Search results

1 – 10 of over 2000
Article
Publication date: 1 July 2014

Jeffrey Simser

– The purpose of this paper is to explore the role of the culpable insider and the predatory criminal in fraud and deception.

Abstract

Purpose

The purpose of this paper is to explore the role of the culpable insider and the predatory criminal in fraud and deception.

Design/methodology/approach

Two groupings of fraud are considered in this paper. Insider fraud consists of a person within an organization misusing their position for corrupt self-dealing, asset misappropriation and financial statement fraud. Case studies are discussed, offering differing perspectives on the role of insiders. Fraudsters use technology, like malware, to take on the mantle of an insider to facilitate their larceny. This paper also looks at the role of the insider with predatory frauds.

Findings

Most enterprises, be they public entities or private firms, are at risk of internal fraud. Internal financial controls are the first line of defence. In tougher economic times, when enterprises run on the tightest of margins, control mechanisms are at risk of being weakened at the altar of efficiency. Firms can also adopt cultures that deter frauds, either through policies on whistle-blowers or through simple employee screening procedures. For predatory frauds, the basic warning flag can be summed up with the cliché: if something seems too good to be true, it probably is.

Originality/value

This paper synthesizes research on fraud and the role that an insider can play as well as the role of a predatory fraudster.

Details

Journal of Financial Crime, vol. 21 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 3 August 2021

Neha Chhabra Roy and Sankarshan Basu

Banks are exposed to many challenges to name a few i.e. growing market competition, political environment, market forces of demand and supply, technological changes, frauds and…

Abstract

Purpose

Banks are exposed to many challenges to name a few i.e. growing market competition, political environment, market forces of demand and supply, technological changes, frauds and poor management. The banking sector devasted experiences of fraud have impacted all facets of the Banking, Financial Services and Insurance. In continuation, this study aims to revolve around themes of different types of frauds, especially insider frauds that have gained mainstream attention in recent major value fraud events with prominent Indian banks. This study will identify the types and drivers of insider frauds.

Design/methodology/approach

The methodology opted for the study is through confidential primary survey and focused group discussion with risk officers of banks who are associated with Indian banks for more than three years, further to understand the relation between type of Insider frauds and originating drivers were paired based on the principal component analysis.

Findings

Finally, the paper concludes with the conceptual mitigation framework for different types of insider fraud and driver pairs within the scope of this paper. This paper thought will support policymakers of the Indian banking system to create a more robust environment within the banking system via timely detection of frauds so that up to an extent it can be squared before it appears.

Originality/value

The study is innovative in the area of banks’ internal fraud management, where original data collected through a primary survey contributes to the conclusion of fraud management for various Indian banks.

Details

Journal of Facilities Management , vol. 19 no. 4
Type: Research Article
ISSN: 1472-5967

Keywords

Article
Publication date: 8 February 2022

Neha Chhabra Roy and Sreeleakha Prabhakaran

This paper aims to focus on the different types of insider-led cyber frauds that gained mainstream attention in recent large-scale fraud events involving prominent Indian banking…

Abstract

Purpose

This paper aims to focus on the different types of insider-led cyber frauds that gained mainstream attention in recent large-scale fraud events involving prominent Indian banking institutions. In addition to identifying and classifying cyber fraud, the study maps them on a severity scale for optimal mitigation planning.

Design/methodology/approach

The methodology used for identification and classification is an analysis of a detailed literature review, a focus group discussion with risk and vigilance officers and cyber cell experts, as well as secondary data of cyber fraud losses. Through machine learning-based random forest, the authors predicted the future of insider-led cyber frauds in the Indian banking business and prioritized and predicted the same. The projected future reveals the dominance of a few specific cyber frauds, which will make it easier to develop a fraud mitigation model based on a victim-centric approach.

Findings

The paper concludes with a conceptual framework that can be used to ensure a sustainable cyber fraud mitigation ecosystem within the scope of the study. By using the findings of this research, policymakers and fraud investigators will be able to create a more robust environment for banks through timely detection of cyber fraud and prevent it appropriately before it happens.

