+

Byington et al., 2012 - Google Patents

Are your cash transactions protected?

Byington et al., 2012

Document ID
9676300251432214700
Author
Byington J
McGee J
Publication year
Publication venue
Journal of Corporate Accounting & Finance

External Links

Snippet

Cash is the most commonly targeted asset by white‐collar crime fraudsters. How well are your company's cash transactions protected? What are the main types of cash fraud schemes that you must guard against? And what steps should you be taking right now?© …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing

Similar Documents

Publication Publication Date Title
Levi et al. The prevention of cheque and credit card fraud
Wells Occupational fraud: The audit as deterrent
Brandt The biggest computer frauds: lessons for CPAs
Choo Money laundering and terrorism financing risks of prepaid cards instruments?
Byington et al. Are your cash transactions protected?
Wells Enemies within
Holtfreter et al. Gauging the effectiveness of US identity theft legislation
Goredema Money laundering in East and Southern Africa: An overview of the threat
Macdonald et al. Understanding fraud: The nature of fraud offences recorded by NSW Police
Mai et al. Cash, freedom and crime
Linn Regulating the cross‐border movement of prepaid cards
Christensen et al. How secure are your cash transactions?
Lundstrom Fraud: Red Flags or" Red Herrings"? Telling the Difference.
Fishman Signs of fraud: A case by case review
Slamkov et al. The concept of “white-collar” crime
Laundering Combating Financing of Terrorism Policy
Webster et al. International money laundering: Research and investigation join forces
Grupe et al. Watching systems in action: security at the periphery
McGee et al. Beware expense reimbursement schemes!
Pavlović et al. Phenomenological forms of asset misappropriation fraud as the specific type of economic crime.
Burton Credit Card Fraud and Fuel Pump Skimming
Glassman Use of internal controls to prevent fraud in your practice.
MICRC'COPY Microfil~ ing pro~ edures~ sed to cre~ t~ thi; fi~ h-~-~ omply wifli
Sakurai et al. Identifying and Responding to Risks of Serious Fraud in Australia and New Zealand.
Goredema Money laundering in East and Southern Africa: a preliminary overview of the threat
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载