Dissertations / Theses on the topic 'Fraud'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Fraud.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Albrecht, Chad Orsen. "International fraud: A management perspective." Doctoral thesis, Universitat Ramon Llull, 2008. http://hdl.handle.net/10803/9196.
Full textEl primer article que presento en la meva tesi fou publicat al European Business Forum, una revista especialitzada patrocinada per la CEMS, que és llegida per més de 40.000 professionals dels negocis d'arreu d'Europa. Alguns dels diaris internacionals més importants, com ara el Times of London Newspaper, també citen aquest article a bastament. S'hi exposa per què i com es cometen els fraus.
El segon article que comento a la tesi es troba actualment en fase de "revisió i reenviament" al Journal of Business Ethics. Es tracta d'un journal sobre factors d'impacte, inclòs a la llista dels 40 millors journals de management que publica el Financial Times. Aquest article tracta de com les persones fan servir el poder per reclutar altres persones per tal que participin en el frau d'estats financers. Aquest segon article també es va sotmetre a la revisió d'àrbitres a l'edició 2007 de la European Academy of Management Conference que tingué lloc a París, França.
El tercer article que es presenta en la meva tesi fou publicat a The Journal of Digital Forensics, Security, and Law. També s'havia presentat prèviament a la XII Conferència Anual d'AMCIS amb revisors, que tingué lloc a Acapulco, Mèxic. La Conferència d'AMCIS és un dels principals congressos acadèmics que tracten dels camps relacionats amb els sistemes d'informació. Aquest tercer article analitza com els responsables de perpetrar el frau se serveixen dels principis i les estratègies de poder i negociació per enredar les persones per Internet perquè participin en projectes de frau.
El quart article que comento fou publicat a l'Information Systems Security Journal. Aquest journal fa 17 anys que el publica Taylor and Francis Publishing -una de les principals editorials de journals acadèmics-, i és la publicació oficial de CISSP i SSCP. L'article analitza les tendències actuals en matèria de frau i la seva detecció.
El cinquè article que es presenta fou publicat a la Corporate Finance Review. Aquest article tracta específicament del frau d'estats financers als Estats Units. També explica què pot fer Europa per aprendre dels errors comesos als Estats Units. La Corporate Finance Review és patrocinada per Thomson Education -una editorial líder en l'àmbit educatiu. Actualment, la revista es troba al 12è any de publicació.
Finalment, el darrer article que presento a la tesi és un comentari que es va fer sobre el tema del frau entre dos professors americans i jo mateix. Aquest diàleg es va publicar al Journal of Management, Spirituality, and Religion. El comentari tractava el tema de la relació entre organitzacions imbuïdes en la religió i el frau.
El objetivo de mi tesis es tratar de entender mejor los múltiples aspectos de la corrupción y el fraude internacionales desde la perspectiva del management. Para ello, proporciono un compendio de artículos, todos ellos publicados en journals con revisores, o bien que se hallan en proceso de publicación.
El primer artículo que presento en mi tesis fue publicado en el European Business Forum, una revista especializada patrocinada por la CEMS, que es leída por más de 40.000 profesionales de los negocios de toda Europa. Algunos de los diarios internacionales más importantes, como el Times of London Newspaper, también citan este artículo ampliamente. En él se expone por qué y cómo se cometen los fraudes.
El segundo artículo que comento en mi tesis se halla actualmente en fase de "revisión y reenvío" al Journal of Business Ethics. Se trata de un journal sobre factores de impacto, incluido en la lista de los 40 mejores journals de management que publica el Financial Times. Dicho artículo trata de cómo las personas se sirven del poder para reclutar a otras personas para que participen en el fraude de estados financieros. Este segundo artículo también fue sometido a la revisión de árbitros en la edición 2007 de la European Academy of Management Conference celebrada en París, Francia.
El tercer artículo que presento en mi tesis fue publicado en The Journal of Digital Forensics, Security, and Law. Asimismo, previamente se había presentado en la XII Conferencia Anual de AMCIS con revisores, celebrada en Acapulco, México. La Conferencia de AMCIS es uno de los principales congresos académicos que tratan de los campos relacionados con los sistemas de información. Este tercer artículo analiza cómo los responsables de perpetrar el fraude se sirven de los principios y estrategias de poder y negociación para enredar a persones por Internet para que participen en proyectos de fraude.
El cuarto artículo que comento fue publicado en el Information Systems Security Journal. Este journal es publicado desde hace 17 años por Taylor and Francis Publishing -una de las principales editoriales de journals académicos-, y es la publicación oficial de CISSP y SSCP. En dicho artículo se analizan las tendencias actuales en materia de fraude y su detección.
El quinto artículo que se presenta fue publicado en la Corporate Finance Review. Este artículo trata específicamente del fraude de estados financieros en Estados Unidos. També explica qué puede hacer Europa para aprender de los errores cometidos en Estados Unidos. La Corporate Finance Review cuenta con el patrocinio de Thomson Education -una editorial líder en el ámbito educativo. En la actualidad, la revista se halla en el 12.º año de publicación.
Finalmente, el último artículo que presento en mi tesis es un comentario sobre el tema del fraude, realizado entre dos profesores americanos y yo mismo. Dicho diálogo fue publicado en el Journal of Management, Spirituality, and Religion. El comentario trataba del tema de la relación entre organizaciones imbuidas en la religión y el fraude.
The purpose of my dissertation is to address and better understand the many aspects of International Fraud and Corruption from a Management Perspective. In my dissertation, I provide a compendium of publications. Each publication was published, or is in the process of being published, in a peer-review journal.
The first article that is presented in my dissertation was published in the European Business Forum, a CEMS sponsored journal that is read by more than 40,000 business professionals throughout Europe. Several major international newspapers, including the prestigious Times of London Newspaper, also quoted this article extensively. The article addresses why and how fraud are committed.
The second article that is presented in my dissertation is currently under "revise and resubmit" status at the Journal of Business Ethics. This journal is an impact factor journal and is included on the Financial Times list of top 40 management journals. The article addresses how individuals use power to recruit other people to participate in financial statement fraud. This second article was also presented at the peer review 2007 European Academy of Management Conference in Paris, France.
The third article that is presented in my dissertation was published in The Journal of Digital Forensics, Security, and Law. This article was also previously presented at the 12th annual peer-review AMCIS conference in Acapulco, Mexico. The AMCIS conference is one of the leading academic conferences within the information systems fields. This third article addresses how perpetrators use the principles and strategies of power and negotiation to con individuals via the Internet to participate in fraud schemes.
The fourth article presented in my dissertation was published in Information Systems Security Journal. This journal is currently in its 17th year of publication and is published by Taylor and Francis Publishing - one of the leading publishers in academic journals. This journal is also the official publication of the CISSP and SSCP. The article deals with current trends in fraud and its detection.
The fifth article that is presented in my dissertation was published in the journal Corporate Finance Review. This article specifically deals with financial statement fraud in the United States. The article further explains what Europe can do to learn from the mistakes of the United States. Thomson Education - a leader in educational publishing, is the sponsor of Corporate Finance Review. The journal is currently in its 12th year of publication.
Finally, the last article presented in my dissertation is a commentary that took place on the subject of fraud between two American professors and myself. The dialogue was published in the Journal of Management, Spirituality, and Religion. The topic of the commentary was on the relationship between organizations embedded in religion and fraud.
Howell, Andrew S. "Fraud prevention : the alignment between fraud-related legislation and fraud government practices." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/104398/1/Andrew_Howell_Thesis.pdf.
Full textPonce, Michael. "Healthcare fraud and non-fraud healthcare crimes: A comparison." CSUSB ScholarWorks, 2007. https://scholarworks.lib.csusb.edu/etd-project/3233.
Full textHinostroza, Grijalva Clorinda Miriam, and Yucra Alicia Palomino. "Impacto de la auditoría forense como herramienta de apoyo para detectar y reducir el fraude financiero y tributario en las empresas de transporte de carga terrestre Lima, distrito de Ate, 2018." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2019. http://hdl.handle.net/10757/652084.
Full textThis research seeks to understand the importance of the application of Forensic Audit as a support tool in companies in the transport sector. For this purpose, concepts, methods and tools that are used for the reduction of financial and tax fraud were analyzed, and the concepts of Control, Financial and Tax Fraud of the land freight transport sector were also reviewed. For the research plan, the hypothesis of the Impact of Forensic Audit is presented as a support tool, to detect and reduce financial and tax fraud in companies in the transport sector. This alternative hypothesis is rejected with a 5% significance. In the research methodology, a documentary study was executed, which was carried out by interviews with three experts on the subject. For this, a questionnaire was prepared with the purpose of identifying if there was knowledge about Forensic Audit, and knowing about the control processes that the companies in the field have. As a result of the application of the qualitative and quantitative instrument, it can be established that through the application of Forensic Audit as a tool to support internal auditing, fraud can be detected and prevented. In this way, it is demonstrated that Forensic Audit offers advantages and that when implementing it as a support tool, great results are obtained. After the respective analysis of interpretation of the results of said investigation, it can be concluded that the application of Forensic Audit as a support tool will not reduce cases of intentional theft and fraud: greater control in the processes will reduce the chances of committing fraud and greater control will be increased in the most sensitive areas of the item.
Tesis
Åkerblom, Thea, and Tobias Thor. "Fraud or Not?" Thesis, Uppsala universitet, Statistiska institutionen, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-388695.
Full textPerols, Johan L. "Detecting Financial Statement Fraud: Three Essays on Fraud Predictors, Multi-Classifier Combination and Fraud Detection Using Data Mining." [Tampa, Fla] : University of South Florida, 2008. http://purl.fcla.edu/usf/dc/et/SFE0002486.
Full textBergman, Bengt. "E-fraud E-fraud, state of the art and counter measures." Thesis, Linköping University, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2798.
Full textThis thesis investigates fraud and the situation on Internet with e-commerce today, to point on some potential threats and needed countermeasures. The work reviews several state of the art e-fraud schemes, techniques used in the schemes and statistics on the extent of e-fraud. This part shows that e-frauds are today both sophisticated and widespread.
Since real world frauds are deemed impossible to fully cover in order to predict potential new e-frauds, the thesis adopts a different approach. It suggests two abstraction models for fraud cases, a protocol model and a functional model. These are used to perform analysis on case studies on both telecom frauds and e-frauds. The analysis presents characteristics for both types of frauds. Using one of the abstraction models, the functional model, conceptually similar cases among telecom frauds as well as e-fraud cases are identified. The similar cases in each category are then compared, using the other abstraction model, the protocol model. The study shows that concepts from telecom frauds already exist in e-frauds.
Several challenges and some possibilities in e-fraud prevention and detection are also extracted in the comparative study of the different categories. The major consequence of the challenges is e-frauds’ higher scalability compared to telecom frauds.
Finally, this thesis covers several existing countermeasures in e-commerce along with specific countermeasures against auction fraud, phishing and spam. However, it is shown that these countermeasures do not address the challenges in e-fraud prevention and detection to a satisfactory extent. Therefore, this thesis proposes several high-level countermeasures in order to address the challenges.
Santos, Filipe Marques dos. "Os incentivos para cometer fraude nas Sociedades Anónimas Portuguesas." Master's thesis, Instituto Superior de Economia e Gestão, 2016. http://hdl.handle.net/10400.5/12646.
Full textSegundo a Teoria do Triângulo da Fraude, para ocorrer um comportamento fraudulento é necessário combinar "incentivo", "oportunidade" e "racionalização". Este estudo teve como finalidade averiguar a postura dos administradores e directores financeiros perante a fraude, abordando apenas o lado do incentivo. O presente estudo teve como base um inquérito enviado para administradores e directores financeiros de Sociedades Anónimas Portuguesas. No estudo foram analisadas variáveis sociodemográficas (género, idade, nível de habilitação, posse de habilitação académica na área financeira, estado civil) e variáveis organizacionais (número de trabalhadores da organização, tratar-se de uma empresa familiar ou estar incluída num grupo económico, assim como o sector de actividade em que está inserida). Os resultados obtidos mostram que não existe um perfil específico de modo a uma pessoa se sentir incentivada para cometer fraude.
According to the theory of the Fraud Triangle, for a fraudulent behaviour to occur it is needed to combine "incentive", "opportunity" and "rationalization". This study had the goal to find out how the administrators and financial directors react when confronted by fraud, approaching only the incentive side. The present study was based on an enquire sent to administrators and financial directors of Anonymous Portuguese Societies. In this study were analysed sociodemographic variables (gender, age, qualification level, possession of financial related academic qualification, civil status) and organizational variables (number of workers in the organization, being a family business or to be included in an economic group, as well as the activity sector it is part of). The results showed there is not a specific profile that incentives a person to commit fraud.
Silva, Carlos Eduardo de Abrantes Vaz e. Távora Vasconcelos da. "Da fraude marítima - são as distributed ledger technologies (blockchain) uma solução?" Master's thesis, Instituto Superior de Economia e Gestão, 2019. http://hdl.handle.net/10400.5/18463.
Full textEstima-se que a fraude marítima - fraude cometida envolvendo navios e ou carga transportada por via marítima - cause actualmente perdas e prejuízos que podem ascender anualmente a vários biliões de dólares americanos. O transporte marítimo de mercadorias é uma actividade abrangentemente regulada por via do direito marítimo, pelo que, a compreensão da natureza jurídica do navio ou o estudo do alcance que determinados documentos comportam, como o conhecimento de embarque (Bill of Lading), são aspectos necessários ao entendimento das particularidades da fraude marítima. A par da complexidade legal e documental intrínsecas às actividades de transporte marítimo de mercadorias, aspectos como o seu carácter internacional e o elevado número de agentes que intervêm no sector, são vistos como factores críticos à ocorrência de fraudes na esfera do transporte marítimo. Com base neste enquadramento, a investigação conclui que a tecnologia Blockchain, enquanto uma DLT - Distributed Ledger Technology, especialmente por via da resolução da problemática do double spending sem recurso a uma entidade centralizadora, e uma vez ultrapassados os desafios de adopção generalizada da tecnologia, pode vir a mitigar ou mesmo resolver grande parte da problemática da fraude marítima tal qual se conhece, especialmente a de carácter documental.
It is estimated that maritime fraud - fraud involving ships and / or cargo transported by sea - is currently causing losses up to several billion US dollars annually. Maritime freight is an activity that is broadly regulated through maritime law, so understanding the legal nature of the ship or examining the scope of certain documents, such as the Bill of Lading, is necessary to comprehend the maritime fraud. In addition to the legal and documentary complexity inherent in maritime freight transport activities, aspects such as its international character and the large number of agents involved in the sector are seen as critical factors for the occurrence of maritime fraud. Based on this framework, the research concluded that Blockchain technology, while DLT - Distributed Ledger Technology, especially by solving the problem of double spending without recourse to a centralization entity, and once overcome the challenges of general adoption of the technology, can mitigate or even solve much of the problems of maritime fraud as it is known, especially those involving documents.
info:eu-repo/semantics/publishedVersion
Oliveira, Rossimar Laura. "Gestão de fraudes financeiras externas em bancos." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/96/96132/tde-21122012-111004/.
Full textAccording to KPMG audit report, 69% of companies admitted being victims of some kind of fraud. In 2010, the banking sector have lost approximately R$ 1.5 billion due to financial fraud perpetrated on customers considering only documentary fraud and the electronic banking fraud losses exceeded R$ 900 million in the same year. The types of fraud were many, including fraud during account opening, cloned checks, forgery, alteration barcode and card cloning. Fraud is a common problem in organizations and widely discussed in the market, however it was found that there is a theoretical gap when it comes to managing external fraud. The objective of this research was to structure a conceptual framework for the Management of Fraud and its comparison with the practice. This is an exploratory qualitative study and was conducted through analysis based on Grounded Theory defining categories from the available literature and interviews with comparison to a bank and an association of financial institutions, in addition to news articles. Regarding the use of results is an applied research its result can also contribute to the theoretical discussion, and be applied to any organization interested in managing financial fraud. The results of the development of the conceptual framework shows that the management of external financial fraud has four phases: Continuous, Prevention, Detection and Reaction and the defined categories are located in them. Regarding the comparison of theory with practice, not all aspects verified in the literature could be found in the reports of interviews and newspaper articles analyzed.
Edmonds, Mark Allen. "THE INVISIBLE FRAUD: THE IMPACT OF INATTENTIONAL BLINDNESS ON AUDITOR FRAUD DETECTION." OpenSIUC, 2016. https://opensiuc.lib.siu.edu/dissertations/1153.
Full textAlves, Catarina Parracho Trindade Lima. "Determinantes da denúncia da fraude por parte dos auditores portugueses." Master's thesis, Instituto Superior de Economia e Gestão, 2016. http://hdl.handle.net/10400.5/12643.
Full textEste estudo tem como objetivo perceber quais os fatores que têm influência na decisão de denúncia de atos fraudulentos por parte dos auditores portugueses. Foram consideradas dez variáveis determinantes na decisão de denúncia de atos fraudulentos: o conhecimento de políticas de Whistleblowing, a adequação dos canais de reporte, a dimensão da empresa, a formação, a gravidade do ato fraudulento, o género, a idade e experiência profissional, a existência de retaliação e a existência de legislação. Foi realizado um questionário online utilizando cenários que descrevem situações que poderão ocorrer no âmbito de um trabalho de auditoria, tendo sido solicitada a colaboração de todas as empresas de auditoria registadas na base da Informa D&B em Portugal, e foram obtidas 445 respostas completas. Os resultados indicam que dos determinantes acima mencionados, o conhecimento das políticas de Whistleblowing, a adequação dos canais de reporte, a dimensão, a formação e a adequação da formação são as variáveis que influenciam a decisão dos auditores de denunciar atos fraudulentos.
This study aims to understand which factors influence Portuguese auditors' decision to whistle blow. Ten determinants were considered as possible influencers of the decision to blow the whistle: knowledge of Whistleblowing policies, the adequacy of reporting channels, the size of the company, training, the severity of the act fraudulent, gender, age and professional experience, the existence of retaliation and the existence of legislation. An online survey was conducted using scenarios that described situations that may occur in the course of an audit work, having been requested the cooperation of all audit firms registered at Informa D&B database in Portugal, and were obtained 445 complete responses. The results indicate that of the determinants mentioned above, knowledge of Whistleblowing policies, the adequacy of reporting channels, the size, training and the training quality are the variables that influence the decision of the auditors to report fraudulent acts.
Reid, Dot. "Fraud in Scots law." Thesis, University of Edinburgh, 2013. http://hdl.handle.net/1842/9602.
Full textWang, Yue. "Securities fraud an economic analysis /." College Park, Md. : University of Maryland, 2005. http://hdl.handle.net/1903/2457.
Full textThesis research directed by: Business and Management. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Putter, Renier. "Dental fraud in South Africa." University of the Western Cape, 2016. http://hdl.handle.net/11394/5736.
Full textHealthcare fraud wastes money that could be spent in the treatment of patients. The exact amount of healthcare fraud is very difficult to determine, especially in a two-tier healthcare system like South Africa. The amount and cost of dental fraud in South Africa has never been researched. If the amount and cost of fraud in a specific area can be determined, resources can be better used to combat healthcare fraud in the future.
Butcher, Bruce Stanley. "Combating corporate abuse and fraud." Thesis, University of London, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.429016.
Full textBreslin, John. "Extraterritorial control of securities fraud." Thesis, University of Cambridge, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.333177.
Full textAhn, Jae Hwan. "Three essays on accounting fraud." Thesis, University of Warwick, 2018. http://wrap.warwick.ac.uk/108524/.
Full textQiu, Buhui. "Two Essays on Corporate Fraud." University of Cincinnati / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1242939000.
Full textLau, Marcelo. "Análise das fraudes aplicadas sobre o ambiente Internet Banking." Universidade de São Paulo, 2006. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-19092006-164238/.
Full textThis research identifies under the technology, business, social engineering and inquiry context the occurrence of fraud on Internet Banking environment. It covers the evolution of the methods used for deceivers since from the beginning, in the year of 2002, and his evolution in the sophistication in several ways used for attacks until 2005. The analysis is based on a case study and a quantitative number of incidents in the period of one year were collected making possible to see the point of such purpose the trend of attacks on Interne t Banking customers. With full domain of this ones subject, this research brings suggest for incident containment three lines of action; on final users, suppliers and deceivers.
Perez, Juan E. II. "Executive Compensation and Fraud: Trends in Executive Pay Mix and Company's Increased Exposure to Fraud." Scholarship @ Claremont, 2017. http://scholarship.claremont.edu/cmc_theses/1469.
Full textJurgovsky, Johannes. "Context-aware credit card fraud detection." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEI109.
Full textCredit card fraud has emerged as major problem in the electronic payment sector. In this thesis, we study data-driven fraud detection and address several of its intricate challenges by means of machine learning methods with the goal to identify fraudulent transactions that have been issued illegitimately on behalf of the rightful card owner. In particular, we explore several means to leverage contextual information beyond a transaction's basic attributes on the transaction level, sequence level and user level. On the transaction level, we aim to identify fraudulent transactions which, in terms of their attribute values, are globally distinguishable from genuine transactions. We provide an empirical study of the influence of class imbalance and forecasting horizons on the classification performance of a random forest classifier. We augment transactions with additional features extracted from external knowledge sources and show that external information about countries and calendar events improves classification performance most noticeably on card-not-present transaction. On the sequence level, we aim to detect frauds that are inconspicuous in the background of all transactions but peculiar with respect to the short-term sequence they appear in. We use a Long Short-term Memory network (LSTM) for modeling the sequential succession of transactions. Our results suggest that LSTM-based modeling is a promising strategy for characterizing sequences of card-present transactions but it is not adequate for card-not-present transactions. On the user level, we elaborate on feature aggregations and propose a flexible concept allowing us define numerous features by means of a simple syntax. We provide a CUDA-based implementation for the computationally expensive extraction with a speed-up of two orders of magnitude. Our feature selection study reveals that aggregates extracted from users' transaction sequences are more useful than those extracted from merchant sequences. Moreover, we discover multiple sets of candidate features with equivalent performance as manually engineered aggregates while being vastly different in terms of their structure. Regarding future work, we motivate the usage of simple and transparent machine learning methods for credit card fraud detection and we sketch a simple user-focused modeling approach
Chui, Lawrence. "An Experimental Examination of the Effects of Fraud Specialist and Audit Mindsets on Fraud Risk Assessments and on the Development of Fraud-Related Problem Representations." Thesis, University of North Texas, 2010. https://digital.library.unt.edu/ark:/67531/metadc30447/.
Full textSoutinho, Alexandra Marisa Martins de Sousa. "O auditor perante a fraude de relato financeiro." Master's thesis, Instituto Superior de Economia e Gestão, 2017. http://hdl.handle.net/10400.5/15146.
Full textO presente estudo tem como finalidade analisar o modo como os auditores externos lidam com a fraude, nomeadamente a fraude de relato financeiro. A análise em questão aborda as várias fases de uma auditoria, desde a planificação até ao momento que se emite uma opinião. Irá também ser abordada a relação entre os anos de experiência profissional de um revisor oficial de contas (ROC) e a sua opinião acerca da fraude, ou seja, se esta se vai ou não alterando tendo em conta os anos de experiência. Numa primeira fase foram abordados os temas mais pertinentes, possibilitando um enquadramento teórico sobre o âmbito do tema em causa, exemplificando-o também com um caso real e os seus impactos. Posteriormente, de modo a efetuar o estudo, foi elaborado um questionário direcionado exclusivamente aos ROC. Este, foi respondido por 80 profissionais de auditoria, com análise pormenorizada em cada uma das 18 questões, tendo em conta a sua frequência absoluta e relativa. Os resultados obtidos através da análise de médias, indicam que a variável da experiência profissional não tende a influenciar a opinião dos ROC. Deste modo, ao longo das várias fases de trabalho de uma auditoria a opinião acerca da fraude tende a ser a mesma, independentemente dos anos de experiência em causa.
The main purpose of this study is to analyze how external auditors deal with fraud, namely financial reporting fraud, by addressing all the numerous phases of an audit, from planning until the moment an opinion is given. The connection between the years of professional experience of a statutory auditor and his opinion about fraud, in other words, whether or not the latter changes taking in consideration the years of work experience, will also be addressed. The first part of this thesis focuses on the most relevant subjects, allowing not only a theoretical framework on the scope of the subject in question, but also by exemplifying it with a real case and its impacts. Subsequently, in order to carry out the study, a questionnaire was developed exclusively for statutory auditors. It was answered by 80 auditors, with detailed analysis on each of the 18 questions, taking into account their absolute and relative frequency. The results obtained through the analysis of rates demonstrate that the variable of professional experience does not tend to influence the opinion of the statutory auditors. Therefore, the opinion on fraud tends to be the same throughout the various stages of an audit work, irrespective of the years of experience involved
info:eu-repo/semantics/publishedVersion
Azevedo, João Luis Sales de. "Levantamento de requisitos para um processo de prevenção a fraudes eletrônicas." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2014. http://hdl.handle.net/10183/105007.
Full textThe direction that the financial market is taking to provide electronic channels for customer services brings along a significant concern with the security of electronic channels: the growing number of attacks by fraudsters. In this sense, values mobilized to increase the security of such channels and with the losses resulting from criminal attacks of this nature require the need to provide stronger and more reliable electronic services. The main objective of the present study is the identification of requirements for a process of electronic fraud prevention in financial institutions. For this purpose, the work is proposed to submit a (i) study of quality requirements in case of electronic fraud prevention at a financial institution and (ii) the use of qualitative methods for identification of requirements into a process of electronic fraud prevention. The main contribution of this study is the presentation of an inventory of functional and technical requirements, necessary for the establishment and monitoring of a process of electronic fraud prevention for financial institutions, which provide electronic channels for their clients.
Lu, Yifei. "Deep neural networks and fraud detection." Thesis, Uppsala universitet, Tillämpad matematik och statistik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-331833.
Full textSigrist, Pierre. "Standby letters of credit and fraud." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/28827.
Full textLaw, Peter A. Allard School of
Graduate
Kesar, Shalinie. "Interpreting computer fraud committed by employees." Thesis, University of Salford, 2005. http://usir.salford.ac.uk/26756/.
Full textTimofeev, Yury [Verfasser]. "Essays on Occupational Fraud / Yury Timofeev." Frankfurt am Main : Frankfurt School of Finance & Management gGmbH, 2017. http://d-nb.info/1124713921/34.
Full textGayton, James R. S. "Case studies in government procurement fraud." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/9930.
Full textMBA Professional Report
Approved for public release, distribution is unlimited
The purpose of this research is to provide guidance that will increase awareness and facilitate class discussions on ethical situations that contracting officers are exposed to during their business relationships with contracting firms. The cases explore the specifics of individual incidents of ethical and procedural procurement violations. Additionally, this study provides conclusions and recommendations that could better educate prospective contracting officers of the temptations and legal ramifications of violations of procurement fraud within their commands.
Phillips, Thurman B., and Raymond J. Lanclos. "Data analytics in procurement fraud prevention." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42708.
Full textThe purpose of this research project is to explore the viability of detecting anomalies through using data analytics software as a tool in procurement fraud prevention and to analyze its potential policy implications on federal procurement stakeholders. According to a survey conducted in 2012 by the Association of Certified Fraud Examiners, organizations lose an estimated 5% of their revenues to fraud each year. In order to relate this estimate to the Department of Defense (DOD), this estimated percentage was applied to the requested DOD FY 2013 budget of $613.9 billion outlined in the Fiscal Year 2013 Budget Overview, resulting in a projected total fraud loss of $30.7 billion. The use of data analytics software has the potential to not only detect fraudulent procurements, but also to help deter fraudulent activities before they occur. The results of this research study will be a recommendation on the use of data analytics as a tool to detect anomalies that may indicate procurement fraud in DOD organizations.
Groves, Keleigh Ann. "Understanding benefit fraud : a qualitative analysis." Thesis, University of Leeds, 2002. http://etheses.whiterose.ac.uk/475/.
Full textSemmens, Natasha. "The fear of plastic card fraud." Thesis, University of Sheffield, 2002. http://etheses.whiterose.ac.uk/6006/.
Full textCenteno, García Gerardo. "Fraud in Mexico's Government Procurement Sector." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39101.
Full textVan, Heerden Johan H. "Detecting fraud in cellular telephone networks." Thesis, Stellenbosch : Stellenbosch University, 2005. http://hdl.handle.net/10019.1/50314.
Full textENGLISH ABSTRACT: Cellular network operators globally loose between 3% and 5% of their annual revenue to telecommunications fraud. Hence it is of great importance that fraud management systems are implemented to detect, alarm, and shut down fraud within minutes, minimising revenue loss. Modern proprietary fraud management systems employ (i) classification methods, most often artificial neural networks learning from classified call data records to classify new call data records as fraudulent or legitimate, (ii) statistical methods building subscriber behaviour profiles based on the subscriber’s usage in the cellular network and detecting sudden changes in behaviour, and (iii) rules and threshold values defined by fraud analysts, utilising their knowledge of valid fraud cases and the false alarm rate as guidance. The purpose of this thesis is to establish a context for and evaluate the performance of well-known data mining techniques that may be incorporated in the fraud detection process. Firstly, a theoretical background of various well-known data mining techniques is provided and a number of seminal articles on fraud detection, which influenced this thesis, are summarised. The cellular telecommunications industry is introduced, including a brief discussion of the types of fraud experienced by South African cellular network operators. Secondly, the data collection process and the characteristics of the collected data are discussed. Different data mining techniques are applied to the collected data, demonstrating how user behaviour profiles may be built and how fraud may be predicted. An appraisal of the performances and appropriateness of the different data mining techniques is given in the context of the fraud detection process. Finally, an indication of further work is provided in the conclusion to this thesis, in the form of a number of recommendations for possible adaptations of the fraud detection methods, and improvements thereof. A combination of data mining techniques that may be used to build a comprehensive fraud detection model is also suggested.
AFRIKAANSE OPSOMMING: Sellulêre netwerk operateurs verloor wêreldwyd tussen 3% en 5% van hul jaarlikse inkomste as gevolg van telekommunikasie bedrog. Dit is dus van die uiterse belang dat bedrog bestuurstelsels geïmplimenteer word om bedrog op te spoor, alarms te genereer, en bedrog binne minute te staak om verlies aan inkomste tot ’n minimum te beperk. Moderne gepatenteerde bedrog bestuurstelsels maak gebruik van (i) klassifikasie metodes, mees dikwels kunsmatige neurale netwerke wat leer vanaf geklassifiseerde oproep rekords en gebruik word om nuwe oproep rekords as bedrog-draend of nie bedrog-draend te klassifiseer, (ii) statistiese metodes wat gedragsprofiele van ’n intekenaar bou, gebaseer op die intekenaar se gedrag in die sellulêre netwerk, en skielike verandering in gedrag opspoor, en (iii) reëls en drempelwaardes wat deur bedrog analiste daar gestel word, deur gebruik te maak van hulle ondervinding met geldige gevalle van bedrog en die koers waarteen vals alarms gegenereer word. Die doel van hierdie tesis is om ’n konteks te bepaal vir en die werksverrigting te evalueer van bekende data ontginningstegnieke wat in bedrog opsporingstelsels gebruik kan word. Eerstens word ’n teoretiese agtergrond vir ’n aantal bekende data ontginningstegnieke voorsien en ’n aantal gedagteryke artikels wat oor bedrog opsporing handel en wat hierdie tesis beïnvloed het, opgesom. Die sellulêre telekommunikasie industrie word bekend gestel, insluitend ’n kort bespreking oor die tipes bedrog wat deur Suid-Afrikaanse sellulˆere telekommunikasie netwerk operateurs ondervind word. Tweedens word die data versamelingsproses en die eienskappe van die versamelde data bespreek. Verskillende data ontginningstegnieke word vervolgens toegepas op die versamelde data om te demonstreer hoe gedragsprofiele van gebruikers gebou kan word en hoe bedrog voorspel kan word. Die werksverrigting en gepastheid van die verskillende data ontginningstegnieke word bespreek in die konteks van die bedrog opsporingsproses. Laastens word ’n aanduiding van verdere werk in die gevolgtrekking tot hierdie tesis verskaf, en wel in die vorm van ’n aantal aanbevelings oor moontlike aanpassings en verbeterings van die bedrog opsporingsmetodes wat beskou en toegepas is. ’n Omvattende bedrog opsporingsmodel wat gebruik maak van ’n kombinasie van data ontginningstegnieke word ook voorgestel.
Domingues, Rémi. "Machine Learning for Unsupervised Fraud Detection." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-181027.
Full textRamage, Sally. "A comparative analysis of corporate fraud." Thesis, University of Wolverhampton, 2007. http://hdl.handle.net/2436/14408.
Full textGill, Karen Ann. "Insurance fraud : causes, characteristics and prevention." Thesis, University of Leicester, 2014. http://hdl.handle.net/2381/29106.
Full textLeder-Luis, Jetson. "The economics of fraud and corruption." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/127030.
Full textCataloged from the official PDF of thesis.
Includes bibliographical references.
Fraud and corruption are serious issues which undermine the provision of public goods. This thesis consists of three papers which analyze the economics of fraud and the mechanisms by which it can be detected and averted. An introductory chapter presents an overview of the economic ideas surrounding these topics. In the αrst paper, I analyze a US federal law that incentivizes whistleblowers to litigate against fraud and misreporting committed against the Medicare program. I provide a theoretical framework for understanding the economic tradeoffs associated with privatized whistleblowing enforcement and then empirically analyze the deterrence effects of whistleblower lawsuits. In the second paper, conducted as joint research, we consider the incentives for misreported enrollment statistics in Israeli public school data and the way in which data manipulation undermines economic estimates of the returns to smaller class sizes. We provide evidence of enrollment manipulation and show that smaller class sizes have no effect on student achievement, overturning earlier literature. In the third paper, we develop a mechanism for detecting misreported αnancial data and apply it to reports from a World Bank project. Our results are consistent with strategic and proαtable falsiαcation of data, and our method matches the results of an audit conducted independently by the World Bank on the same project.
by Jetson Leder-Luis.
Ph. D.
Ph.D. Massachusetts Institute of Technology, Department of Economics
Kayembe, Grace Longwa. "The Fraud Exception in Bank Guarantee." Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/4645.
Full textMock, Justin. "“Classic Case Studies in Accounting Fraud”." Miami University Honors Theses / OhioLINK, 2004. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1111004894.
Full textZhang, Jian. "ESSAYS ON CORPORATE FRAUD AND GOVERNANCE." Diss., Temple University Libraries, 2013. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/221494.
Full textPh.D.
A series of high-profile corporate fraud scandals in the early 2000s have drawn the attention from the public, regulators, and academia. These cases of the high-profile corporate fraud imply that the existing institutions are lack of incentives and monitoring. Therefore, this study aims to investigate the effectiveness of different governance mechanisms in limiting the fraud propensity. Chapter 1 investigates whether monitoring by non-CEO executives can effectively reduce the likelihood of CEOs committing corporate fraud. Controlling for other traditional governance mechanisms, we find that firms with stronger non-CEO executives monitoring have a lower probability of committing fraud. Monitoring by non-CEO executives appears to be a substitute for traditional governance channels, as it is more effective when traditional governance mechanisms are weak. Moreover, we argue that monitoring by non-CEO executives fails to prevent corporate fraud if both CEO and subordinate executives involve in the fraud event. Finally, the strength of such monitoring is larger in more heterogeneous industries, where the human capital of non-CEO executives is less replaceable. Chapter 2 examines the association between employee relation and the firm's incentive of committing fraud. We find that firms treating their employees fairly (as measured by employee relation ratings) have less incentive in committing fraud. Better employee relation facilitates interest alignment between shareholders and the management. Moreover, we find that the CEO duality weaken the negative association between employee relation and the likelihood of fraud commitment. Furthermore, we find that the negative association is more pronounced in R&D-intensive industries, where human capital is more valuable to firm performance. The results are robust to alternative models and measures. Chapter 3 examines the association between corporate political connection and corporate fraud, and its detection, in China for 2003-2009. Using the enforcement action data from the Chinese Securities Regulatory Commission (CSRC), we find that corporate political connection is an important determinant of corporate fraud, while the type of ultimate owner is also relevant. Politically connected firms are 27% less likely to be detected by the CSRC conditional on their fraud commitment. Low detection rate in turn implies that politically connected firms have 23% more probability to commit fraud than non-connected firms. Government controlled firms are 21% less likely to be investigated by the CSRC. However, due to the irrelative tie between firm performance and management team's compensation and promotion, government controlled firms are 12% less likely to commit fraud. Furthermore, we find that our results are mostly driven by the local political connection rather than the central political connection. Finally, our results provide information that can inform policy debates among the regulation policy makers.
Temple University--Theses
Jofre, Alegria Maria Paz. "Fighting Accounting Fraud through Forensic Analytics." Thesis, The University of Sydney, 2017. http://hdl.handle.net/2123/17826.
Full textCHEN, YAN-TING, and 陳妍庭. "Corporate Fraud Prediction Model: Incorporating Fraud Types." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/kpk87p.
Full text國立雲林科技大學
財務金融系
105
Due to false financial statements, corruption, asset misappropriation, manipulation of stocks, occurs a series of corporate fraud in the early Taiwan, despite the administration has improved the part of the supervision systems, it could not prevent the corporate fraud completely. This paper will develop the most suitable prediction model for the corporate fraud, by using the ratio of 1:2 as sample for the corporate fraud and the non-fraud company listed in Taiwan by 1997 to 2015. Considering the integrity of the fraud’s factors, we select financial statements, corporate governance, market transactions and macro-economics as research variables. Different from the past corporate fraud related literature, through different types of the fraud and its timing based on the year before the fraud, and use the methods of decision tree, random forest and logistic regression to predict. The empirical results show that: (1) In the analysis of the decision tree, random forest and logistic regression, the variables of financial statements, corporate governance, market transactions are more significant. (2) Under the prediction of fraud and non-fraud companies, testing group which distinguish into fraud types has a higher correct rate. (3) Under the prediction of fraud company, either in testing or training group which distinguishes into fraud types has a higher correct rate. In addition, testing group of false financial statements completely predict correct. In conclusion, it is better to use distinction of fraud types as approach to predict the most suitable prediction model.
Chi-Ming, Chiou, and 邱啟銘. "Internal control versus management fraud Reviews–Rebar fraud." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/14661765701673433475.
Full text開南大學
會計學系
99
This essay is mainly researching on Rebar fraudulent. For instance, setting up numerous dummy corporations for releasing corporate bone, cleaning out, inflation of corporation financial figures, insider trading, concealing of share and control marketing price artificially, violated securities trading and so on. Due to government’s authority overlooking internal control and collusion between Rebar and Visa accountant, they cause one of the largest finical scams in Taiwan. As we could see, authorities and visa accountant not only leading the most important role to prevent from embezzlement; they are accountable for overseeing the finical statement provided by Local Corporation. According to Ge and Mc Vay (2005) - SOX bill, they found the main problem with internal control is assigned account. However, that is not the only flaw because there are more other elements may cause serious problem indirectly in the process of internal control and affects the quality of the financial statement. First, Individual should be a core of the problem; said Ge and Vay (2005). Inadequate person or lacking in training may lead to improper internal control. Finally, CEO should be key man. Such as, CEO’s attitude toward internal control and the framework of management for weak company should affect the result of the internal control.
Jhuang, Shun-Ya, and 莊舜雅. "Corporate fraud risk factors and financial statement fraud." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/4f95a8.
Full textSchütte, Lucas Antônio. "Fraud victims: understanding older adults´ vulnerability to persuasion and fraud." Master's thesis, 2021. http://hdl.handle.net/10362/123152.
Full textTeixeira, Sara Filipa David. "Red flags for financial fraud: uncovering the wirecard fraud case." Master's thesis, 2021. http://hdl.handle.net/10071/23907.
Full textWirecard AG, uma empresa inovadora que prometeu revolucionar a indústria de pagamentos, declarou falência em junho de 2020. A empresa deu como desaparecido um total de 1,9 biliões de euros, assumindo que provavelmente estes nunca tinham existido. Este incidente prejudicou a credibilidade da entidade reguladora alemã e a reputação dos auditores externos. Relatórios Anuais da Wirecard e outras fontes, como o jornal Financial Times, foram analisadas à luz de trinta e sete bandeiras vermelhas identificadas no estudo de Múrcia e Borba (2007), apoiado pela International Standard on Auditing (ISA) 240, para determinar se as bandeiras vermelhas presentes nesta norma eram suficientes para indicar potencial fraude nas Demonstrações Financeiras no caso Wirecard. Vinte e quatro das trinta e sete bandeiras vermelhas examinadas sugerem potencial fraude. Dezanove destas bandeiras vermelhas estão incluídas na ISA 240, permitindo concluir que as bandeiras vermelhas presentes nesta norma eram suficientes para indicar potencial fraude nas Demonstrações Financeiras no caso Wirecard, e qualquer analista externo à empresa poderia ter detetado e incorporado estes sinais prévios na sua tomada de decisão. Esta informação também evidencia que os auditores negligenciaram a sinalização das bandeiras vermelhas. Embora a ISA 240 tenha provado ser eficaz, cinco das vinte e quatro bandeiras vermelhas estavam ausentes nesta norma. Estas bandeiras vermelhas são significativas, pois expõem problemas nas empresas, implicando que uma modificação na ISA 240 para integrar bandeiras vermelhas essenciais similares é necessária de forma a torna-la mais eficaz. Adicionalmente, o caso Wirecard revelou seis novas bandeiras vermelhas significativas que podem ser incorporadas na ISA 240.
Liu, Ming-Hsiu, and 劉明琇. "The Civil Liability of Securities Fraud and Financial Statement Fraud." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/q8s3a5.
Full text中原大學
財經法律研究所
107
In recent years, many fraudulent financial fraud cases have occurred in ROC''s securities market. The company faces the dilemma of bankruptcy reorganization, it also caused investors to suffer damage to the company or false financial reports, investors are more likely to request compensation from the company or the company''s principal through the Securities and Exchange Act. The civil liability of securities fraud is regulated in Article 20 paragraph 1 of the Securities and Exchange Act, which is the general rule of ROC ''s law against securities fraud, and paragraph 3 of the same article is its civil liability for violation; Article 20 paragraph 2 of the Securities and Exchange Act, For the disclosure of financial statement fraud, the legal effect is regulated in Article 20-1. Although securities fraud is clearly stated in the Securities and Exchange Act, there are still many problems to be clarified in the constitutional elements of civil liability, such as the subjective elements, compensation and responsibility subjects, causal relation, etc., which leads to many difficulties in the implementation of the practice, which seriously jeopardizes the operation and fairness of the securities market, so the thesis will target the trading market. Article 20 paragraph 1 and Article 20-1 of the Securities and Exchange Act, the core of securities fraud and financial statement fraud, is to discuss the elements of its elements.
CHENG, LONG-SING, and 張隆興. "FRAUD REPEAT VICTIMIZATION." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/68069647202769610548.
Full text國立臺北大學
犯罪學研究所
94
The objective of this research is, first, to determine the demographic characteristics of repeat fraud victims, second, to explore the victimization situation, third, to identify the time effects in relation to victimization, and finally, to illustrate the typologies of frauds. Further combat strategies are proposed based on the findings. According to the Taiwan national database, a total of 16,718 subjects reported a fraud event from January to June in 2005. Additionally, a total of 301 had been repeat victims of fraud. Parameters of interest in this research are analyzed between these groups using suitably chosen statistical methodologies. Results show that the majority of the fraud victims were male, aged 20-29, high-school or university graduates, and industry or mining employed. The first fraud event often happened between 12 to 3 pm in prosperous cities with an average loss amount of NT$ 145,484 dollars per subject. And by now, only a quarter (1/4) of the events had been uncovered. Furthermore, mean time to the next fraud event is 20.1 days. Repeat victims were screened according to risk factors: (1) personal traits (2) timing (3) typologies. Possible anti-fraud measures include:(1) utilization of the mass media (2) use of community and schools guidance(3) household visits to high risk repeat victims (4) workshops on avoidance strategies for high risk repeat victims (5) always double check the truthfulness of incoming calls and mail. The third strategy is to encourage the greater cooperation between governmental and financial institutions, especially working processes. Fourth, create a more systematic and comprehensive crime type classification for the offence of fraud.