Research limitations/implications

The study focuses on fraud, risk and mitigation from a victim-centric perspective and does not address it from the fraudster’s perspective. Data availability was a challenge. Banks are recommended to compile data that can be used for analysis both by themselves and other policymakers.

Practical implications

The structured, sustainable cyber fraud mitigation suggested in the study will provide an agile, quick, proactive, stakeholder-specific plan that helps to safeguard banks, employees, regulatory authorities, customers and the economy. It saves resources, cost and time for bank authorities and policymakers. The mitigation measures will also help improve the reputational status of the Indian banking business and prolong the banks’ sustenance.

Originality/value

The innovative cyber fraud mitigation approach contributes to the sustainability of a bank’s ecosystem quickly, proactively and effectively.

Article
Publication date: 8 May 2018

Jay P. Kennedy

This paper aims to increase the understanding of the types of insider financial frauds that occur within small businesses by focusing on a sample of businesses that have not…

1315

Abstract

Purpose

This paper aims to increase the understanding of the types of insider financial frauds that occur within small businesses by focusing on a sample of businesses that have not employed a certified fraud examiner (CFE) in response to employee theft.

Design/methodology/approach

The survey data analyzed come from 102 small businesses (100 employees or fewer) in a midsized Midwestern city in the USA, and reflect 125 reported employee thefts.

Findings

The study results indicate that small businesses that do not hire a CFE report certain thefts with greater and lower frequencies as compared to small businesses that do hire a CFE. For particular types of frauds, CFEs may be no more useful than the efforts of business owners or managers, and other employees.

Practical implications

There may be important organizational differences between businesses that hire CFEs and those that do not, differences related to the ways in which business finances are maintained, the ways in which specific controls are used and the ability of employees to access business resources. These factors may create business-based opportunity structures that make particular types of insider financial frauds more or less likely to occur within a particular business.

Originality/value

Existing research on insider financial frauds may not appropriately account for small businesses that cannot afford, or are unwilling, to hire a CFE. The findings discussed in this paper contribute to a more complete picture of the types of frauds that small businesses experience, as well as how these businesses deal with insider theft.

Details

Journal of Financial Crime, vol. 25 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 4 May 2012

Siti Faridah Abdul Jabbar

The purpose of this paper is to examine whether insider dealing is fraud from the perspective of Islam.

2273

Abstract

Purpose

The purpose of this paper is to examine whether insider dealing is fraud from the perspective of Islam.

Design/methodology/approach

The paper uses analogy (qiyas) of the injunctions in the Qur'an and Sunnah and critical analysis of literature on Islam.

Findings

The paper finds that insider dealing is fraud (taghrir) in Islam and the defrauded party has the option to rescind the transaction for fraud (khiyar al‐tadlis) as well as for latent defect (khiyar al‐‘aib).

Practical implications

The paper is practical as a source of reference in legislating laws relating to insider dealing particularly where Shari'ah is the principal source of law.

Originality/value

The paper presents a novel attempt in establishing that insider dealing is fraud from the perspective of Islam.

Details

Journal of Financial Crime, vol. 19 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 12 August 2022

Neha Chhabra Roy and Sreeleakha Prabhakaran

The study aims to overview the different types of internal-led cyber fraud that have gained mainstream attention in recent major-value fraud events involving prominent Indian…

1020

Abstract

Purpose

The study aims to overview the different types of internal-led cyber fraud that have gained mainstream attention in recent major-value fraud events involving prominent Indian banks. The authors attempted to identify and classify cyber frauds and its drivers and correlate them for optimal mitigation planning.

Design/methodology/approach

The methodology opted for the identification and classification is through a detailed literature review and focus group discussion with risk and vigilance officers and cyber cell experts. The authors assessed the future of cyber fraud in the Indian banking business through the machine learning–based k-nearest neighbor (K-NN) approach and prioritized and predicted the future of cyber fraud. The predicted future revealing dominance of a few specific cyber frauds will help to get an appropriate fraud prevention model, using an associated parties centric (victim and offender) root-cause approach. The study uses correlation analysis and maps frauds with their respective drivers to determine the resource specific effective mitigation plan.

Findings

Finally, the paper concludes with a conceptual framework for preventing internal-led cyber fraud within the scope of the study. A cyber fraud mitigation ecosystem will be helpful for policymakers and fraud investigation officers to create a more robust environment for banks through timely and quick detection of cyber frauds and prevention of them.

Research limitations/implications

Additionally, the study supports the Reserve Bank of India and the Government of India's launched cyber security initiates and schemes which ensure protection for the banking ecosystem i.e. RBI direct scheme, integrated ombudsman scheme, cyber swachhta kendra (botnet cleaning and malware analysis centre), National Cyber Coordination Centre (NCCC) and Security Monitoring Centre (SMC).

Practical implications

Structured and effective internal-led plans for cyber fraud mitigation proposed in this study will conserve banks, employees, regulatory authorities, customers and economic resources, save bank authorities’ and policymakers’ time and money, and conserve resources. Additionally, this will enhance the reputation of the Indian banking industry and extend its lifespan.

Originality/value

The innovative insider-led cyber fraud mitigation approach quickly identifies cyber fraud, prioritizes it, identifies its prominent root causes, map frauds with respective root causes and then suggests strategies to ensure a cost-effective and time-saving bank ecosystem.

Details

Aslib Journal of Information Management, vol. 75 no. 2
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 4 October 2021

Oludayo Tade

This paper aims to examine the nature of frauds and insider involvement in the perpetration of frauds in Nigeria’s banking ecosystem. It probes the payment platforms mostly…

Abstract

Purpose

This paper aims to examine the nature of frauds and insider involvement in the perpetration of frauds in Nigeria’s banking ecosystem. It probes the payment platforms mostly vulnerable to fraud attacks since the role-out of cashless policy in Nigeria in 2014.

Design/methodology/approach

Using secondary data on frauds and forgeries in Nigeria Deposit Insurance Corporation annual report of 2019, the study engaged the data on frauds and forgeries to unpack the complex dynamics in relation to bank frauds in Nigeria.

Findings

Findings show that fraud attacks on deposit money banks increased year in year out although the actual monetary loss dropped in 2019 as against 2018. Technology mediated transactions such as the use of automated teller machine and internet-based transactions experienced the most fraud. In relation to the role of insiders, all cadres of staff were involved in the fraud but majority of those involved were temporary staff.

Practical implications

Arising from this, it is suggested that banks should continue to strengthen security system and governance structures. Employing temporary staff should be phased out while online and offline vigilance should be mounted.

Originality/value

The study contributes to knowledge by examining the nature of frauds and unveiling the insider dimensions of fraud and the possible factors increasing the vulnerability of casual staff to perpetrate fraud.

Details

Journal of Financial Crime, vol. 29 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 17 August 2021

Abir Al-Harrasi, Abdul Khalique Shaikh and Ali Al-Badi

One of the most important Information Security (IS) concerns nowadays is data theft or data leakage. To mitigate this type of risk, organisations use a solid infrastructure and…

1112

Abstract

Purpose

One of the most important Information Security (IS) concerns nowadays is data theft or data leakage. To mitigate this type of risk, organisations use a solid infrastructure and deploy multiple layers of security protection technology and protocols such as firewalls, VPNs and IPsec VPN. However, these technologies do not guarantee data protection, and especially from insiders. Insider threat is a critical risk that can cause harm to the organisation through data theft. The main purpose of this study was to investigate and identify the threats related to data theft caused by insiders in organisations and explore the efforts made by them to control data leakage.

Design/methodology/approach

The study proposed a conceptual model to protect organisations’ data by preventing data theft by malicious insiders. The researchers conducted a comprehensive literature review to achieve the objectives of this study. The collection of the data for this study is based on earlier studies conducted by several researchers from January 2011 to December 2020. All the selected literature is from journal articles, conference articles and conference proceedings using various databases.

