Dissertations / Theses on the topic 'Internet fraud Prevention'

To see the other types of publications on this topic, follow the link: Internet fraud Prevention.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 18 dissertations / theses for your research on the topic 'Internet fraud Prevention.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Aspvik, Daniel Weenås, and Preben Weenås Aspvik. "Contemporary Online Banking Fraud in Norway : A case study." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97710.

Full text
Abstract:
Banks are currently battling rising of fraudulent activities as it damages their relationship with their customers. Online banking fraud is decreasing trust and confidence among the customers and decreasing operating performance and increasing cost for the banks. This paper looks at online banking fraud in Norway and answers the research questions (1). How are bank customers attacked through the internet? and (2). How are banks trying to prevent fraudulent attacks against their customers? Interviews and document collection were used for data gathering, and in total, four interviews were conducted with academics and business professionals. The data were analysed using thematic analysis. The findings suggest that BankID fraud, Card fraud, CEO fraud, Investment fraud, Love scams and Phishing are among the most frequent attacks in Norway at present. Attacks contain elements of social manipulation, constantly change and are customized to target victims. The attacks have in common that they all are showing patterns of professionalizing. The study found that Norwegian banks are technologically advanced regarding fraud detection and authentication, and have put efforts into awareness against online banking fraud. However, the main issue of online banking fraud in Norway is seemingly grounded in the interactions made by the customers with the technology and not the prevention system the banks deploy.
APA, Harvard, Vancouver, ISO, and other styles
2

ABEI, YOLANDA AJI. "Impact of Internal Control on Fraud Detection and Prevention in Microfinance Institutions." Thesis, Karlstads universitet, Avdelningen för företagsekonomi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-85431.

Full text
Abstract:
Microfinance institutions (MFIs) are an important tool of poverty reduction which has gained grounds over the years and grown rapidly given the services they provide. The rapid growth of the MFIs has had huge challenges on their regulatory framework which in turn has resulted in the prevalence of fraudulent cases. With the devasting effects of fraud on MFIs and the importance of MFIs in many economies this thesis aims to examine how the design and use of internal control impact fraud detection and prevention in MFIs. To achieve this aim, a qualitative study was conducted with a case study on eight MFIs in Cameroon. Primary data will be obtained from fourteen semi-structured interviews. Data will be analysed manually using thematic analysis. The findings revealed that internal control has a positive impact on fraud detection and prevention in MFIs by reducing fraud incentive, opportunity, rationalization, and capability. Further, findings revealed that the greatest causes of fraud in MFIs are poor remuneration, weak monitoring, and a poor internal control system. Therefore, for the purpose of future fraud prevention, MFIs should ensure to improve their remuneration schemes, improve1 their monitoring system and ensure regular internal control system updates in term of software and design. The study also, suggests further research on this topic in MFIs with a case study in other countries of the world. It will also be interesting for other researchers to explore how the aspect of capability as a key determinant of fraud can be reduced. This thesis contributes to academic literature as there is lack of studies on the impact of internal control on fraud detection and prevention in MFIs.
APA, Harvard, Vancouver, ISO, and other styles
3

Rockson, Albert. "Strategies for Preventing Financial Fraud in Church Organizations in Ghana." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7107.

Full text
Abstract:
Financial fraud in church organizations is increasing rapidly, which can affect the reputation, donation appeal, future funding, and ability of church organizations to meet their planned organizational goals. The purpose of this multiple case study was to explore strategies for preventing financial fraud in church organizations. The conceptual framework for the study was Cressey’s fraud triangle theory. Twenty participants who utilize strategies for preventing financial fraud in their organizations were purposively selected from 5 church organizations in Ghana. Data were collected through semistructured interviews and analysis of organizational financial policy documents. Interview data were transcribed, coded, and analyzed with Saldaña’s coding guidelines. Data analysis followed recommendations from Yin, including examining the data, grouping data into categories, regrouping data in themes, interpreting the data, and producing empirically based findings that answered the central research question of the study. Three significant themes emerged from the data analysis: effective administration, good stewardship and accountability, and caliber of employees. Implementation of the findings may lead to positive social change by enhancing the donation appeal of church organizations, improving their finances, and enabling them to optimize their operations to benefit individuals, families, communities, and society.
APA, Harvard, Vancouver, ISO, and other styles
4

Abiola, James. "The impact of information and communication technology on internal control's prevention and detection of fraud." Thesis, De Montfort University, 2013. http://hdl.handle.net/2086/9496.

Full text
Abstract:
This study explores the Impact of Information and Communication Technology (ICT) on internal control effectiveness in preventing and detecting fraud within the financial sector of a developing economy - Nigeria. Using a triangulation of questionnaire and interview techniques to investigate the internal control activities of Nigerian Internal Auditors in relation to their use of ICT in fraud prevention and detection, the study made use of cross-tabulations, correlation coefficients and one-way ANOVAs for the analysis of quantitative data, while thematic analysis was adopted for the qualitative aspects. The Technology Acceptance Model (TAM) and Omoteso et al.'s Three-Layered Model (TLM) were used to underpin the study in order to provide theoretical considerations of the issues involved. The study's findings show that Nigerian Internal Auditors are increasingly adopting IT-based tools and techniques in their internal control activities. Secondly, the use of ICT-based tools and techniques in internal control positively impacts on Internal Auditors' independence and objectivity. Also, the study's findings indicate that Internal Auditors' use of ICT-based tools and techniques has the potential of preventing electronic fraud, and such ICT-based tools and techniques are effective in detecting electronic fraud. However, continuous online auditing was found to be effective in preventing fraud, but not suited for fraud detection in financial businesses. This exploratory study sheds light on the impact of ICT usage on internal control's effectiveness and on internal auditors' independence. The study contributes to the debate on the significance of ICT adoption in accounting disciplines by identifying perceived benefits, organisational readiness, trust and external pressure as variables that could affect Internal Auditors' use of ICT. Above all, this research was able to produce a new model: the Technology Effectiveness Planning and Evaluation Model (TEPEM), for the study of ICT adoption in internal control effectiveness for prevention and detection of fraud. As a result of its planning capability for external contingencies, the model is useful for the explanation of studies involving ICT in a unique macro environment of developing economies such as Nigeria, where electricity generation is in short supply and regulatory activities unpredictable. The model proposes that technology effectiveness (in the prevention and the detection of fraud) is a function of TAM variables (such as perceived benefits, organisational readiness, trust, external pressures), contingent factors (size of organisation, set-up and maintenance cost, staff training and infrastructural readiness), and an optimal mix of human and technological capabilities
APA, Harvard, Vancouver, ISO, and other styles
5

Hašková, Kristýna. "Podvod a audit." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-142209.

Full text
Abstract:
This thesis deals mainly with internal fraud. In the first section, a definition of fraud is mentioned. The second section briefly describes the internal and external fraud and provides their basic structure. The third section deals with the reasons for committing fraud. The fourth section is concerned with the specific forms of internal fraud which come under the basic groups of corruption, misappropriation of assets and statements manipulation and other forms of fraud which may be between the internal and external fraud. The last section provides examples of large and small accounting examples relating to the internal fraudulent activities.
APA, Harvard, Vancouver, ISO, and other styles
6

Pereira, Marcos Augusto Assi. "Os controles internos e contábeis na gestão de tesouraria." Pontifícia Universidade Católica de São Paulo, 2010. https://tede2.pucsp.br/handle/handle/1432.

