Use the Fraud Triangle and Fraud Scale to critically analyse the actions of Bernie Ebbers and Scott Sullivan during the WorldCom saga/ What does your analysis suggest? Dennis Greer’s fraud triangle is a key framework in analysing the ‘factors that cause someone to commit occupational fraud’ (ACFE-The Fraud Triangle, Association of Certified Fraud, Examiners Available from:http://www.acfe.com/fraud-triangle.aspx [January 2014]). The three elements that make up the model are perceived
Words: 3980 - Pages: 16
Abstract: Rising era of computer and other technologies as internet and gadgets, explosively increase in number of cybercrime or other crimes using technologies. The growth of computer forensic has taken as huge success to control those crimes which are committed using computers. The main task of computer forensic is to examining and collecting electronic data as evidence from a crime scene. The work of computer forensic is to recover the data which has been hacked or lost by the criminals using
Words: 870 - Pages: 4
in committing the fraud, frequently acted in concert with others. Other findings, however, are different. This time, we have developed a series of themes in order to understand the changing relationship among the fraudster, his/ her environment and the frauds committed. And after taking into account the insights of our investigation leaders around the world, we conclude that the type of fraud and the type of fraudster are continually changing. “The intriguing thing about fraud is that it is always
Words: 10259 - Pages: 42
Chapter 11 bankruptcy in July 2002. With 65 successful acquisitions, including 11 major companies between 1991 and 1997, WorldCom’s accumulated debts reached $41 billion with assets of $107 billion (Beltran, 2002). WorldCom operated the largest Internet network at the time and employed 60,000 people in 65 countries. The downfall of the colossal giant devastated many shareholders and stakeholders both internal and external. Many believe this collapse inevitable given the factors of the company’s
Words: 1169 - Pages: 5
php http://www.dnaindia.com/money/report-all-that-you-need-to-know-about-the-satyam-scam-2067138 https://en.wikipedia.org/wiki/Satyam_scandal http://www.hindustantimes.com/business/satyam-scam-all-you-need-to-know-about-india-s-biggest-accounting-fraud/story-YTfHTZy9K6NvsW8PxIEEYL.html http://www.business-standard.com/article/economy-policy/in-case-of-satyam-issue-is-not-just-about-money-but-biz-ethics-109051100040_1.html http://rammallar.blogspot.in/2013/04/satyam-scam-is-it-failure-of-business
Words: 1639 - Pages: 7
board of directors of all corporations must go to extreme measures to maintain due diligence in every aspect of their duties in managing corporations. Any corporate transgressions can be immediately disclosed to the world through television, radio or internet. These perceptions of misconduct, whether true or false, can greatly affect the corporations’ position. Because of the critical affect that inappropriate conduct on the part of directors and corporate management has on the future of the corporation
Words: 867 - Pages: 4
Active use of the Internet and participation in social media groups have been recognized as by the US Congress as powerful means of helping people to avoid being victimized by advance fee loan scams and other types of financial fraud. Social media is a powerful force, reaching millions of people. The user-friendly design of the major social networking groups encourages users from all age groups and skill sets to communicate and to share information. That is exactly why social media has attracted
Words: 312 - Pages: 2
to con- tract expressed by electronic means, (d) e-commerce and electronic form, (f) publication of official gazette in the electronic form, (g) prevention of computer crime, forged electronic records, international alteration of electronic records fraud, forgery or falsification in e-commerce and electronic transaction, (h) and others solutions of the crime relation with information Communication Technology. Objectives of the ICT Act, 2006 The objectives of the ICT Act, 2006 has been provided following
Words: 695 - Pages: 3
There have been different forms of Cybercrime activities. This includes, but not limited, Denial of Service (DOS) attacks, Malware, and computer viruses. The second class of Cybercrime activities includes, information warfare, phishing, swindles, fraud (Cybercrime, 2012) as well as,
Words: 699 - Pages: 3
are absolutely unpreventable. C) many companies in one locale can be seriously affected at one time by a disaster. D) there are a large number of major disasters every year. 3) The US Justice Department defines computer fraud as 3) _______ A) an illegal act in which knowledge of computer technology is essential. B) an illegal act in which a computer is an integral part of the crime. C) any act in which cash is stolen using a computer. D)
Words: 1533 - Pages: 7