Fraud Investigation The Interview Process
Q1. Using private industry as a potential background for developing your fraud prevention and detection strategy, what type of external resource(s) would you recommend be established as soon as possible and included in the company’s marketing brochures as a value-added differentiating service with regards to reporting potential fraud that may be occurring in the asset disposition process? Keep in mind, this is not a SEC or a Securities Act situation.
One important source of value differentiation from other fraud investigative organizations can be the approach used by the emerging company. One such an approach is the SPEC (scope, plan, execute, close) model (Parulkar, 2010). The beginning of this method involves first determining the scope, or ascertaining the resources needed to complete actual job. This is followed by planning the investigation, executing the fact-finding exploration, and finally closing the investigation (Parulkar, 2010). While the sequential process may seem a simple one, marketing this method as a systematic approach may be useful. It is also useful to have a highly diversified fraud investigation team. Members of the team may include legal staff to determine what compliance measures are needed; forensic accountants; IT experts; and field investigators (Parulkar, 2010).
Particularly in today’s online-dominated world, where more and more legal documents and procedures are now performed online, having personnel who can evaluate online evidence to be credible or dubious in value is key. Having a diversified team is also useful as a way of connecting the organization to diverse external contacts outside the organization which may be helpful in researching various types of fraudulent practices. Given the rise of online technology, methods of fraud are continually changing and, sadly, growing more difficult to detect. It is very important for a private organization...
References
Giacalone, J. (2015). Four basic steps in a fraud investigation. LexisNexis. Retrieved from: http://blogs.lexisnexis.com/public-safety/2015/06/fraud-investigation-basic-steps/
Investigation. (2016). Association of Certified Fraud Examiners, Inc. Retrieved from: http://www.acfe.com/uploadedfiles/acfe_website/content/review/examreview/02-inv- interview-theory.pdf
Parulkar, N (2010). Investigate fraud with these best practices. Computer Weekly. Retrieved from: https://www.computerweekly.com/tip/Investigate-fraud-with-these-best-practices
Fraud and Forensic Evidence Fraud to Trial Process The case study presents a very interesting criminal act, the use of re-directing payers to a mock PayPal, an online payment processing company, where the criminals were then able to capture the PayPal username and their corresponding passwords to access their PayPal accounts. This unusual activity was noticed by a PayPal fraud investigator who noticed there were several accounts that were being opened under
Insurance Fraud After tax evasion, insurance fraud is considered the highest-ranked among white-collar crimes. The original concept of insurance, as a for-profit endeavor, was to collect funds from a large number of people to pay for damages and accidents that involved a small percentage of the population that paid premiums. Insurance fraud is an ever-growing problem. Solving or eliminating this problem requires the resources and knowledge of individuals or associations with
Mortgage Fraud If a rash of armed bank robberies swept across America next year, and if in these robberies criminals absconded with $30 billion dollars, one may be certain that a public panic would ensue. The banking system would likely be changed forever. If thousands of armed thugs went rampaging across the nation forcing people out of their homes, into the streets, and then destroying the properties, leaving the occupants homeless
Miscoding on the Billing Forms Discussion Board The fundamental basis for auditing Medicare and Medicaid billing is that the services provided are confidential, patient privacy must be protected, and the written word of the provider is the record of service provision upon which a review must be initiated (Harris, 2007). Auditing, however, must extend beyond the written record to establish that the services were actually provided to the patient or client
cross examine the accounting fraud scandal that took place at Xerox, the main intention of this analysis is to know the causes and the effects of the scandal as well as the need of a good practice in business ethics, corporate management and the general oversight. Xerox was able to utilize a creative technique of accounting to give false presentation of its assets and liabilities, they also deceive the
Introduction Fraud in local government is a serious and pervasive issue that can undermine public trust, waste taxpayer funds, and damage the integrity of public institutions. This illicit activity can take various forms, ranging from embezzlement and kickbacks to bribery and conflicts of interest. Local governments are particularly vulnerable to fraud due to a combination of factors, including: Limited resources: Local governments often operate with tight budgets and limited staff,
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now