Get Published in Fraud Magazine
January/February Detecting Fraud in the Data, PART ONE Fast, Free, and Traceless Computer Forensics Hanging Global Money Launderers Out to Dry Designing a Robust Fraud Prevention Program PART ONE FRAUDBASICS Financial Statement Fraud PART TWO Best Practices for Ethics Hotlines Bringing Down the House
March/April Detecting Fraud in the Data Using AID Part Two Designing a Robust Fraud Prevention Program Part Two Earnings Management Revisited Interviewing: Achieving Rapport, Part One Recruiting an Anti-fraud Foot-soldier Army Fraud Basics Interview Preparation Before you Ask the First Question
May/June Asset Misappropriations: Taking It Personally Interviewing: Part Two The Process of Deception Credit Card Fraud: Your Card in Their Hands Giving SOX & Fraud Examiners Genuine Clout Construction Fraud: Beware the 'Outside Facilitator' Interview Preparation, Part Two: Anatomy of a Conversation
July/August Commercial Mortgage Fraud: Cash Out, Fraud In - PART ONE Fraud Case Preparation: Know Your Goal, Know Your Role - PART ONE Identity Theft: Hunting Down and Nabbing the Thieves - PART ONE New Canadian Privacy Act: Canadian Law Affects Fraud Examinations Truth, Transparency, and Accountability with no Political Agenda Investment-bond Fraud: Smiling Faces Asking for Your Retirement Money Safeguarding Contract Competition: Finding Fraud in Procurement Systems Fear Not the Software: The Pros and Cons of Microsoft Access as a Fraud-busting Tool Fraud's Finer Points: Accounts Receivable Fraud, Part Five: Other Accounting Manipulations ActiveData for Excel: Harness the Power of Excel with the Features of IDEA Starting out: Students: This Column is for You! Fraud Edge: Introducing Fraud Examination into the Classroom
September/October Revisions of U.S. Federal Sentencing Guidelines: Changes Could Begin New Compliance Era Commercial Mortgage Fraud: When Fraudsters Bet the House and Win, Part Two Fraud Case Preparation: Know Your Goal, Know Your Role, Part Two CASE IN POINT: Italy's Parmalat Milking - Investors Through Financial Statement Fraud Identity Theft: Interviewing and Prosecuting Suspects, Part Two An interview with Marta Andreasen, suspended chief accounting officer of the European Commission - Telling the Truth & Living in Limbo Reaching for the Ceiling U.S. Federal Regulations - Former SEC Chief Accountant: Systemic Problems Need Fixing Fear Not the Software - FRAUD FIGHTING WITH DATA ANALYSIS TOOLS: Fear Not the Data Either Fraud's Finer Points: Case history applications - Accounts Receivable Fraud, Part Five: Eliminating Customer Accounts and Fictitious Account Adjustments Starting out: FOR AND ABOUT FRAUD-FIGHTING STUDENTS IN HIGHER-ED - New Graduate Extols Internship Programs Educating a New Generation of Fraud Fighters - Using College Internships to Raise Awareness From The PRESIDENT
November/December No Confession, No Evidence, No Case? Establishing New Complaint Procedures The Whole, Not the Parts Comparing Best Software for Fraud Examinations FBI Combats Financial Fraud with CFEs Protecting the Public Interests The Sophomore Slump From The President: The Value of the CFE Credential is High and Growing Fraud Edge: A FORUM FOR FRAUD-FIGHTING FACULTY IN HIGHER ED Fraud's Finer Points: Case History Applications Starting out: For and About Fraud-Fighting Students in Higher-Ed
View the Issue
Digital Edition
Log in
Watch Rachel Wilson, head of cybersecurity at Morgan Stanley, discuss cybercriminal syndicates and how they use malware to infiltrate mobile device security at the 33rd Annual ACFE Global Fraud Conference in Nashville, Tennessee. View the video.