Findings

The study revealed three main findings: first, the main risks inherent in data theft are financial fraud, intellectual property theft, and sabotage of IT infrastructure. Second, there are still some organisations that are not considering data theft by insiders as being a severe risk that should be well controlled. Lastly, the main factors motivating the insiders to perform data leakage activities are financial gain, lack of fairness and justice in the workplace, the psychology or characteristics of the insiders, new technologies, lack of education and awareness and lack of management tools for understanding insider threats.

Originality/value

The study provides a holistic view of data theft by insiders, focusing on the problem from an organisational point of view. Organisations can therefore take into consideration our recommendations to reduce the risks of data leakage by their employees.

Details

International Journal of Organizational Analysis, vol. 31 no. 3
Type: Research Article
ISSN: 1934-8835

Keywords

Article
Publication date: 8 May 2009

Hongming Cheng and Ling Ma

The purpose of this paper is to assess the government efforts in criminalising and combating bank fraud and corruption in China and their policy implications.

3492

Abstract

Purpose

The purpose of this paper is to assess the government efforts in criminalising and combating bank fraud and corruption in China and their policy implications.

Design/methodology/approach

An integrated method is used to gather the data for this study, including government documents, statutes, congressional reports, legal cases, news reports, online survey and interviews with key policy‐makers, investigators and prosecutors.

Findings

This research finds that a major problem of bank fraud and corruption in China is the gigantic web of government officials, bank insiders and criminal businesses in committing fraud. The harshness of the Chinese law has not automatically resulted in making the struggle against bank fraud more effective. Law, enforcement and punishment are not certain, predictable, and applied consistently in order to deter fraud. Political, ideological and legal differences have hindered China's pursuit of escaped criminals in foreign countries.

Practical implications

This paper indicates that a three‐pronged approach – deterrence, prevention and education – is needed to address bank fraud and corruption. The industry's preventive efforts are of far greater importance than any extreme penalty. There is a need for a reconstruction of business ethics to ensure willing compliance with the law by individuals and organizations.

Originality/value

The paper is of value to law enforcement policy‐makers, banking regulators, financial institutions and academic researchers with interests in bank fraud and corruption issues.

Details

Journal of Financial Crime, vol. 16 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 26 May 2022

Rasha Kassem

This paper aims to highlight the role and impact of corporate governance in combating fraud by drawing on insights from the literature, identify gaps in the literature and suggest…

1716

Abstract

Purpose

This paper aims to highlight the role and impact of corporate governance in combating fraud by drawing on insights from the literature, identify gaps in the literature and suggest new directions for future research.

Design/methodology/approach

The paper is based on a comprehensive general literature review using multiple search engines and databases.

Findings

This paper finds that effective corporate governance can help reduce fraud risk, prevent fraud and detect fraud, particularly corporate fraud, insider fraud and asset diversion. Some companies use corporate governance mechanisms to bolster their reputation following fraud detection. Ineffective corporate governance increases fraud risk, provides the opportunity for perpetrating fraud and reduces the likelihood of fraud detection. The paper sheds light on several governance mechanisms that could help in mitigating fraud risk, as reported in the literature. The paper categorises these governance mechanisms into four broad governance aspects, including board leadership and the role of ethics; (b) board characteristics, composition and structure; ownership structure; accountability. The paper proposes a guide summarising these broad fundamental governance aspects, including specific anti-fraud controls and examples of how organisations could enhance ethical cultures and the tone at the top.

Originality/value

To the best of the author’s knowledge, this is the first paper to elucidate the role of corporate governance in countering fraud and develop guidance in this area. The proposed guidance could be helpful to businesses leaders, policymakers, researchers and academics alike.

Details

Corporate Governance: The International Journal of Business in Society, vol. 22 no. 7
Type: Research Article
ISSN: 1472-0701

Keywords

1 – 10 of over 2000