Amazon cover image
Image from Amazon.com

The fraud audit : responding to the risk of fraud in core business systems / Leonard W. Vona.

By: Contributor(s): Series: Wiley corporate F & APublication details: Hoboken, N.J. : Wiley, 2011.Description: 1 online resource (xi, 379 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781118093719
  • 9781118093702
  • 9781118093726
  • 1118093712
  • 1118093720
  • 1118093704
  • 9781118387047
  • 111838704X
Subject(s): Genre/Form: Additional physical formats: Print version:: Fraud audit.LOC classification:
  • HV8079.F7 V66 2011eb
Online resources:
Contents:
Front Matter -- What Is a Fraud Audit? -- Professional Standards -- Fraud Scenarios -- Brainstorming: The Implementation of Professional Standards -- Assessment of Fraud Likelihood -- Building the Fraud Audit Program -- Data Mining for Fraud -- Fraud Audit Procedures -- Document Analysis -- Disbursement Fraud -- Procurement Fraud -- Payroll Fraud -- Revenue Misstatement -- Inventory Fraud -- Journal Entry Fraud -- Program Management Fraud -- Quantifying Fraud -- Appendix A: Fraud Audit Program: Payroll -- Appendix B: Fraud Audit Program: Disbursements -- Appendix C: Fraud Audit Program: Procurement -- Appendix D: Fraud Audit Program: Inventory -- Appendix E: Fraud Audit Planning Program: Revenue Recognition -- Appendix F: Checklist of Inherent Scheme Structure -- Appendix G: Fraud Audit Matrix -- About the Author -- Index.
Summary: "Essential guidance for creation of an effective fraud audit program in core business systems. The Association of Certified Fraud Examiners has reported that U.S. businesses lose up to $4 billion annually due to fraud and abuse. Discover fraud within your business before yours becomes another business fraud statistic. Fraud in the Core Business Systems provides a proven fraud methodology that allows auditors to discover fraud versus investigating it. Explains how to create a fraud audit program. Shows auditors how to locate fraud through the use of data mining. Focuses on a proven methodology that has actually detected fraudulent transactions. Take a look inside for essential guidance for fraud discovery within specific corporate F & A functions, such as disbursement, procurement, payroll, revenue misstatement, inventory, journal entries, and management override."-- Provided by publisher.
Item type: eBooks
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

"Essential guidance for creation of an effective fraud audit program in core business systems. The Association of Certified Fraud Examiners has reported that U.S. businesses lose up to $4 billion annually due to fraud and abuse. Discover fraud within your business before yours becomes another business fraud statistic. Fraud in the Core Business Systems provides a proven fraud methodology that allows auditors to discover fraud versus investigating it. Explains how to create a fraud audit program. Shows auditors how to locate fraud through the use of data mining. Focuses on a proven methodology that has actually detected fraudulent transactions. Take a look inside for essential guidance for fraud discovery within specific corporate F & A functions, such as disbursement, procurement, payroll, revenue misstatement, inventory, journal entries, and management override."-- Provided by publisher.

Front Matter -- What Is a Fraud Audit? -- Professional Standards -- Fraud Scenarios -- Brainstorming: The Implementation of Professional Standards -- Assessment of Fraud Likelihood -- Building the Fraud Audit Program -- Data Mining for Fraud -- Fraud Audit Procedures -- Document Analysis -- Disbursement Fraud -- Procurement Fraud -- Payroll Fraud -- Revenue Misstatement -- Inventory Fraud -- Journal Entry Fraud -- Program Management Fraud -- Quantifying Fraud -- Appendix A: Fraud Audit Program: Payroll -- Appendix B: Fraud Audit Program: Disbursements -- Appendix C: Fraud Audit Program: Procurement -- Appendix D: Fraud Audit Program: Inventory -- Appendix E: Fraud Audit Planning Program: Revenue Recognition -- Appendix F: Checklist of Inherent Scheme Structure -- Appendix G: Fraud Audit Matrix -- About the Author -- Index.

John Wiley and Sons Wiley eBooks

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu