TY - BOOK AU - Youngblood,James TI - Business theft and fraud: detection and prevention SN - 9781498742436 U1 - 658.473 PY - 2017/// CY - Boca Raton, London, New York PB - CRC Press, Taylor & Francis Group KW - Employee theft KW - Employee crimes KW - Prevention KW - Fraud KW - Identity theft KW - Computer crimes N1 - Includes bibliographical references and index; Internal employee theft and fraud (non-retail organizations) -- What type of business is more susceptible to internal theft/fraud? -- New hire verification -- Establish operating procedures -- Main components of occupational fraud -- Additional internal theft/fraud prevention and awareness guidelines -- Understanding fraud/theft in the franchisee/franchisor industry -- An overview of franchise operations -- Franchise sales underreporting and brand integrity -- Understanding established comparable (ec) sales -- Operations pending bankruptcy and lower ec sales are a catalyst for theft and sales -- Using yield/usage programs to identify potential sales underreporting -- Why the income statement/profit and loss statement is vital in detecting theft/fraud -- Using franchisee tax documents for identifying sales underreporting -- Understanding the franchise agreement -- What can be found in an asset search/background check -- Hiring a third party sales integrity company/mystery shoppers -- Understanding fraud/theft in the retail industry -- Understanding differences between franchise and company owned locations -- Understanding large retail operations fraud/theft prevention structures -- Understanding shrinkage -- Employee theft -- Retail theft : fraud identification and prevention measurers -- Retail shrink prevention measures -- Identifying loss in the retail/restaurant industry -- Convenience store theft and fraud -- Creating and delivering effective loss prevention training -- Creating the ideal loss prevention team -- Brandjacking -- Cyber security and cyber fraud -- Understanding cyber security and cyber fraud -- Technology based frauds -- Understanding and preventing data breaches -- Ransomware -- Appendix I Organized retail crime associations -- Appendix II Examples of phishing emails and smishing text messages ER -