Robert James Chapman
The SME Business Guide to Fraud Risk Management
Robert James Chapman
The SME Business Guide to Fraud Risk Management
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book provides a guide for SMEs to understand the current sources of business fraud risk and the specific risk response actions that can be taken to limit exposure, through the structured discipline of enterprise risk management.
Andere Kunden interessierten sich auch für
- Jim SeamanSecurity Risk Management - The Driving Force for Operational Resilience152,99 €
- Paul M. CollierFundamentals of Risk Management for Accountants and Managers110,99 €
- Charles SwansonThe Security Risk Handbook176,99 €
- Robert StanislawskiSupply Chains in Reverse Logistics174,99 €
- David BamfordEssential Guide to Operations Management175,99 €
- David BamfordEssential Guide to Operations Management63,99 €
- Michael J ComerCorporate Fraud253,99 €
-
-
-
This book provides a guide for SMEs to understand the current sources of business fraud risk and the specific risk response actions that can be taken to limit exposure, through the structured discipline of enterprise risk management.
Produktdetails
- Produktdetails
- Verlag: Jenny Stanford Publishing
- Seitenzahl: 330
- Erscheinungstermin: 27. April 2022
- Englisch
- Abmessung: 229mm x 152mm x 21mm
- Gewicht: 653g
- ISBN-13: 9781032055473
- ISBN-10: 1032055472
- Artikelnr.: 62846458
- Verlag: Jenny Stanford Publishing
- Seitenzahl: 330
- Erscheinungstermin: 27. April 2022
- Englisch
- Abmessung: 229mm x 152mm x 21mm
- Gewicht: 653g
- ISBN-13: 9781032055473
- ISBN-10: 1032055472
- Artikelnr.: 62846458
Robert James Chapman is an established author and has provided risk management services for over twenty years across eight countries and within fourteen industries. He was elected and is a Fellow of the UK IRM, APM and ICM for his contribution to the field of risk management. He is the author of Simple Tools and Techniques for Enterprise Risk Management, now in its second edition.
Section 1: Background. 1. Layout of the book. 2. Introduction. 3. Approach
to fraud risk management. 4. Establish the context. Section 2: External
'actors'. 5. Non delivery fraud. 6. Ransomware Attacks. 7. Intellectual
property fraud. 8. Business Email Compromise (BEC) Fraud. 9. Identity theft
fraud. 10. Social engineering fraud. 11. Long and short firm fraud. 12.
Counterfeit goods fraud. Section 3: Internal 'actors'. 13. Asset
misappropriation fraud. 14. Financial Statement Fraud. 15. Bribery. 16.
Procurement fraud. Section 4: Additional information. Appendix 1:
Enterprise and project risk management terms and definitions. Appendix 2:
Cybersecurity terms and definitions. Appendix 3: Organisations involved in
tackling fraud and cyber security and their respective roles. Appendix 4:
Further reading addressing Intellectual Property fraud.
to fraud risk management. 4. Establish the context. Section 2: External
'actors'. 5. Non delivery fraud. 6. Ransomware Attacks. 7. Intellectual
property fraud. 8. Business Email Compromise (BEC) Fraud. 9. Identity theft
fraud. 10. Social engineering fraud. 11. Long and short firm fraud. 12.
Counterfeit goods fraud. Section 3: Internal 'actors'. 13. Asset
misappropriation fraud. 14. Financial Statement Fraud. 15. Bribery. 16.
Procurement fraud. Section 4: Additional information. Appendix 1:
Enterprise and project risk management terms and definitions. Appendix 2:
Cybersecurity terms and definitions. Appendix 3: Organisations involved in
tackling fraud and cyber security and their respective roles. Appendix 4:
Further reading addressing Intellectual Property fraud.
Section 1: Background. 1. Layout of the book. 2. Introduction. 3. Approach to fraud risk management. 4. Establish the context. Section 2: External 'actors'. 5. Non delivery fraud. 6. Ransomware Attacks. 7. Intellectual property fraud. 8. Business Email Compromise (BEC) Fraud. 9. Identity theft fraud. 10. Social engineering fraud. 11. Long and short firm fraud. 12. Counterfeit goods fraud. Section 3: Internal 'actors'. 13. Asset misappropriation fraud. 14. Financial Statement Fraud. 15. Bribery. 16. Procurement fraud. Section 4: Additional information. Appendix 1: Enterprise and project risk management terms and definitions. Appendix 2: Cybersecurity terms and definitions. Appendix 3: Organisations involved in tackling fraud and cyber security and their respective roles. Appendix 4: Further reading addressing Intellectual Property fraud.
Section 1: Background. 1. Layout of the book. 2. Introduction. 3. Approach
to fraud risk management. 4. Establish the context. Section 2: External
'actors'. 5. Non delivery fraud. 6. Ransomware Attacks. 7. Intellectual
property fraud. 8. Business Email Compromise (BEC) Fraud. 9. Identity theft
fraud. 10. Social engineering fraud. 11. Long and short firm fraud. 12.
Counterfeit goods fraud. Section 3: Internal 'actors'. 13. Asset
misappropriation fraud. 14. Financial Statement Fraud. 15. Bribery. 16.
Procurement fraud. Section 4: Additional information. Appendix 1:
Enterprise and project risk management terms and definitions. Appendix 2:
Cybersecurity terms and definitions. Appendix 3: Organisations involved in
tackling fraud and cyber security and their respective roles. Appendix 4:
Further reading addressing Intellectual Property fraud.
to fraud risk management. 4. Establish the context. Section 2: External
'actors'. 5. Non delivery fraud. 6. Ransomware Attacks. 7. Intellectual
property fraud. 8. Business Email Compromise (BEC) Fraud. 9. Identity theft
fraud. 10. Social engineering fraud. 11. Long and short firm fraud. 12.
Counterfeit goods fraud. Section 3: Internal 'actors'. 13. Asset
misappropriation fraud. 14. Financial Statement Fraud. 15. Bribery. 16.
Procurement fraud. Section 4: Additional information. Appendix 1:
Enterprise and project risk management terms and definitions. Appendix 2:
Cybersecurity terms and definitions. Appendix 3: Organisations involved in
tackling fraud and cyber security and their respective roles. Appendix 4:
Further reading addressing Intellectual Property fraud.
Section 1: Background. 1. Layout of the book. 2. Introduction. 3. Approach to fraud risk management. 4. Establish the context. Section 2: External 'actors'. 5. Non delivery fraud. 6. Ransomware Attacks. 7. Intellectual property fraud. 8. Business Email Compromise (BEC) Fraud. 9. Identity theft fraud. 10. Social engineering fraud. 11. Long and short firm fraud. 12. Counterfeit goods fraud. Section 3: Internal 'actors'. 13. Asset misappropriation fraud. 14. Financial Statement Fraud. 15. Bribery. 16. Procurement fraud. Section 4: Additional information. Appendix 1: Enterprise and project risk management terms and definitions. Appendix 2: Cybersecurity terms and definitions. Appendix 3: Organisations involved in tackling fraud and cyber security and their respective roles. Appendix 4: Further reading addressing Intellectual Property fraud.