To see the other types of publications on this topic, follow the link: Fraud Investigation.

Journal articles on the topic 'Fraud Investigation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Fraud Investigation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Humin, Oleksiy, Viktoriia Zarubei, and Olha Rymarchuk. "CONCERNING THE NEED FOR IMPROVEMENT OF THE METHODOLOGY OF INVESTIGATING FRAUDS AND DEVELOPMENT OF METHODS OF INVESTIGATION OF ITS INDIVIDUAL TYPES." Baltic Journal of Economic Studies 4, no. 5 (February 11, 2019): 63. http://dx.doi.org/10.30525/2256-0742/2018-4-5-63-66.

Full text
Abstract:
Nowadays in a difficult economic situation, frauds have become widespread in Ukraine in various spheres of human life. Increase in the number and quality of such crimes leads to significant losses of financial resources not only of citizens but of the state as a whole. Therefore, an important issue for our nowadays is the study of the mechanism of rapid, complete, and effective investigation and prevention of such crimes. In Ukraine, there is an active awareness of the population about the ways of committing such crimes and creating measures to protect confidential information. However, official statistics show a significant amount of fraud and an insufficient level of their disclosure. One of the reasons is the obsolete methods of investigating fraud and the lack of methods for investigating certain types of it. The aim of the article is to analyse scientific research in order to establish a level of methodological support for law enforcement agencies in investigating fraud. Due to the fact that methodological provision of practical divisions plays the leading role in the fast, full, and effective investigation of frauds, therefore, the studied question deserves a special attention. Methodology. The author substantiates the need to improve the existing methodological recommendations because since over time they lose their content. Besides, there is the necessity to create new techniques that are not reflected in the writings of scientists in investigating various types of fraud. Based on the analysis of forensic literature, we can make a conclusion that most of the scientific works are devoted to the investigation of fraud with financial resources. Therefore, the author proposes to pay attention to other types of fraud and to formulate methodological recommendations for practical units to young and experienced scientists on the basis of their own research. Results. The concepts and types of fraud are defined in the article. Besides, the works of criminologists, which are devoted to the peculiarities of investigating such types of crimes, are analysed. The official statistics, which impresses with data on undisclosed fraud, are presented here. This once again confirms the necessity for scientific development of the mentioned problem. A particular attention is paid to the lack of proper methodological support for practical units during the investigation of such types of crimes. In this regard, the author provides corresponding suggestions that will help to improve the investigation. Practical impact. Since the fraud investigation technique helps to the most successful achievement of the objectives of criminal justice, then in order to reduce the number of undisclosed crimes, it is necessary to develop and provide practical guidance to the methodical recommendations in a timely manner. Correlation/originality. The urgent issue of nowadays is a complete, effective investigation of criminal offenses, and fraud is no exception. The improvement of the methodology for fraud investigations and the development of methods for investigating certain types of fraud is a necessary step for it.
APA, Harvard, Vancouver, ISO, and other styles
2

Peterson, Bonita K., and Thomas H. Gibson. "Fraud Detection and Investigation: Microcomputer Consulting Services." Issues in Accounting Education 14, no. 1 (February 1, 1999): 99–115. http://dx.doi.org/10.2308/iace.1999.14.1.99.

Full text
Abstract:
This nonfictional case of inventory fraud in a university setting exposes students to fraud detection and investigation. These skills are becoming increasingly important for auditors, as evidenced by the alarming rate of fraud. The accounting profession has acknowledged the seriousness of this issue with the issuance of SAS No. 82, Consideration of Fraud in a Financial Statement Audit, developed in part to improve detection of frauds by auditors. The case raises many of the fraud-related issues faced by accountants: recognizing red flags indicative of fraud; the importance of a good system of internal controls; the profile of the typical fraud perpetrator; the fine line auditors walk when investigating a fraud; the need to develop an audit team with the appropriate level of expertise which may require members from a variety of disciplines (e.g., investigative, legal and forensic areas); and the difficulty of obtaining sufficient evidence to prosecute and convict perpetrators.
APA, Harvard, Vancouver, ISO, and other styles
3

Lokanan, Mark Eshwar. "A fraud investigation plan for a false accounting and theft case." Journal of Financial Crime 26, no. 4 (October 7, 2019): 1216–28. http://dx.doi.org/10.1108/jfc-09-2017-0086.

Full text
Abstract:
Purpose The purpose of this paper is to formulate and propose a fraud investigation plan that forensic accountants can use to investigate financial frauds. In particular, the paper sets out the structure and rationale of the fraud investigation plan that both forensic accountants and fraud examiners can use in their investigation of false accounting and theft charges. Design/methodology/approach The paper uses the material facts from the Polly Peck International fraud as a prototype case upon which to build an investigation plan and detail potential areas of investigation to establish evidence for a criminal trial. Findings The findings revealed that the case can be used to provide insights on evidence gathering techniques and test particular models of fraud detection. The concealment and conversion evidence gathering techniques provide fodder on how to gather and triangulate both direct and circumstantial evidence that can be used to avoid mistrials in courts. Practical implications The case is of interest to practitioners and forensic and fraud examination students who would like to build on their existing knowledge and obtain insights into the steps to follow to conduct an investigation and gather evidence to build a case. The paper makes specific recommendations to enhance the effectiveness and efficiency of investigations. Originality/value The paper is among one of the few to propose a fraud investigation plan designed to investigate cases involving false accounting and theft charges. More importantly, the paper uses a real case to illustrate how to examine documentation/data and how such documentation will be analysed in a trial.
APA, Harvard, Vancouver, ISO, and other styles
4

Hidayati, Anisa Nur, Imam Riadi, Erika Ramadhani, and Sarah Ulfah Al Amany. "Development of conceptual framework for cyber fraud investigation." Register: Jurnal Ilmiah Teknologi Sistem Informasi 7, no. 2 (April 28, 2021): 125. http://dx.doi.org/10.26594/register.v7i2.2263.

Full text
Abstract:
The increase in the number of internet users in Indonesia as much as 175.4 million as recorded in the Datareportal.com report and 4.83 billion globally, impact the increase in the number of cyber fraud cases. Data states that 96% of fraud cases are not resolved due to fraud methods carried out online and make it difficult for legal officers to obtain evidence. Previous fraud investigation research mainly focused on fraud detection, so this research focuses on submitting a framework for investigating cyber fraud cases. The cyber fraud case requires a new framework for investigation because in this fraud case, there is digital evidence that is very prone to be damaged, lost, or modified, which makes this case unsolved. This research aims to develop a framework that is expected to help auditors to uncover cases of cyber fraud so that resolved cyber fraud cases can increase. The method used in making this framework uses Jabareen's conceptual framework development method, which consists of 6 stages, namely, Mapping the selected data source, extensive reading and categorizing of the chosen data, Identifying and naming objects, Deconstructing and categorizing the concept, Integrating concept, Synthesis, resynthesis. And make it all sense. The framework for cyber fraud investigation uses 22 digital forensic frameworks and eight frameworks for fraud audit investigations. The results of developing a framework using the Jabareen method resulted in 8 stages, integrating various concepts selected from digital forensics and fraud audits. Evaluation of framework development was carried out by giving limited questionnaires to practitioners and academics, which produced 89% for the feasibility value and needs of the framework and 67% there is no need for changes to the framework being developed.
APA, Harvard, Vancouver, ISO, and other styles
5

Srinitri, Ni Made, Umar Ma'ruf, and Munsharif Abdul Chalim. "Progressivity Of Criminal Handling Fraud And Disease By The Directorate Of The General Criminal Reserse Of Central Java Regional Police (POLDA)." Jurnal Daulat Hukum 3, no. 1 (April 22, 2020): 229. http://dx.doi.org/10.30659/jdh.v3i1.8777.

Full text
Abstract:
This study aims to determine and analyze the process of handling fraud and embezzlement by Central Java Regional Police Criminal Investigation investigators and the progress of handling fraud and embezzlement crime at the Central Java Regional Police Criminal Investigation Directorate. The approach method used is empirical juridical with descriptive analytical research specifications. The data used in the form of primary data and secondary data so that the method of data collection through field studies and literature studies. Data analysis method used is qualitative analysis. As a knife of analysis, the concepts of restorative justice, legal system theory and progressive legal theory are used.The results of the study concluded that the process of investigating fraud and embezzlement in the East Java Regional Police Criminal Investigation Directorate was in accordance with the provisions of the Criminal Procedure Code and the National Police Chief Regulation Number 6 of 2019 on Criminal Investigations. The progress in handling fraud and embezzlement in the Central Java Regional Police Criminal Investigation Directorate is related to the application of restorative justice in investigating criminal acts that starts with two components of the legal basis, namely rules and behavior. The regulatory component appears from a number of legal rules regarding the application of restorative justice in investigations that have been regulated in police regulations,Keywords: Progressiveness; Fraud And Embezzlement; Restorative Justice.
APA, Harvard, Vancouver, ISO, and other styles
6

Nanda Fatar Julaidi and Agustin Fadjarenie. "Pemberdayaan Pusat Knowledge Sharing Untuk Meningkatkan Keahlian Investigasi Kecurangan Bagi Auditor Internal." Jurnal Ekonomi 28, no. 1 (March 30, 2023): 80–97. http://dx.doi.org/10.24912/je.v28i1.1381.

Full text
Abstract:
The role of identifying and investigating fraud for organizations and technological developments complicate organizational dynamics and require the competence and expertise of internal auditors to detect fraud within organizations. The purpose of this research is to obtain empirical evidence about the effect of auditors' risk assessment skills, understanding of industry characteristics and knowledge sharing on internal auditors' fraud investigation abilities. The research methodology in this study is quantitative, the population in this study is part of the internal audit of a leading consumer goods company in Indonesia using census techniques with a total of 60 people. Data collection was carried out using a questionnaire. The results of this study, all variables affect the ability of internal audit fraud investigations. This study implies the importance of enhancing the skills of internal auditors by strengthening internal discussions within organizations as “knowledge-sharing centers” to enhance the fraud investigation capabilities of internal auditors.
APA, Harvard, Vancouver, ISO, and other styles
7

Baroto, Wishnu Agung. "Advancing Digital Forensic through Machine Learning: An Integrated Framework for Fraud Investigation." Asia Pacific Fraud Journal 9, no. 1 (June 1, 2024): 1–16. http://dx.doi.org/10.21532/apfjournal.v9i1.346.

Full text
Abstract:
The rise of cybercrime and cyber-related crime encourages efficient digital forensic investigations more crucial than ever before. Traditional investigation methods can be time-consuming, costly, and resource-intensive, while machine learning algorithms have the potential to reduce the complexity by promoting automation and investigation capabilities. This study begins with an analysis of digital forensics framework using a document analysis methodology. Moreover, exploring current practice and potential implementation of machine learning in digital forensics for fraud investigation is demonstrated through the features of Autopsy 4.15.0, a widely known digital forensics tool. The findings suggest the implementation of a comprehensive digital forensic framework that prioritizes the interpretation phase, with the support of machine learning capabilities. At present, machine learning mainly supports the analysis phase, which happens to be the most time-intensive process of digital forensic investigations. Furthermore, as fraud investigation has a role of fraud detection and prevention, current digital forensics procedures do not support the fraud detection and prevention process, despite the potential for machine learning to support this through pattern recognition.These discoveries are particularly significant in the fight against fraudulent activities, such as tax fraud, data fraud, financial fraud, and asset misappropriation, in the digital age.
APA, Harvard, Vancouver, ISO, and other styles
8

Kanapickienė, Rasa, and Živilė Grundienė. "Actions to detect fraud in financial statements." Buhalterinės apskaitos teorija ir praktika, no. 15A (July 9, 2014): 37–48. http://dx.doi.org/10.15388/batp.2014.15a.3.

Full text
Abstract:
The information provided in financial statements should be neutral and reliable thus enabling the users of the financial statements to make financially legitimate decisions regarding the perspectives of the company’s development. Therefore the reference documents regulating the composition of financial statements determine that the distortion of the assets, income, costs or other data is strictly forbidden. Nevertheless, fraud in financial statements is a relatively frequent phenomenon in business practice. Hence, in order to detect frauds effectively it is essential to systematize the actions of fraud detection. The aim of the research is to explore the actions of detecting fraud in financial statements, systematize them and evaluate the possibilities of their application in practice. The paper divides the actions of detecting fraud in financial statements into methods and procedures. The methods of detecting fraud in financial statements are classified regarding two aspects: 1) consistency of fraud investigation and 2) applied methods of investigation. According to the consistency of the research, the following methods are distinguished: a) gathering of fraud evidence; b) analysis of fraud risk factors and c) a detailed investigation. To implement each of the methods appropriate procedures are selected. In order to gather the evidence on fraud, it is expedient to apply the following procedures: the use of external (complainant) systems (police reports), secret operations, senior management audit, gathering of unofficial information, application of legal recommendations, confession. While carrying out the analysis of fraud risk factors it is expedient to apply inquiry, monitoring, and analytical procedures. The procedures of fraud detection in the detailed investigation should be classified as audit proofs by distinguishing the variants of these procedures that are more typical of the monitoring institutions. Experts positively evaluated the possibilities to practically apply the analysed actions of detecting fraud in financial statements.
APA, Harvard, Vancouver, ISO, and other styles
9

Rashid, Chnar Abdullah. "A requirement for fraud investigation professionals." Journal of Global Economics and Business 4, no. 12 (January 1, 2023): 75–89. http://dx.doi.org/10.31039/jgeb.v4i12.121.

Full text
Abstract:
In developing countries, fraud and corruption are seen as a way of life, a norm of public service or a culture that cannot hope to disappear. Auditors specialize in error detection and treat fraud and corruption as secondary tasks in a particular business. The primary responsibility of a Forensic Investigation Professional (FIP) or forensic accountant is to investigate fraud in financial records. A certified public accountant is a witness of fact, while a forensic investigator or forensic accountant is an expert witness, not a witness of fact. They can testify in court as experts for either the prosecution or the defence. This paper aims to critically examine the requirements for fraud investigation professionals who need to be obtained by a forensic accountant in investigating fraud as one of the most serious financial crimes in any company. The findings suggest that forensic investigative professionals play a complementary role with government anti-fraud and anti-corruption agencies in strategies and policies to reduce the risk of systemic corruption. Findings also show that Forensic Investigation Professionals (FIPs) play an important role in reducing fraud and corruption risks in developing countries.
APA, Harvard, Vancouver, ISO, and other styles
10

Shawyer, Andie, and Dave Walsh. "Fraud and Peace: Investigative Interviewing and Fraud Investigation." Crime Prevention and Community Safety 9, no. 2 (April 2007): 102–17. http://dx.doi.org/10.1057/palgrave.cpcs.8150035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

CA Hardik Patwa, Dr. Purvi Dipen Derashri. "Forensic Accounting's Crucial Role in Safeguarding the Integrity of India's Banking Sector." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (November 14, 2023): 4842–47. http://dx.doi.org/10.52783/tjjpt.v44.i4.1806.

Full text
Abstract:
The increased use of technology in practically every industry has led to an increase in the complexity of scams. Authorities and corporate leaders face substantial difficulties as a result of the increased difficulty in preventing fraud and other risks. In order to help businesses better manage risk, control, and governance practises while also preventing fraud and accomplishing their goals, forensic accounting has become necessary due to the surge in frauds and hazards brought on by modern technology. Investigative and accounting-based forensic accounting is a technique for identifying and preventing financial crime. Forensic accounting procedures are used to conduct investigations into allegations of fraud, which involve gathering evidence, speaking with witnesses, creating reports, and testifying. Forensic accounting ought to be used while discussing financial catastrophes and the surge in commercial fraud. In all types of economic contexts, forensic accounting offers investigation and litigation support services. A new study focuses on forensic accounting in India. This study demonstrates that forensic accounting lowers fraud in India's banking industry. This conceptual study's compilation used both primary and secondary sources.
APA, Harvard, Vancouver, ISO, and other styles
12

Tseng, Lu-Ming. "Customer insurance frauds: the influence of fraud type, moral intensity and fairness perception." Managerial Finance 45, no. 3 (March 11, 2019): 452–67. http://dx.doi.org/10.1108/mf-04-2018-0162.

Full text
Abstract:
Purpose The purpose of this paper is to examine customers’ ethical attitudes (EA) and intentions toward two types of insurance frauds. This study proposes that the factors, such as fraud types (i.e. opportunistic and planned insurance fraud), moral intensity and fairness perception (FP), can affect the customers’ acceptance of the insurance frauds. Design/methodology/approach To test the research hypotheses of this study, Taiwanese insurance customers are invited in the empirical investigation, and a scenario-based questionnaire is used to collect the data. The hypotheses of this study are tested by using a partial least squares regression. Findings The results show that moral intensity constructs and FP significantly relate to the respondents’ acceptance of insurance frauds, while fraud types also have significant impacts on the respondents’ perceptions of moral intensity and fairness. Originality/value There is no research which has examined the relationships among fraud types, moral intensity, FP, demographic variables and customers’ EA and intentions toward insurance frauds. Understanding the relationships among these variables could provide implications for those involved in the practice of anti-fraud programs.
APA, Harvard, Vancouver, ISO, and other styles
13

EFUNTADE, Alani Olusegun, and Olubunmi Omotayo EFUNTADE. "Internet Payment System, Forensic Accounting and Forensic Investigation: 3M Theory in the Financial Frauds." Journal of Accounting and Financial Management 9, no. 7 (September 9, 2023): 115–30. http://dx.doi.org/10.56201/jafm.v9.no7.2023.pg115.130.

Full text
Abstract:
In view of the rapid development in internet payment system and information and communication technology (ICT) that is changing banks mode of payment operations and bringing innovations to banking transactions, and even the method fraudsters operate as well as the likely effects of their activities on the banks and customers if not tackled, t h i s e x p l o r a t o r y p a p e r e x p l o r e s f orensic accounting, forensic investigation, digital environment, 3M (Manipulation, Misrepresentation, Misapplication) Theory in the Financial Frauds, electronic payment risk management, data mining technique, data matching technique and network security management in internet payment system within banking infrastructures. The paper highlights how forensic accounting and investigation can be employed to resolve the problem of internet and electronic payment fraud and crimes. It is recommended that investigative accounting that will comprehensively entails ICT-related fraud investigation, prevention of fraud and analyzing antifraud ICT-controls in addition to gathering non-financial and financial information should be intensified with modern technology within the banking security infrastructure. There should be fraud control software for financial frauds in digital environment. In today's world where technology has reached a different dimension, sophisticated cases in today's internet banking businesses cannot be revealed by traditional methods and the need for fraud control software against possible negative cases in information environment should be fulfilled in order to eliminate this complexity.
APA, Harvard, Vancouver, ISO, and other styles
14

Boyer, M. Martin. "Centralizing Insurance Fraud Investigation*." Geneva Papers on Risk and Insurance Theory 25, no. 2 (December 2000): 159–78. http://dx.doi.org/10.1023/a:1008766413327.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Chiriac, Alina, Roxana Adriana Mititelu, and Ileana Nișulescu. "Multivariate statistical analysis of the Regional Anti-Fraud Directorate 2 Constanta from 2014 to 2021." Technium Social Sciences Journal 35 (September 9, 2022): 357–66. http://dx.doi.org/10.47577/tssj.v35i1.7352.

Full text
Abstract:
The Regional Anti-Fraud Directorate 2 Constanta (DRAF 2 CT) is a regional structure of the public authority in Romania that has as a priority objective the fight against tax evasion and tax and customs fraud, being one of the most important regions of the General Directorate for Fiscal Fraud due to its strategic position, having many categories of resources or areas of activity. The regional activity is of even more interest now during the conflict in Ukraine, given the fact that Tulcea County is on the border of the conflict zone. The activity of investigating frauds and dismantling transactional chains that lead to damage to the state budget is important both financially and socially. The study focuses on dynamic analysis of the activity of DRAF 2 CT through the indicators reported by it. The paper allows the identification of correlations or interdependencies between the indicators specific to the fraud investigation activity, as well as the foreshadowing of some directions of normative improvement regarding the reporting of the results of the anti-fraud activity.
APA, Harvard, Vancouver, ISO, and other styles
16

Gissel, Jodi L. "Fraud Examination Case: Crafty Cash Theft?" Issues in Accounting Education 29, no. 2 (July 1, 2013): 331–36. http://dx.doi.org/10.2308/iace-50554.

Full text
Abstract:
ABSTRACT This case engages students in an interactive in-class learning activity. Students are given a brief case scenario and the task of investigating fraud in a small company. Pre-class preparations require students to identify likely fraud schemes and how to proceed with the fraud investigation. The in-class portion summarizes students' individual assessments and then emphasizes examination of evidence to resolve the case. The case challenges students to consider how to approach a fraud investigation and what procedures or analyses would provide relevant evidence. The activity also requires students to consider internal control weaknesses and suggestions for improving internal control in a small organization. The intended audience is a graduate-level fraud examination course or auditing course with a fraud examination component. Data Availability: Handouts and solutions are provided in the Teaching Notes.
APA, Harvard, Vancouver, ISO, and other styles
17

Wahid, Abdul. "Tindak Pidana Penipuan Dalam Dimensi Cyber Crime (Studi Kasus Polres Kota Palu)." YUSTISIA MERDEKA : Jurnal Ilmiah Hukum 8, no. 2 (November 14, 2022): 97–101. http://dx.doi.org/10.33319/yume.v8i2.186.

Full text
Abstract:
The formulation of the problem in this study are: (1) How is the process of investigating online fraud crimes in the Palu Police area?. (2) What are the obstacles in the process of investigating online fraud in the Palu Police area?. The author's objectives in conducting this research are as follows: To find out the process of investigating online fraud in the Palu Police area. To find out the obstacles in investigating online fraud cases in the Palu Police area. To find answers to the formulation of the problem that has been formulated, the author uses empirical research methods, namely a study obtained directly from data sources and several documents and references related to fraud offenses. In order to conduct research related to the object to be studied, this research was conducted at the Criminal Investigation Unit of the Palu Police. This place was chosen as the research location on the basis of the community's main choice to carry out legal protection or make reports on criminal cases, especially criminal acts of fraud. The results and conclusions in this study are: the process of investigating online fraud crimes handled by the hammer resort police based on police reports, sending a notification letter for the start of the investigation, expert hands, blocking the suspect's account number, then coordinating with the local police station where the suspect is, then arresting the suspect, Detention, confiscation, collection of evidence, examination of suspects, After the case file is declared complete, it is submitted to the prosecutor's office. Obstacles in the Investigation Process Online fraud crimes are as follows: The perpetrator uses a false identity. Delete account and phone number. The perpetrator is outside the Central Sulawesi area. Tool limitations
APA, Harvard, Vancouver, ISO, and other styles
18

Mysnyk, K. "Forensics as a Method of Economic Investigations: Theoretical Foundations." Economic Herald of the Donbas, no. 3 (69) (2022): 41–46. http://dx.doi.org/10.12958/1817-3772-2022-3(69)-41-46.

Full text
Abstract:
Currently, in connection with the increase in cases of fraud and the complexity of economic crimes, forensics is an effective method of economic investigations and a type of control, the purpose of which is to identify facts of fraud, financial abuse, as well as other criminal acts of investigation. The article analyses and summarizes existing scientific approaches to defining the concept of “forensics”. It is established that the term “forensics” is mostly interpreted as an investigation; effective tool; independent activity; services; type of control, etc. As a result of the research, the concept of “forensics” is proposed to be considered from such positions as: an effective method of economic investigations at enterprises of various forms of ownership and branch orientation in the system of economic security; a complex of independent initiative services for investigation, expertise, analysis, assessment, settlement of situations and development of procedures aimed at combating economic crimes, fraud, corruption, commercial bribery, appropriation of funds and other assets, illegal actions, settlement of disagreements between parties on financial and business issues; a type of control aimed at detecting fraud, financial abuse, as well as other criminal acts of an economic nature. The structure of the provision of forensic services is proposed, which should include the following elements: financial investigations; management of risks related to fraud and economic crimes; corporate (business) intelligence; out-of-court, pre-trial expertise, as well as assistance during court proceedings; investigation of fraud using information systems and digital technologies; opposition to the legalization of illegal income; intellectual property protection; verification of contractual obligations and reliability of business partners; prevention or minimization of financial and reputational losses and risks; identification and analysis of hidden commercial risks; regulation of disagreements between the parties to the conflict on financial and business issues; development of procedures aimed at countering fraud, corruption, withdrawal of funds, appropriation of assets; conducting a compliance investigation; financial examination of documentation.
APA, Harvard, Vancouver, ISO, and other styles
19

Reznik, Oleg, Andrii Fomenko, Andrii Melnychenko, Natalia Pavlova, and Andrii Prozorov. "Features of the initial stage of investigating fraud with financial resources in cyberspace." Revista Amazonia Investiga 10, no. 41 (June 29, 2021): 141–50. http://dx.doi.org/10.34069/ai/2021.41.05.14.

Full text
Abstract:
The article aims to characterize the forensic features of the initial stage of investigating fraud with financial resources in cyberspace, its significance, analysis, and justification as a type of cybercrime that is dangerous for everyone, and prove the need for urgent measures to prevent and combat such criminal offenses. The authors used several methods of scientific cognition: logical-semantic, system-structural, analytical, formal-legal, forecasting, dialectical, interpretation, and hermeneutics. The article focuses on the general provisions of the forensic characteristics of Internet fraud with financial resources; analysis of the information model of the mechanism of committing fraud with financial resources in the field of computer information; coverage of the tactical features of individual investigative actions at the initial stage of the investigation of fraud with financial resources in cyberspace. It was concluded that the effectiveness of combating Internet fraud and the level of cybersecurity in Ukraine is very low. Therefore, the investigation of fraud with financial resources in cyberspace requires in-depth specific knowledge from the subjects of the investigation.
APA, Harvard, Vancouver, ISO, and other styles
20

Musalam, Lulwa Isa AI, and Gagan Kukreja. "The Role of Forensic Accounting in Fraud Investigations: A Survey Based Research from Kingdom of Bahrain." Journal of Business Management and Information Systems 2, no. 1 (June 30, 2015): 168–84. http://dx.doi.org/10.48001/jbmis.2015.0201016.

Full text
Abstract:
Forensic accounting is the practice of utilizing accounting, auditing and investigative skills to assist in legal matters. The increase in number of frauds and fraudulent activities around the world has emphasized the need for forensic accountants. This research aims at define forensic accounting and differentiates between forensic accounting and traditional accounting and auditing. The study then explores the role of forensic accountants in fraud investigation and the knowledge and skills forensic accountants are expected to possess. Finally, the study will explain the role of forensic accounting in fraud investigation in view of accounting professionals, financial analysts and auditors in Bahrain. The result showed that Forensic Accountant is important in fraud investigation and curb and resolve economic and financial crimes in Bahrain economy. We recommend among others that the government of Bahrain should enact an Act that will make forensic accounting a practice in Bahrain so that economic and financial crimes can become history.
APA, Harvard, Vancouver, ISO, and other styles
21

Mabior, Maliap Madit, and Kadian Wanyonyi Wanyama. "Role of Forensic Investigations in Reduction of Financial Fraud Among Commercial Banks in South Sudan." International Journal of Finance and Accounting 3, no. 1 (March 29, 2024): 1–14. http://dx.doi.org/10.37284/ijfa.3.1.1845.

Full text
Abstract:
Financial fraud poses a significant challenge to the banking sector globally, including South Sudan. This study aimed to investigate the effectiveness of forensic investigations in mitigating financial fraud within commercial banks. Employing a mixed-methods approach and an explanatory research design, the study targeted 119 respondents and nine commercial banks. Data was analysed using descriptive statistics and regression analyses. The findings revealed a strong association between increased levels of forensic investigations and a significant reduction in financial fraud among commercial banks in South Sudan. The study emphasized the crucial role of adopting sophisticated technologies like data analytics and forensic accounting techniques, as well as implementing robust internal control mechanisms, in enhancing the effectiveness of forensic investigations. Through bolstering forensic investigation practices, not only can financial fraud be curbed, but the overall integrity and trustworthiness of South Sudan's banking sector can be enhanced. To address financial fraud effectively, the study recommended that commercial banks invest in advanced forensic investigation tools and technologies, enabling them to better detect and prevent fraudulent activities. Furthermore, enhancing the training and capacity-building of forensic professionals within these institutions was identified as a means to improve their effectiveness in dealing with fraud. Strengthening internal control systems and fostering a culture of transparency and accountability were also highlighted as vital steps. This research holds significance in informing policy and practice within South Sudan's banking sector. Through highlighting the effectiveness of forensic investigations in combating financial fraud, the study emphasizes the importance of prioritizing forensic capabilities within commercial banks. Moreover, it contributes to the existing literature on forensic investigations and financial fraud, offering valuable insights for researchers and policymakers alike
APA, Harvard, Vancouver, ISO, and other styles
22

Gottschalk, Petter. "Characteristics of financial crime investigation reports by fraud examiners." Journal of Investment Compliance 15, no. 4 (October 28, 2014): 57–66. http://dx.doi.org/10.1108/joic-04-2014-0014.

Full text
Abstract:
Purpose – The purpose of this paper is to present results from an exploratory study of private investigations by fraud examiners in Norway. The activity of private investigations by fraud examiners is a business of lawyers, auditors and other professionals who investigate suspicions of financial crime by white-collar criminals. Design/methodology/approach – This article presents results from an empirical study of investigation reports. Findings – The available sample consists of 21 reports produced mostly by auditing firms such as PwC. Suspicion of financial crime led to police investigation, public prosecution and jail sentence in two cases. Originality/value – Empirical studies of private investigations are rare.
APA, Harvard, Vancouver, ISO, and other styles
23

Carlindo Fornasari, Marcela Thaísa, and Maike Taís Maziero Montanhini. "Evaluation of the efficiency of qualitative test of chloride for investigation milk adulteration." Revista Brasileira de Pesquisa em Alimentos 6, no. 2 (December 17, 2015): 75. http://dx.doi.org/10.14685/rebrapa.v6i2.3480.

Full text
Abstract:
<p class="Padro">The milk is a sensitive product for fraud, being the water addition the commom forms and is considered a economic fraud, once your composition changes. The commom substances used for fudge the water presence is the sodium chloride, characterized with restorative, in order to correct the milk density and cryoscopy. The objective of this work is evaluate the quality and sensibility of qualitative analysis of chlorides for detection water or salt. Were collected 96 milk samples of cows in different stages of lactation and the milk underwent the qualitative choride research and Somatic Cells Count analysis. The results demonstrate that chlorides evidence can’t be used for detection frauds, because observed the presence of chlorides in fresh milk for animals, in other words, which wasn’t subject for frauds.</p>
APA, Harvard, Vancouver, ISO, and other styles
24

Lockwood, Frank S. "The Fraud Investigation Detective Agency." Entrepreneurship Theory and Practice 31, no. 2 (March 2007): 299–318. http://dx.doi.org/10.1111/j.1540-6520.2007.00174.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Alam, Pervaiz, and Karin A. Petruska. "Conservatism, SEC investigation, and fraud." Journal of Accounting and Public Policy 31, no. 4 (July 2012): 399–431. http://dx.doi.org/10.1016/j.jaccpubpol.2012.05.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Ortynskyi, Volodymyr, Yuliia Chornous, and Nataliia Pavliuk. "INTERNATIONAL COOPERATION IN FINANCIAL FRAUD INVESTIGATION." Baltic Journal of Economic Studies 4, no. 4 (September 2018): 252–57. http://dx.doi.org/10.30525/2256-0742/2018-4-4-252-257.

Full text
Abstract:
The aim of the article is to formulate theoretical principles and practical recommendations for the implementation of international cooperation in the investigation of financial fraud. The subject of the study is international cooperation in the investigation of financial fraud. Methodology. The research is based on the use of general scientific and special-scientific methods and techniques of scientific knowledge. The historical and legal method enabled to determine the preconditions for the origin of financial fraud as a crime of international nature, the establishment of the institute of international cooperation in criminal proceedings. The comparative legal method enabled to compare doctrinal approaches to the differentiation of tasks and forms of international cooperation in the investigation of financial fraud. The system-structural method enabled to determine the tasks of the pretrial investigation bodies in the investigation of financial fraud considering the functional aspect of the relevant bodies and individuals. The methods of grouping and classification were the basis for the author’s approach to the definition of features of financial fraud as a crime of an international nature. The technical legal method enabled to examine the state of affairs in the legal regulation of the application of international cooperation measures in the investigation of financial fraud at the international and national levels, to identify its shortcomings, which determine the problems of practical implementation, to develop recommendations aimed at their elimination. The results of the study revealed that improvement of the international cooperation in the investigation of financial fraud involves the use of new methods and means of investigation (legal proceedings within the framework of international legal assistance, joint investigation teams, etc.); working out effective interaction with the competent authorities of foreign countries and international organizations. It is important to conclude international cooperation agreements, including interagency agreements; to improve the national legislation to comply with the provisions of international law; to harmonize the legislation of Ukraine and European states. Practical implications. In the research, financial fraud is defined as a crime of an international nature; the problematic issues of its investigation are determined; features of international cooperation in the investigation of financial fraud; the areas of its efficiency improvement are suggested. Relevance/originality. The original author’s approach to the formulation of theoretical principles and practical recommendations for the implementation of international cooperation in the investigation of financial fraud is the foundation for the elaboration of the most promising areas for the development of national legislation and practical activities in this sphere.
APA, Harvard, Vancouver, ISO, and other styles
27

Yefimov, Mykola, Natalia Pavlova, Volodymyr Fedchenko, Viktor Pletenets, and Oleksandr Kryvopusk. "Foreign experience in legal regulationof fraud investigation." Revista de la Universidad del Zulia 13, no. 38 (September 8, 2022): 159–68. http://dx.doi.org/10.46925//rdluz.38.11.

Full text
Abstract:
The purpose of the research. The purpose of the article is to clarifyforeign experience inlegal regulationof fraud investigation. Main content. Considered are methods of detecting abuses performed by personnel at foreign enterprises and methods of combating such abuses. Methodology: Review of materials and methods on the basis of analysis of foreign experience concerning legal regulationof fraud investigation. Conclusions. It has been observed that despite legislative and regulatory documents, fraud and other types of crimes committed by employees of various branches are a widespread problem both inUkraineand abroad. Highlighted the main areas of economic activity where fraud losses account for the largest amounts.
APA, Harvard, Vancouver, ISO, and other styles
28

Ojelabi, Sunday Adeyemi, Sulieman Aruwa, and Tamunonimim A. Ngerebo-a. "EFFECT OF FRAUD INVESTIGATION AND FRAUD ANALYTICS ON FRAUD MANAGEMENT IN SELECTED FEDERAL GOVERNMENT MINISTRIES IN NIGERIA." Caleb International Journal of Development Studies 07, no. 01 (June 24, 2024): 119–37. http://dx.doi.org/10.26772/cijds-2024-07-01-08.

Full text
Abstract:
Despite the solidification of forensic accounting in government parastatals, the objectives are not attained at the expected level. This study examined the effect of forensic accounting practices on fraud management in selected federal government ministries in Nigeria. The study adopted a descriptive survey research design. The population for this study consists 1550 staff in the Office of Auditor General for the Federation. Three hundred and forty nine (349) questionnaires were administered. Primary data was collected using 5-point Likert scale structured questionnaire for the study. Partial Least Square Structural Equation Modeling (PLS-SEM) was employed to model the regression analysis. The study found that fraud investigation and fraud analytic have positive and significant effect on fraud management. The study recommends that organizations should ensure that adequate resources, including financial and human resources, are allocated to support fraud investigation efforts. Also, the study recommends that organizations should utilize sophisticated techniques to analyze vast amounts of data from various sources such as transaction records, customer information, and external databases. Keywords: forensic accounting; forensic accounting practices; fraud analytic; fraud investigation; fraud management;
APA, Harvard, Vancouver, ISO, and other styles
29

Anyadufu, Anthony Onyeka, and Obi Grace Uchechi. "Forensic Accounting Services and its Effect on Fraud Prevention in Manufacturing Firms in Anambra State." Journal of Accounting and Financial Management 9, no. 3 (September 13, 2023): 106–17. http://dx.doi.org/10.56201/jafm.v9.no3.2023.pg106.117.

Full text
Abstract:
This study on forensic accounting services and its effect on fraud prevention was empirically investigated. Two hypotheses were formulated to guide the investigation and the statistical test of parameter estimates was conducted using Kendall’s Coefficient of Concordance. The data for the study were collected using questionnaire survey administered to the relevant accounting sections of the selected manufacturing firms in Anambra state. The statistical analysis of the study indicates that the application of forensic accounting service has reduced the incidence of frauds and has also led to fraud prevention at 1% significant level. Thus, the study concludes that the application of forensic accounting services has led to fraud prevention in manufacturing firms in Anambra state. The study therefore recommends that manufacturing firms in Anambra state should intensify the application of sophisticated forensic auditing in the fight against fraud and forgeries in the system as the probability of fraud detection and prevention will be generally low especially in this era of technological revolution.
APA, Harvard, Vancouver, ISO, and other styles
30

Gottschalk, Petter. "Maturity levels for private internal investigations." International Journal of Police Science & Management 19, no. 4 (November 20, 2017): 285–93. http://dx.doi.org/10.1177/1461355717733139.

Full text
Abstract:
The purpose of private internal investigations by fraud examiners is to reconstruct the past by identifying past events and sequences of events. In this article, work by fraud examiners is studied in terms of maturity; introduce a five-stage model for investigation maturity: chaos, mess, disclosure, clarification, and investment. Based on student term papers in a financial crime class, six investigation reports are allocated to levels in the maturity model. The average score for the investigation reports is a level 3 disclosure, where the investigation is problem-oriented and often limited by the mandate. Based on the low average score, this article discusses the privatization of law enforcement, secrecy of investigation reports, lack of disclosure to the police, competence of private investigators, and limits of the investigation mandate.
APA, Harvard, Vancouver, ISO, and other styles
31

Leng, Bing. "Construction and application of logic model for telecom network fraud case investigation based on big data." Advances in Engineering Technology Research 3, no. 1 (December 6, 2022): 289. http://dx.doi.org/10.56028/aetr.3.1.289.

