A guide to forensic accounting investigation
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
Wiley
2006
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV021461525 | ||
003 | DE-604 | ||
005 | 20070329 | ||
007 | t| | ||
008 | 050905s2006 xx d||| |||| 00||| eng d | ||
010 | |a 2004027090 | ||
020 | |a 0471469076 |9 0-471-46907-6 | ||
020 | |a 9780471469070 |9 978-0-471-46907-0 | ||
035 | |a (OCoLC)57134408 | ||
035 | |a (DE-599)BVBBV021461525 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-M382 |a DE-739 |a DE-522 | ||
050 | 0 | |a HV8079.F4 | |
082 | 0 | |a 363.25/963 |2 22 | |
100 | 1 | |a Golden, Thomas W. |e Verfasser |4 aut | |
245 | 1 | 0 | |a A guide to forensic accounting investigation |c Thomas W. Golden ; Steven L. Skalak, and Mona M. Clayton |
264 | 1 | |a Hoboken, NJ |b Wiley |c 2006 | |
300 | |a XXII, 554 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 7 | |a Bedrijfsleven |2 gtt | |
650 | 7 | |a Fraude |2 gtt | |
650 | 7 | |a Ondernemingen |2 gtt | |
650 | 4 | |a Forensic accounting |x Auditing | |
650 | 4 | |a Fraud investigation |x Auditing | |
650 | 0 | 7 | |a Rechnungslegung |0 (DE-588)4128343-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Betrug |0 (DE-588)4006249-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Revision |g Wirtschaft |0 (DE-588)4049674-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Betrug |0 (DE-588)4006249-1 |D s |
689 | 0 | 1 | |a Rechnungslegung |0 (DE-588)4128343-0 |D s |
689 | 0 | 2 | |a Revision |g Wirtschaft |0 (DE-588)4049674-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Skalak, Steven L. |e Sonstige |4 oth | |
700 | 1 | |a Clayton, Mona M. |e Sonstige |4 oth | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014681471&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-014681471 |
Datensatz im Suchindex
_version_ | 1819686477218447360 |
---|---|
adam_text | CONTENTS
Preface xv
Acknowledgments xix
1 Fraud: An Introduction 1
Fraud: What Is It? 2
Fraud: Prevalence, Impact, and Form 3
Fraud in Historical Perspective 4
Types of Fraud 5
Root Causes of Fraud 6
A Historical Account of the Auditor s Role 7
Auditing: Ancient History 7
Growth of the Auditing Profession in the Nineteenth Century 8
Federal and State Securities Regulation before 1934 9
Current Environment 10
Auditors Are Not Alone 12
Deterrence, Auditing, and Investigation 13
Conceptual Overview of the Fraud Deterrence Cycle 14
Corporate Governance 15
Transaction Level Controls 16
Retrospective Examination 16
Investigation and Remediation 16
First Look Inside the Fraud Deterrence Cycle 17
Corporate Governance 17
Transaction Level Controls 18
Auditing and Investigation 20
2 The Roles of the Auditor
and the Forensic Accounting Investigator 21
The Patrolman and the Detective 22
Complexity and Change 25
Auditor Roles in Perspective 28
Not All Good People 29
Each Company Is Unique 30
Role of Company Culture 30
Estimates 32
Choices 33
What Auditors Do 35
Fraud versus Error 35
Reasonable Assurance 36
Materiality 38
iii
iv Contents
Bedrock of an Effective Audit 40
Professional Skepticism 40
Knowledge and Experience 40
Independence and Objectivity 41
SPADE 42 ;
Auditing Standards Take a Risk Based Approach to Fraud 42 .
