Three ‘gotcha’ job interview questions
Read Time: 7 mins
Written By:
Donn LeVie, Jr., CFE
Remember in ancient days when a picture was worth a thousand words? Now, one click is worth a million viewers. Social media is here to stay. Facebook claims it has more than 1 billion active monthly users. Twitter claims 200 million users. According to a Pew Research Center study on the Internet conducted in late 2012, 67 percent of adults use Facebook, 16 percent use Twitter and 15 percent use Pinterest.
Even the Securities and Exchange Commission (SEC) had to acknowledge that social media is the new norm. On April 2, the SEC released a report stating that users can provide public disclosures for corporate communications with social media channels if users comply with fair disclosure regulations. The SEC’s announcement followed its investigation of Reed Hastings, CEO of Netflix Inc. and his first-time use of his personal Facebook account as a way to provide corporate metrics and whether Hasting’s action violated regulations of the Securities Exchange Act of 1934.
Therein lies the major problem with quick-trigger social media senders. Sometimes they don’t think of consequences before they submit messages into cyber space. Social media requires caution, restraint and common sense.
As educators and anti-fraud practitioners we can use social media apps and sites to research, investigate cases of suspected fraud and conduct background-hiring checks. That’s helpful. Students, however, can quickly post questionable comments and photos that can come back to bite them when prospective employees do name searches. That’s harmful.
Social media brings people together, but it also plays a big role in disseminating information on a variety of subjects, including investments. According to a study published in March 2011 in the Journal of Computational Science, academicians Johan Bollena, Huina Maoa and Xiaojun Zengb found that the mood reflected in Twitter messages predicted the move days ahead, with almost 88 percent accuracy, of the Dow Jones Industrial Average.
It’s no wonder, then, that perpetrators use this powerful medium to influence the market and entice victims to buy fraudulent securities. As a result, the FBI has assigned agents to scour the Internet for signs of securities fraud. The agency believes that social media sites like Twitter play an important role in perpetrating investment frauds.
Before students become fraud fighters they, too, can benefit from the positive aspects of social media sites. If they join groups that are related to their work interests they can demonstrate to potential employers that they’re serious about such topics as fraud examination. They can do this on social media sites such as LinkedIn, which 20 percent of U.S. adults use for business networking, according to Pew Internet Project research.
Consider giving students these suggestions about using LinkedIn:
Most students know about the dangers of misusing social media but they continue to do it. Even professionals occasionally slip up. Consider these examples:
Users can easily post derogatory comments about others that they’d never say in person. Sometimes, certain types of online statements can be criminal. For example, a Florida Court of Appeals recently ruled that posting threats on a personal Facebook page can constitute a crime and be prosecuted under state law (O’Leary v. State of Florida, 1D12-0975).
It’s bad etiquette for someone to denigrate another person’s character in a private email. However, now posting those same comments on Facebook (or other sites) can be libelous — tantamount to making the statement in public to an unknown number of individuals.
Unfortunately, social media users unguardedly type thoughts online that they might not include in any other published medium. Regardless, whether those words end up in a printed newspaper, magazine or book, or in an email, Facebook posting or Tweet, the courts can consider them libelous.
See these three major “cyber libel” court cases: Cubby, Inc. vs. CompuServe Inc., 776 F.Supp. 135 (S.D.N.Y. 1991), Stratton Oakmont vs. Prodigy (1995) and Zeran vs. America Online (1996).
Also, in 2006, a jury in Broward County, Fla., decided that a Florida woman should receive $11.3 million in a defamation lawsuit against a Louisiana woman who posted messages on a blog accusing her of being a “crook,” a “con artist” and a “fraud.” (Read “Jury awards $11.3M over defamatory Internet posts,” by Laura Parker, USA Today, Oct. 11, 2006.)
We offer these further suggestions to students:
Also, some “friends” might not turn out to be so friendly and share delicate information. In a recent case, police suspect that someone obtained information from Facebook to bluff a parent into believing that his daughter had been kidnapped and that he should pay a ransom to secure her release.
Even disclosing a birthdate — especially coupled with a birth city — can provide identity thieves with enough information to commit fraud. Cyber criminals can deduce birth years, find birth certificates and then obtain other forms of identification.
Use of social media sites also might:
As parents can attest, possibly one of the hardest things to teach students is that amoral activities — such as social media — might benefit but also hinder their goals. As academics and practitioners we can encourage budding fraud examiners to sharpen one side of that sword and leave the other side dull.
Richard Hurley, Ph.D., J.D., CFE, CPA, is a professor at the University of Connecticut (Stamford) School of Business. He’s a co-author of the “Global Fraud Focus” column in Fraud Magazine.
George R. Young, Ph.D., CFE, CPA, is an associate professor at Florida Atlantic University and the academic director of the forensic concentration in the Masters of Accounting program at the university. He is chair of the ACFE Higher Education Advisory Committee and co-author of “Forensic Accounting and Fraud Examination,” a textbook published by McGraw-Hill.
The Association of Certified Fraud Examiners assumes sole copyright of any article published on www.Fraud-Magazine.com or www.ACFE.com. ACFE follows a policy of exclusive publication. Permission of the publisher is required before an article can be copied or reproduced. Requests for reprinting an article in any form must be emailed to FraudMagazine@ACFE.com.
Unlock full access to Fraud Magazine and explore in-depth articles on the latest trends in fraud prevention and detection.
Read Time: 7 mins
Written By:
Donn LeVie, Jr., CFE
Read Time: 8 mins
Written By:
Annette Simmons-Brown, CFE
Read Time: 5 mins
Written By:
Annette Simmons-Brown, CFE
Read Time: 7 mins
Written By:
Donn LeVie, Jr., CFE
Read Time: 8 mins
Written By:
Annette Simmons-Brown, CFE
Read Time: 5 mins
Written By:
Annette Simmons-Brown, CFE