheet Versus Database?; Data Interrogation Tools; Using Specialised Data-Mining Tools Chapter 8: Considering covert surveillanceWhat is Covert Surveillance?; What Might Be Done and When could You Consider It?; Counter-Surveillance, What to do If You are Under Attack; Using Evidence and Intelligence Gathered Through Covert Surveillance; Chapter 9: Fraud interviewing techniques; When You May Need to Interview; Understand Yourself Before You Try to Understand Others; General Principles for Fraud Interviewing; Chapter 10: Advanced techniques in fraud investigation; Advanced Techniques in The Context of This Book; The Appliance of Science …; Where Attributes Come to the Fore The Value of Variable SamplingUsing General Sampling Theory to Advantage in A Fraud Investigation; Fuzzy Logic and Data Interpretation; Hunting the Hunter; Part IV: Fraud types; Chapter 11: Catching your crooked contractor; To Catch A Crooked Contractor …; Common Categories of Corrupt Contractors (In Ascending Order of Size); Using Companies House and Financial Assessments to Best Advantage; Using Due Diligence to Deal with Dodgy Contractors; Chapter 12: The danger that is a Trojan fraudster; So What Exactly is A Trojan Fraudster?; The Need for Effective Vetting of New Staff and Contractors The Trojan Company

This book shows how anyone who finds they need to investigate a fraud at work can conduct a successful investigation and maximise their chances of recovering stolen money. Drawing on the experiences of the author, including his role in a number of high profile cases at two organisations at the heart of government, the Treasury and the Metropolitan Police, the book is peppered with real life examples and case studies of the 'frauditor's' experiences, and lessons learned the hard way including the cases of: The linguist who was lost for words Doctoring the suits at the hospital A magician at

9780470662144 55 (NL)

Auditing, Internal.
Auditing, Internal.
Forensic accounting.
Forensic accounting.
Fraud - Prevention.
Fraud -- Prevention.

Electronic books.

HV8079.F7 T53 2010

657.458 658.473