Full text
Abstract:
Telecom fraud, as a new means of fraud emerging in the new era, has a very deep impact on People's Daily life and social development. Therefore, it is necessary to use big data to carry out telecom fraud crime investigation activities to adapt to the changing social environment faster. According to the analysis of accumulated experience in the investigation of telecom network fraud cases in recent years, it can be seen that the case investigation mechanism is limited, the on-site collection of evidence is more difficult, and the cross-border arrest cooperation is more difficult. All these problems directly affect the investigation efficiency and quality of telecom network fraud cases in China. Therefore, some scholars proposed to use big data technology to improve the forensics process, build a cross-border reconnaissance cooperation platform, improve the efficiency of on-site forensics and investigation, and strengthen the effective crackdown on criminal and illegal behaviors. On the basis of understanding the development status of big data technology platform, this paper clarified the corresponding logic model according to the investigation process of telecom network fraud cases, and put forward the application countermeasures with big data technology as the core.
APA, Harvard, Vancouver, ISO, and other styles
32

Reffett, Andrew B. "Can Identifying and Investigating Fraud Risks Increase Auditors’ Liability?" Accounting Review 85, no. 6 (November 1, 2010): 2145–67. http://dx.doi.org/10.2308/accr.2010.85.6.2145.

Full text
Abstract:
ABSTRACT: Legal scholars and accounting practitioners have expressed concern that the U.S. legal system might, in cases of undetected fraud, effectively penalize auditors for identifying and investigating fraud risks (AICPA 2004; Coffee 2004; Golden et al. 2006). This study draws on counterfactual reasoning theory to provide experimental evidence indicating that this concern is warranted. Consistent with counterfactual reasoning theory, I find that evaluators in a natural (i.e., between-participants) environment are more likely to hold auditors liable for failing to detect fraud when the auditors investigated for the perpetrated fraud, relative to when the auditors did not investigate for the fraud. Findings from a less natural within-participants experiment, however, indicate that the between-participant findings likely were unintentional: That is, the same evaluators, when later asked to judge alternative levels of fraud investigation simultaneously, are less likely to hold auditors liable for failing to detect fraud when the auditors investigated for the fraud, relative to when the auditors did not investigate for the fraud.
APA, Harvard, Vancouver, ISO, and other styles
33

Starostenko, N. I. "TYPICAL INVESTIGATIVE SITUATIONS AT THE INITIAL STAGE OF INVESTIGATION OF FRAUDS COMMITTED WITH THE USE OF SOCIAL ENGINEERING METHODS IN THE FIELD OF INFORMATION AND TELECOMMUNICATION TECHNOLOGIES." Bulletin of Udmurt University. Series Economics and Law 31, no. 4 (August 12, 2021): 697–704. http://dx.doi.org/10.35634/2412-9593-2021-31-4-697-704.

Full text
Abstract:
In cases of social engineering fraud, the most difficult part of their organization is the initial investigation phase. The sequence and tactical features of the production of investigative actions aimed at identifying these frauds are largely determined by the investigative situations that develop at the initial stage. The article discusses typical investigative situations that arise at the initial stage of investigation of frauds committed using methods of social engineering in the field of information and telecommunication technologies. The sequence of investigative actions and other procedural measures in the course of a preliminary investigation within the framework of an initiated criminal case on the fact of committing such frauds, depending on the current investigative situation, is considered.
APA, Harvard, Vancouver, ISO, and other styles
34

Yansyahid, Dzikrie, and Dewi Kurnia Indrastuti. "The Impact of Pentagon's Fraud Elements on Predicting Financial Report Fraud." Jurnal Akuntansi Bisnis Pelita Bangsa 8, no. 02 (January 2, 2024): 77–88. http://dx.doi.org/10.37366/akubis.v8i02.792.

Full text
Abstract:
The present study aims to investigate the impact of fraudulent components within the Pentagon on its ability to predict the occurrence of financial report fraud. This research employs several independent variables, including financial targets, external pressure, liquidity, nature of the industry, audit opinion, proportion of independent commissioners, and a number of CEO photos, while the dependent variable is fraudulent financial reporting. This investigation employed data pertaining to manufacturing enterprises that were listed on the Indonesia Stock Exchange during the period spanning from 2018 to 2020. In this study, a total of 104 companies were sampled and a purposive sampling method was utilized to obtain 310 data points. The present investigation utilized a statistical tool known as multiple regression analysis. The findings of the present investigation demonstrate that both the financial target variables and the types of industries significantly adversely impact the occurrence of fraudulent financial reporting. Notably, the factors of external pressure, liquidity, audit opinion, the ratio of independent commissioners, and the quantity of CEO images appear to bear no influence on fraudulent financial reporting. Keywords: Fraud Pentagon, Fraudulent Financial Reporting, Financial Target
APA, Harvard, Vancouver, ISO, and other styles
35

Mackevičius, Jonas, and Laimutė Kazlauskienė. "The Fraud Tree and its Investigation in Audit." Ekonomika 85 (January 30, 2009): 90–101. http://dx.doi.org/10.15388/ekon.2009.0.5118.

Full text
Abstract:
The purpose of the present research paper is to introduce a new structure of the Fraud Tree and to suggest certain audit procedures possibly employed in examining its branches. For the purpose of the present paper the authors thereof have referred to the analysis of related research literature, also applied the information comparison and generalization methods. Fraud is being committed in every part of the world, and in every sphere of human activities. Often fraud leads to financial nightmare and collapse of major international corporations which cause spill-off after-effects not only upon corporations and their employees, but also upon other related businesses and organizations, governments and societies. In view of globalization of economy, increasingly dynamic and competitive business fraud has changed in character though has not downscaled in its scope. Today fraudsters elaborate their attempts making use of the most state-of-the-art science achievements and innovative technologies. This largely facilitates the growth of the “Fraud Tree” with its new branches ever springing up. The present article represents an attempt to investigate individual fraud cases and the groups of persons committing this kind of crime. A new concept of “Fraud Tree” has been introduced with the following basic branches: i) material misstatements in financial statements; ii) asset misappropriation; iii) corruption; iv) tax evasion; and v) others. Every branch on the Fraud Tree has several sub-branches, and significant efforts should be devoted in the course of audit to examine the scope, formation conditions of each such sub-branch. The present paper includes guidelines for the principal actions and procedures to be followed by an auditor in view of the risks related to misstatements in financial statements, asset misappropriation, corruption and tax evasion.
APA, Harvard, Vancouver, ISO, and other styles
36

Malykhina, Natalya I., and Svetlana V. Kuzmina. "The Algorithm of the Investigator’s Actions in Typical Situations of Internet Fraud Investigations." Vestnik Tomskogo gosudarstvennogo universiteta, no. 462 (2021): 238–47. http://dx.doi.org/10.17223/15617793/462/29.

