Normal view MARC view ISBD view

How to be a Successful Frauditor.

By: Tickner, Peter.
Material type: TextTextSeries: eBooks on Demand.Wiley Corporate F&A: Publisher: Hoboken : Wiley, 2012Description: 1 online resource (667 p.).ISBN: 9780470662144.Subject(s): Auditing, Internal | Auditing, Internal | Forensic accounting | Forensic accounting | Fraud - Prevention | Fraud -- PreventionGenre/Form: Electronic books.Additional physical formats: Print version:: How to be a Successful FrauditorDDC classification: 657.458 | 658.473 Online resources: Click here to view this ebook.
Contents:
Cover; Title page; Copyright page; Foreword; Preface; Acknowledgments; Part I: Understanding fraud; Chapter 1: Fraud overview; What do We Mean by Fraud?; Drawing A Distinction Between Fraud and Corruption; Cash, Cash, Cash; The Basic and Basis of All Cash-Handling Frauds-Teeming and Lading; Chapter 2: Fraud basics; Think Fraud First!; Peter's Pointers to Peculation (i.e., Fraud); Some Basic Frauds Against Organisations; Part II: Planning and managing; Chapter 3: Planning A fraud investigation; Setting the Strategy for the Fraud Investigation; Planning the Initial Investigation
First Steps, Stopping the Losses and Starting the Initial Fact-FindingExpenses-The Short-Cut Route to Success; Case Study: Answers; Chapter 4: Managing the investigation; Why Effective Managing is the Next Most Important Task After Planning; Getting the Basics Right; Tips and Suggestions to Help Manage the Investigation; Chapter 5: Gathering and using intelligence and evidence; What is the Difference Between Intelligence and Evidence?; Gathering the Evidence; Email: can It be Evidence?; Witness Evidence Gathering; Chis or Informant? What are the Differences-and the risks?
Disclosure, Disclosure, DisclosurePart III: Investigation techniques; Chapter 6: Using analysts to support the investigation; Understanding the Role of A Fraud Investigation Analyst; Tasking Analysts Effectively; Making Sure That You Get the Right Result; Using Analysts During Civil and Criminal Cases; Chapter 7: Technology that aids fraud detection; Common Technological Tools Available to the Fraud Investigator; Taking the Internet Into the Fraud-Finder's Tent; Spreadsheet Versus Database?; Data Interrogation Tools; Using Specialised Data-Mining Tools
Chapter 8: Considering covert surveillanceWhat is Covert Surveillance?; What Might Be Done and When could You Consider It?; Counter-Surveillance, What to do If You are Under Attack; Using Evidence and Intelligence Gathered Through Covert Surveillance; Chapter 9: Fraud interviewing techniques; When You May Need to Interview; Understand Yourself Before You Try to Understand Others; General Principles for Fraud Interviewing; Chapter 10: Advanced techniques in fraud investigation; Advanced Techniques in The Context of This Book; The Appliance of Science …; Where Attributes Come to the Fore
The Value of Variable SamplingUsing General Sampling Theory to Advantage in A Fraud Investigation; Fuzzy Logic and Data Interpretation; Hunting the Hunter; Part IV: Fraud types; Chapter 11: Catching your crooked contractor; To Catch A Crooked Contractor …; Common Categories of Corrupt Contractors (In Ascending Order of Size); Using Companies House and Financial Assessments to Best Advantage; Using Due Diligence to Deal with Dodgy Contractors; Chapter 12: The danger that is a Trojan fraudster; So What Exactly is A Trojan Fraudster?; The Need for Effective Vetting of New Staff and Contractors
The Trojan Company
Summary: This book shows how anyone who finds they need to investigate a fraud at work can conduct a successful investigation and maximise their chances of recovering stolen money. Drawing on the experiences of the author, including his role in a number of high profile cases at two organisations at the heart of government, the Treasury and the Metropolitan Police, the book is peppered with real life examples and case studies of the 'frauditor's' experiences, and lessons learned the hard way including the cases of: The linguist who was lost for words Doctoring the suits at the hospital A magician at
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
HV8079.F7 T53 2010 (Browse shelf) http://uttyler.eblib.com/patron/FullRecord.aspx?p=693288 Available EBL693288

Cover; Title page; Copyright page; Foreword; Preface; Acknowledgments; Part I: Understanding fraud; Chapter 1: Fraud overview; What do We Mean by Fraud?; Drawing A Distinction Between Fraud and Corruption; Cash, Cash, Cash; The Basic and Basis of All Cash-Handling Frauds-Teeming and Lading; Chapter 2: Fraud basics; Think Fraud First!; Peter's Pointers to Peculation (i.e., Fraud); Some Basic Frauds Against Organisations; Part II: Planning and managing; Chapter 3: Planning A fraud investigation; Setting the Strategy for the Fraud Investigation; Planning the Initial Investigation

First Steps, Stopping the Losses and Starting the Initial Fact-FindingExpenses-The Short-Cut Route to Success; Case Study: Answers; Chapter 4: Managing the investigation; Why Effective Managing is the Next Most Important Task After Planning; Getting the Basics Right; Tips and Suggestions to Help Manage the Investigation; Chapter 5: Gathering and using intelligence and evidence; What is the Difference Between Intelligence and Evidence?; Gathering the Evidence; Email: can It be Evidence?; Witness Evidence Gathering; Chis or Informant? What are the Differences-and the risks?

Disclosure, Disclosure, DisclosurePart III: Investigation techniques; Chapter 6: Using analysts to support the investigation; Understanding the Role of A Fraud Investigation Analyst; Tasking Analysts Effectively; Making Sure That You Get the Right Result; Using Analysts During Civil and Criminal Cases; Chapter 7: Technology that aids fraud detection; Common Technological Tools Available to the Fraud Investigator; Taking the Internet Into the Fraud-Finder's Tent; Spreadsheet Versus Database?; Data Interrogation Tools; Using Specialised Data-Mining Tools

Chapter 8: Considering covert surveillanceWhat is Covert Surveillance?; What Might Be Done and When could You Consider It?; Counter-Surveillance, What to do If You are Under Attack; Using Evidence and Intelligence Gathered Through Covert Surveillance; Chapter 9: Fraud interviewing techniques; When You May Need to Interview; Understand Yourself Before You Try to Understand Others; General Principles for Fraud Interviewing; Chapter 10: Advanced techniques in fraud investigation; Advanced Techniques in The Context of This Book; The Appliance of Science …; Where Attributes Come to the Fore

The Value of Variable SamplingUsing General Sampling Theory to Advantage in A Fraud Investigation; Fuzzy Logic and Data Interpretation; Hunting the Hunter; Part IV: Fraud types; Chapter 11: Catching your crooked contractor; To Catch A Crooked Contractor …; Common Categories of Corrupt Contractors (In Ascending Order of Size); Using Companies House and Financial Assessments to Best Advantage; Using Due Diligence to Deal with Dodgy Contractors; Chapter 12: The danger that is a Trojan fraudster; So What Exactly is A Trojan Fraudster?; The Need for Effective Vetting of New Staff and Contractors

The Trojan Company

This book shows how anyone who finds they need to investigate a fraud at work can conduct a successful investigation and maximise their chances of recovering stolen money. Drawing on the experiences of the author, including his role in a number of high profile cases at two organisations at the heart of government, the Treasury and the Metropolitan Police, the book is peppered with real life examples and case studies of the 'frauditor's' experiences, and lessons learned the hard way including the cases of: The linguist who was lost for words Doctoring the suits at the hospital A magician at

Description based upon print version of record.

Author notes provided by Syndetics

Peter Tickner, Reading, UK, Director of Peter Tickner Associates Ltd. Peter was the Director of Internal Audit for London's Metropolitan Police Service ('Scotland Yard') between 1995 and 2009. In his early career he was an external auditor for the NHS. Peter was also Head of Internal Audit at Her Majesty's Treasury between 1988 and 1995. He has held past positions as a Director of the Institute of Internal Auditors (UK and Ireland), Chair of the Editorial Board for the IIA Journal and as a senior lecturer at the Civil Service College. He is a regular speaker and presenter at international antifraud and corruption conferences and through his company provides training and presentations to help organisations deal with fraud and corruption in the workplace.

There are no comments for this item.

Log in to your account to post a comment.