SlideShare ist ein Scribd-Unternehmen logo
1 von 40
Downloaden Sie, um offline zu lesen
Profiling the Fraudster
                                                                                                     …..its all about
                                                                                                     people

                                                                                          Open Thinking Day
Simon Padgett
Director
Forensic Services

simon.padgett@protivitiglobal.ae

Dubai. September, 2012
© 2012 Protiviti Member Firm (Middle East) Consultancy
CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
E&Y Fraud Survey – Key Findings




 In the last year :

  2 in 3 had been defrauded

  1 in 10 had more than 50 frauds

  82% were committed by employees

  Half of the employees had over 5 years service

  A quarter had more than 10 years service

  A third of the frauds were by management



   © 2012 Protiviti Member Firm (Middle East) Consultancy
   CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
The two faces of fraud:



     The first face is one of systems or controls



     The other face is the human element




2   © 2012 Protiviti Member Firm (Middle East) Consultancy
    CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
COSO
              COSO identifies 5 components, which when integrated
              and operating in all business units, will help establish an
              effective internal control framework:

              1. Control Environment

              2. Risk Assessment

              3.         Control activities

              4.         Information and Communication

              5.         Monitoring




3   © 2012 Protiviti Member Firm (Middle East) Consultancy
    CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Fraud Risk Assessment


     Organizations first identify risks and prioritize them by
     assessing the impact and likelihood of an inherent risk.

     A key differentiator between Internal Controls and Anti Fraud
     Controls is the Human Element inherent in the decision to
     defraud. Failure to assess the Human Element can cause frauds
     to happen in organizations that otherwise seem to have a robust
     and comprehensive internal control framework.

     So, why do people commit fraud?




4    © 2012 Protiviti Member Firm (Middle East) Consultancy
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
One of the best theories on why people commit fraud was given by
    Donald Cressey in his book “Other People’s Money”

    Cressey stated that Fraud occurs when an individual :

    •Has a non sharable financial problem.

    •Perceives an opportunity to resolve the situation.

    •Has the ability to rationalize his misdeeds even before committing
     them.




5   © 2012 Protiviti Member Firm (Middle East) Consultancy
    CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Pressure

         In other words for an individual to commit fraud, he may be
         under pressure from a financial problem which the
         individual perceives cannot be solved through other
         means. These problems often manifest themselves into
         behavioral patterns or red flags, which if spotted in time,
         could prevent a fraud from happening.

         The ACFE 2010 Report to the Nations, states that the most
         commonly cited behavioral red flags were perpetrators
         living beyond their apparent means or experiencing
         financial difficulties at the time of the fraud.




6   © 2012 Protiviti Member Firm (Middle East) Consultancy
    CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Opportunity


       Even if an individual has the motive, he cannot perpetrate the
       fraud unless presented with an opportunity. Opportunities
       could arise due to a number of factors within the organization
       such as high turnover of management in key roles, lack of
       segregation of duties or a complex organization structure.




    © 2012 Protiviti Member Firm (Middle East) Consultancy
7   CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Rationalisation

           Rationalisation of the act is the last element in
          understanding why people commit fraud. Most people
          believe themselves as good and need to convince
          themselves that their actions were justified.
     Some of these justifications are:
     • I was going to pay it back
     • Everybody does it
     • I am not hurting anyone
     • I was helping my family
     • This is nothing compared to what xyz did.
8   © 2012 Protiviti Member Firm (Middle East) Consultancy
    CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
The Fraud Triangle
     To sum up, when this individual under pressure is presented
     with an opportunity and is able to rationalize his planned
     actions, fraud occurs. This hypothesis is better known as the
     Fraud Triangle.




                                                                               FRAUD




9   © 2012 Protiviti Member Firm (Middle East) Consultancy
    CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Fraud Risk Assessment
     To be able to effectively analyse and prioritize fraud risks, organizations
     should evaluate the Human Element in the fraud risk. This can be achieved
     by applying the principles of the Fraud Triangle to the traditional risk
     assessment criteria of Impact and Likelihood.


                                                                                                  LIKELIHOOD                           INHERENT RISK
                                                                       IMPACT
                 Traditional Risk Assessment Criteria                                                                                     RATING




                                                               IMPACT              OPPORTUNITY          SITUATIONAL          ATTITUDE OR               FRAUD RISK
               Fraud Risk Assessment Criteria                                                             PRESSURE            PERSONAL                  PRIORITY
                                                                                                                              INTEGRITY




                                                                                                  The Human Elements




10     © 2012 Protiviti Member Firm (Middle East) Consultancy
       CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Key Controls and Personal Integrity
      For example in an organization where an individual
      performs a number of key controls – if this
      individual’s personal integrity and values are high,
      the chances of fraud happening is significantly
      lower than when the individual’s personal integrity
      is low. Understanding the people who manage key
      internal controls in an organization, their values
      and attitude could go a long way in minimizing the
      incidence of fraud and help build effective anti-
      fraud deterrents within an organization.



11   © 2012 Protiviti Member Firm (Middle East) Consultancy
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Anti-Fraud Program
     It is important for organizations to consider the human element while managing
     fraud risks. An Anti-Fraud Program that considers the human element may
     include the following fundamental controls:

       •Establish a Code of Ethics.
       •Develop Fraud Policies.
       •Invest in a communication and training program on fraud and
        corporate fraud policies for all employees.
       •Ensure proper segregation of duties for key activities and functions.
       •Set up appropriate recruitment procedures to select the right
       candidates.
       •Set up policies for rotation of staff duties and forced vacations.
       •Know your key fraud risks and controls. Monitor them regularly.
       •Set up a whistle blower hotline.
       •Sound recruitment policies and psychometric testing.
       •Develop a Fraud Risk Assessment process.


12     © 2012 Protiviti Member Firm (Middle East) Consultancy
       CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
13   © 2012 Protiviti Member Firm (Middle East) Consultancy
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
1. Edwin H. Sutherland
       First defined “white-collar crime” in 1939
              – Criminal acts of corporations
              – Individuals in corporate capacity


       Theory of differential association
              – Crime is not genetic
              – Learned from intimate personal groups
              – These groups teach "definitions" (including skills, motivations, attitudes,
                and rationalizations) either favourable or unfavourable to the violation of
                the law. Criminal behaviour results when one is exposed to an excess of
                definitions favourable to the violation of the law over unfavourable
                definitions.


14   © 2012 Protiviti Member Firm (Middle East) Consultancy
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
2. Harvey Cardwell


      Wrote a book in 1960 on the logic and language of auditing for fraud.
      Found there are primarily 3 principal factors that contribute to
       employees beginning to steal:
         – The want for money - (early or late in life and the temporary urgent need)
           “Years of honest service” become meaningless when presented with time
           pressure.
         – Aggrieved – stealing after years of honest work apparently when hopes
           have faded, when honesty & effort have failed to produce the expected
           measure of success. Deterrents of prior years are weakened by extreme
           frustration.
         – The ability to steal – has been deterred by fear of detection but experience
           brings increased ability & self-confidence


15    © 2012 Protiviti Member Firm (Middle East) Consultancy
      CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
3. Gottfredson & Hirschi’s general theory of
                      crime - 1990

       Assume that individuals choose the behavior that they wish to
        perform rationally. They will weigh the potential pleasure of
        performing a behavior against the potential pain of the behavior.
        When a behavior is judged to be more pleasurable than painful, an
        individual is likely to perform the behavior.
       Central to this decision is low self-control.
       How much crime occurs will depend in part on how much crime
        circumstances allow.




16   © 2012 Protiviti Member Firm (Middle East) Consultancy
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
4. Richard C. Hollinger

              Hollinger-Clark study (1983)

              Surveyed 10,000 workers:

                  1/3 had committed some form of fraud.
                  Many stole because of job dissatisfaction.
                  Employee perception of detection is important.
                  Employee-thieves exhibit other deviances
                      – Sloppy work, sick leave abuses, etc.
               Increased security & controls may hurt, not deter.
               Management should be sensitive to employee’s attitudes.



17   © 2012 Protiviti Member Firm (Middle East) Consultancy
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
5. Donald R. Cressey


      Other Peoples Money
      A criminologist who studied embezzlers
      Why people become “trust violators”
      Developed the Fraud Triangle in 1953
      Cressey’s three learning principles
           1) Non-shareable financial problem.
           2) Perception that occupational situation can resolve the problem.
           3) Ability to Rationalize the act(s).




18   © 2012 Protiviti Member Firm (Middle East) Consultancy
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
The Fraud Triangle:




19    © 2012 Protiviti Member Firm (Middle East) Consultancy
      CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Fraud Risk Model

          “the auditor should not assume that all 3 conditions
             must be evident before concluding that there are                                                                          High Risk
             identified risks.”


     Medium
      Risk
                                                                                          Incentive/
                                                 Attitude/
                                                                                          pressure
                                                 rationalization


                                                                                                                                     “…the auditor cannot assume that
                                                                                                                                       the inability to observe one or
                                                                                                                                       two of these conditions means
                                                                    Opportunity                                                        there is no risk…”




20   © 2012 Protiviti Member Firm (Middle East) Consultancy
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
6. The triangle extended: the fraud diamond - Wolfe &
     Hermanson - 2004
                                                     Pressure


                                                                                                                                      opportunity
         capability
Position/function
The Human brain
Confidence/ego
Cultural issues
Coercion skills
Effective lying
Immunity to stress                                                      rationalisation

21    © 2012 Protiviti Member Firm (Middle East) Consultancy
      CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
The three parts of perceived
          opportunity……

                          1. To commit fraud


                          2. To conceal fraud


                          3. To avoid punishment

22   © 2012 Protiviti Member Firm (Middle East) Consultancy
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
pressure/rationalisation

                                                                       capability


                                                     identify opportunity                                act
                                                               upon it;


                                        caught not
             do it                      punished


                                                                                                                                    commit
                                                                         will I be
                                                                                                                  No                fraud
                                                                        caught?

           don’t
           do it                            Yes
                                                                        maybe



    © 2012 Protiviti Member Firm (Middle East) Consultancy
2   CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Iceberg Theory of Dishonesty



                                               Overt Aspects
                                                                                                                               Structural
                                               - Hierarchy
                                                                                                                               Considerations
                                               - Financial resources
                                               - Goals of the organisation
                                               - Skills and abilities of
                                               personnel
                                               - Technological state
                                               - Performances stds                                                                   Waterline
                                               - Efficiency measurements
                                               Covert Aspects
                                               - Attitudes
                                               - Feelings (fear,
                                               anger, etc)                                                                            Behaviourial
                                               - Values                                                                               Considerations
                                               - Norms
                                               - Interaction
                                               - Supportiveness
24   © 2012 Protiviti Member Firm (Middle East)- Satisfaction
                                               Consultancy
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Characteristics of a Fraudster
      College educated, white Male. ¾ of frauds are committed by
       men. Higher median loss (US$85,000 for men, US$ 48,000 for
       women).
      Intelligent. The challenge of “secure systems” overcomes
       boredom.
      Egotistical. Feel worth more than their position.
      Inquisitive. Curious as to computer vulnerability.
      Risk takers. Not afraid to fail. Fails to consider consequences.
      Rule breakers. Likes shortcuts. Justifies infractions of laws.



25    © 2012 Protiviti Member Firm (Middle East) Consultancy
      CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Characteristics of a Fraudster, continued

      Hard Workers. In early, out late, no vacations.
      Excessive overtime
      Immune from stress.
      Financial pressure. Medical fees, bad marriage,
       gambling.
      Married.
      Management.
      Disgruntled. Feels abused, not promoted, underpaid.
      Big Spender. Living beyond means.


26   © 2012 Protiviti Member Firm (Middle East) Consultancy
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Characteristics of a Fraudster,
     continued

      Sudden large purchases
      Close relationships with suppliers/customers.
      Don’t like people reviewing work
      Unable to relax
      Often display drastic behavioral changes
      Need turns to greed.




27    © 2012 Protiviti Member Firm (Middle East) Consultancy
      CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Changes in Behaviour
      Sudden large purchases. House, Car, Jewellery
      Brags about purchases
      Carry large amounts of cash
      Fending off creditors
      Borrows money from co-workers
      Moody, Irritable
      Defensive attitude to questioning
      Territorial over responsibilities



28   © 2012 Protiviti Member Firm (Middle East) Consultancy
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Changes in Behaviour, continued
      Workaholic
      Mentions financial/family problems
      Exhibits signs of addiction. Absenteeism, looks ill
      Decrease in productivity
      Spending excessive time with vendors/suppliers
      Nervous
      “Minor” infringements




29   © 2012 Protiviti Member Firm (Middle East) Consultancy
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Characteristics of a Victim
     Organisation
      Most costly abuses in organizations of less than 100 employees.
      Where fraud is not perceived a risk
      Management ignore irregularities
      Morale is low
      High employee turnover
      Lack of training
      Rapid increase in revenues and profits
      Strong, egotistical leader
      Profit is the ultimate goal, to be reached no matter what
      Salary structure tied to profit


30     © 2012 Protiviti Member Firm (Middle East) Consultancy
       CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
ACFE Report to the Nations
     on Occupational Fraud

         The latest report, for 2010, was compiled from 1,843 cases and
           covered cases from 106 nations.




31   © 2012 Protiviti Member Firm (Middle East) Consultancy
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Victims of Occupational Fraud
     The 2010 Report provides some information on the types of businesses
     that were victims of occupational frauds. The highs and lows are as
     follows:

                                                                            % of cases                                                Median
                                                                                                                                      loss


                High                          Banking     16.6%                                           Mining                      US$ 1
                                              and finance                                                                             million




                Low                           Mining                        0.7%                          Education                   US$ 71k



32    © 2012 Protiviti Member Firm (Middle East) Consultancy
      CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Profiling by Fraudster Position in Organisation
      This is explained on the basis that more senior people in management levels and
       executive positions have a greater opportunity to commit and hide larger frauds.
       This is a common theme throughout the remainder of the profiles.
      The study also found that lower level employees committed more frauds in number
       than management level, and about twice as many frauds as executives - probably
       because there are many more lower level employees that executives.

                                        Employee                                 Management                                Owner/Executive

                                           39.7%                                       37.1%                                          23.3%


                                         $70,000                                    $150,000                                     $834,000


                                           42.1%                                       41.0%                                          16.9%


                                         $80,000                                    $200,000                                     $723,000


33    © 2012 Protiviti Member Firm (Middle East) Consultancy
      CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Profiling by Job Description in Organisation
     The greatest number of cases are committed by people with the
     accounting area of the business, as these employees will have
     the knowledge of how to commit and hide the fraud and access
     to the records to do so. The largest median losses were
     incurred by frauds committed by people within the legal
     department.


                                                                        % of cases                                                   Median loss

                                                                                                              Upper
              Highs                       Accounting                               22%                                                 $829,000
                                                                                                            Management

               Lows                     Internal Audit                             0.2%                     Internal Audit              $13,000



34   © 2012 Protiviti Member Firm (Middle East) Consultancy
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Profiling by Fraudster Gender
     Over the past surveys, the rate of fraud between the
     genders began to equalize in number. This was
     superficially explained by the trend of women getting
     closer to equality in the work place (in numbers and
     positions)
                                                                                           Male                                      Female

                                 Percentage 2008                                            59.1                                      40.9

                                Median Loss 2008                                       250,000                                       110,000

                                 Percentage 2010                                            66.7                                      33.3

                                Median Loss 2010                                       232,000                                       100,000



35   © 2012 Protiviti Member Firm (Middle East) Consultancy
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Profiling by Fraudster Age

     Median losses increase with the age of employees.




                                        Under
                                                               26 to 30 31 to 40 41 to 50 51 to 60                                           over 60
                                         25

                    %                     5.9%                    10.7%                    34.2%                       32%           15.1%     2%




36   © 2012 Protiviti Member Firm (Middle East) Consultancy
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
Profiling by Educational Standard

     Smarter people - smarter frauds?




                                                                                         Some Tertiary
                                                       High School                                                      Tertiary Education    Post Graduate
                                                                                          Education

                Percentage 2008                             54.7%                                                                     34.4%      10.9%

               Median Loss 2008                           $150,000                                                               $210,000       $550,000

                Percentage 2010                             28.8%                               17.1%                                 38%         14%

               Median Loss 2010                           $100,000                           $136,000                            $234,000       $300,000




37    © 2012 Protiviti Member Firm (Middle East) Consultancy
      CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
38   © 2012 Protiviti Member Firm (Middle East) Consultancy
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
39   © 2012 Protiviti Member Firm (Middle East) Consultancy
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.

Weitere ähnliche Inhalte

Was ist angesagt?

Paper presentation on internet banking
Paper presentation on internet bankingPaper presentation on internet banking
Paper presentation on internet banking
Suresh Kumar
 
Chapter 8 financial compliance programme
Chapter 8   financial compliance programmeChapter 8   financial compliance programme
Chapter 8 financial compliance programme
Quan Risk
 
Chapter 6 aml compliance programme
Chapter 6   aml compliance programmeChapter 6   aml compliance programme
Chapter 6 aml compliance programme
Quan Risk
 
Money laundering
Money launderingMoney laundering
Money laundering
saadiakh
 
Chapter 24_Risk Management in Financial Institutions
Chapter 24_Risk Management in Financial InstitutionsChapter 24_Risk Management in Financial Institutions
Chapter 24_Risk Management in Financial Institutions
Rusman Mukhlis
 
ERM-Enterprise Risk Management
ERM-Enterprise Risk ManagementERM-Enterprise Risk Management
ERM-Enterprise Risk Management
Jorge Vaz Girão , CISA, PMP, PMDPro I, ERMCP
 
Anti money laundering - PEPs
Anti money laundering - PEPsAnti money laundering - PEPs
Anti money laundering - PEPs
Besart Qerimi
 

Was ist angesagt? (20)

Financial Technology (Fintech)
Financial Technology (Fintech)Financial Technology (Fintech)
Financial Technology (Fintech)
 
Paper presentation on internet banking
Paper presentation on internet bankingPaper presentation on internet banking
Paper presentation on internet banking
 
How to conduct an AML risk assessment
How to conduct an AML risk assessmentHow to conduct an AML risk assessment
How to conduct an AML risk assessment
 
Aligning strategy decisions with risk appetite, presented by David Shearer, 1...
Aligning strategy decisions with risk appetite, presented by David Shearer, 1...Aligning strategy decisions with risk appetite, presented by David Shearer, 1...
Aligning strategy decisions with risk appetite, presented by David Shearer, 1...
 
Chapter 8 financial compliance programme
Chapter 8   financial compliance programmeChapter 8   financial compliance programme
Chapter 8 financial compliance programme
 
Chapter 6 aml compliance programme
Chapter 6   aml compliance programmeChapter 6   aml compliance programme
Chapter 6 aml compliance programme
 
Money laundering
Money launderingMoney laundering
Money laundering
 
Loan loss provisioning
Loan loss provisioning Loan loss provisioning
Loan loss provisioning
 
Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management Consultants
 
Chapter 24_Risk Management in Financial Institutions
Chapter 24_Risk Management in Financial InstitutionsChapter 24_Risk Management in Financial Institutions
Chapter 24_Risk Management in Financial Institutions
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2,
 
Bank risk management
Bank risk managementBank risk management
Bank risk management
 
Presentation AML
Presentation AMLPresentation AML
Presentation AML
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 
Money Laundering
Money Laundering Money Laundering
Money Laundering
 
Credit rating
Credit ratingCredit rating
Credit rating
 
Credit scoring
Credit scoringCredit scoring
Credit scoring
 
Reputation risk
Reputation riskReputation risk
Reputation risk
 
ERM-Enterprise Risk Management
ERM-Enterprise Risk ManagementERM-Enterprise Risk Management
ERM-Enterprise Risk Management
 
Anti money laundering - PEPs
Anti money laundering - PEPsAnti money laundering - PEPs
Anti money laundering - PEPs
 

Ähnlich wie Profiling the Fraudster - OpenThinking Day

Temptation to defraud and internal auditor (albert holzinger 2010)
Temptation to defraud and internal auditor (albert holzinger 2010)Temptation to defraud and internal auditor (albert holzinger 2010)
Temptation to defraud and internal auditor (albert holzinger 2010)
Andres Baytelman
 
Temptation to defraud and internal auditor (albert holzinger 2010)
Temptation to defraud and internal auditor (albert holzinger 2010)Temptation to defraud and internal auditor (albert holzinger 2010)
Temptation to defraud and internal auditor (albert holzinger 2010)
Andres Baytelman
 
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
Craig Taggart MBA
 
insights-servfile (2)
insights-servfile (2)insights-servfile (2)
insights-servfile (2)
Dawn Murden
 
What You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From FraudWhat You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From Fraud
steinkamps6
 

Ähnlich wie Profiling the Fraudster - OpenThinking Day (20)

Understanding & Managing Fraud Rrisk
Understanding & Managing Fraud RriskUnderstanding & Managing Fraud Rrisk
Understanding & Managing Fraud Rrisk
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
 
Reputational risk article
Reputational risk articleReputational risk article
Reputational risk article
 
Why Fraud Exist in the Organization?
Why Fraud Exist in the Organization?Why Fraud Exist in the Organization?
Why Fraud Exist in the Organization?
 
Temptation to defraud and internal auditor (albert holzinger 2010)
Temptation to defraud and internal auditor (albert holzinger 2010)Temptation to defraud and internal auditor (albert holzinger 2010)
Temptation to defraud and internal auditor (albert holzinger 2010)
 
Temptation to defraud and internal auditor (albert holzinger 2010)
Temptation to defraud and internal auditor (albert holzinger 2010)Temptation to defraud and internal auditor (albert holzinger 2010)
Temptation to defraud and internal auditor (albert holzinger 2010)
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Scl profile v2
Scl profile v2Scl profile v2
Scl profile v2
 
Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
 
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
 
insights-servfile (2)
insights-servfile (2)insights-servfile (2)
insights-servfile (2)
 
What You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From FraudWhat You Need To Know To Protect Your Organization From Fraud
What You Need To Know To Protect Your Organization From Fraud
 
Dr haluk f gursel fraud examination rises to distinction article grcj 2010 1_v3_
Dr haluk f gursel fraud examination rises to distinction article grcj 2010 1_v3_Dr haluk f gursel fraud examination rises to distinction article grcj 2010 1_v3_
Dr haluk f gursel fraud examination rises to distinction article grcj 2010 1_v3_
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
 
Edelman Privacy Risk Index 2012
Edelman Privacy Risk Index 2012Edelman Privacy Risk Index 2012
Edelman Privacy Risk Index 2012
 
Edelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by PonemonEdelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by Ponemon
 

Mehr von Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP

Mehr von Iyad Mourtada, CMA, CIA, CFE, CCSA, CRMA, CPLP (20)

Fraud Awareness Workshop 2015
Fraud Awareness Workshop 2015Fraud Awareness Workshop 2015
Fraud Awareness Workshop 2015
 
Mastering Enterprise Risk Management Inside Your Organization
Mastering Enterprise Risk Management Inside Your OrganizationMastering Enterprise Risk Management Inside Your Organization
Mastering Enterprise Risk Management Inside Your Organization
 
Financial Orchestra - PICPA Middle East Conference
Financial Orchestra - PICPA Middle East Conference Financial Orchestra - PICPA Middle East Conference
Financial Orchestra - PICPA Middle East Conference
 
Fraud Awareness Program - OpenThinking
Fraud Awareness Program - OpenThinkingFraud Awareness Program - OpenThinking
Fraud Awareness Program - OpenThinking
 
The Experience 2020 - Iyad Mourtada
The Experience 2020 - Iyad MourtadaThe Experience 2020 - Iyad Mourtada
The Experience 2020 - Iyad Mourtada
 
Digital Business Strategy Workshop
Digital Business Strategy Workshop Digital Business Strategy Workshop
Digital Business Strategy Workshop
 
OpenThinking Show - Fraud Case Files
OpenThinking Show - Fraud Case FilesOpenThinking Show - Fraud Case Files
OpenThinking Show - Fraud Case Files
 
The New Basics of Marketing - HBR
The New Basics of Marketing - HBRThe New Basics of Marketing - HBR
The New Basics of Marketing - HBR
 
CPLP Course 2014
CPLP Course 2014CPLP Course 2014
CPLP Course 2014
 
ASTD Competency Model 2013
ASTD Competency Model 2013ASTD Competency Model 2013
ASTD Competency Model 2013
 
Mastering the Certified Professional in Learning and Performance (CPLP) Exam
Mastering the Certified Professional in Learning and Performance (CPLP) ExamMastering the Certified Professional in Learning and Performance (CPLP) Exam
Mastering the Certified Professional in Learning and Performance (CPLP) Exam
 
Financial Statement Fraud
Financial Statement FraudFinancial Statement Fraud
Financial Statement Fraud
 
Fraud prevention and detection within open data environment
Fraud prevention and detection within open data environmentFraud prevention and detection within open data environment
Fraud prevention and detection within open data environment
 
Fraud Game Template
Fraud Game TemplateFraud Game Template
Fraud Game Template
 
How ethical you are?
How ethical you are?How ethical you are?
How ethical you are?
 
How to lie, cheat and steal your way to success
How to lie, cheat and steal your way to successHow to lie, cheat and steal your way to success
How to lie, cheat and steal your way to success
 
Business Swimming Lessons
Business Swimming Lessons Business Swimming Lessons
Business Swimming Lessons
 
Passing the Torch
Passing the Torch Passing the Torch
Passing the Torch
 
How Accountants Cooked the Books
How Accountants Cooked the BooksHow Accountants Cooked the Books
How Accountants Cooked the Books
 
Why Auditors Do Not Discover Fraud
Why Auditors Do Not Discover FraudWhy Auditors Do Not Discover Fraud
Why Auditors Do Not Discover Fraud
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Profiling the Fraudster - OpenThinking Day