Full text
Abstract:
The article considers the creation of theoretical and applied provisions for supplementing and improving the methodology of Internet fraud investigations. The aim of the study was to identify typical situations of investigation of these crimes and to develop the algorithm of the investigator’s actions in these situations. The methodological basis of the research was the dialectical method, modeling, the system-structural method, the specific sociological method, the method of expert assessments, logical methods. The situational approach was used. Considering the peculiarities of making tactical and managerial decisions at various stages of the investigator’s activity in Internet fraud investigations, the typical situations of checking crime reports and of the initial and subsequent stages of the investigation have been identified. The determination of typical investigative situations at each of the indicated stages was based on the results of the study of materials of judicial practice in criminal cases on Internet frauds, a survey of investigators on the problems of investigating these crimes. It has been revealed that the stage of checking the report of Internet fraud, depending on the source and amount of information, is characterized by two situations: either by the lack of primary information about the presence of signs of a crime (95%), or, conversely, by information sufficient to make a final procedural decision (5%). The initial stage of the investigation of Internet fraud, depending on the content of the initial information, is characterized by situations determined by the presence (80%) or absence (17.5%) of identified digital footprints in conjunction with the establishment of the method of committing a crime, victims and witnesses, the lack of information about the fraudster. A far less likely situation is characterized by the establishment of digital footprints, the method of committing a crime, victims and witnesses, the presence of some information on the criminal, but the lack of data about his/her location (2.5%). Three typical situations of the subsequent stage of the investigation of these crimes are classified depending on the degree of the confession of guilt by the accused and the sufficiency of evidence. The most common situation is characterized by the confession of guilt by the accused and the availability of necessary evidence in the case (90%). In each typical situation, the algorithm of the investigator’s actions is determined, methodological recommendations on the tactics of individual investigative actions are developed taking into account the specifics of the crimes committed. Particular attention is paid to the issues of working with digital footprints, the necessary software and hardware are indicated; to the features of the tactics of inspecting the scene, mobile and computer devices; to the determination of the issues to be clarified during the interrogation of the accused, victims, witnesses.
APA, Harvard, Vancouver, ISO, and other styles
37

Pranav Kumar, Ray. "A study on cyber financial frauds in the district of Jamtara, Jharkhand." Journal of Forensic Science and Research 6, no. 1 (May 16, 2022): 042–44. http://dx.doi.org/10.29328/journal.jfsr.1001034.

Full text
Abstract:
The study has been undertaken to investigate the determination of digital financial fraud (cyber fraud) in Jamtara district of Jharkhand (the hub of cyber fraudsters) the basic tools & techniques which are used by the offenders and to find out the socio-economic condition of their social life & find the new challenging in cybercrime investigation and to find out the more secure way of digital financial flow, by using survey research method and work on secondary as well primary data which was related to this study, cybercrime especially financial fraud becomes the new challenging task for law enforcement agencies. Digital financial frauds are being within an undefined jurisdiction so it becomes more difficult to investigate the cases and due to other different public as well private sectors of service providers like the telecom companies and the banks are unable to make the defensive system for their customer also. This is the main reason for delays in cyber-related case investigation and a very low conviction rate in cyber-related cases.
APA, Harvard, Vancouver, ISO, and other styles
38

Saravanan, S. K. "Online Banking Fraud Analysis and Investigation." International Journal for Research in Applied Science and Engineering Technology 6, no. 4 (April 30, 2018): 175–80. http://dx.doi.org/10.22214/ijraset.2018.4034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Barefoot, J. Kirk. "Curtailing Fraud Through Workers' Comp Investigation." Compensation Review 17, no. 3 (July 1985): 57–60. http://dx.doi.org/10.1177/088636878501700307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Hall, M. G. "The document examiner and fraud investigation." Journal of Financial Crime 2, no. 4 (January 1995): 317–21. http://dx.doi.org/10.1108/eb025657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Ziporyn, T. "AMA's Bureau of Investigation exposed fraud." JAMA: The Journal of the American Medical Association 254, no. 15 (October 18, 1985): 2043. http://dx.doi.org/10.1001/jama.254.15.2043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Ziporyn, Terra. "AMA's Bureau of Investigation exposed fraud." JAMA: The Journal of the American Medical Association 254, no. 15 (October 18, 1985): 2043. http://dx.doi.org/10.1001/jama.1985.03360150017002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Gunkin, I. V. "Forensic aspects of insurance fraud investigation." Закон и право, no. 3 (2023): 48–51. http://dx.doi.org/10.56539/20733313_2023_3_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Arum, Enggar Diah Puspa, Rico Wijaya, and Ilham Wahyudi. "Moderation of Corporate Governance in Financial Statement Fraud Investigation with the Sccore Model." Revista de Gestão Social e Ambiental 18, no. 4 (May 23, 2024): e06265. http://dx.doi.org/10.24857/rgsa.v18n4-136.

Full text
Abstract:
Objective: The purpose of this study was to determine the effect of stimulus, capability, collusion, opportunity, rationalization, and ego on financial statement fraud moderated by the effectiveness of the board of commissioners which essential of corporate governance structure. This study also seeks to develop recommendations based on the analysis of financial statement fraud detection and empirically demonstrate the effectiveness of appropriate supervision in preventing financial statement fraud. Theoretical Framework: Management fraud in the context of the misstatement of financial information that can harm other parties for the sake of certain personal or group interests is referred to as a financial statement fraud. In recent years, the theory of financial statement fraud has developed, starting with the fraud triangle, fraud diamond, fraud pentagon, and fraud hexagon. The fraud hexagon theory expanded the previous theory by including the components of stimulus, capability, collusion, opportunity, rationalization, and ego. Furthermore, the model derived from the hexagon theory is known as the SCCORE model. Method: Quantitative research was developed to test the hypothesis in this study. The data observed is secondary data derived from the annual reports of publicly listed companies in the non-financial sector industry on the Indonesia Stock Exchange, which is the target population of the study. The sample was determined using the total sampling technique, and based on this, the observed data amounted to 529. The data were analyzed using multiple linear regression methods and moderated regression analysis methods processed with the SPSS program. Results and Discussion: The findings suggested that corporate governance could moderate the relationship among the SCCORE model and financial statement fraud. Additionally, according to the research findings, stimulus, collusion, opportunity, and ego affect financial statement fraud, even though capability and rationalization accomplish not. Research Implications: The theoretical implication of this research is to provide additional empirical evidence of fraud theory development into hexagon fraud, whereby collusion, which is proposed as an addition to the pentagon fraud theory, is proven to have an effect on financial statement fraud. The other theoretical implication is to empirically verify the relevance of agency theory to the oversight mitigation of the corporate governance structure. The practical implication of this research is to broaden the insights of practitioners in the accounting and finance fields in order to detect the likelihood of financial statement fraud based on historical financial data, which ultimately can assist in the financial decision-making process. Originality/Value: This study advanced to the state of knowledge on financial statement fraud through an inquiry into the interaction between the fraud hexagon theory's elements and corporate governance moderation, particularly the effectiveness of its oversight. The effectiveness of corporate governance in preventing financial statement fraud through appropriate oversight illustrates the study's relevance and value.
APA, Harvard, Vancouver, ISO, and other styles
45

Han, Yuge. "An Investigation of Machine Learning Applications in the Financial Fraud Detection." Advances in Economics, Management and Political Sciences 98, no. 1 (July 26, 2024): 43–49. http://dx.doi.org/10.54254/2754-1169/98/2024ox0125.

Full text
Abstract:
Financial fraud presents itself in various forms, and it often involves intricate financial transaction networks, making it challenging to detect the perpetrators and identify the characteristics of the fraud. In recent years, machine learning has gained widespread application within the financial sector. Therefore, various financial fraud detection models have been developed based on diverse machine learning methodologies. In the method part, this paper provides an overview of the machine learning process and then discusses the application of machine learning models in various financial fraud scenarios. Financial fraud in the insurance field has been further refined into automobile and medical insurance fraud. In automobile insurance fraud detection, some studies applied implicit Naive Bayes Model to analyze observable features and estimate hidden variables, and some studies used resampler to solve data imbalance and adopted 7 kinds of machine learning models for analysis. In health insurance fraud detection, many studies train medical data with multiple models, including AdaBoost, Logistic Regression and Support Vector Machine. In credit card fraud detection, studies use five algorithms, including random forest and decision tree et al., and some construct a model combining Decision Tree (DT) and Logistic Regression (LR). In bank fraud detection, some studies introduce Value-at-Risk to combine it with machine learning algorithms, and some studies propose a decentralized model training method based on federated learning. In the discussion section, this paper addresses the current limitations of the research, such as poor interpretability, uneven distribution of data sets, and issues related to customer privacy, and proposes corresponding solutions.
APA, Harvard, Vancouver, ISO, and other styles
46

Gupta, Meenu, Pradeep Kumar Aggarwal, and Rekha Gupta. "Corporate Sustainability with Forensic Auditing: An Evidence from India." International Journal of Experimental Research and Review 35 (November 30, 2023): 128–37. http://dx.doi.org/10.52756/ijerr.2023.v35spl.012.

