Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Years
Person/Organisation
Subjects(RVK)
Keywords
Access
  • 1
    UID:
    almafu_9959328537402883
    Format: 1 online resource (xi, 379 pages) : , illustrations
    ISBN: 9781118093719 , 9781118093702 , 9781118093726 , 1118093712 , 1118093720 , 1118093704 , 9781118387047 , 111838704X
    Content: "Essential guidance for creation of an effective fraud audit program in core business systems. The Association of Certified Fraud Examiners has reported that U.S. businesses lose up to $4 billion annually due to fraud and abuse. Discover fraud within your business before yours becomes another business fraud statistic. Fraud in the Core Business Systems provides a proven fraud methodology that allows auditors to discover fraud versus investigating it. Explains how to create a fraud audit program. Shows auditors how to locate fraud through the use of data mining. Focuses on a proven methodology that has actually detected fraudulent transactions. Take a look inside for essential guidance for fraud discovery within specific corporate F & A functions, such as disbursement, procurement, payroll, revenue misstatement, inventory, journal entries, and management override."--
    Note: Front Matter -- What Is a Fraud Audit? -- Professional Standards -- Fraud Scenarios -- Brainstorming: The Implementation of Professional Standards -- Assessment of Fraud Likelihood -- Building the Fraud Audit Program -- Data Mining for Fraud -- Fraud Audit Procedures -- Document Analysis -- Disbursement Fraud -- Procurement Fraud -- Payroll Fraud -- Revenue Misstatement -- Inventory Fraud -- Journal Entry Fraud -- Program Management Fraud -- Quantifying Fraud -- Appendix A: Fraud Audit Program: Payroll -- Appendix B: Fraud Audit Program: Disbursements -- Appendix C: Fraud Audit Program: Procurement -- Appendix D: Fraud Audit Program: Inventory -- Appendix E: Fraud Audit Planning Program: Revenue Recognition -- Appendix F: Checklist of Inherent Scheme Structure -- Appendix G: Fraud Audit Matrix -- About the Author -- Index.
    Additional Edition: Print version: Vona, Leonard W., 1955- Fraud audit. Hoboken, N.J. : Wiley, 2011
    Language: English
    Keywords: Electronic books. ; Electronic books. ; Electronic books. ; Electronic books. ; Electronic books. ; Electronic books.
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_647599694
    Format: XI, 379 S. , graph. Darst.
    ISBN: 9780470647264
    Series Statement: Wiley corporate F & A
    Content: "Essential guidance for creation of an effective fraud audit program in core business systems. The Association of Certified Fraud Examiners has reported that U.S. businesses lose up to $4 billion annually due to fraud and abuse. Discover fraud within your business before yours becomes another business fraud statistic. Fraud in the Core Business Systems provides a proven fraud methodology that allows auditors to discover fraud versus investigating it. Explains how to create a fraud audit program. Shows auditors how to locate fraud through the use of data mining. Focuses on a proven methodology that has actually detected fraudulent transactions. Take a look inside for essential guidance for fraud discovery within specific corporate F&A functions, such as disbursement, procurement, payroll, revenue misstatement, inventory, journal entries, and management override."--
    Note: Includes index , Lt. LOC-CIP-Data Vol. 16 von Wiley corporate F & A
    Additional Edition: ISBN 9781118093702
    Additional Edition: ISBN 9781118093719
    Additional Edition: ISBN 9781118093726
    Language: English
    Subjects: Law
    RVK:
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    edocfu_9961557278302883
    Format: 1 online resource (395 p.)
    Edition: 1st edition
    ISBN: 1-118-09372-0 , 1-283-17663-7 , 9786613176639 , 1-118-38704-X , 1-118-09370-4
    Series Statement: Wiley corporate f&a ; 16
    Content: "Essential guidance for creation of an effective fraud audit program in core business systems. The Association of Certified Fraud Examiners has reported that U.S. businesses lose up to $4 billion annually due to fraud and abuse. Discover fraud within your business before yours becomes another business fraud statistic. Fraud in the Core Business Systems provides a proven fraud methodology that allows auditors to discover fraud versus investigating it. Explains how to create a fraud audit program. Shows auditors how to locate fraud through the use of data mining. Focuses on a proven methodology that has actually detected fraudulent transactions. Take a look inside for essential guidance for fraud discovery within specific corporate F&A functions, such as disbursement, procurement, payroll, revenue misstatement, inventory, journal entries, and management override."--
    Note: Includes index. , THE FRAUD AUDIT: Responding to the Risk of Fraud in Core Business Systems; Contents; Preface; 1 What Is a Fraud Audit?; 2 Professional Standards; 3 Fraud Scenarios; 4 Brainstorming: The Implementation of Professional Standards; 5 Assessment of Fraud Likelihood; 6 Building the Fraud Audit Program; 7 Data Mining for Fraud; 8 Fraud Audit Procedures; 9 NINE Document Analysis; 10 Disbursement Fraud; 11 CHAPTER ELEVEN Procurement Fraud; 12 Payroll Fraud; 13 CHAPTER THIRTEEN Revenue; 14 Inventory Fraud; 15 Journal Entry Fraud; 16 Program Management Fraud; 17 Quantifying Fraud; Appendixes , About the AuthorIndex , English
    Additional Edition: ISBN 0-470-64726-4
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9781118093276?
Did you mean 9781118093702?
Did you mean 9781118093719?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages