Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.


Welcome to the Fraud topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
371 Members
0 Online
0 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 18 total

Must be a Topic member to contribute
View All »
Dears, can any one provide me with any document showing examples of information technology Fraud red flags. 
Ala Edeen520 | 5/10/2018 3:53:03 AM | COMMENTS(0)
rskannan | 1/3/2017 9:01:25 AM | COMMENTS(1)
Hello. In the event of Fraud that involves the use of a computer, are there certain steps that are required in regards to the Chain of Custody? Thanks.
Angela712 | 10/22/2016 2:13:32 AM | COMMENTS(3)
Good DayI have authored a book titled The Money Laundering and Financing of Terrorism and the relevant links is provided below.RegardsKannanMember: Institute of Chartered Accountants of India; Association of Certified Anti-Money Laundering Specialists USA...
rskannan | 7/19/2016 3:24:14 AM | COMMENTS(0)
Hello,Has anyone got any experience with building financial fraud management on top of SIEM?Your feedback appreciated for pros and cons
David190 | 11/24/2015 12:18:06 PM | COMMENTS(1)
A car company had recently installed a defeat device that could detect whenever a car was undergoing official emissions testing and activate emissions controls only during such testing, This resulted in compliance with the standards that are set by the Of...
Tryphon339 | 9/22/2015 1:45:08 PM | COMMENTS(2)

Documents & Publications: 3 total

Must be a Topic member to contribute
Posted by James Aquino 2920 days ago

Events & Online Learning: 0 total

No Results Found

Journal Articles: 12 total

Volume 2, 2015
by Rodney T. Stamler, Hans J. Marschdorf, Mario Possamai | Reviewed by Upesh Parekh, CISA
It is a common myth that regulators and law enforcement agencies can protect organizations from fraud.
Volume 5, 2014
by Zhiwei Fu, Ph.D., CISA, CGEIT, CRISC, CFE, PMP, John W. Lainhart IV, CISA, CISM, CGEIT, CRISC, CIPP/G, CIPP/US, and Alan Stubbs, MAS
Fraud is an undeniable reality and has recently become more pervasive and persistent as a result of the downturn in the economy.
Volume 3, 2013
by Filip Van Hallewijn, CISA, CISM, AMBCI
As all organisations have become increasingly automated, their IT has become critical.
Volume 3, 2013
by Vasant Raval, CISA, DBA
Cheating, of course, is a type of indiscretion and suggests the degradation of moral fabric as much as other indiscretions such as financial fraud.
Volume 3, 2011
by Tommie W. Singleton and Aaron J. Singleton | Reviewed by Horst Karin, Ph.D., CISA, CISP, ITIL
The mission of this book is to provide a comprehensive textbook filled with knowledge, experience and methodologies for the financial auditor, fraud auditor and forensic accountant.
Volume 5, 2010
by Stephen Pedneault | Reviewed by Gail Michaelson, CISA, PMP, SSGB
This book is a primer on how fraud works and how to prevent, detect and prosecute it.

Wikis: 2 total

Blog Posts: 3 total

Must be a Topic member to view blog posts
A recent publication in a local newspaper, indicated that an employee was charged with fraud with regards to claims of insurance payments that were lodged with the company were paid out to people who were not entitled to receive such payments. What potent...
Posted By : Paulina.PNI | 2 comments
13 Nov 2014
Now a days, you don’t need to be a IT guru or best software programmer to access /control other personal/organization data. If you follow below techniques, you can easily get confidential information.1. Masquerading2. Tailgeting (Piggy back)3. Dumpster di...
Posted By : Shaklain | 1 comments
On March 1st,  I was invited to speak at the CampIT conference on Enterprise Risk/Security Management at Rosemont Convention Center. Before me there were two speakers. The first presenter spent an hour presenting the story from the trenches of technolog...
Posted By : appolloconsulting | 2 comments