Management Override 44 ¦
Regulatory Reaction to Fraud 45
Financial Benefits of Effective Fraud Management 46 I
Conclusion 46
3 Psychology of the Fraudster 47
Calculating Criminals 48
Case 1: It Can t Be Bob 49
Situation Dependent Criminals 49
Power Brokers 50
Fraudsters Do Not Intend to Harm 51
Case 2: For the Good of the Company 51
Case 3: Personal Catastrophes 51
Case 4: An Educated, Upstanding Citizen 52
Kinds of Rationalization 55
Auditors Need to Understand the Mind of the Fraudster 55
Conclusion 57
4 Financial Reporting Fraud
and the Capital Markets 59
Targets of Capital Market Fraud 60 :
Securities Investment Model 61
Overview of Financial Information
and the Requirement to Present Fairly 62
Overview of Fraud in Financial Statements 64
Accounting Irregularities as an Element of Financial Fraud 68
Some Observations on Financial Fraud 71
Fraud from Within 71
Summary 72
5 Auditor Responsibilities and the Law 75
6 Independence, Objectivity, Skepticism 87
SEC Final Rules for Strengthening
Auditor Independence 88
SEC Regulation of Forensic Accounting Services 88
Consulting versus Attest Services 92
Integrity and Objectivity 93
Independence Standards for Nonattest Services 94
Professional Skepticism 95
J
i
Contents v
Trust but Verify: A Case Study 96
Trust but Verify: Exploring Further 99
Loose Thread Theory of Auditing 103
Further Thoughts on the Loose Thread Theory 106
7 Forensic Investigations and Financial Audits:
Compare and Contrast 109
8 Potential Red Flags and Fraud Detection Techniques 119
* Types of Fraud Revisited 120
Fraud Detection: Overview 121
Laying a Foundation for Detection 124
Assessing the Risk of Fraud 125
Fraud Risk Factors 125
A Word on Information Technology 126
Interpreting Potential Red Flags 127
Importance of Professional Skepticism 129
Revisiting the Fraud Triangle 132
Incentive and Pressure 132
Opportunity 134
Rationalization and Attitude 135
Identifying and Evaluating Risk Factors 137
Discussion among Audit Team Members 138
Information Gathering 140
Other Sources 143
Analytic Procedures 144
Current Company Data versus Company Data from Prior Periods 147
Company Data versus Company Budgets, Forecasts, or Projections 147
Company Data versus Industry Data
and/or Comparable Company Data 147
Company Financial Data versus Company Operational Data 148
Company Data versus Auditor Determined Expected Results 148
Analytic Techniques 148
Assessing the Potential Impact
of Fraud Risk Factors 150
Evaluating Controls 152
Addressing the Identified Fraud Risks 153
Unpredictable Audit Tests 154
Observation and Inspection 155
Financial Statement Fraud: Detection Techniques 157
Revenue Recognition 157
Corruption 158
Summary 160
9 Internal Audit: The Second Line of Defense 161
What Do Internal Auditors Do? 162
[
i
i Contents
Internal Audit Scope of Services 164
The Handoff to Forensic Accounting Investigators
and Legal Counsel 166
Perception Problem 167
Complex Corporate Fraud and the Internal Audit 168
WorldCom and the Thornburgh Report 169
Case Studies: The Internal Auditor
Addresses Fraud 170
No Segregation of Duties—and a Very Nice Car 170
Odd Transportation System 171
A Tragic Circumstance 1 72
How Many Lunches Can You Buy? 173
Making the Numbers Look Right 1 73
How Not to Earn a Bonus 174
A Classic Purchasing Fraud 175
The Loneliness of the Internal Auditor 176
Hitting the Jackpot in the Gaming Industry 1 77
Reporting Relationships: A Key to Empowering
Fraud Detection 1 78
Tomorrow s Internal Auditor,
Tomorrow s Management and Board 180
10 Financial Statement Fraud: Revenue and Receivables 183
Improper Revenue Recognition 185
Timing 186
Revenue Recognition Detection Techniques 188
Side Agreements 191
Liberal Return, Refund, or Exchange Rights 192
Channel Stuffing 195
Bill and Hold Transactions 196
Early Delivery of Product 198
Partial Shipments 199
Contracts with Multiple Deliverables 200
Improper Allocation of Value in Multiple Element
Revenue Arrangements 201
Up Front Fees 202
Improper Accounting for Construction Contracts 202
Related Party Transactions 204
Revenue and Receivable Misappropriation 206
Revenues 207
Receivables 208
Fictitious Sales 209
Lapping 210
Redating 211
Inflating the Value of Receivables 211
Extended Procedures 212
Round Tripping 215
I
1 Contents vii
Improperly Holding Open the Books 216
Consignments and Demonstration Goods 21 7
Summary 218
11 Financial Statement Fraud: Other Schemes
and Misappropriations 219
Asset Misstatements 219
Inventory Schemes 219
I Investment Schemes 224
1 Recording Unrealized Declines in Fair Market Value 226
Recording Fictitious Fixed Assets 226
Depreciation and Amortization 226
Hanging the Debit 227
Software Development Costs 227
Research and Development Costs 228
Start Up Costs 228
Interest Costs 228
Advertising Costs 229
Understatement of Liabilities and Expenses 229
Off Balance Sheet Transactions 230
Two Basic Accounting Models 231
Cookie Jar Reserves 233
Improper and Inadequate Disclosures 234
Materiality 235
Disbursement Schemes 236
Invoice Schemes 236
Check Tampering 239
: Expense Reimbursement Schemes 240
Payroll Schemes 242
12 When and Why to Call In
Forensic Accounting Investigators 243
Today s Auditors Are Not Forensic Accounting Investigators 244
Auditors Are Not Authenticators 244
Auditors Have Limited Exposure to Fraud 245
Auditors Are Not Guarantors 246
Historically, Audits May Have Been Predictable 247
Potential Trigger Points of Fraud 248
Reliance on Others 255
Conclusion 257
1 3 Teaming with Forensic Accounting Investigators 259
Forensic Accounting Investigators Cooperation
with Internal Auditors 261
Internal Audit s Position and Function 261
Resource Models 262
Working Together 263
iii Contents
Forensic Accounting Investigators Cooperation
with External Auditors 264
Client History 264
The External Auditor in Today s Environment 265
Objectives of All Interested Parties 266
Forensic Accounting Investigators Objectives 266
Objectives of Other Parties to the Investigation 267
How Should the Investigation Objectives Be Defined? 269
Who Should Direct the Investigation and Why? 270
Ready When Needed 271
Where to Find Skilled Forensic Accounting Investigators 272
Internal Audit 272
Engaging External Forensic Accounting Investigators 273
Accounting and Auditing Firms 273
14 Potential Missteps: Considerations
When Fraud Is Suspected 277
Confronting Suspects 277
Dismissing the Target 281
Assumptions 281
The Small Stuff Could Be Important 286
Materiality: More on a Key Topic 287
Addressing Allegations 288
The Case of the Central American General Manager 289
Exercising Skepticism 293
Case Outcomes 294
15 Investigative Techniques 295
Timing 295
Communication 296
Early Administrative Matters 296
Predication 297
What Should You Know before You Start? 299
Gaining an Understanding 299
Gathering and Securing Information 300
Coordination 303
Other 303
A Word about Insurance 304
Exceptions and Other Considerations 305
Document Review 306
ComQuest 306
CPA Services 308
How to Read a Check 308
Airline Tickets 310
Conclusion 311
1
Contents ix
16 Anonymous Communications 313
Typical Characteristics of Anonymous Tips 314
Federal Statutes Related to Anonymous Reporting
and Whistle Blower Protections 315
Receipt of an Anonymous Communication 318
Initial Understanding of Allegations 320
Determine Whether Any Allegation Requires
Immediate Remedial Action 320
Development and Implementation
of the Investigative Strategy 321
The Investigation Team 321
Disclosure Decisions 322
Prioritize the Allegations 323
Interviewing Employees 325
Follow UpTip 329
Conclusion 330
17 Background Investigations 331
Commercial Media Databases 332
Other Public Records 335
Commercial Database Providers 339
Other Sources 342
Unique Internet Sources 342
Other Government Agencies 345
International Investigations 346
Conclusion 346
18 The Art of the Interview 349
Difficulty and Value of Obtaining an Admission 350
Planning for the Interview 351
Types of Interviews 353
The Information Seeking Interview 353
The Admission Seeking Interview 354
Others May Wish to Attend Interviews 358
Interview Process 358
Documenting the Interview 364
Summary 364
19 Analyzing Financial Statements 365
Developing Effective Analytic Procedures 366
Vertical Analysis 368
Horizontal Analysis 369
Ratio Analysis 369
Reasonableness Testing 369
Data Mining Analysis 370
Contents
Using Financial Ratios as Measures of Risk
or Indications of Fraud 371
Identifying Other Relationships That Might Indicate Fraud 375
Margin Analysis 376
Focus on Disparity of Net Income to Cash Balances 377
Evaluate Increases in Accounts Receivable in Relation
to Sales Increases 377
Evaluate Interim Results and Seasonality 377
Common Analytic Pitfalls 377
Identifying Signs of Earnings Management 378
The Beneish Research 378
20 Data Mining: Computer Aided Forensic Accounting
Investigation Techniques 385
Benefits and Pitfalls 386
Benefits 387
Other Considerations 387
Nearly Every Investigation Can Benefit
from Forensic Technology 388
Effective Data Mining 389
What Relevant Data Might Be Available? 389
Audit Trails (Traffic Data) 390
Faster/Better/Cheaper 390
Access to Relevant Data 390
Assessing Data Quality and Format 392
Scope of Available Data 393
Quality of Available Data 394
Time Required and Data Requests 394
Data Cleaning 398
Eliminating Duplicate Information 399
Testing the Data for Completeness and Accuracy 400
Understated Amounts 401
Overstated Amounts 402
Incomplete Responses 402
Incomplete Data Sets 402
Skills of the Forensic Technologist 402
Technical Skills 403
Communication Skills 403
Effective Use of Data Analysis Results 404
Role of Data Analysis in the Investigation 404
Data Mining in Action 405
Check Disbursement File 405
Examining the Vendor Master File and Payments History 410
General Ledger Searches 411
Keyword Searches 412
Deleted/Slack/Unallocated Space 414
Data Sorting 415
Choice of Tools 418
Contents xi
Presenting Results 419
Reviewing the Essentials 420
Conclusion 420
; 21 Building a Case: Gathering
} and Documenting Evidence 423
Critical Steps in Gathering Evidence 424
Considerations at the Time of Retention 424
Document Retention Considerations 425
Planning Considerations 425
Creating a Chain of Custody 427
Whose Evidence Is It? 430
Evidence Created by the Forensic
Accounting Investigator 431
Working Papers 431
Reports 432
What Evidence Should Be Gathered? 433
Investigations of Vendors 433
Investigations of Foreign Corrupt Practices Act Violations 434
Investigations of Improper Related Party Activity 434
Investigations of Employee Misappropriations 434
Investigations of Specific Allegations 435
Investigations of Financial Statement Errors 435
Important Considerations regarding Documents
and Working Papers 435
Conclusion 438
22 Supporting a Criminal Prosecution 439
Key Considerations 440
Deterrent Effect of Appropriate Response 440
U.S. Sentencing Commission Guidelines 440
Expense and Possible Outcomes 442
Referrals for Prosecution May Attract Public Attention 442
Referral Considerations 443
Refer the Matter to State, Local, or Federal Prosecutors? 444
Prosecutors Must Prioritize Cases 445
Forensic Accounting Investigator May Increase
the Success of a Referral 446
Reputational Benefits 446
Plea Agreements 447
Filing a Civil Lawsuit 447
23 Report of Investigation 449
Types of Reports 450
Importance of Adequate Preparation 450
1
Contents
Standards of Reporting 451
AlCPA Consulting Standards 451
ACFE Standards 453
The Written Report of Investigation 455
Basic Elements to Consider for Inclusion in a Report
of Investigation 455
Summarizing Your Findings 457
Written Report of Expert Witness Opining ;
for the Plaintiff on a Civil Fraud Claim 458
Affidavits 460
Informal Reports 461
Giving a Deposition 462
Be Prepared 463
It s Your Deposition 463
Objectives of a Deposition in Civil Litigation 464
You Are Being Measured 464
Reviewing Your Deposition Transcript 465
Other Considerations 465
Mistakes to Avoid in Reporting 466
Avoid Overstatement 467
Avoid Opinion 467
Identify Control Issues Separately from Investigative
Findings of Fact 467
Use Simple, Straightforward Language Focused on the Facts 467
Avoid Subjective Comments 468
Working Papers 469
Signed Engagement Letter 469
Relationship Review 471
Substantive Working Papers 471
Each Working Paper Should Stand on Its Own 471
Testimony Binder 473
