The Threat of Fraud

The Threat of Fraud Academic Level: Bachelor Paper details v You are the director of Worldwide Security for a Fortune 500 credit agency, a certified fraud examin" rel="nofollow">iner (CFE), an active member of the Association of Certified Fraud Examin" rel="nofollow">iners (ACFE), and you have in" rel="nofollow">in excess of twenty fraud in" rel="nofollow">investigators. You make presentations to universities throughout the country as well as at professional conferences about the dangers and true occurrences of fraud. You were just asked to review a case of identity theft of university professors, which started out as a couple professors receivin" rel="nofollow">ing unexplain" rel="nofollow">ined bills. Within" rel="nofollow">in a month, fifteen professors from all of the different departments started noticin" rel="nofollow">ing unexplain" rel="nofollow">ined charges and credit accounts on their credit reports. The new accounts took the form of credit cards, revolvin" rel="nofollow">ing credit accounts, car loans, school loans, and so forth. You were asked for your help because you are an expert in" rel="nofollow">in the field. Please post an answer to 5 of the followin" rel="nofollow">ing 7 questions. Support your answers with academic or real life crimin" rel="nofollow">inal justice examples to accentuate your poin" rel="nofollow">int. -In your opin" rel="nofollow">inion, what would be your plan to review the case of identity theft toward the university professors? Why? -Do you thin" rel="nofollow">ink identity theft can be controlled? How would you propose to control it or at least slow it down? -How would you protect the college professors from any fraudulent acts again" rel="nofollow">inst them after the identity theft has been discovered? -How would you identify all of the victims of identity theft? How would identifyin" rel="nofollow">ing all of the victims help you in" rel="nofollow">in your in" rel="nofollow">investigation? -What are some of the in" rel="nofollow">investigative methods that you would use to identify the perpetrators of the identity theft crimes? °If you were requested by the president of the college to create a loss prevention education workshop for the staff and professors, what would you in" rel="nofollow">include in" rel="nofollow">in the workshop? How would you evaluate the success of the lessons bein" rel="nofollow">ing presented in" rel="nofollow">in the workshop? -What punishment do you thin" rel="nofollow">ink the perpetrator should receive for his or her crime? Analyze key strategies for reducin" rel="nofollow">ing loss and in" rel="nofollow">increasin" rel="nofollow">ing security Describe key prin" rel="nofollow">inciples of security and loss prevention Develop a comprehensive in" rel="nofollow">individual and corporate loss prevention plan