Full text
Abstract:
Made available in DSpace on 2016-04-25T18:39:34Z (GMT). No. of bitstreams: 1 Marcos Augusto Assi Pereira.pdf: 1005672 bytes, checksum: fd3197e0f33cc06fff69ea904aa4a017 (MD5) Previous issue date: 2010-10-26
The activities of Internal Control and Accounting are part of business management, but there is much difficulty in understanding the applicability of the matter, either through ignorance of the benefits or lack of control culture. These activities require a variety of knowledge management, control and corporate governance in addition to ongoing professional development. The control account is derived from the internal control, which determines the policies and procedures of the organization, not counting the accounting and management reports that will be part of the day to day business and explanatory notes. Thus, this study proposes to answer the following question: How companies are implementing internal controls and accounting to support cash management? The accounting errors and fraud are being treated as part of the business or know not? Because of the doubt given, the general aim of this study is to contribute to the process of implementing controls that favor corporate management, developing strategies that facilitate the relationship between theory and practice primarily on the controller. Data collection took two steps. In the first, was held exploratory study by a research literature and documents. In the second, we performed a field survey by questionnaire sent to professionals responsible for implementing corporate controls on small, medium and large companies in the region of Sao Paulo. Qualitative research and descriptive participant seeks to contribute to the disclosure of the methods and methodologies of management controls in the area of treasury and knowledge about the risk of error and fraud in the organization. The result achieved with the questionnaire, together with the definitions and concepts explored in the research literature and documents, shows that companies are implementing controls and some still have difficulty understanding risk management through internal controls and accounting
As atividades de Controles Internos e Contábeis fazem parte da gestão do negócio, mas ainda existe muita dificuldade no entendimento da aplicabilidade da matéria seja por ignorância dos benefícios, seja pela ausência de cultura de controle. Essas atividades exigem multiplicidade de conhecimentos de gestão, controle e governança corporativa, além da permanente atualização profissional. O controle contábil é derivado do controle interno, que determina as políticas e procedimentos da organização, sem contar os relatórios gerenciais e contábeis, que fazem parte das do dia a dia da empresas e da notas explicativas. Sendo assim, este estudo se propõe a responder às seguintes questões: Como as empresas estão implementando os controles internos e contábeis para suporte da gestão de tesouraria? ; Os erros e fraudes contábeis estão sendo tratados como parte do negócio ou ainda é incipiente? Em decorrência da dúvida apresentada, o objetivo geral deste estudo é contribuir para o processo de implementação de controles que favoreçam a gestão corporativa, desenvolvendo estratégias que possibilitem a relação entre teoria e prática principalmente na Controladoria. A coleta de informações teve duas etapas. Na primeira, realizou-se um estudo exploratório por meio de uma pesquisa bibliográfica e documental. Na segunda, elaborou-se uma pesquisa de campo mediante um questionário encaminhado aos profissionais responsáveis pela implementação de controles corporativos em empresas de pequeno, médio e grande porte na região de São Paulo. A pesquisa qualitativa, participante e descritiva contribui para a obtenção de métodos e metodologias de gestão de controles na área de tesouraria e para ampliar o conhecimento dos riscos de erros e fraudes na organização. O resultado alcançado com o questionário, em conjunto com conceitos e definições explorados na pesquisa bibliográfica e documental, demonstra que muitas empresas estão implementando controles e algumas ainda têm dificuldade de entendimento da gestão de riscos dos controles internos e contábeis
APA, Harvard, Vancouver, ISO, and other styles
7

Furlaneto, Neto Mário [UNESP]. "O assunto do e-mail como indício de fraude: contribuições da organização da informação para a prevenção criminal." Universidade Estadual Paulista (UNESP), 2008. http://hdl.handle.net/11449/103390.

Full text
Abstract:
Made available in DSpace on 2014-06-11T19:32:42Z (GMT). No. of bitstreams: 0 Previous issue date: 2008-07-29Bitstream added on 2014-06-13T19:03:12Z : No. of bitstreams: 1 furlanetoneto_m_dr_mar.pdf: 1796012 bytes, checksum: 865e52ab7d190c4e8c70356423defeb4 (MD5)
Universidade Estadual Paulista (UNESP)
Em uma sociedade cada vez mais globalizada e inserida digitalmente, o e-mail apresenta destaque importante, ao acelerar a comunicação entre as pessoas. No entanto, ao mesmo tempo em que a Internet revelou benefícios incomensuráveis para a sociedade tornou-se, também, um meio para a prática dos crimes informáticos e, atualmente, constata-se o emprego do e-mail como fase do iter criminis, potencializado pela ausência de uma política de prevenção. Diante desse contexto, busca-se avaliar o campo assunto do e-mail, com ênfase nas contribuições da Organização da Informação como subsídio à prevenção criminal. Com isso, objetiva-se analisar o e-mail, enquanto um documento eletrônico, visando especificar suas partições, nomeadamente a área do cabeçalho, onde consta a representação do assunto, de maneira a apontar, em uma dimensão teórica, soluções relacionadas à prevenção criminal. Por meio de uma abordagem metodológica explorativa e descritiva, parte-se de uma caracterização teórica da temática, nomeadamente na doutrina e na jurisprudência brasileira, ocasião em que são enfrentadas as dimensões informativa, temática, probatória e criminal do email, para, em seguida, realizar-se o mapeamento de e-mails recebidos pelo autor e sua esposa de modo a caracterizar como se comportam os emitentes no preenchimento do assunto, ocasião em que se combina, quanto ao tipo de dado a ser coletado e tipo de análise, quantificação com interpretação. Ao aplicarem-se as facetas concreto e processo da Teoria de Indexação Sistemática de Kaiser (1911) ao campo assunto das mensagens eletrônicas que compuseram o corpus da pesquisa, os resultados revelam indícios de fraude em e-mails cujos assuntos foram categorizados em: a) Questões/pendências judiciais e administrativas; b) Apelo financeiro (prêmios, sorteios, benefícios, etc); c) Apelo emocional;...
In a more and more globalized and digitalized society , e-mail represents important prominence by accelerating communication among people. However, while bringing tremendous benefits to the society, Internet has also become a means by which computer crimes have been committed and, today, E-mail is used as a phase of iter criminis , which has been potentialized due to non-existence of preventive policies at all. So in this context, we try to assess the e-mail subject-field giving emphasis to the Information Organization contributions as subsidy towards preventing crimes. In this way, our purpose is to analyze the e-mail as an electronic document aiming at specifying its parts, - mainly the headlines, in which the subject is represented-, so that we may point to, on a theoretical dimension, solutions regarding criminal prevention. By means of a methodological, exploratory and descriptive approach, we start from the subject’s theoretical characterization, primarily grounded on Brazilian doctrine and jurisprudence, when e-mail’s informative, thematic and probationary dimensions are faced, in order to draw a map of e-mails received by the author and his wife so as to characterize the senders’ behavior when filling in the subject, for in their performance are matched quantification and interpretation with regard to the kind of datum to be collected , and the type of analysis . By applying concrete and process facets of the Theory of Systematic Indexation by Kaiser (1911) to the subject-field of electronic messages that were the investigation corpus, the results show signs of fraud on the emails , whose subjects were categorized as follow: a) judicial and administrative disputes; b) financial appeal (prizes, raffles, benefits, etc); c) emotional appeal; d) communication of electronic transaction (electronic trade); e) communication of electronic services; f) curiosity appeal... (Complete abstract click electronic access below)
APA, Harvard, Vancouver, ISO, and other styles
8