Interview Memorandums 473
24 Working with Attorneys 475
In the Company of Lawyers 475
Confidentiality Requirements 477
Forming the Investigative Team 477
Documentation 483
Civil Litigation 485
Interviewing 485
External Audit Firm 486
Working for or Interacting with Law Enforcement
or Government Agencies 489
Disagreements with Counsel 490
Conclusion 491
I Contents xiii
j 25 Conducting Global Investigations 493
I On International Assignment 494
j Getting Started 495
Coordinating the Engagement 496
Logistics 497
Work Plan 497
Preliminary Work Plan Example 498
Foreign Corrupt Practices Act 501
Internal Accounting Control Provisions 502
Antibribery Provisions 502
Record Keeping Provisions 502
1 Additional Considerations 503
Planning the Engagement 503
Accounting Issues 503
Knowledge of Corporate Personnel 504
Understand Company Policy 504
Understand the Company s Network 504
Local Licenses 505
Schemes and Other Matters 505
Personal Considerations 507
26 Money Laundering 509
Relationship between Fraud and Money Laundering 510
Placement 511
Layering 511
Integration 511
Varying Impact of Money Laundering on Companies 512
The Five Point Program for AML Regulated Businesses 514
Written Compliance Program 514
Minimum Standards of Customer Due Diligence 514
Activity Monitoring and Reporting 514
Training 515
Record Keeping 515
Impact of Money Laundering on Financial Statements 51 7
AML and Forensic Accounting Investigation 518
At the Request of the Regulator 518
At the Request of the Institution 518
Review of Transactions and Records 519
Decision Making 519
The AML Reporting Process 519
Corporate Culture and AML Corporate Governance 520
Legal Arrangements Lending Themselves to Anonymity 520
Potential Red Flags 521
Auditing and Money Laundering 522
Relationship between Fraud Investigation and AML 523
xiv Contents
27 Other Dimensions of Forensic Accounting 525
Construction 526
Environmental Issues 527
Intellectual Property 528
Government Contracting 529
Insurance and Business Interruption 530
Marital Dissolution 530
Shareholder Litigation 531
Business Valuation 532
Business Combinations 532
Cybercrime 533
28 Looking Forward: The Future
of Forensic Accounting Investigation 535
Evolving Discipline 536
New Tools 538
Education and Training: To Better Support
the New Discipline 538
Regulation and Enforcement 539
Changing Corporate Environment 540
Internal Audit 541
Corporate Judgment Calls 542
Forensic Accounting Investigators Serving
Individual Corporate Clients 542
Nonfinancial Operating Data 543
Responsibility for Disclosure and Validation of NFOD 544
Other Legal and Stock Exchange Requirements 545
Future of Forensic Accounting Investigation:
Increasingly Global 546
Index 547
|
any_adam_object | 1 |
author | Golden, Thomas W. |
author_facet | Golden, Thomas W. |
author_role | aut |
author_sort | Golden, Thomas W. |
author_variant | t w g tw twg |
building | Verbundindex |
bvnumber | BV021461525 |
callnumber-first | H - Social Science |
callnumber-label | HV8079 |
callnumber-raw | HV8079.F4 |
callnumber-search | HV8079.F4 |
callnumber-sort | HV 48079 F4 |
callnumber-subject | HV - Social Pathology, Criminology |
ctrlnum | (OCoLC)57134408 (DE-599)BVBBV021461525 |
dewey-full | 363.25/963 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/963 |
dewey-search | 363.25/963 |
dewey-sort | 3363.25 3963 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01816nam a2200481 c 4500</leader><controlfield tag="001">BV021461525</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20070329 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">050905s2006 xx d||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2004027090</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0471469076</subfield><subfield code="9">0-471-46907-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780471469070</subfield><subfield code="9">978-0-471-46907-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)57134408</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021461525</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-522</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV8079.F4</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.25/963</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Golden, Thomas W.