StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Threat of Fraud in the Organization - Assignment Example

Cite this document
Summary
This report “The Threat of Fraud in the Organization” will give an abstract of the main document body, review identity theft and the threat of fraud, measures, and approaches to protect executives, give an overview of how to prepare a loss prevention workshop and close with a conclusion…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.7% of users find it useful
The Threat of Fraud in the Organization
Read Text Preview

Extract of sample "The Threat of Fraud in the Organization"

  The Threat of Fraud in the Organization  Introduction In a survey done by the Chief Executive Group, 54 percent of senior executives responded that identity theft was their greatest worry, followed by third party lawsuits (Wren, 2011). This report will give an abstract of the main document body, review identity theft and the threat of fraud, measures and approaches to protect executives, give an overview of how to prepare a loss prevention workshop and close with a conclusion Abstract             Identity theft has been found to be a major challenge facing executives. Crooks have been getting ever smarter and now target executives of small to medium enterprises where for instance fictitious orders for goods or credit lines are initiated and the goods are shipped to a third party. This causes considerable losses to companies and executives. Identity theft can be managed by ensuring stronger internal control and monitoring systems such as using the RCSA, encrypting sensitive data, and obtaining insurance for the executives. A workshop organized to sensitize executives on fraud would include a participatory and self assessment session to monitor uptake of information by attendants. Literature 1. Answer to question 1 (a and b); How would you protect corporate executives of fraudulent acts against them?             Identity theft refers to the act of stealing or gaining another person’s identifying and personal information such as a social security number or credit card numbers by unauthorized means and using or having the intention to use the information fraudulently (van der Meulen, 2011). The first step in protecting executives would be to get insurance in the director and officer insurance form to cover against loss of wealth and associated assets. An executives' signature can for example be used to fraudulently get a binding agreement with the company, which would be detrimental to the company such as using the executive’s identity to access credit lines, which are not approved. The company would need to ensure it and its and executives are under the 'Merchant Risk Council' which is a group of over 7 800 merchants, financial institutions, law enforcement agencies and vendors who work together to enhance cyber frauds for example financial institutions would have to call the company before processing a credit card application. Of course improving cyber security at the business would be a viable step. Cyber crime occurs when three principal factors are present; opportunity, rationalization and pressure as the fraud triangle shows. Financial pressure Opportunity Rationalization                                                                       Financial The pressures to steal ID's are primarily financial or hobby and the fraudsters never share their problems or intentions to solve them especially through fraud. Rationalization is the act of someone justifying their fraudulent behavior and reconciling themselves with it so that they commit it without feelings of guilt. Opportunity refers to the capability to steal identities or commit fraud and crooks do their best to cover their tracks. Opportunity is the result of weak control systems in the company and is the one area where most business entities are most vulnerable since while they take steps to minimize fraud, crooks devise ever sophisticated methods to go around the security systems (Singleton & Singleton, 2010). A lot of focus would be directed to minimizing opportunity for ID theft by having firewalls and current anti spy ware in addition to installing anti malware and ant viruses in the computer systems and networks at the company. The use of password encryption and encryption of important information such as credit cards, social security numbers and other personal information would be stressed as this renders information unusable and inaccessible to third parties . The company's network would be based on a more secure server software such as Linux in which the kernel is modified to make it harder for crooks to attack  the system. A system to monitor what information employees passed on through the internet, chat rooms and by phone would be put into place with key words being detected (“Identity theft protection”, 2012). This would reduce internal risks of disgruntled employees passing out sensitive information. This would greatly reduce the 'opportunity' aspect in the fraud triangle; fraud is possible when all three 'corners' of the triangle are present. Other measures such as keenly going through monthly statements of credit and debit cards will help identify ongoing violations such as a credit purchase you did not make. On detection, the necessary quick steps should be taken to mitigate and stop further violations (Goodridge, 2009). 2. If you were requested by the chairman of the corporation to create a loss prevention education workshop for the corporate executives, how would you create it for implementation?            The loss prevention workshop would start by defining what fraud is, the common forms of fraud and how they are likely to be committed. The managers would also be enlightened on the personal implications and liabilities identity theft would have on them. They would then be given a presentation on personal as well as corporate measures to take to reduce chances for identity theft and most importantly the steps to take to mitigate incidences such as encrypting sensitive information and obtaining director and officer insurance to mitigate personal losses. Once any sign of a fraud is detected, an immediate report should be made to the relevant authorities such as law enforcement, financial institutions, and the insurance company. Early and quick reporting would ensure the insurance company does not honor its part of the bargain due to a time lapse in reporting frauds or attempted fraud. A risk control self  assessment (RCSA) system would be of great benefit to the organization as it would ensure there is  information on the company's exposure to fraud risks in good time to enable minimize risk and implement mitigation measures (“Risk control self assessment”, March 2010). It is also an indispensable tool to utilize for day-to-day risk of fraud monitoring at the business level. Outlining the objectives and the learning outcomes with a participatory and assessment session at the end of the workshop would ensure the attendees are more focused and learn in anticipation of a 'participation' session to test and demonstrate learning. Each attendant would have to fill in a 'personal fraud prevention strategy plan' where they would fill in the kinds of frauds they think are possible, what they have done about it and what they are doing towards mitigating that threat. This would be to test awareness and knowledge as regards identity theft. Once they do this, a score would be given and then we would all go through the steps in preparing a personal loss prevention strategy, identify existing gaps and propose strategies. This is called a risk control self assessment (RCSA); a method to mitigate risks through having timely information and risks. The executives would need to participate by giving ideas and suggestions to demonstrate their learning and internalization of the process of reducing and managing identity theft risks. 3. Please use examples to accentuate your plans and theories through academic criminal justice subject matter or real life criminal justice examples that are not in academic journals. Several firms exist that provide identity theft protection for individuals and corporates. The services include mnitoring of credit cards, threats and contact monitoring of threats of identity exposure. An example is Lifelock that also ofers a remediation service for stolen or lost wallets to stop usage or replace lost credit cards as well as complete recovery assistance and services if one's identity is stolen while subscribed to their service. This achieved through identity monitoring, checking for threats to identity theft, tracking and response services to identity theft (Angwin, 2009). Conclusion             Fraudsters used to target individual or anyone they could get their hands on. However, businesses and executives are increasingly being targeted. 54 percent of respondents on worries faced by executives said identity theft was their main worry. Implementing a personal risk mitigation strategy would be important in reducing risk, implementing strong internal control systems, getting director and officer insurance as well as constant monitoring of the system using the RCSA to mitigate and report risks in good time. References Angwin, J. (2009). The fallacy of identity theft. The Wall Street journal, Retrieved from http://online.wsj.com/article/SB125537784669480983.html Goodridge, E. (2009, May 01). Steps to prevent identity theft, and what to do if it happens. The New York times. Retrieved from http://www.nytimes.com/2009/05/02/your-money/identity-theft/02idtheftprimer.html?pagewanted=all Identity theft protection: Protect your computer. (2012, January). Retrieved from http://www.spamlaws.com/protect-your-computer.html Risk control self assessment. (2010, March 10). Retrieved from http://www.ior-institute.org/education/sound-practice-guidance/142-sound-practice-guidance-part-2   Singleton, T., & Singleton, A. (2010). Fraud auditing and forensic accounting. (4th edition ed., pp.         44-53). Hoboken, NJ: John Wiley & Sons. Van der Meulen, N. (2011). Financial identity theft: Context, challenges and countermeasures. (pp. 32-33). The Hague, Netherlands: T M C ASSER PRESS. Wren, P. (2011, July 26). Lawsuits, identity theft keep ceos up at night lawsuits, identity theft keep           ceos     up at night . Retrieved from http://www.prnewswire.com/news-releases/lawsuits-identity-theft-       keep-ceos-up-at-night-126166523.html   Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Threat of Fraud in the Organization Assignment”, n.d.)
Retrieved from https://studentshare.org/law/1442565-the-threat-of-fraud
(The Threat of Fraud in the Organization Assignment)
https://studentshare.org/law/1442565-the-threat-of-fraud.
“The Threat of Fraud in the Organization Assignment”, n.d. https://studentshare.org/law/1442565-the-threat-of-fraud.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Threat of Fraud in the Organization