  • 1. Profiling the Fraudster …..its all about people Open Thinking Day Simon Padgett Director Forensic Services simon.padgett@protivitiglobal.ae Dubai. September, 2012 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 2. E&Y Fraud Survey – Key Findings In the last year :  2 in 3 had been defrauded  1 in 10 had more than 50 frauds  82% were committed by employees  Half of the employees had over 5 years service  A quarter had more than 10 years service  A third of the frauds were by management © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 3. The two faces of fraud:  The first face is one of systems or controls  The other face is the human element 2 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 4. COSO COSO identifies 5 components, which when integrated and operating in all business units, will help establish an effective internal control framework: 1. Control Environment 2. Risk Assessment 3. Control activities 4. Information and Communication 5. Monitoring 3 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 5. Fraud Risk Assessment Organizations first identify risks and prioritize them by assessing the impact and likelihood of an inherent risk. A key differentiator between Internal Controls and Anti Fraud Controls is the Human Element inherent in the decision to defraud. Failure to assess the Human Element can cause frauds to happen in organizations that otherwise seem to have a robust and comprehensive internal control framework. So, why do people commit fraud? 4 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 6. One of the best theories on why people commit fraud was given by Donald Cressey in his book “Other People’s Money” Cressey stated that Fraud occurs when an individual : •Has a non sharable financial problem. •Perceives an opportunity to resolve the situation. •Has the ability to rationalize his misdeeds even before committing them. 5 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 7. Pressure In other words for an individual to commit fraud, he may be under pressure from a financial problem which the individual perceives cannot be solved through other means. These problems often manifest themselves into behavioral patterns or red flags, which if spotted in time, could prevent a fraud from happening. The ACFE 2010 Report to the Nations, states that the most commonly cited behavioral red flags were perpetrators living beyond their apparent means or experiencing financial difficulties at the time of the fraud. 6 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 8. Opportunity Even if an individual has the motive, he cannot perpetrate the fraud unless presented with an opportunity. Opportunities could arise due to a number of factors within the organization such as high turnover of management in key roles, lack of segregation of duties or a complex organization structure. © 2012 Protiviti Member Firm (Middle East) Consultancy 7 CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 9. Rationalisation Rationalisation of the act is the last element in understanding why people commit fraud. Most people believe themselves as good and need to convince themselves that their actions were justified. Some of these justifications are: • I was going to pay it back • Everybody does it • I am not hurting anyone • I was helping my family • This is nothing compared to what xyz did. 8 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 10. The Fraud Triangle To sum up, when this individual under pressure is presented with an opportunity and is able to rationalize his planned actions, fraud occurs. This hypothesis is better known as the Fraud Triangle. FRAUD 9 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 11. Fraud Risk Assessment To be able to effectively analyse and prioritize fraud risks, organizations should evaluate the Human Element in the fraud risk. This can be achieved by applying the principles of the Fraud Triangle to the traditional risk assessment criteria of Impact and Likelihood. LIKELIHOOD INHERENT RISK IMPACT Traditional Risk Assessment Criteria RATING IMPACT OPPORTUNITY SITUATIONAL ATTITUDE OR FRAUD RISK Fraud Risk Assessment Criteria PRESSURE PERSONAL PRIORITY INTEGRITY The Human Elements 10 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 12. Key Controls and Personal Integrity For example in an organization where an individual performs a number of key controls – if this individual’s personal integrity and values are high, the chances of fraud happening is significantly lower than when the individual’s personal integrity is low. Understanding the people who manage key internal controls in an organization, their values and attitude could go a long way in minimizing the incidence of fraud and help build effective anti- fraud deterrents within an organization. 11 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 13. Anti-Fraud Program It is important for organizations to consider the human element while managing fraud risks. An Anti-Fraud Program that considers the human element may include the following fundamental controls: •Establish a Code of Ethics. •Develop Fraud Policies. •Invest in a communication and training program on fraud and corporate fraud policies for all employees. •Ensure proper segregation of duties for key activities and functions. •Set up appropriate recruitment procedures to select the right candidates. •Set up policies for rotation of staff duties and forced vacations. •Know your key fraud risks and controls. Monitor them regularly. •Set up a whistle blower hotline. •Sound recruitment policies and psychometric testing. •Develop a Fraud Risk Assessment process. 12 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 14. 13 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 15. 1. Edwin H. Sutherland  First defined “white-collar crime” in 1939 – Criminal acts of corporations – Individuals in corporate capacity  Theory of differential association – Crime is not genetic – Learned from intimate personal groups – These groups teach "definitions" (including skills, motivations, attitudes, and rationalizations) either favourable or unfavourable to the violation of the law. Criminal behaviour results when one is exposed to an excess of definitions favourable to the violation of the law over unfavourable definitions. 14 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 16. 2. Harvey Cardwell  Wrote a book in 1960 on the logic and language of auditing for fraud.  Found there are primarily 3 principal factors that contribute to employees beginning to steal: – The want for money - (early or late in life and the temporary urgent need) “Years of honest service” become meaningless when presented with time pressure. – Aggrieved – stealing after years of honest work apparently when hopes have faded, when honesty & effort have failed to produce the expected measure of success. Deterrents of prior years are weakened by extreme frustration. – The ability to steal – has been deterred by fear of detection but experience brings increased ability & self-confidence 15 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 17. 3. Gottfredson & Hirschi’s general theory of crime - 1990  Assume that individuals choose the behavior that they wish to perform rationally. They will weigh the potential pleasure of performing a behavior against the potential pain of the behavior. When a behavior is judged to be more pleasurable than painful, an individual is likely to perform the behavior.  Central to this decision is low self-control.  How much crime occurs will depend in part on how much crime circumstances allow. 16 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 18. 