Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
21 result(s) for "Singleton, Tommie"
Sort by:
Fraud Auditing and Forensic Accounting
FRAUD AUDITING AND FORENSIC ACCOUNTING With the responsibility of detecting and preventing fraud falling heavily on the accounting profession, every accountant needs to recognize fraud and learn the tools and strategies necessary to catch it in time. Providing valuable information to those responsible for dealing with prevention and discovery of financial deception, Fraud Auditing and Forensic Accounting, Fourth Edition helps accountants develop an investigative eye toward both internal and external fraud and provides tips for coping with fraud when it is found to have occurred. Completely updated and revised, the new edition presents: Brand-new chapters devoted to fraud response as well as to the physiological aspects of the fraudster A closer look at how forensic accountants get their job done More about Computer-Assisted Audit Tools (CAATs) and digital forensics Technological aspects of fraud auditing and forensic accounting Extended discussion on fraud schemes Case studies demonstrating industry-tested methods for dealing with fraud, all drawn from a wide variety of actual incidents Inside this book, you will find step-by-step keys to fraud investigation and the most current methods for dealing with financial fraud within your organization. Written by recognized experts in the field of white-collar crime, this Fourth Edition provides you, whether you are a beginning forensic accountant or an experienced investigator, with industry-tested methods for detecting, investigating, and preventing financial schemes.
Fraud and forensic accounting in the digital environment
Fraud examination and forensic accounting are hot subjects in accounting today. The need to obtain, manage, and analyze digital data is critical for the success of future accounting professionals. Recent collaborations by colleagues in practice and in accounting higher education as described in \"Education and Training in Fraud and Forensic Accounting: A Guide for Educational Institutions, Stakeholder Organizations, Faculty and Students\" have created a framework for implementing changes in accounting education to better empower accounting graduates to be more effective in their roles to support anti-fraud efforts and perform forensic accounting in a digital environment. The true measure of an academic program is the impact it has on the knowledge level of its students. Many higher education accounting programs are considering incorporating fraud examination and forensic accounting content in their curricula. While this is a positive development, it is critically important that information technology content be embedded in the curriculum.
Don't get \hooked\ by phishing scams
Right this minute, someone has “gone phishing”— hoping to catch you, your company employees, or your customers. Criminals are duping computer users into revealing sensitive information— including bank accounts, social security numbers, credit card numbers, passwords, and more. Here's how to escape getting caught. © 2005 Wiley Periodicals, Inc.
Stop Fraud Cold with Powerful Internal Controls
Since the Enron debacle, companies are re‐examining their internal controls. Sometimes managers see them as an obstacle. But it doesn't have to be that way. The author shows you how to build stronger internal controls that can enhance corporate objectives. © 2002 Wiley Periodicals, Inc.
Cyberterrorism: Are you at risk?
Your company could be a victim of malicious online blackmail—or worse. The perpetrators can be motivated by greed, the desire for revenge, a criminal mind, or a political agenda. The authors reveal which companies are at highest risk, what kinds of attacks are likely, and what companies can do to protect themselves. © 2004 Wiley Periodicals, Inc.
A 25year retrospective on the IIAs SAC projects
In 2002, The Institute of Internal Auditors IIA observed the 25th anniversary of the publication of its first Systems, Auditability, & Control SAC study. This paper reviews the development of the SAC projects and their impact on Information Systems IS auditing in particular. Three different research methodologies were used for collecting the data for this research. First, a rigorous literature review was conducted. Second, an oralhistory methodology was used to collect data via interviews. Third, notes and minutes from many early committee meetings of IIA, including the SAC Committee, were studied. The early years 19541977 saw a dearth of related literature. Thus individual accountants and auditors found it difficult to acquire or gather information on emerging issues. The Systems, Auditability, & Control SAC study published in 1977 was one of the major attempts to codify IS auditing knowledge. This study has been followed up by three other SAC projects in 1991, 1994, and 2001. These SAC projects have provided some of the best guidance for IS auditors over these last 25 years. From the beginning of IS auditing, there has been a continued acceleration of technology. In particular, the audit process has been impacted by the proliferation of microcomputers.
Auditing headaches? Relieve them with CAR
Over the past 30 years, both information systems and accounting have undergone radical changes. Standards and regulations have also become frustratingly complex. But there's a powerful remedy for today's auditing headaches: continuous auditing and reporting (CAR). The authors explain what CAR is and how to determine if it will help your company. They also profile several affordable CAR products. Low‐ cost “instant auditing” is now possible! © 2005 Wiley Periodicals, Inc.
A 25‐year retrospective on the IIA’s SAC projects
In 2002, The Institute of Internal Auditors (IIA) observed the 25th anniversary of the publication of its first Systems, Auditability, & Control (SAC) study. This paper reviews the development of the SAC projects and their impact on Information Systems (IS) auditing in particular. Three different research methodologies were used for collecting the data for this research. First, a rigorous literature review was conducted. Second, an oral-history methodology was used to collect data via interviews. Third, notes and minutes from many early committee meetings of IIA, including the SAC Committee, were studied. The early years (1954-1977) saw a dearth of related literature. Thus individual accountants and auditors found it difficult to acquire or gather information on emerging issues. The Systems, Auditability, & Control (SAC) study published in 1977 was one of the major attempts to codify IS auditing knowledge. This study has been followed up by three other SAC projects in 1991, 1994, and 2001. These SAC projects have provided some of the best guidance for IS auditors over these last 25 years. From the beginning of IS auditing, there has been a continued acceleration of technology. In particular, the audit process has been impacted by the proliferation of microcomputers.
Forensic Accounting, First Edition
Forensic Accounting, First Edition, by William S. Hopwood, Jay J. Leiner, and George R. Young, is reviewed.