Essay on Strategies For Employee Theft Prevention And Detection 1
Submitted By cxw068
Words: 2298
Pages: 10
STRATEGIES FOR EMPLOYEE THEFT PREVENTION AND DETECTION
To reduce employee theft, it is essential that appropriate preventive and detective techniques are in place. According to Managing Business Risk: A Practical Guide, a report sponsored by The Institute of Internal Auditors, The American Insitute of Certified Public Accountants, and Association of Certified Fraud Examiners, prevention emphasizes policies, procedures, training, culture setting, and communication to prevent theft from occurring, while detection involves activies taken to identify theft that is occurring or has occurred (IIA, AICPA, & ACFA, 2008, p.30).
Organizations that want to prevent employee fraud must plan carefully and continually monitor the effectiveness of their anti-fraud controls. To fully achieve a corporate culture that emphasizes and reinforces employee honesty, companies should develop theft prevention strategies that could be “effectively implemented while minimizing the impact of [potential] problems” (Steven 2006)
.
Employee Theft Prevention
Employee theft prevention is a proactive approach to deter theft perpetrators. The program includes selective hiring policy, implementation of positive workplace culture, and segregation of duties.
Selective Hiring Policy
The primary preventive technique is to implement a detailed and effective hiring policy. Brian P. Nichoff, professor of Entrepreneurial Studies at the Kansas State University College of Business Administration, and Dr. Robert J. Paul from Kansas State University College of Business Administration, suggest (as cited in Appelbaum, Cottin, Paré & Shapiro, 2006) that background checks should be conducted in the pre-employment stage as thoroughly as laws will allow. BDO Stoy Hayward is an audit, accounting and business service firm in United Kingdom. In its annual study called FraudTrack 3: Rising fraud in the spotlight, it states that it is critical for organizations to take enough time to have reference checks, and honesty questionnaire (like screening tests) in the pre-employment stage in order to make an informed selection (BDO Stoy Hayward, 2006).
Reference Checks
Reference checks can be very helpful to weed out the potential thief. According to The Small Business Fraud Prevention Manual published by Association of Certified Fraud Examiners, many employers don’t bother taking a few minutes to check employees’ references and risk their company by hiring potential theft (ACFE, 2004). Employers should verify the candidate’s employment history with their previous employers. Problems like alcoholism and drug addiction which have the potential to create the urge to steal can be easily identified (ACFE, 2004).
According a survey of global fraud cases in the ACFE 2010 Report to the Nations, 8% of fraud perpetrators had been previously punished and 10% had been previously terminated for fraudulent conduct. However, Appelbaum and Cottin (2006) note that criminal records rarely contain charges of employee theft, as victim companies often do not fully prosecute the perpetrators. Therefore, reference checking is not adequate to screen out potential perpetrators.
Employee Tests
Employers should use various tests and interview techniques to screen out dishonest employees before they are hired (Appelbaum 2006). Another technique is to use integrity tests, which “identify what employees consider ordinary, normal, acceptable behavior” (Engelman & Kleiner 1998).
Implementation of Positive Workplace Culture
Nichoff and Paul’s study shows (as cited in Appelbaum et al., 2006) that a corporate culture which reinforces workplace honesty, and promotes punishment procedures for dishonesty should be implemented by the management group. Both creating positive organizational climate and formulating a code of conduct have played a key role in preventing employee theft.
Creating Positive Organizational Climate
According to “Organizational Culture and Employee Counter-productivity”, Michael W. Boye
Related Documents: Essay on Strategies For Employee Theft Prevention And Detection 1
True/False 1. International, federal, and state laws and industry regulations mandate that organizations invest in cybersecurity defenses, audits, and internal controls to secure confidential data and defend against fraud and unauthorized transactions, such as money laundering. 2. People wanting to use their mobile devices at work has led to the practice of “bring your own device (BYOD)” 3. People wanting to use their mobile devices at work is part of a growing trend called Dual-Use Mobile…
interruptions or overtime sessions as possible v) all assets will be safeguarded against loss vi) all records will be up-to-date and accurate. b) Prevention And Detection Of Irregularities One management objective, assisted by an internal control system, is the prevention and detection of irregularities. Management normally seeks reasonable, rather than absolute, assurance that the objectives of the system will be achieved. Two factors they consider are: • the…
Lab 1 Assessment Worksheet Develop an Attack & Penetration Plan 1. List the 5 steps of the hacking process. Reconnaissance Scanning Gaining Access Maintaining Access Covering Tracks 2. In order to exploit or attack the targeted systems, the first initial step I would do to collect as much information as possible about the targets prior to devising an attack and penetration test plan would be reconnaissance. I would use passive reconnaissance as this pertains to information gathering.…
Protection and Prevention - Pre-incident Preparations University Wide Preparations There are many things that can be done to prepare the institution for a major incident or event. What follows are some of the measures that can be taken to minimize the impact of such…
institution. Identify the areas that might differ from those of a for-profit institution. This is incident response plan for Minnesota State Colleges and Universities Top of Form Bottom of Form Guideline 5.23.1.4 Information Security Incident Response Part 1. Purpose: This guideline establishes the minimum requirements for Information Security Incident Response within Minnesota State Colleges and Universities (System). Information Security Incident Response controls and minimizes the impact of an information…
Part One: Crime The nature of crime The meaning of crime Crime is an act or omission committed against the community at large that is punishable by the state. Crimes are made as a result of moral and ethical judgments by a society. They also vary from state to state e.g. in Australia it is legal for sex outside of marriage and the consumption of alcohol whilst in other countries it’s not. A crime is any conduct which violates the rights of the community at large. The crime will be punishable…
that examines each packet of data it receives and then decides which way to send it onward toward its destination. 20 million routers installed in 2002, 80 million in 2010. Topology: BUS- 1 line, so if any part is down, whole network is down. STAR- main hub, if 1 line goes down network can still operate RING- travels around until a device picks it up. Prevents collisions. Only one device communicates at a time. WIRELESS • Network topology - refers to the geometric…
1. political economy a structural analysis of how politics, law, and economics influence one another 2. surplus population those who are unemployed or unemployable and are thus considered the "dangerous class"; economically marginal persons; those with little attachment to the conventional labor market and little "stake in conformity"; "marginal classes" 3. slave codes From 1619 to 1865, constituted the criminal law and procedure applied against enslaved Africans. The codes regulated slave life from…
[pic] | Our firm - Chiu & Weisserman LLP has been appointed as the new auditor of the public company Dollarama Inc. for the current fiscal year-end as at January 29, 2012. Please find in the following pages a report on the audit plan that was used to conduct our audit for the year ended January 29, 2012. Even though the audit of 2012 was performed by PWC, the assumption used for this project was that our firm was the new auditor for 2012. Please do not hesitate to contact us if you have any…