4. Richard C. Hollinger Hollinger-Clark study (1983) Surveyed 10,000 workers:  1/3 had committed some form of fraud.  Many stole because of job dissatisfaction.  Employee perception of detection is important.  Employee-thieves exhibit other deviances – Sloppy work, sick leave abuses, etc.  Increased security & controls may hurt, not deter.  Management should be sensitive to employee’s attitudes. 17 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 19. 5. Donald R. Cressey  Other Peoples Money  A criminologist who studied embezzlers  Why people become “trust violators”  Developed the Fraud Triangle in 1953  Cressey’s three learning principles 1) Non-shareable financial problem. 2) Perception that occupational situation can resolve the problem. 3) Ability to Rationalize the act(s). 18 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 20. The Fraud Triangle: 19 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 21. Fraud Risk Model “the auditor should not assume that all 3 conditions must be evident before concluding that there are High Risk identified risks.” Medium Risk Incentive/ Attitude/ pressure rationalization “…the auditor cannot assume that the inability to observe one or two of these conditions means Opportunity there is no risk…” 20 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 22. 6. The triangle extended: the fraud diamond - Wolfe & Hermanson - 2004 Pressure opportunity capability Position/function The Human brain Confidence/ego Cultural issues Coercion skills Effective lying Immunity to stress rationalisation 21 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 23. The three parts of perceived opportunity…… 1. To commit fraud 2. To conceal fraud 3. To avoid punishment 22 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 24. pressure/rationalisation capability identify opportunity act upon it; caught not do it punished commit will I be No fraud caught? don’t do it Yes maybe © 2012 Protiviti Member Firm (Middle East) Consultancy 2 CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 25. Iceberg Theory of Dishonesty Overt Aspects Structural - Hierarchy Considerations - Financial resources - Goals of the organisation - Skills and abilities of personnel - Technological state - Performances stds Waterline - Efficiency measurements Covert Aspects - Attitudes - Feelings (fear, anger, etc) Behaviourial - Values Considerations - Norms - Interaction - Supportiveness 24 © 2012 Protiviti Member Firm (Middle East)- Satisfaction Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 26. Characteristics of a Fraudster  College educated, white Male. ¾ of frauds are committed by men. Higher median loss (US$85,000 for men, US$ 48,000 for women).  Intelligent. The challenge of “secure systems” overcomes boredom.  Egotistical. Feel worth more than their position.  Inquisitive. Curious as to computer vulnerability.  Risk takers. Not afraid to fail. Fails to consider consequences.  Rule breakers. Likes shortcuts. Justifies infractions of laws. 25 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 27. Characteristics of a Fraudster, continued  Hard Workers. In early, out late, no vacations.  Excessive overtime  Immune from stress.  Financial pressure. Medical fees, bad marriage, gambling.  Married.  Management.  Disgruntled. Feels abused, not promoted, underpaid.  Big Spender. Living beyond means. 26 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 28. Characteristics of a Fraudster, continued  Sudden large purchases  Close relationships with suppliers/customers.  Don’t like people reviewing work  Unable to relax  Often display drastic behavioral changes  Need turns to greed. 27 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 29. Changes in Behaviour  Sudden large purchases. House, Car, Jewellery  Brags about purchases  Carry large amounts of cash  Fending off creditors  Borrows money from co-workers  Moody, Irritable  Defensive attitude to questioning  Territorial over responsibilities 28 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 30. Changes in Behaviour, continued  Workaholic  Mentions financial/family problems  Exhibits signs of addiction. Absenteeism, looks ill  Decrease in productivity  Spending excessive time with vendors/suppliers  Nervous  “Minor” infringements 29 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 31. Characteristics of a Victim Organisation  Most costly abuses in organizations of less than 100 employees.  Where fraud is not perceived a risk  Management ignore irregularities  Morale is low  High employee turnover  Lack of training  Rapid increase in revenues and profits  Strong, egotistical leader  Profit is the ultimate goal, to be reached no matter what  Salary structure tied to profit 30 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 32. ACFE Report to the Nations on Occupational Fraud The latest report, for 2010, was compiled from 1,843 cases and covered cases from 106 nations. 31 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 33. Victims of Occupational Fraud The 2010 Report provides some information on the types of businesses that were victims of occupational frauds. The highs and lows are as follows: % of cases Median loss High Banking 16.6% Mining US$ 1 and finance million Low Mining 0.7% Education US$ 71k 32 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 34. Profiling by Fraudster Position in Organisation  This is explained on the basis that more senior people in management levels and executive positions have a greater opportunity to commit and hide larger frauds. This is a common theme throughout the remainder of the profiles.  The study also found that lower level employees committed more frauds in number than management level, and about twice as many frauds as executives - probably because there are many more lower level employees that executives. Employee Management Owner/Executive 39.7% 37.1% 23.3% $70,000 $150,000 $834,000 42.1% 41.0% 16.9% $80,000 $200,000 $723,000 33 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 35. Profiling by Job Description in Organisation The greatest number of cases are committed by people with the accounting area of the business, as these employees will have the knowledge of how to commit and hide the fraud and access to the records to do so. The largest median losses were incurred by frauds committed by people within the legal department. % of cases Median loss Upper Highs Accounting 22% $829,000 Management Lows Internal Audit 0.2% Internal Audit $13,000 34 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 36. Profiling by Fraudster Gender Over the past surveys, the rate of fraud between the genders began to equalize in number. This was superficially explained by the trend of women getting closer to equality in the work place (in numbers and positions) Male Female Percentage 2008 59.1 40.9 Median Loss 2008 250,000 110,000 Percentage 2010 66.7 33.3 Median Loss 2010 232,000 100,000 35 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 37. Profiling by Fraudster Age Median losses increase with the age of employees. Under 26 to 30 31 to 40 41 to 50 51 to 60 over 60 25 % 5.9% 10.7% 34.2% 32% 15.1% 2% 36 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 38. Profiling by Educational Standard Smarter people - smarter frauds? Some Tertiary High School Tertiary Education Post Graduate Education Percentage 2008 54.7% 34.4% 10.9% Median Loss 2008 $150,000 $210,000 $550,000 Percentage 2010 28.8% 17.1% 38% 14% Median Loss 2010 $100,000 $136,000 $234,000 $300,000 37 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 39. 38 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.
  • 40. 39 © 2012 Protiviti Member Firm (Middle East) Consultancy CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to any third party.