Information About Fraud

New
        The Ten Stages in Complex Fraud Investigations
        How to Prevent Fraud in Your Small Business
       
Hidden Assets – Individuals
        Hidden Assets – Individuals - Common Hiding Places
        Employee Monitoring
       
Computer Forensics
       
Fraud Considerations When Obtaining Data
       
Digital Analysis for Unknown Fraud Symptoms
       
Data Reliability in Fraud Investigations
        Files and Databases - Obtaining Information
        Data Analysis Steps

        Forensic Tools
       
Proactive Fraud Detection Program
        Key Conditions for Detecting Fraud
       
Categories of Fraud Investigation

       
Investigative Steps in Contract & Procurement Fraud Cases

General Information
        Civil versus Criminal Fraud
        Fraud Definitions
        Options in a Fraud Situation
        Privacy
        Who Investigates and Prosecutes Fraud?

Accounting Methods
        Cash Versus Accrual Accounting

Bankruptcy
        Participants in Bankruptcy Cases

Businesses
        Avoiding Work-at-home Scams
        Deducting a Company Car
        Federal (U.S.) Payroll Taxes
        Florida Sales & Use Tax - A Summary

        How to Prevent Fraud in Your Small Business
        Independent Contractors
        Methods of Valuing a Business
        Preventing Counterfeit Check Fraud
        Withdrawing Money From An S-Corp
        Index to General Business Information

Computers & Information Systems
        Application Controls
        Computer Application Security Objectives
        Computer Crime

       
Computer Forensics
        Copies of Computer Programs

       
Data Reliability in Fraud Investigations
       
Digital Analysis for Unknown Fraud Symptoms
        EDI Security Risks
        Evaluation of Biometric Techniques
        Files and Databases - Obtaining Information
        Forensic Tools
       
Fraud Considerations When Obtaining Data
        General Controls in IS
        Internet E-Commerce - Security Issues
        Levels of Computer Security
        Privacy
        Reducing Vulnerability to Network Attacks In Small Business

        The Ten Stages in Complex Fraud Investigations
        Threats to Computer Systems
        Types of Computer Fraud
        Index to General Computer & Technology Information

Corruption
        Corruption

Financial Statements
        Financial Statement Fraud - Exposure Rectangle
        Major Types of Financial Statement Fraud
        Motivations for Financial Statement Fraud

Hidden Assets
        Hidden Assets – Individuals
        Hidden Assets – Individuals - Common Hiding Places

Internal Controls
        General Controls in IS

        How to Prevent Fraud in Your Small Business
        Internal Control Process
        Preventing Occupational Fraud
        Segregation of Duties

Internet
        Beware of online stock scams
        How Online Merchants Can Prevent Credit Card Fraud
        Internet E-Commerce - Security Issues
        Risk Assessment in e-Commerce

Investigating Fraud
       
Categories of Fraud Investigation
        Civil versus Criminal Fraud
        Company Employee Policies and Fraud Investigation

       
Computer Forensics
        Constitutional Amendments Relative to Fraud Investigations

        Data Analysis Steps

       
Data Reliability in Fraud Investigations
       
Digital Analysis for Unknown Fraud Symptoms
        Forensic Tools
        Elements of Fraud
        Employees' Rights During Civil Fraud Examinations
        Forensic Tools
       
Fraud Considerations When Obtaining Data
        Fraud Investigation Methods
        Fraud Theory Approach
        Legal Elements of Typical Criminal Frauds

        How to Prevent Fraud in Your Small Business
        Investigative Steps in Contract & Procurement Fraud Cases
        Options in a Fraud Situation
        Symptoms of Fraud

        The Ten Stages in Complex Fraud Investigations
        Types of Interview Questions
        Who Investigates and Prosecutes Fraud?

Investments
        Beware of online stock scams
        Top 10 Investment Scams - 2002
        Top 10 Investment Scams - 2000

Legal issues
        Civil versus Criminal Fraud
        Legal Elements of Typical Criminal Frauds
        Mail Fraud

Occupational Fraud
        Company Employee Policies and Fraud Investigation
        Preventing Occupational Fraud

Preventing Fraud
        Avoiding Work-at-home Scams
        Creating a Culture of Honesty
        Eliminate Fraud Opportunities

       
Employee Monitoring
        How Online Merchants Can Prevent Credit Card Fraud

        How to Prevent Fraud in Your Small Business
        Preventing Counterfeit Check Fraud
        Preventing Occupational Fraud

       
Proactive Fraud Detection Program
        Reducing Vulnerability to Network Attacks In Small Business
        Segregation of Duties

Taxes
       
Can I Get an Extension for My Taxes?
        Federal (U.S.) Payroll Taxes
        Keeping Copies of Your Tax Returns
        Withdrawing Money From An S-Corp
        Index to General Tax Information

Tools and Techniques
        The Ten Stages in Complex Fraud Investigations

Related Areas
        What Are Litigation Services?
        Our Position on Litigation Services
        What Is Our Role in Litigation?
        Litigation Practice Areas
        Qualifications

This publication provides business, financial planning, tax, and/or other related information to our clients. All material is for general information only and should not be acted upon without seeking appropriate professional assistance. We do not provide legal advice. If you have a legal question, contact an attorney. Read Disclaimer.

Main Litigation

Main Page

Contact

Contact rkulzick@kulzick.com with questions or comments about this web site.
Copyright © 1999-2007 Kulzick Associates, PA - Last modified: March 20, 2009