Transaction Search Form: please type in any of the fields below.
Date: November 22, 2024 Fri
Time: 11:35 am
Time: 11:35 am
Results for employee fraud
4 results foundAuthor: Hayes, Read Title: Strategies to Detect and Prevent Workplace Dishonesty Summary: Estimates reveal that between 40% and 50% of all business losses can be attributed to employee theft. This report provides research-informed, practical strategies to reduce counterproductive workplace behaviors, including thefts and frauds of all types. It describes factors that can lead to these behaviors, describes common employee theft and fraud methods, and analyzes selected prevention techniques, policies, and technologies. Details: Alexandria, VA: ASIS International Foundation, 2008. 38p. Source: CRISP Report: Connecting Research in Security to Practice Year: 2008 Country: United States URL: Shelf Number: 113052 Keywords: Employee FraudEmployee TheftWorkplace Crime |
Author: CIFAS Title: The Internal Betrayal: A CIFAS Report on Beating the Growing Threat of Staff Fraud Summary: While attention has traditionally been focused upon external attempts to defraud, increasingly the fraud threat is being mirrored internally. In 2009, CIFAS Staff Fraud Members noted a 45% increase in the number of cases of fraud committed by employees, compared with 2008. This included theft of cash from the organisation or a customer account, or lies on an application form, through to the theft or disclosure of commercial or personal data. The opportunities to commit fraud from the inside are numerous. In The Internal Betrayal, CIFAS and a wide range of fraud prevention bodies and experts have combined to examine the facts about staff fraud. This report looks at the steps that organisations can take in order to combat the threat successfully. From the recruitment process, expenses claims, whistleblowing and corruption, to ensuring that the right anti-fraud philosophy is present at all organisational levels, you will find in this report all that you need to know about combating the threat of staff fraud. Details: London: CIFAS: The UK's Fraud Prevention Service, 2010. 24p. Source: Internet Resource: Accessed September 6, 2010 at: http://www.cifas.org.uk/download/The_Internal_Betrayal_CIFAS_Special_Report.pdf Year: 2010 Country: United Kingdom URL: http://www.cifas.org.uk/download/The_Internal_Betrayal_CIFAS_Special_Report.pdf Shelf Number: 119747 Keywords: Employee FraudEmployee TheftFraudWorkplace Crime |
Author: Title: TSA's Oversight of the Airport Badging Process Needs Improvement Summary: The Transportation Security Administration (TSA) is responsible for protecting the Nation’s transportation systems. This includes ensuring that employees working in secured airport areas are properly vetted and badged. The agency relies on designated airport operator employees to perform the badging application process. Our objective was to determine whether the TSA provides effective oversight for the issuance of airport security badges. Individuals who pose a threat may obtain airport badges and gain access to secured airport areas. We analyzed vetting data from 359 airport badging offices and identified badge holder records with omissions or inaccuracies pertaining to security threat assessment status, birthdates, and birthplaces. For example, of the badges were issued to individuals without a complete security threat assessment. These problems exist because TSA has designed and implemented only limited oversight of the application process. Specifically, the agency did not: Ensure that airport operators have quality assurance procedures for the badging application process; Ensure that airport operators provide training and tools to designated badge office employees; and Require its Transportation Security Inspectors to verify the airport data during their reviews. Consequently, the safety of airport workers, passengers, and aircraft is at risk due to the potential of inappropriate individuals obtaining airport badges. TSA concurred with five recommendations and partially concurred with one that will improve the effectiveness of safeguards over the badging process. Details: Washington, DC: Department of Homeland Security, 2011. 34p. Source: Report OIG-11-95: Internet Resource: Accessed February 10, 2012 at http://chsdemocrats.house.gov/SiteDocuments/20110803172118-83003.pdf Year: 2011 Country: United States URL: http://chsdemocrats.house.gov/SiteDocuments/20110803172118-83003.pdf Shelf Number: 124040 Keywords: Airport SecurityEmployee FraudTransportation SecurityWorkplace Crime |
Author: Ponemon Institute Title: The Risk of Insider Fraud: U.S. Study of IT and Business Practitioners Summary: Ponemon Institute and Attachmate are pleased to present the results of The Risk of Insider Fraud. According to Ponemon Institute research, insider negligence and maliciousness can be one of the major causes of a costly and reputation damaging data breach. As reported in the Ponemon Institute’s most recent Cost of Data Breach study, malicious insiders cause 31 percent of all data breaches and the average cost of such a breach is $318 per lost record. We believe this study is important because it reveals how prevalent insider fraud is in the organizations we studied, the consequences of fraud and how much money is needed to reduce the risk. In our study, we defined insider fraud as the malicious or criminal attacks perpetrated upon business or governmental organizations by employees, temporary employees and contractors. Typically, the objective of such attacks is the theft of financial or information assets – which include customer data, trade secrets and intellectual properties. Sometimes the most dangerous insiders are those who possess strong IT skills or have access to your organization’s critical applications and data. Other risks with potentially severe consequences are the intentional or accidental data misuse or policy violation. The recent case involving a 31-year-old UBS trader illustrates how costly and potentially damaging to an organization’s reputation insider fraud can be. According to the Financial Times, Kweku Adoboli was charged with fraud by abuse of position and two counts of false accounting. The total loss to UBS as a result of his “unauthorized” activity is $2 billion. Using survey methods, we implemented an objective study about how highly experienced individuals in IT, security, compliance and other business fields deal with the risk of fraud perpetrated by malicious insiders. This study attempts to ascertain what these individuals perceive to be the most serious vulnerabilities in their organizations and how they can improve IT, governance and control practices that reduce fraud and ensure compliance with regulations. Our sample consists of 707 individuals (respondents) who have more than 10 years of experience and the vast majority is positioned at or above the manager level within their organizations. Sixty-two percent of respondents are in IT-related roles. While all respondents are located in the United States, many of their organizations are multinational or with operations in other countries. Details: Traverse City, MI: Ponemon Institute, 2011. 22p. Source: Ponemon Institute Research Report: Internet Resource: Accessed August 28, 2012 at http://resources.idgenterprise.com/original/AST-0060002_Ponemon_2011_Insider_Fraud_Survey_Results.pdf Year: 2011 Country: United States URL: http://resources.idgenterprise.com/original/AST-0060002_Ponemon_2011_Insider_Fraud_Survey_Results.pdf Shelf Number: 126156 Keywords: Employee FraudFraudInformation TechnologyWorkplace Crime |