Forensic Accounting and Fraud Investigation for Non-ExpertsJohn Wiley & Sons, 2011 M01 19 - 304 pages A must-have reference for every business professional, Forensic Accounting and Fraud Investigation for Non-Experts, Second Edition is a necessary tool for those interested in understanding how financial fraud occurs and what to do when you find or suspect it within your organization. With comprehensive coverage, it provides insightful advice on where an organization is most susceptible to fraud. |
From inside the book
Results 1-5 of 41
Page
... records only of those frauds that affect their area(s) of interest. We must also remember that all fraud statistics are based on known frauds. What is most unnerving is the fact that the numbers quoted are considered to be only the tip ...
... records only of those frauds that affect their area(s) of interest. We must also remember that all fraud statistics are based on known frauds. What is most unnerving is the fact that the numbers quoted are considered to be only the tip ...
Page
... records who were in positions of financial responsibility and perpetrating the frauds in collusion. Dishonest managers and executives working alone caused median losses of $250,000, or about 4.2 times the $60,000 stolen by lower-level ...
... records who were in positions of financial responsibility and perpetrating the frauds in collusion. Dishonest managers and executives working alone caused median losses of $250,000, or about 4.2 times the $60,000 stolen by lower-level ...
Page
... than $1.1 billion in premature revenue in prior quarters.” The government also noted that “the SEC alleges that from 1998 to 2000, Computer Associates routinely kept its books open to record revenue from contracts executed.
... than $1.1 billion in premature revenue in prior quarters.” The government also noted that “the SEC alleges that from 1998 to 2000, Computer Associates routinely kept its books open to record revenue from contracts executed.
Page
Howard Silverstone, Michael Sheetz. kept its books open to record revenue from contracts executed after the quarter ended in order to meet Wall Street quarterly earnings estimatesf'fi Computer Associates agreed to settlements with the ...
Howard Silverstone, Michael Sheetz. kept its books open to record revenue from contracts executed after the quarter ended in order to meet Wall Street quarterly earnings estimatesf'fi Computer Associates agreed to settlements with the ...
Page
... records and how to avoid disaster.'@ In a recent Washington Post survey, a variety of experts (accountants, chief executives, and others) completed a corporate governance report card. Their conclusion was that “the ingredients for a ...
... records and how to avoid disaster.'@ In a recent Washington Post survey, a variety of experts (accountants, chief executives, and others) completed a corporate governance report card. Their conclusion was that “the ingredients for a ...
Other editions - View all
Forensic Accounting and Fraud Investigation for Non-Experts Howard Silverstone,Michael Sheetz No preview available - 2011 |
Forensic Accounting and Fraud Investigation for Non-Experts Howard Silverstone,Michael Sheetz No preview available - 2006 |
Common terms and phrases
accounting cycle accounts receivable argument Arnold Rothstein assets audit auditor bank casebook cash Certified Fraud Examiners chart checks cognitive interview committed common company’s complex concept controls corporate credit card criminal enterprise databases deductive reasoning deposit discussed documents employees Enron entity evidentiary example Exhibit expert fact financial crime investigations financial statements flow forensic Forensic Accounting Frank fraudsters goal Ibid identify identity theft important individual inference model inferential internal inventory investigator’s involved JoAnn Journal jury key list kinesic lawyers liability link diagrams logic Luca Pacioli matrix minor premise Money Laundering nodes Occupational Fraud offshore organized crime ownership paralanguage partnership penultimate probanda percent proposition prove ratio reason records relationship result role schemes simple social network analysis specific suspect symbols techniques testimony theory transactions ultimate underlying understand victim visual White-Collar Crime witness’s WorldCom