Submit Search
Upload
Profiling the Fraudster - OpenThinking Day
•
1 like
•
1,117 views
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
Follow
Profiling the Fraudster by Mr. Simon Padgett, Head of Forensic Services at Protiviti
Read less
Read more
Education
Technology
Business
Report
Share
Report
Share
1 of 40
Download now
Download to read offline
Recommended
Stress testing banks
Stress testing banks
Dr. Emmanuel Moore Abolo
Fraud Investigation
Fraud Investigation
Salih Islam
Operational risk management (orm)
Operational risk management (orm)
Bushra Angbeen
CREDIT RISK MANAGEMENT IN BANKING: A CASE FOR CREDIT FRIENDLINESS
CREDIT RISK MANAGEMENT IN BANKING: A CASE FOR CREDIT FRIENDLINESS
Lexworx
Fraud Risk and Control
Fraud Risk and Control
WeaverCPAs
Fraud Risk
Fraud Risk
F a h a d Z a f a r (Bradford MBA)
Fraud risk management
Fraud risk management
EMAC Consulting Group
Stress Testing
Stress Testing
nikatmalik
Recommended
Stress testing banks
Stress testing banks
Dr. Emmanuel Moore Abolo
Fraud Investigation
Fraud Investigation
Salih Islam
Operational risk management (orm)
Operational risk management (orm)
Bushra Angbeen
CREDIT RISK MANAGEMENT IN BANKING: A CASE FOR CREDIT FRIENDLINESS
CREDIT RISK MANAGEMENT IN BANKING: A CASE FOR CREDIT FRIENDLINESS
Lexworx
Fraud Risk and Control
Fraud Risk and Control
WeaverCPAs
Fraud Risk
Fraud Risk
F a h a d Z a f a r (Bradford MBA)
Fraud risk management
Fraud risk management
EMAC Consulting Group
Stress Testing
Stress Testing
nikatmalik
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
EMAC Consulting Group
Operation Risk Management in Banking Sector
Operation Risk Management in Banking Sector
Sanjay Kumbhar
risk management in banks
risk management in banks
pallvisachdeva
Types of-risk
Types of-risk
Dr. Ravneet Kaur
Risk management
Risk management
Dharmik
Fraud risk management in banks
Fraud risk management in banks
sathyananda prabhu
Forensic Auditing Show
Forensic Auditing Show
vikas_k
Capital Adequacy
Capital Adequacy
T A Sairam
Anti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment Process
accenture
Fraud Investigation Process And Procedures
Fraud Investigation Process And Procedures
Veriti Consulting LLC
Presentation on vigilance in banks and financial institutions in India
Presentation on vigilance in banks and financial institutions in India
Rammohanpnb
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
Case IQ
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good Practice
Arianto Muditomo
Stress Testing the Loan Portfolio
Stress Testing the Loan Portfolio
Libby Bierman
Fraud Prevention
Fraud Prevention
Gerald Johnson
How to conduct an AML risk assessment
How to conduct an AML risk assessment
Asia Pacific AML
Case study on forensic audit
Case study on forensic audit
SBS AND COMPANY LLP, CHARTERED ACCOUNTANTS
Operational risks
Operational risks
Rahmat Mulyana
Risk & Risk Management
Risk & Risk Management
ansula
Operational risk ppt
Operational risk ppt
NehaKamboj10
Understanding & Managing Fraud Rrisk
Understanding & Managing Fraud Rrisk
Santosh Pande
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
FraudBusters
More Related Content
What's hot
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
EMAC Consulting Group
Operation Risk Management in Banking Sector
Operation Risk Management in Banking Sector
Sanjay Kumbhar
risk management in banks
risk management in banks
pallvisachdeva
Types of-risk
Types of-risk
Dr. Ravneet Kaur
Risk management
Risk management
Dharmik
Fraud risk management in banks
Fraud risk management in banks
sathyananda prabhu
Forensic Auditing Show
Forensic Auditing Show
vikas_k
Capital Adequacy
Capital Adequacy
T A Sairam
Anti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment Process
accenture
Fraud Investigation Process And Procedures
Fraud Investigation Process And Procedures
Veriti Consulting LLC
Presentation on vigilance in banks and financial institutions in India
Presentation on vigilance in banks and financial institutions in India
Rammohanpnb
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
Case IQ
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good Practice
Arianto Muditomo
Stress Testing the Loan Portfolio
Stress Testing the Loan Portfolio
Libby Bierman
Fraud Prevention
Fraud Prevention
Gerald Johnson
How to conduct an AML risk assessment
How to conduct an AML risk assessment
Asia Pacific AML
Case study on forensic audit
Case study on forensic audit
SBS AND COMPANY LLP, CHARTERED ACCOUNTANTS
Operational risks
Operational risks
Rahmat Mulyana
Risk & Risk Management
Risk & Risk Management
ansula
Operational risk ppt
Operational risk ppt
NehaKamboj10
What's hot
(20)
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
FRAUD, MONEY LAUNDERING AND FORENSIC AUDIT
Operation Risk Management in Banking Sector
Operation Risk Management in Banking Sector
risk management in banks
risk management in banks
Types of-risk
Types of-risk
Risk management
Risk management
Fraud risk management in banks
Fraud risk management in banks
Forensic Auditing Show
Forensic Auditing Show
Capital Adequacy
Capital Adequacy
Anti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment Process
Fraud Investigation Process And Procedures
Fraud Investigation Process And Procedures
Presentation on vigilance in banks and financial institutions in India
Presentation on vigilance in banks and financial institutions in India
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good Practice
Stress Testing the Loan Portfolio
Stress Testing the Loan Portfolio
Fraud Prevention
Fraud Prevention
How to conduct an AML risk assessment
How to conduct an AML risk assessment
Case study on forensic audit
Case study on forensic audit
Operational risks
Operational risks
Risk & Risk Management
Risk & Risk Management
Operational risk ppt
Operational risk ppt
Similar to Profiling the Fraudster - OpenThinking Day
Understanding & Managing Fraud Rrisk
Understanding & Managing Fraud Rrisk
Santosh Pande
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
FraudBusters
Reputational risk article
Reputational risk article
Wa'el Bibi, CPA,CIA,CISA
Why Fraud Exist in the Organization?
Why Fraud Exist in the Organization?
BDO Indonesia
Temptation to defraud and internal auditor (albert holzinger 2010)
Temptation to defraud and internal auditor (albert holzinger 2010)
Andres Baytelman
Temptation to defraud and internal auditor (albert holzinger 2010)
Temptation to defraud and internal auditor (albert holzinger 2010)
Andres Baytelman
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
FraudBusters
Scl profile v2
Scl profile v2
Mustapha Mugisa
Reputation risk
Reputation risk
Michel Rochette
Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6
Accounting_Whitepapers
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
FraudBusters
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
Craig Taggart MBA
insights-servfile (2)
insights-servfile (2)
Dawn Murden
What You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From Fraud
steinkamps6
Dr haluk f gursel fraud examination rises to distinction article grcj 2010 1_v3_
Dr haluk f gursel fraud examination rises to distinction article grcj 2010 1_v3_
Haluk Ferden Gursel
Fraud risk services 2013
Fraud risk services 2013
Rahul Bhan (CA, CIA, MBA)
Fraud risk services 2013
Fraud risk services 2013
Rahul Bhan (CA, CIA, MBA)
Fraud risk services 2013
Fraud risk services 2013
Rahul Bhan (CA, CIA, MBA)
Fraud risk services 2013
Fraud risk services 2013
Rahul Bhan (CA, CIA, MBA)
Edelman Privacy Risk Index 2012
Edelman Privacy Risk Index 2012
Edelman.ergo GmbH
Similar to Profiling the Fraudster - OpenThinking Day
(20)
Understanding & Managing Fraud Rrisk
Understanding & Managing Fraud Rrisk
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
Reputational risk article
Reputational risk article
Why Fraud Exist in the Organization?
Why Fraud Exist in the Organization?
Temptation to defraud and internal auditor (albert holzinger 2010)
Temptation to defraud and internal auditor (albert holzinger 2010)
Temptation to defraud and internal auditor (albert holzinger 2010)
Temptation to defraud and internal auditor (albert holzinger 2010)
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
Scl profile v2
Scl profile v2
Reputation risk
Reputation risk
Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
insights-servfile (2)
insights-servfile (2)
What You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From Fraud
Dr haluk f gursel fraud examination rises to distinction article grcj 2010 1_v3_
Dr haluk f gursel fraud examination rises to distinction article grcj 2010 1_v3_
Fraud risk services 2013
Fraud risk services 2013
Fraud risk services 2013
Fraud risk services 2013
Fraud risk services 2013
Fraud risk services 2013
Fraud risk services 2013
Fraud risk services 2013
Edelman Privacy Risk Index 2012
Edelman Privacy Risk Index 2012
More from Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
Fraud Awareness Workshop 2015
Fraud Awareness Workshop 2015
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
Mastering Enterprise Risk Management Inside Your Organization
Mastering Enterprise Risk Management Inside Your Organization
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
Financial Orchestra - PICPA Middle East Conference
Financial Orchestra - PICPA Middle East Conference
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
Fraud Awareness Program - OpenThinking
Fraud Awareness Program - OpenThinking
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
The Experience 2020 - Iyad Mourtada
The Experience 2020 - Iyad Mourtada
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
Digital Business Strategy Workshop
Digital Business Strategy Workshop
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
OpenThinking Show - Fraud Case Files
OpenThinking Show - Fraud Case Files
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
The New Basics of Marketing - HBR
The New Basics of Marketing - HBR
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
CPLP Course 2014
CPLP Course 2014
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
ASTD Competency Model 2013
ASTD Competency Model 2013
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
Mastering the Certified Professional in Learning and Performance (CPLP) Exam
Mastering the Certified Professional in Learning and Performance (CPLP) Exam
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
Financial Statement Fraud
Financial Statement Fraud
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
Fraud prevention and detection within open data environment
Fraud prevention and detection within open data environment
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
Fraud Game Template
Fraud Game Template
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
How ethical you are?
How ethical you are?
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
How to lie, cheat and steal your way to success
How to lie, cheat and steal your way to success
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
Business Swimming Lessons
Business Swimming Lessons
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
Passing the Torch
Passing the Torch
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
How Accountants Cooked the Books
How Accountants Cooked the Books
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
Why Auditors Do Not Discover Fraud
Why Auditors Do Not Discover Fraud
Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
More from Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP
(20)
Fraud Awareness Workshop 2015
Fraud Awareness Workshop 2015
Mastering Enterprise Risk Management Inside Your Organization
Mastering Enterprise Risk Management Inside Your Organization
Financial Orchestra - PICPA Middle East Conference
Financial Orchestra - PICPA Middle East Conference
Fraud Awareness Program - OpenThinking
Fraud Awareness Program - OpenThinking
The Experience 2020 - Iyad Mourtada
The Experience 2020 - Iyad Mourtada
Digital Business Strategy Workshop
Digital Business Strategy Workshop
OpenThinking Show - Fraud Case Files
OpenThinking Show - Fraud Case Files
The New Basics of Marketing - HBR
The New Basics of Marketing - HBR
CPLP Course 2014
CPLP Course 2014
ASTD Competency Model 2013
ASTD Competency Model 2013
Mastering the Certified Professional in Learning and Performance (CPLP) Exam
Mastering the Certified Professional in Learning and Performance (CPLP) Exam
Financial Statement Fraud
Financial Statement Fraud
Fraud prevention and detection within open data environment
Fraud prevention and detection within open data environment
Fraud Game Template
Fraud Game Template
How ethical you are?
How ethical you are?
How to lie, cheat and steal your way to success
How to lie, cheat and steal your way to success
Business Swimming Lessons
Business Swimming Lessons
Passing the Torch
Passing the Torch
How Accountants Cooked the Books
How Accountants Cooked the Books
Why Auditors Do Not Discover Fraud
Why Auditors Do Not Discover Fraud
Recently uploaded
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
Celine George
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
Sayali Powar
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
AvyJaneVismanos
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
Virag Sontakke
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
Mahmoud M. Sallam
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
UjwalaBharambe
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
unnathinaik
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
manuelaromero2013
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
Virag Sontakke
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Celine George
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
SamikshaHamane
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
pboyjonauth
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
JiesonDelaCerna
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
jaredbarbolino94
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
JonathanParaisoCruz
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
mkooblal
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
InMediaRes1
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
adityarao40181
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
VS Mahajan Coaching Centre
Recently uploaded
(20)
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Profiling the Fraudster - OpenThinking Day
1.
Profiling the Fraudster
…..its all about people Open Thinking Day Simon Padgett Director Forensic Services simon.padgett@protivitiglobal.ae Dubai. September, 2012 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
2.
E&Y Fraud Survey
– Key Findings In the last year : 2 in 3 had been defrauded 1 in 10 had more than 50 frauds 82% were committed by employees Half of the employees had over 5 years service A quarter had more than 10 years service A third of the frauds were by management © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
3.
The two faces
of fraud: The first face is one of systems or controls The other face is the human element 2 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
4.
COSO
COSO identifies 5 components, which when integrated and operating in all business units, will help establish an effective internal control framework: 1. Control Environment 2. Risk Assessment 3. Control activities 4. Information and Communication 5. Monitoring 3 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
5.
Fraud Risk Assessment
Organizations first identify risks and prioritize them by assessing the impact and likelihood of an inherent risk. A key differentiator between Internal Controls and Anti Fraud Controls is the Human Element inherent in the decision to defraud. Failure to assess the Human Element can cause frauds to happen in organizations that otherwise seem to have a robust and comprehensive internal control framework. So, why do people commit fraud? 4 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
6.
One of the
best theories on why people commit fraud was given by Donald Cressey in his book “Other People’s Money” Cressey stated that Fraud occurs when an individual : •Has a non sharable financial problem. •Perceives an opportunity to resolve the situation. •Has the ability to rationalize his misdeeds even before committing them. 5 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
7.
Pressure
In other words for an individual to commit fraud, he may be under pressure from a financial problem which the individual perceives cannot be solved through other means. These problems often manifest themselves into behavioral patterns or red flags, which if spotted in time, could prevent a fraud from happening. The ACFE 2010 Report to the Nations, states that the most commonly cited behavioral red flags were perpetrators living beyond their apparent means or experiencing financial difficulties at the time of the fraud. 6 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
8.
Opportunity
Even if an individual has the motive, he cannot perpetrate the fraud unless presented with an opportunity. Opportunities could arise due to a number of factors within the organization such as high turnover of management in key roles, lack of segregation of duties or a complex organization structure. © 2012 Protiviti Member Firm (Middle East) Consultancy 7 CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
9.
Rationalisation
Rationalisation of the act is the last element in understanding why people commit fraud. Most people believe themselves as good and need to convince themselves that their actions were justified. Some of these justifications are: • I was going to pay it back • Everybody does it • I am not hurting anyone • I was helping my family • This is nothing compared to what xyz did. 8 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
10.
The Fraud Triangle
To sum up, when this individual under pressure is presented with an opportunity and is able to rationalize his planned actions, fraud occurs. This hypothesis is better known as the Fraud Triangle. FRAUD 9 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
11.
Fraud Risk Assessment
To be able to effectively analyse and prioritize fraud risks, organizations should evaluate the Human Element in the fraud risk. This can be achieved by applying the principles of the Fraud Triangle to the traditional risk assessment criteria of Impact and Likelihood. LIKELIHOOD INHERENT RISK IMPACT Traditional Risk Assessment Criteria RATING IMPACT OPPORTUNITY SITUATIONAL ATTITUDE OR FRAUD RISK Fraud Risk Assessment Criteria PRESSURE PERSONAL PRIORITY INTEGRITY The Human Elements 10 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
12.
Key Controls and
Personal Integrity For example in an organization where an individual performs a number of key controls – if this individual’s personal integrity and values are high, the chances of fraud happening is significantly lower than when the individual’s personal integrity is low. Understanding the people who manage key internal controls in an organization, their values and attitude could go a long way in minimizing the incidence of fraud and help build effective anti- fraud deterrents within an organization. 11 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
13.
Anti-Fraud Program
It is important for organizations to consider the human element while managing fraud risks. An Anti-Fraud Program that considers the human element may include the following fundamental controls: •Establish a Code of Ethics. •Develop Fraud Policies. •Invest in a communication and training program on fraud and corporate fraud policies for all employees. •Ensure proper segregation of duties for key activities and functions. •Set up appropriate recruitment procedures to select the right candidates. •Set up policies for rotation of staff duties and forced vacations. •Know your key fraud risks and controls. Monitor them regularly. •Set up a whistle blower hotline. •Sound recruitment policies and psychometric testing. •Develop a Fraud Risk Assessment process. 12 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
14.
13
© 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
15.
1. Edwin H.
Sutherland First defined “white-collar crime” in 1939 – Criminal acts of corporations – Individuals in corporate capacity Theory of differential association – Crime is not genetic – Learned from intimate personal groups – These groups teach "definitions" (including skills, motivations, attitudes, and rationalizations) either favourable or unfavourable to the violation of the law. Criminal behaviour results when one is exposed to an excess of definitions favourable to the violation of the law over unfavourable definitions. 14 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
16.
2. Harvey Cardwell
Wrote a book in 1960 on the logic and language of auditing for fraud. Found there are primarily 3 principal factors that contribute to employees beginning to steal: – The want for money - (early or late in life and the temporary urgent need) “Years of honest service” become meaningless when presented with time pressure. – Aggrieved – stealing after years of honest work apparently when hopes have faded, when honesty & effort have failed to produce the expected measure of success. Deterrents of prior years are weakened by extreme frustration. – The ability to steal – has been deterred by fear of detection but experience brings increased ability & self-confidence 15 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
17.
3. Gottfredson &
Hirschi’s general theory of crime - 1990 Assume that individuals choose the behavior that they wish to perform rationally. They will weigh the potential pleasure of performing a behavior against the potential pain of the behavior. When a behavior is judged to be more pleasurable than painful, an individual is likely to perform the behavior. Central to this decision is low self-control. How much crime occurs will depend in part on how much crime circumstances allow. 16 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
18.
4. Richard C.
Hollinger Hollinger-Clark study (1983) Surveyed 10,000 workers: 1/3 had committed some form of fraud. Many stole because of job dissatisfaction. Employee perception of detection is important. Employee-thieves exhibit other deviances – Sloppy work, sick leave abuses, etc. Increased security & controls may hurt, not deter. Management should be sensitive to employee’s attitudes. 17 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
19.
5. Donald R.
Cressey Other Peoples Money A criminologist who studied embezzlers Why people become “trust violators” Developed the Fraud Triangle in 1953 Cressey’s three learning principles 1) Non-shareable financial problem. 2) Perception that occupational situation can resolve the problem. 3) Ability to Rationalize the act(s). 18 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
20.
The Fraud Triangle: 19
© 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
21.
Fraud Risk Model
“the auditor should not assume that all 3 conditions must be evident before concluding that there are High Risk identified risks.” Medium Risk Incentive/ Attitude/ pressure rationalization “…the auditor cannot assume that the inability to observe one or two of these conditions means Opportunity there is no risk…” 20 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
22.
6. The triangle
extended: the fraud diamond - Wolfe & Hermanson - 2004 Pressure opportunity capability Position/function The Human brain Confidence/ego Cultural issues Coercion skills Effective lying Immunity to stress rationalisation 21 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
23.
The three parts
of perceived opportunity…… 1. To commit fraud 2. To conceal fraud 3. To avoid punishment 22 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
24.
pressure/rationalisation
capability identify opportunity act upon it; caught not do it punished commit will I be No fraud caught? don’t do it Yes maybe © 2012 Protiviti Member Firm (Middle East) Consultancy 2 CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
25.
Iceberg Theory of
Dishonesty Overt Aspects Structural - Hierarchy Considerations - Financial resources - Goals of the organisation - Skills and abilities of personnel - Technological state - Performances stds Waterline - Efficiency measurements Covert Aspects - Attitudes - Feelings (fear, anger, etc) Behaviourial - Values Considerations - Norms - Interaction - Supportiveness 24 © 2012 Protiviti Member Firm (Middle East)- Satisfaction Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
26.
Characteristics of a
Fraudster College educated, white Male. ¾ of frauds are committed by men. Higher median loss (US$85,000 for men, US$ 48,000 for women). Intelligent. The challenge of “secure systems” overcomes boredom. Egotistical. Feel worth more than their position. Inquisitive. Curious as to computer vulnerability. Risk takers. Not afraid to fail. Fails to consider consequences. Rule breakers. Likes shortcuts. Justifies infractions of laws. 25 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
27.
Characteristics of a
Fraudster, continued Hard Workers. In early, out late, no vacations. Excessive overtime Immune from stress. Financial pressure. Medical fees, bad marriage, gambling. Married. Management. Disgruntled. Feels abused, not promoted, underpaid. Big Spender. Living beyond means. 26 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
28.
Characteristics of a
Fraudster, continued Sudden large purchases Close relationships with suppliers/customers. Don’t like people reviewing work Unable to relax Often display drastic behavioral changes Need turns to greed. 27 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
29.
Changes in Behaviour
Sudden large purchases. House, Car, Jewellery Brags about purchases Carry large amounts of cash Fending off creditors Borrows money from co-workers Moody, Irritable Defensive attitude to questioning Territorial over responsibilities 28 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
30.
Changes in Behaviour,
continued Workaholic Mentions financial/family problems Exhibits signs of addiction. Absenteeism, looks ill Decrease in productivity Spending excessive time with vendors/suppliers Nervous “Minor” infringements 29 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
31.
Characteristics of a
Victim Organisation Most costly abuses in organizations of less than 100 employees. Where fraud is not perceived a risk Management ignore irregularities Morale is low High employee turnover Lack of training Rapid increase in revenues and profits Strong, egotistical leader Profit is the ultimate goal, to be reached no matter what Salary structure tied to profit 30 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
32.
ACFE Report to
the Nations on Occupational Fraud The latest report, for 2010, was compiled from 1,843 cases and covered cases from 106 nations. 31 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
33.
Victims of Occupational
Fraud The 2010 Report provides some information on the types of businesses that were victims of occupational frauds. The highs and lows are as follows: % of cases Median loss High Banking 16.6% Mining US$ 1 and finance million Low Mining 0.7% Education US$ 71k 32 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
34.
Profiling by Fraudster
Position in Organisation This is explained on the basis that more senior people in management levels and executive positions have a greater opportunity to commit and hide larger frauds. This is a common theme throughout the remainder of the profiles. The study also found that lower level employees committed more frauds in number than management level, and about twice as many frauds as executives - probably because there are many more lower level employees that executives. Employee Management Owner/Executive 39.7% 37.1% 23.3% $70,000 $150,000 $834,000 42.1% 41.0% 16.9% $80,000 $200,000 $723,000 33 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
35.
Profiling by Job
Description in Organisation The greatest number of cases are committed by people with the accounting area of the business, as these employees will have the knowledge of how to commit and hide the fraud and access to the records to do so. The largest median losses were incurred by frauds committed by people within the legal department. % of cases Median loss Upper Highs Accounting 22% $829,000 Management Lows Internal Audit 0.2% Internal Audit $13,000 34 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
36.
Profiling by Fraudster
Gender Over the past surveys, the rate of fraud between the genders began to equalize in number. This was superficially explained by the trend of women getting closer to equality in the work place (in numbers and positions) Male Female Percentage 2008 59.1 40.9 Median Loss 2008 250,000 110,000 Percentage 2010 66.7 33.3 Median Loss 2010 232,000 100,000 35 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
37.
Profiling by Fraudster
Age Median losses increase with the age of employees. Under 26 to 30 31 to 40 41 to 50 51 to 60 over 60 25 % 5.9% 10.7% 34.2% 32% 15.1% 2% 36 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
38.
Profiling by Educational
Standard Smarter people - smarter frauds? Some Tertiary High School Tertiary Education Post Graduate Education Percentage 2008 54.7% 34.4% 10.9% Median Loss 2008 $150,000 $210,000 $550,000 Percentage 2010 28.8% 17.1% 38% 14% Median Loss 2010 $100,000 $136,000 $234,000 $300,000 37 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
39.
38
© 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
40.
39
© 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Download now