usant

ONLINE PUBLIC ACCESS CATALOG 

Business theft and fraud : detection and prevention / James R. Youngblood.

By: Material type: TextTextBoca Raton ; London ; New York : CRC Press, Taylor & Francis Group, 2017Description: xvii, 338 pages : illustrations, tables ; 23 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781498742436
Subject(s): DDC classification:
  • 658.473 Y7
Contents:
Internal employee theft and fraud (non-retail organizations) -- What type of business is more susceptible to internal theft/fraud? -- New hire verification -- Establish operating procedures -- Main components of occupational fraud -- Additional internal theft/fraud prevention and awareness guidelines -- Understanding fraud/theft in the franchisee/franchisor industry -- An overview of franchise operations -- Franchise sales underreporting and brand integrity -- Understanding established comparable (ec) sales -- Operations pending bankruptcy and lower ec sales are a catalyst for theft and sales -- Using yield/usage programs to identify potential sales underreporting -- Why the income statement/profit and loss statement is vital in detecting theft/fraud -- Using franchisee tax documents for identifying sales underreporting -- Understanding the franchise agreement -- What can be found in an asset search/background check -- Hiring a third party sales integrity company/mystery shoppers -- Understanding fraud/theft in the retail industry -- Understanding differences between franchise and company owned locations -- Understanding large retail operations fraud/theft prevention structures -- Understanding shrinkage -- Employee theft -- Retail theft : fraud identification and prevention measurers -- Retail shrink prevention measures -- Identifying loss in the retail/restaurant industry -- Convenience store theft and fraud -- Creating and delivering effective loss prevention training -- Creating the ideal loss prevention team -- Brandjacking -- Cyber security and cyber fraud -- Understanding cyber security and cyber fraud -- Technology based frauds -- Understanding and preventing data breaches -- Ransomware -- Appendix I Organized retail crime associations -- Appendix II Examples of phishing emails and smishing text messages.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Book Book College Library College Library Circulation CIR 658.473 Y1 2017 (Browse shelf(Opens below)) 1-1 Available 62133

Includes bibliographical references and index.

Internal employee theft and fraud (non-retail organizations) -- What type of business is more susceptible to internal theft/fraud? -- New hire verification -- Establish operating procedures -- Main components of occupational fraud -- Additional internal theft/fraud prevention and awareness guidelines -- Understanding fraud/theft in the franchisee/franchisor industry -- An overview of franchise operations -- Franchise sales underreporting and brand integrity -- Understanding established comparable (ec) sales -- Operations pending bankruptcy and lower ec sales are a catalyst for theft and sales -- Using yield/usage programs to identify potential sales underreporting -- Why the income statement/profit and loss statement is vital in detecting theft/fraud -- Using franchisee tax documents for identifying sales underreporting -- Understanding the franchise agreement -- What can be found in an asset search/background check -- Hiring a third party sales integrity company/mystery shoppers -- Understanding fraud/theft in the retail industry -- Understanding differences between franchise and company owned locations -- Understanding large retail operations fraud/theft prevention structures -- Understanding shrinkage -- Employee theft -- Retail theft : fraud identification and prevention measurers -- Retail shrink prevention measures -- Identifying loss in the retail/restaurant industry -- Convenience store theft and fraud -- Creating and delivering effective loss prevention training -- Creating the ideal loss prevention team -- Brandjacking -- Cyber security and cyber fraud -- Understanding cyber security and cyber fraud -- Technology based frauds -- Understanding and preventing data breaches -- Ransomware -- Appendix I Organized retail crime associations -- Appendix II Examples of phishing emails and smishing text messages.

There are no comments on this title.

to post a comment.
  • Copyright © 2024 University of Saint Anthony | All rights reserved
  • Dr. Ortega St., San Miguel, Iriga City, 4431, Philippines
  • Tel. No. +63-54-205-1234
  • info@usant.edu.ph