Journal of Forensic & Investigative Accounting
Senior Editor:  D. Larry Crumbley
Editor: Tanweer Hasan
 
.  .  .  .  .  .



Journal of Forensic & Investigative Accounting

Senior Editor
D. Larry Crumbley

Louisiana State University
Department of Accounting
3106A Patrick Taylor Hall
Baton Rouge, LA 70803
Phone: 225-578-6231
Fax: 225-578-6201
dcrumbl@lsu.edu
 

Editor
Tanweer Hasan

Roosevelt University
430 S. Michigan Avenue
Chicago, IL 60605
Phone: 847-619-4886
Fax: 847-619-4852
thasan@roosevelt.edu


Volume 2: No. 3, Special Issue, 2010

Table of Contents

+ Market Efficiency and Investor Reactions to SEC Fraud Investigations
    • Theodore E. Christensen
    • Daniel Gyung H. Paik
    • Christopher D. Williams
Abstract: This study investigates investor reactions to SEC fraud investigations in the 2001-2003 period when investors were especially sensitive to fraud allegations in the wake of large-scale frauds such as Enron and WorldCom. The results indicate that investors penalize fraud firms surrounding both the fraud discovery date and the SEC’s investigation announcement date. Specifically, we observe a 29 percent decline in cumulative abnormal returns during the three-day window surrounding the market’s discovery of the fraud. We also find that investors penalize fraud firms by an additional eight percent during the three-day window surrounding the SEC’s subsequent investigation announcement.  If markets were completely efficient, prices would fully adjust as soon as information about the fraud is made public.  These results suggest that investors do not fully realize the severity of a fraud (and prices do not fully adjust) until the SEC begins its formal investigation. Moreover, this result is consistent with the notion that an SEC fraud investigation confirms the suspicions of investors regarding the gravity of previously released public information about fraud firms. We also examine different types of violations that lead to fraud investigations and find that the market responds more negatively to investigations related to revenue recognition, asset overstatement, and insider trading allegations than other types of violations. Finally, we identify factors associated with the likelihood that a firm will be investigated by the SEC for financial statement fraud.

Keywords: Fraud investigations, SEC disciplinary actions, market reactions.


Abstract: This study investigates whether a significant correlation exists between evidence of earnings management and increases in the subsequent year value of stock and exercisable stock options held by independent directors serving on the audit committee. Results show that, on average, independent directors on the audit committee of companies exhibiting evidence of earnings management benefited from significantly greater cumulative percentage increases in the market value of stock and stock options owned either actually or beneficially than did independent directors on the audit committees of companies presenting no evidence of earnings management. These results hold regardless of whether the earnings management was income increasing or income decreasing. Similar results also hold for audit committee independent chairs. While these results should not be interpreted as clear evidence that independent directors act in their own self-interest, such potential benefits could result in independent directors either being inappropriately lax when reviewing and approving management actions involving earnings management or actively participating with management in earnings management schemes. It is recommended that independent directors, like independent auditors, be prohibited from owning stock or holding stock options of any company for which they serve.

Keywords: Board independence; corporate governance; earnings management; stock options.

Data Availability: All data are publicly available.


+ The Bankruptcy Reform Act and Bankruptcy Fraud: Implications and Opportunities for CPAs
    • Katherine Barker
    • Nicole Forbes Stowell
    • Charlie Polansky
    • Daniel Kieffer
Abstract: With bankruptcy filings on the rise, it is not surprising that bankruptcy fraud is also increasing.  While the Executive Office for U.S. Trustees estimated that approximately ten percent of all bankruptcies contain some fraud, recent independent audits show that more than 25 percent of all audits contain some element of fraud. This paper presents a brief overview of the federal bankruptcy system and the most recent changes to bankruptcy law. Common bankruptcy fraud schemes are reviewed and the newly created Debtor Audit Program is discussed, which offers opportunities to independent CPA firms to participate in auditing bankruptcy filings.

CPAs who understand how the bankruptcy law has changed and the basic elements and types of bankruptcy fraud schemes being perpetrated have an advantage in being able to guide clients through the bankruptcy process, to help them steer clear of common pitfalls, and to avoid being made a party to any fraudulent activities themselves. Additionally, the bankruptcy law changes provide opportunities for CPAs to become bankruptcy “experts” and in doing so to provide the best possible services for a variety of clients.

Keywords: Bankruptcy, Bankruptcy Fraud, Fraud, Debtor Audit Program.


+ The Auditor’s Assessment of Fraud Risk: A Fuzzy Logic Approach
    • Christie L. Comunale
    • Rebecca L. Rosner
    • Thomas R. Sexton
Abstract: SAS No. 99 has limitations that may lead to ineffective implementation. Specifically, auditors use fraud risk indicators and judgment to decide whether a fraud risk factor exists. This implies a binary assessment of each fraud risk factor without consideration of the extent to which it exists. We believe that this is an oversimplification. In this paper, we describe a fuzzy logic expert system for the assessment of fraud risk. The system allows the auditor to input data regarding the presence or absence of each fraud risk indicator and employs the principles of fuzzy logic to evaluate the degree to which each fraud risk factor is present. Using the relative importance of each fraud risk factor, the system computes fraud risk associated with each type of fraud and with the six combinations of fraud type and condition. This approach has several advantages over the auditor’s current approach.

Keywords: Fraud; SAS No. 99; Fuzzy Logic; Expert Systems; Audit Effectiveness.

Data Availability: Data is available from the authors upon request.


Abstract: This research reports on the results of measurements of professional auditors’ dispositional trust as it may relate to the propensity for an auditor’s career advancement.  Under controlled conditions, we collected dispositional trust scores from 216 practicing auditors at Big 4 firms.  In addition, to develop a more complete picture of trust in the audit profession, we collected dispositional trust measures from 53 graduate accounting students who planned to enter the auditing profession upon graduation.  The results of the analyses indicate that auditors in manager and partner positions in audit firms are significantly more trusting than are auditors at staff and senior levels and auditing students.  Given that dispositional trust is a stable personality trait, there is evidence that the organizational structure of audit firms promotes the advancement of highly trusting individuals, while forcing out less trusting auditors.  Prior experimental research finds that more trusting auditors are less likely to detect fraud and errors, and more trusting auditors evaluate audit evidence less thoroughly than do less trusting auditors.  Based on the findings of prior dispositional trust research and the results of the current study, it appears that the advancement of highly trusting individuals could result in the promotion of effective client management at the expense of detecting fraud and other irregularities.

Keywords: Auditor; Career Advancement; Dispositional Trust.


Abstract: Currently, about 10 million people are victimized by identity theft each year. Annual losses exceed US$ 50 billion. Identity theft exists because of the impersonalization of institutions. Institutions know their clients not by recognizing their faces, but by their documents. Especially on the first encounter with a new client, how can the institution know the documentation is to be believed? This paper is about the acquisition of expert knowledge to answer the question, "What attributes make identity documents seem credible?" This study employs the repertory grid technique to explore that issue, and to provide a method for other institutions to gather expert knowledge about identity documentation policies.

Keywords: Identity fraud; identity theft; identity documents; document breeding.


Abstract: This paper investigates shill bidding in online auctions. We apply a five stage algorithm for identifying cases of shill bidding to a sample of eBay transactions in order to determine how often shill bidding happens, whether professional sellers or hobby sellers are more likely to engage in this practice and what strategies are used. We find that shill bidding happens often (18% - 28% of the time) across a variety of products. In the product categories examined, professional sellers engage in this practice more often than hobby sellers. Both competitive bidding and bid encouragement strategies are commonly but unequally used across product categories and by professional versus hobby sellers.

Keywords: Electronic markets and auctions; electronic commerce; deception; shill-bidding.


Abstract: Identifying potentially distressed corporations is a challenge for most financial professionals. Besides the financial reporting, the evaluation of corporate governance (CG) mechanisms constitutes an alternative strategy for singling out these companies. In this paper, we first extract relevant information on both delisting firms and listing firms with similar profiles between 2000 and 2008 from the Taiwan Stock Exchange database. Then, a logistic regression model is applied to identify the factors that are related to board composition and ownership structure. Finally, a classification and regression tree (CART) analysis is conducted to estimate the cutoff values of these factors. Our empirical analysis shows that after controlling for financial ratios, the significant CG variables leading to delisting include board size, percentage of independent directors, and percentage of shares pledged. The decision tree analysis has an 80% success rate in identifying potential delisting firms from the test data set. The utility and contribution in accounting practice from this study is threefold: 1) successful provision of an intuitive, user-friendly decision tree layout with critical indices for internal examination system, 2) the warning signals with corresponding threshold values for investors, and 3) the monitoring references for the supervisory commissions.

Keywords: Corporate Governance; BOD Composition; Logistic Regression; Decision Tree; CART.

Data Availability: Data are available from sources identified in the paper.


A Personal Look at Recovering the Truth

A friend of mine who has a master’s degree in computer science builds simulation laboratories for major government contractors. One simulation included a ten foot display depicting the working parts of a particular piece of military hardware in its design stage. In the display, each gear was clearly demonstrated and its movement traced to the interlocking pieces. The simulation followed the military hardware projectile as it headed downrange, over mountains, took a left at a truck, and flew into the second floor window to the target. Needless to say, it was impressive technology.

Despite her advanced knowledge of technology, when the flash card on her digital camera became corrupted, and her niece’s first birthday pictures disappeared, she asked me for help. While I was reformatting the flash card, she was thoroughly convinced the pictures had been irreversibly lost. A few minutes later, the forensic software I was using recovered all the pictures of a one-year old enjoying her first birthday cake. A long discussion of “How did you do that?” soon followed. Computer forensics was outside her knowledge base, even with her intense background in computer technology.

When I entered the private sector of computer forensics, the Federal Rules of Civil Procedure outlined the policies and procedures for the retention and archiving of data, e-mail, voice messages and similar electronic records. In my work, I found that companies and law firms were content to pay for data recovery as it related to litigation cases but seldom for data investigation. Why? Because few understand the difference between the two processes.

Let me explain. Data recovery typically encompasses the retrieval of archived data. Data investigation, on the other hand, is true computer forensics and involves searching through billions of deleted 1s and 0s on a hard drive to find the “smoking gun” that can help a client continue to fight or decide to settle a case. Data investigation in civil litigation typically involves the search of archived data for key words relating to the dispute and can account for a large part of the investigation.

One of the first cases I worked on in the private sector related to the difference between data recovery and data investigation in a civil litigation case. The dispute involved a property claim and palimony agreement of two individuals who both held high-level positions at the same company. When I entered the investigation, a considerable amount of time and money had already been spent by the client on “computer forensics,” which amounted to data recovery and, therefore, no conclusive evidence to assist the case.

I was asked to examine a computer not yet reviewed using data investigation methodologies. My examination revealed spoliation of the computer’s files, which implicated the company’s IT manager as part of the plot to delete and scrub the data files. The investigation findings included the exact time and date in which the IT manager scrubbed, or removed the data files. These time and date stamps indicated that the IT manager scrubbed the files the same evening it was documented that he spent the night at the petitioner’s home…an interesting case finding. In this situation, the IT manager knew how to delete and scrub data, but he did not know that computer forensic technology would be able to uncover his actions.

The use of data investigation methodologies can uncover more than just changed time and date stamps, and can be used for more than civil litigation. The following examples showcase the variety of evidence computer forensics can uncover and the many different situations where data investigation can be utilized:

  • A rapid settlement without further litigation costs was reached when the data investigation of a company proved that employees with non-compete clauses in their contracts had downloaded the company’s strategic plan, customer lists and pricing strategies onto a CD one day before resigning.

  • A sexual harassment case was successfully defended by a company when deleted e-mails containing attachments in violation of the company’s acceptable use policy were recovered from the petitioner’s account. Other deleted e-mails also helped the company’s case; some of the recovered e-mails had been deleted more than four years prior to the recovery.

  • A deleted e-mail containing the words, “I’m not going to jail over this!” was recovered while performing computer forensics for a fraud case. This e-mail would not have been found or recovered using only the key words provided by the attorneys. A good computer forensics investigator will use his experience, as well as information from the client, to create a preliminary plan for the analysis.

  • Computer forensics can assist in divorce litigation. Through computer forensics, a plot discovered in a common chat file indicated that one respondent was concealing assets through a third party whom he had a romantic relationship. In another case, the character of one party was quickly tarnished in a custody battle when copies of e-mails that were submitted to the court as exhibits and purported to be genuine were found to be questionable and fraudulent.

Businesses and individuals can benefit from understanding data investigation methodologies and what they are capable of uncovering. Data investigation should not be viewed in the same light as data recover, but instead, should be viewed separately as an investigation to locate evidence supporting or disputing a claim relating to civil or criminal litigation, divorce, human resources or other types of issues.

In any litigation, a sound plan on how to use electronic discovery is important. Determine if the case requires only the recovery of archive data or the use of computer forensics. A plan to investigate data must be fluid, as each new piece of evidence may lead the case in a different direction. One single e-mail, deleted years ago, may lead to a quick settlement and less litigation costs for the client, as uncovered evidence may eliminate the need for valuable resources to be dedicated elsewhere.

Most importantly, companies need to understand the extent of information that can be recovered and investigated through computer forensics. Like my friend’s pictures, data that is seemingly lost forever can be recaptured. To recover lost documents efficiently and effectively, it may be useful to enlist the help of an IT specialist. A computer forensic examiner, on the other hand, may be more valuable in data investigation to uncover documents that could be important to proving or disputing a claim. With the help of the right person, lost photographs of a child eating birthday cake and deleted e-mails that could help solve a case are not gone forever…they are just waiting to be recovered.

* Brook Schaub is a retired police sergeant from St. Paul Minnesota. He has taught computer and Internet forensic to law enforcement in Louisiana for the National Law Center for Children and Families, and spent months in Louisiana after Hurricane Katrina reuniting children as a consultant for the National Center for Missing & Exploited Children. He also was deployed to Baton Rouge by NCMEC for Hurricane Gustav.


Call for Mid-Year Meeting Papers

The deadline for submitting a paper for the 2nd Annual AAA Forensic & Investigative Accounting section’s mid-year meeting is January 15, 2011. The research conference will be held in New Orleans, March 25/26, 2011 at the Astor Crowne Plaza.

The conference will start on Friday March 25 at 1:00 and conclude Saturday, March 26 at noon. Authors will be given early notice of acceptance when possible.

Paper submissions, related to all areas of forensic and investigative accounting, are encouraged. A special effort will be made to provide opportunities for doctoral students and assistant professors. Papers accepted and delivered at the conference may be considered for publication in the Journal of Forensic and Investigative Accounting, provided that the author(s) adequately address the comments of the reviewers and Editor. There is no submission fee; however, all submissions must be electronically submitted to D. Larry Crumbley at (dcrumbl@lsu.edu) in Word or pdf format.


LSU Fraud & Forensic Accounting Conference

The LSU Fraud and Forensic Accounting Conference will be held July 11 and 12, 2011. Some speakers include Jeffrey Aucoin, Will Fleenor, James Koerber, Joe Koletar, Mark Shirley, Elliot Leary, Kelly R. Pope, and Michael W. Hudson, author of The Monster: How a Gang of Predatory Lenders and Wall Street Bankers Fleeced America. Mark your calendar.


Advertise in the JFIA

Would you like to advertise in this journal? Full page ad is $300. Half page ad is $150. Contact Larry Crumbley (dcrumbl@lsu.edu). Checks to be made out to Journal of Forensic and Investigative Accounting and sent to Larry Crumbley at 3106A Patrick Taylor Hall, Dept. of Accounting, L.S.U., Baton Rouge, LA 70803.



Books Received

Auditing & Assurance Services
T.J. Louwers, et al., 2011, 4th Edition
McGraw Hill
www.mhhe.com/louwers4e
 

One of the best coverage of fraud in an auditing textbook, with the updated Apollo Shoes Casebook, the only stand-alone fraud audit case on the market (available on the book’s website, www.mhhe.com/louwers4e).

  1. Chapter 2 has been revised to cover the new fundamental principles governing an audit and discusses the correspondence between these principles and the traditional 10 generally accepted auditing standards.
  2. Chapter 11 has been updated to consider the recent PCAOB guidance in Auditing Standard No.7 (AS 7) on engagement quality review.
  3. All chapters and modules incorporate professional standards through SAS 114 and include international standards of auditing.
  4. Three new Comprehensive Cases Motors, PTL Club, and Satyam Computer Services, Ltd are included.
  5. ACL Professional Audit software is included free with the book. Exercises for use with ACL software are available on the book’s website.
Kaplan CPA Simulators are included in the text problem material and are also accessible to www.mhhe.com/louwers4e. These simulators allow student to gain improved skills in handling the functionality of the examinations simulations and pick up additional knowledge for success on the CPA examination.

Auditing and Accounting Cases
J.C. Thibodeau and D. Freier,
3rd Edition
McGraw Hill
1221 Avenue of Americas
New York, NY 10020 

This soft cover book gives you and your students up-to-date auditing coverage along with cases that focus on issues at companies where a financial statement fraud actually occurred. Revised to include AS 5, this flexible casebook contains 45 cases focusing on specific auditing issues directly impacted Sarbanes-Oxley, using the actual companies – Enron, WorldCom, Qwest, Sunbeam – that have become synonymous with the capital markets crisis in confidence.

  • Three new cases on Bernie Madoff, WorldCom, and Audit Documentation requirements: These new cases will help students better understand the framework of specific rules related to the auditing and accounting profession.
  • Cases run only 3-5 pages in length, which dramatically reduces the time necessary for students to grasp key learning objectives. Students will be thankful for providing cutting-edge instruction in such an efficient manner.
  • Discussion questions from each section will help facilitate dialogue between you and your students, allowing for each individual student to firmly grasp the most important elements of each case.
  • Ensuring student mastery: each case focuses on one specific topic, ensuring student or practitioner mastery of that topic. The unique format also provides instructors with significant flexibility in integrating the case into their syllabus or lesson plan.
Government and Not-for-Profit Accounting
M.H. Granof and S.B. Khumawala, 2011, 5th Edition
John Wiley & Sons
111 River Street
Hoboken, NJ 0730-5774
 

An excellent book for someone wishing to become a government forensic accountant. However, the index contains no cites to fraud, but does include some ratio analysis.

Known for its accessible writing style and straightforward, concept-based presentation, this book, with the latest GASB pronouncements and cross-referenced with the newly launched FASB’s Accounting Standards Codification system. By emphasizing concepts, rather than rules and procedures, this text ensures an understanding of how and why issues are resolved either similarly or differently in the business sector. Updated references, added chapters, and new examples will give today’s accountants and students an even stronger grasp of the specialized information they will need to succeed.

Key features include

  • SEA suggested guidelines for performance reporting included in the newly revised chapter 15.
  • Completely revised and updated to include the latest topics and developments in Government & NFP accounting.
  • New separate chapters on health care organization and colleges and universities.
  • Numerous new examples with specific CAFR references.
International Accounting
T. Doupnik and H. Perera, 2009, 2nd Edition
McGraw Hill
1221 Avenue of Americas
New York, NY 10020

Some believe that as the U.S switches from rule based to principle based accounting, there will be much more fraud. This book does not have a single cite to fraud in its index.

The authors do provide a broad overview of accounting across borders, particularly on the accounting issues related to international business activities and foreign operations. Key features include

  • Engaging discussion of the international convergence of financial reporting standards.
  • A separate chapter on International Financial Reporting Standards (IFRS), including information on differences between IFRS and U.S. GAAP and their respective connotations.
  • Detailed focus on topics such as foreign currency translation, international taxation, international transfer pricing, and strategic accounting issues in multinational corporations.
  • Insights into international corporate governance and the efforts of the International Federation of Accountants (IFAC) to improve the quality of activities for accounting professionals.

Preventing and Detecting Employee Theft and Embezzlement: A Practical Guide
Stephen Pedneault, 2010, 310pp., 450
John Wiley
EVPEREZ@wiley.com

From implementing prudent hiring policies and practices through collecting receipts, making deposits, writing checks, paying employees, and evaluating the adequacy of insurance coverage, this essential book covers the major financial areas commonly found in most small businesses, and provides you with easy steps to follow in preventing and detecting embezzlement.

With checklists at the end of each chapter, you can literally start protecting your business right away. This practical guide takes a closer look at:

  • Why you would be wise to perform independent due diligence on a potential employee – even if they are referred by someone else.
  • The truth about contacting past employers when checking on a candidate – why it’s not much help.
  • What you must do in the hiring process to better protect yourself and your business.
  • How to know and monitor your existing employees.
Handbook of Energy Audits
Al Thumann, W.J. Younger, T. Niehus, 8th Edition
Fairmount Press, Inc.
700 Indian Trail
Lilburn, GA 30047
 

This best-selling handbook is the most comprehensive and practical reference available on energy auditing in buildings and industry. This latest edition includes revisions throughout, covering ASHARE Level 1 and 2 energy audits, as well as a new chapter on water conversion. Topics include energy assessment and computer software that will guide you in planning and carrying out a thorough and accurate energy audit of any type of facility, including electrical, mechanical and building system analysis. Clear, easy-to-follow instructions guide you through accounting procedures, rate of return and life cycle cost analysis. Also covered is information on understanding your utility bill and using that knowledge to trim your energy costs. Loaded with forms, checklists and handy working aids, this book is must-reading for anyone responsible for conducting or overseeing a facility energy audit.

