A Comprehensive Look at Fraud Identification and Prevention

Book description

Fraudulent activity can approach you or your organization through a variety of avenues, ranging from the cyber world, social media, unsolicited e-mails, poor hiring practices, dishonest associates, and weak operating procedures. With a focus on prevention measures, A Comprehensive Look at Fraud Identification and Prevention presents proven tips, advice, and recommendations for fraud awareness, protection, and prevention.

The book supplies a detailed examination of the wide range of threats that exist to provide you with a plan to protect the assets of your organization, and even your own assets, against the many faces of fraud in today's technologically advanced environment. The many types of fraud covered include:

  • Employee theft and fraud
  • Organizational fraud
  • Identity theft and fraud
  • Fraud against the elderly
  • Internet, computer, and e-mail fraud
  • Ponzi and pyramid schemes

The methods of prevention presented in the book are based on what is referred to as the path of least resistance. With fraud and other types of criminal activity, criminals take the path with the fewest barriers in their way. By implementing the methods presented in this book, you will be able to deter would-be criminals and send them on their way to search for easier targets with fewer barriers.

Discussion categories include identification and prevention aspects for organizational and individual frauds along with the many avenues used to facilitate the attacks. Explaining how some fraud typologies can overlap and co-mingle, the book provides the methods you need to protect your organization, and yourself, from becoming a target and victim of fraud.

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents (1/2)
  4. Contents (2/2)
  5. Foreword
  6. Fraud and Prevention
  7. About the Author
  8. Chapter 1: Fraud (1/2)
  9. Chapter 1: Fraud (2/2)
  10. Chapter 2: Employee Theft and Fraud (1/5)
  11. Chapter 2: Employee Theft and Fraud (2/5)
  12. Chapter 2: Employee Theft and Fraud (3/5)
  13. Chapter 2: Employee Theft and Fraud (4/5)
  14. Chapter 2: Employee Theft and Fraud (5/5)
  15. Chapter 3: Organizational Fraud (1/5)
  16. Chapter 3: Organizational Fraud (2/5)
  17. Chapter 3: Organizational Fraud (3/5)
  18. Chapter 3: Organizational Fraud (4/5)
  19. Chapter 3: Organizational Fraud (5/5)
  20. Chapter 4: Small Business Fraud (1/3)
  21. Chapter 4: Small Business Fraud (2/3)
  22. Chapter 4: Small Business Fraud (3/3)
  23. Chapter 5: Investment Fraud (1/5)
  24. Chapter 5: Investment Fraud (2/5)
  25. Chapter 5: Investment Fraud (3/5)
  26. Chapter 5: Investment Fraud (4/5)
  27. Chapter 5: Investment Fraud (5/5)
  28. Chapter 6: Organized Retail Fraud/­Theft (1/4)
  29. Chapter 6: Organized Retail Fraud/­Theft (2/4)
  30. Chapter 6: Organized Retail Fraud/­Theft (3/4)
  31. Chapter 6: Organized Retail Fraud/­Theft (4/4)
  32. Chapter 7: Frauds Targeting the Individual (1/8)
  33. Chapter 7: Frauds Targeting the Individual (2/8)
  34. Chapter 7: Frauds Targeting the Individual (3/8)
  35. Chapter 7: Frauds Targeting the Individual (4/8)
  36. Chapter 7: Frauds Targeting the Individual (5/8)
  37. Chapter 7: Frauds Targeting the Individual (6/8)
  38. Chapter 7: Frauds Targeting the Individual (7/8)
  39. Chapter 7: Frauds Targeting the Individual (8/8)
  40. Chapter 8: Frauds against the Elderly (1/4)
  41. Chapter 8: Frauds against the Elderly (2/4)
  42. Chapter 8: Frauds against the Elderly (3/4)
  43. Chapter 8: Frauds against the Elderly (4/4)
  44. Chapter 9: Advance Fee Fraud (1/6)
  45. Chapter 9: Advance Fee Fraud (2/6)
  46. Chapter 9: Advance Fee Fraud (3/6)
  47. Chapter 9: Advance Fee Fraud (4/6)
  48. Chapter 9: Advance Fee Fraud (5/6)
  49. Chapter 9: Advance Fee Fraud (6/6)
  50. Chapter 10: Identity Theft/­Identity Fraud (1/6)
  51. Chapter 10: Identity Theft/­Identity Fraud (2/6)
  52. Chapter 10: Identity Theft/­Identity Fraud (3/6)
  53. Chapter 10: Identity Theft/­Identity Fraud (4/6)
  54. Chapter 10: Identity Theft/­Identity Fraud (5/6)
  55. Chapter 10: Identity Theft/­Identity Fraud (6/6)
  56. Chapter 11: Internet Fraud (1/7)
  57. Chapter 11: Internet Fraud (2/7)
  58. Chapter 11: Internet Fraud (3/7)
  59. Chapter 11: Internet Fraud (4/7)
  60. Chapter 11: Internet Fraud (5/7)
  61. Chapter 11: Internet Fraud (6/7)
  62. Chapter 11: Internet Fraud (7/7)
  63. Chapter 12: Internet, Computer, and E-­mail Fraud (1/4)
  64. Chapter 12: Internet, Computer, and E-­mail Fraud (2/4)
  65. Chapter 12: Internet, Computer, and E-­mail Fraud (3/4)
  66. Chapter 12: Internet, Computer, and E-­mail Fraud (4/4)
  67. Appendix A: Social Security Number Prefixes
  68. Appendix B: Advance Fee Fraud Scheme Letters (1/4)
  69. Appendix B: Advance Fee Fraud Scheme Letters (2/4)
  70. Appendix B: Advance Fee Fraud Scheme Letters (3/4)
  71. Appendix B: Advance Fee Fraud Scheme Letters (4/4)
  72. Appendix C: Work-­at-­Home, Mystery Shopping, Inheritance, and Lottery Schemes (1/3)
  73. Appendix C: Work-­at-­Home, Mystery Shopping, Inheritance, and Lottery Schemes (2/3)
  74. Appendix C: Work-­at-­Home, Mystery Shopping, Inheritance, and Lottery Schemes (3/3)
  75. Back Cover

Product information

  • Title: A Comprehensive Look at Fraud Identification and Prevention
  • Author(s): James R. Youngblood
  • Release date: May 2015
  • Publisher(s): CRC Press
  • ISBN: 9781498700337