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A guide to forensic accounting investigation</subfield><subfield code="c">Thomas W. Golden ; Steven L. Skalak, and Mona M. Clayton</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Wiley</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXII, 554 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Bedrijfsleven</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Fraude</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Ondernemingen</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Forensic accounting</subfield><subfield code="x">Auditing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraud investigation</subfield><subfield code="x">Auditing</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnungslegung</subfield><subfield code="0">(DE-588)4128343-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Betrug</subfield><subfield code="0">(DE-588)4006249-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Revision</subfield><subfield code="g">Wirtschaft</subfield><subfield code="0">(DE-588)4049674-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Betrug</subfield><subfield code="0">(DE-588)4006249-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Rechnungslegung</subfield><subfield code="0">(DE-588)4128343-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Revision</subfield><subfield code="g">Wirtschaft</subfield><subfield code="0">(DE-588)4049674-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Skalak, Steven L.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Clayton, Mona M.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014681471&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014681471</subfield></datafield></record></collection> |
id | DE-604.BV021461525 |
illustrated | Illustrated |
indexdate | 2024-12-23T19:14:55Z |
institution | BVB |
isbn | 0471469076 9780471469070 |
language | English |
lccn | 2004027090 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014681471 |
oclc_num | 57134408 |
open_access_boolean | |
owner | DE-M382 DE-739 DE-522 |
owner_facet | DE-M382 DE-739 DE-522 |
physical | XXII, 554 S. graph. Darst. |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Wiley |
record_format | marc |
spellingShingle | Golden, Thomas W. A guide to forensic accounting investigation Bedrijfsleven gtt Fraude gtt Ondernemingen gtt Forensic accounting Auditing Fraud investigation Auditing Rechnungslegung (DE-588)4128343-0 gnd Betrug (DE-588)4006249-1 gnd Revision Wirtschaft (DE-588)4049674-0 gnd |
subject_GND | (DE-588)4128343-0 (DE-588)4006249-1 (DE-588)4049674-0 |
title | A guide to forensic accounting investigation |
title_auth | A guide to forensic accounting investigation |
title_exact_search | A guide to forensic accounting investigation |
title_full | A guide to forensic accounting investigation Thomas W. Golden ; Steven L. Skalak, and Mona M. Clayton |
title_fullStr | A guide to forensic accounting investigation Thomas W. Golden ; Steven L. Skalak, and Mona M. Clayton |
title_full_unstemmed | A guide to forensic accounting investigation Thomas W. Golden ; Steven L. Skalak, and Mona M. Clayton |
title_short | A guide to forensic accounting investigation |
title_sort | a guide to forensic accounting investigation |
topic | Bedrijfsleven gtt Fraude gtt Ondernemingen gtt Forensic accounting Auditing Fraud investigation Auditing Rechnungslegung (DE-588)4128343-0 gnd Betrug (DE-588)4006249-1 gnd Revision Wirtschaft (DE-588)4049674-0 gnd |
topic_facet | Bedrijfsleven Fraude Ondernemingen Forensic accounting Auditing Fraud investigation Auditing Rechnungslegung Betrug Revision Wirtschaft |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014681471&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT goldenthomasw aguidetoforensicaccountinginvestigation AT skalakstevenl aguidetoforensicaccountinginvestigation AT claytonmonam aguidetoforensicaccountinginvestigation |