Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: November 25, 2024 Mon

Time: 8:11 pm

Results for crimes against business

8 results found

Author: Smith, Patten

Title: Business Crime Scoping Execise: Methodological Work to Consider the Scope and Feasibility of a New Survey to Measure Commercial Victimisation

Summary: This scoping study examined the feasibility of developing a new survey to measure business crime. The work reviewed Home Office and external stakeholder requirements and presented a set of recommendations for the design and implementation of a new survey of business crime. There were three main components to the work: a literature review of business crime surveys; a series of consultations with Home Office and external stakeholders to identify key survey requirements; and development of survey design options. The key findings are as follows: Previous CVS surveys conducted by the Home Office and the Scottish Government (previously the Scottish Executive) are among the most rigorous of their kind to date. The existing CVS methodology should be retained to provide good quality data at a reasonable cost and to enable comparisons with previous rounds of the CVS. Key stakeholders require up-to-date information on crime experienced by businesses, costs of crime and perceptions of the police response to crime. A telephone survey of business premises of all sizes should be conducted. A supplementary survey of head offices should also be considered. The survey questionnaire should be based largely on that used in the 2002 CVS, with modifications to reflect changes in crime patterns and policy priorities. A new CVS will fill an important gap in data on the nature and extent of crime against businesses, as well as valuable feedback on how retailers view the service they get from the police. This will inform the formulation of sound policy to reduce these crimes.

Details: London: Home Office Research, Development and Statistics Directorate, 2010. 27p.

Source: Internet Resource: Home Office Research Report 33: Accessed September 10, 2010 at: http://rds.homeoffice.gov.uk/rds/pdfs10/horr33c.pdf

Year: 2010

Country: United Kingdom

URL: http://rds.homeoffice.gov.uk/rds/pdfs10/horr33c.pdf

Shelf Number: 117628

Keywords:
Crime Statistics
Crime Surveys
Crimes Against Business
Retail Crime

Author: Keil, Maria Clara Mauricio Pereira

Title: An Investigation into the Success Factors Amongst Small Businesses in Gauteng

Summary: Gauteng, the smallest of the nine South African provinces, but the largest in terms of its contribution to national GDP (33.9%), generates 10% of Africa’s GDP (Gauteng Enterprise Propeller Overview, 2007) and is therefore a very important geo-economical zone. As South Africa latest unemployment rate is 25.5% (StatsSA, 2006), Government is geared towards promoting small businesses in an effort to grow the economy and reduce unemployment. It is therefore very important to the economy that small businesses succeed, grow and provide employment. Due to the fact that at present, very little research into the success factors amongst small businesses in South Africa has been conducted in South Africa, it seems appropriate at this time to investigate the success factors of small businesses in Gauteng. The problem statement in this research is that there is insufficient knowledge relating to the factors contributing to the failure or success of small businesses in South Africa, Gauteng. To conduct this research, a qualitative and exploratory approach was decided upon. A literature survey on the subject was conducted in order to ground the current research in existing theory and research. A questionnaire was sent out by e-mail to 3776 businesses in Gauteng, to which the response rate was 3.15% (119 questionnaires were returned). The questionnaire was divided into sections and covered the definition of success, entrepreneurial personality characteristics of owner/manager, use of management tools, resource availability and the classification of respondents and their businesses. Due to the small size of the sample this research is not able to conclusively achieve the primary research objective of identifying the success factors of small businesses in Gauteng, but it has nevertheless contributed to the body of research on the matter, since it established that there is a correlation between: • Entrepreneurial personality and the success of small businesses • The use of management tools and the success of small businesses • The availability of resources and the success of small businesses. In addition the following can be reported: • The owner/managers surveyed attributed their success to: - persistence and determination - experience - entrepreneurial personality - business knowledge - a great team - education • The existence and or use of the business plan and its relationship to success remains inconclusive • Financial resources do not feature prominently as a success factor, but business skills do seem to correlate with success. Further research is necessary to pinpoint conclusively which traits and behaviours are conducive to success, by comparing successful and unsuccessful business owners. Other recommendations that arose from this research were: • Research should be conducted into the assumption that economic growth is driven by the proliferation of small businesses • Research into the weight of internal factors ((personality, experience, attitude, knowledge) versus that of external factors (start-up capital, business plans, skill availability, economic and legal conditions) would contribute to the body of knowledge and could trigger a shift in approach. The issue of the relationship between crime and the high unemployment rates in Gauteng are addressed in chapter 3.

Details: Johannesburg, S. Africa: University of Johannesburg, Faculty of Management, 2009. 131p.

Source: Internet Resource: Dissertation: Accessed April 27, 2011 at: http://ujdigispace.uj.ac.za:8080/dspace/bitstream/10210/2342/1/Keil.pdf

Year: 2009

Country: South Africa

URL: http://ujdigispace.uj.ac.za:8080/dspace/bitstream/10210/2342/1/Keil.pdf

Shelf Number: 121408

Keywords:
Bank Robberies
Commercial Crimes
Crimes Against Business
Unemployment and crime (South Africa)

Author: Rantala, Ramona R.

Title: Cybercrime against Businesses, 2005

Summary: Presents the nature and prevalence of computer security incidents among 7,818 businesses in 2005. This is the first report to provide data on monetary loss and system downtime resulting from cyber incidents. It examines details on types of offenders, reporting of incidents to law enforcement, reasons for not reporting incidents, types of systems affected, and the most common security vulnerabilities. The report also compares in-house security to outsourced security in terms of prevalence of cyber attacks.

Details: Washington, DC: U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Statistics, 2008. 20p.

Source: Internet Resource: Bureau of Justice Statistics Special Report: Accessed April 11, 2012 at: http://bjs.ojp.usdoj.gov/content/pub/pdf/cb05.pdf

Year: 2008

Country: United States

URL: http://bjs.ojp.usdoj.gov/content/pub/pdf/cb05.pdf

Shelf Number: 124921

Keywords:
Business Securityi
Computer Security
Crimes Against Business
Cybercrime (U.S.)
Internet Crimes

Author: James, Lachlan

Title: Final Report - Cloud Computing Threat Assessment for Small Business

Summary: Small businesses are not simply scaled-down versions of big business. Compared with larger organisations, small businesses operate in a distinct and highly resource constrained operating and technical environment. They are time-poor, have minimal bargaining power, and limited or inconsistent financial, technical, legal and personnel resources. Above all, small businesses are typically focused on one thing: survival. It is therefore unsurprising that cloud computing—and its promise of smoothing cash flows and dramatically reducing IT overhead—is attractive to small business. Cloud computing shifts the delivery and maintenance of software, databases and storage to the internet, transforming them into Pay-As-You-Go (PAYG) services accessed through a small business user’s web-browser. Cloud computing often comes with zero upfront costs, and scales (up and down) with the demands of the small business. Cloud computing services demand minimal technical skills: they are easy to setup and require little if any maintenance. Accessed via a secure login, for the small business, cloud computing typically represents increased standards of security. However, along with the benefits, cloud computing also embodies many risks for small business, including potential computer security, criminal, regulatory and civil liability issues. Cloud computing—like other new information technologies— challenges the application and understanding of many pre-existing areas of law. Examples of key criminal, regulatory and legal threats for small business adopting cloud computing include: • Cloud Providers are the Target, But Small Business is the Victim – While cloud service providers themselves hold much greater appeal to cybercriminals, it is the cloud service provider’s small business tenants— experiencing disrupted services and hence disruption to their already fragile revenues—that are the real victims. Lacking policies, procedures and training relating to cyber and network security, small businesses are particularly vulnerable to having account details stolen, and their cloud services hijacked. • Ever Changing Sea of International, National & Local Regulation – Where personal information—including financial and credit details—is stored in the cloud, a routine international commercial transaction may require a small business to comply with a myriad of ever changing international, national and state-level regulations and industry-specific standards. • Practical Benefits of Cloud Computing Potentially Non-Compliant – Even some simple, practical benefits of using the cloud—such as storing MYOB files on a cloud storage service (such as DropBox)—may render the small business non-compliant. • Inequality of Bargaining Power: “Take It or Leave It” Service Agreements – With almost no bargaining power and faced with industry-wide boilerplate terms and conditions, small business has little choice but to accept one-sided cloud agreements on a “take it or leave it” basis, leaving vendors absolved of substantially all liability. • Service Credits Inconsistent with Potential Damage to Small Business – Despite the potentially devastating impact of even relatively short service outages, small business is typically left with “service credits” (based on a proportion of monthly subscription fees) as their “sole and exclusive remedy.” • Overseas Legal Jurisdiction & Choice-of-Law – With cloud service agreements frequently setting the legal jurisdiction and choice-of-law to the vendor’s overseas headquarters, even the most simple legal action immediately becomes prohibitively expensive for all but the most successful small business. • Unilateral Termination of Accounts & Data Loss – Cloud service providers, particularly in relation to free accounts, often reserve the right to unilaterally terminate accounts with or without notice, potentially devastating the small business. Absolved of substantially all liability, the cloud service provider leaves the aggrieved small business with no cause of action and no right to recover. Findings – Responding to the Criminal, Regulatory & Legal Threats Technical & Commercial Practices to Reduce Risks – The research has found that there are technical and commercial practices that can be implemented today by small businesses to reduce at least some of the security and commercial risks: • Policies & Training – Small businesses can provide computer security training to personnel, and institute simple policies setting out (for example) how computer resources should be used, how often passwords should be changed, access rights for staff, and how and when employees may bring in and use their own devices. • Industry Education – Industry bodies can provide education and training to small businesses about appropriate practices and regulatory requirements. • Cyber & Cloud Insurance – Existing cyber liability insurance holds out some limited hope of compensating for losses as a result of cybercrime. However, the best hope for broader coverage rests with contingent business interruption insurance adapted to the unique circumstances of cloud computing (“cloud insurance”) being developed by new entrepreneurial ventures such as CloudInsure. Opportunities for Legislative Intervention – The research also identified the likely need for legislative intervention. The near-term future of cloud computing shows signs of bifurcation into budget solutions (much like existing offerings) and premium services with increased security and regulatory compliance, and greater acceptance of liability. But without a change in relative bargaining power between the cloud service provider and small business, it is unclear if competitive forces alone will be sufficient to bring about quality premium services at a price affordable to cost-conscious small business. To encourage cloud service providers to deliver more attractive, secure and cost effective solutions, inequality of bargaining power between cloud service providers and small business clients will need to be addressed. In this respect, there is significant opportunity for judiciously applied legislative intervention. Opportunities for such carefully considered intervention include: a refined doctrine of unconscionability; possible introduction of legal principles broadly akin to “contracts of adhesion” in the United States; and new regulatory powers—possibly adapted from the Communications Alliance (formerly the Australian Communications Industry Forum, Industry Code for Consumer Contracts, ACIF C620:2005)—to police the cloud computing industry. Acting in concert, a combination of technical and commercial solutions—including improved cybersecurity practices, industry education programs, and new species of “cloud insurance”—together with legislative programs may serve to place small business on substantially the same footing as larger businesses, enabling them to fully capture the true benefits of cloud computing while enduring a more equitable share of the risks.

Details: Canberra: Australian Institute of Criminology, 2012. 81p.

Source: Internet Resource: Accessed July 19, 2013 at: http://www.aic.gov.au/media_library/publications/special/002/Cloud-Computing-DBCDE.pdf

Year: 2012

Country: Australia

URL: http://www.aic.gov.au/media_library/publications/special/002/Cloud-Computing-DBCDE.pdf

Shelf Number: 129472

Keywords:
Cloud Computing (Australia)
Computer Crimes
Computer Security
Crimes Against Business
Financial Crimes

Author: Australian Competition and Consumer Commission

Title: Targeting Scams: Report of the ACCC on Scams Activity 2013

Summary: This report explains key trends in scam activity and highlights the impact of scams on the community. It highlights the cooperative work of the ACCC, other regulators and law enforcement agencies to disrupt scams and educate consumers. Overall contacts levels and financial losses - In 2013 the ACCC continued to observe a high level of scams activity in Australia, with 91 927 scam-related contacts received from consumers and small businesses, an increase of nearly 10 per cent over 2012. - Estimated scam losses reported to the ACCC totalled $89 136 975, representing an almost 5 per cent decrease from 2012 ($93 423 030) - a reversal in trend from 2011 and 2012 where large increases were observed. However, actual losses are likely to be higher as many scams go unreported and the ACCC is only one of several agencies that receive scam reports. Most reported scams - In 2013 dating and romance scams moved to number one position in terms of financial losses, with $25 247 418 reported lost. For the third consecutive year the ACCC has observed a decrease in the conversion rate of people who responded to an approach by a scam admirer and subsequently lost money - from 48 per cent in 2011 to 46 per cent in 2012 to 43 per cent in 2013. However, financial losses continue to remain substantially disproportionate to contacts, with dating and romance scams making up only 3 per cent of all scam-related contacts in 2013. - Similar to previous years, the majority of people contacting the ACCC about scam-related activities in 2013 (slightly over 86 per cent) reported no financial loss. Nearly one third of people who lost money reported losing between $100 and $499, which indicates scammers continuing to prefer 'high volume scams' - that is, scams that are delivered to large numbers of recipients but cause smaller amounts of loss per victim. - At the same time, the ACCC continued to receive reports of individuals suffering significant losses. Over 10 per cent of scam contacts reported losing above $10 000. However, there were only two reports of losses above $1 million in 2013 compared to six reports in 2012. - In 2013 the top 10 scams reported to the ACCC in terms of contact levels remained the same with some minor movements in ranking. The three most commonly reported scams were advance-fee fraud, phishing and identity theft, and computer hacking scams. - The ACCC observed a significant increase in phishing and identity theft scams, with reports increasing by over 73 per cent from 2012 to 15 264 contacts. Actual financial losses remained low, suggesting that scammers are instead seeking personal information for later gain. - Computer prediction software scams saw a significant increase in both contacts and financial losses from the previous year, with an increase of 41 per cent in contact levels and associated losses more than doubling to a total of $9 144 288. This increase is likely attributable to a collapsed gambling system in Victoria, which received widespread media coverage. Age range and location demographics - In 2013, of all individuals who contacted the ACCC and provided their age, scams were most commonly reported by persons in the 45 to 54 age category. The percentage of reports from people who identified as 65 years and over nearly doubled to 18 per cent. - The greatest amount of scam reports came from New South Wales, Victoria and Queensland. Contact levels and associated losses were largely consistent with the percentage of the Australian population by state and territory. - At the end of 2013 the ACCC updated its data collection process and in 2014 will be able to analyse scam categories against new fields such as a victim's gender, whether they are a small business, or may be disadvantaged or vulnerable. Scam delivery method - In line with a shift in recent years, in 2013 over half (52 per cent) of scams were delivered via phone and text message, with combined total financial losses of $29 391 887. Telephone calls remained the most popular delivery method, with reports and losses rising in parallel by nearly 13 and 14 per cent respectively, and losses totalling $3 335 763. Scams delivered by text message decreased by around 35 per cent, while reported losses more than doubled to $1 848 805. - Despite representing a lower percentage of contacts (40 per cent), scams delivered online caused the greatest financial harm with associated losses totalling $41 781 071. While contacts of reports delivered via email increased by nearly 14 per cent, financial losses almost halved (49 per cent), which could indicate scammers using email to 'fish' for personal information but turning to other online communication platforms such as social networking sites for monetary gain. The ACCC's education and awareness raising activities - The ACCC continued to educate the public about how to identify and avoid scams, and raise community awareness about current scams targeting Australians. SCAMwatch, the Australian Government's website for information about scams that is run by the ACCC, received 1 228 599 unique visitors in 2013, an increase of over 26 per cent from the previous year. - The ACCC also continued to issue SCAMwatch radar alerts to its free subscription base, which in 2013 increased by 30 per cent to reach 29 150 subscribers. A total of 18 SCAMwatch alerts were issued warning about current scams, including joint radars issued with other government agencies and companies about scammers misusing consumer trust in these well-known entities. - The ACCC's SCAMwatch_gov Twitter profile also continued to communicate with its 4374 followers in real time as scams emerged, with 583 tweets posted during the year. - The 2013 National Consumer Fraud Week campaign, 'Outsmart the scammers!' (17-23 June), received significant media coverage as the ACCC and the Australasian Consumer Fraud Taskforce urged people to stay one click ahead of scammers when shopping online. - The Little Black Book of Scams is the ACCC's most popular publication and 91 203 copies were distributed in 2013. A new small business scams factsheet was also produced. The ACCC's collaboration, disruption and enforcement activities - In 2013 the ACCC worked with a range of private and public sector representatives to disrupt scams including online shopping scams and the 'Yellow Pages' small business scam. - The ACCC continued to chair the Australasian Consumer Fraud Taskforce, and hosted a conference and workshop as part of National Consumer Fraud Week where representatives across government, industry and academia explored how to minimise scams activity in the digital economy. - The ACCC successfully prosecuted the perpetrators behind schemes targeting small businesses including the operators of a pyramid selling scheme, an online business directory scam with a philanthropic slant, and an office supply scheme. - The ACCC also commenced planning for a national disruption project aimed at relationship scams, which is a 2014 compliance and enforcement priority. The ACCC will work closely with other agencies on this project, building upon previous work undertaken to disrupt relationship scams.

Details: Canberra: ACCC, 2014. 81p.

Source: Internet Resource: Accessed July 11, 2014 at: https://www.accc.gov.au/system/files/Targeting%20Scams%202013.pdf

Year: 2014

Country: Australia

URL:

Shelf Number: 132658

Keywords:
Consumer Protection and Fraud
Crimes Against Business
Financial Crimes
Fraud
Scams

Author: Australian Competition and Consumer Commission

Title: Targeting Scams: Report of the ACCC on scams activity 2015

Summary: The Australian Competition and Consumer Commission's (ACCC) seventh annual report on scams activity in Australia highlights the significant financial loss and emotional harm incurred by the Australian community as a result of scams. In 2015 the ACCC received over 105 000 scam reports, 14 000 more than in 2014. Reported monetary losses also grew by 4 per cent, to almost $85 million. For this year's report the ACCC has also reviewed data from other jurisdictions that receive reports or detect scams to gain a clearer picture of the significance of losses caused by scam activity in Australia. Reports to the Australian Cybercrime Online Reporting Network (ACORN) revealed losses of over $127 million1. Additionally, various scam disruption programs, operated by the ACCC and other agencies, also detect Australians sending funds to high risk jurisdictions. A combined estimate of losses to this unreported scam activity is $17.1 million. Combining Scamwatch and ACORN data with losses detected through scam disruption work, total scam losses exceed $229 million. This report seeks to explore the nature of scam losses and identify some emerging trends. It focuses on data reported to Scamwatch and statistics provided in the report are in respect of that data unless specifically stated otherwise. By far the most concerning trend in the ACCC's Scamwatch data related to investment scams, which overtook dating and romance scams as the category with the largest financial losses reported by Australians in the last year. Losses to investment scams almost doubled, from $12.5 million to $24.4 million with six people reporting individual losses of $1 million or more. Additionally, ACORN data shows reported losses to investment scams of almost $17 million. This brings total reported losses to more than $41 million and this still does not include those that do not report or may have reported to another organisation. It is not hard to see why many Australians are losing large sums of money in these scams given how difficult they are to identify. These more sophisticated scams often involve scammers who use accurate technical jargon in carefully crafted cold calling scripts and accompany this with glossy brochures backed up by professional-looking websites. Even astute investors have been known to fall victim to these more calculated scams. Losses reported to Scamwatch from dating and romance scams have reduced by more than $5 million (18.5 per cent) to $22.7 million, and are the second highest category in 2015. Together with investment scams, they account for 56 per cent of scam losses reported to Scamwatch in the past year. A further $14.8 million was reported to ACORN. When you add in the $17.1 million identified through disruption initiatives, this brings the total for relationships scams to over $54 million. While investment and dating scams caused the most losses in 2015, the most commonly reported scams to the ACCC have been phishing scams, reclaim scams and upfront payment/advanced fee scams. Over 15 000 reports of phishing scams have been received, resulting in a total reported loss of $363 270. While the number of reports we received are spread across all age groups, it is middle aged and older Australians who are reporting the highest losses. The ACCC has taken a closer look at the risk that scam activity poses to older Australians in this report.

Details: Canberra: ACCC, 2016. 81p.

Source: Internet Resource: Accessed May 19, 2016 at: http://apo.org.au/files/Resource/targeting_scams_-_report_of_the_accc_on_scam_activity_2015.pdf

Year: 2016

Country: Australia

URL: http://apo.org.au/files/Resource/targeting_scams_-_report_of_the_accc_on_scam_activity_2015.pdf

Shelf Number: 139103

Keywords:
Consumer Protection and Fraud
Crimes Against Business
Cybercrime
Financial Crimes
Fraud
Scams

Author: EY

Title: Fraud and corruption -- Driving away talent? Asia-Pacific Fraud Survey 2015

Summary: Given the ongoing war for talent in Asia-Pacific (APAC), our APAC Fraud Survey 2015 reveals a compelling new reason for executives and boards to revisit their fraud, bribery and corruption risk mitigation strategies. To date, the incentives to get compliance right have centered on minimizing financial losses, reducing the management time required to investigate and remediate issues, and preventing the reputational damage caused by corruption. But with a vast majority of our more than 1,500 respondents rating ethical practices as important - and nearly 80% saying they would be unwilling to work for organizations involved in bribery and corruption - there's a new imperative to manage fraud, bribery and corruption risks effectively. Failing to do so could see promising talent avoid working for organizations and cause the best employees to jump ship, leading to higher attrition rates and expensive recruitment campaigns. In markets where it's already difficult to recruit and retain staff, the consequences could be catastrophic. As this survey discusses, to avoid putting their valued talent and growth strategies at risk, APAC companies will need a holistic fraud prevention and detection framework - backed by strong leadership, with up-to-date and well-enforced internal controls, policies and procedures. Organizations also need to improve the way they handle whistleblower hotline complaints, with far fewer respondents willing to use a hotline when compared to our 2013 survey. Our 2015 survey also concludes that the answer to increasing regulatory enforcement and stretched in-house compliance teams lies in leveraging big data through forensic data analytics (FDA), as well as involving the entire C-suite in preparing for a possible cybercrime incident.

Details: s.l.: EY, 2015. 28p.

Source: Internet Resource: Accessed May 23, 2016 at: http://www.ey.com/Publication/vwLUAssets/ey-apac-fraud-survey-2015/$FILE/ey-apac-fraud-survey-2015.pdf

Year: 2015

Country: Asia

URL: http://www.ey.com/Publication/vwLUAssets/ey-apac-fraud-survey-2015/$FILE/ey-apac-fraud-survey-2015.pdf

Shelf Number: 139139

Keywords:
Bribes
Crimes Against Business
Cybercrime
Financial Crimes
Fraud and Corruption

Author: Kroll

Title: Global Fraud & Risk Report: Forging New Paths in Times of Uncertainty. 10th Annual Edition

Summary: Businesses saw a significant rise in fraud and risk incidents during 2016. Although companies have taken significant strides toward building resiliency, more is needed. We have expanded the scope of this year's Report - it's now the annual Kroll Fraud & Risk Report, breaking out specific cyber and security threats to better reflect the growing challenges that our clients are facing around the world. The 2017/2018 Kroll Global Fraud & Risk Report, based on a survey commissioned by Kroll and carried out by Forrester Consulting, shares the experiences of executives worldwide. As in prior years, the Kroll Report includes detailed analyses for fraud-, cyber-, and security-related incidents by major industries and by regions We believe you will find the knowledge and insight contained in this year's Kroll Report to be valuable in your organization's efforts to anticipate, detect, mitigate, and respond to current and emerging risks. Key survey findings include: All-time high incidence levels. Businesses reported all-time high levels of fraud (84%), cyber (86%), and security (70%) incidents. Information increasingly targeted. For the first time in the Kroll Report's 10-year history, information theft, loss, or attack was the most prevalent type of fraud experienced (29%). Greater concerns over potential risk exposure. More than ever, executives say their companies are vulnerable to fraud, cyber, and security risks.

Details: Kroll, 2018. 47p.

Source: Internet Resource: accessed February 6, 2018 at: http://www.hippogriff.tech/docs/Kroll%20Global%20Fraud%20Risk%20Report%202017-18.pdf

Year: 2018

Country: International

URL: http://www.hippogriff.tech/docs/Kroll%20Global%20Fraud%20Risk%20Report%202017-18.pdf

Shelf Number: 149011

Keywords:
Crimes Against Business
Cybercrime
Fraud