Monday, April 22, 2019

Loss Prevention Policies Assignment Example | Topics and Well Written Essays - 1500 words - 1

Loss Prevention Policies - date ExampleFraud continues to increase alarmingly with each passing moment recording a late or even more sophisticated form of trick. The situation is made worse by an increase adoption of information technology that networks and connects the information infrastructure in businesses. Hard economic times ar also tempting employees to engage in fraud. This paper will review the benefits of a broad fraud control program and give a conclusion at the end.Fraud is a big occupation even for large established global corporations consider the case of dell Computer Corporation. In 2007, it had to construct its financial reports between 2003 and 2006 due to a deliberate manipulation of figures to meet quarterly budgetary targets. tail Rigas, former chairman and founder of Adelphi Communications and his son Timothy who served as the CFO (Chief financial Officer) at Delphi were convicted for massive fraud in 2007 (Stanek, 2007). This illustrates the extent of fr aud in organizations where even the senior leaders who be supposed to be role models actually initiate and commit heinous acts of corporate fraud. However, a comprehensive fraud monitor system can come in handy to help detect and thereof help an organization reduce its risk to fraud. Comprehensive fraud monitoring involves the use of technology that incorporates forensic techniques to analyze data and information paths regularly to detect anomalies, to detect fraudulent acts while there is muted time to stop or mitigate the fraud. An effective fraud monitoring system is difficult to extend to by using the existing requirements and regulations necessitating the need for a comprehensive fraud monitoring system in particular where senior management can be involved in fraud.A comprehensive fraud monitoring system continuously and constantly monitors happenings in a companys financial system trace the movement of cash, which can be used to trace back or detect potential fraud. A

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.