Business Theft and Fraud

- Publisher:
- Taylor & Francis Ltd.
- Publication date:
- 2017-01-01
- Authors:
- James Youngblood
- ISBN:
- 978-1-4987-4243-6
Index
- Dedication
- Foreword
- Author
- Internal employee theft and fraud (nonretail organizations)
- 1. What Type of Business Is More Susceptible to Internal Theft/Fraud?
- 2. New-Hire Verification
- 3. Establish Operating Procedures
- 4. Main Components of Occupational Fraud
- 5. Additional Internal Theft/Fraud Prevention and Awareness Guidelines
- Understanding fraud/theft in the franchisee/franchisor industry
- 6. An Overview of Franchise Operations
- 7. Franchise Sales Underreporting and Brand Integrity
- 8. Understanding Established Comparable (EC) Sales
- 9. Operations Pending Bankruptcy and Lower EC Sales Are a Catalyst for Theft and Sales Underreporting
- 10. Using Yield/Usage Programs to Identify Potential Sales Underreporting
- 11. Why the Income Statement/Profit and Loss Statement Is Vital in Detecting Theft/Fraud
- 12. Using Franchisee Tax Documents for Identifying Sales Underreporting
- 13. Understanding the Franchise Agreement
- 14. What Can Be Found in an Asset Search/Background Check
- 15. Hiring a Third-Party Sales Integrity Company/Mystery Shoppers
- 16. Understanding Differences between Franchise and Company-Owned Operations
- 17. Understanding Large Retail Operations Fraud/Theft Prevention Structures
- 18. Understanding Shrinkage
- 19. Employee Theft
- 20. Retail Theft/Fraud Identification and Prevention Measurers
- 21. Retail Shrinkage Prevention Measures
- 22. Identifying Loss in the Retail Restaurant Industry
- 23. Convenience Store Theft and Fraud
- 24. Creating and Delivering Effective Loss Prevention Training
- 25. Creating the Ideal Loss Prevention Team
- 26. Brandjacking
- 27. Organized Retail Crime/Theft
- 28. Cargo Theft
- 29. Financial Institution Fraud
- 30. Medical Identity Theft
- 31. Vendor Fraud
- 32. Understanding Cyber Security and Cyber Fraud
- 33. Keeping Malware/Spyware Off Office Computers
- 34. Technology-Based Fraud
- 35. Understanding and Preventing Data Breaches
- 36. Ransomware
- Appendix A. Organized Retail Crime Associations
- Appendix B. Examples of Phishing E-Mails