Information Systems Audit and Control: Computer Fraud

hellip; In this paper, through conceptual and analytical research, the author investigates the elements of fraud and the study the details of the recently committed acts of frauds in various organizations.... As technology becomes more and more convenient and interactive, the lure of fraud seems increasing.... In the paper “Information Systems Audit and Control: Computer Fraud” the author discusses computer frauds, which can inflict enormous damage to an organization and community....
8 Pages (2000 words) Essay

Global Internet Security

Global internet security is a concern for all the world be because of teethe intermeddle have gained many benefits, there are also many disadvantages such as internet fraud, loss of security and privacy, virus attackman, threats to data protection and computer misuse.... Internet that is accessed daily all over the world and is employed for multiple purposes is under threat.... Internalized the gaps between people and their wanted works but it has also given us many disadvantages such as security rethreads computers that are kept and used in global settings are at threat in terms of security and if they are accessed illegally, there will be security threat and the private data of the companies or organizations that are working on international basis can get lost....
19 Pages (4750 words) Essay

Internet Security in the Concept of Globalization

Internet security is a concern for all the world because due to internet, where people have gained many benefits, there are also many disadvantages such as internet fraud, loss of security and privacy, virus attacks, spamming, a threat to data protection and computer misuse.... nternet is accessed daily all over the world and is employed for multiple purposes is under threat.... The Internet has minimized the gaps between people and their wanted works but it has also given us many disadvantages such as security threat....
7 Pages (1750 words) Case Study

The Threat of Fraud

This report “the threat of fraud” will give an abstract of the main document body, review identity theft and the threat of fraud, measures, and approaches to protect executives, give an overview of how to prepare a loss prevention workshop and close with a conclusion.... A workshop organized to sensitize executives on fraud would include a participatory and self-assessment session to monitor uptake of information by attendants.... Cybercrime occurs when three principal factors are present; opportunity, rationalization, and pressure as the fraud triangle shows....
5 Pages (1250 words) Assignment

The Role of Auditing and Assurance

The vices are very costly to the organization and sometimes may be the beginning of the downfall of an organization.... Most organizations experience cases of fraud, mismanagement of resources, and corruption among other vices.... It analyses the books of account of an organization critically.... Secondly, they are mandated with the responsibility of verifying the assets and liabilities of an organization.... Furthermore, they detect and prevent errors and fraud from occurring....
12 Pages (3000 words) Assignment

Critical Literature Review

A detailed definition of occupational frauds clearly depicts that the commitment of this crime takes place when an employee related to any organization misuses his job position and employee regard in that organization for personal enrichment, overlooks the wrong or suspicious activities of its subordinates, holds a certain share of direct or indirect involvement in any activity that is not fruitful for the organization, involves third parties in the confidential details and information about the job it is responsible for and earn a fortune from it, makes an attempt to victimize the organization in collaboration with third parties, and involves itself in harming or damaging the image and repute of the organization (Blount, 2003, pp....
11 Pages (2750 words) Essay

Cyber Net Fraud and How They Can Affect Accounting Information Systems

Accounting information systems are always designed in accordance with the individual requirements of a business organization.... This research is being carried out to illustrates the different forms of cyber net fraud and how they can affect business accounting information systems.... The most common form of cyber net fraud is the distribution and use of rogue security software.... hellip; This research will begin with the statement that cyber net fraud also commonly known as internet fraud refers to the process of using the internet and software that can access it to defraud people....
6 Pages (1500 words) Research Paper

Purchasing and Distribution of Procurement Fraud

fraud in supply chain operations affects different touch points like purchasing, manufacturing, and distribution.... This study highlights the concept of procurement fraud.... Procurement fraud can be considered as one of the complex frauds that take place in supply chain activities.... The case study clearly reflects upon such fraud cases related to procurement.... This form of unethical behavior results in procurement fraud....
9 Pages (2250 words) Book Report/Review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us