Verified Document

Fraud Continues To Pervade The Article Review

Billing schemes are cited as the most common and costly occupational frauds and defined as the issuance of payment to a non-existent vendor or to a company that is controlled by an employee. Preventing billing schemes requires that the employer be familiar with vendors they conduct business with, ensuring that employees cannot write checks to vendors who they set up with the company, and vendors addresses need to be checked against employee addresses. The provision of one of the scheme methods provides insight into the type of fraudulent activity possible within a company, yet does not further explicate other schemes and their roles in asset misappropriations. Though fraud cannot be completely eliminated, Wells provides a listing citing preventive measures that can be put into action. Initial steps include setting up a checklist that will allow a company to implement an effective anti-fraud program. This list includes education employees about the detrimental effects of fraud, raising the...

Employees that are loyal to a company are more likely to report fraud within a company because they feel a sense of duty to their employers; reporting fraud within a company may also stem from being upset that a fellow employee is committing fraud. Anonymous hotlines allow for the reporting of fraudulent behavior and activities without the fear of being exposed; anonymity among employees will also help to increase tips.
Fraud prevention is most effective if the company and employees collaborate. If employees are made aware of the repercussions of fraud and how it affects job costs, raises, reputations and individual integrity. Developments in software technologies, specifically in textual analytics, will also aid in the detection, deterrence, and prevention of fraud.

Reference:

Nilsen, K. (2010). Keeping Fraud in the Cross Hairs. Journal of Accountancy, 209…

Sources used in this document:
Reference:

Nilsen, K. (2010). Keeping Fraud in the Cross Hairs. Journal of Accountancy, 209 (6), 20-25.
Cite this Document:
Copy Bibliography Citation

Related Documents

Criminological Theories and How They Apply to a Fictional Characters...
Words: 4431 Length: 13 Document Type: Essay

Criminological Theories and Their Application Character History Nikita Voronov was born in Omsk, Russia in 1977 to a 17-year-old mother named Natasha Voronov. She had gotten pregnant with him after dating a man for one month, another Russian male who was working in the mining area at the time. Once Natasha became pregnant she never saw the father of her child again who fled the town. Desiring a better life for her

RICO ACT in Conception and
Words: 4576 Length: 15 Document Type: Thesis

Moreover, a prosecution of the core leadership of an organization under RICO charges is likely to produce revelations concerning the relationship between leadership and other members who are either guilty of racketeering or some lesser scope of individual crime. This is to say that RICO was essentially designed to push the door open on the activities of such typically obscured enterprises in order to systematically disrupt its initiatives and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now