Together, Reducing Fraud Worldwide

Search

131 results

Protecting the Sentinels Blowing the Whistle

A historical rundown of prominent whistleblowers and the cases that made them famous as well as the laws in place that help to protect them

Unhealthy Procedures

As more health records are computerized and made available to medical providers on the Web, more data breaches and medical record compromises will occur.

Dissecting a complex trade-skill education program case, part 1

First of two parts on a complex skimming fraud case study, which dealt with trade-skill education programs and unfolded over four years at one of the largest technical colleges in the state of Washington.

Affinity is only skin deep

Article outlining affinity fraud, case histories and fraudster profile

Raising funds, not frauds

Article giving recommendations to avoid fraud and abuse in all types of student fundraising activities,along with several cases

Mary Jane betrays the boss and embezzles $400,000

Case study of an embezzlement

Comptroller, horse lady and crook, Part 1 of 2

Case study of a small-town comptroller, Rita Crundwell, accused of misappropriating more than $53 million in city funds. She has pleaded not guilty.

European fraudsters say pay up or your computer and files are goners!

Overview of ransomware and ideas on how to prevent it.

Inside trade: A wager in life

Article examining why people make a life-changing wager to grab some quick cash with an inside trade

Cyber-attack vector? Who, me?

The relatively indiscriminate sharing of personal data that so many consumer websites encourage is antithetical to the safe use of corporate information resources. Facts and information about cyber-attack vectors.