Full text
Abstract:
The repercussions of fraud are huge and sufferers are many. An organisation's very existence and sustainability of an organisation is threatened by frauds, which remain unchecked due to weak corporate governance norms and inadequacy of audit function in detection of financial statement frauds. This culminates in the closure of the entity at the cost of the interests of various stakeholders. Forensic accounting and auditing not only help detect fraud but can also prevent fraud by strengthening the corporate governance practices in an organisation. ABG Shipyard Ltd., belonging to one of the oldest and most prestigious ABG groups in India, building warships and other vessels for the Indian Navy, was once considered to be the largest private shipping yard. The Global Financial Crisis hit the company in 2008, and the consequent failure to repay the loans led to the corporate failure and liquidation. The fraud at the company was detected through a forensic audit at the State Bank of India’s behest in 2019 and the Central Bureau of Investigation (CBI) was able to register the case by 2022. This study tries to understand what went wrong and how, by analysing the annual reports, audit reports and financial statements and computing of Beneish M-score and Altman Z-score. The study finds that the erring auditors, self-dealing promoters and faulty management are the root causes of this fraud.
APA, Harvard, Vancouver, ISO, and other styles
47

Donegan, Michael. "Crime script for mandate fraud." Journal of Money Laundering Control 22, no. 4 (October 7, 2019): 770–81. http://dx.doi.org/10.1108/jmlc-03-2019-0025.

Full text
Abstract:
Purpose The purpose of this paper is to critically analyse research surrounding mandate fraud and to devise a crime script identifying the crime commission process. It is hoped this will assist in standardising investigation of mandate fraud by law enforcement. Design/methodology/approach The design of this paper follows on from the approach taken by van Hardeveld et al. (2017) in identifying a cybercrime script for carding activity. The current environment surrounding the investigation of digital fraud in the UK is examined through a review of the existing literature. Analysis of the crime commission process for mandate fraud is then outlined in a potential crime script identifying possible intervention points for law enforcement. Findings UK law enforcement’s current response to digital fraud is struggling to provide positive outcomes for victims. There is inconsistency in the investigative approach and practical issues surrounding how the digital fraud problem is tackled. Changing the emphasis of digital fraud investigation to focus on the money laundering networks based in the UK also needs to be considered. Standardising investigation into digital fraud by mapping out digital criminality using crime scripts and routine activity theory could be beneficial for law enforcement. The results of this process could also assist in effectively identifying where law enforcement resources may be best deployed to solve some of the practical issues highlighted. Originality/value There is little literature directly focused on a crime script for mandate fraud. This is despite it being a significant contributor to fraud losses in the UK. For law enforcement, both digital and financial investigation skill sets are required to investigate such offences. Therefore, mapping the crime commission process has significant value for clearly identifying investigative intervention points.
APA, Harvard, Vancouver, ISO, and other styles
48

Mamahit, Atrisia Inayati, and Dekar Urumsah. "The Comprehensive Model of Whistle-Blowing, Forensic Audit, Audit Investigation, and Fraud Detection." Journal of Accounting and Strategic Finance 1, no. 2 (November 30, 2018): 153–62. http://dx.doi.org/10.33005/jasf.v1i2.43.

Full text
Abstract:
Fraud is a problem that has never been resolved from year to year. One type of fraud that often occurs in the government sector is corruption. Various attempts have been made by the government to detect fraud, but the efforts that have been made have not been effective in reducing fraud. This study aims to propose a conceptual model for detecting fraud by linking whistle-blowing, forensic audits, and investigation audits. The conceptual model of this research is expected to provide input to managers and decision makers regarding the factors that need to be considered in improving fraud detection so that in the future fraud prevention methods will be better and better.
APA, Harvard, Vancouver, ISO, and other styles
49

Li, Gang, and Yong Wen. "Research on the Detection Countermeasures of Telecommunication Network Fraud Based on Big Data for Killing Pigs and Plates." Journal of Robotics 2022 (March 7, 2022): 1–11. http://dx.doi.org/10.1155/2022/4761230.

Full text
Abstract:
This paper uses big data analysis to conduct in-depth analysis and research on the investigation countermeasures of the pig-killing dish telecommunication network fraud. This paper takes the case of “piggy bank” as a perspective, starting from analyzing the concept and characteristics of “piggy bank” type network fraud, analyzing the current phenomenon of this type of network fraud crime, and analyzing the current situation of the relevant laws, to explore the judicial situation regarding this type of network fraud crime, and to explore the problems and dilemmas in the judicial determination of such network fraud crimes, the determination of evidence, the determination of principal and accessory in joint crimes, the determination of crime amount, the determination of attempt and attempt form, and the determination of related crimes. Based on the analysis of the problems, the judicial determination process of “piggyback” network fraud is improved in terms of perfecting the evidence determination process, combining the facts of the whole case to determine the joint crime, accurately characterizing the associated criminal acts, regulating the judicial determination rules of the crime amount, and strictly applying the criteria of the circumstances of attempt and completion. This paper explores the forward shift of investigation work, anticipating telecommunication network fraud crimes in advance or the middle of the matter through active investigation, taking technical countermeasures, especially early warning and dissuasion to avoid the occurrence of telecommunication network fraud crimes, and reversing the unfavorable situation of passive investigation in the past. Finally, it focuses on the strategy and innovation points of the use of network investigation methods in telecom fraud crimes and proposes the investigation method of tracing the money chain and information chain along the line and cross-complementing the two lines at the same time according to the characteristics contained in telecom fraud crimes, relying on multiple groups such as public security, hackers, and network volunteers to jointly combat in a variety of network environments.
APA, Harvard, Vancouver, ISO, and other styles
50

Motseki, Morero. "Prospects and challenges in the investigation of credit card fraud in Vall Region of the Gauteng Province, South Africa." Technium Social Sciences Journal 27 (January 8, 2022): 959–67. http://dx.doi.org/10.47577/tssj.v27i1.5136.

Full text
Abstract:
Today use of Credit Card even in developing countries has become a common scenario. People use it to shop, pay bills and for online transactions. But with increase in number of Credit Card users, the cases of fraud in Credit Card have also been on rise. Credit Card related frauds cause globally a loss of billions of Rands. Credit Card fraud can be done in numerous ways. The article begins with an examination of the extent of the challenge and response by the relevant stakeholders, especially the Criminal Justice System (CJS). This study was carried out utilising a qualitative research approach with a convenience, purposive and snowball sampling techniques. Thirtynine (39) interviews were conducted to solicit the views of the participants and police investigators from Vanderbijlpark, Sebokeng, Sharpeville and Vereeniging police stations, members of the community, and victims of credit card fraud were interviewed. These interviews were analysed according to the phenomenological approach, aided with the inductive Thematic Content Analysis (TCA) to identify the participants’ responses and themes. The findings indicated that the extent of credit card fraud in Vaal region is reaching alarming rates. Based on the findings, the authors provided recommendations such as: police investigators being taken for regular workshops and training on how to investigate sophisticated methods used by perpetrators such as technology, awareness in the society about credit card fraud should be prioritised and enhanced. This study recommends that the CCTV cameras should be installed in the ATM, where cases of credit card are taking place. In addition, the police be visible in the areas which are most prevalent to credit card fraud.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography