The paper "Fraud Prevention Plan' is a good example of a report on social science. Most organizations tolerate zero rates of fraud and corruption. In addition to this, all cases of fraud will be applied using all the available information and making use of existing laws and controls. The controls mentioned here include checking and assessing the finances and controls that are prescribed in the systems, policies, and procedures of the given organization. The implementation of the instructions that are defined in policies that have been formulated in the organization and are seen to be followed by all people and staff in that organization.
It is a requirement that in cases where an employee suspects that a manager is involved in a fraud, then the report of the report can be made to other members of the management. Background Fraud has been reported in many firms calling for action to be taken to curb this menace. The existence of fraud has cut across all industries. From a number of researches that were carried out in commercial hotels, it indicated that nearly 67 percent of the total fraud cases committed are from insiders mainly the line managers who contribute to about 83 percent of the total fraud reported to take place within the premise.
The other remaining was place under the outsiders. Fraud related crimes have shown to the researchers that if this unethical behavior is not prevented then it will result in loss of funds. Studies that were done between 2005 and 2010 revealed that up to $10,000 are lost every day as a result of fraud. This is, therefore, calling that measures be taken to minimize this crime.
Suppliers contribute 43 percent of the total, outsiders being 22 percent and 35 percent from insiders. The research further explained that a larger proportion of fraud occurs either between the staff and a client or supplier and a line manager or job seeker and a manager. All the cases are committed with the aim of favor of something than other colleagues. Threats Any crime committed has a negative impact on the progress of a business. The costs that are lost as a result of fraud cases are too much in that if it is not prevented earlier then it will soon call for closure.
Fraud that is brought about by the outsiders with the aim of being favor in employment will pose a threat of employing people without the right skills which will at the end lead to poor management thus more loss of funds and clients through other ways.
Albrecht, S. W., Albrecht, C. C., Albrecht, C. O., & Zimbelman, M. F. (2011). Fraud Examination. Cengage Learning.
Albrecht, S., Wernz, G., & Williams, T. (1995). Fraud: bringing light to the dark side of business. Irwin Professional Pub.
Assembly, United Nations. (2006). Financed Report and Audited Financial Statement For the Bennium Ended 31 December 2005 and Report of thr Board of Auditors: United Nations Institute for Training and Research. United Nations Publications.
Biegelman, M., & Biegelman, D. (2008). Building a world-class compliance program: best practices and strategies for success. Sydney: John Wiley and Sons.
Coderre, D. (2009). Computer Aided Fraud Prevention and Detection: A Step by Step Guide. John Wiley and Sons.
Coenen, T. (2008). Essentaials os corporate fraud. John Wiley and Sons.
Collier, P. M., & Agyei-Ampomah, S. (2006). CIMA Learning System 2007 Management Accounting-Risk and Control Strategy. Elsevier.
Ford, J. T. (2005). State Department: Improvements Needed to Strengthen U.S. Passport Fraud Detection Efforts. New York: DIANE Publishing.
Green, J. H. (2001). The Irwin handbook of telecommunications management. McGraw-Hill Professional.
Ireland, Learning Hanbook. (2004). Information Technology Law. Routledge.
Kutz, G. (2010). Small Business administration 8(a) Program: FourteenInelible Received $325 Million in Sole-Source and Set-Aside Contracts. DIANE Publishing.
Messina, J., Brosnan, M., & Block, E. (2000). Telecommunications expense management: how to audit your bills, reduce expenses and negotiate favorable rates. Focal Press.
Montague, D. A. (2004). Fraud Prevention Techniques for Credit Card Fraud. Trafford Publishing.
Montague, D. A. (2010). Essentals of online Payment Security and Fraud Prevention. John Wiley and Sons.
Morris, G. D., Mckay, S., & Oates, A. (2009). Finance Director's Handbook. Butterworth-Heinemann.
Plunkett, J. W. (2006). Plunkett's outsourcing and offshoring Industry Almanac 2007 (E-book): Outsourcing and Offshoring Industry Market Research Statistics, Trends and Leadind Companies. Plunkett Research, Ltd.
Preston, N. (1994). Ethics for the public sector: education and training. Federation Press.
Schaeffer, M. S. (2007). Travel and Entertainment Best Practices. John Wiley and Sons.
Security, Government Accountability. (2010). Security management. Michigan: American Society for industial Security.
Slawsky, J. H., & Zafar, S. (2005). Developing and managing a successful payment cards business. Gower Publishing, Ltd.
Slee, D. A., Slee, V. N., & Schmidt, H. J. (2007). Slee's health care terms. Johnes & Bartlett Learning.
Snyder, H. (2006). Small change, big problems: detecting and preventing financial misconduct in your library. ALA Editions.
Stana, R. M. (2009). U.S. Asylum System: Agencies Have Taken To elp nsure Quality QR code for U.S. Asylum System inthe Asylum Adjustification Process, But Challanges Remain. New York: DIANE Publishing.
United states, Government accoutability, (2006). Hurricanes Katrina and Rita federal actios could enhance preparedness of certain stateadministered federal support program: report. DIANE Publishing.
Vacca, J. (2003). Identity theft. London: Prentice Hall Professional.
Vona, L. (2008). Fraud Risk Assesssment: Building a Fraud Audit Program. John Wiley and Sons.