Guide to Computer Forensics and Investigations
Bill Nelson, et al., 2008, 693 pp.
Course Technology
25 Thomson Place
Boston, Mass. 02210
 
The third edition teaches readers how to conduct a high-tech investigation, from acquiring digital evidence to reporting their findings. Coverage includes how to set up a forensics lab, how to acquire the necessary tools, and how to conduct an investigation and subsequent digital analysis. The comprehensive coverage and detailed know-how led to the book being listed as recommended reading by the FBI Forensics Communications, the United States Certified reading room. The book features free downloads of several forensics software programs so that students can become familiar with the tools of the trade.

Features of this book:


• Provides step-by-step explanations on how to use the most popular forensics tools.
• Includes a new chapter on the principles and practice of ethics for computer forensics examiners.
• Updated to include coverage of the latest technology, including PDRs, cell phones, and thumb drives.
• Free software works with hands-on and case projects, giving readers the opportunity to test their new skills and tying the content to professional practice.

Investigation and Prevention of Financial Crime
Peter Gottschalk, 2010, 254 pp.
Ashgate Publishing Company
Suite 420
101 Cherry Street
Burlington, VT 05401-4405
 
So long as there are weaknesses that can be exploited for gain, companies, other organizations, and private individuals will be taken advantage of. This theoretically-based but hugely practical book focuses on what is generally seen as financial or economic crime: theft, fraud, manipulation, and corruption.

The author considers how, in some competitive environments, goals can ‘legitimise’ all kinds of means, and how culture can exert a role in relation to what is seen as acceptable or unacceptable behavior by individuals. He addresses important topics including organized crime, money laundering, cyber crime, corruption in law enforcement agencies, and whistleblowing, and provides expert advice about strategies for the use of intelligence to combat financial crime. The uniqueness of his approach to the subject lies in the way he is able to explain intelligence and intelligence processes in the wider context of knowledge and knowledge management. The numerous case studies throughout the book illustrate the 'policing' of financial crime from an intelligence, knowledge management and systems perspective.

Law enforcers, lawyers, security personnel, consultants and investigators, as well as those in auditing and accountancy and with responsibilities for containing risk in banks, other financial institutions and in businesses generally, will find this book an invaluable source of practical guidance. The book also will be of interest to advanced students and researchers in criminology and police science.
Behavior, Truth and Deception: Apply Profiling and Analysis to the Interview
Michael R. Napier, 2010, 374 pp.
CRC Press
6000 Broken Sound Parkway, NW
Suite 300
Boca Raton, FL 33487
 
This hands-on volume, drawn from years of experience interviewing suspects, reveals the targeted subject interviewing process (TSI). This technique combines all known tactics learned from criminal personality profiling and investigative analysis into an effective strategy for interviewing a suspect. The book describes the skill sets and essential elements that directly contribute to a successful interrogation and outlines an interview plan using these analytical and profiling concepts.

Topics discussed include:

• Origins of offender motivation
• An analytical methodology for criminal investigative analysis
• Indirect personality assessment before the suspect interview
• Interview and interrogation techniques, including verbal strategies and nonverbal communications
• Interviews in rape cases
• Analysis of 911 calls made by a potential suspect
• Homicidal behavior
• Child molesters and stalkers
• Cultural considerations
• Tips for making interviews withstand legal challenges

A blend of insight from seasoned law enforcement professionals and behavioral experts, this volume helps investigators get under the skin of the suspect, expose deception, and bring out the truth. Employing crime scene scenarios to demonstrate concepts, the book includes a victim questionnaire capturing offender behavior, form templates, and a glossary, making this a one-stop reference for law enforcement professionals and others charged with solving crimes and bringing offenders to justice.
Computer Forensics
Michael Sheetz, 2007, 152 pp.
John Wiley & Sons
111 River Street
Hoboken, N.J. 07030
 
The core duties of a computer forensics expert are to identify sources of documentary or other digital evidence, preserve the evidence, analyze the evidence, and present the findings. This book offers attorneys, managers, and accountants complete, non-technical information about the role that computers play in financial crimes and fraud examination. The book has a three-part structure: Part I introduces readers to the science of computer forensics; Part II examines the role that computers play in the commission of financial crimes, frauds, and corporate espionage; Part III explains the role that computers play in uncovering, investigating, and prosecuting instances of financial crimes. Coverage includes:

• Basic Principles of Forensic Examination
• Data Verification and Encryption
• Role of the Computer Forensic Expert in Fraud Examination
• Occupational Crime and the Role of Computer Forensics
• Securities Fraud and the Computer
• The Computer as an Investigative & Organizational Asset
• Legal Dimension of Computers and Fraud Examination
• Managing the High-Tech Assignment