Computer-aided fraud prevention and detection : a step-by-step guide / David Coderre.
Material type:
TextPublication details: Hoboken, N.J. : John Wiley & Sons, c2009.Description: xviii, 280 p. : ill. ; 24 cm. + 1 CD-ROM (4 3/4 in.)ISBN: - 9780470392430 (cloth)
- 0470392436 (cloth)
- 364.4 22
- HV8079.F7 C62 2009
| Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|---|
Monograph & others
|
CBN ABEOKUTA BRANCH LIBRARY General Stacks | Non-fiction | 364.4 COD (Browse shelf(Opens below)) | c.1 | Available | 31008100754361 | ||
Monograph & others
|
CBN ABEOKUTA BRANCH LIBRARY General Stacks | Non-fiction | 364.4 COD (Browse shelf(Opens below)) | c.1 | Available | 31008100754247 | ||
Monograph & others
|
CBN AKURE BRANCH LIBRARY General Stacks | Non-fiction | 364.4 COD (Browse shelf(Opens below)) | c.1 | Available | 31008100367347 | ||
Monograph & others
|
CBN BAUCHI BRANCH LIBRARY General Stacks | Non-fiction | 364.4 COD (Browse shelf(Opens below)) | c.1 | Available | 31008100565122 | ||
Monograph & others
|
CBN BENIN BRANCH LIBRARY General Stacks | Non-fiction | 364.4 COD (Browse shelf(Opens below)) | c.1 | Available | 31008100578125 | ||
Monograph & others
|
CBN ENUGU BRANCH LIBRARY General Stacks | Non-fiction | 364.4 COD (Browse shelf(Opens below)) | c. 1 | Available | 31008100260518 | ||
Monograph & others
|
CBN HQ Library | 364.4 COD (Browse shelf(Opens below)) | Available | 31008100010954 | ||||
Monograph & others
|
CBN HQ Library | 364.4 COD (Browse shelf(Opens below)) | Available | 31008100010962 | ||||
Monograph & others
|
CBN IBADAN BRANCH LIBRARY General Stacks | Non-fiction | 364.4 COD (Browse shelf(Opens below)) | c1 | Available | 31008100736756 | ||
Monograph & others
|
CBN ILORIN BRANCH LIBRARY General Stacks | Non-fiction | 364.4 COD (Browse shelf(Opens below)) | Available | 31008100827423 | |||
Monograph & others
|
CBN KANO BRANCH LIBRARY General Stacks | Non-fiction | 364.4 COD (Browse shelf(Opens below)) | c.1 | Available | 31008100658042 | ||
Monograph & others
|
CBN KATSINA BRANCH LIBRARY General Stacks | Non-fiction | 364.4 COD (Browse shelf(Opens below)) | Available | 31008100504493 | |||
Monograph & others
|
CBN LAGOS LAISON OFFICE LIBRARY General Stacks | 364.4 COD (Browse shelf(Opens below)) | Available | 31008100685532 | ||||
Monograph & others
|
CBN LAGOS LEARNING CENTRE LIBRARY General Stacks | Non-fiction | 364.4 COD (Browse shelf(Opens below)) | c.1 | Available | 31008100719216 | ||
Monograph & others
|
CBN MAIDUGURI BRANCH LIBRARY General Stacks | Non-fiction | 364.4 COD (Browse shelf(Opens below)) | c. 1 | Available | 31008100440185 | ||
Monograph & others
|
CBN MAKURDI BRANCH LIBRARY General Stacks | Non-fiction | 364.4 COD (Browse shelf(Opens below)) | c.1 | Available | 31008100361886 | ||
Monograph & others
|
CBN MINNA BRANCH LIBRARY General Stacks | Non-fiction | 364.4 COD (Browse shelf(Opens below)) | C.1 | Available | 31008100589577 | ||
Monograph & others
|
CBN OWERRI BRANCH LIBRARY General Stacks | Non-fiction | 364.4 COD (Browse shelf(Opens below)) | c.1 | Available | 31008100539093 | ||
Monograph & others
|
CBN PORTHARCOURT BRANCH LIBRARY General Stacks | Non-fiction | 364.4 COD (Browse shelf(Opens below)) | C.1 | Available | 31008100519137 | ||
Monograph & others
|
CBN SOKOTO BRANCH LIBRARY | Non-fiction | 364.4 COD (Browse shelf(Opens below)) | Available | 31008100402938 | |||
Monograph & others
|
CBN UYO BRANCH LIBRARY General Stacks | Non-fiction | 364.4 COD (Browse shelf(Opens below)) | c.1 | Available | 31008100551346 | ||
Monograph & others
|
CBN YOLA BRANCH LIBRARY | 364.4 COD (Browse shelf(Opens below)) | c.1 | Available | 31008100787114 |
Browsing CBN LAGOS LEARNING CENTRE LIBRARY shelves, Shelving location: General Stacks, Collection: Non-fiction Close shelf browser (Hides shelf browser)
| 364.168 OKA The twilight of Nigerian '419' fraudsters / | 364.168 PAL Trade finance risk : | 364.168 POW The money launderers : | 364.4 COD Computer-aided fraud prevention and detection : | 364.4 TYS 150 things you should know about security / | 368.0122'09669 YEA 20 years of reinsurance in Nigeria / | 368.4'3 SOC Social security reform in advanced countries : |
Includes bibliographical references (p. 275-276) and index.
What is fraud? : Fraud: a definition ; Why fraud happens ; Who is responsible for fraud detection? ; What is a fraud awareness program? ; What is a corporate fraud policy? -- Fraud prevention and detection : Detecting fraud ; Determining the exposure to fraud ; Assessing the risk that fraud is occurring (or will occur) ; External symptoms ; Identifying areas of high risk for fraud ; Looking at the exposures from the fraudster's perspective ; Approach 1: Control weaknesses ; Approach 2: Key fields ; Being alert to the symptoms of fraud ; Building programs to look for symptoms ; Investigating and reporting instances of fraud ; Implementing controls for fraud prevention -- Why use data analysis to detect fraud? : Increased reliance on computers ; Developing CAATT's capabilities ; Integrated analysis and value-added audit ; Recognizing opportunities for CAATT's ; Developing a fraud investigation plan -- Solving the data problem : Setting audit objectives ; Defining the information requirements ; Accessing data ; Data paths ; Data file attributes and structures ; Assessing data integrity ; Overview of the application system ; Overview of the data -- Understanding the data : Computer analysis ; Analysis techniques ; Assessing the completeness of the data ; Expression/equation ; Gaps ; Statistical analysis ; Duplicates ; Sorting and indexing -- Overview of the data : Summarization ; Stratification ; Cross tabulation/pivot tables -- Working with the data : Aging ; Join/relation -- Analyzing trends in the data : Trend analysis ; Regression analysis ; Parallel simulation -- Known symptoms of fraud : Known and unknown symptoms ; Fraud in the payroll area ; Fraud in the purchasing area ; Symptoms of purchasing fraud -- Unknown symptoms of fraud (using digital analysis) : Data profiling ; Ratio / variance analysis ; Benford's law -- Automating the detection process : Fraud applications or templates ; Fraud application development -- Verifying the results : Confirmationletters ; Sampling ; Judgmental or directed sampling ; Statistical sampling ; Quality assurance ; Quality assurance methodology ; Preventive controls ; Detective controls ; Corrective controls ; Ensuring reliability ; Data analysis and prosecuting fraud -- Appendix A. Fraud investigation plans : Insurance policies: too good to be true ; Paid by the numbers -- Appendix B. Application of CAATT's by functional area -- Appendix C. ACL installation process.
This thorough and highly readable guide is filled with authoritative tips, techniques, and advice on: what fraud is really costing your organisation; why use data analysis to detect fraud? How to assess the risk that fraud is occurring and automating your corporate fraud detection process.
rpm 22/05/13
Loans
There are no comments on this title.