Furlaneto, Neto Mário. "O assunto do e-mail como indício de fraude : contribuições da organização da informação para a prevenção criminal /." Marília : [s.n.], 2008. http://hdl.handle.net/11449/103390.

Full text
Abstract:
Orientador: José Augusto Chaves Guimarães
Banca: Mariângela Spotti Lopes Fugita
Banca: João Batista Ernesto de Moraes
Banca: Edinilson Donisete Machado
Banca: José Fernando Modesto da Silva
Resumo: Em uma sociedade cada vez mais globalizada e inserida digitalmente, o e-mail apresenta destaque importante, ao acelerar a comunicação entre as pessoas. No entanto, ao mesmo tempo em que a Internet revelou benefícios incomensuráveis para a sociedade tornou-se, também, um meio para a prática dos crimes informáticos e, atualmente, constata-se o emprego do e-mail como fase do iter criminis, potencializado pela ausência de uma política de prevenção. Diante desse contexto, busca-se avaliar o campo assunto do e-mail, com ênfase nas contribuições da Organização da Informação como subsídio à prevenção criminal. Com isso, objetiva-se analisar o e-mail, enquanto um documento eletrônico, visando especificar suas partições, nomeadamente a área do cabeçalho, onde consta a representação do assunto, de maneira a apontar, em uma dimensão teórica, soluções relacionadas à prevenção criminal. Por meio de uma abordagem metodológica explorativa e descritiva, parte-se de uma caracterização teórica da temática, nomeadamente na doutrina e na jurisprudência brasileira, ocasião em que são enfrentadas as dimensões informativa, temática, probatória e criminal do email, para, em seguida, realizar-se o mapeamento de e-mails recebidos pelo autor e sua esposa de modo a caracterizar como se comportam os emitentes no preenchimento do assunto, ocasião em que se combina, quanto ao tipo de dado a ser coletado e tipo de análise, quantificação com interpretação. Ao aplicarem-se as facetas concreto e processo da Teoria de Indexação Sistemática de Kaiser (1911) ao campo assunto das mensagens eletrônicas que compuseram o corpus da pesquisa, os resultados revelam indícios de fraude em e-mails cujos assuntos foram categorizados em: a) Questões/pendências judiciais e administrativas; b) Apelo financeiro (prêmios, sorteios, benefícios, etc); c) Apelo emocional; ...(Resumo completo, clicar acesso eletrônico abaixo)
Abstract: In a more and more globalized and digitalized society , e-mail represents important prominence by accelerating communication among people. However, while bringing tremendous benefits to the society, Internet has also become a means by which computer crimes have been committed and, today, E-mail is used as a phase of iter criminis , which has been potentialized due to non-existence of preventive policies at all. So in this context, we try to assess the e-mail subject-field giving emphasis to the Information Organization contributions as subsidy towards preventing crimes. In this way, our purpose is to analyze the e-mail as an electronic document aiming at specifying its parts, - mainly the headlines, in which the subject is represented-, so that we may point to, on a theoretical dimension, solutions regarding criminal prevention. By means of a methodological, exploratory and descriptive approach, we start from the subject's theoretical characterization, primarily grounded on Brazilian doctrine and jurisprudence, when e-mail's informative, thematic and probationary dimensions are faced, in order to draw a map of e-mails received by the author and his wife so as to characterize the senders' behavior when filling in the subject, for in their performance are matched quantification and interpretation with regard to the kind of datum to be collected , and the type of analysis . By applying concrete and process facets of the Theory of Systematic Indexation by Kaiser (1911) to the subject-field of electronic messages that were the investigation corpus, the results show signs of fraud on the emails , whose subjects were categorized as follow: a) judicial and administrative disputes; b) financial appeal (prizes, raffles, benefits, etc); c) emotional appeal; d) communication of electronic transaction (electronic trade); e) communication of electronic services; f) curiosity appeal... (Complete abstract click electronic access below)
Doutor
APA, Harvard, Vancouver, ISO, and other styles
9

Gažová, Iva. "Pojistné podvody." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2010. http://www.nusl.cz/ntk/nusl-232511.

Full text
Abstract:
This diploma thesis deals with the problems of insurance fraud in our society. The thesis is divided into several relatively separate sections. The theoretical part describes a basic characteristic, classification and origins of insurance fraud and it deals with a general description of perpetrators of fraudulent actions. An analysis of fraudulent actions in life and non-life insurance is carried out in the theoretical part of the diploma thesis. This work characterises the importance and the mutual relationship between detection and investigation of fraudulent actions. It also highlights the facts which aid and abet insurance fraud. The aim of the practical part of the diploma thesis was to carry out an analysis of various insurance fraud cases in the realm of motor insurance according to the subject, object and the most frequent variants of fraudulent actions and consequently create a profile of the perpetrator of insurance fraud on the basis of the evaluation of the analysis. The practical case study of client’s expedient behaviour enables us to look on detection of the particular insurance fraud. The end of the diploma thesis deals with recommendations for the measures which should be taken to fight insurance fraud.
APA, Harvard, Vancouver, ISO, and other styles
10

Ku, Hui-Chen, and 古慧珍. "Prevention of Internet Fraud--Focusing on the dummy account." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/48619870226570296728.

Full text
Abstract:
碩士
國立交通大學
管理學院碩士在職專班科技法律組
94
Along with the popularity, technology enhancement, rapid growth of users and expansion of spending time in the Internet, the activities in this virtual world have multiplied. Its negative side-effect nourished new types of crime. Among them, Internet fraud has posed a serious threat to the development of e-commerce. Moreover, the anonymity and the instantaneous features of the Internet hinder the crackdown against this crime. According to this research, up to 66.2 percent of all Internet fraud cases, there was dummy account involvement. Therefore, hypothetically, detecting dummy accounts should effectively prevent Internet fraud. In the light of Becker’s “rational crime model”, prevention policies would function in two methods; one is to reduce the illegal gains, the other one is to increase the penalty. Several prevention policies announced on May 8, 2005 and April 27, 2006 justified the mechanism for banks to temporarily freeze dummy accounts. Nevertheless, modifications to a certain degree should be made to those laws and regulations regarding abuse of the power of autorotation and the manipulation for inappropriate purposes. Furthermore, this research tried to review the effectiveness of such prevention policies and regulations. Apparently, according to the statistics, there hasn’t been any obvious result in deterring Internet fraud by implementing policies to track down dummy accounts. From the viewpoint of economic analysis of law, this study probed the reasons why the prevention policies failed. In addition, following the “rational crime model” and the rule of minimum prevention cost, we suggest that, in order to deter Internet fraud in the most cost-effective way, the audit and screening procedures of personal accounts should be tightened up and the penalty of dummy accounts vending should be increased.
APA, Harvard, Vancouver, ISO, and other styles
11

Hsueh, Ming-Feng, and 薛明豐. "A Study of Crime Prevention on Internet Auction Fraud." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/10215136898536929464.

Full text
Abstract:
碩士
雲林科技大學
資訊管理系碩士班
97
With the development of Internet technology, whether it is in B2B, B2C, C2C or the sharing of personal information on the Internet; the Internet has been used extensively because it breaks the boundaries across the different regions of the world. Many companies possess the ability to increase the convenience in using the Internet as a platform to do biness transactions and the spreading of information. E-commerce has busecome an inevitable trend worldwide. The change on methods of service; such as online businesses has brought much convenience to our lives. However, it has created some likely problems. Among the problems is the rigging on network auctions that have threatened the business activities in our society. The purpose of this study will explore the Internet auction fraud in crime prevention. This research is based on the theory of situational crimes (Clarke, 1997). The four key factors are considered: Increasing Perceived Effort, Increasing Perceived Risks, Reducing Anticipated Risks and Inducing Guilt or Shame. Research methods used for Delphi study to combat Internet auction fraud crime significantly the production of specialists, officials, academics and legal professionals and other experts in the field, Fifteen experts of this field were recruited and third-round expert suevey were completed.The research will screen the prevention techniques against the internet anction fraud. The results were summarized in the eight conclusions which will provide people using the Internet auction transactions, the implementation of Internet auction business auction business and government agencies to develop policies to combat Internet auction fraud when a reference in order to reduce the unfortunate occurrence of fraud cases.
APA, Harvard, Vancouver, ISO, and other styles
12

Tanfa, Denis Yomi. "Advance fee fraud." Thesis, 2006. http://hdl.handle.net/10500/2304.

Full text
Abstract:
The focus of this thesis is on Advance Fee Fraud (419 scams) on how it is executed and more importantly, on how it can be prevented. The research addresses the origins of AFF, the nature and extent of this crime and how the perpetrators are able to defraud their victims. The research described, examined and analysed the crimes, the perpetrators, the victims, adjudication and the prevention strategies of this fraud. Information was gathered through literature and empirical research. A qualitative research method was used to gather information from AFF offenders who were incarcerated in South African prisons in 2005. The results of the empirical research were carefully examined, analyzed and integrated into the various chapters of this thesis. A theoretical framework was also developed in an attempt to explain this complex phenomenon. The findings and recommendations in terms of the crimes, the criminals, the victims, adjudication and prevention were also made and some suggestions for further research thereof were also cited.
Criminology
D. Litt. et Phil. (Criminology)
APA, Harvard, Vancouver, ISO, and other styles
13

Novoselov, Kirill Evgenievitch 1968. "Internal controls, collusion, and hierarchical structure." Thesis, 2007. http://hdl.handle.net/2152/3237.

Full text
Abstract:
This study uses the principal-agent framework to investigate the trade-off between the benefits of internal control stemming from a reduction of the losses from inappropriate employee actions and the cost of implementing it brought about by the possibility of collusion that it creates. It is shown that, when the agents find it relatively easy to collude, implementing internal control reduces agency welfare, defined as the sum of expected payments accruing to the principal and the agents, even as, with positive transaction costs of collusion, it improves productive efficiency, defined as the expected output. As a result, the principal, under certain conditions, finds it in her best interest to use internal control as a threat instead of implementing it. When this is the case, the principal sometimes prefers to decrease the accuracy of the accounting information system. The analysis of the agents' side contracting indicates that, even if the principal can prevent explicit collusion, for some values of parameters the possibility of tacit collusion still results in a loss. The study also investigates the effect of the choice of organizational form on the value of internal control. The analysis of two different versions of the model demonstrates that, for a wide range of parameters, creating a hierarchical structure reduces, albeit does not eliminate, the loss from collusion -- i.e., internal control and hierarchical delegation are complementary instruments of organizational design. It is also shown that, when one agent is ex ante more likely to be efficient than the other, in most cases the principal optimally appoints to the supervisory position the one who is less likely to be efficient. As a result, the supervisor, in expectation, exerts a lower effort level than the subordinate and collects higher salary.
text
APA, Harvard, Vancouver, ISO, and other styles
14

Wang, Zhe. "The impact of tone at the top and control mechanisms on the objectivity of internal auditor judgment." Phd thesis, 2014. http://hdl.handle.net/1885/149978.

Full text
Abstract:
The purpose of this thesis is to examine the effects of tone at the top and control mechanisms on the objectivity of internal auditors' judgments. Prior empirical evidence suggests that employees' judgments can be influenced by top management through the tone at the top of the organisation. As employees, internal auditors also make judgments within the ethical climate - the tone at the top created by management. Given the important role of internal auditors in ensuring effective corporate governance, this thesis first investigates whether the quality of the tone at the top influences the objectivity of internal auditors' judgments on management-related fraud risk and internal control weaknesses. This thesis then investigates whether bias in internal auditors' judgments under a poor tone at the top can be mitigated by coordination between internal and external auditors, or by a high quality audit committee. This thesis includes two studies. The first study examines the objectivity of internal auditors' fraud risk assessments. The findings from an experiment involving 64 internal auditors suggest that internal auditors are more sceptical when the tone at the top is poor. The results of the coordination between internal and external auditors suggest that the existence of such coordination can be used as an effective mechanism to mitigate the influence of a poor tone on internal auditors' fraud risk assessments. The second study investigates the objectivity of internal auditors' internal control evaluations. The results from an experiment involving 80 internal auditors suggest that internal auditors' internal control evaluations are biased towards the management's favour under a poor tone at the top. The results of the quality of the audit committee indicate that the influence of a poor tone at the top on internal auditors' internal control evaluations can be mitigated by an effective audit committee with a high level of independence and expertise.
APA, Harvard, Vancouver, ISO, and other styles
15

Venter, Anna Catharina. "Aankooprisikobestuur met spesifieke fokus op die identifisering en voorkoming van bedrog : `n raamwerk vir die risikobestuurder en interne ouditeur." Diss., 2005. http://hdl.handle.net/10500/1560.

Full text
Abstract:
The occurence of procurement fraud requires from the management of the enterprise, the risk manager of the enterprise as well as the internal auditor to effectively address procurement fraud risks within the enterprise risk management concept. The purpose of the study is to set a procurement fraud risk management process in place which will serve as a comprehensive framework for the enterprise risk manager as well as the internal auditor to limit the enterprise's exposure to procurement fraud risks as far as possible. The study firstly focus on the analysis of the steps within the procurement process which is the starting point for the identification of the fraud risks. Secondly the enterprise risk management model is applied in the format of a procurement risk matrix within the procurement function. The study is an indication that procurement fraud cannot be completely prevented but that the appearance thereof can be limited by means of the extensive procurement fraud risk management model. Recommendations for future studies include the application of the enterprise risk management model in other functional areas within the enterprise.
Die voorkoms van aankoopbedrog vereis van die onderneming se bestuur, ondernemingsrisikobestuurder en interne ouditeur om aankoopbedrogrisiko's effektief binne die konteks van die ondernemingsrisikobestuurskonsep aan te spreek. Die doel van die studie is om `n aankoopbedrogrisikobestuursproses daar te stel wat as `n omvattende raamwerk vir die ondernemingsrisikobestuurder en interne ouditeur kan dien om die onderneming se blootstelling aan aankoopbedrogrisiko's so ver as moontlik te beperk. Die studie fokus eerstens op die ontleding van die stappe in die aankoopproses wat as vertrekpunt vir die identifisering van bedrogrisiko's dien. Tweedens word die ondernemingsrisikobestuursmodel in die vorm van `n aankoopbedrogrisikomatriks in die aankoopfunksie toegepas. Die studie dui daarop dat alhoewel aankoopbedrog nie volkome verhoed kan word nie, die voorkoms daarvan wel beperk kan word deur die toepassing van `n omvattende aankoopbedrogrisikobestuursmodel. Aanbevelings vir verdere studies sluit die toepassing van die ondernemingsrisikobestuursmodel op ander funksionele terreine van die onderneming in.
Auditing
M. Com. (Auditing)
APA, Harvard, Vancouver, ISO, and other styles
16

Venter, Jan Willem Nicolaas. "The exploration of appraising internal controls to detect procurement fraud during the tender stage at mines." Diss., 2016. http://hdl.handle.net/10500/22603.

Full text
Abstract:
Text in English
Procurement fraud is an enormous problem and the South African news is perforated with reports of this illicit act. Procurement fraud occurs in all the phases of the procurement cycle, but this illicit act is mostly committed during the tender phase. Business does not see procurement fraud as a crime and therefor this crime is committed due to non-existent internal controls and processes to assess the adequacy of these controls. The purpose of the research was to highlight that procurement fraud occurs when internal controls are being bypassed or if an entity has an ineffective internal control system. The researcher studied the appraising of internal controls to understand the role it plays in detecting, preventing and investigating procurement fraud, specifically during the tender phase. The research design utilised was a qualitative research approach and an empirical design plan or strategy, to obtain the information. The researcher opted for this design to obtain information from literature and information from individuals in appraising internal controls. This ensured a comprehensive data gathering process. The goal of this research was to provide practical recommendations to assist investigators in private and public sectors with investigations into procurement fraud during a tender.
Police Practice
M. Tech. (Forensic Investigation)
APA, Harvard, Vancouver, ISO, and other styles
17

Muto, Luigi. "An offender’s perspective of what motivates, deters and prevents white collar crime in the South African workplace." Diss., 2012. http://hdl.handle.net/2263/26777.

Full text
Abstract:
The aim of the research was to look at the motivations behind white-collar crime and, by means of the insights gained, allow businesses to achieve a better understanding of these motivations and the possible loopholes that exist with respect to white-collar crime. Empowered which such knowledge, businesses fraud mitigation polices and approaches are enhanced; which contribute towards sustained operations and increased shareholder value by reduce losses. Face-to-face interviews were held with 29 white-collar offenders imprisoned at the Johannesburg Medium Correctional Centre in Gauteng, South African. Data was collected from these interviews and grouped into themes that related to the research questions. An action plan was formulated to assist business in their fight to eliminate and reduce the impact of commercial crime.
Dissertation (MBA)--University of Pretoria, 2012.
Gordon Institute of Business Science (GIBS)
unrestricted
APA, Harvard, Vancouver, ISO, and other styles
18

Araújo, João Bosco de. "Etiologia criminal na gestão de contratos terceirizados." Master's thesis, 2017. http://hdl.handle.net/10284/6088.

Full text
Abstract:
No mundo contemporâneo, crimes econômicos e fraudes financeiras assumem diferentes formas, características e modalidades. A globalização e o dinâmico desenvolvimento tecnológico, tornaram sofisticados e complexos os crimes e fraudes, pois fragilizam mecanismos de defesas e controles internos devido a rapidez com que as mudanças organizacionais ocorrem e contribuem para elevar vulnerabilidades e riscos na gestão de contratos terceirizados. Os crimes e fraudes praticados durante a vigência de contratos, sejam privados ou públicos, evidenciam conflitos de interesses, desvios de condutas, oportunismos e desprezo aos valores éticos realizados por responsáveis que deveriam controlar acordos comerciais, licitações, seleções de fornecedores e/ou produtos, revelando um perfil fraudador com forte atuação predatória. A frágil, ou limitada, capacidade dos controles internos preventivos e a evidente manipulação das três linhas de defesa em todos os segmentos e portes empresariais ratificam, infelizmente, a elevação dos casos de fraudes e de crimes econômicos. Neste contexto, esta pesquisa procurou identificar riscos inerentes aos contratos e características do perfil fraudador responsável por anular controles e manipular linhas de defesa na gestão de contratos, estabelecendo o nexo causal entre a prática criminosa e a exposição aos riscos contratuais. Fundamentado nesse propósito, foram realizadas pesquisas específicas sobre os tipos de contratos impactados, características dos perfis dos fraudadores e identificação das principais medidas protecionistas implementadas para mitigar fraudes e crimes econômicos contratuais. Finalmente, espera-se que esta Dissertação concorra para a conscientização de empresários, gestores e, principalmente, auditores, sobre a importância em disseminar para os atores envolvidos na gestão de contratos terceirizados metodologias e ferramentas relacionadas à detecção, à prevenção, ao monitoramento e ao tratamento de riscos, alinhadas com regras de compliance específicas para os riscos contratuais inerentes, que permitam preservar a imagem da empresa, proteger investimentos, garantir operações e continuidade do negócio.
In the contemporary world, economic crimes and financial fraud take on different forms, characteristics and modalities. Globalization and dynamic technological development have made sophisticated and complex crimes and frauds as they weaken internal defenses and controls because of the rapidity with which organizational changes occur and contribute to the elevation of vulnerabilities and risks in the management of outsourced contracts. Crimes and fraud committed during the term of contracts, whether private or public, show conflicts of interest, misconduct, opportunism and contempt for the ethical values made by managers who should control commercial agreements, bids, supplier selections and / or products, Revealing a predatory fraud profile. The fragile or limited capacity of the internal preventive controls and the evident manipulation of the three lines of defense in all segments and sizes of business unfortunately ratify the increase of cases of fraud and economic crimes. In this context, this research sought to identify risks inherent in the contracts and characteristics of the fraud profile responsible for annulling controls and manipulating lines of defense in contract management, establishing the causal link between criminal practice and exposure to contractual risks. Based on this purpose, specific research was carried out on the types of contracts impacted, characteristics of fraudster profiles and identification of the main protectionist measures implemented to mitigate fraud and economic contractual crimes. Finally, it is expected that this Dissertation will contribute to the awareness of entrepreneurs, managers and, especially, auditors, about the importance of disseminating to the actors involved in the management of outsourced contracts methodologies and tools related to the detection, prevention, monitoring and Risk treatment in line with specific compliance rules for the inherent contractual risks that can preserve the company’s image, protect investments, guarantee operations and business continuity.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography