Premium Essay

Global Profiles of the Fraudsters

In: Business and Management

Submitted By ghareeb
Words 10259
Pages 42
Global profiles of the fraudster
White-collar crime – present and future

kpmg.com/fraudster

2

Global profiles of the fraudster

F

Introduction to the typical fraudster identified in the investigations KPMG firms reported on two years earlier. The typical fraudster in the 2013 study is 36 to 45 years of age, is generally acting against his/her own organization, and is mostly employed in an executive,3 finance, operations or sales/ marketing function. He/she holds a senior management position, was employed in the organization in excess of six years and, in committing the fraud, frequently acted in concert with others. Other findings, however, are different. This time, we have developed a series of themes in order to understand the changing relationship among the fraudster, his/ her environment and the frauds committed. And after taking into account the insights of our investigation leaders around the world, we conclude that the type of fraud and the type of fraudster are continually changing. “The intriguing thing about fraud is that it is always morphing, like a strain of flu; you can cure today’s strain, but next year it evolves into something as bad if not worse, ” says Phil Ostwalt, Global Coordinator for Investigations for the Global Forensic practice at KPMG. One major change is the growing use of technology by fraudsters, and not just in the technologically advanced countries, such as the US “a concern for all business is that we are about to see a new generation of people, able to use more technology and with access to much more information than past generations. All of which points to a new era for fraud and illegal activities, ” says Arturo del Castillo, Managing Director of Forensic, KPMG in Colombia. We believe that understanding this fluidity will enable organizations to protect themselves better against fraud and may improve their ability

Similar Documents

Premium Essay

Kia Motor Fraud

...Executive Summary This report would provide a thorough application of Accounting Information System concepts, accompanied with thorough findings on Kia Motors, South Korea’s second largest automobile manufacturer. The findings were based on mainly secondary data through research obtained from web-based sources such as online articles, analyst reports, financial reports, academic journals and academic databases. The report aims to present the detailed findings of Kia Motors and the fraud that occurred in 2002 through a Balanced Scorecard (“BSC”), Document Flowchart Diagram (“DFD”), as well as the facts and role of the accountant, Cecile Campbell in the fraud committed on Kia Motors in 2002. The report consists of mainly three components. Firstly, a BSC that was developed using Kia Motors’ mission, vision and strategies that were identified and inferred from online research and Kia Motors’ financial statements and sustainability reports. Key information that was included in the BSC were Kia Motors’ performance and risk-based goals, initiatives, measures and their performance target. Secondly, a DFD was created to reflect one of Kia Motors’ key operations. The diagram that was drawn up was based on Kia Motors’ expenditure cycle. It showcased a detailed description of the relevant source documents involved, as well as their flow throughout the business process. The report further highlighted the key internal control strengths, the risk of material misstatements they serve...

Words: 4866 - Pages: 20

Premium Essay

For This Magazine, Internal Audit Proved Hard to Digest

...Case Study – FOR THIS MAGAZINE, INTERNAL AUDIT PROVED HARD TO DIGEST Janet Leonard AC 562 – Auditing: An Operational and Internal Perspective Including Fraud Examination This case revolves around the globally renowned company, Reader’s Digest. Best known for its popular magazine of the same name, the company is one of the world’s largest direct-mail publishing houses. As with other global companies, Reader’s Digest made a decision in the mid-1980’s to outsource a large portion of its direct-mail business to specialized mailing companies. Its Pleasantville, New York facility was to be converted into an office complex, complete with auditorium. The company hired Terrence McGrane as its chief internal auditor. Mr. McGrane set up meetings with the company’s vice presidents in an effort to learn more about the company. In an effort to learn the accounts coding system, Mr. McGrane borrowed some recently processed invoices from the accounting department. He then proceeded to his first scheduled meeting with the vice president of administrative services, Mr. Harold Scott. Part of Mr. Scott’s duties involved the oversight of construction projects, as well as maintenance services. According to the Association of Certified Fraud Examiners’ 2006 Report to the Nation, 25% of all fraud in large businesses is discovered by accident. Such was the case with Reader’s Digest. When Mr. McGrane showed Mr. Scott the invoices he had retrieved from accounting, Mr. Scott...

Words: 1136 - Pages: 5

Premium Essay

Bernie Madoff

...Bernie Madoff Research Project Abronia S. Young D03202587 On March 12, 2009, Madoff pleaded guilty to 11 federal offenses, including securities fraud, wire fraud , mail fraud , money laundering, making false statements, perjury, theft from an employee benefit plan, and making false filings with the SEC. The Fraud In March 2009, Madoff admitted that since the mid-1990s he stopped trading and his returns had been fabricated. Madoff's sales pitch, an investment strategy consisted of purchasing blue chip stocks and taking options contracts on them, sometimes called a split-strike conversion or a collar. Typically, a position will consist of the ownership of 30–35 S&P 100 stocks, most correlated to that index, the sale of out-of-the-money calls on the index and the purchase of out-of-the-money 'puts' on the index. The sale of the 'calls' is designed to increase the rate of return, while allowing upward movement of the stock portfolio to the strike price of the calls. The puts, funded in large part by the sales of the calls, limit the portfolio's downside. Rather than offer high returns to all comers, Madoff offered modest but steady returns to an exclusive clientele. The investment method was marketed as too complicated for outsiders to understand. He was secretive about the firm’s business, and kept his financial statements closely guarded. One of the most prominent promoters was J. Ezra Merkin, whose fund Ascot Partners steered $1.8 billion towards Madoff's...

Words: 2658 - Pages: 11

Premium Essay

New Zealand Principles of Corporate Governance and

...New Zealand Principles of Corporate Governance and Responsibility. A Global Perspective. Prepared by: Mark Gray Large businesses around the world are controlled in a variegated fashion. Whilst the Anglo American system of corporate control is heavily based on a strict structure of a Board of Directors, in itself controlled by a chairman and constituting a various number of executive and non-executive directors. Whilst the primary function of the Board has fundamentally been seen as one of accountability, monitoring and goal setting, there is large chasm of difference in Board performance, and this highlighted graphically by the numerous large scale Corporate collapses in the United States. Indeed the U.S economy has been severely affected by ‘avoidable’ corporate bankruptcies. As the United States comprises a large proportion of the largest corporations in the world, it is not surprising that it has suffered a large number of corporate failures of corporate governance (Blackmore, 2006). The speedy corporate meltdown of very large U.S corporations, the like of Lehman Brothers and Enron threw the entire U.S business community into turmoil, prompting the U.S and other governments to speedily regulate as a deterrent to all business owners. This approach is ‘rules based’ and relies heavily on legislation for business compliance and good corporate governance. Although there have been corporate failures in New Zealand, most recently...

Words: 1616 - Pages: 7

Premium Essay

What Does Forensic Mean?

...1. What does forensic mean? From Latin forensis ‘in open court, public,’ - Relating to, used in, or appropriate for courts of law or for public discussion or argumentation. - Of, relating to, or used in debate or argument; rhetorical. - Relating to the use of science or technology in the investigation and establishment of facts or evidence in a court of law: a forensic laboratory. http://www.thefreedictionary.com/forensic 2. Define forensic accounting. Forensic accounting is a type of accounting which unites investigation accounting and litigation support to provide an accounting analysis that is suitable for court. 3. What are the key components of the definition of forensic accounting? Forensic, accounting, time, purpose - legal forum, peremptory. 4. How does a forensic audit differ from a regular audit? According to Ronald L. Durkin, the following differences in a forensic audit versus a traditional audit: •Not limiting the scope of the engagement based upon materiality. •Not accepting sampling as evidence. •Not assuming management has integrity. •Seeking the best legal evidence. •Melding the requirements of the evidential matter standard with the rules of evidence R.L. Durkin, "Defining the Practice of Forensic Accounting," CPA EXPERT (Special Edition, 1999). 5.Who may have been the earliest expert witness? Hercules De Cordes may have been an early expert witness. 6. What impact did the IRS have on forensic accounting in...

Words: 3750 - Pages: 15

Premium Essay

Forensic Accounting

...law." Most of the crimes, such as homicides, investigated on a show like "CSI" are known as "crimes against the person." Forensic accounting is simply a specialty field within the broader arena of accounting. The types of crimes forensic accountants investigate are classified as "crimes against property." They investigate crimes such as fraud and give expert testimony in court trials. They also perform work related to civil disputes. Forensic accountants are also known as fraud investigators, investigative accountants, forensic auditors or fraud auditors. Although forensic accounting may not sound as glamorous as its other investigative counterparts, the field has received more attention in recent years. This is due in part to the high-profile, financial white-collar crimes involving large corporations, such as the Enron and Adelphia Communications scandals of 2001 and...

Words: 2890 - Pages: 12

Premium Essay

Business Analytics

...investigate the use of data mining techniques for detection of asset misappropriation, starting from unsupervised data. In this study, procurement fraud stands as an example of asset misappropriation. Data are provided by an international service-sector company. After mapping out the purchasing process, ’hot spots’ are identified, resulting in a series of known frauds and unknown frauds as object of the study. 1 Introduction Fraud is a million dollar business and it is increasing every year. ”45% of companies worldwide have fallen victim to economic crime in 2004 and 2005. The average damage to the companies from tangible frauds (i.e. asset misappropriation, false pretences, and counterfeiting) was US$ 1.7 million.” according to the ’Global economic crime survey 2005’ of PriceWaterhouseCoopers. Journal headlines and news topics indicate the same trend of increasing fraudulent behavior. Given these numbers, it is remarkable...

Words: 6259 - Pages: 26

Free Essay

Consequences of Technology

...Introduction The advent of technology continues to transform the lives of all inhabitants of the earth, with most people struggling to learn and implement the new aspect of discoveries that happens almost on a daily basis. Observers indicate that the journey from the ancient ways of operation to the modern ways of conducting activities across the globe has been long and exciting. The desire to make things work efficiently and cheaply has been the driving force behind every technology in the world today. Most people would prefer to achieve optimum result with minimal input, the fact that makes them commence the process of coming up with a means of attaining such objective. The result of such initiative is a discovery of something that would find global use and transform the manner that people conduct their activities worldwide. Nevertheless, such discoveries also have numerous consequences, some of which can adversely affect the well-being of the users. With a close reference to the works of Jonathan Foer, Ian Hodder, and Ben Thompson amongst other writers, the paper accounts for the tremendously negative impact of technology on our lives including the brain capabilities and social skills. Technology Changes the Thinking System Jonathan Foer indicates that the advent of technology has completely revolutionized the manner in which people view the world today (1). Unlike the years in the past when people used to have a sharp memory and could remember almost everything that happened in...

Words: 2086 - Pages: 9

Free Essay

Consequences of Technology

...Introduction The advent of technology continues to transform the lives of all inhabitants of the earth, with most people struggling to learn and implement the new aspect of discoveries that happens almost on a daily basis. Observers indicate that the journey from the ancient ways of operation to the modern ways of conducting activities across the globe has been long and exciting. The desire to make things work efficiently and cheaply has been the driving force behind every technology in the world today. Most people would prefer to achieve optimum result with minimal input, the fact that makes them commence the process of coming up with a means of attaining such objective. The result of such initiative is a discovery of something that would find global use and transform the manner that people conduct their activities worldwide. Nevertheless, such discoveries also have numerous consequences, some of which can adversely affect the well-being of the users. With a close reference to the works of Jonathan Foer, Ian Hodder, and Ben Thompson amongst other writers, the paper accounts for the tremendously negative impact of technology on our lives including the brain capabilities and social skills. Technology Changes the Thinking System Jonathan Foer indicates that the advent of technology has completely revolutionized the manner in which people view the world today (1). Unlike the years in the past when people used to have a sharp memory and could remember almost everything that happened in...

Words: 2086 - Pages: 9

Premium Essay

Transformation of Banks

...1.1.ABSTRACT: Transformation is taking in Indian banks from all verticals, and subtle and not – so – subtle makeovers in banking products are dynamically altering the face of banking. The research paper focuses on the way transformation is affecting the banking sector and the way use of IT products have changed the face of banking in India. It reveals current environment of the banking industry; the factors that have brought changes in the industry; and the way these changes have contributed to the development of banking. This paper concludes that financial market has turned into a buyer’s market. Banks are have now bloomed into one-stop Supermarkets. Their focus is shifting from mass Banking to Class banking with introduction of value added and customized products. Technology now allows banks to create what looks like a branch in a business building’s lobby without having to hire manpower for manual operations. These branches are working on the concept of 24 X 7 working made possible due to Tele banking, ATMs, Internet Banking, Mobile Banking and E - banking. This technology driven delivery channels are used to reach maximum customers at lower cost and in most efficient manner. The beauty of these banking innovations is that it puts both banker and customer in a win-win situation. The need of an hour is to design a system to promote marginal efficiency of investment in technology and widen the gap between marginal benefits and marginal cost involved in Banking...

Words: 4187 - Pages: 17

Free Essay

Fraud and Money Laundering

...Fraud and Money Laundering Definition Money laundering is defined as: ‘The funnelling of cash or other funds generated from illegal activities through legitimate financial institutions and businesses to conceal the source of the funds.’ Anti-Money Laundering, 2nd ed., IFAC, 2004 Fraud is a general term for deliberate misrepresentation and may include money laundering. The problems of fraud and especially money laundering are increasing at an unprecedented rate. Governments worldwide are introducing new legislation and penalties for such white collar crimes. However, the huge amounts of money involved in these illegal activities ensure that criminals continue to exploit ways of increasing their activities. They clearly weigh up the potentially vast profits against their chances of being caught and the subsequent penalties. Context It is a fact that legitimate financial institutions and businesses may be involved in fraud and money laundering. It is therefore crucial that CIMA members, whether in practice or in business, are fully aware of this possibility and are alert to the signs of money laundering which can affect their business. Examination candidates should be aware of the risks involved, especially at strategic and TOPCIMA level. They should ensure that they know the signs of possible money laundering and the steps they must take to report it. 3 Topic Gateway Series Fraud and Money Laundering Overview There are a number of ways in which criminals commit...

Words: 3940 - Pages: 16

Premium Essay

Computer Crime Journal

...Journal - Week 1, Due 09.28.2014 Beginner’s Guide to Internet Protocol (IP) Addresses Beginner’s Guide to Internet Protocol (IP) Addresses. (2011, Mar. 04). Retrieved on September 26. 2014 from ICANN site: https://www.icann.org/resources/files/ip-addresses-beginners-guide-2011-03-04-en The Beginner’s Guide to IP Addresses is a publication by the Internet Corporation for Assigned Names and Numbers (ICANN), the private sector, non-profit corporation which assumes responsibility for IP address space allocation, protocol parameter assignment, domain name system management, and root server system management functions. The publication is part of the Beginner’s Guide series, published in the interest of educating new users about internet issues. The document details IP addresses, why we need them, protocol version history, implementation/distribution methods, and how these topics affect users. This particular concept is not new to me, but reading the document provided a ‘refresher course’ on topics that I have not recently studied. I use this information and technology on a daily basis - but through the course of use it is easy to step away from the fundamental details. In follow up reading, I find myself curious about the success of implementing IPv6 addressing. I know that it can be done, but have not seen a great deal of evidence that it is being done. As of June, 2014 the percentage of users accessing Google via IPv6 reached a milestone. 4%. While the 4% mark...

Words: 7665 - Pages: 31

Premium Essay

Study on Amazon

...See discussions, stats, and author profiles for this publication at: http://www.researchgate.net/publication/261440748 A STUDY ON AMAZON: INFORMATION SYSTEMS, BUSINESS STRATEGIES AND e-CRM ARTICLE · APRIL 2014 READS 9,305 1 AUTHOR: Abdullah Al Imran 1 PUBLICATION 0 CITATIONS SEE PROFILE Available from: Abdullah Al Imran Retrieved on: 29 September 2015 A STUDY ON AMAZON: INFORMATION SYSTEMS, BUSINESS STRATEGIES AND e-CRM MD. ABDULLAH AL IMRAN DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING UNIVERSITY OF LIBERAL ARTS BANGLADESH rasel1292@gmail.com 2014 Table of content Background 3 Part 1- Information Systems utilized for internet activity 3 1. Information System 3 2. Transaction Processing System 4 3. 1-click purchase 4 4. Secure C/debit card payment 4 5. Recommendation System 5 6. Interactive searching System 5 7. Supply Chain Management (SCM) 5 8. Enterprise Resource Management (ERP System) 5 9. Customer Relation Management (CRM) 5 Part 2-Business strategies applied for internet activity 6 1. Smart Innovation Strategy 6 2. Customer Relation Management Strategy 7 3. Jeff Bezos 3 big idea 7 Page-1 A. Limitless inventory 7 B. Customer Care 8 C. High margin, lowest price. 8 4. Marketing and Promotion Strategy 8 5. Associate Program 8 Part 3- eCRM cycle Conducted for internet Activity 9 1. Customer Relationship Management 9 2. Electronic Customer Relationship Management 9 3. How amazon implement CRM 9 4. Customer Selection...

Words: 3521 - Pages: 15

Premium Essay

Cyber Crime

...Cyber Crime Erika Moore CRJU 5500-02F What is cybercrime and how can someone get caught in participating in a cybercrime? Cybercrime any kind of crime committed via the internet or on a computer network.  Cybercrime can be anything from hate crimes, telemarketing and Internet fraud, identity theft, to credit card account thefts. All are considered to be cybercrimes when the illegal activities are committed through the use of a computer and the Internet. How bad could cybercrime really be? “Cybercrime is a type of crime that not only destroys the security system of a country but also its financial system.” (Real Cost of Cyber Crime) Cybercrime is the type of crime that is hard to trace, but once traceable it then opens a whole can of worms. Once our government finds out about cybercrimes usually they find more than what they were looking for to begin with. In the past there have been some cybercrime laws that were insufficient but the law enforcement agencies and government have proposed many plans to help fight cybercrime. Once a cybercrime has been committed and traced back to the hacker punishment is required. “Cybercrime must be dealt with very seriously because it causes a lot of damage to businesses and the actual punishment should depend on the type of fraud used. The penalty for illegally accessing a computer system ranges from 6 months to 5 years. The penalty for the unofficial modification on a computer ranges from 5 to 10 years.”(Real Cost of Cyber Crime)...

Words: 3822 - Pages: 16

Premium Essay

The Emereald

...The Emerald Research Register for this journal is available at www.emeraldinsight.com/researchregister The current issue and full text archive of this journal is available at www.emeraldinsight.com/0268-6902.htm Anatomy of computer accounting frauds A. Seetharaman, M. Senthilvelmurugan and Rajan Periyanayagam Faculty of Management, Multimedia University, Malaysia Keywords Fraud, Corruption, Financial reporting, Whistleblowing, Internal control, Corporate governance Abstract This paper introduces fraud as asset misappropriations (85 per cent of cases), corruption and fraudulent statements. Symptoms include accounting anomalies, lack of internal control environment, lifestyle and behaviour. The most effective tools for fraud detection are internal audit review, specific investigation by management, and whistle-blowing. The paper details the fraud investigation process and the role of auditors as fraud examiners. The correlation of fraud perpetrators’ personality with the size of losses is examined. Personality is analysed into age, gender, position, educational background and collusion. A strong system of internal control is most effective in fraud prevention. Fraud prevention procedures, targeted goals and improvements to system weaknesses feature in the paper. Fraud impacts on accounting transactions in accounts receivable, receipts and disbursements, accounts payable, inventories and fixed assets, and financial reporting. The monetary impact resulting from fraud is analysed...

Words: 8560 - Pages: 35