Skip to main content

Combatting Fraud

  • Chapter
Security Planning
  • 2887 Accesses

Abstract

While the previous chapter was a must know for all computer users, parts of this chapter are a must know for all employees. Everyone who handles or has access to assets or personal information, such as credit card, medical and financial information, and product or company trade secrets should be on guard for fraud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mitnick KD, Simon WL (2002) The art of deception. Wiley, Hoboken, NJ, USA

    Google Scholar 

  2. Lim J, Hwa MK (2011) Computer fraud and ethics: the Societe Generale’s trading fraud. In: International conference on computer and management (CAMAN) IEEE, pp 1–3

    Google Scholar 

  3. Hoggins-Blake R (2009) Dissertation: examining non-profit post-secondary institutions’ voluntary compliance with the Sarbanes–Oxley Act. ProQuest Dissertations and Theses, pp 19–51

    Google Scholar 

  4. Yallapragada RR, Roe CW, Toma AG (2010) Sarbanes–Oxley Act of 2002 and non-profit organizations. J Bus Econ Res 8(2):89–93

    Google Scholar 

  5. Coenen TL (2008) Essentials of corporate fraud. John Wiley & Sons, Inc., Hoboken, NJ, USA, pp 1–200

    Book  Google Scholar 

  6. ACFE (2014) Report to the nations on occupational fraud and abuse: 2014 global fraud study. Association of Certified Fraud Examiners (ACFE), http://www.acfe.com

  7. Philipp A, Cowen D, Davis C (2010) Hacking exposed computer forensics, 2nd edn. McGraw-Hill, Inc. New York, NY, USA

    Google Scholar 

  8. Giles S (2012) Managing fraud risk: a practical guide for directors and managers. John Wiley and Sons, Chichester, West Sussex, England, pp 1–320

    Google Scholar 

  9. ISACA (2012) CISA® review manual 2011. ISACA, Arlington Heights, IL

    Google Scholar 

  10. Daily report: Snowden trained as hacker while with N.S.A., resume says. New York Times, 5 July 2013

    Google Scholar 

  11. ACFE (2012) Report to the nations on occupational fraud and abuse: 2012 global fraud study. Association of Certified Fraud Examiners (ACFE), http://www.acfe.com

  12. Verizon (2013) Verizon 2013 data breach investigations report. http://www.verizonenterprise.com/DBIR/2013. Accessed 20 Oct 2013

  13. Identity fraud report: data breaches becoming a treasure trove for fraudsters. Javelin strategy & research, Pleasanton, CA, pp 10–12. http://www.javelinstrategy.com. Accessed 1 Feb 2013

  14. Stone B (2008) Global trail of an online crime ring. New York Times, 12 August 2008

    Google Scholar 

  15. Anon (2010) U.S. department of justice; leader of hacking ring sentenced for massive identity thefts from payment processor and U.S. retail networks. Biotech Business Week, 12 April 2010

    Google Scholar 

  16. Vamosi R (2011) Keep your credit cards safe from skimmers. PCWorld, pp 31–32, March 2011

    Google Scholar 

  17. Federal Trade Commission (2013) Fighting identity theft with the red flags rule: a how-to guide for business. Federal Trade Commission. http://business.ftc.gov/documents/bus23-fighting-identity-theft-red-flags-rule-how-guide-business. Accessed 25 May 2013

  18. Internet security threat report 2014, vol 19. Symantec Corp., April 2014

    Google Scholar 

  19. Brelsford E (2014) 2014: a cyber odyssey. In: ISACA Chicago chapter meeting, Rosemont, IL, 13 December 2013

    Google Scholar 

  20. Abignale F (2001) The art of the steal. Broadway Books, Broadway, NY

    Google Scholar 

  21. Check Fraud Working Group (1999) Check fraud: a guide to avoiding losses. Office of the Controller of the Currency, February 1999. http://www.occ.gov/static/publications/chckfrd/chckfrd.pdf. Accessed 6 July 2014

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Lincke, S. (2015). Combatting Fraud. In: Security Planning. Springer, Cham. https://doi.org/10.1007/978-3-319-16027-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-16027-6_2

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-16026-9

  • Online ISBN: 978-3-319-16027-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics