SlideShare a Scribd company logo
1 of 2
Download to read offline
The Fraud triangle is a framework designed to explain the reasoning behind a worker’s decision
to commit workplace fraud. The three stages, categorised by the effect on the individual, can be
summarised as pressure, opportunity and rationalisation. Broken down, they are:
Step 1 – the pressure on the individual – is the motivation behind the crime and can be either
personal financial pressure, such as debt problems, or workplace debt problems, such as a
shortfall in revenue. The pressure is seen by the individual as unsolvable by orthodox, legal,
sanctioned routes and unshareable with others who may be able to offer assistance. A common
example of a perceived unshareable financial problem is gambling debt. Maintenance of a
lifestyle is another common example.
Step 2 – the opportunity to commit fraud – is the means by which the individual will defraud the
organisation. In this stage the worker sees a clear course of action by which they can abuse their
position to solve the perceived unshareable financial problem in a way that – again, perceived by
them – is unlikely to be discovered. In many cases the ability to solve the problem in secret is
key to the perception of a viable opportunity.
Step 3 – the ability rationalise the crime – is the final stage in the fraud triangle. This is a
cognitive stage and requires the fraudster to be able to justify the crime in a way that is
acceptable to his or her internal moral compass. Most fraudsters are first-time criminals and do
not see themselves as criminals, but rather a victim of circumstance. Rationalisations are often
based on external factors, such as a need to take care of a family, or a dishonest employer which
is seen to minimise or mitigate the harm done by the crime.
The key to dealing with fraud is to focus on prevention. It is cheaper and more effective to
prevent fraud from happening than it is to try to detect the crime. By the time the fraud is
discovered, the money is gone and chances are slim to none that it will be recovered.
Additionally, it is costly and time consuming to investigate a fraud.
Perhaps the most important lesson of the fraud triangle is that all three factors must normally be
present for fraud to occur. If any one of the three elements is missing, fraud may not occur.
The key to dealing with fraud is to focus on the prevention of opportunity. It is much less
expensive and more effective to prevent fraud from happening than it is to try to detect the crime.
Solution
The Fraud triangle is a framework designed to explain the reasoning behind a worker’s decision
to commit workplace fraud. The three stages, categorised by the effect on the individual, can be
summarised as pressure, opportunity and rationalisation. Broken down, they are:
Step 1 – the pressure on the individual – is the motivation behind the crime and can be either
personal financial pressure, such as debt problems, or workplace debt problems, such as a
shortfall in revenue. The pressure is seen by the individual as unsolvable by orthodox, legal,
sanctioned routes and unshareable with others who may be able to offer assistance. A common
example of a perceived unshareable financial problem is gambling debt. Maintenance of a
lifestyle is another common example.
Step 2 – the opportunity to commit fraud – is the means by which the individual will defraud the
organisation. In this stage the worker sees a clear course of action by which they can abuse their
position to solve the perceived unshareable financial problem in a way that – again, perceived by
them – is unlikely to be discovered. In many cases the ability to solve the problem in secret is
key to the perception of a viable opportunity.
Step 3 – the ability rationalise the crime – is the final stage in the fraud triangle. This is a
cognitive stage and requires the fraudster to be able to justify the crime in a way that is
acceptable to his or her internal moral compass. Most fraudsters are first-time criminals and do
not see themselves as criminals, but rather a victim of circumstance. Rationalisations are often
based on external factors, such as a need to take care of a family, or a dishonest employer which
is seen to minimise or mitigate the harm done by the crime.
The key to dealing with fraud is to focus on prevention. It is cheaper and more effective to
prevent fraud from happening than it is to try to detect the crime. By the time the fraud is
discovered, the money is gone and chances are slim to none that it will be recovered.
Additionally, it is costly and time consuming to investigate a fraud.
Perhaps the most important lesson of the fraud triangle is that all three factors must normally be
present for fraud to occur. If any one of the three elements is missing, fraud may not occur.
The key to dealing with fraud is to focus on the prevention of opportunity. It is much less
expensive and more effective to prevent fraud from happening than it is to try to detect the crime.

More Related Content

Similar to The Fraud triangle is a framework designed to explain the reasoning .pdf

Understanding Beneficial Ownership - Safeguarding Against Business Frauds.pptx
Understanding Beneficial Ownership - Safeguarding Against Business Frauds.pptxUnderstanding Beneficial Ownership - Safeguarding Against Business Frauds.pptx
Understanding Beneficial Ownership - Safeguarding Against Business Frauds.pptxmohakbariatric
 
Lecture 14 fraud and accountant - james a. hall book chapter 3
Lecture 14  fraud and accountant - james a. hall book chapter 3Lecture 14  fraud and accountant - james a. hall book chapter 3
Lecture 14 fraud and accountant - james a. hall book chapter 3Habib Ullah Qamar
 
5 benefits of a whistleblower hotline
5 benefits of a whistleblower hotline5 benefits of a whistleblower hotline
5 benefits of a whistleblower hotlineSALIH AHMED ISLAM
 
Types of Fraud While there are many types of fraud, the most com.docx
Types of Fraud While there are many types of fraud, the most com.docxTypes of Fraud While there are many types of fraud, the most com.docx
Types of Fraud While there are many types of fraud, the most com.docxmarilucorr
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010annmarieboyd
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010annmarieboyd
 
Developing a Culture of Compliance by Embracing the Impact of Emotional Conta...
Developing a Culture of Compliance by Embracing the Impact of Emotional Conta...Developing a Culture of Compliance by Embracing the Impact of Emotional Conta...
Developing a Culture of Compliance by Embracing the Impact of Emotional Conta...Duff & Phelps
 
Fraud Case Study
Fraud Case StudyFraud Case Study
Fraud Case StudyAngela Hays
 
Ff&f lafayette september 18, 2012 a
Ff&f   lafayette september 18, 2012 aFf&f   lafayette september 18, 2012 a
Ff&f lafayette september 18, 2012 aMiriam Robeson
 
Ff&f lafayette september 18, 2012 a
Ff&f   lafayette september 18, 2012 aFf&f   lafayette september 18, 2012 a
Ff&f lafayette september 18, 2012 aMiriam Robeson
 
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...HospitalityLawyer.com
 
EB4_Tom McLeod
EB4_Tom McLeodEB4_Tom McLeod
EB4_Tom McLeodTom McLeod
 
Reclaiming Your Identity: 10 Steps To Recovery
Reclaiming Your Identity: 10 Steps To RecoveryReclaiming Your Identity: 10 Steps To Recovery
Reclaiming Your Identity: 10 Steps To Recoveryjonmcdowall
 
Fraud Investigation, Prevention and Detection
Fraud Investigation, Prevention and DetectionFraud Investigation, Prevention and Detection
Fraud Investigation, Prevention and DetectionTareq Obaid
 
Tips for Preventing and Detecting Employee Theft in the Workplace
Tips for Preventing and Detecting Employee Theft in the WorkplaceTips for Preventing and Detecting Employee Theft in the Workplace
Tips for Preventing and Detecting Employee Theft in the WorkplaceCase IQ
 

Similar to The Fraud triangle is a framework designed to explain the reasoning .pdf (20)

Red Flags Fraud
Red Flags FraudRed Flags Fraud
Red Flags Fraud
 
Understanding Beneficial Ownership - Safeguarding Against Business Frauds.pptx
Understanding Beneficial Ownership - Safeguarding Against Business Frauds.pptxUnderstanding Beneficial Ownership - Safeguarding Against Business Frauds.pptx
Understanding Beneficial Ownership - Safeguarding Against Business Frauds.pptx
 
Lecture 14 fraud and accountant - james a. hall book chapter 3
Lecture 14  fraud and accountant - james a. hall book chapter 3Lecture 14  fraud and accountant - james a. hall book chapter 3
Lecture 14 fraud and accountant - james a. hall book chapter 3
 
5 benefits of a whistleblower hotline
5 benefits of a whistleblower hotline5 benefits of a whistleblower hotline
5 benefits of a whistleblower hotline
 
Case study on forensic audit
Case study on forensic auditCase study on forensic audit
Case study on forensic audit
 
Types of Fraud While there are many types of fraud, the most com.docx
Types of Fraud While there are many types of fraud, the most com.docxTypes of Fraud While there are many types of fraud, the most com.docx
Types of Fraud While there are many types of fraud, the most com.docx
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010
 
Why do people commit fraud.pdf
Why do people commit fraud.pdfWhy do people commit fraud.pdf
Why do people commit fraud.pdf
 
Fraud, it could happen to you
Fraud, it could happen to youFraud, it could happen to you
Fraud, it could happen to you
 
Developing a Culture of Compliance by Embracing the Impact of Emotional Conta...
Developing a Culture of Compliance by Embracing the Impact of Emotional Conta...Developing a Culture of Compliance by Embracing the Impact of Emotional Conta...
Developing a Culture of Compliance by Embracing the Impact of Emotional Conta...
 
Fraud Case Study
Fraud Case StudyFraud Case Study
Fraud Case Study
 
Ff&f lafayette september 18, 2012 a
Ff&f   lafayette september 18, 2012 aFf&f   lafayette september 18, 2012 a
Ff&f lafayette september 18, 2012 a
 
Ff&f lafayette september 18, 2012 a
Ff&f   lafayette september 18, 2012 aFf&f   lafayette september 18, 2012 a
Ff&f lafayette september 18, 2012 a
 
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
HospitalityLawyer.com | CONVERGE May-June 2013 Issue - Insurance Coverage for...
 
EB4_Tom McLeod
EB4_Tom McLeodEB4_Tom McLeod
EB4_Tom McLeod
 
Reclaiming Your Identity: 10 Steps To Recovery
Reclaiming Your Identity: 10 Steps To RecoveryReclaiming Your Identity: 10 Steps To Recovery
Reclaiming Your Identity: 10 Steps To Recovery
 
Auditing for Internal Fraud
Auditing for Internal FraudAuditing for Internal Fraud
Auditing for Internal Fraud
 
Fraud Investigation, Prevention and Detection
Fraud Investigation, Prevention and DetectionFraud Investigation, Prevention and Detection
Fraud Investigation, Prevention and Detection
 
Tips for Preventing and Detecting Employee Theft in the Workplace
Tips for Preventing and Detecting Employee Theft in the WorkplaceTips for Preventing and Detecting Employee Theft in the Workplace
Tips for Preventing and Detecting Employee Theft in the Workplace
 

More from ankkitextailes

First of all, the image is missing.. Still your very first questio.pdf
First of all, the image is missing.. Still your very first questio.pdfFirst of all, the image is missing.. Still your very first questio.pdf
First of all, the image is missing.. Still your very first questio.pdfankkitextailes
 
cant upload zip filethere is some problemSolutioncant upload.pdf
cant upload zip filethere is some problemSolutioncant upload.pdfcant upload zip filethere is some problemSolutioncant upload.pdf
cant upload zip filethere is some problemSolutioncant upload.pdfankkitextailes
 
B) the CSS is a valid measure of sentiment to commit nonsexual cri.pdf
B) the CSS is a valid measure of sentiment to commit nonsexual cri.pdfB) the CSS is a valid measure of sentiment to commit nonsexual cri.pdf
B) the CSS is a valid measure of sentiment to commit nonsexual cri.pdfankkitextailes
 
Ans ASolutionAns A.pdf
Ans ASolutionAns A.pdfAns ASolutionAns A.pdf
Ans ASolutionAns A.pdfankkitextailes
 
) to demonstrate intellectual superioritySolution) to demonstr.pdf
) to demonstrate intellectual superioritySolution) to demonstr.pdf) to demonstrate intellectual superioritySolution) to demonstr.pdf
) to demonstrate intellectual superioritySolution) to demonstr.pdfankkitextailes
 
a. FunctionFunctions in SQL server are reusable. They can accept i.pdf
a. FunctionFunctions in SQL server are reusable. They can accept i.pdfa. FunctionFunctions in SQL server are reusable. They can accept i.pdf
a. FunctionFunctions in SQL server are reusable. They can accept i.pdfankkitextailes
 
7 steps are required as 9 is the 7th element and the search is linea.pdf
7 steps are required as 9 is the 7th element and the search is linea.pdf7 steps are required as 9 is the 7th element and the search is linea.pdf
7 steps are required as 9 is the 7th element and the search is linea.pdfankkitextailes
 
15x12y 3000Solution15x12y 3000.pdf
15x12y 3000Solution15x12y 3000.pdf15x12y 3000Solution15x12y 3000.pdf
15x12y 3000Solution15x12y 3000.pdfankkitextailes
 
1.) f(x) has  rootSolution1.) f(x) has  root.pdf
1.) f(x) has  rootSolution1.) f(x) has  root.pdf1.) f(x) has  rootSolution1.) f(x) has  root.pdf
1.) f(x) has  rootSolution1.) f(x) has  root.pdfankkitextailes
 
4P + 5O2 = P4O10 molar ratio of P to O = 45 mole.pdf
                     4P + 5O2 = P4O10 molar ratio of P to O = 45 mole.pdf                     4P + 5O2 = P4O10 molar ratio of P to O = 45 mole.pdf
4P + 5O2 = P4O10 molar ratio of P to O = 45 mole.pdfankkitextailes
 
1.   “Internal auditors support managements efforts to establish a.pdf
1.   “Internal auditors support managements efforts to establish a.pdf1.   “Internal auditors support managements efforts to establish a.pdf
1.   “Internal auditors support managements efforts to establish a.pdfankkitextailes
 
(ii)Methane also affects the degradation of the ozone layerSolut.pdf
(ii)Methane also affects the degradation of the ozone layerSolut.pdf(ii)Methane also affects the degradation of the ozone layerSolut.pdf
(ii)Methane also affects the degradation of the ozone layerSolut.pdfankkitextailes
 
z= e^(1-i3) = e.e^(-i3)we know that e^-ix = cos x - i sin xso .pdf
z= e^(1-i3) = e.e^(-i3)we know that e^-ix = cos x - i sin xso .pdfz= e^(1-i3) = e.e^(-i3)we know that e^-ix = cos x - i sin xso .pdf
z= e^(1-i3) = e.e^(-i3)we know that e^-ix = cos x - i sin xso .pdfankkitextailes
 
x = 1; maxn = 50; epsilon = 1; xval = x; n = 0; start pro.pdf
x = 1; maxn = 50; epsilon = 1; xval = x; n = 0; start pro.pdfx = 1; maxn = 50; epsilon = 1; xval = x; n = 0; start pro.pdf
x = 1; maxn = 50; epsilon = 1; xval = x; n = 0; start pro.pdfankkitextailes
 
Wild typeDeletion MutantApart from these bands, probe will sho.pdf
Wild typeDeletion MutantApart from these bands, probe will sho.pdfWild typeDeletion MutantApart from these bands, probe will sho.pdf
Wild typeDeletion MutantApart from these bands, probe will sho.pdfankkitextailes
 
SumNumbers.java import java.util.Scanner;public class SumNumbe.pdf
SumNumbers.java import java.util.Scanner;public class SumNumbe.pdfSumNumbers.java import java.util.Scanner;public class SumNumbe.pdf
SumNumbers.java import java.util.Scanner;public class SumNumbe.pdfankkitextailes
 
The absorptivity, The transmissivity and reflectivity are given by.pdf
The absorptivity, The transmissivity and reflectivity are given by.pdfThe absorptivity, The transmissivity and reflectivity are given by.pdf
The absorptivity, The transmissivity and reflectivity are given by.pdfankkitextailes
 
Curly brackets mean exactly the same as ordinary parentheses in thi.pdf
 Curly brackets mean exactly the same as ordinary parentheses in thi.pdf Curly brackets mean exactly the same as ordinary parentheses in thi.pdf
Curly brackets mean exactly the same as ordinary parentheses in thi.pdfankkitextailes
 
Solution (A)Nowadays Sugar is not listed directly by name suga.pdf
Solution  (A)Nowadays Sugar is not listed directly by name suga.pdfSolution  (A)Nowadays Sugar is not listed directly by name suga.pdf
Solution (A)Nowadays Sugar is not listed directly by name suga.pdfankkitextailes
 
RNA sequencing also known as next generation genome sequencing and t.pdf
RNA sequencing also known as next generation genome sequencing and t.pdfRNA sequencing also known as next generation genome sequencing and t.pdf
RNA sequencing also known as next generation genome sequencing and t.pdfankkitextailes
 

More from ankkitextailes (20)

First of all, the image is missing.. Still your very first questio.pdf
First of all, the image is missing.. Still your very first questio.pdfFirst of all, the image is missing.. Still your very first questio.pdf
First of all, the image is missing.. Still your very first questio.pdf
 
cant upload zip filethere is some problemSolutioncant upload.pdf
cant upload zip filethere is some problemSolutioncant upload.pdfcant upload zip filethere is some problemSolutioncant upload.pdf
cant upload zip filethere is some problemSolutioncant upload.pdf
 
B) the CSS is a valid measure of sentiment to commit nonsexual cri.pdf
B) the CSS is a valid measure of sentiment to commit nonsexual cri.pdfB) the CSS is a valid measure of sentiment to commit nonsexual cri.pdf
B) the CSS is a valid measure of sentiment to commit nonsexual cri.pdf
 
Ans ASolutionAns A.pdf
Ans ASolutionAns A.pdfAns ASolutionAns A.pdf
Ans ASolutionAns A.pdf
 
) to demonstrate intellectual superioritySolution) to demonstr.pdf
) to demonstrate intellectual superioritySolution) to demonstr.pdf) to demonstrate intellectual superioritySolution) to demonstr.pdf
) to demonstrate intellectual superioritySolution) to demonstr.pdf
 
a. FunctionFunctions in SQL server are reusable. They can accept i.pdf
a. FunctionFunctions in SQL server are reusable. They can accept i.pdfa. FunctionFunctions in SQL server are reusable. They can accept i.pdf
a. FunctionFunctions in SQL server are reusable. They can accept i.pdf
 
7 steps are required as 9 is the 7th element and the search is linea.pdf
7 steps are required as 9 is the 7th element and the search is linea.pdf7 steps are required as 9 is the 7th element and the search is linea.pdf
7 steps are required as 9 is the 7th element and the search is linea.pdf
 
15x12y 3000Solution15x12y 3000.pdf
15x12y 3000Solution15x12y 3000.pdf15x12y 3000Solution15x12y 3000.pdf
15x12y 3000Solution15x12y 3000.pdf
 
1.) f(x) has  rootSolution1.) f(x) has  root.pdf
1.) f(x) has  rootSolution1.) f(x) has  root.pdf1.) f(x) has  rootSolution1.) f(x) has  root.pdf
1.) f(x) has  rootSolution1.) f(x) has  root.pdf
 
4P + 5O2 = P4O10 molar ratio of P to O = 45 mole.pdf
                     4P + 5O2 = P4O10 molar ratio of P to O = 45 mole.pdf                     4P + 5O2 = P4O10 molar ratio of P to O = 45 mole.pdf
4P + 5O2 = P4O10 molar ratio of P to O = 45 mole.pdf
 
1.   “Internal auditors support managements efforts to establish a.pdf
1.   “Internal auditors support managements efforts to establish a.pdf1.   “Internal auditors support managements efforts to establish a.pdf
1.   “Internal auditors support managements efforts to establish a.pdf
 
(ii)Methane also affects the degradation of the ozone layerSolut.pdf
(ii)Methane also affects the degradation of the ozone layerSolut.pdf(ii)Methane also affects the degradation of the ozone layerSolut.pdf
(ii)Methane also affects the degradation of the ozone layerSolut.pdf
 
z= e^(1-i3) = e.e^(-i3)we know that e^-ix = cos x - i sin xso .pdf
z= e^(1-i3) = e.e^(-i3)we know that e^-ix = cos x - i sin xso .pdfz= e^(1-i3) = e.e^(-i3)we know that e^-ix = cos x - i sin xso .pdf
z= e^(1-i3) = e.e^(-i3)we know that e^-ix = cos x - i sin xso .pdf
 
x = 1; maxn = 50; epsilon = 1; xval = x; n = 0; start pro.pdf
x = 1; maxn = 50; epsilon = 1; xval = x; n = 0; start pro.pdfx = 1; maxn = 50; epsilon = 1; xval = x; n = 0; start pro.pdf
x = 1; maxn = 50; epsilon = 1; xval = x; n = 0; start pro.pdf
 
Wild typeDeletion MutantApart from these bands, probe will sho.pdf
Wild typeDeletion MutantApart from these bands, probe will sho.pdfWild typeDeletion MutantApart from these bands, probe will sho.pdf
Wild typeDeletion MutantApart from these bands, probe will sho.pdf
 
SumNumbers.java import java.util.Scanner;public class SumNumbe.pdf
SumNumbers.java import java.util.Scanner;public class SumNumbe.pdfSumNumbers.java import java.util.Scanner;public class SumNumbe.pdf
SumNumbers.java import java.util.Scanner;public class SumNumbe.pdf
 
The absorptivity, The transmissivity and reflectivity are given by.pdf
The absorptivity, The transmissivity and reflectivity are given by.pdfThe absorptivity, The transmissivity and reflectivity are given by.pdf
The absorptivity, The transmissivity and reflectivity are given by.pdf
 
Curly brackets mean exactly the same as ordinary parentheses in thi.pdf
 Curly brackets mean exactly the same as ordinary parentheses in thi.pdf Curly brackets mean exactly the same as ordinary parentheses in thi.pdf
Curly brackets mean exactly the same as ordinary parentheses in thi.pdf
 
Solution (A)Nowadays Sugar is not listed directly by name suga.pdf
Solution  (A)Nowadays Sugar is not listed directly by name suga.pdfSolution  (A)Nowadays Sugar is not listed directly by name suga.pdf
Solution (A)Nowadays Sugar is not listed directly by name suga.pdf
 
RNA sequencing also known as next generation genome sequencing and t.pdf
RNA sequencing also known as next generation genome sequencing and t.pdfRNA sequencing also known as next generation genome sequencing and t.pdf
RNA sequencing also known as next generation genome sequencing and t.pdf
 

Recently uploaded

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

The Fraud triangle is a framework designed to explain the reasoning .pdf

  • 1. The Fraud triangle is a framework designed to explain the reasoning behind a worker’s decision to commit workplace fraud. The three stages, categorised by the effect on the individual, can be summarised as pressure, opportunity and rationalisation. Broken down, they are: Step 1 – the pressure on the individual – is the motivation behind the crime and can be either personal financial pressure, such as debt problems, or workplace debt problems, such as a shortfall in revenue. The pressure is seen by the individual as unsolvable by orthodox, legal, sanctioned routes and unshareable with others who may be able to offer assistance. A common example of a perceived unshareable financial problem is gambling debt. Maintenance of a lifestyle is another common example. Step 2 – the opportunity to commit fraud – is the means by which the individual will defraud the organisation. In this stage the worker sees a clear course of action by which they can abuse their position to solve the perceived unshareable financial problem in a way that – again, perceived by them – is unlikely to be discovered. In many cases the ability to solve the problem in secret is key to the perception of a viable opportunity. Step 3 – the ability rationalise the crime – is the final stage in the fraud triangle. This is a cognitive stage and requires the fraudster to be able to justify the crime in a way that is acceptable to his or her internal moral compass. Most fraudsters are first-time criminals and do not see themselves as criminals, but rather a victim of circumstance. Rationalisations are often based on external factors, such as a need to take care of a family, or a dishonest employer which is seen to minimise or mitigate the harm done by the crime. The key to dealing with fraud is to focus on prevention. It is cheaper and more effective to prevent fraud from happening than it is to try to detect the crime. By the time the fraud is discovered, the money is gone and chances are slim to none that it will be recovered. Additionally, it is costly and time consuming to investigate a fraud. Perhaps the most important lesson of the fraud triangle is that all three factors must normally be present for fraud to occur. If any one of the three elements is missing, fraud may not occur. The key to dealing with fraud is to focus on the prevention of opportunity. It is much less expensive and more effective to prevent fraud from happening than it is to try to detect the crime. Solution The Fraud triangle is a framework designed to explain the reasoning behind a worker’s decision to commit workplace fraud. The three stages, categorised by the effect on the individual, can be summarised as pressure, opportunity and rationalisation. Broken down, they are: Step 1 – the pressure on the individual – is the motivation behind the crime and can be either
  • 2. personal financial pressure, such as debt problems, or workplace debt problems, such as a shortfall in revenue. The pressure is seen by the individual as unsolvable by orthodox, legal, sanctioned routes and unshareable with others who may be able to offer assistance. A common example of a perceived unshareable financial problem is gambling debt. Maintenance of a lifestyle is another common example. Step 2 – the opportunity to commit fraud – is the means by which the individual will defraud the organisation. In this stage the worker sees a clear course of action by which they can abuse their position to solve the perceived unshareable financial problem in a way that – again, perceived by them – is unlikely to be discovered. In many cases the ability to solve the problem in secret is key to the perception of a viable opportunity. Step 3 – the ability rationalise the crime – is the final stage in the fraud triangle. This is a cognitive stage and requires the fraudster to be able to justify the crime in a way that is acceptable to his or her internal moral compass. Most fraudsters are first-time criminals and do not see themselves as criminals, but rather a victim of circumstance. Rationalisations are often based on external factors, such as a need to take care of a family, or a dishonest employer which is seen to minimise or mitigate the harm done by the crime. The key to dealing with fraud is to focus on prevention. It is cheaper and more effective to prevent fraud from happening than it is to try to detect the crime. By the time the fraud is discovered, the money is gone and chances are slim to none that it will be recovered. Additionally, it is costly and time consuming to investigate a fraud. Perhaps the most important lesson of the fraud triangle is that all three factors must normally be present for fraud to occur. If any one of the three elements is missing, fraud may not occur. The key to dealing with fraud is to focus on the prevention of opportunity. It is much less expensive and more effective to prevent fraud from happening than it is to try to detect the crime.