Byington et al., 2012 - Google Patents
Are your cash transactions protected?Byington et al., 2012
- Document ID
- 9676300251432214700
- Author
- Byington J
- McGee J
- Publication year
- Publication venue
- Journal of Corporate Accounting & Finance
External Links
Snippet
Cash is the most commonly targeted asset by white‐collar crime fraudsters. How well are your company's cash transactions protected? What are the main types of cash fraud schemes that you must guard against? And what steps should you be taking right now?© …
- 238000000034 method 0 description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Levi et al. | The prevention of cheque and credit card fraud | |
| Wells | Occupational fraud: The audit as deterrent | |
| Brandt | The biggest computer frauds: lessons for CPAs | |
| Choo | Money laundering and terrorism financing risks of prepaid cards instruments? | |
| Byington et al. | Are your cash transactions protected? | |
| Wells | Enemies within | |
| Holtfreter et al. | Gauging the effectiveness of US identity theft legislation | |
| Goredema | Money laundering in East and Southern Africa: An overview of the threat | |
| Macdonald et al. | Understanding fraud: The nature of fraud offences recorded by NSW Police | |
| Mai et al. | Cash, freedom and crime | |
| Linn | Regulating the cross‐border movement of prepaid cards | |
| Christensen et al. | How secure are your cash transactions? | |
| Lundstrom | Fraud: Red Flags or" Red Herrings"? Telling the Difference. | |
| Fishman | Signs of fraud: A case by case review | |
| Slamkov et al. | The concept of “white-collar” crime | |
| Laundering | Combating Financing of Terrorism Policy | |
| Webster et al. | International money laundering: Research and investigation join forces | |
| Grupe et al. | Watching systems in action: security at the periphery | |
| McGee et al. | Beware expense reimbursement schemes! | |
| Pavlović et al. | Phenomenological forms of asset misappropriation fraud as the specific type of economic crime. | |
| Burton | Credit Card Fraud and Fuel Pump Skimming | |
| Glassman | Use of internal controls to prevent fraud in your practice. | |
| MICRC'COPY | Microfil~ ing pro~ edures~ sed to cre~ t~ thi; fi~ h-~-~ omply wifli | |
| Sakurai et al. | Identifying and Responding to Risks of Serious Fraud in Australia and New Zealand. | |
| Goredema | Money laundering in East and Southern Africa: a preliminary overview of the threat |