Abstract
While the previous chapter was a must know for all computer users, parts of this chapter are a must know for all employees. Everyone who handles or has access to assets or personal information, such as credit card, medical and financial information, and product or company trade secrets should be on guard for fraud.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mitnick KD, Simon WL (2002) The art of deception. Wiley, Hoboken, NJ, USA
Lim J, Hwa MK (2011) Computer fraud and ethics: the Societe Generale’s trading fraud. In: International conference on computer and management (CAMAN) IEEE, pp 1–3
Hoggins-Blake R (2009) Dissertation: examining non-profit post-secondary institutions’ voluntary compliance with the Sarbanes–Oxley Act. ProQuest Dissertations and Theses, pp 19–51
Yallapragada RR, Roe CW, Toma AG (2010) Sarbanes–Oxley Act of 2002 and non-profit organizations. J Bus Econ Res 8(2):89–93
Coenen TL (2008) Essentials of corporate fraud. John Wiley & Sons, Inc., Hoboken, NJ, USA, pp 1–200
ACFE (2014) Report to the nations on occupational fraud and abuse: 2014 global fraud study. Association of Certified Fraud Examiners (ACFE), http://www.acfe.com
Philipp A, Cowen D, Davis C (2010) Hacking exposed computer forensics, 2nd edn. McGraw-Hill, Inc. New York, NY, USA
Giles S (2012) Managing fraud risk: a practical guide for directors and managers. John Wiley and Sons, Chichester, West Sussex, England, pp 1–320
ISACA (2012) CISA® review manual 2011. ISACA, Arlington Heights, IL
Daily report: Snowden trained as hacker while with N.S.A., resume says. New York Times, 5 July 2013
ACFE (2012) Report to the nations on occupational fraud and abuse: 2012 global fraud study. Association of Certified Fraud Examiners (ACFE), http://www.acfe.com
Verizon (2013) Verizon 2013 data breach investigations report. http://www.verizonenterprise.com/DBIR/2013. Accessed 20 Oct 2013
Identity fraud report: data breaches becoming a treasure trove for fraudsters. Javelin strategy & research, Pleasanton, CA, pp 10–12. http://www.javelinstrategy.com. Accessed 1 Feb 2013
Stone B (2008) Global trail of an online crime ring. New York Times, 12 August 2008
Anon (2010) U.S. department of justice; leader of hacking ring sentenced for massive identity thefts from payment processor and U.S. retail networks. Biotech Business Week, 12 April 2010
Vamosi R (2011) Keep your credit cards safe from skimmers. PCWorld, pp 31–32, March 2011
Federal Trade Commission (2013) Fighting identity theft with the red flags rule: a how-to guide for business. Federal Trade Commission. http://business.ftc.gov/documents/bus23-fighting-identity-theft-red-flags-rule-how-guide-business. Accessed 25 May 2013
Internet security threat report 2014, vol 19. Symantec Corp., April 2014
Brelsford E (2014) 2014: a cyber odyssey. In: ISACA Chicago chapter meeting, Rosemont, IL, 13 December 2013
Abignale F (2001) The art of the steal. Broadway Books, Broadway, NY
Check Fraud Working Group (1999) Check fraud: a guide to avoiding losses. Office of the Controller of the Currency, February 1999. http://www.occ.gov/static/publications/chckfrd/chckfrd.pdf. Accessed 6 July 2014
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Lincke, S. (2015). Combatting Fraud. In: Security Planning. Springer, Cham. https://doi.org/10.1007/978-3-319-16027-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-16027-6_2
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-16026-9
Online ISBN: 978-3-319-16027-6
eBook Packages: Computer ScienceComputer Science (R0)